| From a counterterrorism perspective, discovering terrorist communication networks and methods is extremely important.Terrorists have demonstrated the capability to exchange messages that vary from archaic (using human couriers) to technologically advanced using “virtual dead-drops.”The popular press is full of stories regarding terrorists communicating using networks like the Internet, and there is practical evidence to support the stories that have been discovered on terrorists’ desktops and laptops from the U.S. to Europe to Pakistan and Afghanistan.
The Internet provides a viable and varied communication forum for terrorists, and the global distributed nature of the Internet makes attribution nearly impossible in many cases.We know that after he was profiled from his first flight, the shoe bomber is alleged to have sent e-mail to superiors asking if he should continue with his attack.We know that bin Laden himself used satellite phones for communication and drafted e-mail messages to coordinate activities with remote cells or to handle administrative matters within Al Qaeda.We know that terrorists have demonstrated an ability to adapt, and it is safe to assume that their communication capabilities will also adapt, enabling them to communicate more securely.
In Hacking a Terror Network, Russ Rogers uses a fictional scenario to demonstrate how terrorists may use the Internet to coordinate and launch a new series of terrorist attacks.While the scenario may be fictitious, the techniques and technologies that Russ uses are drawn straight from the computer security world, making this not only an interesting literary read but also a technical manual on how covert channels work and how law enforcement and intelligence organizations can go about discovering and defeating them.This book is packed with real-life examples of how tools work, including screenshots and narrative tutorials. Both amateurs and seasoned security professionals will benefit from reading this book.
Russ’s experience within the U.S. Defense Department, as part of the intelligence community, and as an expert in the computer security industry uniquely positions him to make this an interesting and technically viable read. I’ve often enjoyed my conversations with Russ on a variety of topics at Black Hat and other security industry conferences. He is known for having his finger on the pulse of the industry and for being able to identify trends and emerging issues.The story entertained me, and as a security expert, I can honestly say I learned something from reading this book. |