You are previewing Red Team: How to Succeed By Thinking Like the Enemy.
O'Reilly logo
Red Team: How to Succeed By Thinking Like the Enemy

Book Description

An international security expert shows how competitive organizations can get—and stay—ahead by thinking like their adversaries

Table of Contents

  1. Contents
  2. Introduction
    1. Al Kibar: “Gotta Be Secret, Gotta Be Sure”
    2. Why Organizations Fail, But Can’t Know It
    3. How Red Teams Function
    4. How Red Teams Succeed or Fail
    5. Into the World of Red Teaming
  3. ONE: BEST PRACTICES IN RED TEAMING
    1. 1. The Boss Must Buy In
    2. 2. Outside and Objective, While Inside and Aware
    3. 3. Fearless Skeptics with Finesse
    4. 4. Have a Big Bag of Tricks
    5. 5. Be Willing to Hear Bad News and Act on It
    6. 6. Red Team Just Enough, But No More
    7. The Overarching Best Practice
  4. TWO: ORIGINS: MODERN MILITARY RED TEAMING
    1. Red Team University
    2. Card Tricks: Mitigating Hierarchy and Groupthink
    3. Marine Corps Red Teaming: Challenging Command Climate
    4. Millennium Challenge: “The Significant Butt-Kicking”
    5. Military Red Teaming Abroad
    6. Conclusion
  5. THREE: ALTERNATIVES: INTELLIGENCE COMMUNITY RED TEAMING
    1. Team B: “Reflecting the World as They Saw It”
    2. Al Shifa: A Missed Opportunity
    3. Inside the CIA Red Cell: “I Wanted My Mind Stirred”
    4. Osama bin Laden’s Compound: From Zero to Fifty Percent
    5. Conclusion
  6. FOUR: ADVERSARIES: HOMELAND SECURITY RED TEAMING
    1. Pre-9/11 FAA Red Team: “A Substantial and Specific Danger to Public Safety”
    2. How to Shoot Down a Plane: MANPADS-Vulnerability Assessments
    3. NYPD Tabletop Exercises: “Never Let the People Believe That They’ve Solved the Problem”
    4. Information Design Assurance Red Team (IDART): Making Red Teaming a Commodity Tool
    5. Conclusion
  7. FIVE: COMPETITORS: PRIVATE-SECTOR RED TEAMING
    1. Simulating Strategic Decision-Making: Business War-Gaming
    2. White-Hat Hackers and Hamster Wheels: Cyber Penetration Tests
    3. I Can Hear You (and Everyone Else) Now: Hacking Verizon
    4. Why Your Secure Building Isn’t: Physical Penetration Tests
    5. Conclusion
  8. SIX: MODESTY, MISIMPRESSIONS, AND THE FUTURE OF RED TEAMING
    1. Realistic Outcomes of Red Teaming
    2. Red-Teaming Misimpressions and Misuses
    3. Recommendations for Government Red Teams
    4. The Future of Red Teaming
  9. Acknowledgments
  10. Notes
  11. Index