Newsletter   Secure Checkout   View Cart (0 items)  
Search:    Welcome Guest! Save up to 30-40% on most items with our awesome everyday discounts!

Hacking a Terror Network: The Silent Threat of Covert Channels [Paperback]

Our Price $ 29.37  
Retail Value $ 41.95  
You Save $ 12.59  (30%)  
Item Number 265751  
Buy New $29.37
Out Of Stock!
Currently Out Of Stock
Currently unavailable...

Item description for Hacking a Terror Network: The Silent Threat of Covert Channels by Russ Rogers...

Could you find a hidden terrorist message in time to save innocent lives?

"Russ has done it again, a great story teller in person and from the printed page. The bad news is, this is not just another story, it is the cold frightening and exacting truth about the world that we now live in...everyday" --Chet Hosmer, CEO, WetStone Technologies, Inc.

  • Discover a hidden world of covert communications
  • Immerse yourself in the technology
  • Create your own hidden messages with over 100 included tools

In Hacking a Terror Network, Russ Rogers uses a fictional scenario to demonstrate how terrorists may use the Internet to coordinate and launch a new series of terrorist attacks. While the scenario may be fictitious, the techniques and technologies that Russ uses are drawn straight from the computer security world. It makes for a great read as well as provides a blueprint to the workings of covert channels. Most importantly, it describes how law enforcement agencies and intelligence organizations can detect, defend and destroy threats. This book is packed with real-life examples of how tools work, including screenshots and narrative tutorials. Both amateurs and seasoned security professionals will benefit from reading this book. --from the Foreword by Matthew G. Devost, President and CEO, Terrorism Research Center, Inc.

There is a plot underway to attack American interests...

A decade-old grudge against the West comes to fruition as a child follows the path of the father's hatred for America and vows to avenge a brother. The American dream is in danger and can be saved only through the diligence and imagination of one man. An American agent suspects a plot but needs to prove it in order to draw attention to the danger. But how are the terrorists communicating? He needs to break the code to stop the plot that could kill thousands of innocent people.

Promise Angels is dedicated to bringing you great books at great prices. Whether you read for entertainment, to learn, or for literacy - you will find what you want at!

Item Specifications...

Pages   448
Est. Packaging Dimensions:   Length: 9.13" Width: 6.85" Height: 1.18"
Weight:   1.5 lbs.
Binding  Softcover
Release Date   Jan 27, 2005
Publisher   Syngress
ISBN  1928994989  
ISBN13  9781928994985  

Availability  0 units.

More About Russ Rogers

Register your artisan biography and upload your photo! Rogers is the President of Security Horizons, Inc. Russ holds a master's degree in Computer Systems Management from the University of Maryland.

Are You The Artisan or Author behind this product?
Improve our customers experience by registering for an Artisan Biography Center Homepage.

Product Categories

1Books > Subjects > Computers & Internet > Certification Central > General
2Books > Subjects > Computers & Internet > Digital Business & Culture > Hackers
3Books > Subjects > Computers & Internet > General

Reviews - What do customers think about Hacking a Terror Network: The Silent Threat of Covert Channels?

Terrible story, no plot, poorly researched  Sep 24, 2007
How to write a book and make money: Find the hot topic of the day - today's is terrorism, put in your own pet theory or idea about the topic - the author's is how terrorists can use steganography to communicate and finally write a lot of fluff to combine the two. The author has written a poor story, thrown in liberal screenshots and lengthy explanation of how they work.

The author knows enough about steganography but know little about the terrorists and their culture. Of course, today any fool can sell a book about "terrorism" and most do.
Pathetic nonsense  Sep 19, 2006
I am quite familiar with steganography. This book is just a nonsense.
Maybe, the fictional story could be worth of it, but how pathetic. She plans it all in detail. Then suddenly, she turns herself in to authorities, but does not get an idea to keep in contact with co-conspirators to help stop them.
Interesting and Provocative Story  Feb 17, 2006
"Hacking a Terror Network" tells a convincing tale of Cyber Terrorism. This fictional story uses communication technology readily available today to spin a fascinating tale a potential scenarios for any criminal element and easy enough for the novice computer user. By combining emotional motivation and computer savvy, terrorist threats press US counterterrorism teams to keep ahead of electronic means of causing death and destruction.
The only thing missing are sidebars describing instructional exercises for the reader to try out these easily used technologies.
The reader might enjoy supplementing this book with another Syngress book, Zero-Day Exploit, to continue reading cyber terrorism scenarios.
The author talks about applications to use and you don't even have to google them on the internet. They're included on the accompanying CD. Additionally, Syngress gives you 4 free e-booklets online.
Good intro to stenography and its uses.  Dec 6, 2005
I found this book to be interesting both as a fiction and technical material. The plot develops around a very hot topic of these days - the war on terrorism. Unlike your "conventional" terrorists, the characters in this book use Internet and computer technology to secretly plan and launch an attack against the US.

The tools discussed in this book were new to me, although I've heard of something similar in the past. I found it difficult at times to adjust to this interesting combination of suspense fiction and the technical explanations of how certain tools work. However, overall information obtained is quite useful and encouraged me to further research the topic of "covert channels" and stenography. Besides a few grammar errors and typos that were missed by the editors, this is a good introduction to stenography, especially for computer enthusiasts and professionals. If you are looking for a page turner fiction novel you may want to look somewhere else.
On The Internet They Won't Know You Are a Dog  Jul 17, 2005
There are some important topics in cyber-security that are very important, but may not require an entire book to cover in detail. When it comes to online communication using "covert channels" and "stegenography", Syngress does what is excels at: they cover the topic in the context of a fictionalized narrative to give it a "real world" context. While not as excellent as some of their other efforts in this genre, Syngress still does a good, but not perfect, job with Hacking a Terror Network: The Silent Threat of Covert Channels (364 pages , SYNGRESS, 2005, ISBN 1-928994-98-9).

The context of this book is a revenge-motivated terrorist attack, borne out of the first Gulf War, against targets on the United States. Some might question how realistic the scenario is or is not, but the book weaves a story which may ring all too true today. The threat of terrorism is real, and it could/would be too easy for people with evil purposes to use covert channels to plan and coordinate an attack.

Without giving away a surprising plot twist, it is hard to envision how the scenario lain out in this book could be realistic, but then again no one on the streets envisioned 9-11 or the recent bombings in London either. What Rogers does in this book is effectively explain the different types of covert channels that can be used, tools that are readily available to use the channels, and tools that are available to detect their use. He also demonstrates that how, without a stroke of luck, it may be virtually impossible to detect the use of these channels.

The book is not written as tautly as it could be and at times you might want to say "Just get to the point!". And there are some items in the book, such as the presence of an Internet Cafe in Iraq in 1991, that require as they say in Hollywood, the "willful suspension of disbelief". Put these things aside and you will learn some new things and technologies you may not have known about before.

The bottom line is that without luck, nobody on the Internet will know you are a dog.

The Scorecard

Par on an Average Par 4

Write your own review about Hacking a Terror Network: The Silent Threat of Covert Channels

Ask A Question or Provide Feedback regarding Hacking a Terror Network: The Silent Threat of Covert Channels

Item Feedback and Product Questions
For immediate assistance call 888.395.0572 during the hours of 10am thru 8pm EST Monday thru Friday and a customer care representative will be happy to help you!

Help us continuously improve our service by reporting your feedback or questions below:

I have a question regarding this product
The information above is incorrect or conflicting
The page has misspellings or incorrect grammar
The page did not load correctly in my browser or created an error.

Email Address:
Anti Spam Question. To combat spammers we require that you answer a simple question.
What color is the sky?
Leave This Blank :
Do Not Change This Text :

Add This Product Widget To Your Website

Looking to add this information to your own website? Then use our Product Widget to allow you to display product information in a frame that is 120 pixels wide by 240 pixels high.

    Copy and paste the following HTML into your website and enjoy!

Order toll-free weekdays 10am thru 10pm EST by phone: 1-888-395-0572 (Lines are closed on holidays & weekends.)
Customer Service | My Account | Track My Orders | Return Policy | Request Free Catalog | Email Newsletter

Gift Certificates
RSS Feeds
About Us
Contact Us
Terms Of Use
Privacy Policy