Home Onderwerpen Zoek Over ons Doneer Contact

Bronnen over CyberOorlog

Sources on Cyber War

dr. Albert Benschop
Universiteit van Amsterdam
First edition: 2001 — Last edition: 27 April, 2017

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Bij de teksten
rode_knop Oorlog in Cyberspace — Internet als slagveld
Index Amerika vs. Rusland — Cyberoorlog in 2016
Index Rusland vs. Oekraïne — Een nieuwe fase in de cyberoorlog?
rode_knop Doemsdag in Cyberspace — Een hypothetische constructie
rode_knop Internationaal Cyberspace Verdrag — Ontwerp voor een demilitarisering van cyberspace
Index Kwetsbare slimme woningen — Hoe veilig is mijn thuisnetwerk?

    A

  1. Adams, Gordon / Ben-Ari, Guy

  2. Adhikari, Richard

  3. Addicott, Jeffrey F.

  4. Aid, Matthew M.

  5. AIV - Adviesraad Internationale Vraagstukken

  6. AIVD - Algemene Inlichtingen- en Veiligheidsdienst

  7. Alberts, David S.

  8. Alberts, David S. / Garstka, John J. / Hayes, Richard E. / Signori, David A.

  9. Alberts, David S. / Hayes, Richard E.

  10. Alberts, David S. / Papp, Daniel S.

  11. Ale, Ben

  12. Alexander, Keith B.

  13. Alford, Lionel D.

  14. Aljazeera

  15. Anderson, Ross J.

  16. Andress, Jason / Winterfeld, Steve

  17. AP

  18. ARD

  19. Armed Forces Journal (AFJ)

  20. Armed Forces & Society (AFS)

  21. Armistead, Leigh

  22. Arquilla, John J.

  23. Arquilla, John J. / Ronfeldt, David F.

  24. Ars Technica

  25. ARTE
    • [15.03.2014] Netwars - Krieg im Netz [53:00]
      Een documentaire van Marcel Kolvenbach die duikt in de verborgen wereld van cyberoorlog. Het sporenonderzoek leidt van de fabrikanten van cyberwapens in Israél, via de rode hackers in China naar de allergrootste hackersconferentie in Amerika. De documentaire begint met een uitspraak van Ian West, directeur cyberveiligheid bij de Nato: “Een enkeling met een laptop kan tegenwoordig meer vernietiging teweegbrengen als een conventioneel wapen zoals een bom!”

  26. Asia Times

  27. Atlantic, The

  28. Attrition.org
      Een groep die ‘Web defacements’ en andere typen cybermisdaad in de gaten houdt.

  29. Automatiseringsgids

  30. Aviationist, The

  31. Axelrod, Robert / Iliev, Rumen

  32. Azerbaijan Press Agency (APA)

    Index B

  33. Baker, Stewart A. / Dunlap, Charles J.

  34. Balthrop, Justin / Forrest, Stephanie / Newman, M.E.J. / Williamson, Matthew M.

  35. Bamford, James |

  36. Baocun, Wang / Fei, Li
    • [1997] Information warfare
      In: Pillsbury, M (ed.) Chinese views of future warfare.
      Washington, DC: National Defense University Press.

  37. Barford, Paul / Yegneswaran, Vinod

  38. Barkham, Jason

  39. BBC

  40. Beaver, Kevin

  41. Beckett, Donald M. / Putnam, Douglas T.

  42. Beer, Thomas

  43. Beidleman, Scott W.
    • [2010] Defining and Deterring Cyber War
      In: Caton, Jeffre L. / Dauber, Cori E. / Groh Jeffrey L. / Smith David J. [2010] Information as Power.
      U.S. Army War College, pp. 69-88.

  44. Bendrath, Ralf

  45. Bergen, Jurre van

  46. Bergman, Ronen

  47. Betz, David J. / Stevens, Tim

  48. Bhattacharjee, Supriyo

  49. Bieber, Florian

  50. Bilge, Leyla / Dumitras, Tudor

  51. Bits of Freedom (BoF)

  52. Blainey, Geoffrey
    • [1973/88] The Causes of War
      New York: Free Press.
      A study on the causes of war that includes a complete discussion of World War II and the road towards nuclear war. Analyzing all international wars since 1700, this book solves the riddle of why some wars are long and some are short, and demonstrates how the outbreak of peace offers insight into the outbreak of war. Proving that war and peace are alternating phases of a relationship between rival nations, it offers a crucial understanding of international armed conflict.

  53. Blank, Stephen

  54. Bloomberg

  55. Blunden, Bill

  56. Boddens Hosang, J.F.R.
    • [2003] Rules of Engagement: het politiek juridische struikelblok voor de militaire commandant.
      Militair Rechtelijk Tijdschrift, 9.

  57. Boer, Linanne / Lodder, Arno R.

  58. Bogaard, P.L.

  59. Bontchev, Vesselin

  60. Boothby, William

  61. Brenner, Susan W.
    • [2002] Organized Cybercrime? How Cyberspace May Affect the Structure of Criminal Relationships
      North Caroline Journal of Law and Technology 4:1-40.

    • [2009] Cyber Threats: The Emerging Fault Lines of the Nation State
      Oxford University Press.
      As new technologies develop, terrorist groups are developing new methods of attack by using the Internet, and by using cyberspace as a battlefield, it has become increasingly difficult to discover the identity of attackers and bring them to justice. The seemingly limitless boundaries of cyberspace have allowed virtually anyone to launch an attack from a remote and anonymous location. But once these attacks occur, it raises several important questions. Who should respond, and how? How should nation-states effectively deal with a cyber-attack? Will the United States and other nation-states be able to survive in a world where virtual boundaries are limitless? Susan Brenner gives a thorough explanation of how military and law enforcement personnel respond to these attacks and why bringing cyber-terrorist to justice can be difficult and sometimes impossible.

  62. Brewin, Bob

  63. Brito, Jerry / Watkins, Tate

  64. Broos, Elly / Vogelaar, Ad / Fenema, Paul C. van
    • [2012] The Human Factor in Cyber Defense: Individual and Organisational Resilience.
      In: Ducheine/Osinga/Soeters 2012:225-242.

  65. Bulletin of the Atomic Scientist

  66. Bundesamt für Sicherheit in der Informationstechnik (BSI)

  67. Burnett, Mark

  68. Burton, Joe - Victoria University of Wellington, New Zealand

  69. Business Insider

  70. Buzan, Barry / Wæver, Ole / Wilde, Jaap de

  71. Byers, Michael

    Index C

  72. Campen, Alan / Dearth, Douglas / Goodden, R.T.

  73. Canvas

  74. Carr, Jeffrey

  75. Cavelty, Myriam Dunn

  76. CBS News

  77. Center for International Security and Cooperation (CISAC) - Stanford

  78. Center for Strategic & International Studies (CSIS)

  79. CERT-UK

  80. Charney, Scott

  81. Chesterman, Simon

  82. ChinaDaily |

  83. Choo, Kim-Kwang, Raymond

  84. Choucri, Nazli

  85. Christian Science Monitor

  86. Church, William
    • [1997] Information Warfare Threat Analysis for the United States of America. Part Two: How Many Terrorists Fit on a Computer Keyboard?
      In: Journal of Infrastructural Warfare.

  87. Cimpean, Dan / Meire, Johan

  88. Citizen Lab

  89. Clapper, James R.

  90. Clarke, Richard A. / Knake, Robert K.
    • [2010] Cyber War: The Next Threat to National Security and What to Do About It.
      New York: Ecco/HarperCollins.
      Online te lezen zijn de Introduction en Hfst. 1: Trial Runs

  91. CNN

  92. Coalson, Robert

  93. Cohen, F.

  94. Collin, Barry

  95. Colson, Will

  96. Computable

  97. Connolly, Chris

  98. Cook, Richard I.

  99. Cooper, Ricky A. / Van Vliet, Ben

  100. Cordesman, Anthony H. / Cordesman, Justin G.

  101. Cornish, Paul / Livingstone, David / Clemente, Dave

  102. Correspondent, De

  103. Crawford, J. W.

  104. Creveld, Martin L. van
    • [1987] Command in War
      Harvard University Press. January 1, 1987.
      Gedetailleerde analyse van het probleem van systemen van militair commando in historisch perspectief: Napoleon, Van Moltke, Israël 1967-73, Verenigde Staten in Vietnam. Succesvolle commandosystemen maken geen gebruik van doorbraaktechnologie, maar organiseerden zichzelf zodanig dat zij met minder informatie konden functioneren. Dit is enerzijds mogelijk door de organisatie zodanig compact te maken dat er minder communicatie nodig is (bijv. de falanx), anderzijds door het zodanig decentraliseren van de besluitvorming dat informatie niet ver omhoog of omlaag in de organisatie moet stromen. Deze informationele efficiëntie wordt gecombineerd met een ‘gerichte telescoop’ die commandanten in staat stelt om zich in detail te concentreren op essentiële punten in het systeem. Tenslotte zijn er informele informatiekanalen die de wielen van het formele communicatiesysteem draaiende houden en het mogelijk maken om in noodsituaties tijdelijk het formele systeem te omzeilen.

    • [1989] Technology and War. From 2000 B.C. to the Present
      New York: Free Press. Creveld analyseert het gebruik van technologie over de afgelopen 4.000 jaar en gevolgen voor militaire organisatie, bewapening, logistiek, inlichtingen, communicatie, transport en commando.

    • [1991] The Transformation of War: The Most Radical Reinterpretation of Armed Conflict Since Clausewitz
      Free Press. March 31, 1991.
      Sinds 1945 waren de meeste oorlogen conflicten met een lage intensiteit. In termen van aantal slachtoffers en bereikte politieke resultaten zijn ze onvergelijkbaar met conventionele oorlogen. Creveld analyseert een aantal militaire conflicten tussen reguliere en irreguliere strijdkrachten in Vietnam, Libanon, Afghanistan en elders. Naarmate kleinschalige oorlogen zich verspreiden zullen conventionele strijdkrachten inkrimpen. De last van het beschermen van de samenleving zal verschuiven naar de bloeiende beveiligingsondernemingen. De theorieén van Karl von Clausewitz, die de basis vormde voor het Westerse strategisch denken, zijn grotendeels irrelevant voor niet-politieke oorlogen zoals de islamitische jihad en de overlevingsoorlogen zoals de zesdaagse oorlog van Israél. Aan het monopolie op fysiek geweld door grotere natie-staten komt een einde. Dit monopolie wordt vervangen door een brede schakering van ‘niet-statelijke actoren’ die verantwoordelijk zijn voor bedreigingen van de nationale veiligheid. In de toekomst worden de oorlogen uitgevochten door terroristische groeperingen, guerrilla’s en bandieten die gemotiveerd worden door fanatieke, ideologische loyaliteiten. Conventionele gevechten worden vervangen door schermutselingen, bombardementen en afslachtingen. De wapens zullen eerder minder dan meer geavanceerd worden. De high-tech wapenindustrie zal als een kaartenhuis instorten.

    • [1993] Nuclear Proliferation and the Future of Conflict
      New York: Free Press. December 1993. Sinds het einde van de Koude Oorlog is de mogelijkheid van een nucleaire oorlog tussen twee supermachten aanzienlijk kleiner geworden. We maken ons zorgen om kleinere conflicten (tussen Noord- en Zuid-Korea, China en India, India en Pakistan, Israél en de Arabische staten) en vrezen dat frustratie of verbittering ertoe zal leiden dat er naar laatste, ultieme maatregelen wordt gegrepen. Creveld stelt de vraag of angst en respect voor nucleaire wapens voldoende zal zijn om hun gebruik te voorkomen ondanks de haat die zo kenmerkend is voor veel oude regionale rivaliteiten.

    • [1999] The Rise and Decline of the State
      Cambridge University Press. August 28, 1999.
      Een synopsis van de opkomst van de natie-staten en van de krachten die tot hun ondergang kunnen leiden. Creveld analyseert de evolutie van staten door de eeuwen heen en over de hele wereld: voor de staat (prehistorie - 1300 v. Chr.), de opkomst van de staat (1300-1648), de staat als een instrument (1648-1789), de staat als een ideaal (1789-1945), de verspreiding van de staat (1696-1975) en het verval van de staat (1975-?).

    • [1999] De wil tot oorlog
      Interview van Rutger van der Hoeven met Creveld in De Groene Amsterdammer, 31.3.1999

    • [2006] The Changing Face of War: Lessons of Combat, from the Marne to Iraq
      Presidio Press.
      Creveld brengt in dit boek al zijn expertise op het gebied van militaire geschiedenis en strategie bijeen. Hij laat zien waarom machtige staande legers tegenwoordig hulpeloos staat tegenover slecht bewapende opstandelingen en hoe de veiligheid van soevereine naties in de toekomst kan worden gehandhaafd. Hij neemt ons meer op een reis van de botsingen tussen massieve legers in de vorige eeuw (met miljoenen soldaten en miljoenen doden), naar de asymmetrische high-tech schermutselingen en frustrerende moerassen van vandaag. De moderne oorlog is een mengsel van het antieke en het geavanceerd: hoogwaardige professionele legers slagen er niet in om kleine groepen van primitief uitgeruste guerrilla’s en terroristen te verslaan. Dit patroon begon met de Britse uittocht uit India en culmineerde in het rampzalige Amerikaanse optreden in Vietnaam en Irak.
      Nederlandse vertaling: De evolutie van de oorlog. Van de Marne tot Irak. Utrecht: Spectrum 2007.

    • [2009] The Culture of War
      Presidio Press. September 30, 2008.
      In theorie is oorlogvoeren slechts een middel om een doel te bereiken; een rationele, doch gewelddadige activiteit die de belangen van een groep mensen dient door het doden, verwonden of op een andere manier onschadelijk maken van hun tegenstanders. In de praktijk echter is niets minder waar. Creveld laat zien dat oorlog veel meer is dan soldaten die elkaar om welke reden ook doden. Vechten zelf kan een bron van groot, misschien zelfs het grootste, genoegen zijn. Vanuit dit genoegen en deze fascinatie is een hele cultuur onstaan: van de oorlogsschilderingen van tribale strijders tot de hedendaagse legerkleding, van de decoratieve schilden van de oude Grieken tot de neuskunst van tegenwoordig, en van de uitvinding van schaken rond 600 n. Chr. tot de meest moderne gevechtssimulators. Sinds het begin van de civilisatie heeft de oorlogscultuur zijn eigen tradities, regels en gewoontes, rituelen en ceremonies, muziek, kunst, literatuur en monumenten. De oorlogscultuur stond meestal in zeer hoog aanzien, al wordt zij in meer geavanceerde landen vaak als ‘militaristisch’ afgedaan. De waarheid echter is dat oorlogscultuur geenszins ‘nutteloos’ is. Oorlogvoeren is in de kern een irrationele activiteit is — geen enkele rationele overweging doet de soldaat besluiten om zijn leven op te offeren. Neem de oorlogscultuur weg en al dat overblijft zijn wilde hordes, zoals in Sierra Leone en Oost-Timor; of zielloze machines als de hedendaagse Bundeswehr; of mannen zonder ruggengraat, ongeschikt en niet genegen om de strijd aan te gaan.
      Nederlandse vertaling: Oorlogscultuur. Houten: Spectrum. 2009.

  105. Crosston, Matthew D.

  106. Crimes of War

  107. CyberFeed
      Niet erg interactieve kaart van cyberinfectie (niet zozeer cyberaanvallen). Presented by Anubis Networks.

  108. Cybergeddon

  109. Cyber Intelligence Center

  110. Cyberthreat Real Time Map
      Lijkt op een interactief videospel. Onder de 3-D dynamische kaart schuilen de data van diverse scanningdiensten van Kasperski. Je kunt bepaalde types kwaadaardige dreigingen selecteren, zoals email malware, aanvallen op websites, controles op kwetsbaarheid etc.
      Presented by Kaspersky.

  111. CyberWarZone (CWZ)

    Index D

  112. Dacey, Robert

  113. Danchev, Dancho

  114. DARPA - Defence Advanced Research Projects Agency [2012]

  115. DarkReading

  116. Defense Science Board (DSB)

  117. Deibert, Ronald J.

  118. Deibert, Ronald / Palfrey, John / Rafal Rohozinski / Zittran, Jonathan (eds.)
    • [2008] Access Denied: The Practice and Policy of Global Internet Filtering
      Cambridge: MIT Press, March 2008.
      Many countries around the world block or filter internet content, denying access to information that they deem too sensitive for ordinary citizens —most often about politics, but sometimes relating to sexuality, culture, or religion. Internet filtering takes place in more than three dozen states worldwide, including many countries in Asia, the Middle East, and North Africa. Related internet content-control mechanisms are also in place in Canada, the United States and a cluster of countries in Europe. Access Denied examines the political, legal, social, and cultural contexts of Internet filtering in these states from a variety of perspectives. Chapters discuss the mechanisms and politics of internet filtering, the strengths and limitations of the technology that powers it, the relevance of international law, ethical considerations for corporations that supply states with the tools for blocking and filtering, and the implications of internet filtering for activist communities that increasingly rely on Internet technologies for communicating their missions. Reports on content regulation in forty different countries follow, with each two-page country profile outlining the types of content blocked by category and documenting key findings.

    • [2010] Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace
      Cambridge: MIT Press. April 29, 2010.
      Internet filtering, censorship of Web content, and online surveillance are increasing in scale, scope, and sophistication around the world, in democratic countries as well as in authoritarian states. The first generation of internet controls consisted largely of building firewalls at key Internet gateways; China’s famous ‘Great Firewall of China’ is one of the first national internet filtering systems. Today the new tools for Internet controls that are emerging go beyond mere denial of information. These new techniques, which aim to normalize (or even legalize) Internet control, include targeted viruses and the strategically timed deployment of distributed denial-of-service (DDoS) attacks, surveillance at key points of the internet’s infrastructure, take-down notices, stringent terms of usage policies, and national information shaping strategies.

    • [2011] Access Contested: Security, Identity, and Resistance in Asian Cyberspace
      Cambridge: MIT Press. November 3, 2011.
      A daily battle for rights and freedoms in cyberspace is being waged in Asia. At the epicenter of this contest is China —home to the world’s largest Internet population and what is perhaps the world’s most advanced Internet censorship and surveillance regime in cyberspace. Resistance to China’s Internet controls comes from both grassroots activists and corporate giants such as Google. Meanwhile, similar struggles play out across the rest of the region, from India and Singapore to Thailand and Burma, although each national dynamic is unique. The authors examine the interplay of national security, social and ethnic identity, and resistance in Asian cyberspace, offering in-depth accounts of national struggles against Internet controls.

  119. Deibert, Ronald J. / Rohozinsky, Rafal

  120. Demchak, Chris C.

  121. Demchak, Chris C. / Dombrowskyi, Peter
    • [2011] The Rise of a Cybered Westphalian Age
      Strategic Studies Quarterley, 32 :32-61.
    • [2014] Cyber Westphalia. Asserting state prerogatives in cyberspace.
      In: The Georgetown Journal of International Affairs. International Engagement on Cyber iii. State Building on a New Frontier, 20: 29-38

  122. Dempsey, Martin E.

  123. DeNardis, Laura
    • [2009] Protocol Politics: The Globalization of Internet Governance
      MIT Press. July 31, 2009.
      The internet has reached a critical point. The world is running out of Internet addresses. There is a finite supply of approximately 4.3 billion IP-addresses within the prevailing technical architecture (IPv4). In the 1990s the internet standards community selected a new protocol (IPv6) that would expand the number of Internet addresses exponentially — to 340 undecillion addresses. What’s at stake politically, economically, and technically in the selection and adoption of a new internet protocol? DeNardis argues that protocols are political. IPv6 intersects with provocative topics including internet civil liberties, US military objectives, globalization, institutional power struggles, and the promise of global democratic freedoms. She offers recommendations for internet standards governance, based not only on technical concerns but on principles of openness and transparency.

    • [2014] The global war for internet governance
      New Haven: Yale University Press.
      Internet has transformed the manner in which information is exchanged and business is conducted. Despite its wide reach and powerful global influence, it is a medium uncontrolled by any one centralized system, organization, or governing body. This has given rise to all manner of free-speech issues and cybersecurity concerns. The conflicts surrounding internet governance are the new spaces where political and economic power is unfolding in the twenty-first century. DeNardis reveals the inner power structure already in place within the architectures and institutions of internet governance. She provides a theoretical framework for internet governance that takes into account the privatization of global power as well as the role of sovereign nations and international treaties. In addition, DeNardis explores what is at stake in open global controversies and stresses the responsibility of the public to actively engage in these debates, because Internet governance will ultimately determine Internet freedom.

  124. Denning, Dorothy E.

  125. Denning, Dorothy E. / Baugh, William E., Jr.

  126. Digital Attack Map
      De kaart wordt gevoed door meer dan 270 ISP klanten over de hele wereld die anoniem statistieken over netwerkverkeers- en cyberaanvallen delen.
      Gepresenteerd door Arbor Networks.

  127. Dinstein, Yoram

  128. Donoghue, Andrew

  129. Droege, Cordula

  130. Ducheine, Paul A.L.

  131. Ducheine, Paul A.L. / Haaster, Jelle van

  132. Ducheine, Paul / Osinga, Frans / Soeters, Joseph

  133. Ducheine, Paul A.L. / Voetelink, Joop E.D.

  134. Dunlap, Charles J.

    Index E

  135. EastWest Institute (EWI)

  136. EenVandaag

  137. Economist, The

  138. Ederington, L. Benjamin / Mazarr, Michael J.

  139. Electrospaces

  140. Ellis, Bryan W.

  141. Elmusharaf, Mudawi Mukhtar

  142. Enemies of the internet

  143. ENISA - European Network and Information Security Agency

  144. Erbschloe, Michael

  145. Eshel, David

  146. Esquire

  147. Ethical Hacker Network, The

  148. Euromaidan

  149. European CyberCrime Centre (EC3)

  150. European Union (EU)

  151. Europol

  152. Even, S. / Siman-Tov, D.
    • [2012] Cyber Warfare: Concepts and Strategic Trends.
      Memorandum nr. 117 of the Institute for National Security Studies (INSS).

  153. Express

  154. Exter, Martin P. van

    Index F

  155. Falliere, Nicolas

  156. FBI - Federal Bureau of Investigation

  157. Financial Times (FT)

  158. Financieel Dagblad (FD)

  159. Fleck, Dieter

  160. Fletcher, Owen

  161. Floridi, Luciano

  162. Folmer, Hans

  163. Forbes

  164. Ford, Christopher A.

  165. Foreign Affairs (FA)

  166. Foreign Policy (FP)

  167. Forum InformatikerInnen für Frieden und gesellschaftliche Verantwortung (FIfF)

  168. Fox It |

  169. Frankfurter Algemeine (FAZ)

  170. Freedman, David H. / Mann, Charles C.
    • [1997] At Large: The Strange Case of the World’s Biggest Internet Invasion
      New York: Touchstone.
      A chronicle of the massive manhunt that united hard-nosed FBI agents, computer nerds, and uptight security bureaucrats against an elusive computer outlaw who broke into highly secured computer systems at banks, universities, federal agencies, top-secret military weapons-research sites, and even into the computers that controlled central California’s dams. It is the true story of Phantom Dialer. His actions could have put tens of thousands of lives at risk. And what makes it so frightening is that he was not a criminal or computing genius. He was a curious, persistent, and mentally-challenged young man who never truly understood his own actions. Advances in the internet have been making it easier, not harder, for security crackers to go where they’re not wanted. The authors blow the lid off the frightening vulnerability of the global online network, which leaves not only systems, but also individuals, exposed.

  171. Fritz, Jason

  172. Fulghum, David A.

    Index G

  173. Gai, Jiading / Yao, Chen / Ye, Mao

  174. Gaycken, Sandro

  175. Geers, Kenneth

  176. Gibney, Alex
    • [2016] Zero Days - Trailer
      Een documentaire thriller over oorlog in een wereld zonder regels -- de wereld van cyberoorlog. Het vertelt het verhaal over Stuxnet. Het laat zien hoe een clandestine operatie van twee bondgenoten de doos van Pandora van cyberoorlog voor altijd opende.

  177. Gjelten, Tom

  178. Glenny, Misha

  179. GlobalSecurity.org

  180. Global Security Map

  181. Goff, Peter
    • [1999] (ed.) The Kosovo News and Propaganda War.
      Vienna: International Press Institute.

  182. Goldsmith, Jack

  183. Gollmann, Dieter

  184. Goncharev, Max

  185. Goodman, Will

  186. Gray, Chris Hables

  187. Greenberg, Andy

  188. Greenberg, Lawrence, T. / Goodman, Seymour E. / Soo Hoo, Kevin J.

  189. Guardian, The

  190. Gulijk, Coen van

    Index H

  191. Hackmageddon

  192. Hadnagy, Chris

  193. Hagestad, William T.

  194. Haley, Christopher

  195. Halpern, Sue

  196. Halpin, Edward F. / Trovorrow, Philippa / Webb, David C. / Wright, Steve

  197. Handel, Michael I.

  198. Harknett, Richard J.

  199. Hastings, Max

  200. Hathaway, Oona et al.

  201. Hayden, Michael V.

  202. Heise Security

  203. Hendershott, Terence / Jones, Charles M. / Menkveld, Albert J.

  204. Henderson, Scott

  205. Hersh, Seymour Myron

  206. Herzog, Stephen

  207. Heuvel, Marten / Botterman, Maarten / Spiegeleire, Stephan de

  208. Hill, David T. / Sen, Krishna

  209. Holdaway, Eric J.

  210. Hollis, David M.

  211. Honeynet Project
    • [2012] A Real-Time Map of Global Cyberattacks
      Op de kaart zijn cyberaanvallen te zien die op dat moment in de wereld plaatsvinden. De kaart van het Honeynet Project toont zoveel aanvallen dat het lijkt alsof je naar een scene zit te kijken van een apocalyptische oorlogsfilm. Elke rode stip die oplicht als je naar de kaart gaat representeert een aanval op een computer. De gele punten representeren honeypots (systemen die zijn opgezet om inkomende aanvallen te registreren). In het zwarte veld onderaan kun je zien waar elke aanval vandaan komt. De gegevens komen van de leden van het netwerk van het Honeynet Project van honeypot sensoren. Ook al worden lang niet alle cyberaanvallen in kaart gebracht, het geeft een verbazingwekkend beeld van de hoeveelheid malware dat computernetwerken aanvalt.

  212. Hoskins, Andrew / Liu, Yi-Kai / Relkuntwar, Anil

  213. Houqing, Wang / Xingye, Zhang
    • [2000] (eds.) The Science of Military Campaigns.
      Beijing, NDU Press.

  214. Huffington Post, The

  215. Hulsma, Sander

  216. Hurwitz, Roger

    Index I

  217. IEEE Spectrum

  218. Independent

  219. Information Office of the State Council of the People’s Republic of China

  220. Information Warfare Monitor (IWM)

  221. Infowars

  222. Institut français des relations internationales (IFRI)

  223. Intelligence Online

  224. Intercept, The

  225. International Atomic Energy Agency (IAEA)
    • [01.02.2011] Stuxnet could harm nuclear safety - Yukia Amano
      Yukia Amano, de algemene directeur van het IAEA: “Stuxnet, or cyber attack as a whole, could be quite detrimental to the safety of nuclear facilities and operations.” Hij erkent dat de IAEA slechts beperkte kennis heeft over de computerworm die door sommige experts wordt beschreven als «a first-of-its-kind guided cyber missile».

  226. International Center for Security Analyses (ICSA)

  227. International Law Studies (ILS)

    Index J

  228. Japan Times, The

  229. Javers, Eamon

  230. Jerusalem Post, The

  231. Jones, Andy / Kovacich, Gerald L. / Luzwick, Perry G.

  232. Journal of Military Ethics

  233. Journal of Strategic Studies

    Index K

  234. Kaplan, Fred

  235. Karnow, Curtis E.A.

  236. KarsperskyLab |

  237. Kenyon, Henry S.

  238. Knake, Robert K.

  239. Koh, Harold Hongju
    • [2010] The Obama Administration and International Law
      Speech, American Society of International Law, 25 March 2010.
    • [2012] International Law in Cyberspace
      Harvard International Law Journal, Vol. 54.
        Presents cutting-edge issues of international law: how do we apply old laws of war to new cyber-circumstances, staying faithful to enduring principles, while accounting for changing times and technologies? Do established principles of international law apply to cyberspace? Is cyberspace a law-free zone, where anything goes? Do cyber activities ever constitute a use of force? May a State ever respond to a computer network attack by exercising a right of national self-defense? Do jus in bello rules apply to computer network attacks? Must attacks distinguish between military and nonmilitary objectives? Must attacks adhere to the principle of proportionality? How should states assess their cyber weapons? What role does state sovereignty play?

  240. Kolen, Bas

  241. Kolen, Bas / Wouters, C.A.H.

  242. Kopp, Carlo

  243. Koppel, Ted

  244. Kosina, Karin

  245. Kotler, Itzik

  246. Kramer, Franklin D. et al.
    • [2009] Cyberpower and National Security.
      Washington: NDU Press.

  247. Krebs, Brian

  248. KrebsonSecurity

  249. Krekel, Bryan

  250. Krepinevich, Andrew

  251. Kruit, P.J.J. van der

    Index L

  252. Ladurner, U. / Pham, K.

  253. Langner, Ralf

  254. Lawfare

  255. Lawson, Sean

  256. Leonhard, Robert

  257. Lessig, Lawrence |

  258. Leverett, Éireann

  259. Leveson, Nancy G.

  260. Lewis, James Andrew

  261. Lewis, Michael

  262. Liang, Qiao / Xiangsui, Wang

  263. Libicki, Martin C. | - Rand Corporation

  264. Liff, Adam P.

  265. Liles, Samual P.

  266. Lin, Herbert S.

  267. Lindsay, Jon R. / Cheung, Tai Ming / Reveron, Derek S.

  268. Longstaff, Tom

  269. Lips, Wouter

  270. Lonsdale, David J. - University of Hull, UK

  271. Loon, Collin E.P. van

  272. Lord, Kristin / Sharp, Travis

  273. Lucas, George, R.

  274. Lyu, Michael R.

    Index M

  275. Mandiant

  276. Maio, Paola di

  277. Malwareinfo.nl

  278. Manwaring, Max G.
    • [2001] (ed.) Deterrence in the 21st Century.
      London: Frank Cass.

  279. Markoff, John

  280. Markoff, John / Barboza, David

  281. Markoff, John / Kramer, Andrew E.

  282. McAfee

  283. McConnell, Steve

  284. McGraw, Gary
    • [2006] Software Security: Building Security In.
      Boston, NY: Addison-Wesley.

  285. McGraw, Gary / Arce, Ivan

  286. Menkveld, Albert

  287. Menthe, Darrel

  288. Meyer, Paul

  289. Militaire Spectator

  290. Military Review

  291. Mills, Elinor

  292. Ministerie van Buitenlandse Zaken

  293. Ministerie van Defensie

  294. Ministerie van Veiligheid en Justitie

  295. MIT Technology Review

  296. Mitnick, Kevin D. / Simon, William L.

  297. MIVD - Militaire Inlichtingen- en Veligiheidsdienst

  298. Molander, Roger C. / Wilson, Peter A. / Mussington, B. David / Mesic, Richard

  299. Monde, Le

  300. Morgan, Patrick M.

  301. Morozov, Evgeny |

  302. Mueller, Benjamin

  303. Mueller, John / Friedman, Benjamin

  304. Mulvenon, James C.

  305. Mulvenon, James C. / Yang, Richard H.

    Index N

  306. Nationaal CrisisCentrum (NCC)

  307. Nationaal Cyber Security Centrum (NCSC)

  308. National Interest, The

  309. National Research Council (NRC)

  310. National Security Journal (NSJ) - Harvard Law School

  311. NATO - North Atlantic Treaty Organization

  312. NBC News

  313. Nederlands Dagblad (ND)

  314. Neilson, Robert E. (ed.)
    [1997] Sun Tzu and Information War
    Washington, DC: National Defense University Press.

  315. Netkwesties

  316. NewScientist

  317. Newsweek

  318. New Yorker, The

  319. New York Times, The (NYT)

  320. Noopur, David

  321. NOS

  322. NRC

  323. NU.nl

  324. Nye, Joseph S.

    Index O

  325. O’Connel, Mary Ellen

  326. OECD

  327. Odinot, G. / Jong, D. de / Leij, J.B.J. van der / Poot, C.J. de / Straalen, E.K. van

  328. Ohlin, Jens David / Govern, Kevin / Finkelstein, Claire
    • [2015] (eds.) Cyber War: Law and Ethics for Virtual Conflicts
      Oxford University Press.
      Cyberweapons and cyberwarfare are one of the most dangerous innovations of recent years, and a significant threat to national security. Cyberweapons can imperil economic, political, and military systems by a single act, or by multifaceted orders of effect, with wide-ranging potential consequences. Cyberwarfare occupies an ambiguous status in the conventions of the laws of war. The authors address ethical and legal issues surrounding cyberwarfare by considering whether the Laws of Armed Conflict (LOAC) apply to cyberspace and the ethical position of cyberwarfare against the background of our generally recognized moral traditions in armed conflict. The authors explore these moral and legal issues and examine the key principles of jus in bello to determine how they might be applied to cyber conflicts. The distinction between civilian and combatant in this context and the level of causation necessary to elicit a response are studied and the specific operational realities implicated by particular regulatory regimes are analyzed.

  329. Ondřejka, Jan / Stojar, Richard

  330. Osawa, Jun

  331. Owens, William / Dam, Kenneth / Lin, Herbert

  332. OWNI

    Index P

  333. Paganini, Pierluigi

  334. Parool, Het

  335. PCCIP - President’s Commission on Critical Infrastructure Protection

  336. PCWorld

  337. Perrow, Charles

  338. Pont, George F. du

  339. Pollitt, Mark M.
    • [1997] Cyberterrorism Fact or Fancy?
      Proceedings of the 20th National Information Systems Security Conference, October 1997, pp. 285-289.

  340. Popular Science

  341. Pouget, Fabien / Dacier, Marc / Debar, Hervé

  342. Pouw, Eric

  343. Prince, Brian

  344. Public Intelligence

  345. Pufeng, Wang

    Index R

  346. Radasky, William A.

  347. Ranito, Jovana Jezdimirovic

  348. Ranum, Markus J.

  349. Rattray, Gregory J.

  350. Ravi, Dan / Melman, Yossi

  351. Reed, Thomas C.

  352. Reijnen, G.C.M.

  353. Reisman, W. Michael / Antoniou, Chris T.

  354. Reformatorisch Dagblad

  355. Register, The

  356. Reuters

  357. Reveron, Derek
    • [2012] (ed.) From Cybersecurity to Cyberwar
      Washington, D.C.: Georgetown University Press.
      In a very short time, individuals and companies have harnessed cyberspace to create new industries, a vibrant social space, and a new economic sphere that are intertwined with our everyday lives. At the same time, individuals, subnational groups, and governments are using cyberspace to advance interests through malicious activity. Terrorists recruit, train, and target through the Internet, hackers steal data, and intelligence services conduct espionage. Still, the vast majority of cyberspace is civilian space used by individuals, businesses, and governments for legitimate purposes. The editor brougth together scholars, policy analysts, and information technology executives to examine current and future threats to cyberspace. They discuss various approaches to advance and defend national interests, contrast the US approach with European, Russian, and Chinese approaches, and offer new ways and means to defend interests in cyberspace and develop offensive capabilities to compete there.

  358. Rid, Thomas

  359. Rid Thomas / McBurney, Peter

  360. Ronfeldt, David / Arguilla, John / Fuller, Graham E. / Fuller, Melissa

  361. Roscini, Marco
    • [2010] World Wide Warfare - Jus ad bellum and the Use of Cyber Force
      In: A. von Dogdandy / R. Wolfrum (eds.) [2010] Max Planck Yearbook of United Nations Law, Volume 14: pp. 85-130.

    • [2014] Cyber Operations and the Use of Force in International Law
      Oxford University Press.
      The internet has changed the rules of many industries, and war is no exception. But can a computer virus be classed as an act of war? Does a Denial of Service attack count as an armed attack? And does a state have a right to self-defence when cyber attacked? With the range and sophistication of cyber operations against states dramatically increasing in recent times, Roscini investigates the traditional concepts of ‘use of force’, ‘armed attack’ and ‘armed conflict’ and, through a comprehensive analysis of primary documents as well as through an extensive literature search, asks whether and how existing laws created in the analogue age can be applied in a digital age. For each rule, whether based on treaty or custom, is explained why it applies or does not apply to cyber operations. Having established a basis for contending that particular rules apply to cyber warfare, those rules are discussed in the context of each specific type of cyber operation. The book addresses questions such as whether a cyber operation amounts to a use of force and, if so, whether the victim state can exercise its right of self-defence; whether cyber operations trigger the application of international humanitarian law; what rules must be followed in the conduct of cyber hostilities; how neutrality is affected by cyber operations; whether those conducting cyber operations are combatants, civilians, or civilians taking direct part in hostilities.

  362. RSA

  363. Russell, Alison Lawler
    • [2014] Cyber Blokades
      Georgetown University Press.
      Cyber blockades are large-scale attacks on infrastructure or systems that aim to prevent an entire state from sending or receiving electronic data. Cyber blockades can take place through digital, physical, and/or electromagnetic means. Blockade operations have historically been considered acts of war, thus their emergence in cyberspace has significant implications for international law and for our understanding of cyber warfare. The author defines and explains the emerging concept of ‘cyber blockades’ and presents a comparison of blockade operations in five different domains —on land, at sea, in the air, in space, and in cyberspace— identifying common elements as well as important distinctions. The framework for defining cyber blockades, understanding how they occur, and considering the motivations of actors who employ them is applied with in-depth analysis of the cyber attacks on Estonia in 2007 and on Georgia during the 2008 Georgia-Russia War. Blockade operations have occurred in cyberspace and will doubtlessly be used again in the future, by both state and non-state actors alike, because of the unique advantages of this type of attack.

  364. Rutherford, Mark

  365. Ruus, Kertu

  366. Ryan, Patrick S.

    Index S

  367. Saalbach, Klaus-Peter

  368. Sanger, David E.
    • [2012] Confront and Conceal: Obama’s Secret Wars and Surprising Use of American Power
      New York: Crown.
      Sanger beschrijft hoe een nieuwe president president wordt in een wereld die in brand staat. Hij laat zien hoe Obama omgaat met de internationale conflicten en daarbij vertrouwt op innovatieve wapens en nieuwe instrumenten om de Amerikaanse supermacht te beschermen. Maar zijn poging om de Amerikaanse suprematie in de Stille Oceaan te herstellen leidde tot een nieuw tijdperk van spanningen met de grootste opkomende macht in de wereld: China.

    • [2012] Mutually assured Cyberdestruction?
      In: New York Times, 02.06.2012.

    • [2014] Syria War Stirs New U.S. Debate on Cyberattacks
      In: New York Times, 24.02.2014.

    • [2016] As Russian Hackers Probe, NATO Has No Clear Cyberwar Strategy
      In: International New York Times, 16.7.2016
      De Westerse alliantie (NATO) moet een strategie ontwikkelen om de toenemende agressieve acties van Rusland in cyberspace tegemoet te treden. De NATO heeft weliswaar aangekondigd dat een cyberaanval op een van haar lidstaten als een aanval op de hele alliantie wordt bestempeld, maar zij heeft geen agressieve tegenmaatregelen genomen tegen dagelijkse spionage van en aanvallen op Europese computernetwerken. Er wordt gesproken over deling van informatie en desknndigheid, maar er wordt niets gezegd over afschrikkingsstrategieén en vroege waarschuwingssystemen. De lidstaten zijn te terughoudend om hun offensieve capaciteiten met elkaar te delen.

  369. SANS Institute

  370. SCADAhacker.com

  371. Schaap, Arie J.

  372. Scheferman, Scott

  373. Schmitt, Michael N.

  374. Schneier, Bruce

  375. Schonfeld, Erick

  376. Schreier, Fred
    • [2012] On Cyberwarfare
      DCAF (Centre for the Democratic Control of Armed Forces).

  377. Schwartau, Winn

  378. SecureList

  379. Security Affairs - Pierluigi Paganini

  380. Security Challenges

  381. Security Week

  382. Security.nl

  383. SentinelOne

  384. Seshagiri, Girish

  385. Shackleford, Scott
    • [2009] From Nuclear War to Net War: Analogizing Cyber Attacks in International Law
      Berkeley Journal of International Law (BJIL), 25:3.

  386. Shakarian, Paulo / Lei, Hansheng / Lindelauf, Roy

  387. Sharp, Walter Gary
    • [1999] Cyberspace and the Use of Force.
      San Antonio, TX: Aegis Research Corp.

  388. Shin, Yonghee / Willams, Laurie

  389. Sicherheitstacho.eu
      Een in real-time bijgewerkte wereldkaart die laat zien waar cyberaanvallen worden uitgevoerd. Deutsche Telekom verzamelt de data van 97 sensoren die werken als lokaas-systemen (honeypots) op verschillende plekken in de wereld.

  390. Singer, Peter W.

  391. Singer, Peter W. / Cole, August
    • [2016] Ghost Fleet: A Novel of the Next World War
      Een roman die leest als science fiction, maar die stijf staat van gruwelijke details over hoe de volgende wereldoorlog zou kunnen worden uitgevochten. Kapiteins van slagschepen vechten zich door een hedendaags Pearl Harbor; gevechtspiloten duelleren met onzichbare drones; jonge hackers strijden in digitale speelplaatsen; veteraren worden gedwongen om als low-tech opstandelingen te vechten; biljonairs uit Silicon Valley mobiliseren al hun bronnen voor de cyberoorlog; en een seriemoordenaar voert haar eigen vete uit.

  392. Singer, Peter W. / Friedman, Allan

  393. Singh, Abhishek

  394. Singh, Abhishek / Lambert, Scott / Ganarcharya, Tanmay A. / Williams, Jeff

  395. SIPRI
    Trends in world military expenditure, 2012 | 2013 | 2014 | 2015

  396. Smith, George C.

  397. Smith, Ron / Knight, Scott

  398. Somayaji, Anil / Hofmeyr, Steven / Forrest, Stephanie

  399. South China Morning Post (SCMP)

  400. Spiegel, Der

  401. Spitzner, Lance

  402. SpyFiles

  403. Spy Museum

  404. Sridharan, Venkatraman

  405. Standaard, de

  406. Stein, George J.

  407. Stevens, Marc

  408. Stiennon, Richard
    • [2010] Surviving Cyberwar
      Lanham: Government Institutes.
      The next major war is not likely to be fought on the battleground but in cyber space. The era of cyber warfare has already begun. Recent cyber attacks on United States government departments and the Pentagon corroborate this claim. China has compromised email servers at the German Chancellery, Whitehall, and the Pentagon. In August 2008, Russia launched a cyber attack against Georgia that was commensurate with their invasion of South Ossetia. This was the first time that modern cyber attacks were used in conjunction with a physical attack. Every day, thousands of attempts are made to hack into America’s critical infrastructure. These attacks could have devastating consequences. Stiennon outlines an effective defense against cyber threats, and explains how to prepare for future attacks.

    • [2015] There Will Be Cyberwar: How The Move To Network-Centric War Fighting Has Set The Stage For Cyberwa
      IT-Harvest Press. March 23, 2015.
      The move on the part of the US military, which began in 1996, to Network-Centric Warfare (NCW), meant the combination of sensor grids, C&C grids, and precision targeting to increase speed to command, and represented a military offset. Along with networking comes exposure to cyber attacks, attacks that will be used in future wars.

  409. Stocker, Gerfrie / Schöpf, Christine (eds.)

  410. StrategyPage

  411. Survival: Global Politics and Strategy

  412. Swimmer, Morton

  413. Symantec

    Index T

  414. Talbot, Julian / Jakeman, Miles

  415. Tan, Kheng Lee Gregory

  416. TASS

  417. Taylor, Philipo M.

  418. Team Cymru

  419. Tech Worm

  420. Ted Talk

  421. Telegraaf, De

  422. Telegraph, The

  423. Tenet, George J.
    • [2001] Statement door de directeur van CIA voor “Worldwide Threat 2001: National Security in a Changing World”.

  424. Terrorism Research Center, The (TRC)
      Een onafhankelijk instituut dat zich richt op de bestudering van terrorisme, informatie-oorlog, bescherming van critische infrastructuur en andere thema’s die de maken hebben met politiek geweld van lage intensiteit en de verschijnselen van de ‘grijze zone’.

  425. Thomas, Timothy L. - Foreign Military Studies Office, Fort Leavenworth, KS

  426. Tikk, Enekin / Kaska, Kadri / Rünnimeri, Kristel /Kert, Mari / Talihärm, Anna-Maria / Vihul, Lliis

  427. Tikk, Enekin / Kaska, Kadri / Vihul, Lliis

  428. Time

  429. Times, The

  430. TNO: Cyber Security & Resilience

  431. Todd, Graham H.

  432. Trouw

  433. Tsang, Rose

    Index U

  434. U.S. Army Cyber Command (USCYBERCOM)
    Onderdeel van de Amerikaanse krijgsmacht dat cyberspaceoperaties coördineert en de verschillende Amerikaanse militaire netwerken op elkaar afstemt. Het is ondergeschikt aan het U.S. Strategic Command en is gevestigd in Fort George G. Meade in Maryland.
    • [05.10.2016] Battles of the future will be fought in multiple domains, senior leaders say - Sean Kimmons
      Senior leader say that he U.S. Army’s dominance is in danger when it comes to future warfare. Russia and its proxy forces used cyberattacks and electronic warfare equipment to jam communication networks, while using unmanned aerial vehicles to set up artillery fires, and advanced air defense missiles to gain air superiority without airplanes. And the Chinese military is using disputed islands in the South China Sea to influence maritime missions. General David Perkins, commander of the Army Training and Doctrine Command: “They are fracturing our way of war by using other domains.” The Army of the future must be prepared for multi-domain battle, a battle taking place not just in the domains of air and land, but also in the domains of sea, space, and cyberspace. Such an army would employ infantrymen with cyberspace skills, innovative air defense systems to deter enemy aircraft, and even ground-to-ground missiles to target enemy ships. This requires sophisticated air defense capabilities that are not currently in our unit inventories. The changing character of war is unlike anything our current force has ever experienced in intensity and lethality. The implementation the multi-domain battle concept will be heavily influenced by human-machine systems. Autonomous assistance from technology will play a role on the future battlefield, but soldiers and other military members will still be making the decisions: using machines to empower the human, not vice versa.

    • [19.10.2016] Leadership change a reflection of steady progress for Army Cyber Command - Mike Milord

  435. U.S. Cyber Consequences Unit (US-CCU)

  436. U.S. Department of Defence (DoD)

    Index V

  437. Valeriano, Brandon / Maness, Ryan C.
    • [2014] The dynamics of cyber conflict between rival antagonists, 2001-11
      In: Journal of Peace Research, 51(3): 347-360. May 2014.

    • [2015] Cyber War versus Cyber Realities: Cyber Conflict in the International System
      Oxford University Press.
      Much of the talk centered on the concept of cyber conflict and the changing dynamic of future conflict is founded on the study of spectacular flights of imagination of what could be. This book enters into the debate to push discussion of the issue toward realistic evaluation of the tactic in modern international interactions. It examines information on all cyber incidents and disputes in the last decade in order to delineate the patterns of cyber conflict as reflected by evidence. The goal is to develop a theory of cyber conflict, analyze the empirical patterns of cyber conflict between antagonists, investigate the impact of cyber conflict on foreign policy interactions, delve deeper with a close examination of some recent and popular cyber incidents, and finally, develop a set of policy recommendations that deal with the emerging threat. The authors argue that restraint is the norm in cyberspace and suggests that there is evidence this norm can influence how the tactic is used in the future.

  438. Vanity Fair

  439. Veeramachaneni, Kaylan / Arnaldo, Ignacia e.o.

  440. Ventre, Daniel
    • [2007] La guerre de l’information
      Hermes-Lavoisier. October 2007.

    • [2009] Information Warfare
      Wiley-ISTE. October 12, 2009.
      An introduction to the concept of information warfare, covering its evolution over the last decade and its developments among China, Russia, Japan, India, and Singapore. Ventre describes various conceptions of information warfare, along with how they function in military, diplomatic, political, and economic contexts. Notable cyber attacks are analyzed, the challenges faced by countries who fail to secure their cyberspace (Japan, the US, etc.) are enumerated, and ways to distinguish between cybercrime, cyberwarfare, and cyberterrrorism are discussed.

    • [2010] (ed.) Cyberguerre et guerre de l’information. Stratégies, règles, enjeux
      Hermes-Lavoisier. July 2010.
      Cyberspace is a theater of expression and confrontation of power on which state and non state actors perform. Faced with the broad spectrum of cyber attacks, many states, including France, have put cybersecurity to the rank of national security and defense. This book offers a reflection on the key concepts of ‘information warfare’ and ‘cyber war’ in order to understand the mechanisms, logicsand modalities that characterize the balance of power within of cyberspace. The historical, strategic and operational dimension cyber attacks are described.

    • [2011a] Cyberespace et acteurs du cyberconflit
      Hermes-Lavoisier. April 2011.

    • [2011b] Cyberattaque et Cyberdéfense | idem (Google Books)
      Hermes-Lavoisier. August 2011.

    • [2011c] (ed.) Cyberwar and Information Warfare | idem (Google Books)
      Wiley-ISTE. August 15, 2011.
      Integrating empirical, conceptual, and theoretical approaches, Ventre presents the thinking of researchers and experts in the fields of cybersecurity, cyberdefense, and information warfare. The processes of information warfare and cyberwarfare is analyzed through the historical, operational and strategic perspectives of cyberattacks.

    • [2012a] Israël: cyberdéfense et cyberguerre
      01net.entreprises, 30.02.2012.
    • [2012b] (ed.) Cyber Conflict: Competing National Perspectives
      Wiley-ISTE. April 2012.
      Includes: (2) Cuba: Towards an Active Cyber-defense; (3) French Perspectives on Cyber-conflict; (6) Cyberspace in Japan’s New Defense Strategy; (10) Conclusion.

    • [2015] (ed.) Chinese Cybersecurity and Defense
      Wiley-ISTE. April 20, 2015.
      Cyberdefense has become a major issue on the international scene. China is observed, criticized, and designated by many states as a major player in the global cyber-insecurity. The U.S. is building their cyberdefense strategy against the «Chinese threat». It is therefore important to better understand today’s challenges related to cyber dimension in regard of the rise of China. Contributions from international researchers provide cross perspectives on China, its strategies and policies for cybersecurity and cyberdefense. These issues have now gained major strategic dimension: Is Cyberspace changing the scene of international relations? How China does apprehend cybersecurity and cyberdefense? What are the issues, challenges? What is the role of China in the global cyberspace?

  441. Voetelink, Joop

  442. Volkskrant, De (VK)

  443. VPRO

  444. Vrij Nederland (VN)

    Index W

  445. Wall Street Journal, The (WSJ)

  446. Waltz, Edward

  447. Walzer, Michael

  448. War is Boring

  449. Warbroek, Boudewijn

  450. Washington Post, The (WP)

  451. Washington Times, The

  452. Waxman, Matthew C.
    • [2011] Cyber-Attacks and the Use of Force
      In: Yale Journal of International Law, 36(2): 421-59.

    • [2013] Self-Defensive Force Against Cyber Attacks: Legal, Strategic and Political Dimensions
      In: International Law Studies, 89.
      When does a cyber-attack or threat of cyber-attack give rise to a right of self-defense — including armed self-defense — and when should it? Waxman examines these questions through three lenses: (1) a legal perspective: the range of reasonable interpretations of self-defense rights as applied to cyber-attacks, and the relative merits of interpretations within that range; (2) a strategic perspective: linking a purported right of armed self-defense to long-term policy interests including security and stability; and (3) a political perspective: considering the situational context in which government decision-makers will face these issues and predictive judgments about the reactions to cyber-crises of influential actors in the international system. Waxman shows specifically how development of politics, strategy, and law will likely play out interdependently with respect to particular cyber-attacks.

  453. Webroot

  454. Webwereld

  455. Weiss, Joseph

  456. Welt, Die

  457. Werber, Niels

  458. Werner, Kathrin

  459. Whitman, Michael E. / Mattord, Verma

  460. Wikipedia

  461. Wikileaks

  462. Williams, Phil

  463. Winkler, Ira

  464. Wired

  465. Wittes, Benjamin / Blum. Gabriella
    • [2015] The Future of Violence: Robots and Germs, Hackers and Drones — Confronting A New Age of Threat
      From drone warfare in the Middle East to digital spying by the NSA, the U.S. government has harnessed the power of cutting-edge technology to awesome effect. But what happens when ordinary people have the same tools at their fingertips? Advances in cybertechnology, biotechnology, and robotics mean that more people than ever before have access to potentially dangerous technologies —from drones to computer networks and biological agents— which could be used to attack states and private citizens alike. If national governments can no longer adequately protect us from harm, they will lose their legitimacy. Governments, companies, and citizens must rethink their security efforts to protect lives and liberty. In this brave new world where many little brothers are as menacing as any Big Brother, safeguarding our liberty and privacy may require strong domestic and international surveillance and regulatory controls.

  466. World Economic Forum (WEF) |
    • [2011] Global Agenda Council on Organized Crime

    • [2016] Understanding Systemic Cyber Risk
      An attempt to advance the dialogue on systemic cyber risk by defining «systemic cyber risk» and examining the ecosystem of digital connectivity. From here, government and industry must collaborate to develop the solutions that will secure the promise of Fourth Industrial Revolution.

  467. Woude, Maurice R. van der

  468. WRR - Wetenschappelijke Raad van het Regeringsbebeleid

  469. Wyke, James

    Index X

  470. Xinhuanet
      Xinhua (China Nieuws) dat rechtstreeks onder het kabinet valt, is hét persbureau dat de officiële standpunten van de Chinese overheid naar buiten brengt. De nieuwssite publiceert haar berichten in zes buitenlandse talen: Engels, Frans, Spaans, Russisch, Arabisch, Japans. Er werken zo’n 15.000 mensen bij Xinhua, waarvan ongeveer 7.000 journalisten.

    Index Y

  471. Yahoo! News

  472. Yoo, Christopher S.
    • [2015] Cyber Espionage or Cyberwar?: International Law, Domestic Law, and Self-Protective Measures
      ). Faculty Scholarship. Paper 1540.
      Scholars have spent considerable effort determining how the law of war (particularly jus ad bellum and jus in bello) applies to cyber conflicts, epitomized by the Tallinn Manual on the International Law Applicable to Cyber Warfare. Many prominent cyber operations fall outside the law of war, including the surveillance programs that Edward Snowden has alleged were conducted by the National Security Agency, the distributed denial of service attacks launched against Estonia and Georgia in 2007 and 2008, the 2008 Stuxnet virus designed to hinder the Iranian nuclear program, and the unrestricted cyber warfare described in the 1999 book by two Chinese army colonels. Such conduct is instead relegated to the law of espionage and is thus governed almost entirely by domestic law. The absence of an overarching international law solution to this problem heightens the importance of technological self-protective measures.

  473. YouTube

    Index Z

  474. ZDNet

  475. Zetter, Kim

  476. Zhu, Bonnie / Joseph, Anthony / Sastry, Shankar

  477. Ziolkowski, Katherina J.

  478. Zittran, Jonathan

Index


Home Onderwerpen Zoek Over ons Doneer Contact

27 April, 2017
Eerst gepubliceerd: Jan, 2015