REVIEW: "Netspionage: The Global Threat to Information", William
- BKNTSPNG.RVW 20001120
"Netspionage: The Global Threat to Information", William Boni/Gerald
L. Kovacich, 2000, 0-7506-7257-9
%A William Boni
%A Gerald L. Kovacich www.shockwavewriters.com
%C 225 Wildwood Street, Woburn, MA 01801
%I Butterworth-Heinemann/CRC Press/Digital Press
%O 800-366-BOOK fax 617-933-6333 800-446-6520 liz.mccarthy@...
%P 260 p.
%T "Netspionage: The Global Threat to Information"
In the preface, the authors state that this book is different from all
the others because it points out that the Internet can make it easy
and cheap to steal information. While this fact may be new to Boni
and Kovacich, it shouldn't come as a big surprise to many other
people. The preface also states that this text will teach you how to
filch data from other people, and then closes by hoping that the work
will ensure the security of Internet use. (We are also told that the
book is based on seminars that the authors give, which probably
explains a large number of illustrations that don't explain anything.)
Part one seems to want to be a kind of historical perspective on the
factors creating the current situation. Chapter one lets us in on the
fact that lots of people are fighting with and spying on each other.
Computers and high technology have been invented and are being used,
according to chapter two. The analysis of the Internet's potential
for criminal misuse, in chapter three, is slightly less simplistic,
but fails to provide anything like a full picture. Chapter four is a
rather mixed bag, stating that information is important, that there is
a "new world order," and that e-business exists. A lot of space is
devoted to definitions of espionage, and how it used to be done, in
chapter five, but the book does finally start to mention some random
points on data security at this point.
Part two is probably supposed to be the "how to" section of the book.
Chapter six dives back into the dictionaries but fails to give a solid
definition of "competitive intelligence." The only actual examples of
information gathering in chapter seven involve the use of phone books
and trash, not the net. A few actual espionage tools, a number of
useful tools that a spy might conceivably also want to use, and a lot
of insistence that netspionage is possible makes up chapter eight.
Chapter nine briefly describes some alleged and some prosecuted cases
of espionage, but details are almost non-existent.
Part three talks about protection against espionage. Chapter ten
presents a very basic outline for starting discussion of data security
issues. Chapter eleven goes slightly further in assessing risks and
threats. The suggestion to undertake retaliation and vigilante
action, tentatively though it is made in chapter twelve, is a really
Not content with the usual short bit of blueskying, part four looks to
the imaginary future. Chapters thirteen through seventeen take
fanciful looks at the future of technology, business, espionage,
government, and everything.
This is yet another shrill voice crying in the marketplace and telling
us what we already knew. It lacks detail, analysis, reality, and even
an identifiable central theme.
copyright Robert M. Slade, 2000 BKNTSPNG.RVW 20001120
====================== (quote inserted randomly by Pegasus Mailer)
rslade@... rslade@... slade@... p1@...
What I need is a list of specific unknown problems we will
encounter. - manager at Lykes Lines Shipping, from DNRC newsletter
http://victoria.tc.ca/techrev or http://sun.soci.niu.edu/~rslade