• My Tweats

    Error: Twitter did not respond. Please wait a few minutes and refresh this page.

  • Flickr Photos

(old found draft post)CyberWar – Ref Links

Apr 26, 2009 @ 12:05

I will return to the topic of CyberWar sometime in the near future.

http://en.wikipedia.org/wiki/Cyber-warfare
http://www.sdrnews.com/index.php/the-news/685-cyberwar-skeptic

http://www.schneier.com/blog/archives/2007/06/cyberwar.html
Cyberwar — Warfare in cyberspace. This includes warfare attacks against a nation’s military — forcing critical communications channels to fail, for example — and attacks against the civilian population.

Cyberterrorism — The use of cyberspace to commit terrorist acts. An example might be hacking into a computer system to cause a nuclear power plant to melt down, a dam to open, or two airplanes to collide. In a previous Crypto-Gram essay, I discussed how realistic the cyberterrorism threat is.

Cybercrime — Crime in cyberspace. This includes much of what we’ve already experienced: theft of intellectual property, extortion based on the threat of DDOS attacks, fraud based on identity theft, and so on.

Cybervandalism — The script kiddies who deface websites for fun are technically criminals, but I think of them more as vandals or hooligans. They’re like the kids who spray paint buses: in it more for the thrill than anything else.

http://www.undiplomatic.net/2008/07/16/cyber-war-or-cylon-war/
http://www.worldchanging.com/archives/008381.html
http://blog.dustinlfritz.com/2009/03/test.html
http://www.punchkids.net/2007/06/06/essay-on-cyberwar/
http://staff.washington.edu/dittrich/cyberwarfare.html
http://neteffect.foreignpolicy.com/posts/2009/04/11/writing_the_scariest_article_about_cyberwarfare_in_10_easy_steps
http://www.foxnews.com/story/0,2933,513121,00.html?sPage=fnc/scitech/cybersecurity
http://www.foxnews.com/story/0,2933,506830,00.html?sPage=fnc/scitech/cybersecurity
http://www.businessweek.com/the_thread/techbeat/archives/2009/02/fearing_cyber_k.html?chan=top+news_top+news+index+-+temp_news+%2B+analysis
http://www.popularmechanics.com/technology/military_law/4277463.html
http://taosecurity.blogspot.com/2008/11/response-to-marcus-ranum-hitb-cyberwar.html
http://taosecurity.blogspot.com/2008/11/response-to-marcus-ranum-hitb-cyberwar.html
http://nchovy.kr/uploads/3/305/KEYNOTE%202%20-%20Marcus%20Ranum%20-%20Cyberwar%20is%20Bullshit.pdf
http://taosecurity.blogspot.com/2007/09/china-cyberwar-or-not.html

http://www.armedforcesjournal.com/2008/05/3375884
http://128.100.171.10/modules.php?op=modload&name=News&file=article&sid=1711
http://www.dodbuzz.com/2009/04/29/flournoy-details-qdr-threats-principles/
http://128.100.171.10/modules.php?op=modload&name=News&file=article&sid=2266&mode=thread&order=0&thold=0
http://www.nationalacademies.org/morenews/20090429.html
http://www.govtrack.us/congress/bill.xpd?bill=s111-773
http://commerce.senate.gov/public/_files/Cyberbillsummaryonepagerplusthreepagesummarypressrelease1Apr090.pdf
http://cdt.org/security/CYBERSEC4.pdf
http://www.opencongress.org/bill/111-s773/show

http://selil.com/?p=477
http://selil.com/?p=297
http://selil.com/?p=278
http://selil.com/?p=239
“Cyberspace is the terrain of technology mediated communication.”
http://selil.com/?p=177
http://selil.com/?p=172
http://selil.com/?p=659
http://selil.com/?p=595
http://selil.com/?p=555

http://it.slashdot.org/article.pl?sid=09/04/28/205203

http://www.winnschwartau.com/downloads.html
http://www.winnschwartau.com/resources/ebr+BILL.pdf
http://www.winnschwartau.com/resources/CyberChrist+Meets+Lady+Luck+DC2.pdf
http://www.winnschwartau.com/resources/CHAP_031_Lying+to+Hackers+Deception.pdf
http://www.winnschwartau.com/resources/InfoSecArticle.pdf

http://www.nytimes.com/2009/04/28/us/28cyber.html?_r=1
http://www.pcworld.com/article/163533/fighter_jet_hack_far_from_first_government_breach.html
http://threatswatch.org/commentary/2009/03/legacy-futures-in-cyberspace/
http://www.wired.com/threatlevel/2009/04/cyber-criminals

http://www.hackersarepeopletoo.com/

http://www.cyberconflict.org/Research-agenda
http://www.wired.com/dangerroom/2009/04/cyberpanic-it-sells/

http://zenpundit.com/?p=3074
http://www.schneier.com/blog/archives/2007/06/cyberwar.html

http://www.popsci.com/scitech/article/2009-04/hackers-china-syndrome

cyberwar at complexity leveragepoints sysperps

http://cosmiclog.msnbc.msn.com/archive/2009/04/22/1903394.aspx
http://www.guardian.co.uk/technology/2009/apr/16/internet-hacking-cyber-war-nato

http://nchovy.kr/uploads/3/305/KEYNOTE%202%20-%20Marcus%20Ranum%20-%20Cyberwar%20is%20Bullshit.pdf
http://conference.hitb.org/hitbsecconf2008kl/?page_id=65
http://thepiratebay.org/torrent/4654588/HITBSecConf2008_-_Malaysia_Videos___Day_1
http://thepiratebay.org/torrent/4654974/HITBSecConf2008_-_Malaysia_Videos___Day_2

http://www.wired.com/dangerroom/2009/04/cyberpanic-it-sells/
http://m.economist.com/h/leaders_13527677.php
http://www.honeyd.org/
http://128.100.171.10/modules.php?op=modload&name=News&file=article&sid=2269&mode=thread&order=0&thold=0
http://128.100.171.10/modules.php?op=modload&name=News&file=article&sid=2270&mode=thread&order=0&thold=0
http://128.100.171.10/modules.php?op=modload&name=News&file=article&sid=2271&mode=thread&order=0&thold=0

http://threatswatch.org/rapidrecon/2009/04/cyberspace-and-targeting/
http://ubiwar.com/2009/04/29/the-future-of-us-cyberattack/
http://www.securityfocus.com/columnists/500
http://intelfusion.net/wordpress/?p=564
http://intelfusion.net/wordpress/?p=537

http://128.100.171.10/modules.php?op=modload&name=News&file=article&sid=2297&mode=thread&order=0&thold=0
http://128.100.171.10/modules.php?op=modload&name=News&file=article&sid=2297&mode=thread&order=0&thold=0
http://www.nextgov.com/nextgov/ng_20090506_4087.php
http://128.100.171.10/modules.php?op=modload&name=News&file=article&sid=2298&mode=thread&order=0&thold=0

http://selil.com/?p=685
http://committeeofpublicsafety.wordpress.com/2009/05/04/maritime-strategy-and-cyberwar/
http://selil.com/?p=691
http://selil.com/?p=697

http://selil.com/?p=709
http://www.tdaxp.com/archive/2009/05/19/the-future-of-warfare-and-of-humanity.html

http://selil.com/?p=705

http://news.slashdot.org/article.pl?sid=09/05/08/2219258

http://blog.loglogic.com/2009/05/get_ready_new_cybersecurity_standard_for_american_businesses.php

http://www.infowars.com/nrc-study-calls-for-covert-cyberattack-against-non-state-enemies/

http://www.time.com/time/magazine/article/0,9171,1098961-1,00.html
http://www.cringely.com/2009/06/collateral-damage/
http://twitter.com/cyberwar/status/2116982128
http://twitter.com/cyberwar/status/2117575381

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: