Index
Note: Page numbers followed by “f” and “t” refer to figures and tables, respectively.
A
Access class barring (ACB) mechanism,
121
Account credentials chain attack,
49–52
credit card attack surface,
51
Adoption, of wireless technology,
21–22
Advanced persistent threat (APT) activity,
28
Alliance for Telecommunications Industry Solutions (ATIS),
5
American Radio Relay League,
21–22
ANSI Network on Smart and Sustainable Cities (ANSSC),
103
Attack strategy
commercial applications,
70–72
victim’s chronology,
69–70
command and control (C&C),
28
denial-of-service (DoS),
28
Internet of Things (IoT),
29–30
layered vulnerabilities,
30
malware transmission,
27–28
SMS infection vector,
28–29
Authentication attacks,
7,
9
Automated access class barring (AACB),
120
Automated business-to-business activities,
74
Automatic identification and data capture (AIDC) technology,
15
Availability attacks,
7,
9
B
Black Hat Conference,
26–27
Bluetooth Low Energy (BLE) guideline,
14–15
Bogus email and snail messages,
57–58
“Boy in the bubble” syndrome,
69–70
Business productivity devices,
69–70
C
Call to action
credentials and access control,
135–136
network architecture,
135
security-conscious culture,
136
Central and Eastern European countries (CEEs),
23–24
Central locking systems,
70
Children’s Online Privacy Protection Act of 1998 (COPPA),
80
Citizen to government (C2G) services,
100–101
Clinician-focused active medical devices,
83
Code-division, multiple-access (CDMA) networks,
118–119
Cognitive Wireless Regional Area Network (WRAN),
11
Command and control (C&C),
28
attacks, on automated processes,
9
Commercial and industrial contexts, WAPs in,
63
commercial space taxonomy,
65–74
industrial applications,
67
Commercial space taxonomy,
65–74
Common access cards (CACs),
99
Common operating picture (COP),
115
Confidentiality attacks,
7,
8
Consumer price index comparison of telephone services,
24f
Copper, signals transmitted over,
7
Copper-wire connection,
4
Credit card attack surface,
51
Cyber-espionage figures,
64–65
D
Denial-of-service (DoS) attacks,
11–13,
17,
28
Department of Interior (DoI),
96–97
Department of Transportation (DoT),
97–98
Device logs, analysis of,
74
Digital forensics tools/techniques,
63–64
Digital infections,
77–78
Digital pickpocketing and data slurping,
58–59
Distributed denial of service (DDoS) attack,
65–67
E
E-filing PIN system, attacks against,
98
Electromagnetic interference (EMI),
4
Electromagnetic signals,
3
Electronic Communications Privacy Act of 1986 (ECPA),
80
Electronic medical records (EMRs),
8–9
and medical devices,
81–85
and industrial control systems (ICS),
86–88
Electronic official personnel folder (eOPF),
96–97
Electronics Product Code Global Incorporated (EPCglobal),
15–16
Emergency management, public safety and,
111–112
End-to-end security in communications,
7
European Telecommunications Standards Institute (ETSI),
5,
7–8
F
Federal Communications Commission (FCC),
21–22
Federal Educational Rights and Privacy Act of 1974 (FERPA),
80
Federal Emergency Management Agency (FEMA),
111
Federal Information Systems Management Act of 2002 (FISMA),
93,
123
Financial Services Modernization Act of 1999,
80
Firewalls, implementing,
78–79
First Responder Network Authority (FirstNet),
113,
121
512-bit encryption keys,
55
Fixed and mobile wireless access points,
1
differentiation between,
3–4
hybrid networks and communications channels
challenges for securing,
5–6
hacking opportunities in,
4–5
recommendations for wireless/hybrid systems,
10–12
use case scenarios,
12–13
wired networks and systems, implications for connections with,
6–10
authentication attacks,
9
C&C attacks on automated processes,
9
confidentiality attacks,
8
network penetration attacks,
7–8
4G long-term evolution (LTE),
113,
120
Frequency hopping spread spectrum (FHSS) technology,
13–14
G
Global system for mobile (GSM),
118–119
Google accounts, accessing,
51
Government Emergency Telecommunications Service (GETS),
118–121
Governmental context, for hacking wireless access points,
93
Gramm-Leach-Bliley Act (GLBA),
80
Gullibles travel attack,
54–56
victim’s chronology,
54–55
H
Hacking goals
strategies and steps,
30–31
Health Information Portability and Accountability Act of 1996 (HIPAA),
79,
80,
88
Health information technology (HIT) environment,
79
Health Information Technology and Economics Clinical Health (HITECH) Act,
80
Hollywood Presbyterian Hospital attack,
79,
84–85
Hybrid networks and communications channels
challenges for securing,
5–6
hacking opportunities in,
4–5
I
Incremental security actions,
133–134
Independent Security Advisors,
83
Indicators of attack (IoA),
97
Indicators of compromise (IoC),
97
Individuals, hacks against,
47
account credentials chain attack,
49–52
credit card attack surface,
51
gullibles travel attack,
54–56
victim’s chronology,
54–55
internet of hacked things attack,
56–59
bogus email and snail messages,
57–58
digital pickpocketing and data slurping,
58–59
public Wi-Fi hotspot attack,
52–54
honeypot look-alike,
52–53
Industrial applications,
67
Industrial control systems (ICS) technologies,
16
Industrial facilities,
63
Industrial sabotage,
67–74
Information and communications technologies (ICTs),
5
Inspector Gadget cyborg,
56
Institute of Electrical and Electronics Engineers (IEEE),
5,
5,
9
Insulin pump attack,
83–84
Integrity attacks,
7,
8–9
Interconnected medical devices (IMDs)
Interconnectivity model,
13–14
International Electrotechnical Commission (IEC),
15–16
International Standards Organization (ISO),
5
International Telecommunications Union (ITU),
5,
7,
7
Internet Engineering Task Force (IETF),
5,
8
Internet of Everything (IoE),
1–2
Internet of hacked things attack,
56–59
bogus email and snail messages,
57–58
digital pickpocketing and data slurping,
58–59
Interoperability challenges,
112–115
Intrusion detection systems (IDS),
74
Intrusion prevention system (IPS),
71
IRS E-filing PIN system, attacks against,
98
J
K
KeyPoint Government Solutions,
94
L
Layered vulnerabilities,
30
Legacy technology infrastructure,
55
Local area network (LAN) technologies,
5,
9–10
M
Machine-to-machine (M2M) communications,
116
Magnetic stripe technology,
58
Malware families with C&C servers,
10t
Market penetration, wireless,
22–23
Medical environments, WAPs in,
77
convenience factors versus system responsiveness,
79
EHRs, medical devices, and ICS,
86–88
Hollywood Hospital hack attack,
84–85
through interconnected medical devices,
143
Metropolitan area network (MAN),
9–10
Middle Class Tax Relief and Job Creation Act of 2012,
113
Mobile apps vetting process,
117
Mobile broadband wireless,
11
Money, in security program,
130
Motivation, of hacker,
2t
N
National Association of State Chief Information Officers (NASCIO),
100–101
National Incident Management System (NIMS),
112
National Institute of Standards and Technology (NIST),
5,
7–8,
14,
73
National Public Safety Broadband Network (NPSBN),
121,
122f
real-world attack scenarios,
123–125
National Security and Emergency Preparedness (NS/EP),
112f,
121
National Security Telecommunications Advisory Committee (NSTAC),
121
Near field communication (NFC) devices,
55
Network penetration attacks,
7–8,
7
Next generation network (NGN) infrastructure,
121
Noncivilian government context,
109
challenges
policy and procedure,
115
National Public Safety Broadband Network (NPSBN),
121,
122f
real-world attack scenarios,
123–125
public safety and emergency management,
111–112
representative challenges
policy and procedure,
115
North American Industry Classification Standard (NAICS) code,
64–65
O
Office of Emergency Communications (OEC),
118,
118
Office of Personnel Management (OPM),
94,
94–95
Open Systems Interconnection (OSI) model,
6,
7
Open Web Application Strategy Project (OWASP),
30,
30f
OpenBerlin Innovation Center,
70
Over-the-air provisioning (OTAP) protocols,
6
P
Panopticon-style environments,
57
Passive medical device,
82
Patient-focused active medical devices,
82
Patient-focused passive medical devices,
82
Patrol cars, communications in,
22
PEAR (preparation, execution, awareness, repetition),
130
Peer-to-peer networking,
8
Personal area network (PAN),
9–10
Personal identity verification (PIV) cards,
99
Personally identifiable information (PII),
48,
55
Picture archive and communications systems (PACS) pivot attack,
87–88
Plain old telephone system (POTS) infrastructure,
23–24,
24–26,
26
Point-to-multipoint capability,
14
Point-to-point connectivity,
7,
65
Polymorphing malware, proliferation of,
27–28
Privacy Clearinghouse,
80
Process-focused active medical devices,
83
Programmable logic controllers (PLCs),
69,
71,
71
Public Safety Access Point (PSAP),
120–121
Public safety and emergency management,
111–112
Public Wi-Fi hotspot attack,
52–54
honeypot look-alike,
52–53
Public wireless router attack surface, exploiting,
53
Public/private partnerships,
93
R
Radio aspect of wireless,
2
Radio Frequency Identification (RFID),
1–2,
15–16
Radio resource management (RRM),
6
Random access channel (RACH),
120
Regional area network (RAN),
9–10
Remote authentication dial-in user service (RADIUS) cracking,
7
Rogue access points,
8,
9
S
Secure Mobile Computing initiative,
56
Secure Simple Pairing (SSP),
14
Security engineer’s view on autonomous vehicles,
139
Service set identifier (SSID),
8,
9
Signals transmitted over copper,
7
Simplified wireless devices,
4
Smart Grid Coordination Group (SG-CG),
7–8
SMS infection vector,
28–29
Spearphishing attack,
142
Supervisory Control and Data Acquisition (SCADA),
16–17,
67
T
Technology penetration rates, longitudinal comparison of,
25t
Telecommunications rules of engagement,
6–8
Telecommunications standards,
5–6
Telephone service, wireless,
22
Telephone services, consumer price index comparison of,
24f
Thinking like a hacker
sustainment, assault, obfuscation,
133–134
Third Generation Partnership Project (3GPP),
5,
8
U
UN Hacker Profiling Project (HPP),
1
US Investigations Services (USIS),
94,
94
US Office of Personnel Management (OPM),
81,
94,
94,
96
V
Vehicle cyber security,
97–98
W
Wide area network (WAN),
9–10
Wired networks and systems, implications for connections with,
6–10
authentication attacks,
9
C&C attacks on automated processes,
9
confidentiality attacks,
8
network penetration attacks,
7–8
Wireless attack elements
C&C (ICS Environment),
28
Internet of Things (IoT),
29–30
layered vulnerabilities,
30
malware transmission,
27–28
SMS infection vector,
28–29
Wireless communications rules of engagement,
8–9
Wireless consumer-grade surveillance devices,
57
Wireless equivalent privacy (WEP),
9,
9
Wireless LAN controller (WLC),
6
Wireless LAN/Wi-Fi (802.11X),
11–13
Wireless Local Area Network (WLAN),
10
Wireless market penetration,
22–23
Wireless medical devices,
82–83
Wireless Metropolitan Area Network (WMAN)/WiMAX (802.16),
11,
13,
13
Wireless Priority Service (WPS),
118–121
Z