Black Ice: The Invisible Threat of Cyberterrorism and over one million other books are available for Amazon Kindle. Learn more
Buy Used
$7.95
FREE Shipping on orders over $35.
Used: Very Good | Details
Sold by thebookchamps
Condition: Used: Very Good
Comment: Nice copy! 100% Satisfaction Guarantee. Eligible for Amazon's FREE Super Saver/Prime Shipping, 24/7 Cusotmer Service & package tracking.
Access codes and supplements are not guaranteed with used items.
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Black Ice: The Invisible Threat of Cyber-Terrorism Hardcover – August 19, 2003

ISBN-13: 078-3254041721 ISBN-10: 0072227877 Edition: 1st

Used
Price: $7.95
12 New from $9.95 37 Used from $0.01 2 Collectible from $9.98
Amazon Price New from Used from
Kindle
"Please retry"
Hardcover
"Please retry"
$9.95 $0.01
Paperback
"Please retry"
$49.25
12%20Days%20of%20Deals%20in%20Books
NO_CONTENT_IN_FEATURE

Shop the new tech.book(store)
New! Introducing the tech.book(store), a hub for Software Developers and Architects, Networking Administrators, TPMs, and other technology professionals to find highly-rated and highly-relevant career resources. Shop books on programming and big data, or read this week's blog posts by authors and thought-leaders in the tech industry. > Shop now

Product Details

  • Hardcover: 304 pages
  • Publisher: McGraw-Hill Osborne Media; 1 edition (August 19, 2003)
  • Language: English
  • ISBN-10: 0072227877
  • ISBN-13: 978-0072227871
  • Product Dimensions: 6.2 x 1.2 x 9.1 inches
  • Shipping Weight: 1.4 pounds
  • Average Customer Review: 4.3 out of 5 stars  See all reviews (18 customer reviews)
  • Amazon Best Sellers Rank: #348,843 in Books (See Top 100 in Books)

Editorial Reviews

Review

The examples Verton unearths are certainly spooky... Genuine cyberterrorism will be as physical as a punch to the gut. -- The Washington Post, August 10, 2003

From the Back Cover

The new face of terrorism--cyber-terrorism--is all too clear. Gone are the days when the only victims are those who are unfortunate enough to be standing within striking distance of the blast. Today's terrorists have learned that America's national security depends upon its computer- and network-dependent infrastructure. A strategic attack on those systems would undoubtedly have devastating consequences for the nation and the economy.

Written by former U.S. intelligence officer Dan Verton, Black Ice: The Invisible Threat of Cyber-Terrorism investigates how cyber-terrorism could occur, what the global and financial implications are, the impact this has on privacy and civil liberties, and how to prepare for and prevent cyber attacks. The book is packed with revealing interviews and commentary from leading government authorities on national security, including Tom Ridge, James Gilmore, Richard Clarke, CIA and NSA intelligence officials--and even supporters of the al-Qaeda terrorist network.

This compelling work will add much to the national debate on homeland security issues. Verton argues forcefully and convincingly that real-time intelligence sharing is the key to ensuring that the high-tech future of terrorism does not become like black ice stretched across the information superhighway­­alerting us to its presence only after we are spinning out of control.

"Reveals a real threat to Homeland Security that the Feds are not fixing." --Richard A. Clarke, Former Special Advisor to the President for Cyber Security, and the Former National Coordinator for Security & Counterterrorism

"Dan Verton has 'connected the dots' like no one else can. He has written this book in such a way that it is relevant to the masses as well as the security experts. [This is] a 'must-read' as it contains a clear message: there is much to be done on the cyber security front to protect us from 'weapons of mass disruptions.'" --Howard A. Schmidt, Former Chair, President's Critical Infrastructure Protection Board, and Cyber Security Advisor for the White House

"In Black Ice, Dan Verton has done a masterful job in explaining why cyber security is important for every American." --Roger Cressey, Former Chief of Staff to the President's Critical Infrastructure Protection Board, and former Director for Transnational Threats at the National Security Council

"I've spent the better part of 30 years involved in computer security, cyber-incident investigation, and computer forensics. As I read the material that Dan Verton has compiled here, I'm frightened. And you should be too." --Alan E. Brill, Senior Managing Director of Kroll Worldwide's Technology Services Group, and the former Director of the Information Systems and Information Security Bureau of the New York Department of Investigation

"[This book is] one of near incomparable importance in an uncertain post-September 11th world. Black Ice may be the most important book we read in a long while, because it brings to the immediate attention of the leaders of government and commerce a sense of electric urgency and of the consequences of inaction." --MacDonnell Ulsch, Managing Director of Janus Risk Management, Inc., and a former Trusted Advisor to the United States Secrecy Commission


More About the Author

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

It is poorly written, poorly organized, and poorly edited.
Bill Richards
While This Book deals mostly with What if Scenerios, It also makes you think of things you thought were impossible.
SAM FRIEDMAN
Dan has an amazing gift as a journalist and also to explain technical material in an approachable manner.
Stephen Northcutt

Most Helpful Customer Reviews

29 of 33 people found the following review helpful By Bill Richards on November 29, 2003
Format: Hardcover
Verton's book is full of hyperbole, repetition, unsupported statements, and contradictions. It is poorly written, poorly organized, and poorly edited. His "research" consists mostly of quoting his own magazine articles (29 times) and the magazine he writes for (16 times). By comparison, he quotes from only three books. Example of hyperbole: In commmenting on a admittedly fictional scenario called Dark Winter, the author claims that, "entire communities and cities could be rendered as helpless as those affected by the Black Death of the 14th century, a bubonic plague that killed one third of Europe's population." Yet, he fails to support that claim with any evidence or even a reference to the report on the exercise.
He repeats the same story about an al Qaeda interview with an Italian journalist in his introduction and again at p. 98. He writes nearly the same sentence about radical terrorists living in the U.S. once in the main text on p. 5 and again in a footnote on the same page. He tells a story about the Ptech company at p. 111 and again at p. 223-25, and uses nearly the identical paragraph in each. Where is the editing to catch these duplications?
Worse yet, his uses the Ptech story to draw two contradictory conclusions. In the first telling, he says that Ptech is an example of al Qaeda using American companies as fronts for terrorist financing. He claims that "evidence was uncovered" to show this connection. Yet, two pages later, he asserts that the FBI has been "unsuccessful in finding any evidence linking Ptech to terrorism financing.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
8 of 10 people found the following review helpful By Dr Anton Chuvakin on September 23, 2003
Format: Hardcover
Cyberterrorism, does it exist? A weapons-grade hype or a nightmare from the near future, which we are all soon to face? This fascinating book seeks to answer the above question by collecting and evaluating many stories during author's "6 year research" trying to piece the puzzle together.
Undoubtfully, the book is written by a journalist, thus it sometimes feels sensationalistic, "newspaperish" and fluffy. Some things (such as the "doomsday" scenario from chapter 1 and "al-Qaeda certified hackers") are "lighter" than others, but all are well-written and fun to read. At times, it feels that the author seeks to replace proving things by quoting many potentially unreliable sources talking about the thing. Thus "such and such ex-government guy said cyberterrorism is real" subtly mutates into "cyberterrorism is real!" Similarly, if a PC was discovered in some hideout or it becomes known that terrorists surfed the web, suddenly the specter of cyber-terror rises high, although the facts themselves can be interpreted in a less ominous manner.
Another subject covered extensively in the book is whether al-Qaeda is really going in the direction of cyberterror. I find the case built by the author somewhat convincing, but not completely compelling. However, if truck bombs against data storage facilities and IT infrastructure as well as EMP weapons are added to the fray (as suggested in the book), suddenly cyberattacks are not about hacking anymore and the damage potential rises dramatically.
As for the conclusion, one of the main points I realized after reading the book is that everything is modern society is so a) interdependent and b) dependent upon computers that a push applied in a certain place from within the "cyber-world" does stand a chance of wrecking something in a "real world".
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
4 of 6 people found the following review helpful By Stephen Northcutt on September 19, 2003
Format: Hardcover Verified Purchase
Dan has an amazing gift as a journalist and also to explain technical material in an approachable manner. I've read or been briefed on a lot of this material at one time or another, but to have it in one place, well laid out, with example after example, really helped me focus on just how vulnerable our country and my organization is. The "shock" value of this material is high, but he took no shortcuts in making his case. Buy the book, read the book, then grab your organization's disaster recovery and business continuity plans and get out your red pen. I promise you will be inspired to improve those plans.
If I had a criticism of the book it would be the ending, it is a bit too much gloom and doom. So, I propose the following alternate ending:
Each of us has the ability and the responsibility to make our environment a bit more resistant to attack. The actions we can take range from reviewing our web pages to make sure we are not giving too much information away to simply running Windows update. Don't let a week go by without doing something, anything, to strengthen your defenses.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
6 of 9 people found the following review helpful By Connie Lapenta on May 4, 2004
Format: Hardcover
Without a doubt a book of monumental importance to the nation during this time of war and increased threat from terrorism. I recommend this book to anybody who is interested in homeland security and how terrorism may be changing and evolving its strategy against the U.S.
Well-written, full of intrigue and first-hand interviews with top security officials from both the Clinton and Bush administrations. Verton had unfettered access to those directly involved in the Sept. 11 response, including Richard Clarke.
You will not find another book on this subject that is this well researched and written. And because Verton is a journalist, he wrote this book so that you don't have to be a computer expert to understand the issues.
Buy this book. You will not be disappointed.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

Most Recent Customer Reviews