Important Announcement
PubHTML5 Scheduled Server Maintenance on (GMT) Sunday, June 26th, 2:00 am - 8:00 am.
PubHTML5 site will be inoperative during the times indicated!

Home Explore Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare

Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare

Published by E-Books, 2022-06-20 14:41:37

Description: Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare

Search

Read the Text Version

George, Roger Z., and Harvey Rishikof, eds. The National Security Enterprise: Navigating the Labyrinth. Washington, DC: Georgetown University Press, 2011. Schmitt, Eric, and Thom Shanker. Counterstrike: The Untold Story of America’s Secret Campaign against Al-Qaeda. New York: Macmillan, 2011. Cybersecurity—General Information Charney, Scott. Collective Defense: Applying Public Health Models to the Internet. Redmond, WA: Microsoft Corporation, 2010. “Cybersecurity Symposium.” Journal of National Security Law & Policy 4, no. 1 (2010). Executive Office of the President. National Strategy for Trusted Identities in Cyberspace. April 2011. Karas, Thomas, Judy Moore, and Lori Parrot. Metaphors for Cybersecurity. Sandia National Laboratory, 2008. Rosenzweig, Paul. Cyber Warfare: How Conflicts in Cyberspace are Challenging America and Changing the World. Santa Barbara: Praeger, 2012. ———. www.cyberwarfarebook.com. U.S. Department of Justice, Office of Legal Counsel. “Legality of Intrusion- Detection System to Protect Unclassified Computer Networks in the Executive Branch.” August 2009. ———. “Legal Issues Relating to the Testing, Use, and Deployment of an Intrusion Detection System (Einstein 2.0) to Protect Unclassified Computer Networks in the Executive Branch.” January 2009. 145

Bibliography Data Mining and Government Databases Bailey, Dennis. The Open Society Paradox: Why the 21st Century Calls for More Openness—Not Less. London: Brassey’s, 2004. Harris, Shane. The Watchers: The Rise of America’s Surveillance State. New York: Penguin Press, 2010. Markle Foundation. Protecting America’s Freedom in the Information Age: A Report of the Markle Foundation Task Force. 2002. ———. Creating a Trusted Network for Homeland Security. 2003. O’Harrow, Robert, Jr. No Place to Hide. New York: Free Press, 2005. Smith, Derek V. Risk Revolution: The Threats Facing America and Technology’s Promise for a Safer Tomorrow. Athens, GA: Longstreet Press, 2004. Economics Fisher, Eric A. Creating a National Framework for Cybersecurity: An Analysis of Issues and Opinions. Hauppauge, NY: Nova Science Publishers, 2009. Grady, Mark F., and Francesco Paris, eds. The Law and Economics of Cybersecurity. Cambridge: Cambridge University Press, 2006. Ostrom, Elinor. Governing the Commons: The Evolution of Institutions for Collective Action. Cambridge: Cambridge University Press, 1990. Powell, Benjamin. “Is Cybersecurity a Public Good? Evidence from the Financial Services Industry.” Journal of Law, Economics & Policy 1 (2005): 497. Thaler, Richard, and Cass Sunstein. Nudge: Improving Decisions about Health, Wealth, and Happiness. New Haven: Yale University Press, 2008. 146

Encryption and Wiretapping Al-Kadi, Ibraham A. “The Origins of Cryptology: The Arab Contributions.” Cryptologia 16, no. 2 (April 1992). Gardner, Martin. “A New Kind of Cipher That Would Take Millions of Years to Break.” Scientific American 237 (August 1977). Landau, Susan. Surveillance or Security: The Risks Posed by New Wiretapping Technologies. Cambridge, MA: MIT Press, 2011. Levy, Steven. Crypto: How the Code Rebels Beat the Government, Saving Privacy in the Digital Age. New York: Penguin Press, 2001. Singh, Simon. The Code Book. New York: Doubleday, 1999. Espionage and Crime Brenner, Joel. America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime and Warfare. New York: Penguin Press, 2011. Office of the National Counterintelligence Executive. Foreign Spies Stealing U.S. Economic Secrets in Cyberspace. October 2011. U.S.-China Economic and Security Review Commission. Report to Congress. November 2010. VeriSign. The Russian Business Network: Rise and Fall of a Criminal ISP. March 2008. The Future Gardner, Dan. Future Babble: Why Expert Predictions Are Next to Worthless, and You Can Do Better. New York: Dutton, 2011. Hawkins, Jeff. On Intelligence: How a New Understanding of the Brain Will Lead to the Creation of Truly Intelligent Machines. New York: Henry Holt, 2004. 147

Bibliography Taleb, Nassim. Black Swan: The Impact of the Highly Improbable. New York: Random House, 2007. Government Organization Center for Strategic and International Studies. Securing Cyberspace for the 44th Presidency. December 2008. Executive Office of the President. Cyber Space Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure. May 29, 2009. ———. Comprehensive National Cybersecurity Initiative. 2010 (declassified version). U.S. Department of Homeland Security and National Security Agency. Memorandum of Understanding Regarding Cybersecurity. October 10, 2010. Hardware Problems Defense Science Board. Mission Impact of Foreign Influence on DoD Software. September 2007. U.S. Department of Commerce. Defense Industrial Base Assessment: Counterfeit Electronics. January 2010. International Cybersecurity Demchak, Chris, and Peter Dombrowski. “Rise of a Cybered Westphalian Age.” Strategic Studies Quarterly (Spring 2011). Executive Office of the President. International Strategy for Cyberspace. May 2011. Goldsmith, Jack. “Cybersecurity Treaties: A Skeptical View.” In Future Challenges in National Security and Law, edited by Peter Berkowitz. Washington, DC: Hoover Institution, 2011. 148

Malware Alperovitch, Dmitri. Revealed: Operation Shady RAT. McAfee, August 2011. Bowden, Mark. Worm: The First Digital World War. New York: Atlantic Monthly Press, 2011. Combating Robot Networks and Their Controllers: A Study for the Public Security and Technical Program (unclassified version 2.0). May 6, 2010. Information Warfare Monitor. “Tracking GhostNet: Investigating a Cyber Espionage Network.” March 2009. Symantec, W32.Stuxnet Dossier. February 2011. Personal Cybersecurity Mitnick, Kevin. The Art of Deception: Controlling the Human Element. Hoboken, NJ: Wiley, 2002. National Cyber Security Alliance. StaySafeOnline. www.staysafeonline.org. The Tor Project. www.torproject.org. Privacy and Secrecy American Bar Association, Office of the National Counterintelligence Executive, and National Strategy Forum. No More Secrets: National Security Strategies for a Transparent World. March 2011. Mayer-Schoenberger, Victor. Delete: The Virtue of Forgetting in the Digital Age. Princeton, NJ: Princeton University Press, 2009. Raul, Alan Charles. Privacy and the Digital State: Balancing Public Information and Personal Privacy. New York: Kluwer Academic Publishers, 2002. Rosen, Jeffrey. The Naked Crowd: Reclaiming Security and Freedom in an Anxious Age. New York: Random House, 2004. 149

Bibliography Solove, Daniel J., and Paul M. Schwartz. Privacy, Information and Technology. 2nd ed. Alphen aan den Rijn, Netherlands: Wolters Kluwer, 2009. Warfare Carr, Jeffrey. Inside Cyber Warfare. Cambridge, MA: O’Reilly, 2010. Clarke, Richard A., and Robert K. Knake. Cyber War: The Next Threat to National Security and What to Do about It. New York: HarperCollins, 2010. Kramer, Franklin, Stuart Starr, and Larry Wentz, eds. Cyberpower and National Security. Washington, DC: National Defense University, 2009. Libicki, Martin. Cyberdeterrence and Cyberwar. Santa Monica, CA: RAND, 2009. Lynn, William J., III. “Defending a New Domain: The Pentagon’s Cyberstrategy.” Foreign Affairs 97 (September/October 2010). Nye, Joseph S., Jr. Cyber Power. Cambridge, MA: Harvard Belfer Center, 2010. ———. Soft Power: The Means to Success in World Politics. Ann Arbor, MI: Public Affairs, 2004. Owens, William, Kenneth Dam, and Herbert Lin, eds. Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyber Attack Capabilities. Washington, DC: National Academies Press, 2009. Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy. Washington, DC: National Academies Press, 2010. Rattray, George J. Strategic Warfare in Cyberspace. Cambridge, MA: MIT Press, 2001. U.S. Department of Defense. Strategy for Operating in Cyberspace. July 2011. 150

———. Cyberspace Policy Report. November 2011. U.S. Government Accountability Office. Defense Department Cyber Efforts. May 2011. 151


Like this book? You can publish your book online for free in a few minutes!
Create your own flipbook