Home | Onderwerpen | Zoek | Over ons | Doneer | Contact |
---|
Sources on Cyber War
dr. Albert Benschop
Universiteit van Amsterdam
First edition: 2001 — Last edition: 03 October, 2017
A |
---|
[1993] To Tap or Not to Tap | Final thoughts
In: Proceedings Magazine (U.S. Naval Institute) - 143/7/1, 373.
Oxford University Press.
New York: John Wiley & Sons.
Syngress.
Een film von Svea Eckert, Alexandra Ringling & James Bamford.
Een coproductie van NDR, WGBH & Servus TV.
Het doel van de aanvaller is duidelijk: spionaga, sabotage en destabilisatie. Sinds het begin van de oorlog in het Oosten van het land is de Oekraïme blootgesteld aan een ongehoorde golf van cyberaanvallen.
Interview met Andrej Soldatow, russische journalist die gespecialiseerd is in inlichtingendiensten en cyberaanvallen.
In: The Washington Quarterly, 26(2):89–103. Spring 2003.
Vol. 40(4): 599-624. October 2014.
Vol. 42 (2): 301-323. April 2016.
6 October 2016.
Washington: Grassey’s.
Paris: Presses Universitaires de France.
In: Wired, 11.7.02
San Francisco Chronicle, 26.7.09.
Ivan R. Dee.
DoD IO Center for Research - Naval Postgraduate School. February 28, 2014
Comparative Strategy 12: 141-65.
Athena’s Camp: Preparing for Conflict in the Information Age
Georgetown University Press.
In: International Security 26(1): 93-128.
Een documentaire van Marcel Kolvenbach die duikt in de verborgen wereld van cyberoorlog. Het sporenonderzoek leidt van de fabrikanten van cyberwapens in Israél, via de rode hackers in China naar de allergrootste hackersconferentie in Amerika. De documentaire begint met een uitspraak van Ian West, directeur cyberveiligheid bij de Nato: “Een enkeling met een laptop kan tegenwoordig meer vernietiging teweegbrengen als een conventioneel wapen zoals een bom!”
Een groep die ‘Web defacements’ en andere typen cybermisdaad in de gaten houdt.
Proceedings of the National Academy of Sciences (PNAS), 111(4):1298-1303. 6 December 2013.
B
In: American Bar Association Journal, May 2012.
In: Science, 304(5670): 527-529. April 23, 2004.
New York: Anchor.
New York: Anchor. May 10, 2005.
New York: Doubleday.
In: Wired, 12.6.13
In: Pillsbury, M (ed.) Chinese views of
future warfare.
Washington, DC: National Defense University Press.
University of Wisconson, Madison.
New York University International Law and Politics, 34: 57-113.
I Books.
Een serie van drie radioprogramma’s over de duistere kanten van de virtuele wereld waarin wordt gestolen, gespioneerd en oorlog wordt gevoerd.
Indianapolis: Wiley.
Marburg: Tectum Wissenschaftsverlag.
In: Caton, Jeffre L. / Dauber, Cori E. / Groh Jeffrey L. / Smith David J. [2010] Information as Power.
U.S. Army War College, pp. 69-88.
Information & Security: An International Journal 7: 80-103.
In: R. Latham (ed.) [2003] Bombs and Bandwidth: The Emerging Relationship Between Information Technology and
Security.
New York: The Free Press, 49-73.
In: Aus Politik und Zeitgeschichte (APuZ), 25.4.2014.
FreePress.
Londen: Routledge.
College of Agricultural Banking.
In: The Journal of Politics, 63(3):741-774.
In: Current History, 99(365): 124-128.
New York: Free Press.
In: Alberts/Papp 2001:125-157.
Lockdown 2010 - Conference Proceedings.
In: Dissident Voice, October 30, 2015
In: CounterPunch, 22.2.16
Militair Rechtelijk Tijdschrift, 9.
Leukfeldt/Stol (eds.) Cyber Safety: An Introduction. Eleven Publishing.
VOV (Vereniging Officieren Verbindingsdienst), 3.2011.
Virus Test Center: University of Hamburg.
In: Virus Bulletin, Oct 1997, pp. 10-11
6th Association of anti Virus Asia Researchers Conference (AVAR 2003), 15pp.
Kindle Edition.
Oxford, Oxford University Press.
In: International Review of the Red Cross, 94(886). Summer 2012.
In: International Law Studies, 89: 387-405.
In: European Journal of International Law, 21(2).
Address to the Fifth International Conference on Cybercrime and Computer Forensics. National Security College.
In:The Conversation, 12.7.2017.
New York: Penguin Press.
North Caroline Journal of Law and Technology 4:1-40.
Oxford University Press.
As new technologies develop, terrorist groups are developing new
methods of attack by using the Internet, and by using cyberspace as a
battlefield, it has become increasingly difficult to discover the identity of
attackers and bring them to justice. The seemingly limitless boundaries
of cyberspace have allowed virtually anyone to launch an attack from
a remote and anonymous location. But once these attacks occur, it
raises several important questions. Who should respond, and how? How
should nation-states effectively deal with a cyber-attack? Will the United
States and other nation-states be able to survive in a world where virtual
boundaries are limitless? Susan Brenner gives a thorough explanation of how
military and law enforcement personnel respond to these attacks and
why bringing cyber-terrorist to justice can be difficult and sometimes
impossible.
In: FCW.com.
Harvard Law School National Security Journal, 10.04.2012.
In: Ducheine/Osinga/Soeters 2012:225-242.
In: Demokratizatsiya: The Journal of Post-Soviet Democratization 21(3): 339-368. July 2013.
“Cyberweapons do not appear to be capable of mass destruction in the way nuclear weapons clearly are, but they hold at risk some of the most precious assets of our time: the information storage and control mechanisms on which modern society has been built. It is not difficult to imagine catastrophic scenarios such as the destruction of a banking sector, the elimination of a stock market, the flooding of a dam, or the poisoning of a water supply — all initiated by malfunctions induced by malicious software. The United States rushed into the nuclear age eager to cement its technical superiority, causing a decades-long nuclear arms race that threatened global extinction. Before policymakers go too far, they should now take a moment to consider the implications — both intended and unintended — of cyberweapons.”
“Cyberweapons do not appear to be capable of mass destruction in the way nuclear weapons clearly are, but they hold at risk some of the most precious assets of our time: the information storage and control mechanisms on which modern society has been built. It is not difficult to imagine catastrophic scenarios such as the destruction of a banking sector, the elimination of a stock market, the flooding of a dam, or the poisoning of a water supply — all initiated by malfunctions induced by malicious software. The United States rushed into the nuclear age eager to cement its technical superiority, causing a decades-long nuclear arms race that threatened global extinction. Before policymakers go too far, they should now take a moment to consider the implications — both intended and unintended — of cyberweapons. While digital spying has taken place for decades, the era of computer-mediated destruction has only recently begun.”
Well-known technologies that challenge militaries’l traditional dominance and threaten their control over technology’ s uses include autonomous vehicles, cyber technologies, and artificial intelligence. As future generations of consequential technologies mature, perhaps including quantum computing and virtual reality, the challenges faced by governments and militaries will only increase. Because governments and international institutions lack methods to successfully grapple with new or not-yet-developed technologies, societies as a whole must be vigilant to the threats that such technologies pose — and must address the stark imbalance between the resources dedicated to developing new technologies and the resources dedicated to governing them.
In: New Zealand International Review, 38(3) pp. 5-8. May/June 2013.
In: Political Science, 65(2): 216-23. December 8, 2013.
In: Defence Studies, 15: 297-319.
Boulder: Lynne Rienner Pub.
New York: Grove Press.
C
Fairfax, VA: AFCEA International Press.
Sebastopol, CA: O’Reilly.
Slate, 12.08.2011.
Digital Dao, 23.10.2011.
New York: Routledge.
In: Czossceck, C. / Ottis, R. / Ziolkowski, K. (red.) 2012 4th International Conference on Cyber Conflict, Talinn: NATO ccd coe Publications, pp. 141-153.
Michigan Journal of International Law, 27(4): 1071-1130.
|
In: Sunday Times.
Canberrra: Australian Institutes of Criminology.
Cambridge, MA: MIT Press.
In: Journal of Infrastructural Warfare.
Senate Select Committee on Intelligence, March 12, 2013
Senate Select Committee on Intelligence, February 9, 2016.
In: The Christian Science Monitor, 16.3.14
In: Bulletin of the American Academy of Arts and Sciences, 64(2):62-63. Winter 2011.
New York: Ecco/HarperCollins.
Online te lezen zijn de Introduction en Hfst. 1: Trial Runs
Radio Free Europe, 06.03.2009
New York, N.Y.: Cambridge University Press
In: Computers & Security, 16(1): 29-46.
Crime and Justice International, March 1997, pp. 15-18.
In: Harvard Journal of Law & Technology, 20(2): 404-422. Spring 2007.
Cognitive technologies Laboratory, University of Chicago.
In: Journal of Trading, 7(2):57-68.
Praeger. November 30, 2001.
A Chatham House Report, November 2010
In: Inside Story.
In: Inside Story.
Fletcher Forum of World Affairs, Summer/Fall 1997.
Harvard University Press. January 1, 1987.
New York: Free Press.
Free Press. March 31, 1991.
New York: Free Press. December 1993.
Cambridge University Press. August 28, 1999.
Presidio Press.
Nederlandse vertaling: De evolutie van de oorlog. Van de Marne tot Irak. Utrecht: Spectrum 2007.
Presidio Press. September 30, 2008.
Nederlandse vertaling: Oorlogscultuur. Houten: Spectrum. 2009.
In: Strategic Studies Quarterly, Spring 2011.
Presented by Kaspersky.
CCD COE Publications. Tallinn, Estonia.
D
ZDNet, 07.07.2012.
In: Point of View 42. Warsaw: Centre for Eastern Studies.
In: Journal of Software Technology.
CERT.
Calgary: Canadian Defense & Foreign Affairs Institute.
cigi Internet Governance Papers nr. 6. October 2013.
Toronto: Signal.
Bulletin of the Atomic Scientists, 30.5.13
In: Georgetown Journal of International Affairs, 20: 45-56.
Cambridge: MIT Press, March 2008.
Many countries around the world block or filter internet content, denying access to information that they deem too sensitive for ordinary citizens —most often about politics, but sometimes relating to sexuality, culture, or religion. Internet filtering takes place in more than three dozen states worldwide, including many countries in Asia, the Middle East, and North Africa. Related internet content-control mechanisms are also in place in Canada, the United States and a cluster of countries in Europe.
Access Denied examines the political, legal, social, and cultural contexts of Internet filtering in these states from a variety of perspectives. Chapters discuss the mechanisms and politics of internet filtering, the strengths and limitations of the technology that powers it, the relevance of international law, ethical considerations for corporations that supply states with the tools for blocking and filtering, and the implications of internet filtering for activist communities that increasingly rely on Internet technologies for communicating their missions. Reports on content regulation in forty different countries follow, with each two-page country profile outlining the types of content blocked by category and documenting key findings.
Cambridge: MIT Press. April 29, 2010.
Internet filtering, censorship of Web content, and online surveillance are increasing in scale, scope, and sophistication around the world, in democratic countries as well as in authoritarian states. The first generation of internet controls consisted largely of building firewalls at key Internet gateways; China’s famous ‘Great Firewall of China’ is one of the first national internet filtering systems. Today the new tools for Internet controls that are emerging go beyond mere denial of information. These new techniques, which aim to normalize (or even legalize) Internet control, include targeted viruses and the strategically timed deployment of distributed denial-of-service (DDoS) attacks, surveillance at key points of the internet’s infrastructure, take-down notices, stringent terms of usage policies, and national information shaping strategies.
Cambridge: MIT Press. November 3, 2011.
A daily battle for rights and freedoms in cyberspace is being waged in Asia. At the epicenter of this contest is China —home to the world’s largest Internet population and what is perhaps the world’s most advanced Internet censorship and surveillance regime in cyberspace. Resistance to China’s Internet controls comes from both grassroots activists and corporate giants such as Google. Meanwhile, similar struggles play out across the rest of the region, from India and Singapore to Thailand and Burma, although each national dynamic is unique. The authors examine the interplay of national security, social and ethnic identity, and resistance in Asian cyberspace, offering in-depth accounts of national struggles against Internet controls.
International Political Sociology 4: 15-32.
Cyberwar Real and Imagined, World Politics Review, Feature Report, 19 April 2011.
Strategic Studies Quarterley, 32 :32-61.
In: The Georgetown Journal of International Affairs. International Engagement on Cyber iii. State Building on a New Frontier, 20: 29-38
Department of Defense, 17.02.2012.
MIT Press. July 31, 2009.
New Haven: Yale University Press.
Proceedings of the Seventh IEEE Symposium on Security and Privacy. May 1969, pp. 119-131.
In: Proceedings of the 13th National Computer Security Conference,
Washington, D.C., Oct., 1990, pp. 653-664.
In: Communications of the ACM, 36(3): 24-33, 42-44. March 1993.
In: James P. McCarthy (ed.) National Security in the Information Age, Conference Report. U.S. Air Force Academy, February 28-March 1, 1996, pp. 209-221.
In: Computer Fraud & Security, July 1996, pp. 8-16.
June 6, 1997.
Addison-Wesley.
Addison-Wesley.
Testimony before the Special Oversight Panel on Terrorism Committee on Armed Services U.S. House of Representatives. 23 mei 2000.
In: Global Dialogue, Autumn 2000.
In: Computer Security Journal, 16(4):43-53. Fall 2000.
Harvard International Review, 23(2): 70-75.
Presented at Arms Control in Cyberspace, Heinrich Böll Foundation, Berlin, Germany, June 29-30, 2001.
Social Science Research Council, 1 November 2001.
In: DoD Cyber Crime Conference 2007, St. Louis, MO, January 2007.
In: Kenneth Einar Himma (ed.) [2007] Internet Security: Hacking, Counterhacking, and Society. Jones and Bartlett Publishers. Chapter 7
In: John Arquilla / Douglas A. Borer (eds.) [2007] Information Strategy and Warfare. Routledge. 11 August 2007.
In: Scientific American, August 18, 2008.
In: IO Journal, April 2009.
In: Y. Jewkes / M. Yar (eds.) [2009] Handbook on Internet Crime. Willan Publishing.
In: Communications of the ACM, 53(9). Sept. 2010.
In: T. Hold / B. Schell (eds.) [2011] Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications. IGI Global.
10 Years After September 11, A Social Science Research Council Essay Forum, Sept. 2011.
In: Future Internet, 4(3):672-687.
In: Computers & Security 40:108-113. February 2014.
In: Combating Terrorism Exchange (CTX), 4(1):27-36. February 2014.
In: Emily O. Goldman / John Arquilla (eds.) [2014] Cyber Analogies. DoD IO Center for Research - Naval Postgraduate School. February 28, 2014
In: Luciano Floridi / Mariarosaria Taddeo (eds.) [2014] The Ethics of Information Warfare. Springer, pp. 85-103. March 26, 2014
In: Communications of the ACM, 58(4): 24-26. April 2015.
In: Joint Forces Quarterly 77(2): 8-15. April 2015.
In: Georgetown Journal of International Affairs. September 8, 2015.
TEDxSantaCatalinaSchool. November 9, 2015.
In: Leo J. Blanken / Hy Rothstein, / Jason J. Lepore (eds.) [2015] Assessing War: The Challenge of Measuring Success and Failure. Georgetown University Press. November 2015. pp. 266-284.
In: American Scientist, May-June 2016, 154-157.
In: The Conversation, December 13, 2016.
In: The Conversation, August 15, 2017.
In: Information, Communication and Society, 2(3), July 1999.
De kaart wordt gevoed door meer dan 270 ISP klanten over de hele wereld die anoniem statistieken over netwerkverkeers- en cyberaanvallen delen.
Gepresenteerd door Arbor Networks.
Cambridge: Cambridge University Press.
In: Bidgoli, H. (ed.) [2011] The Handbook of Information Security. John
Wiley & Sons.
In: International Law Studies 76:99-119 - Computer Network Attack and International Law.
In: Medium, 7.7.16.
Computer Crime Research Center.
Archiv des Völkerrechts, 48(2): 687-709.
In:ICRC, 16.8.11.
Nijmegen: Wolf Legal Publishers.
In: Ars Aequi, juli/augustus 2009, 490-497.
In: A. Wagemaker / F. van Nijnatten [2013] Minuutschoten — Liber Amicorum voor Hans Bosch, pp. 25-28.
In: Magazine nationale veiligheid en crisisbeheersing, 2.
In: Militair Rechtelijk Tijdschrift, 109(4).
Militaire Spectator, 182(9): 368-387.
In: P. Brangetto / M. Maybaum / J. Stinissen (eds.) [2014] 6th International Conference on Cyber Conflict.NATO CCD COE Publications, Tallinn. pp. 303-327.
Den Haag: Asser Press.
Militaire Spectator, 180(6):273-286.
In: Strategic Studies Quarterly, Spring 2011: 81-99.
E
Defences against cyberwarfare are still rudimentary. That’s scary
Attacks launched over the internet on Estonia and Georgia highlight the difficulty of defining and dealing with cyberwar.
It is time for countries to start talking about arms control on the internet.
Are the mouse and keyboard the new weapons of conflict?
Kill switches are changing the conduct and politics of war.
Boulder: Westview Press.
Computer Crime Research Center.
- European Network and Information Security Agency
Berkeley: Osborne/McGraw-Hill.
In: Aviation Week, February 1, 2010.
Memorandum nr. 117 of the Institute for National Security Studies (INSS).
Kennislink, 11.3.14
F
Symantec 06.08.2010
- Federal Bureau of Investigation
Statement Before the Senate Judiciary Committee, Subcommittee on Crime and Terrorism
Statement before the House Financial Services Committee, Subcommittee on Financial Institutions and Consumer Credit.
RSA Cyber Security Conference. San Francisco, CA
Springer Verlag
Orbis. July 1994.
Hudson Institute.
In: Conflict Security Law 11 (2): 179-199. Summer 2006.
In: Michigan Journal of International Law, 28(3): 687-709.
Oxford University Press. 21 September 2009.
In: Conflict Security Law 18(2): 331-351. Summer 2013.
In: PCWorld.
In: IDG New Service.
In: ComputerWorld.
In: CIO.
In: ComputerWorld.
In: Wall Street Journal.
Oxford: Oxford University Press.
Interview in: Intercom (Vereniging Officieren Verbindingsdienst).
In: The New Atlantis, 29: 52-47.
Remarks to the Center for Security Policy
In: New Paradigms Forum. 22 July 2011.
In: PJ Media. 2 May 2013.
Remarks at the “Cyber Security Days Colloquium” at the Los Alamos National Laboratory.
In: New Paradigms Forum. 15 October 2015
Vol, 75(2): 20-36.
Vol, 75(2): 37-54.
Vol. 80(3): 98-112.
Vol. 89(5): 97-108.
|
Russia Studies Centre. Policy Paper No. 9.
New York: Touchstone.
A chronicle of the massive manhunt that united hard-nosed FBI agents, computer nerds, and uptight security bureaucrats against an elusive computer outlaw who broke into highly secured computer systems at banks, universities, federal agencies, top-secret military weapons-research sites, and even into the computers that controlled central California’s dams. It is the true story of Phantom Dialer. His actions could have put tens of thousands of lives at risk. And what makes it so frightening is that he was not a criminal or computing genius. He was a curious, persistent, and mentally-challenged young man who never truly understood his own actions. Advances in the internet have been making it easier, not harder, for security crackers to go where they’re not wanted. The authors blow the lid off the frightening vulnerability of the global online network, which leaves not only systems, but also individuals, exposed.
New York: Polity Press.
In: Culture Mandala, 8(1): 28-80.
Lanham Md: Lexingtom Books.
Aviation Week & Space Technology.
Aviation Week & Space Technology.
Aviation Week & Space Technology.
Aviation Week & Space Technology.
Aviation Week & Space Technology.
Aviation Week & Space Technology.
Aviation Week & Space Technology.
Aviation Week & Space Technology.
Aviation Week & Space Technology.
G
In: International Security, 38(2): 1-62.
In: Security Studies, 24:316-348.
München: Open Source Press.
YouYube [9:34]
In: Datenschutz Nachrichten 33(1): 4-8
In: Internationales Magazin für Sicherheit, 1: 26-28.
ADLAS, 5(1): 72-76.
IP - Internationale Politik, 2: 88-95.
München: Random House.
In: Diplomatisches Magazin 2(3).
SpringerBriefs in Cybersecurity: 1-10.
In: Internationale Politik 4, Juli/August 2014, pp. 100-105.
Georgetown Journal of International Affairs, 4: 45-54.
NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE)
Threshold Editions.
NATO Defense College. Fellowship Monograph 9. November 2016.
Strategic Studies Institute
and U.S. Army War College Press.
World Affairs, November/December 2010.
Back Bay Books.
In: The New Yorker, 4.10.2010.
Ambo.
Vienna: International Press Institute.
In: The Washington Post.
In: The Washington Post
Washington: Brookings Institution.
In: Peter Berkowitz (ed.) [2010] Future Challenges in National Security Law
Chichester: Wiley.
In: Strategic Studies Quarterly, Fall 2010. pp. 102-135.
In: Journal of National Security Law & Policy, 4(87): 87-102.
New York: Guilford Press.
Routledge. February 10, 2002.
In: Body Society, 9(4): 215-226. December 2003.
Routledge. December 28, 2004.
In: TheVisionMachine, May 16, 2013
Forbes, 25.7.12.
Beijing: Military Science Publishing House.
H
Indianapolis: Wiley.
In: The Ethical Hacker Network, 18.6.12
In: The Ethical Hacker Network, 28.9.12
Indianapolis: Wiley.
Indianapolis: Wiley.
IT Governance Publishing. March 5, 2012.
In: Georgetonw Journal of International Affairs, February 6, 2013.
New York Review, September 29, 2016.
Houndsmills, UK: Palgrave-Macmillan.
Portland: Frank Cass.
In: Parameters, 26(3): 93-107.
In: 8th International Conference on Cyber Conflict: Proceedings 2016, eds. N. Pissanidis / H. Rõigas, / M. Veenendaal. Tallinn: NATO, June 2016.
HarperPress.
London: Knopf Press.
Harper/HarperCollins Publishers.
California Law Review, Vol. 817
In: Columbia Law Review, 117(2): 399-434. March 1017.
Strategic Studies Quarterly 5(1): 3-7.
New York: Penguin Press.
Een interactieve documentaire webserie in 5 episoden over de dreigende cyberoorlog.
In: Journal of Finance, 66(1): 1-33.
HarperCollins.
In: New Yorker, 1 November 2010.
Journal of Strategic Security 4(2):49-60.
Rand Corperation.
Ney York: Routledge.
Potomac Institute for Policy Studies. December 2007,
In: Joint Force Quarterly, 52:34-39.
Alabama: Maxwell Air Force Base.
Small Wars Journal, 06.01.2011
Small Wars Journal, 10.11.2011
Cyber Security and Homeland Security.
Beijing, NDU Press.
In: Computable, 23.2.2012
In: American Foreign Policy Interests, 36 (5): 322-331.
I
In: Journal of Strategic Security, 7(1):54-67. Spring 2014.
In: Security & Privacy, 5(4):28-32. 13 August 2007.
In: Security & Privacy, 5(4):76-79. 13 August 2007
In: Security & Privacy, 9(5):23-29. 28 March 2011.
In: Security & Privacy, 9(5):41-47. 4 August 2011
In: Security & Privacy, 10(6):9-12. 11 December 2012.
In: Annals of the History of Computing, 34(3):4-21. 20 December 2011.
In: IT Professional, 15(3)32-35. 7 March 2013.
In: Intelligence and Security Informatics Conference (EISIC). 7 November 2013.
In: Spectrum, 50(12):30-32. 28 November 2013.
In: Security & Privacy, 12(3): 88-88. 17 June 2014.
In: Security & Privacy, 12(4):11-13. 13 August 2014.
In: Communications Surveys & Tutorials, 16(3):1520-1549. 14 March 2014
In: 7th International Conference on Cyber Conflict: Architectures in Cyberspace (CyCon), 16 July 2015.
In: 49th Hawaii International Conference on System Sciences (HICSS). 10 March 2016.
In: International Conference on Information Technology for Organizations Development (IT4OD). 26 May 2016.
Picador.
December 2002, Beijing.
December 2004, Beijing.
December 2006, Beijing.
January 2009, Beijing.
March 2010, Beijing.
April 2013, Beijing
May 2015, Beijing
Yukia Amano, de algemene directeur van het IAEA: “Stuxnet, or cyber attack as a whole, could be quite detrimental to the safety of nuclear facilities and operations.” Hij erkent dat de IAEA slechts beperkte kennis heeft over de computerworm die door sommige experts wordt beschreven als «a first-of-its-kind guided cyber missile».
Volume 76: 1-6.
Volume 76: 8-20.
Volume 76: 21-33.
Volume 76: 35-85.
Volume 76: 59-71.
Volume 76: 73-97.
Volume 76: 99-119.
Volume 76: 121-145.
Volume 76: 147-161.
Volume 76: 163-185.
Volume 76: 187-218.
Volume 76: 219-232.
Volume 76: 234-263.
Volume 76: 265-310.
Volume 76: 311-321.
Volume 76: 323-351.
Volume 76: 353-373.
Volume 76: 375-393.
Volume 76: 395-419.
Volume 76: 421-437.
Volume 76: 439-455.
Volume 89: 1-20.
Volume 89: 109-122.
Volume 89: 123-156.
Volume 89: 157-197.
Volume 89: 198-217.
Volume 89: 218-232.
Volume 89: 233-251
Volume 89: 252-275.
Volume 89: 276-287.
Volume 89: 288-308.
Volume 89: 309-340.
Volume 89: 341-361.
Volume 89: 362-386.
Volume 89: 387-405.
Volume 89: 406-437.
Volume 89: 438-471.
Volume 89: 472-511.
Volume 89: 512-535.
Volume 89: 627-645.
Volume 89: 646-668.
J
New York: HarperCollins.
Georgetown Journal of International Affairs, Winter/Spring 2011.
Stanford Journal of International Law, 38(207): 207-240.
Yankee Clipper Books.
New York: Routledge.
Vol. 14(4) - Fall 2015
Vol. 14(4) - Fall 2015.
Vol. 16(1) - Winter 2017
Vol. 16(1) - Winter 2017
Vol. 16(1) - Winter 2017
Vol. 16(1) - Winter 2017
Vol. 16(2) - Spring 2017.
Vol. 16(3) - Summer 2017.
Vol. 16(3) - Summer 2017.
Vol. 9(4):384-410.
Vol. 12(1):1-3.
Vol. 12(1):4-17.
Vol. 12(1):18-33.
Vol. 12(1):34-53.
Vol. 12(1):54-67.
Vol. 12(1):68-79.
Vol. 12(1):80-87.
Vol. 13(3):240-256.
Vol. 15(2):100-121.
Vol. 16(1-2):124-127.
Vol. 29(3): 505-533.
Vol. 35(3): 401-428.
Vol. 35(5): 689-711.
Vol. 35(5): 735-742.
Vol. 36(1): 101-108.
Vol. 36(1): 109-119.
Vol. 36(1):120-124.
Vol. 36(1):125-133
Vol. 36(1):134-138.
Vol. 36(1):139-142.
Vol. 37(2):174-197. 29 November 2013
Vol. 38(1-2): 4-37.
Vol. 39(5-6): 7 March 2016.
pp. 1-28. 16 February 2017.
11 March 2017.
Vol. 40(1-2):92-117. 18 December 2015.
Vol. 40(1-2):118-145. 26 September 2016.
Jewish Policy Center. Winter 2016.
In: European Journal of International Law (EJIL), 12(5): 825-865.
Center for Strategic & International Studies (CSIS).
K
Simon & Schuster.
In: Politico Magazine.
In: Time.
University of Oxford.
BlackHat Windows Security 2003, Seattle, WA, Feb 27, 2003.
|
In: International Security, 38(2):7-40. Fall 2013)
In: Michigan Law Review, 106(7): 1427-1451. May 2008.
Signal Online, August 1999.
Prepared statement to the US House of Representatives Committee on Science and Technology. Planning for the Future of Cyber Attack. July 5 2010.
Speech, American Society of International Law, 25 March 2010.
Harvard International Law Journal, Vol. 54.
Presents cutting-edge issues of international law: how do we apply old laws of war to new cyber-circumstances, staying faithful to enduring principles, while accounting for changing times and technologies? Do established principles of international law apply to cyberspace? Is cyberspace a law-free zone, where anything goes? Do cyber activities ever constitute a use of force? May a State ever respond to a computer network attack by exercising a right of national self-defense? Do jus in bello rules apply to computer network attacks? Must attacks distinguish between military and nonmilitary objectives? Must attacks adhere to the principle of proportionality? How should states assess their cyber weapons? What role does state sovereignty play?
NCW 101 Part 14, Defence Today, pp. 71-73.
Vienna: Universität Wien.
Hack in the Box, Amsterdam.
Washington: NDU Press.
Prepared for the US-China Economic and Security Review Commission.
In: National Interest, 37:30-42.
Washington, D.C.: Center for Strategic and Budgetary Assessments.
In: CSBA (Center for Strategic and Budgetary Assessment).
Nijmegen: Wolf Legal Publishers.
In: Franklin D. Kramer / Stuart H. Starr, / Larry K. Wentz (eds.) [2009] Cyberpower and National Security. Washington, DC: NDU Press. pp. 309-340.
Stanford University Press.
L
In: Die Zeit, 40:12.
A technical analysis of what Stuxnet’s creators tried to achieve.
Forbes, 01.07.2011.
Forbes, 28.4.2011.
Forbes, 26.10.2011.
Harvard Law School National Security Journal, 25.1.12.
Opgenomen in: Ducheine/Osinga/Soeters 2012: 270-308.
In: First Monday, 17(7).
In: Journal of Information Technology and Politics, 10:86-103.
London: Routledge.
In: Cambridge Review of International Affairs, 27(2)
Georgetown Journal of International Affairs, Fall 2015: 212-222.
|
New York, NY: Basic Books.
New York: Basic Books.
University of Cambridge.
Addison-Wesley.
Safety Science, 42(4): 237-270.
Center for Strategic and International Studies, December 2005
San Francisco Chronicle, 19.2.2006
Center for Strategic and International Studies, 23.10.2009
Center for Strategic & International Studies, 11.4.2010
CSIS (Center For Strategic & International Studies).
Center for Strategic & International Studies, 13.3.2014
Center for Strategic and International Studies, 13.11.14
Center for Strategic and International Studies, 9.12.14
New York / London: W.W. Norton.
Beijing: PLA Literature and Arts Publishing House.
|
- Rand Corporation
Cambridge University Press.
Santa Monica, CA: RAND.
Testimony presented before the U.S. China Economic and Security Review Commission on January 27, 2011.
In: Strategic Studies Quarterly 5(1).
In: Journal of Law and Policy for the Information Society, 8(2): 325-340.
Rand Corporation.
Santa Monica: RAND.
In: Foreign Affairs, 14.08.2013.
In: Phil Williams / Dighton Fiddner (eds.) [2016] Cyberspace: Malevolent actors, criminal opportunities, and strategic competition. United States Army War College Press. pp. 391-416.
Journal of Strategic Studies, 35(3): 401-428.
Journal of Strategic Studies, 36(1): 134-138.
Journal Of National Security Law & Policy, Vol. 4
Frontline, 24.04.2003
University of Gent.
London / New York: Frank Cass.
Presentation at the Society of Philosophy and Technology Conference, University of North Texas, May 28, 2011.
Stutt Lecture at the U.S. Naval Academy.
Oxford University Press. 13 December 2016.
Computer Society Press & McGraw-Hill.
M
In: International Studies Quarterly, 54(2):381-401. June 2010.
In: World Politics, 27(2): 175-200
London: Routledge.
New York Times, 26.10.2009
New York Times, 18.02.2010.
New York Times, 27 June 2009.
Expert analysis of distributed denial-of-service attacks targeting South Korea.
Microsoft Press.
Routledge. December 9, 2011.
Boston, NY: Addison-Wesley.
informIT.com, 24 November 2010.
IPE (Investment & Pensions Europe), 24.4.2012
Interview in Volkskrant 17 oktober 2012.
Michigan Telecommunications & Technology Law Review, 4.
In: RUSI Journal, 157(1).
In: Joint Force Quarterly (JFQ), 63:64-69. October 2011.
Jaargang 179(5): 240-248.
Jaargang 180(6):273-286.
In: 83(2): - Patrick D. Allen/ Chris C. Demchak
Tech Reviews blog, December 2010.
Brief van minister Rosenthal (BZ) en minister Hillen (Def) met de kabinetsreactie inzake het gezamenlijk advies van de Adviesraad Internationale Vraagstukken (AIV) en de Commissie van Advies inzake Volkenrechtelijke vraagstukken (CAVV) over digitale oorlogvoering.
Toespraak minister Hillen bij opening van het Cyber Symposium van Defensie.
Indianapolis: Wiley.
Ned. Vert.: De kunst van het misleiden: De menselijke factor in informatiebeveiliging. Pearson Education Benelux
- Militaire Inlichtingen- en Veligiheidsdienst
Rand Publication.
Rapport over de gevolgen van de informatie revolutie op strategische oorlogsvoering.
Santa Monica: Rand
National Research Council 2010:55-76.
|
Foreign Policy, 12.10.2008
Open Democracy, 13.10.2008
Slate, 14.10.2009
Open Democracy, 18.10.2008
The Economist, 4.12.2008
Foreign Policy, 11.4.2009
Boston Review, July/August 2009
New York Times, 16.7.2009
Boston Review, 13.6.2009
The Economist, 9.7.2009
Foreign Policy, 21.2.2010
Wall Street Journal, 8.5.2010
New York: Public Affairs.
Slate, 23.8.2012
VPRO - Tegenlicht, 31.8.2012
Slate, 26.8.2013
London: LSE.
CATO Institute, 3.1.2012
N
Volgens Arquilla is de Amerikaanse overheid grotendeels niet voorbereid op een cyberoorlog. Internetondernemingen proberen hun producten tegen de laagste kosten op de markt te brengen zonder veel aandacht te geven aan de veiligheid van die producten. Hij roept president Obama op om iets te ondernemen om deze kwesties in een meer productieve richting te sturen.
Een vertaling van hoofdstuk 14 van het boek If the U.S.and China Go to War [2013] van Chen Pokong. Hij schetst het hypothetische begin van een conflictscenario tussen de VS en China. Daarin reageert de VS op provocatieve Chinese cyberaanvallen door een eigen cyberaanval te lanceren die de Great Firewall afbreekt. In reactie daarop sluiten de Chinese autoriteiten de toegang tot internet volledig af, waarop de VS weer snel reageren. Uiteindelijk brengt (door het regime georganiseerde) straatgeweld de levens in gevaar van de Amerikaanse consulaire staf. De Chinees-Amerikaanse betrekkingen escaleren snel van de huidige modus vivendie in regelrechte vijandelijkheden.
Washington D.C.: National Academies Press.
Washington D.C.: The National Academies Press.
Washington D.C.: National Academies Press.
Washington D.C.: National Academies Press.
- North Atlantic Treaty Organization
Strategic Concept for the Defence and Security of the Members of the North Atlantic Treaty Organisation adopted by Heads of State and Government in Lisbon.
“Cyber threats and attacks will continue to become more common, sophisticated, and potentially damaging. … Cyber attacks can reach a threshold that threatens national and Euro-Atlantic prosperity, security, and stability. Their impact could be as harmful to modern societies as a conventional attack. We affirm therefore that cyber defence is part of NATO’s core task of collective defence. A decision as to when a cyber attack would lead to the invocation of Article 5 would be taken by the North Atlantic Council on a case-by-case basis.”
Cambridge University Press.
The first edition of the Tllinn Manual focused on the most disruptive and destructive cyber operations that qualify as armed attacks and therefore allow States to respond in self-defense. Tallinn 2.0 assesses the international legal framework that applies to malevolent cyber operations that do not rise to the level of actions in armed conflict, as well as address, with respect to individuals, human rights law.
[1997] Sun Tzu and Information War
Washington, DC: National Defense University Press.
New York: Basic Books.
Cambridge, MA: Harvard University.
In: Strategic Studies Quarterly, Winter 2011.
New York: Public Afairs Press. December 13, 2011.
In: Project Syndicate, December 10, 2015.
In: Project Syndicate, March 13 2017.
O
Journal of Conflict & Security Law, 17(2): 187-209.
Den Haag: Boom Lemma.
New York: Diversion Books.
Oxford University Press.
Cyberweapons and cyberwarfare are one of the most dangerous innovations of recent years, and a significant threat to national security. Cyberweapons can imperil economic, political, and military systems by a single act, or by multifaceted orders of effect, with wide-ranging potential consequences. Cyberwarfare occupies an ambiguous status in the conventions of the laws of war. The authors address ethical and legal issues surrounding cyberwarfare by considering whether the Laws of Armed Conflict (LOAC) apply to cyberspace and the ethical position of cyberwarfare against the background of our generally recognized moral traditions in armed conflict. The authors explore these moral and legal issues and examine the key principles of jus in bello to determine how they might be applied to cyber conflicts. The distinction between civilian and combatant in this context and the level of causation necessary to elicit a response are studied and the specific operational realities implicated by particular regulatory regimes are analyzed.
Back Bay Books.
In: Defence and Strategy, 2.
IIPS, Institute for International Policy Studies (29.01.2012).
Brookings, November 2013.
Tallinn University of Technology.
Committee on Offensive Information Warfare, National Research Council.
Washington, DC: National Academies Press.
P
Cambridge University Press.
Princeton, NJ: Princeton University Press.
Michigan Telecommunications & Technology Law Review, 7.
Proceedings of the 20th National Information Systems Security Conference, October 1997, pp. 285-289.
Voor militairen die in de toekomst oorlog voeren is het echte cybergevaar dat de vijand toegang krijgt tot veilige netwerken, dat signalen worden verstoord en dat er gerommeld wordt met sensoren op bemande en onbemande oorlogsmachines. De Amerikaanse luchtmacht weet niet precies wat het is om in een luchtruim te vliegen waarin een tegenstander actief bezig is om de sensoren en communicaties die vitaal zijn voor het moderne vliegtuig te verblinden, onbruikbaar te maken of anderszins in verwarring te brengen. Het onderzoekslaboratorium van de Amerikaanse luchtmacht gaat daarom op zoek naar manieren waarop een virtueel vijandig luchtruim kan worden bestreden. Op de slagvelden van de toekomst kan het verstoren van de communicatie van een drone net zo nuttig zijn als het neerschieten van een drone.
White Paper, Eurecom.
Week.com, 18.08.2009
Het Lexicon laat zien hoe in het Amerikaanse cyberleger geprobeerd wordt om precies te definiéren hoe cyberwapens zich onderscheiden van traditionele wapens.
China Military Science Journal, Spring 1995.
R
IEEE Spectrum, 25 aug 2014.
Transconflict, 7.12.2011
Fabius Maximus.
Fabius Maximus.
Fabius Maximus.
Cambridge, MA: MIT Press.
iTunes Edition.
In: International Affairs, 81(5):1061-1078. Octboer 2005
New York: Random House.
Ruimtevaart, Augustus 1999.
New York: Vintage.
Kikimora Publications. March 2016.
Washington, D.C.: Georgetown University Press.
London: Routledge.
Journal of Strategic Studies, 25(1):5-32.
Foreign Policy, March/April 2012
CSP (Contempory Security Policy).
London: Hurst.
New Scientist, 9.9.2013.
Journal of Strategic Studies, 23 Dec 2014.
W.W.Norton & Company. 28 June 2016.
In: RUSI Journal, 157(1)
Conflict Studies Research Centre
In: A. von Dogdandy / R. Wolfrum (eds.) [2010] Max Planck Yearbook of United Nations Law, Volume 14: pp. 85-130.
Oxford University Press.
Georgetown University Press.
In: Cnet News, 18..8.2009.
In: European Affairs 9.
In: Virginia Journal of Law & Technology, 9(7).
S
Universität Osbabrück, Germany.
Universität Osbabrück, Germany.
New York: Crown.
In: New York Times, 02.06.2012.
In: New York Times, 24.02.2014.
In: International New York Times, 16.7.2016
In: NIST - Computer Security Resource Center (CSRC)
In: Air Force Law Review 64 (121): 144-145.
Praeger.
Gepubliceerd door System Administration, Networking, and Security [SANS].
Columbia Journal of Transnational Law, 37: 885-937.
In: Cyber Computer Science and Telecommunications Board (ed.), [2010] Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy.
Harvard International Law Journal, 54.
In: CNet News.
In: Salon.com.
In: Wired.
Wired News.
Information Security
In: Wired News.
In: Discovery Technology.
In: Security.
In: MPR News Q and ITWire.
In: CNN.
In: AOL News.
In: Financial Times.
In: U.S. News.
New York Times Room for Debate.
In: The Irish Times.
In: MIT Technolgy Review.
In: The Irish Times.
In: CNN.
In: UN Chronicle.
In: The Wall Street Journal.
In: Europe’s World.
In: Europe’s World.
In: Wired.
In: The Atlantic.
In: The Atlantic.
In: The Mark News.
In: Time.
In: CNN.
In: The Rippon Forum, 50(2). April 2016.
In: CNN.
In: Motherboard.
In: The Washington Post.
In: Vox.
In: The Atlantic.
In: Motherboard.
In: Time.
In: SecurityIntelligence.
In: CNN.
In: New York Magazine.
In: TechCrunch, 8.10.09.
In: TechCrunch, 1.1.16.
DCAF (Centre for the Democratic Control of Armed Forces).
New York: Thunder’s Mouth Press.
- Pierluigi Paganini
Vol. 7(2): 81-103.
Vol. 9(2): 91-98.
Vol. 12(1): 115-126.
Vol. 12(2): 9-26.
Presented at the Systems & Software Technology Conference, May 18, 2011. Salt Lake City.
Berkeley Journal of International Law (BJIL), 25:3.
In: 13th International Conference of Autonomous Agnets and Multiagent Systems (AAMAS-14), May 2014.
San Antonio, TX: Aegis Research Corp.
ACM Conference on Computers and Communications Security (CCS) 2008, Alexandria, VA, pp. 47-50.
New York: Penguin Press.
Brookings
Brookings.
In: Popular Science.
In: Defense One.
Oxford University Press. January 3, 2014.
Excerpt: What about deterrence in an era of cyberwar?
Why belief in first-strike advantage is as misguided today as it was in 1914.
In: Foreign Policy, 15.1.2014.
Springer Verlag.
In: Virus Bulletin, 01.04.10
Trends in world military expenditure, 2012 |
2013 |
2014 |
2015
In: Military Law Review, 201: 1-85.
American Eagle.
In: Issues, 15(1).
In:Canadian Military Journal 6(3).
PublicAffairs. September 8, 2015.
In: Strategic Studies Quarterly 5(1):1-25. Spring 2011.
In New Security Paradigms Workshop. Langdale, Cumbria UK.
In: Dialectical Anthropology, 26(1):37-63. March 2001
Addison-Wesley. September 13, 2002.
Georgia Institute of Technology. May 2012.
Universiteit Leiden. PhD Thesis.
In: Crypto 2013, 8042: 129-146.
Lanham: Government Institutes.
IT-Harvest Press. March 23, 2015.
Wien/New York: Springer Verlag.
In: Yale Law & Policy Review, 32(1):239-266. Fall 2013.
Doubleday.
In: Parameters, 61-76. Winter 2008-2009.
Publications, 04.04.2013
In: Parameters 43(3): 111-118. Autumn 2013.
Publications: March 2014.
In: Parameters 44(3): 105-113. Autumn 2014.
In: Parameters 44(3): 115-124. Autumn 2014.
In: Parameters 44(3): 149-150. Autumn 2014.
In: Parameters 46(3): 59-69. Autumn 2016.
August 2016.
September 12, 2016.
December 2016.
In: Parameters 45(4): 65-74. Winter 2015-2016.
In: Parameters 47(2): 51-63. Summer 2017.
Volume 39(3): 135-155.
Volume 53(1): 23-40.
Volume 58(5): 23-32.
VB2008, 1-3 October 2008 in Ottawa.
T
South Carlton.
Thesis, Naval Postgraduate School, Monterey, California (USA).
In: David Gauntlett [2000] Rewiring Media Studies. London: Arnold. pp. 194-201.
In: The Russian Armed Forces at the Dawn of the Millenium, 7-9 February 2000.
In: The Journal of Slavic Military Studies. 11(1): 40-62.
In: IWS - The Information Warfare Site. 19 November 2008.
Foreign Military Studies Office, Fort Leavenworth.
In: Phil Williams / Dighton Fiddner (eds.) [2016] Cyberspace: Malevolent actors, criminal opportunities, and strategic competition. United States Army War College Press, pp. 173-204.
Foreign Military Studies Office (FMSO) at Fort Leavenworth, Kansas. April 2016.
Polity Press, UK.
In: The RUSI Journal, 160(4):40-48.
In: Bettina Renz / Hanna Smith (eds.) [2016] Russian Hybrid Warfare: Going Beyond the Label. pp. 52-60.
Tallinn, Estonia: NATO Cooperative Cyber Defence Centre of Excellence (CCD-COE).
Tallinn, Estonia: NATO Cooperative Cyber Defence Centre of Excellence (CCD-COE).
Een discussie met John Nagl (Center for New American Security), Kristin Lord (idem) en James Lewis (Center for Strategic and International Studies).
Een discussie met Kristin Lord (Center for a New American Security) en James Lewis (Center for Strategic and International Studies).
In: Air Force Law Review, 65.
Little Brown & Co.
In: The World Today, 58(4):7-8. April 2002.
In: The World Today, 58(11):10-11. November 2002.
U
Onderdeel van de Amerikaanse krijgsmacht dat cyberspaceoperaties coördineert en de verschillende Amerikaanse militaire netwerken op elkaar afstemt. Het is ondergeschikt aan het U.S. Strategic Command en is gevestigd in Fort George G. Meade in Maryland.
Office of General Counsel Department of Defense.
V
In: Journal of Peace Research, 51(3): 347-360. May 2014.
Oxford University Press.
Cambridge, MA: MIT Press
Hermes-Lavoisier. October 2007.
Wiley-ISTE. October 12, 2009.
Hermes-Lavoisier. July 2010.
Hermes-Lavoisier. April 2011.
Hermes-Lavoisier. August 2011.
Wiley-ISTE. August 15, 2011.
01net.entreprises, 30.02.2012.
Wiley-ISTE. April 2012.
Wiley-ISTE. April 20, 2015.
In: Information & Security, 32.
Carré, 5: 1-8.
W
Boston, MA: Artech House.
Basic Books.
Binnenlandsbestuur, 2.4.2010
UPI.com.
In: Cyberscoop,
PhD thesis. Cornell University.
In: American Journal of Sociology, 105(2):493-527. September 1999.
In: Proceedings of the National Academy of Sciences, 99(9): 5766-5771
W. W. Norton & Company.
In: Yale Journal of International Law, 36(2): 421-59.
In: International Law Studies, 89.
Momentum Press.
Washington, DC.: The National Defense University Center for Technology and National Security Policy (CTNSP).
In: Telepolis, 9.10.1998
In: Financial Times Deutschland, 21.12.2010.
In: Phoenix, 19.09.13.
In: Phoenix, 2.10.13.
Course Technology.
Global Issues.
The Global Initiative. 10 April 2012.
BiblioGov. 31 October 2012.
Strategic Studies Institute. 11 August 2016.
Aegis Research Corp.
In: Proc. IFIP Eighteenth Int. Inf. Security Conference. Kluwer Acad.Publishers (Athens, Greece, May 2003).
In: Proc. Twenty-seventh Annual Int. Computer Software and Applications Conf., IEEE
(Dallas, Tex., Nov. 2003).
Naval Postgraduate School. Monterey, California.
Prima Lifestyles. 9 April 1997.
Wiley. 9 April 2005.
Syngress. 6 December 2016.
In: CSO.
In: CSO.
In: CSO.
In: CSO.
An attempt to advance the dialogue on systemic cyber risk by defining «systemic cyber risk» and examining the ecosystem of digital connectivity. From here, government and industry must collaborate to develop the solutions that will secure the promise of Fourth Industrial Revolution.
Renkum: Nobel.
- Wetenschappelijke Raad van het Regeringsbebeleid
Virus Bulletin.
X
Y
Faculty Scholarship. Paper 1540.
Studenten en docenten van de Information Operations School van de Amerikaanse luchtmacht in Hurlbert Field (Florida) vertellen over de training voor strijd op de nieuwe frontlijnen van cyberspace.
Michael Scharf leads a discussion on the foreign policy implications of cyber warfare with an expert panel, headlined by Peter Singer of the Brookings Institution.
Cyber war does not exist. This is the bald statement summarising the work of Dr Thomas Rid of King’s College London, who feels that cyber attacks meet none of the conditions of war. NATO Review asked how he came to this conclusion and what it meant for the security field. This video is part of the NATO Review edition titled: “Cyber - the good, the bad and the bug-free.”
The hacktivist group Anonymous sent this video to News2share, declaring a cyber-war against ISIS, also known as the Islamic State. ISIS has been known for its sophisticated digital media campaign, and is estimates to have tens of thousands of social media accounts online. Some members of Anonymous explained that they intend to wage a cyber-war against ISIS by hacking into and sabotaging their social media accounts and other electronic resources.
Tor Project developer and investigative journalist for Der Spiegel, Jacob Appelbaum discusses and answers questions on the topic of Cyber War vs Net Peace. Jacob is known for not liking the phrase "cyber war" due to the negative connotations it comes with. Appelbaum wants liberty for all and therefor we should be shifting towards a secure communications world by using encryption which will improve civil liberties.
The Sony seemed to reveal a dangerous and mysterious branch of the North Korean military: cyber soldiers. These troops can strike nearly anywhere in the world because they wage war from behind a computer screen.
Bureau 121 is the shadow agency at the heart of North Korea’s cyberwar against the West. CNN’s Kyung Lah reports.
What makes today’s issues of cyber security different than any other threat we’ve faced as a nation? Co-director of Stanford’s Center for International Security and Cooperation Amy Zegart lays out the five reasons cyberwar is a whole new world.
Everyone is talking about Cyber:
‘Cyberweapons’, ‘Cyberattacks’ and of course ‘Cyberwar’. But what does a ‘cyberwar’ actually look like? Do we really want that our computers, toasters, fridges and routers go to war? Should intelligence agencies be allowed to turn our infrastructure into dangerous weapons?
Z
Een goed samenvattingvan de omstandigheden die leidden tot de cyberaanval op Estland en van de gevolgen daarvan.
Crown. 11. November 2014.
Proceedings of CPSCom 2011: The 4th IEEE International Conference on Cyber, Physical and Social Computing, Dalian, China, October 19-22, 2011.
In: The Military Law and the Law of War Review, 49(1-2): 47-94.
In: Ch. Czosseck / R. Ottis/ K. Ziolkowski (Eds.) [2012]Proceedings of the 2012 4th International Conference on Cyber Conflict. NATO CCD COE Publication, pp. 295-309.
NATO CCD COE Publication, Tallinn.
In: Ziolkoswski (ed.) [2013:135-188].
In: Ziolkoswski (ed.) [2013:425-464].
New Haven: Yale University Press.
In: Fordham Law Review, 78(6)
In: Just Seurity, 19.10.2016.
In: Lawfare. 23.10.2016.
Home
Onderwerpen
Zoek
Over ons
Doneer
Contact
Eerst gepubliceerd: Jan, 2015