Description

Book Synopsis

This book provides an outline of the major challenges and methodologies for applying classic counterintelligence theory into the cybersecurity domain. This book also covers operational security approaches to cyber, alongside detailed descriptions of contemporary cybersecurity threats, in the context of psychological and criminal profiling of cybercriminals. Following an analysis of the plethora of counterespionage techniques that can be mapped to the cyber realm, the mechanics of undertaking technical surveillance are reviewed.

A range of approaches to web and forum surveillance are outlined as a virtual addition to traditional video and audio surveillance captured regarding targets. This includes a description of the advances in Artificial Intelligence, predictive analysis, support for the disciplines of digital forensics, behavioural analysis and Open Source Intelligence (OSINT). The rise of disinformation and misinformation and the veracity of widespread false flag claims are discussed at length, within the broader context of legal and ethical issues in cyber counterintelligence.

This book is designed for professionals working in the intelligence, law enforcement or cybersecurity domains to further explore and examine the contemporary intersection of these disciplines. Students studying cybersecurity, justice, law, intelligence, criminology or related fields may also find the book useful as a reference volume, while instructors could utilise the whole volume or individual chapters as a secondary textbook or required reading.



Table of Contents
Chapter. 1. Counterintelligence TheoryChapter. 2. The Cyber Operational EnvironmentChapter. 3. Cyber Threats (and Opportunities)Chapter. 4. Psychology and Criminal ProfilingChapter. 5. CounterespionageChapter. 6. Technical SurveillanceChapter. 7. Physical SurveillanceChapter. 8. Data AnalysisChapter. 9. Attack AttributionChapter. 10. Practical DeceptionChapter. 11. Legal Issues in Cyber CounterintelligenceChapter. 12. Ethical Issues in Cyber Counterintelligence

Counterintelligence in a Cyber World

Product form

£47.49

Includes FREE delivery

RRP £49.99 – you save £2.50 (5%)

Order before 4pm today for delivery by Fri 19 Dec 2025.

A Hardback by Paul A. Watters

1 in stock


    View other formats and editions of Counterintelligence in a Cyber World by Paul A. Watters

    Publisher: Springer International Publishing AG
    Publication Date: 27/06/2023
    ISBN13: 9783031352867, 978-3031352867
    ISBN10: 3031352866

    Description

    Book Synopsis

    This book provides an outline of the major challenges and methodologies for applying classic counterintelligence theory into the cybersecurity domain. This book also covers operational security approaches to cyber, alongside detailed descriptions of contemporary cybersecurity threats, in the context of psychological and criminal profiling of cybercriminals. Following an analysis of the plethora of counterespionage techniques that can be mapped to the cyber realm, the mechanics of undertaking technical surveillance are reviewed.

    A range of approaches to web and forum surveillance are outlined as a virtual addition to traditional video and audio surveillance captured regarding targets. This includes a description of the advances in Artificial Intelligence, predictive analysis, support for the disciplines of digital forensics, behavioural analysis and Open Source Intelligence (OSINT). The rise of disinformation and misinformation and the veracity of widespread false flag claims are discussed at length, within the broader context of legal and ethical issues in cyber counterintelligence.

    This book is designed for professionals working in the intelligence, law enforcement or cybersecurity domains to further explore and examine the contemporary intersection of these disciplines. Students studying cybersecurity, justice, law, intelligence, criminology or related fields may also find the book useful as a reference volume, while instructors could utilise the whole volume or individual chapters as a secondary textbook or required reading.



    Table of Contents
    Chapter. 1. Counterintelligence TheoryChapter. 2. The Cyber Operational EnvironmentChapter. 3. Cyber Threats (and Opportunities)Chapter. 4. Psychology and Criminal ProfilingChapter. 5. CounterespionageChapter. 6. Technical SurveillanceChapter. 7. Physical SurveillanceChapter. 8. Data AnalysisChapter. 9. Attack AttributionChapter. 10. Practical DeceptionChapter. 11. Legal Issues in Cyber CounterintelligenceChapter. 12. Ethical Issues in Cyber Counterintelligence

    Recently viewed products

    © 2025 Book Curl

      • American Express
      • Apple Pay
      • Diners Club
      • Discover
      • Google Pay
      • Maestro
      • Mastercard
      • PayPal
      • Shop Pay
      • Union Pay
      • Visa

      Login

      Forgot your password?

      Don't have an account yet?
      Create account