You are previewing National Security and Counterintelligence in the Era of Cyber Espionage.
O'Reilly logo
National Security and Counterintelligence in the Era of Cyber Espionage

Book Description

As technology continues to advance, the threats imposed on these innovations also continue to grow and evolve. As such, law enforcement specialists diligently work to counteract these threats, promote national safety, and defend the individual rights of citizens. National Security and Counterintelligence in the Era of Cyber Espionage highlights technological advancements in intelligence systems and law enforcement in relation to cybercrime and reconnaissance issues. Focusing on current and emergent threats to national security, as well as the technological advancements being adopted within the intelligence field, this book is an exhaustive reference source for government officials, researchers, graduate-level students, and intelligence and enforcement specialists interested in novel measures in being implemented in the prevention of cybercrime and terrorism.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Book Series
    1. Mission
    2. Coverage
  5. Editorial Advisory Board
  6. Foreword
  7. Preface
  8. Section 1: Current Threats
    1. Chapter 1: The Mirror Has Two Faces
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. PLUGGING IN: A BRIEF HISTORY OF THE INTERNET
      5. THE INTERNET AND THE NEW DIGITAL COMMUNICATIONS TECHNOLOGIES: ISSUES OF POWER AND OF GOVERNANCE IN A DIGITISED WORLD
      6. THE MIRROR HAS TWO FACES: TERRORISTS, HACKTIVISTS, CYBER ACTIVISTS, SCHOLARS AND THEIR USE OF THE INTERNET
      7. TERRORIST NETWORKS AND THE NETWORKING OF SECURITY OPERATIONS & INTELLIGENCE: CONNECTING FOR SUCCESS
      8. LAW ENFORCEMENT, INTELLIGENCE, AND CLANDESTINE INFORMATION-GATHERING ONLINE: FIGHTING BACK
      9. UNDERSTANDING TERRORISM 2.0: RECONFIGURING ACCESS TO KNOWLEDGE AND TO NETWORKS OF EXCELLENCE & EXPERTISE ONLINE
      10. TERRORISM, THE INTERNET, AND THE SCHOLARLY WEB: FROM UNCHARTED WILDERNESS TO WELL-DEFINED LANDSCAPE
      11. THE WINNER TAKES IT ALL: UNDOMESTICATED RESEARCH WILDERNESS OR VERITABLE TERRORIST HAVEN?
      12. DIRECTIONS FOR FURTHER RESEARCH: TERRORISM AND THE FUTURE OF THE INTERNET
      13. CONCLUSION
      14. REFERENCES
      15. ADDITIONAL READING
      16. KEY TERMS AND DEFINITIONS
    2. Chapter 2: US-China Relations
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. U.S - CHINA CYBER RELATIONS
      5. SOLUTIONS AND RECOMMENDATIONS
      6. FUTURE RESEARCH DIRECTIONS
      7. CONCLUSION
      8. REFERENCES
      9. KEY TERMS AND DEFINITIONS
    3. Chapter 3: The USA Electrical Grid
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. MAIN FOCUS OF THE CHAPTER
      5. SOLUTIONS AND RECOMMENDATIONS
      6. FUTURE RESEARCH DIRECTIONS
      7. CONCLUSION
      8. REFERENCES
      9. KEY TERMS AND DEFINITIONS
    4. Chapter 4: Insider-Threat Detection in Corporate Espionage and Cyber-Espionage
      1. ABSTRACT
      2. INTRODUCTION
      3. EDUCATION, EXPERIENCE, AND INTERESTS
      4. RECONNAISSANCE, SCANNING, AND EXPLOITATION
      5. SOLUTIONS AND RECOMMENDATIONS
      6. FUTURE RESEARCH DIRECTIONS
      7. CONCLUSION
      8. REFERENCES
      9. ADDITIONAL READING
      10. KEY TERMS AND DEFINITIONS
    5. Chapter 5: Teaching New Dogs Old Tricks
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. DEFINITIONS
      5. MAIN FOCUS OF THE CHAPTER
      6. SOLUTIONS AND RECOMMENDATIONS
      7. FUTURE RESEARCH DIRECTIONS
      8. CONCLUSION
      9. REFERENCES
      10. KEY TERMS AND DEFINITIONS
  9. Section 2: Understanding the Field
    1. Chapter 6: Understanding Digital Intelligence
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. MAIN FOCUS OF THE CHAPTER: ISSUES, CONTROVERSIES, AND PROBLEMS
      5. CONCLUSION
      6. REFERENCES
      7. KEY TERMS AND DEFINITIONS
    2. Chapter 7: Surveillance and Resistance
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. CONCLUSION
      5. MAIN FOCUS OF THE CHAPTER
      6. REFERENCES
      7. KEY TERMS AND DEFINITIONS
      8. ENDNOTES
    3. Chapter 8: Developing Discourse and Tools for Alternative Content to Prevent Terror
      1. ABSTRACT
      2. INTRODUCTION
      3. MAIN FOCUS OF THE CHAPTER
      4. THE METHODOLOGY
      5. WAYS OF RADICALIZATION
      6. WAYS OF DE-RADICALIZATION
      7. SOLUTIONS AND RECOMMENDATIONS
      8. FUTURE RESEARCH DIRECTIONS
      9. CONCLUSION
      10. REFERENCES
      11. KEY TERMS AND DEFINITIONS
    4. Chapter 9: The Value of Personal Information
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. MAIN FOCUS OF CHAPTER
      5. SOLUTIONS AND RECOMMENDATIONS
      6. CONCLUSION
      7. REFERENCES
      8. ADDITIONAL READING
      9. KEY TERMS AND DEFINITIONS
  10. Section 3: Novel Implementations and Forward Thinking
    1. Chapter 10: Application of Mathematical Modeling for the Secure and Intelligent Energy Infrastructure
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. RESEARCH PROGRESS
      4. 3. PROPOSED METHODOLOGY
      5. 4. CONCLUSION AND FUTURE WORK
      6. REFERENCES
      7. KEY TERMS AND DEFINITIONS
    2. Chapter 11: The Need for a National Data Breach Notification Law
      1. ABSTRACT
      2. INTRODUCTION
      3. THE NEED FOR A NATIONAL DATA BREACH NOTIFICATION LAW
      4. MAIN FOCUS OF THE CHAPTER
      5. SOLUTIONS AND RECOMMENDATIONS
      6. FUTURE RESEARCH DIRECTIONS
      7. CONCLUSION
      8. REFERENCES
      9. KEY TERMS AND DEFINITIONS
    3. Chapter 12: Combating Terrorism through Peace Education
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. MAIN FOCUS OF THE CHAPTER
      5. SOLUTIONS AND RECOMMENDATIONS
      6. FUTURE RESEARCH DIRECTIONS
      7. CONCLUSION
      8. REFERENCES
      9. KEY TERMS AND DEFINITIONS
    4. Chapter 13: The Role of State Actors in Cybersecurity
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. CASE STUDIES
      5. RECOMMENDATIONS
      6. FUTURE RESEARCH DIRECTIONS
      7. CONCLUSION
      8. REFERENCES
      9. KEY TERMS AND DEFINITIONS
      10. ENDNOTES
    5. Chapter 14: Intelligence Studies, Theory, and Intergroup Conflict and Resolution
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. MAIN FOCUS OF THE CHAPTER
      5. ISSUES, CONTROVERSIES, PROBLEMS
      6. SOLUTIONS AND RECOMMENDATIONS
      7. FUTURE RESEARCH DIRECTIONS
      8. CONCLUSION
      9. REFERENCES
      10. KEY TERMS AND DEFINITIONS
    6. Chapter 15: Detecting Individual-Level Deception in the Digital Age
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. MAIN FOCUS OF THE CHAPTER
      5. FUTURE RESEARCH DIRECTIONS
      6. CONCLUSION
      7. REFERENCES
      8. KEY TERMS AND DEFINITIONS
  11. Compilation of References
  12. About the Contributors