Essays & Books

I have been publishing essays on international security and technology issues since 1993. In 1996, I was co-author on an award winning essay on information terrorism, which was subsequently published in the peer-reviewed journal Terrorism and Political Violence. My other writings are scattered within the Internet, but I’ve consolidated several of the more popular ones below.

10 Red Teaming Lessons Learned over 20 Years – Realizing I had been red teaming professionally for 20 years, I decided to document my top 10 lessons learned.

Every Cyber Attacker is an Insider – An essay to bring some context to the presumption of breach as it relates to the private sector.

State Sponsored Cyber Threats – The Long View – A blog post documenting some of my thinking on state sponsored attacks against critical infrastructure, strategic penetration for future exploitation, and time-shifted intent. All concepts I’d been speaking about for years.

We all live in the future now – An informal essay I wrote about international security and technology challenges we will be facing in coming years.

The Year of Living Cyberdangerously – Short blog post on the outlook for information security issues, where I predicted 2009 would be a watershed year.  It was.

All Done Except the Coding: Implementing the International Strategy for Cyberspace by Matthew G. Devost, Jeff Moss, Neal A. Pollard, & Robert J. Stratton III

Utilizing Terrorism Early Warning Groups to Meet the National Preparedness Goal – This paper articulates a vision for expanding the Terrorism Early Warning Group (TEW) network that meets the local and national requirements as specified in, Homeland Security Presidential Directive 8: Interim National Preparedness Goal (HSPD-8).

Online Security: Lock Your Doors! – An editorial on information security and due diligence published in Electronic Business Week magazine.

National Security in the Information Age – Mr. Devost’s 1995 thesis on information warfare and national security has been published internationally and referenced in numerous international government reports.

Information Terrorism: Can You Trust Your Toaster? – This paper on cyberterrorism received the prestigious Sun Tzu award from the National Defense University and has been reprinted in numerous books and academic journals including the peer reviewed Terrorism and Political Violence journal.

Organizing for Information Warfare: The Truth is Out There! – Follow-up to the Toaster paper looked at unique organizational challenges associated with addressing the IW threat.

Generation Hack – First person report from an underground hacker convention was first published in Upstart Magazine.

Taking Cyberterrorism Seriously – Short paper response to an article on cyberterrorism that appeared in the Washington Post on June 27, 2002.

Current and Emerging Threats to Information Technology Systems and Critical Infrastructures – Essay written for the Global Business Briefing journal detailed a lot of the basis for threat assessments I was conducting for U.S. government and corporate clients.

Communication of Threats – Commissioned research report on strategies to share intelligence within the U.S. transportation infrastructure.

Political Aspects of Class III Information Warfare: Global Conflict and Terrorism – My presentation notes from the Second International Conference on Information Warfare and Security.n

I have co-authored or contributed to several books.

Counterterrorism: Bridging Operations and Theory
(Paperback) – ISBN: 978-1491759776
This book, Counterterrorism: Bridging Operations and Theory, is meant to help facilitate the gulf between those engaging in applied aspects of counterterrorism–essentially early warning, pre-emption response, mitigation, and consequence management–and those who are studying the underlying components of terrorism itself–e.g. how to define it, its causation, radicalization processes, group evolutionary patterns, and incident lessons learned–in order to better understand this phenomena for counterterrorism research purposes. Often such a diverse grouping of professionals and scholars are not found together in a project such as this because their paths do not normally cross.

Addressing Cyber Instability
(Paperback) – ISBN: 978-1300307419
The Cyber Conflict Studies Association (CCSA) is a 501(c)3 non-profit organization, created by thought leaders in the field to promote a diversified research agenda. CCSA’s vision is to be a premier resource in the area of cyber conflict by fostering dialogue, leading research, and cultivating programs focused on the implications of cyber conflict.

Threats in the Age of Obama
(Paperback) – ISBN: 978-1934840801
If you are on a mission to change the way government works, particularly in the national security arena, this is one a place where some independent and intellectually diverse thinking is to be found. In these essays, we offer our view of some of the more pressing threats the Obama administration will have to deal with in these early days of the 21st century.

The essays in this volume are contributed by Daniel H. Abbott, Christopher Albon, Matt Armstrong, Matthew Burton, Molly Cernicek, Christopher Corpora, Shane Deichman, Adam Elkus, Matt Devost, Bob Gourley, Art Hutchinson, Tom Karako, Carolyn Leddy, Samuel Liles, Adrian Martin, Gunnar Peterson, Cheryl Rofer, Mark Safranski, Steve Schippert, Tim Stevens, and Shlok Vaidya.


Cyber Adversary Characterization:

Auditing the
Hacker Mind
(Paperback) – ISBN: 1931836116

“When we speak of the hacker mind, then, we have come to mean the mind of a miscreant motivated by a broad range of ulterior purposes. We mean script kiddies who download scripts written by others and execute them with the click of a button, we mean vandals with limited impulse control, we mean thieves of data, and then we mean all the people who use that data for extortion, corporate or industrial espionage, state-level spy craft, identity theft, grand larceny, blackmail, vicious revenge, or terror. That’s lots of kinds of minds, needing to be understood, needing to be profiled, needing to be penetrated, needing to be known inside and out.”–from the preface by Richard Thieme


Hacking a Terror Network (Paperback) – ISBN: 1928994989
“In Hacking a Terror Network, Russ Rogers uses a fictional scenario to demonstrate how terrorists may use the Internet to coordinate and launch a new series of terrorist attacks. While the scenario may be fictitious, the techniques and technologies that Russ uses are drawn straight from the computer security world. It makes for a great read as well as provides a blueprint to the workings of covert channels. Most importantly, it describes how law enforcement agencies and intelligence organizations can detect, defend and destroy threats. This book is packed with real-life examples of how tools work, including screenshots and narrative tutorials. Both amateurs and seasoned security professionals will benefit from reading this book.” –from the Foreword by Matthew G. Devost


Information Warfare:
Cyberterrorism : Protecting Your Personal Security in the
Electronic Age (Paperback) – ISBN: 1560251328“The importance of the contents of this book cannot be overstated. It is a collection of articles written by various experts in the field, which works well as it gives the reader a balanced view.” – Amazon review


Informatica – ISBN: 0375706372

“In his introduction to Informatica 1.0, author Peter M. Black notes that his original pitch to Random House was that his book would be similar to The Whole Earth Catalog, only 30 years later–without the chemical toilets and backpacking gear. What he offers instead is a catalog for a wired world that is always in search of more information.” – Amazon review


2005 Terrorism Analysis and Research Report (Volume 1) – ISBN: 978-1-4116-8310-5This two volume annual anthology of global terrorism and international security events and real-time analysis as written by some of the world’s top terrorism analysts during the calendar year 2005. This book is designed as an invaluable reference, containing over 650 essays, which highlight and analyze global terrorism and international security issues augmented by proprietary perspectives and intelligence forecasts.


2005 Terrorism Analysis and Research Report (Volume 2) – ISBN: 978-1-4116-8312-9This two volume annual anthology of global terrorism and international security events and real-time analysis as written by some of the world’s top terrorism analysts during the calendar year 2005. This book is designed as an invaluable reference, containing over 650 essays, which highlight and analyze global terrorism and international security issues augmented by proprietary perspectives and intelligence forecasts.

 

Also Blogging at:

Archives