1: "Genocide": From Columbine to Hacking 2: Rebels: Joe Magee and "Noid" 3: The Hunt for Mafiaboy: Operation Claymore 4: A Tale of Two Script Kiddies: Pr0metheus and Explotion 5: World of Hell 6: Cyberchic: Starla Pureheart 7: Unlikely White Hat: Willie Gonzalez 8: Tinker, Teenager, Hacker, Spy: The H.D. Moore Story Afterword A: Two Decades of Teenage Hacking B: Making Headlines Over the Years C: Hacking on the Web
Dan Verton (Burke, VA) is a senior writer at Computerworld, specializing in Internet security, national security, critical infrastructure protection, and corporate information security policies. He has written hundreds of news stories, profiles of government and industry leaders, and feature-length stories related to Internet security, defense, and intelligence matters. He is also the former Associate Editor, Defense, for the trade publication Federal Computer Week. Other publication credits include stories on information warfare and corporate espionage for Business2.0, various Internet security news stories for Information Security Magazine, CNN.com, The Industry Standard, InfoWorld, and PC World.Dan has been asked to speak at various Internet security conferences, including a recent event at the United Nations in New York, where he moderated an expert panel on security issues.Dan is a former intelligence officer in the U.S. Marine Corps. While in the military, he served as an information systems security officer and training officer for various CIA and DIA database systems. Dan is also a former imagery intelligence analyst with the U.S. Army Reserve.
"Terrorists are strategic actors. They choose their targets deliberately based on the weakness they observe in our defenses and our preparedness. We must defend ourselves against a wide range of means and methods of attack. Terrorists continue to employ conventional means of attack, while at the same time gaining in expertise in less traditional means, such as cyber attacks."