[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[infowar.de] Buchbesprechung: "Information Warfare" von Michael Erbschloe
Aus dem neuen Risks Digest. RB
Date: Tue, 8 Oct 2002 12:42:20 -0800
From: Rob Slade <rslade -!
- sprint -
Subject: REVIEW: "Information Warfare", Michael Erbschloe
"Information Warfare", Michael Erbschloe, 2001, 0-07-213260-4, U$29.99
%A Michael Erbschloe
%C 300 Water Street, Whitby, Ontario L1N 9B6
%I McGraw-Hill Ryerson/Osborne
%O U$29.99 800-565-5758 905-430-5134 fax: 905-430-5020
%P 315 p.
%T "Information Warfare: How to Survive Cyber Attacks"
In both the preface and the introduction, the author makes a point of
stating that this book is different from others in the field, that it
not simply use the old military paradigm to analyze information warfare,
and, as a result, will be more useful to business. It is, therefore,
startling to find, in chapter one, background basics that stick strictly
the military model. Everything is presented purely from the perspective
single attacker and single defender, and it's definitely black hat
white. The model thus constructed is weak in several areas, and would
seem to be able to even address a number of issues. For example,
such as Dorothy Denning (cf. BKINWRSC.RVW) postulate the potential harm
can arise from corrupted data and other misinformation, which may be
for purposes ranging from propaganda to degrading decision systems. And
what do we do about business situations, where today's colleague may be
tomorrow's competitor? Chapter two uses profligate verbiage to list a
points about economic impacts that will come as no surprise whatsoever
anyone with the slightest background in business impact analysis. In
chapter three, Erbschloe turns to fiction. He proposes a scenario in
a gang of cyber-terrorists causes one trillion dollars worth of damage.
doing so, the author demonstrates that a) his experience in information
warfare is limited to viruses, b) his experience with viruses is limited
Loveletter, and c) he believes all the movie stereotypes about
Black hat communities are seldom as cosmopolitan as the one proposed.
are never as original: multiple viruses based on the model used would
quickly be caught by generic means. It is also a lot easier to write
virus variations than it is to break into specific targeted systems for
specific targeted information.
We are told, in chapter four, that in order to fight against the
warfare threat, all governments and militaries must get together. (Can
hear a chorus of "And do it my way!" swelling in the background?) Then
have a relay of military strategies in chapter five. Supposedly chapter
turns to corporate strategies, but with the emphasis on terrorists and
FBI, we seem to be back to the military again. A number of tables are
to assert that terrorists and rogue criminals are interested in
various industries. (Proof of these statements seems to be singularly
lacking.) Chapter eight lists companies proposed to be in the
warfare" reserve: able to provide expertise in the event of an attack.
light of the recent business debacles, these lists unintentionally
some of the most humorous reading in the book. (For those who know the
security problems of some of these companies, the lists are even
Tellingly, the material on the civilian "casualties" of infowar, in
nine, is the most restricted in the book. Chapter ten seems to move
fiction again. Erbschloe, without much in the way of evidence, says
the "geek in the basement" brigade is now about to turn pro, en masse.
also states that we are going to have a skilled and active black hat
population of 600,000 by 2005.) The statement, in chapter eleven, that
need more skilled law enforcement people is unsurprising, and also
unhelpful. The conclusion, in chapter twelve, that we need more money
attention for security is equally useless.
This is a verbose reiteration of minor points that are evident to anyone
with any background in security, let alone specialists in the
warfare field. Mind you, the book was probably not intended for
However, readers with no knowledge of data security are likely to be
They will feel that they have been taught about information warfare.
copyright Robert M. Slade, 2002 BKINFWFR.RVW 20020721
- vcn -
ca rslade -!
- sprint -
ca slade -!
- victoria -
ca p1 -!
- canada -
http://victoria.tc.ca/techrev or http://sun.soci.niu.edu/~rslade
Mail an infowar -
- infopeace -
de mit "unsubscribe" im Text.