Counterintelligence in a Cyber World

This book provides an outline of the major challenges and methodologies for applying classic counterintelligence theory into the cybersecurity domain. This book also covers operational security approaches to cyber, alongside detailed descriptions of contemporary cybersecurity threats, in the context...

Full description

Bibliographic Details
Main Author: Watters, Paul A.
Format: eBook
Language:English
Published: Cham Springer International Publishing 2023, 2023
Edition:1st ed. 2023
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 03075nmm a2200313 u 4500
001 EB002168234
003 EBX01000000000000001305566
005 00000000000000.0
007 cr|||||||||||||||||||||
008 230704 ||| eng
020 |a 9783031352874 
100 1 |a Watters, Paul A. 
245 0 0 |a Counterintelligence in a Cyber World  |h Elektronische Ressource  |c by Paul A. Watters 
250 |a 1st ed. 2023 
260 |a Cham  |b Springer International Publishing  |c 2023, 2023 
300 |a XIX, 145 p  |b online resource 
505 0 |a Chapter. 1. Counterintelligence Theory -- Chapter. 2. The Cyber Operational Environment -- Chapter. 3. Cyber Threats (and Opportunities) -- Chapter. 4. Psychology and Criminal Profiling -- Chapter. 5. Counterespionage -- Chapter. 6. Technical Surveillance -- Chapter. 7. Physical Surveillance -- Chapter. 8. Data Analysis -- Chapter. 9. Attack Attribution -- Chapter. 10. Practical Deception -- Chapter. 11. Legal Issues in Cyber Counterintelligence -- Chapter. 12. Ethical Issues in Cyber Counterintelligence 
653 |a Mobile and Network Security 
653 |a International Security Studies 
653 |a Computer crimes 
653 |a Cybercrime 
653 |a Computer networks—Security measures 
653 |a Security, International 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
028 5 0 |a 10.1007/978-3-031-35287-4 
856 4 0 |u https://doi.org/10.1007/978-3-031-35287-4?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 005.8 
520 |a This book provides an outline of the major challenges and methodologies for applying classic counterintelligence theory into the cybersecurity domain. This book also covers operational security approaches to cyber, alongside detailed descriptions of contemporary cybersecurity threats, in the context of psychological and criminal profiling of cybercriminals. Following an analysis of the plethora of counterespionage techniques that can be mapped to the cyber realm, the mechanics of undertaking technical surveillance are reviewed. A range of approaches to web and forum surveillance are outlined as a virtual addition to traditional video and audio surveillance captured regarding targets. This includes a description of the advances in Artificial Intelligence, predictive analysis, support for the disciplines of digital forensics, behavioural analysis and Open Source Intelligence (OSINT). The rise of disinformation and misinformation and the veracity of widespread false flag claims are discussed at length, within the broader context of legal and ethical issues in cyber counterintelligence. This book is designed for professionals working in the intelligence, law enforcement or cybersecurity domains to further explore and examine the contemporary intersection of these disciplines. Students studying cybersecurity, justice, law, intelligence, criminology or related fields may also find the book useful as a reference volume, while instructors could utilise the whole volume or individual chapters as a secondary textbook or required reading