• Complain

Michael A. VanPutte - Walking Wounded: Inside the U.S. Cyberwar Machine

Here you can read online Michael A. VanPutte - Walking Wounded: Inside the U.S. Cyberwar Machine full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2016, publisher: CreateSpace, genre: Politics. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Michael A. VanPutte Walking Wounded: Inside the U.S. Cyberwar Machine
  • Book:
    Walking Wounded: Inside the U.S. Cyberwar Machine
  • Author:
  • Publisher:
    CreateSpace
  • Genre:
  • Year:
    2016
  • Rating:
    3 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 60
    • 1
    • 2
    • 3
    • 4
    • 5

Walking Wounded: Inside the U.S. Cyberwar Machine: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Walking Wounded: Inside the U.S. Cyberwar Machine" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Forget everything you know about crime, war and espionage in cyberspace. Walking Wounded takes the layman to seasoned professional on an insiders journey through the secret history, technologies, and strategies surrounding war and espionage in cyberspace. Walking Wounded is not another hacking book. It takes the reader behind the scenes and recounts the story of the Pentagons love affair with technology, and how this reliance makes them vulnerable to hackers. It explains how foreign intelligence services, criminals, and amateur hackers have compromised our sensitive systems for three decades, while our government hackers are running rampant through foreign information systems. And it explains how our national policies have made us all less secure. Walking Wounded gives the reader the tools to get beyond the hype, mythologies, and marketing and understand what President Obama called, The most serious threat to out national security.Foreword by Peiter Mudge Zatko

Michael A. VanPutte: author's other books


Who wrote Walking Wounded: Inside the U.S. Cyberwar Machine? Find out the surname, the name of the author of the book and a list of all author's works by series.

Walking Wounded: Inside the U.S. Cyberwar Machine — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Walking Wounded: Inside the U.S. Cyberwar Machine" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make

Walking Wounded

Inside the U.S. Cyberwar Machine

Michael A. VanPutte, Ph.D.

Lieutenant Colonel, U.S. Army (retired)

The offices of the Secretary of Defense, Director of National Intelligence, and Secretary of Homeland Security reviewed this manuscript to ensure it did not contain any classified or sensitive Government information and have no security objections to its publication. The redactions throughout this book are information these government agencies censored without explanation. This review, however, should not be construed as an endorsement of the authors views.

I appreciate your suggestions, comments, and criticisms. You can reach me at or my website at
www.mvanputte.com.

Copyright 2016 Michael A. VanPutte

All rights reserved.

ISBN-13: 978-1539945611

ISBN-10: 1539945618

Dedication

To three ladies: Linda, Ashley, and Brianne.

Contents

List of Illustrations

Foreword

Want to learn how to pick a lock?

What was your initial reaction to that question? How would you feel about a lesson on how to hi-jack communications, guess peoples passwords, and exploit computer software?

Initial reactions to these questions almost invariably fall into one of two categories. Some people react with curiosity: Oh! I always wondered how that worked. Other people assume the person asking these questions is a criminal, or at least up to no good. They dont want to learn the skills or even understand how the systems they manipulate work, because only criminals would be interested in how to pick a lock, and these people being asked this question are obviously upstanding citizens right?

It isnt inherently wrong to know (or want to learn) how to pick a lock. After all, this is a technology you use and depend upon every day, so wanting to understand it better is reasonable. Unfortunately, the people who respond as described in the second group are falling into the trap of labeling some kinds of knowledge as bad.

The lock picking questions and skills alone have no intent or morality associated with them. Allowing preconceived notions regarding intent or morality to prevent learning can make it very difficult to make informed decisions later. Buying a lock for your gym locker, home, or bike? Knowing how locks work, their shortcomings, and the different classes of lock types, with their varying benefits and limitations, can come in pretty handy.

I wish I could tell you that most people fall in to the first category and that everyone is open to learning new things. Sadly, its more common for people to allow their stereotypes and assumptions regarding intent and morality to keep them from learning about the world around them. This second, less curious category of student is unsurprisingly somewhat prevalent in the U.S. Government and military complex. After all, people in the government or military are busy people with lots of important decisions to make, and being willing to question their assumptions takes time. Of course, when it comes to matters of security, a total unwillingness to take in new data that challenges your point of view can lead to disaster. Being able and willing to re-evaluate assumptions is important to strong decision-making skills.

###

Today Im going to show everyone how to pick locks, remotely compromise a computer, crash an unknown software application, and Im going to show you how to guess the passwords of everyone else in this room. These were probably pretty close to the first words that Mike VanPutte, then a Captain in the Army Corps of Engineers, heard from me in 1999 at the Army War College in Carlisle PA. A year later he would hear more things like this, again from me, in front of a group of officers at the Naval Postgraduate School in Monterey CA.

I wanted to teach these future government and military leaders how to be hackers.

To many people, the word hacker has strong criminal connotations. A hacker to them is some geeky, gangly teenager in his parents basement trolling people, breaking into corporate computers, and generally trying to cause global thermo-nuclear war. This is a misconception and a perversion of the original definition of a hacker. A hacker is simply a person who can take a system, be it complex or simple, and figure out how to make that system do things it had not been intended to do by the people who built it or by the people who normally make use of it. Hacking can happen in all types of domains from the arts to the hard sciences. Tinkerer, explorer, maker, experimenter, and inventor: these are all synonyms for hacker, as I use the term. Unfortunately, to many, the synonym for hacker is criminal.

The immediate, short-term goal of lecturing these classes was to teach young officers in the Department of Defense (DoD) some core skills of computer security hacking and how to critically examine assumptions about software and systems. We covered how to pick locks and how to exploit buffer overflows, race conditions, information leaks and object re-use. The more important longer term strategic goal, however, was to identify true hackers within the DoD, encourage them, and hope they would take the hacker way of looking at problems with them into more and more significant leadership positions in the United States Government: Influence them positively early in their career and hope for the ripples of change to become waves years later. This is where Mike VanPutte comes in. While Mike has been kind enough to credit me and a few others for being the ones to open his eyes so he could see how a hacker sees the world, think how a hacker thinks, the fact is Mike was already a hacker. He just did not know it yet.

Mike was one of the (few) people at the time who took in the new information without prejudice. In fact, thats an understatement. Mike ravenously consumed the new information and was very enamored with the different thought processes that allowed him to look at new problem sets, new technologies, and new situations and see them differently from his peers.

I kept bumping in to Mike as he progressed through the ranks over the years from Captain, to Major, to ultimately a Lieutenant Colonel (then retired) and fellow Program Manager at DARPA.

Mike was early to the game of full spectrum Computer Network Operations (CNO), a Department of Defense term that is commonly used to cover all aspects of DoD cyber, not just defense. Luckily he had figured out that the more data he took in, without prejudice, the more novel conclusions and solutions he could achieve later. The key to a great strategy is to have multiple options, is how I have lived my professional life. Mike has made use of this strategy as well.

Even people who may think that they excel in challenging assumptions and thinking critically usually have a significant blind spot. Most blind spots stem from the fact that its easy to challenge assumptions that other people make, but it can be downright frightening to challenge your own beliefs when new information comes to light. People of all walks of life and intelligence level can fall into this trap.

Mike spent a lot of his professional life in the U.S. military, both as a soldier and a civilian. This is an institution that rewards, even requires conformity and homogeneity. Free thinking, exploratory tinkering, hypothesis challenging, and other characteristics that I looked for in the people I trained were not typically the most rewarded traits in the DoD. Being in this environment most likely impeded some of Mikes ability to explore and critique, but the fact that Mike not only survived, but flourished, implies that the attributes Im describing were more of an asset than liability.

Both Mike and myself have both been honored with the highest medal that can be bestowed by the Office of the Secretary of Defense upon a civilian. We are very different people; one of us comes from a long military career followed by civilian service, the other a long haired liberal-leaning hacker. What we have in common is that we fall into the first category of people: curious, open to taking in new data, and trying to never ascribe intent or morality to context-less information.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Walking Wounded: Inside the U.S. Cyberwar Machine»

Look at similar books to Walking Wounded: Inside the U.S. Cyberwar Machine. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Walking Wounded: Inside the U.S. Cyberwar Machine»

Discussion, reviews of the book Walking Wounded: Inside the U.S. Cyberwar Machine and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.