Reverse Deception

{{Short description|2012 book by Sean Bodmer, Max Kilger, Gregory Carpenter and Jade Jones}}

{{Multiple issues|

{{advert|date=August 2017}}

{{notability|Books|date=August 2017}}

}}

{{Infobox book|

| name = Reverse Deception: Organized Cyber Threat Counter-Exploitation

| title_orig =

| translator =

| image = Reverse Deception.jpg

| caption =

| author = Sean Bodmer
Max Kilger
Gregory Carpenter
Jade Jones

| cover_artist =

| country = United States

| language = English

| genre = Cyber Security, Deception, Counter Deception, Threat Intelligence

| publisher = McGraw-Hill Publishers

| release_date = 24 July 2012{{cite web |url=http://www.barnesandnoble.com/w/reverse-deception-organized-cyber-threat-counter-exploitation-sean-bodmer/1118727859 |title=Reverse Deception Organized Cyber Threat Counter-Exploitation teaches you to debunk, pursue, and charge cyber attackers |last= |first= |date= |website=Barnesandnoble.com |access-date=31 October 2016}}

| media_type = Paperback{{cite web |url=http://www.goodreads.com/book/show/13654753-reverse-deception |title=Identify, analyze, and block APTs |last= |first= |date= |website=Barnesandnoble.com |access-date=31 October 2016}}

| pages = 464 pp

| isbn = 978-0071772495

}}

Reverse Deception: Organized Cyber Threat Counter-Exploitation is a book by Sean Bodmer, Max Kilger, Gregory Carpenter, and Jade Jones. It investigates methods and criteria to address organizational responses to Advanced Persistent Threats{{cite web |url=https://www.helpnetsecurity.com/2012/07/12/reverse-deception-organized-cyber-threat-counter-exploitation/ |title=The intricate guide of detecting malicious code and decode the types of enemies they originate from|last= |first= |date=12 July 2012 |website= helpnetsecurity.com |access-date=31 October 2016}} and cyber deception.{{cite web|title=IEEE Book Reviews |url= https://www.ieee-security.org/Cipher/BookReviews/2013/Bodmer_by_austin.html|accessdate=6 May 2019}} It details how to identify APTs and prioritize actions by applying skilled, field-tested private and government sector processes and methods, which often involve cyber deception.

Content

The book reviews the most historical and significant malware: Titan Rain, Moonlight Maze, Stakkato, and Stuxnet are reviewed in light of APT criteria. The exploits of Stuxnet and these major cyber events are reviewed from an operational aspect. These exploits were complex and expensive because the development of APT is resource-intensive. It is most often believed to be sponsored by a government, in essence conducting an offensive action. In some countries, this can be a crime, while others consider it an aggressive defensive technique.

The work contains four stories regarding deception and counter-deception. These are explained to be fictionalized works based on actual events that occurred somewhere in the law enforcement and intelligence worlds, but there is no way of vetting this, and it is not clear if these works are rooted in US domestic or international work. The cases are varied and considered compelling by{{cite web|title= MrKoot Blog |url= https://blog.cyberwar.nl/2012/08/reading-notes-reverse-deception-organized-cyber-threat-counter-exploitation-bodmer-kilger-carpenter-and-jones-2012/}} noted cybercritics and reviewers of this work.

The authors introduce the first theory for classifying a threat on the opportunistic-APT continuum as either persistent or non-persistent. The APT classifications and criteria are now widely used in the industry and are built on an evaluation of the following criteria:{{cite web|url=https://books.slashdot.org/story/12/11/12/1335222/book-review-reverse-deception|title=Ben Rothke Slashdot|accessdate=8 May 2019}}{{cite web|title= Matthijs R. Koot |url= http://www.infosecisland.com/blogview/22206-Reverse-Deception-Organized-Cyber-Threat-Counter-Exploitation.html|accessdate=5 May 2019}}

APT CRITERIA{{cite web|title= Reverse Deception |url=https://www.mheducation.com/highered/product/reverse-deception-organized-cyber-threat-counter-exploitation-bodmer-kilger/9780071772495.html}}

  • Objectives
  • Timeliness
  • Resources
  • Risk tolerance (by the adversary)
  • Skills and methods
  • Actions
  • Attack origination points
  • Numbers involved in the attack
  • Knowledge source
  • Threat Intelligence
  • Analysis of cyber espionage tactics contrasted with types of permissible countermeasures
  • How to use deception and disinformation campaigns
  • Case studies and real stories from the authors’ FBI, DOD, NSA, and private sector work.
  • Value Chain Management
  • Counter espionage and espionage
  • Legal interpretations of capacities, limitations, and stipulations for assisting law enforcement investigations.

References

{{reflist}}