suppose one might be able to make a case that this
book is about
computer espionage, but the contents are hardly secret.
The fact that
the introduction is decidedly vague about the audience--anyone
concerned that someone might want to spy on their data--would
to suspect that this is another attempt to jump on a
without necessarily doing a lot of research first. And,
in this case,
one would be right.
addition, this is, once again, a book about defence
more help to the attacker. Not much more, mind, but more.
countermeasures included after the attacks and penetration
are generally vague and not very useful. In quite a number
the protections are irrelevant to the attacks described.
one tells us about spies, and particularly that spies
purposeful. Never mind that the best data that researchers
able to find points out that most network snooping and
computer equipment is random: the concentration on professional
allows the author to present a much more sensational
overview of US federal laws, in chapter two, is rather
short on any
examination of legal concepts. The penetration activities
in chapter three are mostly physical, and even the computer
suggested in chapter four require physical access to
About all that chapter five tells you about searching
for evidence, is
that you stand a better chance of finding it if you know
machine works. I suppose this material might impress
those who know
very little about computers, but most of it is pretty
doesn't have enough detail to help newcomers, either
information or protect themselves.
six briefly describes some means of cracking weak encryption.
A list of data storage devices is presented in chapter
Keyloggers, both hardware and software, are outlined
in chapter eight.
Chapter nine primarily concentrates on remote access
it makes no distinctions in regard to other types. Network
in chapter ten, has countermeasures that are, unusually,
specific, dealing with particular exploits while not
concepts. Again, the countermeasures are not comprehensive
to the threats that are discussed. The overview of wireless
in chapter eleven, is not bad, with decent research and
presentation for a general audience. Chapter twelve reviews
devices, such as secure telephones. Government surveillance
chapter thirteen, are described well, and the text even
mention of the various controversies, although without
the strident and sensational tone of this book, is
anything really wrong with it? Well, I suppose not, but
anything right with it, either. It is not a book about
general, nor even privacy in particular. The protection
suggested are generally only suitable for a computer
neophyte, but the
book does not provide adequate instruction for those
users to apply
the suggestions. As noted, the book is somewhat more
those trying to break into computers, but only somewhat:
this is not
exactly a guide for computer forensic analysts.
copyright Robert M. Slade, 2003 BKSCCMES.RVW 20030902