Synopses & Reviews
This book begins by laying out a history of espionage that clearly shows that when a new technology or technique becomes available to the information gatherers in public and private sectors, they can quickly be adopted for Netspionage use. It then moves on to describe how the Internet and associated technologies have already revolutionized the collection and analysis of competitive information. The convergence of dependency on networked and exploitation tools (often propagated by "hackers," "cyberpunks," and even intelligence agencies) has already resulted in several incidents that foreshadow the perilous future. Close study of these incidents demonstrates how difficult yet how important it is to confront the challenges of "netspionage" and its less intrusive cousins. The authors present a set of the known incidents and then outline protective measures that will reduce the potential and consequences of netspionage.
Unlike most security books, this one is written for managers and executives in non-protection roles of the organization, since they are the ones who must take a leadership role in safeguarding the information assets of the networked enterprise.
*Practical guide written from front-line experience
*Explains the evolution of information collection and why it has never been easier
*Highlights the tools of the trade and how they can be put to best use
Review
h have been around a long time and have been to many places and done a number of things. I'm glad they've chosen to write books such as this, thereby helping us to understand the risks that we have to live with daily in the computer and Internet world - Info Security News
Review
with daily in the computer and Internet world - Info Security News
Review
that we have to live with daily in the computer and Internet world - Info Security News
Review
he book is smooth and informative. The book is worth reading. - Info Security News
Netspionage makes fascinating reading. It also has a lot to offer in the facts and experience departments. Boni and Kovacich have been around a long time and have been to many places and done a number of things. I'm glad they've chosen to write books such as this, thereby helping us to understand the risks that we have to live with daily in the computer and Internet world - Info Security News
Review
vernment, or personal information security in this age of cyberspace hackers, terrorists, and espionage, Netspionage is a very practical and experience-based guide to the evolution of information collection and how to best protect and secure information from unwarranted and criminal attempts to access and corrupt corporate records, databases, projects, and trade secrets. - Midwest Book Review
Bill Boni and his co-author have been writing together for years and it shows. The book is smooth and informative. The book is worth reading. - Info Security News
Netspionage makes fascinating reading. It also has a lot to offer in the facts and experience departments. Boni and Kovacich have been around a long time and have been to many places and done a number of things. I'm glad they've chosen to write books such as this, thereby helping us to understand the risks that we have to live with daily in the computer and Internet world - Info Security News
Review
This is a very well prepared and argumented book.
-Information Security Bulletin
This book is sober, well researched and well written. The authors completely avoid the sensationalism that is almost a trademark when it comes to media treatment of cyber-crime - and they must be forgiven for riding their political hobby-horses here and there, after all, facts should be presented so as to engender debate. -Information Security Bulletin
Highly recommended -please read it, give it to your boss and your MP! -Information Security Bulletin
Well-researched and detailed, the book is highly readable, and it will hold the attention of everyone from the professional security manager and the corporate executive to the casual reader. The information, sources, and statistics in this book are invaluable to any security manager who needs to sell management on the need for and process of protecting electronic assets, digital intellectual property, and proprietary information. -Security Management
In Netspionage: The Global Threat To Information, William Boni and Gerald Kovacich draw upon their many years of professional experience in corporate security and intelligence to describe and address Internet-based threats to information security. Very highly recommended, essential reading for anyone charged with corporate, government, or personal information security in this age of cyberspace hackers, terrorists, and espionage, Netspionage is a very practical and experience-based guide to the evolution of information collection and how to best protect and secure information from unwarranted and criminal attempts to access and corrupt corporate records, databases, projects, and trade secrets. - Midwest Book Review
Bill Boni and his co-author have been writing together for years and it shows. The book is smooth and informative. The book is worth reading. - Info Security News
Netspionage makes fascinating reading. It also has a lot to offer in the facts and experience departments. Boni and Kovacich have been around a long time and have been to many places and done a number of things. I'm glad they've chosen to write books such as this, thereby helping us to understand the risks that we have to live with daily in the computer and Internet world - Info Security News
Synopsis
This book begins by laying out a history of espionage that clearly shows that when a new technology or technique becomes available to the information gatherers in public and private sectors, they can quickly be adopted for Netspionage use. It then moves on to describe how the Internet and associated technologies have already revolutionized the collection and analysis of competitive information. The convergence of dependency on networked and exploitation tools (often propagated by "hackers," "cyberpunks," and even intelligence agencies) has already resulted in several incidents that foreshadow the perilous future. Close study of these incidents demonstrates how difficult yet how important it is to confront the challenges of "netspionage" and its less intrusive cousins. The authors present a set of the known incidents and then outline protective measures that will reduce the potential and consequences of netspionage.
Unlike most security books, this one is written for managers and executives in non-protection roles of the organization, since they are the ones who must take a leadership role in safeguarding the information assets of the networked enterprise.
*Practical guide written from front-line experience
*Explains the evolution of information collection and why it has never been easier
*Highlights the tools of the trade and how they can be put to best use
About the Author
Dr. Kovacich has over 40 years of security, criminal and civil investigations, anti-fraud, information warfare, and information systems security experience in both government as a special agent and as a manager in international corporations. Dr. Kovacich currently resides on an island in Washington state where he continues to write, lecture and conduct research relative to information systems security, information warfare defensive and offensive operations, high-technology crime and techno-terrorism.
Certified Fraud Examiner, Certified Protection Professional, and Certified Information Systems Security Professional, Washington, USA
Table of Contents
How Did We Get Here: Introduction to the New Old World; The Driving Force: High Technology; The Internet; The Global I-Way to Netspionage and Techno-Crime; The Global Business and Government Revolutions; A Short History of Espionage: Industrial, Economic, and Military; Who Does What to Whom and How: Competitive Intelligence and the Networked World; Information Collection in the Gray Zone; The Black Zone, Who Uses Netspionage, How and Why; Case Studies in Netspionage; Protecting What You Have from Those Who Want It: Defending Against Netspionage; Operational Security and Risk Management Techniques to Mitigate the Netspionage Threat; The Best Defense May Really Be a Good Offense and Other Issues; Based on Where We Have Been and Where We Are Now, Where Are We Going?: Future of Technology; Business, Crime, and Security in the 21st Century Global Marketplace; Future Netspionage; Business and Government Agencies - Shared Responsibilities; Epilog: We're All In This Together