2017 Prediction: cyber clouds with chance of pain: threats, invasions, cyber wars and you!

cyber_security_roundup

cyber_security_roundup
Unfortunately this edition has to be way beyond 60-seconds. I’m in the second reading of Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It, actually I’m listening to the Audible version, and just ordered the print version. This could possibly be the most important book of the decade and I urge anyone reading this to get a copy and study it.
      Many of you already know that I’ve been involved in tracking cyber activities since the late 1980s. I have not been digging into the intracies of how it works or the background — but rather about discovery, tracking and reporting. I’ve been a highly active Spamcop user/agent, and active participating Knujon user and evangelist. As a reporter for UGNN and Safenetting, I’ve have closely followed the threats arriving in the mailbox and on the web, as well as tracking and discovering where the threats are coming from, who could be behind them, and the owners/publishers of the sites and internet resources they use. What we’ve learned over the past decade is that following the money trail is not necessarily the thread to chase. Since the late 1990s, cyber crime and cyber intrusion has taken on another level of divisiveness for religious, political and societal gain.

If you read (or listen to) Future Crimes you will begin to understand what the security community has been preaching about for over three decades. Add these references to your reading list, and you’ll see the rest of the iceberg that is the cyber world:

  • Tor and The Dark Net: Remain Anonymous and Evade NSA Spying
  • @War: The Rise of the Military-Internet Complex Paperback
  • Cybersecurity and Cyberwar: What Everyone Needs to Know®
  • Data and Goliath: The Hidden Battles to Collect Your Data
  • The Dark Net: Inside the Digital Underworld
  • Cybersecurity for Beginners
  • How to Access the Deep Web

cyber_security_roundup

today's cyber threatscyber_security_roundup
Unfortunately this edition has to be way beyond 60-seconds. I’m in the second reading of Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It, actually I’m listening to the Audible version, and just ordered the print version. This could possibly be the most important book of the decade and I urge anyone reading this to get a copy and study it.
      Many of you already know that I’ve been involved in tracking cyber activities since the late 1980s. I have not been digging into the intracies of how it works or the background — but rather about discovery, tracking and reporting. I’ve been a highly active Spamcop user/agent, and active participating Knujon user and evangelist. As a reporter for UGNN and Safenetting, I’ve have closely followed the threats arriving in the mailbox and on the web, as well as tracking and discovering where the threats are coming from, who could be behind them, and the owners/publishers of the sites and internet resources they use. What we’ve learned over the past decade is that following the money trail is not necessarily the thread to chase. Since the late 1990s, cyber crime and cyber intrusion has taken on another level of divisiveness for religious, political and societal gain.

If you read (or listen to) Future Crimes you will begin to understand what the security community has been preaching about for over three decades. Add these references to your reading list, and you’ll see the rest of the iceberg that is the cyber world:

  • Tor and The Dark Net: Remain Anonymous and Evade NSA Spying
  • @War: The Rise of the Military-Internet Complex Paperback
  • Cybersecurity and Cyberwar: What Everyone Needs to Know®
  • Data and Goliath: The Hidden Battles to Collect Your Data
  • The Dark Net: Inside the Digital Underworld
  • Cybersecurity for Beginners
  • How to Access the Deep Web

Tor and The Dark Net: Remain Anonymous and Evade NSA Spying

cyber war and cyber futures Are You Tired of All The Spying and Lack of Privacy on The Internet? Keep Reading to Learn The Secrets to Staying Anonymous
      So many people take their privacy on the internet for granted. Some may know and choose to ignore the fact, but every single thing you do online is being tracked and guess what? For better or for worse it is there forever. Knowing when and how to remain anonymous is very important. Many people already realize this but have no clue where to start. This book has step by step instructions and techniques involving Tor, VPN’s, Proxies, and more that will take you to the deepest levels of anonymity in which not even the all seeing NSA will be able to track you.
from SafeNetting.com Tor and The Dark Net: Remain Anonymous and Evade NSA Spying Paperback – by James Smith

cyber war and cyber futures@War: The Rise of the Military-Internet Complex Paperback

Christian Science Monitor says

Quoting  begins Unsettling . . . A deeply informative account of how corporations, governments, and even individuals are rapidly perfecting the ability to monitor and sabotage the Internet infrastructure. Quoting  ends

The wars of the future are already being fought today. The United States military currently views cyberspace as the “fifth domain” of warfare (alongside land, air, sea, and space), and the Department of Defense*, the National Security Agency*, and the CIA* all field teams of hackers who can, and do, launch computer virus strikes against enemy targets. As recent revelations have shown, government agencies are joining with tech giants like Google and Facebook to collect vast amounts of information, and the military has also formed a new alliance with tech and finance companies to patrol cyberspace.
      Shane Harris offers a deeper glimpse into this partnership than we have ever seen before, and he explains what the new cyber security regime means for all of us who spend our daily lives bound to the Internet—and are vulnerable to its dangers.

from SafeNetting.com Rise of the Military-Internet Complex Paperback by Shane Harris

The Dark Net: Inside the Digital Underworldcyber war and cyber futures

Beyond the familiar online world that most of us inhabit—a world of Google, Facebook, and Twitter—lies a vast and often hidden network of sites, communities, and cultures where freedom is pushed to its limits, and where people can be anyone, or do anything, they want. This is the world of Bitcoin and Silk Road, of radicalism and pornography. This is the Dark Net.
      Rich with historical research and revelatory reporting, The Dark Net is an unprecedented, eye-opening look at a world that doesn’t want to be known.
from SafeNetting.com The Dark Net: Inside the Digital Underworld by Jamie Bartlett
preparing for the grid What is the Dark Web?

cyber war and cyber futuresCybersecurity for Beginners

This book provides an easy insight into the essentials of cybersecurity, even if you have a non-technical background. You may be a business person keen to understand this important subject area or an information security specialist looking to update your knowledge.
      ‘The world has changed more in the past 10 years than in any 10 year period in human history. . . Technology is no longer a peripheral servant, it shapes our daily lives. Companies that can use technology wisely and well are booming, companies that make bad or no technology choices collapse and disappear.
from SafeNetting.com Cybersecurity for Beginners Paperback by Raef Meeuwisse

Cybersecurity and Cyberwar: What Everyone Needs to Know

cyber war and cyber futures In Cybersecurity and CyberWar: What Everyone Needs to Know®, New York Times best-selling author P. W. Singer and noted cyber expert Allan Friedman team up to provide the kind of easy-to-read, yet deeply informative resource book that has been missing on this crucial issue of 21st century life.
      Written in a lively, accessible style, filled with engaging stories and illustrative anecdotes, the book is structured around the key question areas of cyberspace and its security: how it all works, why it all matters, and what can we do? Along the way, they take readers on a tour of the important (and entertaining) issues and characters of cybersecurity, from the “Anonymous” hacker group and the Stuxnet computer virus to the new cyber units of the Chinese and U.S. militaries. Cybersecurity and CyberWar: What Everyone Needs to Know® is the definitive account on the subject for us all, which comes not a moment too soon. What Everyone Needs to Know® is a registered trademark of Oxford University Press.
from SafeNetting.com Cybersecurity and Cyberwar: What Everyone Needs to Know® 1st Edition by P.W. Singer
preparing for the grid NextWar: Trends Shaping the 21st Century (Cyber) Battlefield
GO How to Protect Yourself Online P.W. Singer, co-author of Cybersecurity and Cyberwar: What Everyone Needs to Know, on what we can do to protect ourselves online.

cyber war and cyber futures Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World ~ Bruce Schneier

Your cell phone provider tracks your location and knows who’s with you. Your online and in-store purchasing patterns are recorded, and reveal if you’re unemployed, sick, or pregnant. Your e-mails and texts expose your intimate and casual friends. Google knows what you’re thinking because it saves your private searches. Facebook can determine your sexual orientation without you ever mentioning it.
      But have we given up more than we’ve gained? In Data and Goliath, security expert Bruce Schneier offers another path, one that values both security and privacy. He brings his bestseller up-to-date with a new preface covering the latest developments, and then shows us exactly what we can do to reform government surveillance programs, shake up surveillance-based business models, and protect our individual privacy. You’ll never look at your phone, your computer, your credit cards, or even your car in the same way again.
from SafeNetting.com Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World ~ Bruce Schneier

the_dark_internet
How to Access the Deep Web

In this video I show you how to access the deep web/dark net on Windows, Mac and Linux by using the Tor Browser Bundle … by TOG.
GO Tor Browser Bundle
GO Deep Web Links
GO How to Access the Deep Web / The Dark Net 2016

Making matters worse

In today’s world, political pressure makes the situation much worse. We all watched Barack Obama mocked Mitt Romney’s position that Russia was a threat with the line, “The 80s want their foreign policy back” knowing it was not true. Now, Obama is blaming Russia for Hillary Clinton’s loss of the 2016 election to Donald Trump, saying all those embarrassing revelations about her came from a Russian hack — but then saying he wasn’t sure of that. The media is having a hey-day — when they are all out to lunch merely political posturing — to put it nicely. President Bill Clinton started the slippery slope by privatizing the DNS system, taking it out of the DOD control. Now, President Obama has turned the slippery slope into an avalanche by removing it from US oversight. It’s all downhill from here.

The amount of deceit, denial and diversion in the media and politics is beyond belief. To quote Marc Goodman in Future Crimes : “The public is incredibly ignorant!”. If you don’t want to be one of those of whom he speaks, and you would like to arm yourself against future crimes, then educate yourself. The reading list above is a good start.

… and, thanks for reading

Fred Showker

      Editor/Publisher : DTG Magazine
     
+FredShowker on Google+ or most social medias @Showker
      Published online since 1988

 


Don’t forget … we encourage you to share your discoveries with other readers:
GO Send an email to our editorial staff
GO Contribute your own article, or
GO Follow DTG on Facebook!

The original version of this article is located at https://graphic-design.com/wp-content/uploads/graphic-design.com/design-bookshelf/cyber_threats/index.html

Avoiding stalker and predator links online