Red Team: How to Succeed By Thinking Like the Enemy

By Micah Zenko

Red teaming. it's a perform as previous because the Devil’s recommend, the eleventh-century Vatican respectable charged with discrediting applicants for sainthood. this day, pink teams—comprised basically of fearless skeptics and people assuming the position of saboteurs who search to higher comprehend the pursuits, intentions, and features of associations or strength competitors—are used commonly in either the private and non-private region. pink teaming, together with simulations, vulnerability probes, and replacement analyses, is helping associations in aggressive environments to spot vulnerabilities and weaknesses, problem assumptions, and count on capability threats prior to the subsequent designated operations raid, malicious cyberattack, or company merger. yet now not all crimson groups are created equivalent; certainly, a few reason extra harm than they prevent.

In Red Team, nationwide protection specialist Micah Zenko offers an in-depth research into the paintings of purple groups, revealing the easiest practices, most typical pitfalls, and prime purposes of those modern day Devil’s Advocates. the easiest practices of purple teaming should be utilized to the CIA, NYPD, or a pharmaceutical corporation, and accomplished properly they could yield striking effects: crimson groups supply companies an aspect over their pageant, poke holes in important intelligence estimates, and troubleshoot risky army missions lengthy prior to boots are at the flooring. yet pink groups are just pretty much as good as leaders let them be, and Zenko indicates not just tips on how to create and empower crimson groups, but additionally what to do with the data they produce.

Essential studying for enterprise leaders and policymakers alike, Red Team will revolutionize the way in which companies take into consideration, make the most, atone for, and proper their institutional strengths and weaknesses. Drawing on little-known case reviews and extraordinary entry to elite pink teamers within the usa and out of the country, Zenko indicates how any group—from army devices to pleasant hackers—can win by way of considering just like the enemy.

Show description

Quick preview of Red Team: How to Succeed By Thinking Like the Enemy PDF

Best Security books

Cyber War: The Next Threat to National Security and What to Do About It

Writer of the number one big apple occasions bestseller opposed to All Enemies, former presidential consultant and counter-terrorism professional Richard A. Clarke sounds a well timed and chilling caution approximately America’s vulnerability in a terrifying new foreign conflict—Cyber conflict! each involved American may still learn this startling and explosive booklet that gives an insider’s view of White apartment ‘Situation Room’ operations and includes the reader to the frontlines of our cyber protection.

Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition

The world's bestselling computing device defense book--fully improved and updated"Right now you carry on your hand essentially the most profitable safeguard books ever written. instead of being a sideline player, leverage the precious insights Hacking uncovered 6 presents to assist your self, your organization, and your kingdom struggle cyber-crime.

Information Security: The Complete Reference, Second Edition

Enhance and enforce a good end-to-end safety application Today’s advanced international of cellular structures, cloud computing, and ubiquitous facts entry places new protection calls for on each IT specialist. info protection: the full Reference, moment version (previously titled community safeguard: the full Reference) is the one complete e-book that provides vendor-neutral info on all facets of data defense, with an eye fixed towards the evolving danger panorama.

Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition

State of the art concepts for locating and solving severe defense flaws toughen your community and circumvent electronic disaster with confirmed ideas from a staff of protection specialists. thoroughly up-to-date and that includes 12 new chapters, grey Hat Hacking: the moral Hacker's guide, Fourth variation explains the enemy’s present guns, talents, and strategies and gives field-tested treatments, case experiences, and ready-to-deploy checking out labs.

Extra resources for Red Team: How to Succeed By Thinking Like the Enemy

Show sample text content

Provided that taking pictures or killing the terrorist chief was once between President Obama’s optimum priorities, these officers have been keen to simply accept a few uncertainty in regards to the intelligence and the capability downsides of the army project. but, they consciously approved that there has been a threat that information of the Delta strength raid may leak, in alternate for not easy the CIA’s preliminary estimates. in addition, there have been greater than months of sustained discussions between senior officers, which accepted adequate time for competitive-intelligence crimson teaming. 3 separate crimson groups reviewed and challenged the sourcing intelligence and strength classes of motion opposed to bin weighted down. The equipment and results of the 1st stay hugely mystery, even though many shiny information became public. the 1st used to be performed via the CIA-led bin encumbered job strength that authored the preliminary estimates that put the terrorist chief in Abbottabad. They put aside a number of days to reexamine the entire facts and look at even if there have been any replacement hypotheses that healthy. the second one was once performed on the path of Michael D’Andrea, the executive of the CTC. ninety one He chosen 4 relied on analysts who had no longer been read-in to the bin weighted down collection-and-analysis attempt, and sought their perspectives individually. As Michael Morell, the deputy director of the CIA on the time recalled, D’Andrea “wanted to understand what different shrewdpermanent humans notion and even if their analysts had truly neglected whatever. ”92 one of the different probabilities that those pink groups thought of have been that either Abu Ahmed al-Kuwaiti, the “courier” who led the CIA to the compound at the start, and the nameless tall person within the compound have been both warlords from Afghanistan who ran their companies from Pakistan or have been drug purchasers from the Gulf who easily stored a personal lifestyles. ninety three The CTC analysts’ crimson group estimates ranged from 50 to eighty percentage. ninety four the ultimate crimson staff attempt used to be carried out below the lead of the nationwide Counterterrorism middle (NCTC). ninety five The mostly unknown tale of the NCTC’s efforts offers an illustrative instance of ways crimson teaming is usually performed on behalf of a number of targets. for that reason, purple teaming was once performed, partly, to supply ancient conceal for the White condominium in case the raid failed. ninety six In March and April of 2011, President Obama’s senior nationwide protection staff met a number of occasions to study and debate the intelligence, army recommendations, and power political and diplomatic implications. on the finish of an April assembly, Michael Leiter, the director of the NCTC, warned nationwide safeguard consultant Thomas Donilon and White condominium Senior Counterterrorism consultant John Brennan: “If this is going undesirable, you'll want to be capable of element to the crimson group effects. ” Leiter thought of the CIA’s estimates that bin weighted down was once within the compound as being tremendously powerful, and notwithstanding he knew of the past red-teaming efforts, he notion, “of path, the CIA couldn't crimson staff its personal exams. ”97 Leiter’s significant deputy, Andrew Liepman, who were the deputy leader of the Counterterrorism middle sooner than relocating to the NCTC, agreed that “you couldn’t have an identical people who lead the search, to evaluate whether or not they chanced on the perfect man.

Download PDF sample

Rated 4.53 of 5 – based on 25 votes