Home Onderwerpen Zoek Over ons Doneer Contact

Bronnen over CyberOorlog

Sources on Cyber War

dr. Albert Benschop
Universiteit van Amsterdam
First edition: 2001 — Last edition: 08 June, 2017

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Bij de teksten
rode_knop Oorlog in Cyberspace — Internet als slagveld
Index Amerika vs. Rusland — Cyberoorlog in 2016
Index Rusland vs. Oekraïne — Een nieuwe fase in de cyberoorlog?
rode_knop Doemsdag in Cyberspace — Een hypothetische constructie
rode_knop Internationaal Cyberspace Verdrag — Ontwerp voor een demilitarisering van cyberspace
Index Kwetsbare slimme woningen — Hoe veilig is mijn thuisnetwerk?

    A

  1. Adams, Gordon / Ben-Ari, Guy

  2. Adhikari, Richard

  3. Addicott, Jeffrey F.

  4. Aid, Matthew M.

  5. AIV - Adviesraad Internationale Vraagstukken

  6. AIVD - Algemene Inlichtingen- en Veiligheidsdienst

  7. Alberts, David S.

  8. Alberts, David S. / Garstka, John J. / Hayes, Richard E. / Signori, David A.

  9. Alberts, David S. / Hayes, Richard E.

  10. Alberts, David S. / Papp, Daniel S.

  11. Ale, Ben

  12. Alexander, Keith B.

  13. Alford, Lionel D.

  14. Aljazeera

  15. Anderson, Ross J.

  16. Andress, Jason / Winterfeld, Steve

  17. AP

  18. ARD

  19. Armed Forces Journal (AFJ)

  20. Armed Forces & Society (AFS)

  21. Armistead, Leigh

  22. Arpagian, Nicolas

  23. Arquilla, John J.

  24. Arquilla, John J. / Ronfeldt, David F.

  25. Arquilla, John J. / Rothstein, Hy

  26. Ars Technica

  27. ARTE
    • [15.03.2014] Netwars - Krieg im Netz [53:00]
      Een documentaire van Marcel Kolvenbach die duikt in de verborgen wereld van cyberoorlog. Het sporenonderzoek leidt van de fabrikanten van cyberwapens in Israél, via de rode hackers in China naar de allergrootste hackersconferentie in Amerika. De documentaire begint met een uitspraak van Ian West, directeur cyberveiligheid bij de Nato: “Een enkeling met een laptop kan tegenwoordig meer vernietiging teweegbrengen als een conventioneel wapen zoals een bom!”

    • [2016] Cyberkrieg Russland: Ist der Westen gefährdet? [43:14]

  28. Asia Times

  29. Atlantic, The

  30. Attrition.org
      Een groep die ‘Web defacements’ en andere typen cybermisdaad in de gaten houdt.

  31. Automatiseringsgids

  32. Aviationist, The

  33. Axelrod, Robert / Iliev, Rumen

  34. Azerbaijan Press Agency (APA)

    Index B

  35. Baker, Stewart A. / Dunlap, Charles J.

  36. Balthrop, Justin / Forrest, Stephanie / Newman, M.E.J. / Williamson, Matthew M.

  37. Bamford, James |

  38. Baocun, Wang / Fei, Li
    • [1997] Information warfare
      In: Pillsbury, M (ed.) Chinese views of future warfare.
      Washington, DC: National Defense University Press.

  39. Barford, Paul / Yegneswaran, Vinod

  40. Barkham, Jason

  41. BBC

  42. Beaver, Kevin

  43. Beckett, Donald M. / Putnam, Douglas T.

  44. Beer, Thomas

  45. Beidleman, Scott W.
    • [2010] Defining and Deterring Cyber War
      In: Caton, Jeffre L. / Dauber, Cori E. / Groh Jeffrey L. / Smith David J. [2010] Information as Power.
      U.S. Army War College, pp. 69-88.

  46. Bendrath, Ralf

  47. Bergen, Jurre van

  48. Bergman, Ronen

  49. Betz, David J. / Stevens, Tim

  50. Bhattacharjee, Supriyo

  51. Bieber, Florian

  52. Bilge, Leyla / Dumitras, Tudor

  53. Bits of Freedom (BoF)

  54. Blainey, Geoffrey
    • [1973/88] The Causes of War
      New York: Free Press.
      A study on the causes of war that includes a complete discussion of World War II and the road towards nuclear war. Analyzing all international wars since 1700, this book solves the riddle of why some wars are long and some are short, and demonstrates how the outbreak of peace offers insight into the outbreak of war. Proving that war and peace are alternating phases of a relationship between rival nations, it offers a crucial understanding of international armed conflict.

  55. Blank, Stephen

  56. Bloomberg

  57. Blunden, Bill

  58. Boddens Hosang, J.F.R.
    • [2003] Rules of Engagement: het politiek juridische struikelblok voor de militaire commandant.
      Militair Rechtelijk Tijdschrift, 9.

  59. Boer, Linanne / Lodder, Arno R.

  60. Bogaard, P.L.

  61. Bontchev, Vesselin

  62. Boothby, William

  63. Brenner, Susan W.
    • [2002] Organized Cybercrime? How Cyberspace May Affect the Structure of Criminal Relationships
      North Caroline Journal of Law and Technology 4:1-40.

    • [2009] Cyber Threats: The Emerging Fault Lines of the Nation State
      Oxford University Press.
      As new technologies develop, terrorist groups are developing new methods of attack by using the Internet, and by using cyberspace as a battlefield, it has become increasingly difficult to discover the identity of attackers and bring them to justice. The seemingly limitless boundaries of cyberspace have allowed virtually anyone to launch an attack from a remote and anonymous location. But once these attacks occur, it raises several important questions. Who should respond, and how? How should nation-states effectively deal with a cyber-attack? Will the United States and other nation-states be able to survive in a world where virtual boundaries are limitless? Susan Brenner gives a thorough explanation of how military and law enforcement personnel respond to these attacks and why bringing cyber-terrorist to justice can be difficult and sometimes impossible.

  64. Brewin, Bob

  65. Brito, Jerry / Watkins, Tate

  66. Broos, Elly / Vogelaar, Ad / Fenema, Paul C. van
    • [2012] The Human Factor in Cyber Defense: Individual and Organisational Resilience.
      In: Ducheine/Osinga/Soeters 2012:225-242.

  67. Bulletin of the Atomic Scientist

  68. Bundesamt für Sicherheit in der Informationstechnik (BSI)

  69. Burnett, Mark

  70. Burton, Joe - Victoria University of Wellington, New Zealand

  71. Business Insider

  72. Buzan, Barry / Wæver, Ole / Wilde, Jaap de

  73. Byers, Michael

    Index C

  74. Campen, Alan / Dearth, Douglas / Goodden, R.T.

  75. Canvas

  76. Carr, Jeffrey

  77. Cavelty, Myriam Dunn

  78. CBS News

  79. Center for International Security and Cooperation (CISAC) - Stanford

  80. Center for Strategic & International Studies (CSIS)

  81. CERT-UK

  82. Charney, Scott

  83. Chesterman, Simon

  84. ChinaDaily |

  85. Chng, Grace

  86. Choo, Kim-Kwang, Raymond

  87. Choucri, Nazli

  88. Christian Science Monitor

  89. Church, William
    • [1997] Information Warfare Threat Analysis for the United States of America. Part Two: How Many Terrorists Fit on a Computer Keyboard?
      In: Journal of Infrastructural Warfare.

  90. Cimpean, Dan / Meire, Johan

  91. Citizen Lab

  92. Clapper, James R.

  93. Clarke, Richard A. / Knake, Robert K.
    • [2010] Cyber War: The Next Threat to National Security and What to Do About It.
      New York: Ecco/HarperCollins.
      Online te lezen zijn de Introduction en Hfst. 1: Trial Runs

  94. CNN

  95. Coalson, Robert

  96. Cohen, F.

  97. Collin, Barry

  98. Colson, Will

  99. Computable

  100. Connolly, Chris

  101. Cook, Richard I.

  102. Cooper, Ricky A. / Van Vliet, Ben

  103. Cordesman, Anthony H. / Cordesman, Justin G.

  104. Cornish, Paul / Livingstone, David / Clemente, Dave

  105. Correspondent, De

  106. Crawford, Emily - University of Sydney, Australia

  107. Crawford, J. W.

  108. Creveld, Martin L. van
    • [1987] Command in War
      Harvard University Press. January 1, 1987.
      Gedetailleerde analyse van het probleem van systemen van militair commando in historisch perspectief: Napoleon, Van Moltke, Israël 1967-73, Verenigde Staten in Vietnam. Succesvolle commandosystemen maken geen gebruik van doorbraaktechnologie, maar organiseerden zichzelf zodanig dat zij met minder informatie konden functioneren. Dit is enerzijds mogelijk door de organisatie zodanig compact te maken dat er minder communicatie nodig is (bijv. de falanx), anderzijds door het zodanig decentraliseren van de besluitvorming dat informatie niet ver omhoog of omlaag in de organisatie moet stromen. Deze informationele efficiëntie wordt gecombineerd met een ‘gerichte telescoop’ die commandanten in staat stelt om zich in detail te concentreren op essentiële punten in het systeem. Tenslotte zijn er informele informatiekanalen die de wielen van het formele communicatiesysteem draaiende houden en het mogelijk maken om in noodsituaties tijdelijk het formele systeem te omzeilen.

    • [1989] Technology and War. From 2000 B.C. to the Present
      New York: Free Press. Creveld analyseert het gebruik van technologie over de afgelopen 4.000 jaar en gevolgen voor militaire organisatie, bewapening, logistiek, inlichtingen, communicatie, transport en commando.

    • [1991] The Transformation of War: The Most Radical Reinterpretation of Armed Conflict Since Clausewitz
      Free Press. March 31, 1991.
      Sinds 1945 waren de meeste oorlogen conflicten met een lage intensiteit. In termen van aantal slachtoffers en bereikte politieke resultaten zijn ze onvergelijkbaar met conventionele oorlogen. Creveld analyseert een aantal militaire conflicten tussen reguliere en irreguliere strijdkrachten in Vietnam, Libanon, Afghanistan en elders. Naarmate kleinschalige oorlogen zich verspreiden zullen conventionele strijdkrachten inkrimpen. De last van het beschermen van de samenleving zal verschuiven naar de bloeiende beveiligingsondernemingen. De theorieén van Karl von Clausewitz, die de basis vormde voor het Westerse strategisch denken, zijn grotendeels irrelevant voor niet-politieke oorlogen zoals de islamitische jihad en de overlevingsoorlogen zoals de zesdaagse oorlog van Israél. Aan het monopolie op fysiek geweld door grotere natie-staten komt een einde. Dit monopolie wordt vervangen door een brede schakering van ‘niet-statelijke actoren’ die verantwoordelijk zijn voor bedreigingen van de nationale veiligheid. In de toekomst worden de oorlogen uitgevochten door terroristische groeperingen, guerrilla’s en bandieten die gemotiveerd worden door fanatieke, ideologische loyaliteiten. Conventionele gevechten worden vervangen door schermutselingen, bombardementen en afslachtingen. De wapens zullen eerder minder dan meer geavanceerd worden. De high-tech wapenindustrie zal als een kaartenhuis instorten.

    • [1993] Nuclear Proliferation and the Future of Conflict
      New York: Free Press. December 1993. Sinds het einde van de Koude Oorlog is de mogelijkheid van een nucleaire oorlog tussen twee supermachten aanzienlijk kleiner geworden. We maken ons zorgen om kleinere conflicten (tussen Noord- en Zuid-Korea, China en India, India en Pakistan, Israél en de Arabische staten) en vrezen dat frustratie of verbittering ertoe zal leiden dat er naar laatste, ultieme maatregelen wordt gegrepen. Creveld stelt de vraag of angst en respect voor nucleaire wapens voldoende zal zijn om hun gebruik te voorkomen ondanks de haat die zo kenmerkend is voor veel oude regionale rivaliteiten.

    • [1999] The Rise and Decline of the State
      Cambridge University Press. August 28, 1999.
      Een synopsis van de opkomst van de natie-staten en van de krachten die tot hun ondergang kunnen leiden. Creveld analyseert de evolutie van staten door de eeuwen heen en over de hele wereld: voor de staat (prehistorie - 1300 v. Chr.), de opkomst van de staat (1300-1648), de staat als een instrument (1648-1789), de staat als een ideaal (1789-1945), de verspreiding van de staat (1696-1975) en het verval van de staat (1975-?).

    • [1999] De wil tot oorlog
      Interview van Rutger van der Hoeven met Creveld in De Groene Amsterdammer, 31.3.1999

    • [2006] The Changing Face of War: Lessons of Combat, from the Marne to Iraq
      Presidio Press.
      Creveld brengt in dit boek al zijn expertise op het gebied van militaire geschiedenis en strategie bijeen. Hij laat zien waarom machtige staande legers tegenwoordig hulpeloos staat tegenover slecht bewapende opstandelingen en hoe de veiligheid van soevereine naties in de toekomst kan worden gehandhaafd. Hij neemt ons meer op een reis van de botsingen tussen massieve legers in de vorige eeuw (met miljoenen soldaten en miljoenen doden), naar de asymmetrische high-tech schermutselingen en frustrerende moerassen van vandaag. De moderne oorlog is een mengsel van het antieke en het geavanceerd: hoogwaardige professionele legers slagen er niet in om kleine groepen van primitief uitgeruste guerrilla’s en terroristen te verslaan. Dit patroon begon met de Britse uittocht uit India en culmineerde in het rampzalige Amerikaanse optreden in Vietnaam en Irak.
      Nederlandse vertaling: De evolutie van de oorlog. Van de Marne tot Irak. Utrecht: Spectrum 2007.

    • [2009] The Culture of War
      Presidio Press. September 30, 2008.
      In theorie is oorlogvoeren slechts een middel om een doel te bereiken; een rationele, doch gewelddadige activiteit die de belangen van een groep mensen dient door het doden, verwonden of op een andere manier onschadelijk maken van hun tegenstanders. In de praktijk echter is niets minder waar. Creveld laat zien dat oorlog veel meer is dan soldaten die elkaar om welke reden ook doden. Vechten zelf kan een bron van groot, misschien zelfs het grootste, genoegen zijn. Vanuit dit genoegen en deze fascinatie is een hele cultuur onstaan: van de oorlogsschilderingen van tribale strijders tot de hedendaagse legerkleding, van de decoratieve schilden van de oude Grieken tot de neuskunst van tegenwoordig, en van de uitvinding van schaken rond 600 n. Chr. tot de meest moderne gevechtssimulators. Sinds het begin van de civilisatie heeft de oorlogscultuur zijn eigen tradities, regels en gewoontes, rituelen en ceremonies, muziek, kunst, literatuur en monumenten. De oorlogscultuur stond meestal in zeer hoog aanzien, al wordt zij in meer geavanceerde landen vaak als ‘militaristisch’ afgedaan. De waarheid echter is dat oorlogscultuur geenszins ‘nutteloos’ is. Oorlogvoeren is in de kern een irrationele activiteit is — geen enkele rationele overweging doet de soldaat besluiten om zijn leven op te offeren. Neem de oorlogscultuur weg en al dat overblijft zijn wilde hordes, zoals in Sierra Leone en Oost-Timor; of zielloze machines als de hedendaagse Bundeswehr; of mannen zonder ruggengraat, ongeschikt en niet genegen om de strijd aan te gaan.
      Nederlandse vertaling: Oorlogscultuur. Houten: Spectrum. 2009.

  109. Crosston, Matthew D.

  110. Crimes of War

  111. CyberFeed
      Niet erg interactieve kaart van cyberinfectie (niet zozeer cyberaanvallen). Presented by Anubis Networks.

  112. Cybergeddon

  113. Cyber Intelligence Center

  114. Cyberthreat Real Time Map
      Lijkt op een interactief videospel. Onder de 3-D dynamische kaart schuilen de data van diverse scanningdiensten van Kasperski. Je kunt bepaalde types kwaadaardige dreigingen selecteren, zoals email malware, aanvallen op websites, controles op kwetsbaarheid etc.
      Presented by Kaspersky.

  115. CyberWarZone (CWZ)

    Index D

  116. Dacey, Robert

  117. Danchev, Dancho

  118. DARPA - Defence Advanced Research Projects Agency [2012]

  119. DarkReading

  120. Defense Science Board (DSB)

  121. Deibert, Ronald J.

  122. Deibert, Ronald / Palfrey, John / Rafal Rohozinski / Zittran, Jonathan (eds.)
    • [2008] Access Denied: The Practice and Policy of Global Internet Filtering
      Cambridge: MIT Press, March 2008.
      Many countries around the world block or filter internet content, denying access to information that they deem too sensitive for ordinary citizens —most often about politics, but sometimes relating to sexuality, culture, or religion. Internet filtering takes place in more than three dozen states worldwide, including many countries in Asia, the Middle East, and North Africa. Related internet content-control mechanisms are also in place in Canada, the United States and a cluster of countries in Europe. Access Denied examines the political, legal, social, and cultural contexts of Internet filtering in these states from a variety of perspectives. Chapters discuss the mechanisms and politics of internet filtering, the strengths and limitations of the technology that powers it, the relevance of international law, ethical considerations for corporations that supply states with the tools for blocking and filtering, and the implications of internet filtering for activist communities that increasingly rely on Internet technologies for communicating their missions. Reports on content regulation in forty different countries follow, with each two-page country profile outlining the types of content blocked by category and documenting key findings.

    • [2010] Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace
      Cambridge: MIT Press. April 29, 2010.
      Internet filtering, censorship of Web content, and online surveillance are increasing in scale, scope, and sophistication around the world, in democratic countries as well as in authoritarian states. The first generation of internet controls consisted largely of building firewalls at key Internet gateways; China’s famous ‘Great Firewall of China’ is one of the first national internet filtering systems. Today the new tools for Internet controls that are emerging go beyond mere denial of information. These new techniques, which aim to normalize (or even legalize) Internet control, include targeted viruses and the strategically timed deployment of distributed denial-of-service (DDoS) attacks, surveillance at key points of the internet’s infrastructure, take-down notices, stringent terms of usage policies, and national information shaping strategies.

    • [2011] Access Contested: Security, Identity, and Resistance in Asian Cyberspace
      Cambridge: MIT Press. November 3, 2011.
      A daily battle for rights and freedoms in cyberspace is being waged in Asia. At the epicenter of this contest is China —home to the world’s largest Internet population and what is perhaps the world’s most advanced Internet censorship and surveillance regime in cyberspace. Resistance to China’s Internet controls comes from both grassroots activists and corporate giants such as Google. Meanwhile, similar struggles play out across the rest of the region, from India and Singapore to Thailand and Burma, although each national dynamic is unique. The authors examine the interplay of national security, social and ethnic identity, and resistance in Asian cyberspace, offering in-depth accounts of national struggles against Internet controls.

  123. Deibert, Ronald J. / Rohozinsky, Rafal

  124. Demchak, Chris C.

  125. Demchak, Chris C. / Dombrowskyi, Peter
    • [2011] The Rise of a Cybered Westphalian Age
      Strategic Studies Quarterley, 32 :32-61.
    • [2014] Cyber Westphalia. Asserting state prerogatives in cyberspace.
      In: The Georgetown Journal of International Affairs. International Engagement on Cyber iii. State Building on a New Frontier, 20: 29-38

  126. Dempsey, Martin E.

  127. DeNardis, Laura
    • [2009] Protocol Politics: The Globalization of Internet Governance
      MIT Press. July 31, 2009.
      The internet has reached a critical point. The world is running out of Internet addresses. There is a finite supply of approximately 4.3 billion IP-addresses within the prevailing technical architecture (IPv4). In the 1990s the internet standards community selected a new protocol (IPv6) that would expand the number of Internet addresses exponentially — to 340 undecillion addresses. What’s at stake politically, economically, and technically in the selection and adoption of a new internet protocol? DeNardis argues that protocols are political. IPv6 intersects with provocative topics including internet civil liberties, US military objectives, globalization, institutional power struggles, and the promise of global democratic freedoms. She offers recommendations for internet standards governance, based not only on technical concerns but on principles of openness and transparency.

    • [2014] The global war for internet governance
      New Haven: Yale University Press.
      Internet has transformed the manner in which information is exchanged and business is conducted. Despite its wide reach and powerful global influence, it is a medium uncontrolled by any one centralized system, organization, or governing body. This has given rise to all manner of free-speech issues and cybersecurity concerns. The conflicts surrounding internet governance are the new spaces where political and economic power is unfolding in the twenty-first century. DeNardis reveals the inner power structure already in place within the architectures and institutions of internet governance. She provides a theoretical framework for internet governance that takes into account the privatization of global power as well as the role of sovereign nations and international treaties. In addition, DeNardis explores what is at stake in open global controversies and stresses the responsibility of the public to actively engage in these debates, because Internet governance will ultimately determine Internet freedom.

  128. Denning, Dorothy E.

  129. Denning, Dorothy E. / Baugh, William E., Jr.

  130. Digital Attack Map
      De kaart wordt gevoed door meer dan 270 ISP klanten over de hele wereld die anoniem statistieken over netwerkverkeers- en cyberaanvallen delen.
      Gepresenteerd door Arbor Networks.

  131. Dinstein, Yoram

  132. Donoghue, Andrew

  133. Droege, Cordula

  134. Ducheine, Paul A.L.

  135. Ducheine, Paul A.L. / Haaster, Jelle van

  136. Ducheine, Paul / Osinga, Frans / Soeters, Joseph

  137. Ducheine, Paul A.L. / Voetelink, Joop E.D.

  138. Dunlap, Charles J.

    Index E

  139. EastWest Institute (EWI)

  140. EenVandaag

  141. Economist, The

  142. Ederington, L. Benjamin / Mazarr, Michael J.

  143. Electrospaces

  144. Ellis, Bryan W.

  145. Elmusharaf, Mudawi Mukhtar

  146. Enemies of the internet

  147. ENISA - European Network and Information Security Agency

  148. Erbschloe, Michael

  149. Eshel, David

  150. Esquire

  151. Ethical Hacker Network, The

  152. Euromaidan

  153. European CyberCrime Centre (EC3)

  154. European Union (EU)

  155. Europol

  156. Even, S. / Siman-Tov, D.
    • [2012] Cyber Warfare: Concepts and Strategic Trends.
      Memorandum nr. 117 of the Institute for National Security Studies (INSS).

  157. Express

  158. Exter, Martin P. van

    Index F

  159. Falliere, Nicolas

  160. FBI - Federal Bureau of Investigation

  161. Financial Times (FT)

  162. Financieel Dagblad (FD)

  163. Fleck, Dieter

  164. Fletcher, Owen

  165. Floridi, Luciano

  166. Folmer, Hans

  167. Forbes

  168. Ford, Christopher A.

  169. Foreign Affairs (FA)

  170. Foreign Policy (FP)

  171. Forum InformatikerInnen für Frieden und gesellschaftliche Verantwortung (FIfF)

  172. Fox It |

  173. Frankfurter Algemeine (FAZ)

  174. Freedman, David H. / Mann, Charles C.
    • [1997] At Large: The Strange Case of the World’s Biggest Internet Invasion
      New York: Touchstone.
      A chronicle of the massive manhunt that united hard-nosed FBI agents, computer nerds, and uptight security bureaucrats against an elusive computer outlaw who broke into highly secured computer systems at banks, universities, federal agencies, top-secret military weapons-research sites, and even into the computers that controlled central California’s dams. It is the true story of Phantom Dialer. His actions could have put tens of thousands of lives at risk. And what makes it so frightening is that he was not a criminal or computing genius. He was a curious, persistent, and mentally-challenged young man who never truly understood his own actions. Advances in the internet have been making it easier, not harder, for security crackers to go where they’re not wanted. The authors blow the lid off the frightening vulnerability of the global online network, which leaves not only systems, but also individuals, exposed.

  175. Fritz, Jason

  176. Fulghum, David A.

    Index G

  177. Gai, Jiading / Yao, Chen / Ye, Mao

  178. Gartzke, Erik

  179. Gaycken, Sandro

  180. Geers, Kenneth

  181. Gertz, Bill

  182. Gibney, Alex
    • [2016] Zero Days - Trailer
      Een documentaire thriller over oorlog in een wereld zonder regels -- de wereld van cyberoorlog. Het vertelt het verhaal over Stuxnet. Het laat zien hoe een clandestine operatie van twee bondgenoten de doos van Pandora van cyberoorlog voor altijd opende.

  183. Gjelten, Tom

  184. Glenny, Misha

  185. GlobalSecurity.org

  186. Global Security Map

  187. Goff, Peter
    • [1999] (ed.) The Kosovo News and Propaganda War.
      Vienna: International Press Institute.

  188. Goldsmith, Jack

  189. Gollmann, Dieter

  190. Goodman, Will

  191. Gray, Chris Hables

  192. Greenberg, Andy

  193. Greenberg, Lawrence, T. / Goodman, Seymour E. / Soo Hoo, Kevin J.

  194. Guardian, The

  195. Gulijk, Coen van

    Index H

  196. Hackmageddon

  197. Hadnagy, Chris

  198. Hagestad, William T.

  199. Haley, Christopher

  200. Halpern, Sue

  201. Halpin, Edward F. / Trovorrow, Philippa / Webb, David C. / Wright, Steve

  202. Handel, Michael I.

  203. Harknett, Richard J.

  204. Hastings, Max

  205. Hathaway, Oona et al.

  206. Hayden, Michael V.

  207. Heise Security

  208. Hendershott, Terence / Jones, Charles M. / Menkveld, Albert J.

  209. Henderson, Scott

  210. Hersh, Seymour Myron

  211. Herzog, Stephen

  212. Heuvel, Marten / Botterman, Maarten / Spiegeleire, Stephan de

  213. Hill, David T. / Sen, Krishna

  214. Holdaway, Eric J.

  215. Hollis, David M.

  216. Honeynet Project
    • [2012] A Real-Time Map of Global Cyberattacks
      Op de kaart zijn cyberaanvallen te zien die op dat moment in de wereld plaatsvinden. De kaart van het Honeynet Project toont zoveel aanvallen dat het lijkt alsof je naar een scene zit te kijken van een apocalyptische oorlogsfilm. Elke rode stip die oplicht als je naar de kaart gaat representeert een aanval op een computer. De gele punten representeren honeypots (systemen die zijn opgezet om inkomende aanvallen te registreren). In het zwarte veld onderaan kun je zien waar elke aanval vandaan komt. De gegevens komen van de leden van het netwerk van het Honeynet Project van honeypot sensoren. Ook al worden lang niet alle cyberaanvallen in kaart gebracht, het geeft een verbazingwekkend beeld van de hoeveelheid malware dat computernetwerken aanvalt.

  217. Hoskins, Andrew / Liu, Yi-Kai / Relkuntwar, Anil

  218. Houqing, Wang / Xingye, Zhang
    • [2000] (eds.) The Science of Military Campaigns.
      Beijing, NDU Press.

  219. Huffington Post, The

  220. Hulsma, Sander

  221. Hurwitz, Roger

    Index I

  222. IEEE Spectrum

  223. Independent

  224. Information Office of the State Council of the People’s Republic of China

  225. Information Warfare Monitor (IWM)

  226. Infowars

  227. Institut français des relations internationales (IFRI)

  228. Intelligence Online

  229. Intercept, The

  230. International Atomic Energy Agency (IAEA)
    • [01.02.2011] Stuxnet could harm nuclear safety - Yukia Amano
      Yukia Amano, de algemene directeur van het IAEA: “Stuxnet, or cyber attack as a whole, could be quite detrimental to the safety of nuclear facilities and operations.” Hij erkent dat de IAEA slechts beperkte kennis heeft over de computerworm die door sommige experts wordt beschreven als «a first-of-its-kind guided cyber missile».

  231. International Center for Security Analyses (ICSA)

  232. International Law Studies (ILS)

    Index J

  233. Japan Times, The

  234. Javers, Eamon

  235. Jerusalem Post, The

  236. Jones, Andy / Kovacich, Gerald L. / Luzwick, Perry G.

  237. Journal of Military Ethics

  238. Journal of Strategic Studies

    Index K

  239. Kaplan, Fred

  240. Karnow, Curtis E.A.

  241. KarsperskyLab |

  242. Kenyon, Henry S.

  243. Knake, Robert K.

  244. Koh, Harold Hongju
    • [2010] The Obama Administration and International Law
      Speech, American Society of International Law, 25 March 2010.
    • [2012] International Law in Cyberspace
      Harvard International Law Journal, Vol. 54.
        Presents cutting-edge issues of international law: how do we apply old laws of war to new cyber-circumstances, staying faithful to enduring principles, while accounting for changing times and technologies? Do established principles of international law apply to cyberspace? Is cyberspace a law-free zone, where anything goes? Do cyber activities ever constitute a use of force? May a State ever respond to a computer network attack by exercising a right of national self-defense? Do jus in bello rules apply to computer network attacks? Must attacks distinguish between military and nonmilitary objectives? Must attacks adhere to the principle of proportionality? How should states assess their cyber weapons? What role does state sovereignty play?

  245. Kolen, Bas

  246. Kolen, Bas / Wouters, C.A.H.

  247. Kopp, Carlo

  248. Koppel, Ted

  249. Kosina, Karin

  250. Kotler, Itzik

  251. Kramer, Franklin D. et al.
    • [2009] Cyberpower and National Security.
      Washington: NDU Press.

  252. Krebs, Brian

  253. KrebsonSecurity

  254. Krekel, Bryan

  255. Krepinevich, Andrew F.

  256. Kruit, P.J.J. van der

    Index L

  257. Ladurner, U. / Pham, K.

  258. Langner, Ralf

  259. Lawfare

  260. Lawson, Sean

  261. Leonhard, Robert

  262. Lessig, Lawrence |

  263. Leverett, Éireann

  264. Leveson, Nancy G.

  265. Lewis, James Andrew

  266. Lewis, Michael

  267. Liang, Qiao / Xiangsui, Wang

  268. Libicki, Martin C. | - Rand Corporation

  269. Liff, Adam P.

  270. Liles, Samual P.

  271. Lin, Herbert S.

  272. Lindsay, Jon R. / Cheung, Tai Ming / Reveron, Derek S.

  273. Longstaff, Tom

  274. Lips, Wouter

  275. Lonsdale, David J. - University of Hull, UK

  276. Loon, Collin E.P. van

  277. Lord, Kristin / Sharp, Travis

  278. Lucas, George, R.

  279. Lyu, Michael R.

    Index M

  280. Mandiant

  281. Maio, Paola di

  282. Malwareinfo.nl

  283. Manwaring, Max G.
    • [2001] (ed.) Deterrence in the 21st Century.
      London: Frank Cass.

  284. Markoff, John

  285. Markoff, John / Barboza, David

  286. Markoff, John / Kramer, Andrew E.

  287. McAfee

  288. McConnell, Steve

  289. McGraw, Gary
    • [2006] Software Security: Building Security In.
      Boston, NY: Addison-Wesley.

  290. McGraw, Gary / Arce, Ivan

  291. Menkveld, Albert

  292. Menthe, Darrel

  293. Meyer, Paul

  294. Militaire Spectator

  295. Military Review

  296. Mills, Elinor

  297. Ministerie van Buitenlandse Zaken

  298. Ministerie van Defensie

  299. Ministerie van Veiligheid en Justitie

  300. MIT Technology Review

  301. Mitnick, Kevin D. / Simon, William L.

  302. Missile Defense Advocacy Alliance - MDAA

  303. MIVD - Militaire Inlichtingen- en Veligiheidsdienst

  304. Molander, Roger C. / Wilson, Peter A. / Mussington, B. David / Mesic, Richard

  305. Monde, Le

  306. Morgan, Patrick M.

  307. Morozov, Evgeny |

  308. Mueller, Benjamin

  309. Mueller, John / Friedman, Benjamin

  310. Mulvenon, James C.

  311. Mulvenon, James C. / Yang, Richard H.

    Index N

  312. Nationaal CrisisCentrum (NCC)

  313. Nationaal Cyber Security Centrum (NCSC)

  314. National Interest, The

  315. National Research Council (NRC)

  316. National Security Journal (NSJ) - Harvard Law School

  317. NATO - North Atlantic Treaty Organization

  318. NBC News

  319. Nederlands Dagblad (ND)

  320. Neilson, Robert E. (ed.)
    [1997] Sun Tzu and Information War
    Washington, DC: National Defense University Press.

  321. Netkwesties

  322. NewScientist

  323. Newsweek

  324. New Yorker, The

  325. New York Times, The (NYT)

  326. Noopur, David

  327. NOS

  328. NRC

  329. NU.nl

  330. Nye, Joseph S.

    Index O

  331. O’Connel, Mary Ellen

  332. OECD

  333. Odinot, G. / Jong, D. de / Leij, J.B.J. van der / Poot, C.J. de / Straalen, E.K. van

  334. Ohlin, Jens David / Govern, Kevin / Finkelstein, Claire
    • [2015] (eds.) Cyber War: Law and Ethics for Virtual Conflicts
      Oxford University Press.
      Cyberweapons and cyberwarfare are one of the most dangerous innovations of recent years, and a significant threat to national security. Cyberweapons can imperil economic, political, and military systems by a single act, or by multifaceted orders of effect, with wide-ranging potential consequences. Cyberwarfare occupies an ambiguous status in the conventions of the laws of war. The authors address ethical and legal issues surrounding cyberwarfare by considering whether the Laws of Armed Conflict (LOAC) apply to cyberspace and the ethical position of cyberwarfare against the background of our generally recognized moral traditions in armed conflict. The authors explore these moral and legal issues and examine the key principles of jus in bello to determine how they might be applied to cyber conflicts. The distinction between civilian and combatant in this context and the level of causation necessary to elicit a response are studied and the specific operational realities implicated by particular regulatory regimes are analyzed.

  335. Ondřejka, Jan / Stojar, Richard

  336. Osawa, Jun

  337. Owens, William / Dam, Kenneth / Lin, Herbert

  338. OWNI

    Index P

  339. Paganini, Pierluigi

  340. Parool, Het

  341. PCCIP - President’s Commission on Critical Infrastructure Protection

  342. PCWorld

  343. Perrow, Charles

  344. Pont, George F. du

  345. Pollitt, Mark M.
    • [1997] Cyberterrorism Fact or Fancy?
      Proceedings of the 20th National Information Systems Security Conference, October 1997, pp. 285-289.

  346. Popular Science

  347. Pouget, Fabien / Dacier, Marc / Debar, Hervé

  348. Pouw, Eric

  349. Prince, Brian

  350. Public Intelligence

  351. Pufeng, Wang

    Index R

  352. Radasky, William A.

  353. Ranito, Jovana Jezdimirovic

  354. Ranum, Markus J.

  355. Rattray, Gregory J.

  356. Ravi, Dan / Melman, Yossi

  357. Reed, Thomas C.

  358. Reijnen, G.C.M.

  359. Reisman, W. Michael / Antoniou, Chris T.

  360. Reformatorisch Dagblad

  361. Register, The

  362. Reuters

  363. Reveron, Derek
    • [2012] (ed.) From Cybersecurity to Cyberwar
      Washington, D.C.: Georgetown University Press.
      In a very short time, individuals and companies have harnessed cyberspace to create new industries, a vibrant social space, and a new economic sphere that are intertwined with our everyday lives. At the same time, individuals, subnational groups, and governments are using cyberspace to advance interests through malicious activity. Terrorists recruit, train, and target through the Internet, hackers steal data, and intelligence services conduct espionage. Still, the vast majority of cyberspace is civilian space used by individuals, businesses, and governments for legitimate purposes. The editor brougth together scholars, policy analysts, and information technology executives to examine current and future threats to cyberspace. They discuss various approaches to advance and defend national interests, contrast the US approach with European, Russian, and Chinese approaches, and offer new ways and means to defend interests in cyberspace and develop offensive capabilities to compete there.

  364. Rid, Thomas

  365. Rid Thomas / McBurney, Peter

  366. Ronfeldt, David / Arguilla, John / Fuller, Graham E. / Fuller, Melissa

  367. Roscini, Marco
    • [2010] World Wide Warfare - Jus ad bellum and the Use of Cyber Force
      In: A. von Dogdandy / R. Wolfrum (eds.) [2010] Max Planck Yearbook of United Nations Law, Volume 14: pp. 85-130.

    • [2014] Cyber Operations and the Use of Force in International Law
      Oxford University Press.
      The internet has changed the rules of many industries, and war is no exception. But can a computer virus be classed as an act of war? Does a Denial of Service attack count as an armed attack? And does a state have a right to self-defence when cyber attacked? With the range and sophistication of cyber operations against states dramatically increasing in recent times, Roscini investigates the traditional concepts of ‘use of force’, ‘armed attack’ and ‘armed conflict’ and, through a comprehensive analysis of primary documents as well as through an extensive literature search, asks whether and how existing laws created in the analogue age can be applied in a digital age. For each rule, whether based on treaty or custom, is explained why it applies or does not apply to cyber operations. Having established a basis for contending that particular rules apply to cyber warfare, those rules are discussed in the context of each specific type of cyber operation. The book addresses questions such as whether a cyber operation amounts to a use of force and, if so, whether the victim state can exercise its right of self-defence; whether cyber operations trigger the application of international humanitarian law; what rules must be followed in the conduct of cyber hostilities; how neutrality is affected by cyber operations; whether those conducting cyber operations are combatants, civilians, or civilians taking direct part in hostilities.

  368. RSA

  369. Russell, Alison Lawler
    • [2014] Cyber Blokacdes
      Georgetown University Press.
      Cyber blockades are large-scale attacks on infrastructure or systems that aim to prevent an entire state from sending or receiving electronic data. Cyber blockades can take place through digital, physical, and/or electromagnetic means. Blockade operations have historically been considered acts of war, thus their emergence in cyberspace has significant implications for international law and for our understanding of cyber warfare. The author defines and explains the emerging concept of ‘cyber blockades’ and presents a comparison of blockade operations in five different domains —on land, at sea, in the air, in space, and in cyberspace— identifying common elements as well as important distinctions. The framework for defining cyber blockades, understanding how they occur, and considering the motivations of actors who employ them is applied with in-depth analysis of the cyber attacks on Estonia in 2007 and on Georgia during the 2008 Georgia-Russia War. Blockade operations have occurred in cyberspace and will doubtlessly be used again in the future, by both state and non-state actors alike, because of the unique advantages of this type of attack.

  370. Rutherford, Mark

  371. Ruus, Kertu

  372. Ryan, Patrick S.

    Index S

  373. Saalbach, Klaus-Peter

  374. Sanger, David E.
    • [2012] Confront and Conceal: Obama’s Secret Wars and Surprising Use of American Power
      New York: Crown.
      Sanger beschrijft hoe een nieuwe president president wordt in een wereld die in brand staat. Hij laat zien hoe Obama omgaat met de internationale conflicten en daarbij vertrouwt op innovatieve wapens en nieuwe instrumenten om de Amerikaanse supermacht te beschermen. Maar zijn poging om de Amerikaanse suprematie in de Stille Oceaan te herstellen leidde tot een nieuw tijdperk van spanningen met de grootste opkomende macht in de wereld: China.

    • [2012] Mutually assured Cyberdestruction?
      In: New York Times, 02.06.2012.

    • [2014] Syria War Stirs New U.S. Debate on Cyberattacks
      In: New York Times, 24.02.2014.

    • [2016] As Russian Hackers Probe, NATO Has No Clear Cyberwar Strategy
      In: International New York Times, 16.7.2016
      De Westerse alliantie (NATO) moet een strategie ontwikkelen om de toenemende agressieve acties van Rusland in cyberspace tegemoet te treden. De NATO heeft weliswaar aangekondigd dat een cyberaanval op een van haar lidstaten als een aanval op de hele alliantie wordt bestempeld, maar zij heeft geen agressieve tegenmaatregelen genomen tegen dagelijkse spionage van en aanvallen op Europese computernetwerken. Er wordt gesproken over deling van informatie en desknndigheid, maar er wordt niets gezegd over afschrikkingsstrategieén en vroege waarschuwingssystemen. De lidstaten zijn te terughoudend om hun offensieve capaciteiten met elkaar te delen.

  375. SANS Institute

  376. SCADAhacker.com

  377. Schaap, Arie J.

  378. Scheferman, Scott

  379. Schmitt, Michael N.

  380. Schneier, Bruce

  381. Schonfeld, Erick

  382. Schreier, Fred
    • [2012] On Cyberwarfare
      DCAF (Centre for the Democratic Control of Armed Forces).

  383. Schwartau, Winn

  384. SecureList

  385. Security Affairs - Pierluigi Paganini

  386. Security Challenges

  387. Security Week

  388. Security.nl

  389. SentinelOne

  390. Seshagiri, Girish

  391. Shackleford, Scott
    • [2009] From Nuclear War to Net War: Analogizing Cyber Attacks in International Law
      Berkeley Journal of International Law (BJIL), 25:3.

  392. Shakarian, Paulo / Lei, Hansheng / Lindelauf, Roy

  393. Sharp, Walter Gary
    • [1999] Cyberspace and the Use of Force.
      San Antonio, TX: Aegis Research Corp.

  394. Shin, Yonghee / Willams, Laurie

  395. Sicherheitstacho.eu
      Een in real-time bijgewerkte wereldkaart die laat zien waar cyberaanvallen worden uitgevoerd. Deutsche Telekom verzamelt de data van 97 sensoren die werken als lokaas-systemen (honeypots) op verschillende plekken in de wereld.

  396. Singer, Peter W.

  397. Singer, Peter W. / Cole, August
    • [2016] Ghost Fleet: A Novel of the Next World War
      Een roman die leest als science fiction, maar die stijf staat van gruwelijke details over hoe de volgende wereldoorlog zou kunnen worden uitgevochten. Kapiteins van slagschepen vechten zich door een hedendaags Pearl Harbor; gevechtspiloten duelleren met onzichbare drones; jonge hackers strijden in digitale speelplaatsen; veteraren worden gedwongen om als low-tech opstandelingen te vechten; biljonairs uit Silicon Valley mobiliseren al hun bronnen voor de cyberoorlog; en een seriemoordenaar voert haar eigen vete uit.

  398. Singer, Peter W. / Friedman, Allan

  399. Singh, Abhishek

  400. Singh, Abhishek / Lambert, Scott / Ganarcharya, Tanmay A. / Williams, Jeff

  401. SIPRI
    Trends in world military expenditure, 2012 | 2013 | 2014 | 2015

  402. Slate

  403. Smith, George C.

  404. Smith, Ron / Knight, Scott

  405. Somayaji, Anil / Hofmeyr, Steven / Forrest, Stephanie

  406. South China Morning Post (SCMP)

  407. Spiegel, Der

  408. Spitzner, Lance

  409. SpyFiles

  410. Spy Museum

  411. Sridharan, Venkatraman

  412. Standaard, de

  413. Stein, George J.

  414. Stevens, Marc

  415. Stiennon, Richard
    • [2010] Surviving Cyberwar
      Lanham: Government Institutes.
      The next major war is not likely to be fought on the battleground but in cyber space. The era of cyber warfare has already begun. Recent cyber attacks on United States government departments and the Pentagon corroborate this claim. China has compromised email servers at the German Chancellery, Whitehall, and the Pentagon. In August 2008, Russia launched a cyber attack against Georgia that was commensurate with their invasion of South Ossetia. This was the first time that modern cyber attacks were used in conjunction with a physical attack. Every day, thousands of attempts are made to hack into America’s critical infrastructure. These attacks could have devastating consequences. Stiennon outlines an effective defense against cyber threats, and explains how to prepare for future attacks.

    • [2015] There Will Be Cyberwar: How The Move To Network-Centric War Fighting Has Set The Stage For Cyberwa
      IT-Harvest Press. March 23, 2015.
      The move on the part of the US military, which began in 1996, to Network-Centric Warfare (NCW), meant the combination of sensor grids, C&C grids, and precision targeting to increase speed to command, and represented a military offset. Along with networking comes exposure to cyber attacks, attacks that will be used in future wars.

  416. Stocker, Gerfrie / Schöpf, Christine (eds.)

  417. StrategyPage

  418. Survival: Global Politics and Strategy

  419. Swimmer, Morton

  420. Symantec

    Index T

  421. Talbot, Julian / Jakeman, Miles

  422. Tan, Kheng Lee Gregory

  423. TASS

  424. Taylor, Philipo M.

  425. Team Cymru

  426. Tech Worm

  427. Ted Talk

  428. Telegraaf, De

  429. Telegraph, The

  430. Tenet, George J.
    • [2001] Statement door de directeur van CIA voor “Worldwide Threat 2001: National Security in a Changing World”.

  431. Terrorism Research Center, The (TRC)
      Een onafhankelijk instituut dat zich richt op de bestudering van terrorisme, informatie-oorlog, bescherming van critische infrastructuur en andere thema’s die de maken hebben met politiek geweld van lage intensiteit en de verschijnselen van de ‘grijze zone’.

  432. Thomas, Timothy L. - Foreign Military Studies Office, Fort Leavenworth, KS

  433. Tikk, Enekin / Kaska, Kadri / Rünnimeri, Kristel /Kert, Mari / Talihärm, Anna-Maria / Vihul, Lliis

  434. Tikk, Enekin / Kaska, Kadri / Vihul, Lliis

  435. Time

  436. Times, The

  437. TNO: Cyber Security & Resilience

  438. Todd, Graham H.

  439. Toffler, Alvin / Toffler, Heidi

  440. Trend Micro

  441. Trouw

  442. Tsang, Rose

    Index U

  443. U.S. Army Cyber Command (USCYBERCOM)
    Onderdeel van de Amerikaanse krijgsmacht dat cyberspaceoperaties coördineert en de verschillende Amerikaanse militaire netwerken op elkaar afstemt. Het is ondergeschikt aan het U.S. Strategic Command en is gevestigd in Fort George G. Meade in Maryland.
    • [05.10.2016] Battles of the future will be fought in multiple domains, senior leaders say - Sean Kimmons
      Senior leader say that he U.S. Army’s dominance is in danger when it comes to future warfare. Russia and its proxy forces used cyberattacks and electronic warfare equipment to jam communication networks, while using unmanned aerial vehicles to set up artillery fires, and advanced air defense missiles to gain air superiority without airplanes. And the Chinese military is using disputed islands in the South China Sea to influence maritime missions. General David Perkins, commander of the Army Training and Doctrine Command: “They are fracturing our way of war by using other domains.” The Army of the future must be prepared for multi-domain battle, a battle taking place not just in the domains of air and land, but also in the domains of sea, space, and cyberspace. Such an army would employ infantrymen with cyberspace skills, innovative air defense systems to deter enemy aircraft, and even ground-to-ground missiles to target enemy ships. This requires sophisticated air defense capabilities that are not currently in our unit inventories. The changing character of war is unlike anything our current force has ever experienced in intensity and lethality. The implementation the multi-domain battle concept will be heavily influenced by human-machine systems. Autonomous assistance from technology will play a role on the future battlefield, but soldiers and other military members will still be making the decisions: using machines to empower the human, not vice versa.

    • [19.10.2016] Leadership change a reflection of steady progress for Army Cyber Command - Mike Milord

  444. U.S. Cyber Consequences Unit (US-CCU)

  445. U.S. Department of Defence (DoD)

    Index V

  446. Valeriano, Brandon / Maness, Ryan C.
    • [2014] The dynamics of cyber conflict between rival antagonists, 2001-11
      In: Journal of Peace Research, 51(3): 347-360. May 2014.

    • [2015] Cyber War versus Cyber Realities: Cyber Conflict in the International System
      Oxford University Press.
      Much of the talk centered on the concept of cyber conflict and the changing dynamic of future conflict is founded on the study of spectacular flights of imagination of what could be. This book enters into the debate to push discussion of the issue toward realistic evaluation of the tactic in modern international interactions. It examines information on all cyber incidents and disputes in the last decade in order to delineate the patterns of cyber conflict as reflected by evidence. The goal is to develop a theory of cyber conflict, analyze the empirical patterns of cyber conflict between antagonists, investigate the impact of cyber conflict on foreign policy interactions, delve deeper with a close examination of some recent and popular cyber incidents, and finally, develop a set of policy recommendations that deal with the emerging threat. The authors argue that restraint is the norm in cyberspace and suggests that there is evidence this norm can influence how the tactic is used in the future.

  447. Vanity Fair

  448. Veeramachaneni, Kaylan / Arnaldo, Ignacia e.o.

  449. Ventre, Daniel
    • [2007] La guerre de l’information
      Hermes-Lavoisier. October 2007.

    • [2009] Information Warfare
      Wiley-ISTE. October 12, 2009.
      An introduction to the concept of information warfare, covering its evolution over the last decade and its developments among China, Russia, Japan, India, and Singapore. Ventre describes various conceptions of information warfare, along with how they function in military, diplomatic, political, and economic contexts. Notable cyber attacks are analyzed, the challenges faced by countries who fail to secure their cyberspace (Japan, the US, etc.) are enumerated, and ways to distinguish between cybercrime, cyberwarfare, and cyberterrrorism are discussed.

    • [2010] (ed.) Cyberguerre et guerre de l’information. Stratégies, règles, enjeux
      Hermes-Lavoisier. July 2010.
      Cyberspace is a theater of expression and confrontation of power on which state and non state actors perform. Faced with the broad spectrum of cyber attacks, many states, including France, have put cybersecurity to the rank of national security and defense. This book offers a reflection on the key concepts of ‘information warfare’ and ‘cyber war’ in order to understand the mechanisms, logicsand modalities that characterize the balance of power within of cyberspace. The historical, strategic and operational dimension cyber attacks are described.

    • [2011a] Cyberespace et acteurs du cyberconflit
      Hermes-Lavoisier. April 2011.

    • [2011b] Cyberattaque et Cyberdéfense | idem (Google Books)
      Hermes-Lavoisier. August 2011.

    • [2011c] (ed.) Cyberwar and Information Warfare | idem (Google Books)
      Wiley-ISTE. August 15, 2011.
      Integrating empirical, conceptual, and theoretical approaches, Ventre presents the thinking of researchers and experts in the fields of cybersecurity, cyberdefense, and information warfare. The processes of information warfare and cyberwarfare is analyzed through the historical, operational and strategic perspectives of cyberattacks.

    • [2012a] Israël: cyberdéfense et cyberguerre
      01net.entreprises, 30.02.2012.
    • [2012b] (ed.) Cyber Conflict: Competing National Perspectives
      Wiley-ISTE. April 2012.
      Includes: (2) Cuba: Towards an Active Cyber-defense; (3) French Perspectives on Cyber-conflict; (6) Cyberspace in Japan’s New Defense Strategy; (10) Conclusion.

    • [2015] (ed.) Chinese Cybersecurity and Defense
      Wiley-ISTE. April 20, 2015.
      Cyberdefense has become a major issue on the international scene. China is observed, criticized, and designated by many states as a major player in the global cyber-insecurity. The U.S. is building their cyberdefense strategy against the «Chinese threat». It is therefore important to better understand today’s challenges related to cyber dimension in regard of the rise of China. Contributions from international researchers provide cross perspectives on China, its strategies and policies for cybersecurity and cyberdefense. These issues have now gained major strategic dimension: Is Cyberspace changing the scene of international relations? How China does apprehend cybersecurity and cyberdefense? What are the issues, challenges? What is the role of China in the global cyberspace?

  450. Vitel, Philippe / Bliddal, Henrik

  451. Voetelink, Joop

  452. Volkskrant, De (VK)

  453. VPRO

  454. Vrij Nederland (VN)

    Index W

  455. Wall Street Journal, The (WSJ)

  456. Waltz, Edward

  457. Walzer, Michael

  458. War is Boring

  459. Warbroek, Boudewijn

  460. Washington Post, The (WP)

  461. Washington Times, The

  462. Waterman, Shaun

  463. Waxman, Matthew C.
    • [2011] Cyber-Attacks and the Use of Force
      In: Yale Journal of International Law, 36(2): 421-59.

    • [2013] Self-Defensive Force Against Cyber Attacks: Legal, Strategic and Political Dimensions
      In: International Law Studies, 89.
      When does a cyber-attack or threat of cyber-attack give rise to a right of self-defense — including armed self-defense — and when should it? Waxman examines these questions through three lenses: (1) a legal perspective: the range of reasonable interpretations of self-defense rights as applied to cyber-attacks, and the relative merits of interpretations within that range; (2) a strategic perspective: linking a purported right of armed self-defense to long-term policy interests including security and stability; and (3) a political perspective: considering the situational context in which government decision-makers will face these issues and predictive judgments about the reactions to cyber-crises of influential actors in the international system. Waxman shows specifically how development of politics, strategy, and law will likely play out interdependently with respect to particular cyber-attacks.

  464. Webroot

  465. Webwereld

  466. Weiss, Joseph

  467. Welt, Die

  468. Werber, Niels

  469. Werner, Kathrin

  470. Whitman, Michael E. / Mattord, Verma

  471. Wikipedia

  472. Wikileaks

  473. Williams, Phil

  474. Winkler, Ira

  475. Wired

  476. Wittes, Benjamin / Blum. Gabriella
    • [2015] The Future of Violence: Robots and Germs, Hackers and Drones — Confronting A New Age of Threat
      From drone warfare in the Middle East to digital spying by the NSA, the U.S. government has harnessed the power of cutting-edge technology to awesome effect. But what happens when ordinary people have the same tools at their fingertips? Advances in cybertechnology, biotechnology, and robotics mean that more people than ever before have access to potentially dangerous technologies —from drones to computer networks and biological agents— which could be used to attack states and private citizens alike. If national governments can no longer adequately protect us from harm, they will lose their legitimacy. Governments, companies, and citizens must rethink their security efforts to protect lives and liberty. In this brave new world where many little brothers are as menacing as any Big Brother, safeguarding our liberty and privacy may require strong domestic and international surveillance and regulatory controls.

  477. World Economic Forum (WEF) |
    • [2011] Global Agenda Council on Organized Crime

    • [2016] Understanding Systemic Cyber Risk
      An attempt to advance the dialogue on systemic cyber risk by defining «systemic cyber risk» and examining the ecosystem of digital connectivity. From here, government and industry must collaborate to develop the solutions that will secure the promise of Fourth Industrial Revolution.

  478. Woude, Maurice R. van der

  479. WRR - Wetenschappelijke Raad van het Regeringsbebeleid

  480. Wyke, James

    Index X

  481. Xinhuanet
      Xinhua (China Nieuws) dat rechtstreeks onder het kabinet valt, is hét persbureau dat de officiële standpunten van de Chinese overheid naar buiten brengt. De nieuwssite publiceert haar berichten in zes buitenlandse talen: Engels, Frans, Spaans, Russisch, Arabisch, Japans. Er werken zo’n 15.000 mensen bij Xinhua, waarvan ongeveer 7.000 journalisten.

    Index Y

  482. Yahoo! News

  483. Yoo, Christopher S.
    • [2015] Cyber Espionage or Cyberwar?: International Law, Domestic Law, and Self-Protective Measures
      ). Faculty Scholarship. Paper 1540.
      Scholars have spent considerable effort determining how the law of war (particularly jus ad bellum and jus in bello) applies to cyber conflicts, epitomized by the Tallinn Manual on the International Law Applicable to Cyber Warfare. Many prominent cyber operations fall outside the law of war, including the surveillance programs that Edward Snowden has alleged were conducted by the National Security Agency, the distributed denial of service attacks launched against Estonia and Georgia in 2007 and 2008, the 2008 Stuxnet virus designed to hinder the Iranian nuclear program, and the unrestricted cyber warfare described in the 1999 book by two Chinese army colonels. Such conduct is instead relegated to the law of espionage and is thus governed almost entirely by domestic law. The absence of an overarching international law solution to this problem heightens the importance of technological self-protective measures.

  484. YouTube

    Index Z

  485. ZDNet

  486. Zetter, Kim

  487. Zhu, Bonnie / Joseph, Anthony / Sastry, Shankar

  488. Ziolkowski, Katherina J.

  489. Zittran, Jonathan

Index


Home Onderwerpen Zoek Over ons Doneer Contact

08 June, 2017
Eerst gepubliceerd: Jan, 2015