The collection database from Study4Cyberwar

Study on Cyberwar

Hello researchers and all interested people, we were out of order because we were hacked the second time in six weeks. But the links are still up to date. We think that some people do not want our page online! Hopefully we can handle this in the future. Thank you for your patience. 

 

This page is a dedicated platform for the field of cyber warfare. We want to share research with other people who are interested in this subject, either for private, work related or academic reasons. It changes the threat environment of the 21th century. The USA has an new Cyber-Command, Google fights with China, classified systems were compromised and our critical infrastructures are under attack. We need new treaties, systems and security solutions because the war in the 5th domain can not be solved by cold-war analysis! We try to find new information and people who are interested in contributing to this endeavour. Maybe in a few years time we can set up a cyberwar institute which can establish a framework, with international collaboration, to find a solution to this global problem. It is a lot of work for all people in the cyberspace! Feel free to contact us for more information! 

 

April/11




    March/11

    February/11

    1. Wie Cyberangriffe im Netz funktionieren article(02/2011)
    2. U.S. enables Chinese hacking of Google article(02/2011)
    3. Cybercrime Outlook 2020 article(02/2011)
    4. Cyber attacks to replace bombings? article(02/2011)
    5. Cyber battle: the morning after article(02/2011)
    6. Carnegie Mellon University Study: Insider Threat Taxonomies article(02/2011)
    7. NSA and DoD Warn of Destructive Cyber Attacks article(02/2011)
    8. So, Why Does the Air Force Want Hundreds of Fake Online Identities on Social Media? [Update]article(02/2011)
    9. Iran’s Right to Cyber Self Defense article(02/2011)
    10. RSA: Cyber War Mass Hysteria Is Hindering Security article(02/2011)
    11. Stuxnet had a full bag of tricks, report says article(02/2011)
    12. Targeted attacks, IPv6 complicate cyber defense article(02/2011)
    13. NSA chief wants to protect 'critical' private networks article(02/2011)
    14. Black ops: how HBGary wrote backdoors for the government article(02/2011)
    15. Kybernetische Krieger werden überschätzt article(02/2011)
    16. RSA: Defining cyberwar is just as hard as fighting it article(02/2011)
    17. Israel video shows Stuxnet as one of its successes article(02/2011)
    18. Cyber war threat exaggerated claims security expert article(02/2011)
    19. Report: Iran recovered quickly from cyber-attack on nuclear plant article(02/2011)
    20. U.S. Preparing Cyberwar Strategy Before Threat Grows article(02/2011)
    21. Why we need cooperation in cyberspace? article(02/2011)
    22. White House Advisor: Use of Term Cyberwar “Terrible” article(02/2011)
    23. Stuxnet expert: other sites were hit but Natanz was true target article(02/2011)
    24. Low Intensity Conflicts - Virtual Small Arms Proliferation article(02/2011)
    25. Air Force Official: Yes to Retaliation in Cyberspace article(02/2011)
    26. Trend to watch: Formal relationships between governments and hacker article(02/2011)
    27. Könnte ein Angriff auf das Routing-Protokoll das gesamte Internet lahmlegen? article(02/2011)
    28. Nationales Cyber-Abwehrzentrum -- Internet-Wacht am Rheinarticle(02/2011)
    29. About CyberWar, Deterrence, and Espionage article(02/2011)
    30. Stuxnet and the hacker non-sense article(02/2011)
    31. Cyber war dominates the landscape at RSA conference article(02/2011)
    32. Schwartz says he will protect cyber mission article(02/2011)
    33. Updated W32.Stuxnet Dossier is Available article(02/2011)
    34. Report: Stuxnet Hit 5 Gateway Targets on Its Way to Iranian Plant article(02/2011)
    35. Schwartz says he will protect cyber mission article(02/2011)
    36. Opinion: Time for a Geneva Convention on cyberwar article(02/2011)
    37. Spy chief: Cyber war is ‘battleground of future’ article(02/2011)
    38. Chinese hackers infiltrated five energy firms: McAfee article(02/2011)
    39. The Changing Security Battlefield article(02/2011)
    40. 'Chinese cyberspies' target energy giants article(02/2011)
    41. Cyberwar - Neusprech article(02/2011)
    42. POLITOLOGE ANDREAS SCHMIDT ÜBER CYBERWAR - "Erkältung ist nicht die schwarze Pest"article(02/2011)
    43. IBM Launches Initiatives to Help Secure the Exploding World of Connected Devices article(02/2011)
    44. U.S.-China Cyber War Scenario in the Eyes of a Chinese Student article(02/2011)
    45. Secret China war plan: trillions in U.S. debt Commentary: Today an economic battle; later, combatarticle(02/2011)
    46. Cyber War Rules of Engagement Report based on Geneva Convention article(02/2011)
    47. Cyber-Activism and Cyber-War Spotlighted at Panda Security's Third Annual Security Blogger Summitarticle(02/2011)
    48. Cyberwar – Mythos und Realität--Byte-Piraten article(02/2011)
    49. U.S. Military Can Restore a Country's Internet - Whether It Likes It or Not article(02/2011)
    50. Secret China war plan: trillions in U.S. debt article(02/2011)
    51. Hackers target NI Department of Finance phone network article(02/2011)
    52. Merkel: Cyberwar so gefährlich wie klassischer Krieg article(02/2011)
    53. India wants rules of cyber ‘war’ defined article(02/2011)
    54. Study considers the Geneva Convention in cyberspace article(02/2011)
    55. U.S. Navy Selects Integrators to Evaluate Four Competitive Cyber-Warfare Concepts article(02/2011)
    56. UK Cyberwar - or UK Cyberwallies? article(02/2011)
    57. Wir müssen mal über Krieg reden...article(02/2011)
    58. Attackers' Subtle Markets Manipulation Could Tilt Global Economies article(02/2011)
    59. Chinese cyber-spies penetrate Foreign Office computers article(02/2011)
    60. Hackers Penetrate Nasdaq Computers article(02/2011)
    61. What Could Possibly Go Wrong: Industrial Cyber-Sabotage article(02/2011)
    62. NSA Fear Puts Focus on Access Control article(02/2011)
    63. World leaders meet to discuss cyberwar rules of engagement article(02/2011)
    64. America's power grid too vulnerable to cyberattack, US report finds article(02/2011)
    65. Cyberwar or cybermirage? article(02/2011)
    66. Eine Genfer Konvention für die digitale Welt article(02/2011)
    67. Hacker attackieren Deutschland im Sekundentakt article(02/2011)
    68. Cyber War, Insurrections and Elections article(02/2011)
    69. China’s Active Defense Strategy and Its Regional Impact article(02/2011)
    70. UK decides to opt in to EU-wide cyber security plan article(02/2011)
    71. "Rules of engagement" proposed for cyber warfare article(02/2011)
    72. Mubarak’s Digital Dilemma: Why Egypt’s Internet Controls Failed article(02/2011)
    73. 'Brutal' cyber war raging article(02/2011)
    74. Cybersecurity Two Years Later article(02/2011)
    75. "Cyberwar" nicht mehr nur Science-Fiction-Szenario article(02/2011)
    76. Hackers Shut Down Government Sites article(02/2011)
    77. Proposal for cyber war rules of engagement article(02/2011)
    78. Israeli official sees cyber alternative to "ugly" war article(02/2011)
    79. Stuxnet virus penetrates nuclear plant, may cause Chernobyl-like disaster article(02/2011)
    80. USA setzen auf Cyber-Abwehrsystem article(02/2011)



    81. January/11 

    82. US oil industry hit by cyberattacks: Was China involved? article(01/2011)
    83. Navy Eyes Fighting in Cyberspace article(01/2011)
    84. Russia calls for NATO probe into Iran cyber strike article(01/2011)
    85. Navy Short of Tools to Detect, Nab Cyberintruders article(01/2011)
    86. Is Israel Already at War With Iran? article(01/2011)
    87. Feds’ Smart Grid Race Leaves Cybersecurity in the Dust(old artilce from 2009) article(01/2011)
    88. The Cyberwar Debate: Enough With The Straw Men And Scaremongers article(01/2011)
    89. The 3 Essential Components of Effective Cyber Warfare Strategyarticle(01/2011)
    90. Stuxnet returns to Bushehr reactor. Russia warns of nuclear explosion article(01/2011)
    91. Stuxnet is not Superworm, researcher says article(01/2011)
    92. AP Exclusive: Intel warns of Iran nuke disaster article(01/2011)
    93. ‘Stuxnet’ worm could cause ‘Chernobyl-like disaster’ in Iran, intel assessment warnsarticle(01/2011)
    94. BdK Internationale Stabilisierungseinheit mit Fähigkeiten im cyberspace? article(01/2011)
    95. Security and Defense: Digital strike article(01/2011)
    96. What do business security and national cyberwar defence have in common? article(01/2011)
    97. Was ist der Cyberwar? article(01/2011)
    98. Cyberattacks on infrastructure are the 'new normal' article(01/2011)
    99. How Egypt Cut Off the Internet (and How a U.S. 'Kill Switch' Might Work) article(01/2011)
    100. Exclusive: Tunisia Internet Chief Gives Inside Look at Cyber Uprising article(01/2011)
    101. This Week at War: Lessons from Cyberwar I article(01/2011)
    102. Beware the Cyber War Boomerang? article(01/2011)
    103. NATO's Cyber Partners article(01/2011)
    104. Dragon Week: Information Warfare in the Information Age article(01/2011)
    105. We May Not Be Facing a Full-Scale Cyber War, But The Battle Rages On article(01/2011)
    106. Experts Weigh in on Cyber War Report article(01/2011)
    107. ISA-99: Manufacturing and Control Systems Security website
    108. Building a Cyber secure plant article(01/2011)
    109. Infrastructure must withstand shock of cyberattacks article(01/2011)
    110. Is retaliation the answer to cyber attacks? article(01/2011)
    111. Obama needs to address our cyber-warfare gap with China article(01/2011)
    112. Cyberwar Case Study: Georgia 2008 article(01/2011)
    113. Apocalypse in Cyberspace? It’s Overdone article(01/2011)
    114. Turkey to conduct cyber attack drills article(01/2011)
    115. Software [In]security: Cyber Warmongering and Influence Peddling article(01/2011)
    116. Ready for Cyberwar? via Brian Krebs article(01/2011)
    117. Keine Angst vorm Cyberwar article(01/2011)
    118. Cyber attacks halt emissions trading in European carbon markets article(01/2011)
    119. Trojan weapons instead of missiles article(01/2011)
    120. Scientists Decry Cyberwar as Governments Respond article(01/2011)
    121. Iran Expanding “Cyber Army” to Patrol Cyberspace article(01/2011)
    122. Cyber-attack did not affect Iran nuclear programme: official article(01/2011)
    123. Wer stoppt die Cyberkrieger? article(01/2011)
    124. Note to the OECD: OK, it may not be Total Cyberwar yet, but it's not exactly "Peace in Our Time" either, is it? article(01/2011)
    125. Stuxnet Mitigation article(01/2011)
    126. Lame Stuxnet worm 'full of errors', says security consultant article(01/2011)
    127. SCADA exploit - the dragon awakes article(01/2011)
    128. Black Hat puts 'offense' on its cyber agenda article(01/2011)
    129. The US Needs To Learn To Limit–Not Win–A Cyber War article(01/2011)
    130. North Korea's Red Star OS takes the 'open' out of 'open source' article(01/2011)
    131. What Stuxnet is all about via R. Langner article(01/2011)
    132. Why Stuxnet Isn't Just About Siemens' PLCs via R. Langner article(01/2011)
    133. UK, Australia enter 'cyber partnership' article(01/2011)
    134. Cyberwar--As likely as a visit from E.T. article(01/2011)
    135. Cyberwar: Reality or Exaggeration? article(01/2011)
    136. CSC Awarded $30 Million Cybersecurity Contract for U.S. Air Force article(01/2011)
    137. Cyberwar hype is obscuring real security threats article(10/2010)
    138. Found this in October 2010!--Stuxnet: An Amateur's Weapon--via darkreading article(01/2011)
    139. New info on Stuxnet via F-SECURE article(01/2011)
    140. Relax, there's little chance of cyber war or cyber catastrophe article(01/2011)
    141. The New York Times Fails To Deliver Stuxnet’s Creators article(01/2011)
    142. Risks of cyber war 'over-hyped' says OECD study article(01/2011)
    143. Iran's nuclear program and a new era of cyber war article(01/2011)
    144. OECD study: an actual cyberwar is improbable article(01/2011)
    145. February 3: Security Blogger Summit on cyber-activism and cyber-war in Madrid article(01/2011)
    146. Iran responds to Stuxnet by expanding cyberwar militia article(01/2011)
    147. IT Security Researchers at ISU Combat Cyber war article(01/2011)
    148. Putin Orders Russian Move to GNU/Linux article(01/2011)
    149. Aaviksoo: Estonian cyberdefence is held in high regard in US article(01/2011)
    150. Britain's military chief says he wants his own version of the Pentagon's Cyber Commandarticle(01/2011)
    151. China's US$90B ups cyberwar stakes article(01/2011)
    1. Utah's NSA spy center will house data, not analysts article(01/2011)
    2. Team of ISU researchers combats cyber warfare article(01/2011)
    3. Das ist doch gar kein Krieg Dr.Sandro Gaycken article(01/2011)
    4. Hired Guns: What's in the name CyberPMC or CyberPSC? article(01/2011)
    5. Who will be to blame for the loss of a cyberwar? article(01/2011)
    6. In cybercrime war, military projects can be game changers article(01/2011)
    7. Stuxnet for Nobel Peace Prize article(01/2011)
    8. Estonia Forms Volunteer Cyber Army article(01/2011)
    9. Funding the new Home Guard to protect against cyber attacks article(01/2011)
    10. Stuxnet Infection On Over 10,000 Indian Computers: Symantec article(01/2011)
    11. Homeland Security Details Critical Infrastructure Protection Strategy article(01/2011)
    12. New Botnet: Storm Signal? article(01/2011)
    13. Cross Site Identification - or - How your social network might expose you when you least expect itarticle(01/2011)
    14. Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors article(01/2011)
    15. Volunteer Cyber Army Emerges In Estonia article(01/2011)
    16. Mazzaglia: Cyber war in the new year article(01/2011)
    17. Chinese hackers dig into new IE bug, says Google researcher article(01/2011)
    18. Stuxnet Variants Will Wreak Havoc on More Information Systems in 2011 article(01/2011)
    19. Operational security goes digital article(01/2011)
    20. Sweden has central role in cyber warfare article(01/2011)




    21. December/10 

    22. Attacks on Junta-related Sites Slowing Burma's Internet article(12/2010)
    23. Beiträge zur Internationalen Politik & Sicherheit [NATO] article(12/2010)
    24. Report strengthens suspicions that Stuxnet harmed Iran's nuke plant article(12/2010)
    25. Did Stuxnet Take Out 1,000 Centrifuges at the Natanz Enrichment Plant? Preliminary Assessmentarticle(12/2010)
    26. WikiLeaks Spurs MoD To Step Up Cyber Defences article(12/2010)
    27. The Political Power of Social Media article(12/2010)
    28. SAS man to take charge of cyber-warfare defences article(12/2010)
    29. In cyber wartime, the best defence is... software integrity! article(12/2010)
    30. NSA Switches to Assuming Security Has Always Been Compromised article(12/2010)
    31. Cyberwar: Enemy Needn't Be a Nation-State article(12/2010)
    32. Book Review:Cyber War: The Next Threat to National Security and What to do About It by Richard Clarke and Robert Knake, HarperCollins, 2010. article(12/2010)
    33. The cyberwar will not be streamed article(12/2010)
    34. Senior general to take charge of cyber-warfare defences article(12/2010)
    35. New corps' mission to parry cyberthreat article(12/2010)
    36. Richard Stiennon: Cyber War Has Already Happened article(12/2010)
    37. China Likely Behind Stuxnet Attack, Cyberwar Expert Says article(12/2010)
    38. Stuxnet? Bah, That's Just the Beginning article(12/2010)
    39. Stuxnet Is the World's Problem article(12/2010)
    40. Stuxnet apparently as effective as a military strike article(12/2010)
    41. NATO Forms Cybercoalitions, New Realms of Defense article(12/2010)
    42. Stop calling it a cyber war, you dummy article(12/2010)
    43. Cablegate: Aussie spies spooked by cyberwar article(12/2010)
    44. Stuxnet Worm Revealed – Installation, Injection and Mitigation article(12/2010)
    45. Are states unleashing the dogs of cyber war? article(12/2010)
    46. The Dogs of Cyber War Visualized article(12/2010)
    47. WikiLeaks: Case Study for Cyberwar? article(12/2010)
    48. Sikorski: Poland will join the Centre in 2011 article(12/2010)
    49. Navy activates real-time view of networks article(12/2010)
    50. Cyber security command on cards in India article(12/2010)
    51. Cybercrime, Cyberwars, Cyberterrorism and Hacktivism - Part 1 article(12/2010)
    52. Stuxnet’s Finnish-Chinese Connection article(12/2010)
    53. What if Operation Anonymous Attacked City Infrastructures & Power Grids? article(12/2010)
    54. 'Stuxnet virus set back Iran’s nuclear program by 2 years' article(12/2010)
    55. Sicherheitsforscher: Im Internet sind USA den Aktivisten unterlegen – Sorge um Freiheit im Netzarticle(12/2010)
    56. Cyber-warfare: Smart Grid Offers a New Hacker Playground article(12/2010)
    57. Cyberwar? What Cyberwar? article(12/2010)
    58. 10 days after Pakistan hacking attack, CBI website not accessible article(12/2010)
    59. The Shadow War article(12/2010)
    60. Wanted: More Computer Security and Cyber Attack Students article(12/2010)
    61. China and its Double-edged Cyber-sword article(12/2010)
    62. Shadow Elite: Should We Believe Chertoff On Cyber-War? article(12/2010)
    63. Some Thoughts on the Iranian Cyber Army and what they mean to Cyber article(12/2010)
    64. Chinese hired Blaster worm hackers article(12/2010)
    65. US embassy cables: China uses access to Microsoft source code to help plot cyber warfare, US fears article(12/2010)
    66. Covert war against Iran's nuclear aims takes chilling turn article(12/2010)
    67. WikiLeaks cables reveal fears over Chinese cyber warfare article(12/2010)
    68. India and Pakistan in massive cyber war article(12/2010)
    69. Covert war against Iran's nuclear aims takes chilling turn article(12/2010)
    70. Bruce Schneier: We need ‘cyberwar hotlines’ to match nuclear hotlines article(12/2010)
    71. China Touts Drive to Target Hackers article(12/2010)
    72. Chinese army must deal with cyberwarfare: state media article(12/2010)
    73. Cyberespionage At A Crossroads article(12/2010)
    74. DHS to Conduct Wireless Security Audits article(12/2010)
    75. Forget 2012: The World Will See a Cyber War in 2015 article(12/2010)
    76. Talk of Cyber War: What is It Good for? Absolutely Nothing, Experts Say article(12/2010)
    77. Battling Cyber Threats article(12/2010)
    78. With Russia In Assange's Sights, Is He In Theirs? article(12/2010)
    79. Demilitarizing cybersecurity article(12/2010)
    80. GCHQ technology 'could be sold article(12/2010)




    81. November/10 

    82. Wikileaks cable is not confirmation that China attacked Google article(11/2010)
    83. Nuclear scientist killed in Tehran was Iran's top Stuxnet expert article(11/2010)
    84. Wounded Iran nuclear scientist named in UN list article(11/2010)
    85. WikiLeaks cable: Russian leadership viewed Lieberman as 'one of its own' article(11/2010)
    86. Chinese government hacked Google, claims Wikileaks leaked US diplomatic cables article(11/2010)
    87. Understanding the Internet's insecure routing infrastructure article(11/2010)
    88. ANALYSIS: Is Stuxnet the new weapon for cyber insurgents? article(11/2010)
    89. Chinese cyber spies target British defense official article(11/2010)
    90. DHS Cybersecurity Center Promotes Information Sharing article(11/2010)
    91. The Korean Cyberwar --The Cybernaut article(11/2010)
    92. Brits declare war on Stuxnet. Americans say: Use it on North Korea article(11/2010)
    93. Stuxnet? Let's stop being scared of shadows article(11/2010)
    94. Iran denies Stuxnet disrupted its nuclear programme article(11/2010)
    95. The European Commission has presented a set of new EU measures covering security, including proposals for greater cyber space protection. article(11/2010)
    96. Critical briefing on attacks against industrial control systems article(11/2010)
    97. United States is ill-prepared for a cyberwar, former adviser says article(11/2010)
    98. Stuxnet Virus 'Warheads" Could Knock Out Iran's Utility Systems article(11/2010)
    99. Hedge Fund Manager Predicts Cyber Attack Will Shut Down NYSE in 2011 article(11/2010)
    100. «Stuxnet war ein weltweiter Waffentest» Interview mit Sandro Gaycken-- article(11/2010)
    101. Should Obama's 'internet kill switch' power be curbed? article(11/2010)
    102. Cyberwar rhetoric cash-grab for military firms article(11/2010)
    103. Enough With the Warnings! article(11/2010)
    104. Remarks by Secretary Gates at the Wall Street Journal CEO Council 2010 Meeting (Interesting part [crtl+f] > cyberwar ) article(11/2010)
    105. 'Scary stuff': Cyberattack arrest highlights risk article(11/2010)
    106. Cyberattacks Down as U.S. Boosts Systems Security article(11/2010)
    107. UK concentrating on developing cyber "weaponry" article(11/2010)
    108. Who was Gareth Williams? article(11/2010)
    109. North Korea: Are alarm bells ringing? article(11/2010)
    110. Could Stuxnet Mess With North Korea’s New Uranium Plant? article(11/2010)
    111. Assessment of the Origins of the Stuxnet malware article(11/2010)
    112. EU, US and NATO to Work Together on Cyber Defense article(11/2010)
    113. Stuxnet may be part of Iran atom woes: ex-IAEA aide article(11/2010)
    114. Lisbon Summit Declaration (number 40.) article(11/2010)
    115. Cyber-terrorism: Defending the country’s online borders article(11/2010)
    116. National Agency of Public Registry was awarded four prizes at the GITI Awards 2010 article(11/2010)
    117. U.S.: Beijing backs hacking on 'massive scale' article(11/2010)
    118. Britain urged to lead international debate on cyber warfare article(11/2010)
    119. NATO gears up for cyber warfare with latest exercise article(11/2010)
    120. ''Cyber Coalition 2010'' to exercise collaboration in cyber defence article(11/2010)
    121. Iranian Cyber Army Hacks Website Of Farsi1article(11/2010)
    122. Netcat Power Tools article(11/2010)
    123. Proceedings of the SCADA Security Scientific Symposium 2007 article(11/2010)
    124. Cybersecurity: Can Policy Keep Up with the Pace of Technical Change?article(11/2010)
    125. CyberWar -- Si Vis Pacem, Para Bellumarticle(11/2010)
    126. STUXNET Worm has changed the security game article(11/2010)
    127. On Halloween (October 31st) the U.S. Cyber Command (USCYBERCOM) went live article(11/2010)
    128. Korea attacks force DDoS bunker creation article(11/2010)
    129. NATO mobilises for cyber warfare article(11/2010)
    130. Cyberwar? China hijacks US government and military web traffic article(11/2010)
    131. Computers as Weapons of War article(11/2010)
    132. Partisanen im Cyberspace article(11/2010)
    133. Focus.com Launches Expert Media Roster article(11/2010)
    134. West’s spies aim at rising powers article(11/2010)
    135. China's Internet Hijacking Uncovered article(11/2010)
    136. After stuxnet, nuclear watchdog could gain computer security rolearticle(11/2010)
    137. Cyber Defense and NATO: An Attack on One, an Attack on All? article(11/2010)
    138. U.S. sees "huge" cyber threat in the future article(11/2010)
    139. China Hijacked 15% of US Internet Traffic-and no one noticed article(11/2010)
    140. Cyber Command Prepares for High-Tech War Crimes: "Computer Network Attacks to Protect U.S. Interests" article(11/2010)
    141. Cyber Risk Report article(11/2010)
    142. Aussie forces ready, but cyberwar is chaff article(11/2010)
    143. Why Cyber Security is Important article(11/2010)
    144. Cyber Experts Have Proof That China Has Hijacked U.S.-Based Internet Traffic article(11/2010)
    145. The Gray Lines Between Reconnaissance, Espionage and Cyberwar article(11/2010)
    146. Is North Korea poised to revolutionize cyber warfare? article(11/2010)
    147. Taipei City: National Security Bureau website a major target for hackers article(11/2010)
    148. Who Can Protect Us From Major Cyber Attacks? article(11/2010)
    149. Our Government Can’t Prevent A Digital 9-11: Entrepreneurs Need To Step In article(11/2010)
    150. Stuxnet: A Breakthrough [STUXNET] article(11/2010)
    151. Cyber threat, warfare center opening article(11/2010)
    152. Britain needs cyber attack capability article(11/2010)
    153. Congresswoman says chance of cyber attack against electric grid is 100% article(11/2010)
    154. In the cyber war a networked laptop has the power of a missile article(11/2010)
    155. Cyber attacks have moved to political & nationalistic stage: Websense 2010 Threat Reportarticle(11/2010)
    156. Air Force CIO Priorities: Networking At Mach 6 article(11/2010)
    157. The Drone Wars article(11/2010)
    158. Cyber-War article(11/2010)
    159. Iran’s Citizen Cyber Warriors article(11/2010)
    160. Defence minister says UK must win cyber security fight article(11/2010)
    161. Should We Prepare for a Cyber War? A Response to Seymour Hersch article(11/2010)
    162. Der CyberKrieg - A new unit of the German army signals the arrival of the age of cyber wararticle(11/2010)
    163. Defending against the cyber threat article(11/2010)
    164. Cyberwar Vs. Cybercrime - Assessing the Feds' Priorities in Battling the Bad Guys article(11/2010)
    165. Cyber Command (CYBERCOM) Reaches Full Operational Capability--The command has a budget of about $120 million this year, and is scheduled to receive approximately $150 million in fiscal 2011.--article(11/2010)
    166. Minister of Defense Calls for International Cyber-War Rules article(11/2010)
    167. Countering Cyber Terrorism With Social Networks article(11/2010)
    168. DDoS Attacks Disable Human Rights Groups Websites article(11/2010)
    169. On a (Cyber) War Footing --DDOS as a political weapon-- article(11/2010)
    170. Attack Severs Burma Internet article(11/2010)
    171. Europe simulates total cyber war article(11/2010)
    172. Report: NKorea hacking into SKorean gov't networks increases ahead of G-20 summit in Seoularticle(11/2010)
    173. Neubauer Program in Cyber Warfare -- The Joseph and Jeanette Neubauer Foundation, Philadelphia, PA, US article(11/2010)
    174. U.S. Cyber Command A Wild Card at Fort Meade article(11/2010)
    175. SCADA System’s Hard-Coded Password Circulated Online for Years article(07/2010)
    176. Iran cleaning all Stuxnet-infested PCs article(11/2010)
    177. UK nuke station denies Stuxnet shutdownarticle(11/2010)
    178. Defense in depth: building a holistic security infrastructure article(11/2010)

      OCTOBER/10 
    1. Hackers shut down Saudi education ministry website article(10/2010)
    2. Cyber Security Federal Government: Threats article(10/2010)
    3. The Race to Build a Secure Operating System article(10/2010)
    4. Why Stuxnet was developed by the Israelis article(10/2010)
    5. Microsoft Exposes Scope of Botnet Threat article(10/2010)
    6. 3rd International Conference on Cyber Conflict article(10/2010)
    7. 460th Space Wing wraps up first Cyber Lightning exercise article(10/2010)
    8. Should U.S. be worried about a cyber war with China? article(10/2010)
    9. Cyber-war: A note on the NATO summit in Lisbon. article(10/2010)
    10. Estonian NATO cyber center keeps an eye on the Internetarticle(07/2009)
    11. All Governments, the Company must prepare for Cyberwar
    12. Analysis: Cyber defenders, attackers probe Stuxnet's secrets article(10/2010)
    13. Stuxnet: Hack of the Century article(10/2010)
    14. Mobilizing in the Fifth Domain article(10/2010)0
    15. Cyberwar: few rules govern a growing global threat article(10/2010)
    16. Cyberwars: Already Underway With No Geneva Conventions to Guide Thems article(10/2010)
    17. Current threats and the evolution of cybercrime article(10/2010)
    18. Conventional wars are being replaced in computer age by access on control as cyber war methodologies have become much more sophisticated, writes ASGHAR JAVED article(10/2010)
    19. SCADA Vendors Still Need Security Wake Up Call article(10/2010)
    20. Internet Security & Cyber Warfare Now Part of Air Force Manual article(10/2010)
    21. Cyber Success Demands DHS and Pentagon Get Along article(10/2010)
    22. Kaspersky admitted its site was hacked this week, so we exclusively speak to the UK MD to grill him on what went down and what is happening now. article(10/2010)
    23. Air Force manual describes shadowy cyberwar world article(10/2010)
    24. Open source cloud alternative article(10/2010)
    25. Govt plans to cut internet services in case of cyber attacks article(10/2010)
    26. Hackers "hidden chain" Government network article(10/2010)
    27. Cape Town 2010, China, and Cybersecurity article(10/2010)
    28. USB Warfare: The Real Electronic Nightmare article(10/2010)
    29. Pentagon seeks tight ties with cyber contractors article(10/2010)
    30. Government to allocate £500m for cyber defence article(10/2010)
    31. Cyberwar and surveillance article(10/2010)
    32. Stuxnet: An Amateur's Weapon article(10/2010)
    33. Pentagon Will Help Homeland Security Department Fight Domestic Cyberattacks article(10/2010)
    34. Cyber Pressure on Iran article(10/2010)
    35. Cyber attacks and terrorism among top threats to UK article(10/2010)
    36. Cyber warfare has arrived article(10/2010)
    37. Strategic defence review to prioritise cyber security article(10/2010)
    38. Director GCHQ, Iain Lobban, makes Cyber speech at the IISS article(10/2010)
    39. Cyber Shield U.S. to NATO: 3-Tier System Needed article(10/2010)
    40. Cyber, Not Cypher by THOMAS RID article(10/2010)
    41. Stuxnet logbook, Oct 15 2010, 1100 hours MESZarticle(10/2010)
    42. US Readies Cyberwar, Virtual Flag Terrorism article(10/2010)
    43. How Stuxnet Is Rewriting the Cyberterrorism Playbook interview(10/2010)
    44. Stuxnet and the Pentagon's Cyber Strategy article(10/2010)
    45. Former White House advisor urges action on 'cyber sanctuaries' article(10/2010)
    46. UK says it gets hit by 1,000 cyber attacks monthly article(10/2010)
    47. Why It's Hard to Crash the Electric Grid article(10/2010)
    48. Cyber warfare in the cloud article(07/2010)
    49. RSA Europe: Defend against cyberwar by re-architecting networks, not buying more technology, says Richard A. Clarke article(10/2010)
    50. Europe's Information Society Newsroom article(10/2010)
    51. Cyber Warfare Needs Cyber Civil Defense article(10/2010)
    52. Ralph on cyberwar: War 0.1 article(10/2010)
    53. Chinese Cyber Warriors – It’s On! article(10/2010)
    54. US to Launch CYBERCOM as Fifth Sphere of War Takes Shape article(10/2010)
    55. The North American Electric Reliability Corporation’s (NERC) mission is to ensure the reliability of the North American bulk power system. website
    56. Pentagon Partners With NATO To Create Global Cyber Warfare System article(10/2010)
    57. The secret cyber war between India and China accelerates article(10/2010)
    58. EU Agency analysis of ‘Stuxnet’ malware: a paradigm shift in threats and Critical Information Infrastructure Protection article(10/2010)
    59. N. Korea believed to have 200,000 special warfare troops: S. Korean estimate article(10/2010)
    60. Australian military reveals 230% increase in cyber attacks in 2010 article(10/2010)
    61. Who controls the internet? article(10/2010)
    62. Adrift In Cyberspace article(10/2010)
    63. EU calls Stuxnet 'paradigm shift' as U.S. responds more mildly article(10/2010)
    64. Cyber espionage besieges militaryarticle(10/2010)
    65. Pentagon Partners With NATO To Create Global Cyber Warfare System article(10/2010)
    66. Cyberattack Becomes More Sophisticated article(10/2010)
    67. Iran Cyberwar: “Stuxnet”came from Russian supplier article(10/2010)
    68. Security and Defense: Nuclear worming article(10/2010)
    69. Security: Stuxnet Worm: Nine Facts Every IT Security Pro Should Know article(10/2010)
    70. NATO Faces More than Defense Challenges as Cyber Threats Grow article(10/2010)
    71. From Targets of Opportunity to Ground Zero article(10/2010)
    72. US Cyber Command dashboard article(10/2010)
    73. Has The Threat of Cyberwar Been Grossly Exaggerated? article(10/2010)
    74. Army Cyber Command stands up article(10/2010)
    75. Who runs the Internet? article(10/2010)
    76. Cyberattacks Penetrating Key Fields article(10/2010)
    77. Lights Out: US Smart Grid Vulnerable to Hackers around the World article(10/2010)
    78. The Cyber Arms Race article(10/2010)
    79. The Story Behind The Stuxnet Virus article(10/2010)
    80. Hacking the Industrial Network article(04/2010)
    81. Canada's Cyber Strategy Vague, Too article(04/2010)
    82. Don't Stick It In The dangers of USB drives. article(10/2010)
    83. Security Brass Must Prepare For Cyber, N-Wars: Kalam article(10/2010)
    84. The Stuxnet Attack, and its Mystery article(10/2010)
    85. Building Backdoors Into Computer Chips article(10/2010)
    86. Dutch multinationals under attack from Stuxnet worm article(10/2010)
    87. Going Cyber Against Nuke Program article(10/2010)
    88. US call for Nato cyber-strike capacity causes division article(10/2010)
    89. Cyberwarfare is here article(10/2010)
    90. Special report: The Pentagon's new cyber warriors article(10/2010)
    91. Iran: Stuxnet Part of Western Sabotage Campaign article(10/2010)
    92. Pentagon: The global cyberwar is just beginning article(10/2010)
    93. Rethinking Stuxnet READ THIS article(10/2010)
    94. Stuxnet logbook, Oct 6 2010, 1130 hours MESZ [UPDATE] [STUXNET] article(10/2010)
    95. U.S. Cyberwar Strategy: The Pentagon Plans to Attack article(10/2010)
    96. Cybersecurity as a Catalyst for Economic Growth article(10/2010)
    97. Stuxnet could hurt world economic development, says Microsoft CEO [STUXNET] article(10/2010)
    98. Super virus hits 6 million computers in China [STUXNET] article(10/2010)
    99. Going Cyber Against Nuke Program article(10/2010)
    100. NATO faces more than defense challenges as cyber threats grow article(10/2010)
    101. Foreign Affairs LIVE: The Pentagon's New Cyberstrategy article(10/2010)
    102. October Is National Cybersecurity Awareness Month article(10/2010)
    103. Cyberwar Hype Intended to Destroy the Open Internet article(10/2010)
    104. Russian experts flee Iran, escape dragnet for cyber worm smugglers article(10/2010)
    105. Iran arrests 'nuclear spies,' intelligence chief says article(10/2010)
    106. Cyber warriors could see less time at sea article(10/2010)
    107. Army establishes Army Cyber Command article(10/2010)
    108. Stuxnet Speculation Fuels Crackdown By Iranian Intelligence [STUXNET] article(10/2010)
    109. Column one: The lessons of Stuxnet [STUXNET] article(10/2010)
    110. Can you Survive a Massive Cyber-attack? article(10/2010)
    111. Wesley Clark Discusses Cyber Warfare and an InZero Systems Solution on Weekend TV Talk Showarticle(10/2010)
    112. Israel's unit 8200: cyber warfare article(10/2010)
    113. Who Wants a Cyberwar? --THIS IS GOOD WORK___ article(10/2010)
    114. Cyber war out of virtual world article(10/2010)
    115. Stuxnet worm theories point to inside job [STUXNET] article(10/2010)
    116. Stuxnet continues to be a hot topic. Here are answers to some of the questions we've received. [STUXNET] article(10/2010)
    117. Millions of Computers Hit by Virus Across China [STUXNET] article(10/2010)
    118. Inside Stuxnet: Researcher drops new clues about origin of worm [STUXNET] article(10/2010)




    119. SEPTEMBER/10 

    120. The meaning of Stuxnet-- A sophisticated “cyber-missile” highlights the potential—and limitations—of cyberwar [STUXNET] article(09/2010)
    121. In a Computer Worm, a Possible Biblical Clue [STUXNET] article(09/2010)
    122. Stuxnet strikes China [STUXNET] article(09/2010)
    123. CYBERCOM won't be fully operational by Friday deadline article(09/2010)
    124. The shape of threats to come article(09/2010)
    125. Stuxnet Worm: Art of Cyber Warfare [STUXNET] article(09/2010)
    126. Stuxnet ‘much more sophisticated than Aurora’ article(09/2010)
    127. Did The Stuxnet Worm Kill India’s INSAT-4B Satellite? [STUXNET] article(09/2010)
    128. Stuxnet Sux or Stuxnet Success Story? [STUXNET] article(09/2010)
    129. Richard Clarke and Michael Chertoff to address RSA Europe 2010 article(09/2010)
    130. Singapore seeks volunteers to beef up cyberdefense article(09/2010)
    131. U.S. testing defenses with simulated cyberattack article(09/2010) and the DHS's Cyber Storm III Fact Sheet(2010)
    132. Israeli Attack On Syrian Reactor, Template For Iran Attack? article(09/2010)
    133. 6 mysteries about Stuxnet [STUXNET] article(09/2010)
    134. Cyber-War Gets Real, and a Beltway Brawl Begins article(09/2010)
    135. U.S. Mounting First Test of Cyber-Blitz Response Plan article(09/2010)
    136. EXCLUSIVE-Cyber takes centre stage in Israel's war strategy article(09/2010)
    137. Brazilian Army To Get Cyberwarfare Training and Security Support from Panda Securityarticle(09/2010)
    138. Iran struggling to contain 'foreign-made' computer worm [STUXNET] article(09/2010)
    139. Cyber Storm III aims to protect against real thing -- 13 nations unify for exercise article(09/2010)
    140. A Silent Attack, but Not a Subtle One [STUXNET] article(09/2010)
    141. Stuxnet mutating, rampaging through Iran [STUXNET] article(09/2010)
    142. Detailed timeline of STUXNET from Siemens [STUXNET] article(09/2010)
    143. Stuxnet: Future of warfare? Or just lax security? [STUXNET] article(09/2010)
    144. No government defence against cyber attacks article(09/2010)
    145. Defense lacks doctrine to guide it through cyberwarfare article(09/2010)
    146. Cyber Hearings Wrap-Up: Uncertain Road toward Secure Zone--“one of the most critical problems our country faces,” head of the U.S. Cyber Command Gen. Keith Alexander-- article(09/2010)
    147. Cyberwar Chief Calls for Secure Computer Network article(09/2010)
    148. Five Reasons "dot-secure" Will Fail article(09/2010)
    149. Worm hits computers of staff at Iran nuclear plant article(09/2010)
    150. Kibersoldaty ready for battle article(09/2010)
    151. Stuxnet: The Trinity Test Of Cyberwarfare [STUXNET]article(09/2010)
    152. Warriors in the battle for cyberspace article(09/2010)
    153. FACTBOX - What is Stuxnet? [STUXNET]article(09/2010)
    154. Electricity Grid in U.S. Penetrated By Spies article(09/2010)
    155. Exclusive Interview with Indian Cyber Army (Indishell) article(09/2010)
    156. Iran Confirms Stuxnet Damage To Nuclear Facilities [STUXNET] article(09/2010)
    157. Iran Fights Malware Attacking Computers article(09/2010)
    158. Alexander Details U.S. Cyber Command Gains article(09/2010)
    159. Bush White House security adviser: Israel likely source of cyber attack on Iran [STUXNET]article(09/2010)
    160. Cyberwar Chief Calls for Secure Computer Network article(09/2010)
    161. Possible Israeli Cyber Attack Sabotaged Iran's Bushehr Nuclear Reactor [STUXNET] article(09/2010)
    162. A laundry list of power industry incidents to learn from article(09/2010)
    163. Vulnerabilities lurk in the soft(ware) underbelly of combat networks article(09/2010)
    164. China’s Emerging Cyberwar Doctrine article(09/2009)
    165. A new enemy: the hackers could damage the Ukrainian business (some mistakes in the translation)article(09/2010) (via@Google Translate)
    166. Why can’t India have its own ‘patriotic hackers’? article(09/2010)
    167. ENISA & European Schoolnet - new prize for teaching of online safety in schools -- This should minimize Botnets because the people will learn how to surf and whats happening behind their icons-- This is a good perspective for the future article(09/2010)
    168. NATO has already stood-up their Cyber Incident Response Center and there are plans to bring it to full operational capability shortly. website
    169. Is US proposal for a NATO cyber shield practical? -- The Cold War concepts of shared warning apply in the 21st century to cyber security. Just as our air defenses, our missile defenses have been linked so too do our cyber defenses need to be linked as well”, Lynn was quoted" article(09/2010)
    170. Stuxnet malware is 'weapon' out to destroy ... Iran's Bushehr nuclear plant? [STUXNET]article(09/2010)
    171. Companies and governments should prepare for cyberwar, say experts article(09/2010)
    172. Was Stuxnet built to attack Iran's nuclear program? [STUXNET] article(09/2010)
    173. How to plan an industrial cyber-sabotage operation: A look at Stuxnet [STUXNET] article(09/2010)
    174. Stuxnet: A Users' Guide to Industrial Sabotage [STUXNET] --related papers-- article(09/2010)
    175. After the incident in the japanese ocean Japan is afraid of cyberattacks from China-- Japan suspects its defence ministry ... article(09/2010)
    176. New spy rootkit targets industrial secrets Windows virus takes aim at Siemens SCADA management systems [STUXNET] article(09/2010)
    177. Siemens: Stuxnet worm hit industrial systems [STUXNET] article(09/2010)
    178. Stuxnet logbook, Sep 16 2010, 12.00 hours MESZ [STUXNET] --"The problem is not Stuxnet. Stuxnet is history," said Langner in an e-mail message. "The problem is the next generation of malware that will follow."-- article(09/2010)
    179. Cyber-Warfare: U.S. Military Hackers and Spies Prepare to Knock the World Offline article(09/2010)
    180. Former NSA Chief Hayden: Cybersecurity Policy Still 'Vacant' article(09/2010)
    181. Lynn Briefs North Atlantic Council on Cybersecurity article(09/2010)
    182. Post-Event Cyber Deterrence By Denial? article(09/2010)
    183. Pyongyang has been interested in computer technologies for almost two decades. In the mid-1990s, North Koreans assigned to the United Nations ... article(09/2010)
    184. US urges NATO to build 'cyber shield' article(09/2010)
    185. State Of Cybercrime Legislation Around The World article(09/2010)
    186. Lynn discusses Cybersecurity with NATO Allies article(09/2010)
    187. The cyberwar daily news is a compilation of social network news, newspaper articles and statements of people NEWSPAPER (for free)
    188. Hydraq (Aurora) Attackers Back? article(09/2010)
    189. Cyber Arms Intelligence Report for September 13th article(09/2010)
    190. Chinese Cyber Warfare Advance in Quantum Teleportation article(09/2010)
    191. Analysis: Cybersecurity bill on list for passage this year article(09/2010)
    192. Cyber security a growing concern in energy sector article(09/2010)
    193. Hamadoun Touré, secretary-general of the U.N. International Telecommunications Union (ITU), has called for a comprehensive “cyber treaty” that would have a built-in legal and regulatory framework, as well as cross-continent contingency plans in the event of large-scale cyberattacks . article(09/2010)




    194. AUGUST/10 

    195. White House security advisor on preparing for cyberwar--Richard Clarke thinks government should take a lead role in defending from attack article(08/2010)
    196. JP 3–13 defines Information Operations (IO) as — “the integrated employment of electronic warfare, computer network operations, psychological operations, military deception, and operations security, in concert with specified supporting and related capabilities, to influence, disrupt, corrupt or usurp adversarial human and automated decision making while protecting our own.” article(08/2010)
    197. Cyber culture change-- The new US Cyber patriotism? Want the US-Army the same cyber warrior infrastructure like the Chinese? article(08/2010)
    198. Emerging cyber doctrine replays the CT/COIN debate article(08/2010)
    199. Richard Clarke: Preparing For A Future Cyberwar article(08/2010)
    200. China policy could force foreign security firms out-- Protectionism? article(08/2010)
    201. "Detecting campaigns enables resilient detection and prevention mechanisms across an intrusion, and engages CND responders earlier in the kill chain, reducing the number of successful intrusions. It should be obvious, but bears repeating that a lack of specific indicators from a single intrusion prevents identification of key indicators from sequential intrusions." article(08/2010)
    202. Build an army of cyber warriors--UMUC programs can help America face new generation of threatsarticle(08/2010)
    203. Cheap cyber weapons (e.g., computer viruses) will neutralize expensive kinetic weapons (e.g., missile defenses). article(04/2010)
    204. EU cyber assault would cost €86 million, expert says article(08/2010)
    205. ".. But the air force has recruited some of these elite software engineers, and eventually loses most of them to the civilian economy."article(08/2010)
    206. India realizes the need of cybersecurity article(08/2010)
    207. U.S. military wants to exert influence over private cyber infrastructure article(08/2010)
    208. Defending the Internet: National Security v. Big Brother-- "... military spying on everything in the interest of national security or spying on nothing to preserve freedom and liberty--an effective defense of US digital interests is best served by public and private sector interests working cooperatively"article(08/2010)
    209. India Is Developing Cyber War Capabilities article(08/2010)
    210. ''Many people haven't quite realised yet how the cyber world will be a principal field of warfare,'' with the potential to ''thwart the kinetic advantageof large military forces.'' Mr Irvine said. article(08/2010)
    211. According to the report, which was authored by Deputy Secretary of Defense William Lynn, the attack began after an infected flash drive was inserted into a U.S. military laptop at a base in the Middle East. article(08/2010) related article(08/2010)
    212. Cyber Security: A Complex "Web" of Problems-- one American team from DoD actually attacked and destroyed a Web site that another agency of government, the CIA, had created and was using.article(08/2010)
    213. Don't Stick It In article(08/2010)
    214. "... power grids are a normal target for guerrillas and militaries. It's something they usually try to attack if they get into a conflict," James Lewis, a senior fellow at the Center for Strategic and International Studies, said in an interview last week. article(08/2010)
    215. To prevent attacks, will the Pentagon have to cut itself off from the online world? article(08/2010)
    216. Government could install embassies in key countries, such as U.S., China, and Russia, enabling communication with appropriate authorities in other countries during a cyber crisis article(08/2010)
    217. Huawei of China, sells critical equipment to America’s closest allies in Europe and Asiaarticle(08/2010)
    218. Do Norway and NATO understood how great the threat really is? article(03/2010)
    219. On the other hand, destroying it in an adversary's network in another country may cross a line, and officials are trying to articulate a clear policy for such preemptive cyber activity. article(08/2010)
    220. "Low-threat worm caused 'most significant breach' of U.S. military net" article(08/2010)
    221. Panel: U.S. lacks legal framework to fight in cyberspace--She said cyber war is likely to be analogous to the current fight against terrorism, which does not conveniently fit current laws... article(08/2010)
    222. 2007th The idea was offered in Küberkaitseliidu (KKL) has come to create a phase in which a considerable number of non-organized volunteers are oriented Cyber Defense League subunits.article(06/2010)
    223. The Chinese internet is a bid educational platform to learn hacking-- "The hacking scene can be chaotic," James A. Lewis, senior fellow for cybersecurity and Internet policy at the Center for Strategic and International Studies, says. "There are many actors, some directed by the government and others tolerated by it. These actors can include civilian agencies, companies, and individuals."article(03/2010)
    224. "It was not only that Japanese users insulted Koreans in this case, but insulted Koreans further when they declared Kim Yu Na’s gold medal was earned because she bribed the judges. The Sankei newspaper in Japan claims confusion on" article(08/2010)
    225. "If the AV cos won't regulate themselves then we need Government standards, to establish minimum protections. We can't depend on the honesty of AV Cos." article(08/2010)
    226. "There are seven computer network warfare tactics: IT products can be hidden damage potential process" article(08/2010)
    227. "The Twilight Of Network-Centric Warfare"- "When a Defense Business Board task force recommended last month that the Office of the Secretary of Defense (OSD) eliminate its networking and information integration secretariat, it signaled just how far from grace the notion of network-centric warfare has fallen." article(08/2010)
    228. "The ‘cyberwar’ between India and Pakistan has claimed another victim, with the hacking of a high-profile lawmaker’s website that experts say highlights the woeful lack of Internet security in South Asia." article(08/2010)
    229. Attack Statistics of the InZero Hackers Challange--Just to watch the activity in some kind of challenge over world-- article(08/2010)
    230. "New victim in India-Pakistan 'cyberwar'" article(08/2010)
    231. Interesting page for information warfare and cyber war article(08/2010)
    1. The national states are trying to get the hackers involved in their work with special conditions: "IT workers and ethical hackers who sign up for the ambitious project will be protected by law, says the proposal being discussed by senior government administrators." article(08/2010)
    2. "Secretary of State Hillary Clinton strongly suggested that attacks on allied cyber and energy infrastructures should be reconsidered attacks under Article 5 of the NATO Charter, declaring that“article(08/2010)
    3. Cyber Command still struggling to define cyber war article(08/2010)
    4. WOW Such a detailed article(08/2010) is not always in the net
    5. "Defense review panel opens debate over federal cyber roles"-"A panel chartered by Congress to review long-term threats to the United States has reopened a hotly contested debate on how the government should counter cyberattacks by calling for the Defense Department to expand its authority by defending all federal" article(08/2010)
    6. "U.S. Challenged By Global Cybersecurity"--The governments also in the USA are realizing that in cyberspace a lot of work has to be done!-- article(08/2010)
    7. Cybersecurity Is Evolving, Increasingly Important--Gen. Keith B. Alexander figures out some good points for the future of cyberwar! article(08/2010)
    8. Cyber Attacks on Business – A National Security Threat?--The picture is not a computer for buisness operations, but the text tries to figure out the possible problems article(08/2010)
    9. How chinese wikipedia colect information about cyberwar and cyber warfare!--You have to use google translate--article(08/2010)
    10. "Public gives approval for cyber warfare" article(08/2010)
    11. "Rules? In Cyberwar? No Rules!"--The fiction that war, any kind of war, can be fought with rules is one of those eternal scams that make war possible, generation after generation, millennia after millennia....--Hard statement ! comment(08/2010)
    12. "Security Specialists Support Cyberwarfare"--Indeed, why not just rent a botnet?-- Attribution will be the holy goal in cyber warfare!article(08/2010)
    13. "The recurring use of the Cold War as analogy for cyberwar is not well thought out. At Black Hat last week..."article(08/2010)




    14. JULY/10> 

    15. "Fog of cyberwar: internet always favors the offense"--Be careful with the term cyber war! There are problems but think twice before you over react!-- “You guys made the cyber world look like the north German..."--“You're going to build the rivers and hills into the web. You're going to create geography that is going to help the defense.”-- article(07/2010)
    16. U.S. military cyberwar: What's off-limits?article(07/2010)
    17. You know something about NSPD54?
    18. "Black Hat: U.S. Infrastructure Vulnerable To Cyber Attack"-- You ever hear the name EINSTEIN 1/2/3? NO?; then read this article to get more information-- article(07/2010)
    19. "Estonia shines light on reality of cyber threats"--only the end is interesting-- article(07/2010)
    20. Stuxnet sniffs information for a possible attack on power plants or other critical infrastructures which Supervisory Control And Data Acquisition (SCADA) system article(07/2010)
    21. Cybersecurity camp part of a nationwide effort to train 10,000 experts--Can we protect our infrastructures when our citizens have secured PCs which cannot be used by botnets? Would attribution possible? article(2010) Also the UK tries to find new hackers for their defense ans offense in cyberspace? article(07/2010)
    22. Fighting Wars in Cyberspace-- A good analysis of strategie problems and maybe some old ideas of solving them-- "Whether two dimensions or five, the underlying rhythms of warfare remain the same."article(07/2010)
    23. "Cyberwar Is Hell"--comment on attribution and other problems--article(07/2010)
    24. SHOULD WE SEEK CYBER ATTRIBUTION?--a positive statement for technologies which could traceroute a cyber attack--national security over public anonymity? article(07/2010)
    25. Defending the Power Grid is Defending the Nation article(07/2010)
    26. Have private companies the right to fight cyberattacks?-- This have to be discussed in the future because this problem can interferre state and private sector action! This could be very dangerous in aspects of internationl law. article(07/2010)
    27. "...security experts say that the country[china] has been developing its Internet warfare capabilities over the past decade and is now a world leader."--This statement is not easy to verify because the information about the chinese cyberarmy and their resources are marginal. article(07/2010)
    28. "India’s Black Cobras launch Cyber War against Pakistan" article(07/2010)
    29. This comment is interesting because it gives a positive idea of the future of cyberspace. We will find rules to solve this problems. We have to develop rules together, because the internet is a “globalthing” and so it is neccessary that we try to find a global resolution. comment(07/2010)
    30. The attribution problem in cyberspace is one of the biggest problems in this complicated kind of warfare.("North Korea 'not responsible' for 4 July cyberattacks") article(07/2010)
    31. Iran's Hidden Cyberjihad article(07/2010)
    32. Cyber Command lays groundwork for rapid deployment of resources article(07/2010)
    33. "The Air Force Association’s innovative high school cyber security competition has new corporate sponsors..." article(07/2010)
    34. "Chinese Military Behind Google, Other Cyberattacks." article(07/2010)
    35. Containing Cyberwar The international community needs a coordinated response to new threatsarticle(07/2010)
    36. About the cyber center in Estonia and other ideas article(07/2010)
    37. This blog-article shows some of the main discussions around the cyberwar threats How can we handle it? Is there a cyberwar out in the cyberspace? The comments in this blog show how controversial the discussion is. article(07/2010)
    38. "Cyber Warfare Creates New Opportunities in Middle East"--A potentielle threat brings a lot of money into the playground-- article(07/2010)
    39. This comment tries to show that the argumentation of the people who do not think cyberattacks exists are wrong! look at VRT-sourcefire-blog comment(07/2010)
    40. "U.S. Plans Cyber Shield for Utilities, Companies" article(07/2010)
    41. "Is there a cyber threat?" asked Virgina in a the VRT-sourcefire-blog! Read the article(07/2010)
    42. "Lewis: Cold War lessons of limited value for cyber attack deterrence"--Some very interesting aspects of cyber detterence and protection-- This article explains a lot of problems of cyberattacks ("... while a cyber counterstrike could have unanticipated effects in a networked environment, causing damage in an unpredictable manner in countries that might not be in, or even near, a target country, Lewis writes." article(07/2010)
    43. "Repeat of SKorea, US cyberattacks does no damage"--Cyberwar exists but it could be handled with sophisticated analysis and strategy(fingerprinting, tracerouting) article(07/2010)
    44. (Mr. S. Gopalkrishnan, CEO and Managing Director of the India based IT Firm Infosys) “India faced a severe threat last April which was an unknown attack from the hackers. It is believed that..."comment(07/2010)
    45. Bruce Schneier wrote a article about the hype of cyberwar in the media. He declares that there is a threat but we have to stop exaggerating the cyberwar threat because a solution for this problem would not be found in fear. article(07/2010)
    46. Cyber Warfare Asia Pacific 2010 is a new conference in Asia --probably interesting for the future in Asia article(07/2010)
    47. Also India will focus cyber warfare in their national security. article(07/2010)
    48. The Russian ring charged this week with spying on the United States faced some of the common security problems that plague many companies article(07/2010)
    49. The Economist wrote interesting facts article(07/2010)
    50. More information about the cyberspace command article(07/2010)
    51. Hackers attacked a serbian website and changed the frontpage article(07/2010)




    52. JUNE/10 

    53. Report about cyber warfare and the US-Chinese relation in the future --cyberwar dimension(5th)--article(06/2010)
    54. “We are now in a world in which cyber ..."(Panetta) short comment (06/2010)
    55. New Cyber warfare Center(Annapolis, Md) article(06/2010)
    56. article(06/2010)
    57. Some calculations about cyberattacks and the costs of them. This calculations could not be copied into state costs because the influences will be more destrucablearticle(06/2010)
    58. The NewYorkTimes published information about the attribution problem in cyberwarfare and the new problems which occure with this attribution problem. This text is a good summary of the current situation in politics, law and army. article(06/2010)
    59. Interesting new information about the training program of the cyber-elite in the USA. article(06/2010)
    60. DARPA has some problems with the NCR(National -Cyber-Range) because they are to slow. "Battle For Cyber-Range: Military Dumps Darpa" There are other services which want their own playground to test their cyber weapons. article(06/2010) comment
    61. BBC reports about the cyber war conference in Tallinn article(06/2010)
    62. Informations about the NATO Conference in Tallinn and the future of cyberwarfare article(06/2010)
    63. For Google, DNS log analysis essential in Aurora attack investigation. aricle(06/2010)
    64. Pakistani server used to hack Indian Army officer's computer article(06/2010)
    65. CISCO released some news about security. article(06/2010)
    66. Tehran's Lost Connection. Is the Iranian regime's cyberwar with the United States real, or a paranoid delusion? article(06/2010)
    67. Richard A. Clarke wrote the book "Cyber War: The Next Threat to National Security and What to Do About It" and explains the new problems we could have when all the systems will crash. A lot of the scenarios are not quiet possible but some other should be recogniced. One point is the risk in cyberspace with insecure systems which can be compromised from enemies. Clarke declares that Microsoft is one of these risk points in the cyberspace. This article(06/2010) explains some facts about critical infrastructures and the use of Microsoft.
    68. Keith Alexander explains how the U.S. will fight espionage and crime. article(06/2010)
    69. Big cyber warfare conference in Tallinn. Experts will discuss the new problems of cyber warfare and the consequences for the NATO and other allies.article(06/2010)
    70. South Korea is again under the attack of hackers(only in German)article(06/2010)
    71. Dr. Prescott Winter Begins Asian Cyber Threat and Risk Tour article(06/2010)
    72. New/Old discussion: The old challenge of providing public safety while also protecting civil liberties has found a new manifestation in the cyber age. article(06/2010)
    73. How much know Bradley Manning and how much access he had to the secret information connections between the diplomats. article(06/2010)
    74. China taking actions to beef up cyber security. All states have to face the new problems with cyber security. article(06/2010)
    75. NATO is considering the use of military force against enemies who launch cyber attacks on its member states. article(06/2010)
    76. Better Warning system against attacks article(06/2010)
    77. U.S. Backs Talks on Cyber Warfare article(06/2010)
    78. U.S. faces remote sabotage cyber danger: general article(06/2010)
    79. Cyber Command chief says military computer networks are vulnerable to attack article(06/2010)
    80. Lieberman Bill Gives Feds ‘Emergency’ Powers to Secure Civilian Nets article(06/2010)




    81. MAY/10 

    82. This article(05/2010) is about the new Cyber Command in the US Army.
    83. White House Cyber Czar: ‘There Is No Cyberwar article(03/2010)
    84. The US is in the process of creating a unified cyber command, to fight the wars of the futurearticle(03/2010)
    85. U.S. Cyber Command: Waging War In World's Fifth Battlespace article(05/2010)
    86. EADS partnership with Khalifa University of Science, Technology and Research targets cyber security skills gap. article(05/2010)
    87. Interesting article about critiacal infrastructures and the Canadian Forces which try to protect these infrastructures.
    88. The DARPA do research on new technologies for safer communication on the internet.article(05/2010)
    89. "US appoints first cyber warfare general". This NEWS were released via gulli or via the observer (05/2010).
    90. This article discuss the problem of communication and information networks during a cyberattack or a natural disaster.
    91. Should a targeted country strike back at the cyber attackers? article(05/2010)




    92. APRIL/10 

    93. The U.S. has not fully developed policies on how to respond to cyberattacks that are routed through neutral countries or the computers of innocent Americans. article(04/2010)
    94. The German Bundesnetzagentur tries to develop a intelligent electric network with new devices. Also known as "smart grid! article (05/2010). This was also planned by the US Government. This topic is also interesting for Cyber deterrance and Cyber warfare article(10/2009)
    95. CBC NEWS report that the Canadian Government isn't prepared for an cyber-attack. article (05/2010)
    96. Chinese Information and Cyber Warfare by Daniel Ventre article(04/2010)
    97. Gulli NEWS released an article (04/2010) which explains the new security strategy of GOOGLE after the attacks on their mail accounts and their servers.
    98. The Shadowserver Foundation released a new paper (04/2010) which tries to explain the methods of the attackers. A big part of the paper makes conclusions with cloud computing and the risks of cloud computing.
    99. Dr. Sandro Gaycken released a new paper which tries to prove that the argumentation of Matthew Sklerov in the military law review is naive and the consequences of this thesis are dangerous.
    100. The future of IPv6 will be interesting for the control of the computer network
    101. An new analysis (05/2010) of Conficker, Downup, Downandup, Conflicker and Kido. This worm is in the interests of the national states because it influences a lot of personal computers and is strangely quiet.
    102. Interesting news about the the creation of the military’s first headquarters of cyberwarfare article (09/2009)
    103. Also Operation Aurora was checked by the government because some analysis showed
    104. "China school denies link to Google attack: report". The network of BlackHat hackers and the chinese government is unproofenarticle(02/2010)
    105. Global Offensive Snagged Corporate, Personal Data at nearly 2,500 Companies; Operation Is Still Running article(02/2010)
    106. White House declassifies outline of cybersecurity program. article(03/2010)
    107. We must prepare for cyber conflict - but not forget wars we fight todayarticle(02/2010)
    108. A very long article which explains the whole cyberwar plan(not classified) of the US Army article(2009)
    109. Cyber Conflict: The Modern Gold Rush Gary Clayton and Kevin Coleman note the critical absence of rules of the engagement governing digital attack and defense-- article(05/2009)
    110. This article is a summary of the Cybersecurity Enhancement Act of 2009 article(02/2007)
    111. Some hackers shut down a power grid.article(01/2008)
    112. Israel suspected of 'hacking' Syrian air defences article(10/2009)
    113. "Cyber Conflict Attribution and the Law"--This article is on my list for my bachelor degree!comment(08/2006)
    114. Do we need a U.N. cybersecurity council?--An independent research group calls for an international body to deal with cyber threats, conflicts article(08/2009)

    Videos

    1. Die Angst vor dem Cyber-War: Muss sich Deutschland vor Angriffen aus dem Netz schützen?
    2. 27c3: Building Custom Disassemblers
    3. Internetmilitär - Wie Mitlitär das Internet nutzt
    4. An Interview with Ralph Langner
    5. Computerviren im strategischen Einsatz
    6. Cyberdeterrence and Cyberwar by Dr. Martin Libicki Senior Management Scientist --The RAND Corporation
    7. Kontrollnetze und Netzkontrollen -- Regierungen beeinträchtigen zunehmend die Entwicklung des weltweiten Datennetzes
    8. Cyberwar - das Schlachtfeld von morgen - ZDF heute journal
    9. Cyber War By Army Commander of Sri Lanka
    10. Video 2006 -- NCSA in Afghanistan -- Flexible equipment for a flexible NATO force -- NCSA Director Speaks at Industry Association Symposium -- Video Interview with Director, NCSA
    11. Video on Cyber Defence produced and broadcasted by Deutsche Welle -- Director's presentation of NCSA Strategy and 2009 Guidance
    12. Building Cyberdefence -- ncsa nato
    13. CYBERWAR -- Wenn Staaten hacken
    14. 'Significant' cyber attack on Canada linked to China
    15. TEDxPentagon - TSgt Stuart Wilson, USAF - A New Kind of Pilot
    16. CYBERWAR- -Die Bedrohung im Netz--Gespräch mit Andreas Bogk, Chaos Computer Club
    17. Cyberwar - Die vernetzte Sicherheit (08.02.2011)
    18. Sicherheit - Der virtuelle Krieg und die Realitäten (04.02.2011)--Die Münchner Sicherheitskonferenz debattiert über Cyberwars - ein wichtiges Thema, aber auch ein wenig überschätzt.
    19. Cyberwar - Verdrahtete Krieger (24.01.2011) -- Die Digitalisierung setzt Soldaten unter Druck.
    20. Sicherheit - Netzangriffe als Kriegswaffe (15.10.2010) -- Gezielte Angriffe aus dem Netz können Gesellschaften in kurzer Zeit lahm legen. Der Journalist und Internet-Experte Manfred Kloiber erklärt den Cyber-Krieg und die Gefahren, die von ihm ausgehen.
    21. Cyberwar - Digitale Kriegsführung (06.10.2010) -- Experten warnen: Krieg per Computer ist schon längst keine Zukunftsvision mehr.
    22. Britain's defence pact no threat to NATO's future 04.02.11
    23. DEFCON 17: Preparing for Cyber War: Strategy and Force Posture in the Information-Centric World
    24. India, Pakistan Locked In Cyber War
    25. nicter -- Technology for visualizing and analyzing network attacks : DigInfo
    26. US cyber warfare expert on threats which exist now
    27. Merkel: Cyberwar so gefährlich wie klassischer Krieg
    28. Web Warriors-future of cyberspace
    29. Ian Brown, a senior research fellow at Oxford University, was one of the report's authors.
    30. New Dirt on the Stuxnet Worm & Cyber War
    31. Inside Story - A new frontier in cyber war?
    32. CDS hopes to launch cyber command 10.01.11
    33. 27C3 - Adventures in analyzing Stuxnet [This talk is interesting because it will explain all the pre attack modi on Windows Systems]
    34. World War 3.0 - Omar Wasow
    35. Der Krieg hat eine neue Qualität bekommen. Cyberwar
    36. Into the Black: Explorations in DPRK
    37. UNIDIR hosted a conference on "Information & Communication Technologies and International Security" on 24-25 April 2008 in Geneva (AUDIO_2008)
    38. Cyberwar-Offen-wie-Scheunentore--Sandro Gaycken
    39. Stuxnet virus may pose widespread threat to industry
    40. Focus.com Launches Expert Media Roster
    41. Bruce Schneier on Cyber War and Cyber Crime
    42. Black Hat USA 2010: Malware Attribution: Tracking Cyber Spies and Digital Criminals (5 parts)
    43. Stuxnet: How It Infects PLCs
    44. Training High School Students for Cyberwar – CyberPatriot III
    45. Change in Progress - Building a secure cyber society together video(11/2010)
    46. Cyber Warfare: Addressing the Challenges
    47. Policy@Google: Dr. Ronald Deibert
    48. Do You Want to Be a Cyber Warrior? (October 22, 2009)
    49. DIGITAL AGE-Will the War In The 21 Century Be Fought In Cyberspace?- Col. T.X. Hammes
    50. CrossTalk: From Anna Chapman to Cyber Warfare
    51. 2010 State of the Net Panel: Cyberwar
    52. Cyber Terrorism and Warfare: The Emergent Threat
    53. DEFCON 18: Live Fire Exercise: Baltic Cyber Shield 2010 3 parts (click in youtube)
    54. RUSSIA'S CYBER WAR AGAINST ESTONIA
    55. CSFI REPORT: STUXNET
    56. Deputy Secretary of Defense William Lynn discusses the various new strategies used by the Pentagon to identify information technology threats, combat cyber warfare, and protect U.S. infrastructure. Podcast in mp3 or read as transcript
    57. Podcast: National Cyber Security Awareness Month(mp3)
    58. Stuxnet Worm - False Flag Cyber Attack by Iran and Russia
    59. Should laws of war apply to cyberspace? interview(2010) --Guests: Tom Gjelten, Correspondent, covering a variety of global security and economic issues, NPR James Andrew Lewis, Director and Senior Fellow, Technology and Public Policy Program, Center for Strategic and International Studies Adam Segal, Senior Fellow for Counterterrorism and National Security Studies, Council on Foreign Relations
    60. Admiral Lord West: The China Cyber Threat Comes Alive
    61. Security Minister: European Union is Way Behind in Cyber Strategy
    62. Staged cyber attack reveals vulnerability in power grid
    63. Cyberwar: The new global battlefield
    64. Are Congressman to old for cyberwar? video
    65. Interview, John Bumgarner at Cyber Warfare 2010 video(07/2010)
    66. US Cyber Strategy 2010 - BBC World News America
    67. Digital Espionage: Cyber Attacks vs Exploitation
    68. Tea with Wesley Clark - former general and NATO commander
    69. Australia's new cyber warfare facility + Jiang Yu, China re Google threat
    70. Tim Stevens about the problems on cyberwar(audio)
    71. Richard Clarke On The Growing 'Cyberwar' Threat(audio)
    72. Cybersecurity Discussion with General Keith B. Alexander, Director of the NSA, Commander of U.S. Cyber Command
    73. Gov. O'Malley talks about NATO and cybersecurity from Estonia
    74. Google attack raises security focus
    75. Global Computer Espionage Network Uncovered(GhostNet)
    76. China-based network caught in cyber-espionage
    77. Hacking the Power Grid
    78. NATO battles cyber attacks
    79. Future wars the Cyber War USAF
    80. Is cyber warfare hoax?--Better Cyber terrorism-- In this interview with Ryan Single the media shows no sensibilty for distinguish the words cyber terrorism and cyber warfare.
    81. A German scientist about Cyberwarfare
    82. DOKU about Chinesehackers and there connection to the government
    83. political motivated hacks on georgia
    84. CyberwarDoku of the USA
    85. Cyberwar Podcast from france24
    86. Cyberwar Podcast from FOXNEWS about IRAN
    87. China Cyber Attack on America
    88. US Power Grid Compromised

    Papers


    1. Cyberspace Policy Review -- DOCUMENTS -- papers(2011)
    2. Botnets: 10 Tough Questions by Editor: Dr. Giles Hogben, Authors: Daniel Plohmann, Elmar Gerhards-Padilla, Felix Leder 
      As part of the project “Botnets: Detection, Measurement, Mitigation & Defence” a series of questions was discussed by internationally renowned experts in the field of botnets between September and November 2010. This document presents a selection of the most interesting results. The document distills the major issues which need to be understood and addressed by decision-makers in all groups of stakeholders. 
      paper(2011)
    3. The Trouble with Cyber Arms Control -- Christopher A. Ford 

      These are early days in the age of cyberwar. In the developed world, nearly every sphere of life now depends upon computers and networks, a fact that has introduced great vulnerabilities. The United States in particular — with a modern infrastructure, a plugged-in population, numerous enemies and competitors around the world, and a military whose overawing conventional prowess is heavily reliant on computer networks — has reason to feel exposed to cyber attack 
      paper(2011)

    4. Cyberwar-Netwar: security in the information age Von Fernando Duarte Carvalho,Eduardo Mateus da Silva paper(2011)
    5. Blown to Bits -- China’s War in Cyberspace, August–September 2020 paper(2011)
    6. Rise of a Cybered Westphalian Age -- Chris C. Demchak and Peter Dombrowski paper(2011)
    7. Cyberdeterrence and Cyberwar by Dr. Martin Libicki Senior Management Scientist --The RAND Corporation paper(2011)
    8. The National Cyber Security Strategy: Success Through Cooperation -NL 

      IntroductionThe Netherlands stands for safe and reliable ICT1 and the protection of the openness and freedomof the Internet. The increasing dependence on ICT makes society increasingly vulnerable to abuseand (large-scale) disruption. This is why the cabinet presents the National Cyber Security Strategywhich has been prepared with contributions from a broad range of public and private parties,knowledge institutes and social organisations. paper(2011)

    9. Cyber-Sicherheitsstrategie für Deutschland -- 

      Der Cyber-Raum umfasst alle durch das Internet über territoriale Grenzen hinweg Cyber-Sicherheit wird damit zur zentralen gemeinsamen Herausforderung für weltweit erreichbaren Informationsinfrastrukturen. In Deutschland nutzen alle Staat, Wirtschaft und Gesellschaft im nationalen und internationalen Kontext. Bereiche des gesellschaftlichen und wirtschaftlichen Lebens die vom Cyber-Raum Die Cyber-Sicherheitsstrategie wird die Rahmenbedingungen hierfür verbessern. paper(2011)

    10. Martin C. Libicki1 -- The RAND Corporation -- Chinese Use of Cyberwar as an Anti-Access Strategy -- Two Scenarios -- Before the U.S. China Economic and Security Review Commission paper(2011)
    11. Common Sense Guide to Prevention and Detection of Insider Threats 3rd Edition – Version 3.1 -- 
      INTRODUCTION In 2005, the first version of the Common Sense Guide to Prevention and Detection of Insider Threats was published by Carnegie Mellon University’s CyLab. The document was based on the insider threat research performed by CERT paper(2011)
    12. Sun Tzu and Cyber War -- Kenneth Geers 
      Abstract Cyberspace is a new warfare domain. Computers and the in- formation they contain are prizes to be won during any military conflict. But the intangible nature of cyberspace can make vic- tory, defeat, and battle damage difficult to calculate. Military leaders today are looking for a way to understand and manage this new threat to national security. The most influential mili- tary treatise in history is Sun Tzu‟s Art of War: its recommen- dations are flexible and have been adapted to new circumstanc- es for over 2,500 years. This article examines whether Art of War is flexible enough to encompass cyber warfare. It con- cludes that Sun Tzu provides a useful but far from perfect framework for the management of cyber war, and urges modern military strategists to consider the distinctive aspects of the cyber battlefield. What is Cyber Warfare? The Internet, in a technical sense, is merely a large collection of networked paper(2011)
    13. Cyber war -- Methods and Practice 

      Summary 
      Computer and internet security is under discussion due to the increasing relevance of the Internet and of the information and communication technology (ICT). The cyberspace is meanwhile regarded as separate military dimension. This paper gives an overview on the methods and practice of cyber war and presents the cyber war activities since 1998 and the security architecture of the cyberspace. Finally, the cyber war strategies of the US and China and the cyber policy of the European Union are discussed. [Version 3.0 – 12 Jan 2011 © PD Dr. Dr. K. Saalbach] 
      LV Internet policy Fachbereich 1 49069 Osnabrück 
      paper(2011) and German paper(2011)-Deutsch+Version mit NATO-Teil)

    14. W32.Stuxnet Dossier -- Version 1.4 (February 2011) INTRO: 

      W32.Stuxnet has gained a lot of attention from researchers and media recently. There is good reason for this. Stuxnet is one of the most complex threats we have analyzed. In this paper we take a de- tailed look at Stuxnet and its various components and particularly focus on the final goal of Stuxnet, which is to reprogram industrial control systems. Stuxnet is a large, complex piece of malware with many different components and functionalities. paper(2011)

    15. Global Energy Cyberattacks: “Night Dragon” By McAfee® Foundstone® Professional Services and McAfee LabsTM February 10, 2011 -- Executive Summary In 2010, we entered a new decade in the world of cybersecurity. The prior decade was stained with immaturity, reactive technical solutions, and a lack of security sophistication that promoted critical outbreaks, such as Code Red, Nimda, Blaster, Sasser, SQL Slammer, Conficker, and myDoom—to name a few. The security community has evolved and grown smarter about security, safe computing, and system hardening but so have our adversaries. This decade is setting up to be the exponential jumping off point. The adversaries are rapidly leveraging productized malware toolkits that let them develop more malware than in all prior years combined, and they have matured from the prior decade to release the most insidious and persistent cyberthreats ever known. paper(2011)
    16. First Joint Russian-U.S. report on Cyber Conflict-- The EastWest Institute released the first joint Russian-American report aimed at defining the “rules of the road” for cyber conflict. Prepared by a team of Russian and U.S. experts convened by EWI, Working Towards Rules for Governing Cyber Conflict: Rendering the Geneva and Hague Conventions in Cyberspace explores how to extend the humanitarian principles that govern war to cyberspace. paper(2011)
    17. Chinese Use of Cyberwar as an Anti-Access Strategy-Two Scenarios MARTIN C. LIBICK:Good afternoon, and thank you for inviting me here. I am Martin Libicki, from the RAND Corporation. I’ve been thinking about how states might use cyberwar for strategic purposes for most of the last twenty years paper(2011)
    18. When CSIS published Securing Cyberspace for the 44th Presidency two years ago, cybersecurity was not a major issue for public policy. Along with the work of many others, our first report helped to change this. However, the new energy in the national dialogue on cybersecurity has not yet translated into sufficient progress. We thought then that securing cyberspace had become a critical challenge for national security, which our nation was not prepared to meet. In our view, we are still unprepared.paper(2011)
    19. Online-Paper Cyberwar-methods-and-practice (English Version) paper(2011)
    20. Online-Paper Cyberwar-Grundlagen-Geschichte-Methoden (deutsche Version) paper(2011)
    21. Research Papers--The following page lists articles (co-)published by the CCD COE researchers. The papers are organised by year and alphabetically by title. papers
    22. 2010 Conference Proceedings papers(2010)
    23. International Cyber Incidents: Legal Considerations- Summary: This book features four national-scale cyber incidents (Estonia, Georgia, Lithuania and Radio Free Liberty) which demonstrate unique dependencies resulting from the widespread use of information society. These incidents raise questions to policymakers, diplomats, the intelligence community, military, information technology managers, and economists, as well as the general citizenry. Some of those questions - and many of the answers - are legal in nature. With these four incidents, we have undertaken to highlight a variety of legal issues that re relevant for national and international cyber security preparedness. By distinguishing the common denominators and emerging trends of legal relevance, we suggest ways ahead in legal thinking. However, the lessons identified within these pages do not fully become lessons learned unless the readers continue them in deeper analysis and policy actions. book(2010)
    24. Using Enrichment Capacity to Estimate Iran’s Breakout Potential paper(2011)
    25. Cyberwar Case Study: Georgia 2008 via smallwarsjournal paper(2011)
    26. Cyberwar--Computernetze als Schlachtfelder der Zukunft? paper(2011)
    27. “Reducing Systemic Cybersecurity Risk” OECD-REPORT paper(2011)
    28. Cyberspace: Definition and Implications--Rain Ottis, Peeter Lorents -- Cooperative Cyber Defence Centre of Excellence, Tallinn, Estonia paper(2010)
    29. Some papers about insider threats in critiacal infrastructures and security management paper(2010)
    30. Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors paper(2010)
    31. DRAGONS, TIGERS, PEARLS, AND YELLOWCAKE: FOUR STUXNET TARGETING SCENARIOSpaper(2010)
    32. Cyberwar--Das Internet als Kriegsschauplatz--von Sandro Gaycken "Der Cyberwar hat begonnen: Immer häufiger werden Hacker eingesetzt, um Geheimnisse zu stehlen, Wirtschaften zu schädigen, Militäroperationen zu stören oder politische Meinungen zu manipulieren. Ein globaler Trend, denn solche Computerangriffe sind meist risikofrei und kostengünstig. Kaum bemerkt von der Öffentlichkeit ist das Internet zu einem militärischen Operationsraum geworden." book(2010) at the moment in German
    33. Science of Cyber-Security--Abstract from the book: JASON was requested by the DoD to examine the theory and practice of cyber-security, and evaluate whether there are underlying fundamental principles that would make it possible to adopt a more scientific approach, identify what is needed in creating a science of cyber-security, and recommend specific ways in which scientific methods can be applied. Our study identified several sub-fields of computer science that are specifically relevant and also provides some recommendations on further developing the science of cyber-security.paper(2010)
    34. Cyber war and cyber power Issues for NATO doctrine paper(2010)
    35. Critical briefing on attacks against Industrial Control Systems especially SCADA systemspaper(2010)
    36. Information Warfare and Cyber Terrorism by Roland Heickerö, Swedish Defence Research Agencypaper(2008)
    37. Exploring the Role of Virtual Camps by Jarret Brachman and James J.F. Forest paper(2010)
    38. GRENA CERT Activities during cyberattacks against Georgia paper(2010)
    39. “Strategic Concept For the Defence and Security of The Members of the North Atlantic Treaty Organisation” paper(2010)
    40. Georgia 2008: Why We Need National and NATO Cyber Defense Policies paper(2010)
    41. CELLS WARS:The Changing Landscape of Communications Intelligence paper(2010)
    42. U.S.-China Economic and Security Review Commission 2010 report to Congress paper(2010)
    43. On Cyber Warfare A Chatham House Report paper(2010)
    44. This report argues that national strategy must be reviewed and adapted if it is to take proper account of cyber warfare. paper(2010)
    45. Proactive Defense Tactics Against On-Line Cyber Militia by Rain Ottis (Cooperative Cyber Defence Centre of Excellence) paper(2010)
    46. Planning for the Future of Cyber Attack Attribution: Hearing Before the H. Subcomm. on Technology and Innovation of the H. Comm. on Science and Technology paper(2010)
    47. Countering Advanced Persistent Threats with Cyber Forensics paper(2009)
    48. Capability of the People s Republic of China to Conduct Cyber Warfare paper(2010)
    49. Offensive Cyber Operations and the Use of Force paper(2010)
    50. Cyber Probing: The Politicisation of Virtual Attack book(2010)
    51. Ethical Issues of Cyberwarfare book(2000)
    52. The Microsoft Security Intelligence Report (SIR) is a comprehensive evaluation of the evolving threat landscape and trends. paper(2010)
    53. Stuxnet - Infecting Industrial Control Systems by Liam O Murchu paper(2010)
    54. Unravellling Stuxnet by Aleks Gostev and Costin G. Raiu paper(2010)
    55. Securing Indian Cyberspace Shojan paper(2010)
    56. The sisterhood of the traveling packets 

      From a cyber-security perspective, attribution is considered to be the ability to determine the originating location for an attack. However, should such an attribution system be developed and deployed, it would provide attribution for all traffic, not just attack traffic. This has several implications for both the senders and receivers of traffic, as well as the intervening organizations, Internet service providers and nation-states. In this paper we examine the requirements for an attribution system, identifying all of the actors, their potential interests, and the resulting policies they might therefore have. We provide a general framework that represents the attribution problem, and outline the technical and policy requirements for a solution. We discuss the inevitable policy conflicts due to the social, legal and cultural issues that would surround such a system. paper(2010)

    57. Cyberspace Policy Review

      Conclusion

      The history of electronic communications in the United States reflects steady, robust technological innovation punctuated by government efforts to regulate, manage, or otherwise respond to issues presented by these new media, including security concerns. The iterative nature of the statutory and policy developments over time has led to a mosaic of government laws and structures gov­ erning various parts of the landscape for information and communications security and resiliency. Effectively addressing the fragmentary and diverse nature of the technical, economic, legal, and policy challenges will require a leadership and coordination framework that can stitch this patchwork together into an integrated whole. paper(2009)

    58. Canada’s Cyber Security Strategy For a stronger and more prosperous Canada-- Educational Programs are important for cybersecurity. paper(2010)
    59. W32.Stuxnet Dossier paper(2010)
    60. From Information Operations to Cyberwarfare--Dr Dan Kuehl paper(2010)
    61. Proactive Self-Defense in Cyberspace by Bruce D. Caulkins--Internet security is inherently flawed—the very make-up of the system that allows us to send information between computers also allows hackers to enter a network and wreak havoc on its content. paper(2009)
    62. Cybersecurity Attacks on the Critical Infrastructure by Daniel G. Wolf paper(2009)
    63. Cyberthreats, Vulnerabilities and Attacks on SCADA Networks--This work discusses the current state of today’s Supervisory Control and Data Acquisition (SCADA) networks including information on recent attacks and incidents. [STUXNET] paper(2010)
    64. Stuxnet Under the Microscope-- This report is devoted to the analysis of the notorious Stuxnet worm (Win32/Stuxnet) that suddenly attracted the attention of virus researchers this summer. This report is primarily intended to describe targeted and semi-targeted attacks, and how they are implemented, focusing mainly on the most recent, namely Stuxnet. This attack is, however, compared to the Aurora attack, outlining the similarities and differences between the two attacks. paper(2010)
    65. Before the Terrorism and Unconventional Threats and Capabilities Subcommittee of the House Armed Services Committee paper(2010)
    66. Cyber Security Threats Dr Paul Twomey--The Lowy Institute for International Policy -- Good visualization for beginners in this topic -- ppt(2010)
    67. This paper(2010) and this paper(2010) are two analysis papers about the STUXNET Virus! The ICSA-10-238-01B—STUXNET MALWARE MITIGATION Update B paper is about: In July, ICS-CERT published an advisory and a series of updates regarding the Stuxnet malware entitled “ICSA-10-201⎯USB Malware Targeting Siemens Control Software.”a Since then, ICS-CERT has continued analysis of the Stuxnet malware..." --- the second paper from the Information-technology Promotion Agency in Japan says: "This is because acomputer virus was confirmed that spreads through the exploitation..."
    68. Tracking GhostNet: Investigating a Cyber Espionage Network paper(2009)
    69. Protecting Europe against large-scale cyber-attacks paper(2010)
    70. CYBER WAR v. CYBER STABILITY By Jody R. Westby, Esq.1 paper(2009)
    71. An Overview of the Cyber Warfare, Exploitation & Information Dominance (CWEID) Lab Presented to the CDCA Small Business & Industry Outreach Initiative Symposium paper(2010)
    72. Kim Jon-Il and Me. How to build a Cyber Army to Attack the U.S.--by Charlie Miller Independent Security Evaluators paper(2010)
    73. Cyber Threats Mike Cote Chairman and CEO--The beginnig of the PowerPoint is not so interesting but the end has some good slides ppt(2010)
    74. Nice statement of Joe St Sauver-- "I’m not a cyber defense guy nor am I a cyber intelligence person, so some of you may wonder, “Hey, why should I trust what Joe tells me?” My answer would be “Please DON’T! Think carefully about what I say and verify it yourself!”--so read it and try to verify "Cyber War, Cyber Terrorism and Cyber Espionage" paper(2008)
    75. The Chinese Cyber Attacks formerly known as Titan Rain-As prepared for 95-803 Information Warfare by Aaron Shelmire paper(2007)
    76. Australia and Cyber-warfare by Gary Waters, Desmond Ball and Ian Dudgeon--The Australian National University-- paper(2008)
    77. Author Mitchell has done a good overview of the cyber war situation till 2008 paper(2008)
    78. War in the Information Age: A Primer for Cyberspace Operations in 21st Century Warfare paper(2010)
    79. Cyber War, Cyber Terrorism and Cyber Espionage paper(2010)
    80. "Cyber Security and Politically, Socially and Religiously Motivated Attacks This paper examines Cyber-Security and Politically, Socially and Religiously Motivated Cyber-Attacks, focusing on the European Union as an international organisation with a fragmented yet developing interest in cyber-security. The paper is presented in three parts. Part 1assesses the source and nature of cyber threats. Society’s increasing dependence on Information and Communications Technology (ICT) infrastructure creates vulnerabilities and corresponding opportunities to be exploited by the unscrupulous, ranging from low-level, individual computer hacking to serious and organised crime, ideological and political extremism, and state-sponsored cyber attacks such as those perpetrated against Estonia in 2007…. Part 2 reviews current multilateral initiatives to address cyber-security, focusing on the work of the United Nations, the Organisation for Economic Co-operation and Development, the Organisation for Security and Co-operation in Europe, the Council of Europe, the North Atlantic Treaty Organisation, and the Group of Eight. In each case, the organisation in question has recognised the breadth and complexity of the cyber- security challenge and that its response to the cyber-security challenge can be but one part of the whole. Although national governments are the most important actors in cyber-security, others have a contribution to make, including industry and the private commercial sector…. Part 3 examines European Union’s responses to the cyber-security challenge. The EU is very closely engaged in cyber-security but cannot be said to have a comprehensive approach to the problem: the EU’s responses are diverse, lack coherence and could at times conflict."paper(2009)
    81. "Project Grey Goose Phase II Report"--Project Grey Goose Attacks on Critical Infrastructure There are many reports in the public domain which discuss vulnerabilities in the power grid. This is not one of them. Instead, this report looks at the broader threat landscape, some (not all) of the key actors involved, and most importantly, how U.S. Energy companies as a self-regulating and predominantly privately owned industry contribute to making the U.S power grid less secure." paper(2009/II)
    82. --Russia/Georgia Cyber War__Findings and Analysis--"Project Grey Goose is, in technology terms, a pure play Open Source Intelligence (OSINT) initiative launched on August 22, 2008 to examine how the Russian cyber war was conducted against Georgian Web sites and if the Russian government was involved or if it was entirely a grass roots movement by patriotic Russian hackers"paper(2008/I)
    83. This paper(2010) is interesting because more and more private companies like McAfee and Sophos are try to focus their research in cyber national activity! We have to watch their notes in their studies!
    84. "Leaving Deterrence Behind: War-Fighting and National Cybersecurity"-- What has worked in the nuclear realm, and remains relevant for homeland security against WMD terrorism, will not work in cyberspace.-- paper(2010)
    85. A very detailed PP about Cyberattack as a Tool of U.S. Policy ppt(2010)
    86. A PPT about some basic facts, problems and strategies in the cyberspace. How the armies could detect and prevent attacks? ppt(2010)
    87. That is the Cyber Dilemma--Professor Richard J. Harknett--University of Cincinnati Center for Strategic and International Studies paper(2010)
    88. Cross-Domain Deterrence and Credible Threats by James A. Lewis Center for Strategic and International Studies paper(2010)
    89. slideshow(2010) of the Cooperative Cyber Defence Centre of Excellence in Tallinn about cyber warfare
    90. --Bullets Blogs New Media Warfighter--The explosive growth of new media within the Global Information Environment (GIE) presents sustained challenges and opportunities for the U.S. military. In recent years, adversaries - armed with new media capabilities and an information-led warfighting strategy - have proven themselves capable of challenging the most powerful militaries in the world."-- Should be interesting for Information War Strategy-- paper(2010)
    91. Jonathan M. Smith made a 20 page PP with some useful information and lists presentation in pdf(2010)
    92. CYBERSECURITY AND INTELLIGENCE: THE US APPROACH(2010)
    93. The EastWest Institute published a paper(2010) which tries to show different views from China, USA, Russia, India and Norway.
    94. "Honeybot, Your Man in the Middle for Automated Social Engineering"--Interesting for Agencies!paper(2010)
    95. The Intelligencesquaredus made a debate about the topic cyber war. It was a debate with the motion "THE CYBER WAR THREAT HAS BEEN GROSSLY EXAGGERATED". There were two speakers for this motion and two against and the audience was asked before and after the debate about this motion. The debate and the results are written down in a transcript. It is very interesting how the US citizens handle this controversal topic. The speakers are experts in this area. The arguments are interesting and it should be logical that the speakers against this motion are the winners.paper(06/2010)
    96. This White Paper of the Chinese Government shows how the Chinese Government wants to handle their great "free" Internet. Just read the paper and you will understand. They are not talking about Great Walls and other restrictions in the Internet, only about "Basic Principles and Practices of Internet Administration". For our studies part V is the most interesting part because the chinese declare their problems with hackers and other scurity issues. paper(2010)
    97. Interesting paper written by Martin C. Libicki. This paper was published by the RAND CORPORATION. This paper is important because it makes some interesting conclusions which are underline the importance of Cyberdeterrence and Cyber warfare. The author Martin C. Libicki tries to focus the national interests in cyber space. paper(2009)
    98. The National Intelligence Strategy is important for persons who are interested in the future of the US Intelligence Agencies. This paper shows the development of cyberspace protection and some other issues which are also important to know for Cyber warfare analysis. paper (2009)
    99. The United States, the other sovereign members of the nuclear club, and a number of would-be proliferators have now entered what has been described as the “second nuclear age.” This paper examines the deterrence and defense requirements presented by this new age, arguing for the value to be gained through their integration. Offense-defense integra- tion will provide to national decision-makers timely and informed choices of security options needed to address the spectrum of conflict likely to unfold within the second nuclear age. paper(2009)
    100. Offical Statement on Cyberwarfare by Secretary of Defense Gates paper(06/2009)
    101. Another interesting libary of cyber warfare papers, books and articles is the http://www.whitehouse .gov/cyberreview/documents/ There you could find a lot of interesting information which you could download via the internet.
    102. The Cyber Security Strategy of the United Kingdom shows that nearly every bigger country in the world tries to focus their military power on the cyberspace. paper(2009)
    103. The big security enterprises don't work with the governments because it is to dangerous for them. But they publish papers like McAfee which show that they are deeply interested in this topic. Apaper(2009) from McAfee with some intersting conclusions about cyberwar and cold war.
    104. "How China will use the Cyber warfare to learfrog in military competitiveness" This paper is written by Jason Fritz. paper(2008)
    105. Wheeler, D. (2003, October). Techniques for Cyber Attack Attribution.--This paper will be one of my backround papers for my work-- paper(2003)
    106. Cyberspace Policy Review -- DOCUMENTS -- papers(2011)
    107. Botnets: 10 Tough Questions by Editor: Dr. Giles Hogben, Authors: Daniel Plohmann, Elmar Gerhards-Padilla, Felix Leder 
      As part of the project “Botnets: Detection, Measurement, Mitigation & Defence” a series of questions was discussed by internationally renowned experts in the field of botnets between September and November 2010. This document presents a selection of the most interesting results. The document distills the major issues which need to be understood and addressed by decision-makers in all groups of stakeholders. 
      paper(2011)
    108. The Trouble with Cyber Arms Control -- Christopher A. Ford 

      These are early days in the age of cyberwar. In the developed world, nearly every sphere of life now depends upon computers and networks, a fact that has introduced great vulnerabilities. The United States in particular — with a modern infrastructure, a plugged-in population, numerous enemies and competitors around the world, and a military whose overawing conventional prowess is heavily reliant on computer networks — has reason to feel exposed to cyber attack 
      paper(2011)

    109. Cyberwar-Netwar: security in the information age Von Fernando Duarte Carvalho,Eduardo Mateus da Silva paper(2011)
    110. Blown to Bits -- China’s War in Cyberspace, August–September 2020 paper(2011)
    111. Rise of a Cybered Westphalian Age -- Chris C. Demchak and Peter Dombrowski paper(2011)
    112. Cyberdeterrence and Cyberwar by Dr. Martin Libicki Senior Management Scientist --The RAND Corporation paper(2011)
    113. The National Cyber Security Strategy: Success Through Cooperation -NL 

      IntroductionThe Netherlands stands for safe and reliable ICT1 and the protection of the openness and freedomof the Internet. The increasing dependence on ICT makes society increasingly vulnerable to abuseand (large-scale) disruption. This is why the cabinet presents the National Cyber Security Strategywhich has been prepared with contributions from a broad range of public and private parties,knowledge institutes and social organisations. paper(2011)

    114. Cyber-Sicherheitsstrategie für Deutschland -- 

      Der Cyber-Raum umfasst alle durch das Internet über territoriale Grenzen hinweg Cyber-Sicherheit wird damit zur zentralen gemeinsamen Herausforderung für weltweit erreichbaren Informationsinfrastrukturen. In Deutschland nutzen alle Staat, Wirtschaft und Gesellschaft im nationalen und internationalen Kontext. Bereiche des gesellschaftlichen und wirtschaftlichen Lebens die vom Cyber-Raum Die Cyber-Sicherheitsstrategie wird die Rahmenbedingungen hierfür verbessern. paper(2011)

    115. Martin C. Libicki1 -- The RAND Corporation -- Chinese Use of Cyberwar as an Anti-Access Strategy -- Two Scenarios -- Before the U.S. China Economic and Security Review Commission paper(2011)
    116. Common Sense Guide to Prevention and Detection of Insider Threats 3rd Edition – Version 3.1 -- 
      INTRODUCTION In 2005, the first version of the Common Sense Guide to Prevention and Detection of Insider Threats was published by Carnegie Mellon University’s CyLab. The document was based on the insider threat research performed by CERT paper(2011)
    117. Sun Tzu and Cyber War -- Kenneth Geers 
      Abstract Cyberspace is a new warfare domain. Computers and the in- formation they contain are prizes to be won during any military conflict. But the intangible nature of cyberspace can make vic- tory, defeat, and battle damage difficult to calculate. Military leaders today are looking for a way to understand and manage this new threat to national security. The most influential mili- tary treatise in history is Sun Tzu‟s Art of War: its recommen- dations are flexible and have been adapted to new circumstanc- es for over 2,500 years. This article examines whether Art of War is flexible enough to encompass cyber warfare. It con- cludes that Sun Tzu provides a useful but far from perfect framework for the management of cyber war, and urges modern military strategists to consider the distinctive aspects of the cyber battlefield. What is Cyber Warfare? The Internet, in a technical sense, is merely a large collection of networked paper(2011)
    118. Cyber war -- Methods and Practice 

      Summary 
      Computer and internet security is under discussion due to the increasing relevance of the Internet and of the information and communication technology (ICT). The cyberspace is meanwhile regarded as separate military dimension. This paper gives an overview on the methods and practice of cyber war and presents the cyber war activities since 1998 and the security architecture of the cyberspace. Finally, the cyber war strategies of the US and China and the cyber policy of the European Union are discussed. [Version 3.0 – 12 Jan 2011 © PD Dr. Dr. K. Saalbach] 
      LV Internet policy Fachbereich 1 49069 Osnabrück 
      paper(2011) and German paper(2011)-Deutsch+Version mit NATO-Teil)

    119. W32.Stuxnet Dossier -- Version 1.4 (February 2011) INTRO: 

      W32.Stuxnet has gained a lot of attention from researchers and media recently. There is good reason for this. Stuxnet is one of the most complex threats we have analyzed. In this paper we take a de- tailed look at Stuxnet and its various components and particularly focus on the final goal of Stuxnet, which is to reprogram industrial control systems. Stuxnet is a large, complex piece of malware with many different components and functionalities. paper(2011)

    120. Global Energy Cyberattacks: “Night Dragon” By McAfee® Foundstone® Professional Services and McAfee LabsTM February 10, 2011 -- Executive Summary In 2010, we entered a new decade in the world of cybersecurity. The prior decade was stained with immaturity, reactive technical solutions, and a lack of security sophistication that promoted critical outbreaks, such as Code Red, Nimda, Blaster, Sasser, SQL Slammer, Conficker, and myDoom—to name a few. The security community has evolved and grown smarter about security, safe computing, and system hardening but so have our adversaries. This decade is setting up to be the exponential jumping off point. The adversaries are rapidly leveraging productized malware toolkits that let them develop more malware than in all prior years combined, and they have matured from the prior decade to release the most insidious and persistent cyberthreats ever known. paper(2011)
    121. First Joint Russian-U.S. report on Cyber Conflict-- The EastWest Institute released the first joint Russian-American report aimed at defining the “rules of the road” for cyber conflict. Prepared by a team of Russian and U.S. experts convened by EWI, Working Towards Rules for Governing Cyber Conflict: Rendering the Geneva and Hague Conventions in Cyberspace explores how to extend the humanitarian principles that govern war to cyberspace. paper(2011)
    122. Chinese Use of Cyberwar as an Anti-Access Strategy-Two Scenarios MARTIN C. LIBICK:Good afternoon, and thank you for inviting me here. I am Martin Libicki, from the RAND Corporation. I’ve been thinking about how states might use cyberwar for strategic purposes for most of the last twenty years paper(2011)
    123. When CSIS published Securing Cyberspace for the 44th Presidency two years ago, cybersecurity was not a major issue for public policy. Along with the work of many others, our first report helped to change this. However, the new energy in the national dialogue on cybersecurity has not yet translated into sufficient progress. We thought then that securing cyberspace had become a critical challenge for national security, which our nation was not prepared to meet. In our view, we are still unprepared.paper(2011)
    124. Online-Paper Cyberwar-methods-and-practice (English Version) paper(2011)
    125. Online-Paper Cyberwar-Grundlagen-Geschichte-Methoden (deutsche Version) paper(2011)
    126. Research Papers--The following page lists articles (co-)published by the CCD COE researchers. The papers are organised by year and alphabetically by title. papers
    127. 2010 Conference Proceedings papers(2010)
    128. International Cyber Incidents: Legal Considerations- Summary: This book features four national-scale cyber incidents (Estonia, Georgia, Lithuania and Radio Free Liberty) which demonstrate unique dependencies resulting from the widespread use of information society. These incidents raise questions to policymakers, diplomats, the intelligence community, military, information technology managers, and economists, as well as the general citizenry. Some of those questions - and many of the answers - are legal in nature. With these four incidents, we have undertaken to highlight a variety of legal issues that re relevant for national and international cyber security preparedness. By distinguishing the common denominators and emerging trends of legal relevance, we suggest ways ahead in legal thinking. However, the lessons identified within these pages do not fully become lessons learned unless the readers continue them in deeper analysis and policy actions. book(2010)
    129. Using Enrichment Capacity to Estimate Iran’s Breakout Potential paper(2011)
    130. Cyberwar Case Study: Georgia 2008 via smallwarsjournal paper(2011)
    131. Cyberwar--Computernetze als Schlachtfelder der Zukunft? paper(2011)
    132. “Reducing Systemic Cybersecurity Risk” OECD-REPORT paper(2011)
    133. Cyberspace: Definition and Implications--Rain Ottis, Peeter Lorents -- Cooperative Cyber Defence Centre of Excellence, Tallinn, Estonia paper(2010)
    134. Some papers about insider threats in critiacal infrastructures and security management paper(2010)
    135. Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors paper(2010)
    136. DRAGONS, TIGERS, PEARLS, AND YELLOWCAKE: FOUR STUXNET TARGETING SCENARIOSpaper(2010)
    137. Cyberwar--Das Internet als Kriegsschauplatz--von Sandro Gaycken "Der Cyberwar hat begonnen: Immer häufiger werden Hacker eingesetzt, um Geheimnisse zu stehlen, Wirtschaften zu schädigen, Militäroperationen zu stören oder politische Meinungen zu manipulieren. Ein globaler Trend, denn solche Computerangriffe sind meist risikofrei und kostengünstig. Kaum bemerkt von der Öffentlichkeit ist das Internet zu einem militärischen Operationsraum geworden." book(2010) at the moment in German
    138. Science of Cyber-Security--Abstract from the book: JASON was requested by the DoD to examine the theory and practice of cyber-security, and evaluate whether there are underlying fundamental principles that would make it possible to adopt a more scientific approach, identify what is needed in creating a science of cyber-security, and recommend specific ways in which scientific methods can be applied. Our study identified several sub-fields of computer science that are specifically relevant and also provides some recommendations on further developing the science of cyber-security.paper(2010)
    139. Cyber war and cyber power Issues for NATO doctrine paper(2010)
    140. Critical briefing on attacks against Industrial Control Systems especially SCADA systemspaper(2010)
    141. Information Warfare and Cyber Terrorism by Roland Heickerö, Swedish Defence Research Agencypaper(2008)
    142. Exploring the Role of Virtual Camps by Jarret Brachman and James J.F. Forest paper(2010)
    143. GRENA CERT Activities during cyberattacks against Georgia paper(2010)
    144. “Strategic Concept For the Defence and Security of The Members of the North Atlantic Treaty Organisation” paper(2010)
    145. Georgia 2008: Why We Need National and NATO Cyber Defense Policies paper(2010)
    146. CELLS WARS:The Changing Landscape of Communications Intelligence paper(2010)
    147. U.S.-China Economic and Security Review Commission 2010 report to Congress paper(2010)
    148. On Cyber Warfare A Chatham House Report paper(2010)
    149. This report argues that national strategy must be reviewed and adapted if it is to take proper account of cyber warfare. paper(2010)
    150. Proactive Defense Tactics Against On-Line Cyber Militia by Rain Ottis (Cooperative Cyber Defence Centre of Excellence) paper(2010)
    151. Planning for the Future of Cyber Attack Attribution: Hearing Before the H. Subcomm. on Technology and Innovation of the H. Comm. on Science and Technology paper(2010)
    152. Countering Advanced Persistent Threats with Cyber Forensics paper(2009)
    153. Capability of the People s Republic of China to Conduct Cyber Warfare paper(2010)
    154. Offensive Cyber Operations and the Use of Force paper(2010)
    155. Cyber Probing: The Politicisation of Virtual Attack book(2010)
    156. Ethical Issues of Cyberwarfare book(2000)
    157. The Microsoft Security Intelligence Report (SIR) is a comprehensive evaluation of the evolving threat landscape and trends. paper(2010)
    158. Stuxnet - Infecting Industrial Control Systems by Liam O Murchu paper(2010)
    159. Unravellling Stuxnet by Aleks Gostev and Costin G. Raiu paper(2010)
    160. Securing Indian Cyberspace Shojan paper(2010)
    161. The sisterhood of the traveling packets 

      From a cyber-security perspective, attribution is considered to be the ability to determine the originating location for an attack. However, should such an attribution system be developed and deployed, it would provide attribution for all traffic, not just attack traffic. This has several implications for both the senders and receivers of traffic, as well as the intervening organizations, Internet service providers and nation-states. In this paper we examine the requirements for an attribution system, identifying all of the actors, their potential interests, and the resulting policies they might therefore have. We provide a general framework that represents the attribution problem, and outline the technical and policy requirements for a solution. We discuss the inevitable policy conflicts due to the social, legal and cultural issues that would surround such a system. paper(2010)

    162. Cyberspace Policy Review

      Conclusion

      The history of electronic communications in the United States reflects steady, robust technological innovation punctuated by government efforts to regulate, manage, or otherwise respond to issues presented by these new media, including security concerns. The iterative nature of the statutory and policy developments over time has led to a mosaic of government laws and structures gov­ erning various parts of the landscape for information and communications security and resiliency. Effectively addressing the fragmentary and diverse nature of the technical, economic, legal, and policy challenges will require a leadership and coordination framework that can stitch this patchwork together into an integrated whole. paper(2009)

    163. Canada’s Cyber Security Strategy For a stronger and more prosperous Canada-- Educational Programs are important for cybersecurity. paper(2010)
    164. W32.Stuxnet Dossier paper(2010)
    165. From Information Operations to Cyberwarfare--Dr Dan Kuehl paper(2010)
    166. Proactive Self-Defense in Cyberspace by Bruce D. Caulkins--Internet security is inherently flawed—the very make-up of the system that allows us to send information between computers also allows hackers to enter a network and wreak havoc on its content. paper(2009)
    167. Cybersecurity Attacks on the Critical Infrastructure by Daniel G. Wolf paper(2009)
    168. Cyberthreats, Vulnerabilities and Attacks on SCADA Networks--This work discusses the current state of today’s Supervisory Control and Data Acquisition (SCADA) networks including information on recent attacks and incidents. [STUXNET] paper(2010)
    169. Stuxnet Under the Microscope-- This report is devoted to the analysis of the notorious Stuxnet worm (Win32/Stuxnet) that suddenly attracted the attention of virus researchers this summer. This report is primarily intended to describe targeted and semi-targeted attacks, and how they are implemented, focusing mainly on the most recent, namely Stuxnet. This attack is, however, compared to the Aurora attack, outlining the similarities and differences between the two attacks. paper(2010)
    170. Before the Terrorism and Unconventional Threats and Capabilities Subcommittee of the House Armed Services Committee paper(2010)
    171. Cyber Security Threats Dr Paul Twomey--The Lowy Institute for International Policy -- Good visualization for beginners in this topic -- ppt(2010)
    172. This paper(2010) and this paper(2010) are two analysis papers about the STUXNET Virus! The ICSA-10-238-01B—STUXNET MALWARE MITIGATION Update B paper is about: In July, ICS-CERT published an advisory and a series of updates regarding the Stuxnet malware entitled “ICSA-10-201⎯USB Malware Targeting Siemens Control Software.”a Since then, ICS-CERT has continued analysis of the Stuxnet malware..." --- the second paper from the Information-technology Promotion Agency in Japan says: "This is because acomputer virus was confirmed that spreads through the exploitation..."
    173. Tracking GhostNet: Investigating a Cyber Espionage Network paper(2009)
    174. Protecting Europe against large-scale cyber-attacks paper(2010)
    175. CYBER WAR v. CYBER STABILITY By Jody R. Westby, Esq.1 paper(2009)
    176. An Overview of the Cyber Warfare, Exploitation & Information Dominance (CWEID) Lab Presented to the CDCA Small Business & Industry Outreach Initiative Symposium paper(2010)
    177. Kim Jon-Il and Me. How to build a Cyber Army to Attack the U.S.--by Charlie Miller Independent Security Evaluators paper(2010)
    178. Cyber Threats Mike Cote Chairman and CEO--The beginnig of the PowerPoint is not so interesting but the end has some good slides ppt(2010)
    179. Nice statement of Joe St Sauver-- "I’m not a cyber defense guy nor am I a cyber intelligence person, so some of you may wonder, “Hey, why should I trust what Joe tells me?” My answer would be “Please DON’T! Think carefully about what I say and verify it yourself!”--so read it and try to verify "Cyber War, Cyber Terrorism and Cyber Espionage" paper(2008)
    180. The Chinese Cyber Attacks formerly known as Titan Rain-As prepared for 95-803 Information Warfare by Aaron Shelmire paper(2007)
    181. Australia and Cyber-warfare by Gary Waters, Desmond Ball and Ian Dudgeon--The Australian National University-- paper(2008)
    182. Author Mitchell has done a good overview of the cyber war situation till 2008 paper(2008)
    183. War in the Information Age: A Primer for Cyberspace Operations in 21st Century Warfare paper(2010)
    184. Cyber War, Cyber Terrorism and Cyber Espionage paper(2010)
    185. "Cyber Security and Politically, Socially and Religiously Motivated Attacks This paper examines Cyber-Security and Politically, Socially and Religiously Motivated Cyber-Attacks, focusing on the European Union as an international organisation with a fragmented yet developing interest in cyber-security. The paper is presented in three parts. Part 1assesses the source and nature of cyber threats. Society’s increasing dependence on Information and Communications Technology (ICT) infrastructure creates vulnerabilities and corresponding opportunities to be exploited by the unscrupulous, ranging from low-level, individual computer hacking to serious and organised crime, ideological and political extremism, and state-sponsored cyber attacks such as those perpetrated against Estonia in 2007…. Part 2 reviews current multilateral initiatives to address cyber-security, focusing on the work of the United Nations, the Organisation for Economic Co-operation and Development, the Organisation for Security and Co-operation in Europe, the Council of Europe, the North Atlantic Treaty Organisation, and the Group of Eight. In each case, the organisation in question has recognised the breadth and complexity of the cyber- security challenge and that its response to the cyber-security challenge can be but one part of the whole. Although national governments are the most important actors in cyber-security, others have a contribution to make, including industry and the private commercial sector…. Part 3 examines European Union’s responses to the cyber-security challenge. The EU is very closely engaged in cyber-security but cannot be said to have a comprehensive approach to the problem: the EU’s responses are diverse, lack coherence and could at times conflict."paper(2009)
    186. "Project Grey Goose Phase II Report"--Project Grey Goose Attacks on Critical Infrastructure There are many reports in the public domain which discuss vulnerabilities in the power grid. This is not one of them. Instead, this report looks at the broader threat landscape, some (not all) of the key actors involved, and most importantly, how U.S. Energy companies as a self-regulating and predominantly privately owned industry contribute to making the U.S power grid less secure." paper(2009/II)
    187. --Russia/Georgia Cyber War__Findings and Analysis--"Project Grey Goose is, in technology terms, a pure play Open Source Intelligence (OSINT) initiative launched on August 22, 2008 to examine how the Russian cyber war was conducted against Georgian Web sites and if the Russian government was involved or if it was entirely a grass roots movement by patriotic Russian hackers"paper(2008/I)
    188. This paper(2010) is interesting because more and more private companies like McAfee and Sophos are try to focus their research in cyber national activity! We have to watch their notes in their studies!
    189. "Leaving Deterrence Behind: War-Fighting and National Cybersecurity"-- What has worked in the nuclear realm, and remains relevant for homeland security against WMD terrorism, will not work in cyberspace.-- paper(2010)
    190. A very detailed PP about Cyberattack as a Tool of U.S. Policy ppt(2010)
    191. A PPT about some basic facts, problems and strategies in the cyberspace. How the armies could detect and prevent attacks? ppt(2010)
    192. That is the Cyber Dilemma--Professor Richard J. Harknett--University of Cincinnati Center for Strategic and International Studies paper(2010)
    193. Cross-Domain Deterrence and Credible Threats by James A. Lewis Center for Strategic and International Studies paper(2010)
    194. slideshow(2010) of the Cooperative Cyber Defence Centre of Excellence in Tallinn about cyber warfare
    195. --Bullets Blogs New Media Warfighter--The explosive growth of new media within the Global Information Environment (GIE) presents sustained challenges and opportunities for the U.S. military. In recent years, adversaries - armed with new media capabilities and an information-led warfighting strategy - have proven themselves capable of challenging the most powerful militaries in the world."-- Should be interesting for Information War Strategy-- paper(2010)
    196. Jonathan M. Smith made a 20 page PP with some useful information and lists presentation in pdf(2010)
    197. CYBERSECURITY AND INTELLIGENCE: THE US APPROACH(2010)
    198. The EastWest Institute published a paper(2010) which tries to show different views from China, USA, Russia, India and Norway.
    199. "Honeybot, Your Man in the Middle for Automated Social Engineering"--Interesting for Agencies!paper(2010)
    200. The Intelligencesquaredus made a debate about the topic cyber war. It was a debate with the motion "THE CYBER WAR THREAT HAS BEEN GROSSLY EXAGGERATED". There were two speakers for this motion and two against and the audience was asked before and after the debate about this motion. The debate and the results are written down in a transcript. It is very interesting how the US citizens handle this controversal topic. The speakers are experts in this area. The arguments are interesting and it should be logical that the speakers against this motion are the winners.paper(06/2010)
    201. This White Paper of the Chinese Government shows how the Chinese Government wants to handle their great "free" Internet. Just read the paper and you will understand. They are not talking about Great Walls and other restrictions in the Internet, only about "Basic Principles and Practices of Internet Administration". For our studies part V is the most interesting part because the chinese declare their problems with hackers and other scurity issues. paper(2010)
    202. Interesting paper written by Martin C. Libicki. This paper was published by the RAND CORPORATION. This paper is important because it makes some interesting conclusions which are underline the importance of Cyberdeterrence and Cyber warfare. The author Martin C. Libicki tries to focus the national interests in cyber space. paper(2009)
    203. The National Intelligence Strategy is important for persons who are interested in the future of the US Intelligence Agencies. This paper shows the development of cyberspace protection and some other issues which are also important to know for Cyber warfare analysis. paper (2009)
    204. The United States, the other sovereign members of the nuclear club, and a number of would-be proliferators have now entered what has been described as the “second nuclear age.” This paper examines the deterrence and defense requirements presented by this new age, arguing for the value to be gained through their integration. Offense-defense integra- tion will provide to national decision-makers timely and informed choices of security options needed to address the spectrum of conflict likely to unfold within the second nuclear age. paper(2009)
    205. Offical Statement on Cyberwarfare by Secretary of Defense Gates paper(06/2009)
    206. Another interesting libary of cyber warfare papers, books and articles is the http://www.whitehouse .gov/cyberreview/documents/ There you could find a lot of interesting information which you could download via the internet.
    207. The Cyber Security Strategy of the United Kingdom shows that nearly every bigger country in the world tries to focus their military power on the cyberspace. paper(2009)
    208. The big security enterprises don't work with the governments because it is to dangerous for them. But they publish papers like McAfee which show that they are deeply interested in this topic. Apaper(2009) from McAfee with some intersting conclusions about cyberwar and cold war.
    209. "How China will use the Cyber warfare to learfrog in military competitiveness" This paper is written by Jason Fritz. paper(2008)
    210. Wheeler, D. (2003, October). Techniques for Cyber Attack Attribution.--This paper will be one of my backround papers for my work-- paper(2003)

    World

    CHINA

    There is such a huge collection about China, that we will put a normal .txt -File on the page where mostly all articles are collected! Please check the links because some of them could be broke. +++FILE+++ 



    AUSTRALIA

    [07-2005] 


    • AusCERT threatened by anti-cyberterrorism plans [LINK]





    [02-2006]

    • Australian Government systems tested in cyber-terror exercise [LINK]





    [02-2007]

    • Critical Information Infrastructure Protection (CIIP): Draft technical Report for the Australian Institute of Criminology [LINK]





    [10-2007]

    • Australian Federal Government commits $20 million to protect critical infrastructure [LINK]





    [03-2008]





    [04-2008]

    • Australia attacked: What happened at Cyber Storm II [LINK]





    [05-2008]

    • Australia crumbles under Cyber Storm attack [LINK]





    [07-2008]

    • Australia and Cyber Warfare (PDF Book) [LINK]





    [08-2008]

    • Cyber Storm II Final Report. Australia Government: Attorney-General's Department, August 2008. [LINK]
    • National Cyber Security Exercise: Final Report. [LINK]





    [09-2008]

    • Australian Govt can do more on cyber security: report[LINK]





    [12-2008]

    • The First National Security Statement to the Parliament Address by the Prime Minister of Australia The Hon. Kevin Rudd MP [LINK]





    [04-2009]

    • Australia: China’s cyber snooping (and ours)[LINK]
    • Whitepaper: New Cyber Security Operations Centre To Enhance Cyber Warfare Capability (PDF) [LINK]





    [05-2009]

    • Australia to invest in cyber warfare capabilities [LINK]





    [07-2009]

    • Intelligence, Information Technology and Cyber Programs [LINK]
    • Chinese hackers wage 'cyber war' on Australian film festival [LINK]





    [09-2009]

    • Australian Government Information Security Manual [LINK]





    [11-2009]

    • Australian Government Cyber Security Strategy [LINK]
    • Australian Government Cyber Security Strategy Booklet [LINK]
    • Cyber Security Operations Centre operational but details lacking [LINK]
    • ASIO: Australia the target of cyber security attacks [LINK]
    • Cyberwar: What is it good for? (Australian Podcast) [LINK]
    • Government to establish CERT Australia [LINK]
    • Cyber Operations and the 2009 Defence-- White Paper: Positioning the Australian -Defence Organisation to Be Effective, Transparent and Lawful (PDF) [LINK]





    [12-2009]

    • Special Report Issue 26 - Cyber security: Threats and responses in the information age (PDF) Australian Strategic Policy institute [LINK]
    • William Hutchinson: Cyber Influence (PDF) 10th Australian Information Warfare and Security Conference, Edith Cowan University, Perth Western Australia [LINK]
    • Safeguarding Australia from Cyberterrorism: A Proposed Cyber-terrorism SCADA Risk Framework for Industry Adoption (PDF)[LINK]





    [01-2010]

    • Australian Cyber Security Operations Centre opens [LINK]
    • Cyber Security Operations Centre Brochure + Info [LINK]
    • Australia's new cyber warfare facility
    • Australia: Defence on a cyber war footing [LINK]





    [02-2010]

    • Hackers launch DoS attack on Australian government websites - Operation Titstorm [LINK]
    • CERT Australia: Targeted Cyber Intrusions - Mitigation Strategies Matrix [LINK]
    • CERT Australia: Targeted Cyber Intrusions - Mitigation Strategies Matrix – Introduction [PDF 157KB][LINK]
    • Australian Federal Government builds secret database to fight cyber-terrorism [LINK]





    [04-2010]

    • Australian mining company hacks the tip of the iceberg [LINK]
    • ABC Australia: Chinese Whispers





    [05-2010]

    • Australia to join European Cybercrime Convention [LINK]





    [06-2010]

    • Australian Government's Critical Infrastructure Resilience Strategy (PDF) [LINK]
    • Australian Government's Critical Infrastructure Resilience Strategy Supplement (PDF) [LINK]





    [08-2010]

    • Australia: Cyber spookiness [LINK]
    • ASIO: Cash, spooks and the future [LINK]





    [09-2010]

    • Australia: No govt defence against cyber attacks [LINK]
    • Australian shadow defense minister calls for stronger cybersecurity auditing powers [LINK]
    • Australia: Cheap hardware infects govt agencies [LINK]
    • Australia home to 30K computer zombies [LINK]
    • Australia to combat malware in government agencies [LINK]
    • Australia: Call for debate on cyber war[LINK]
    • Canberra in cyber war games[LINK]





    [10-2010]

    • Australia, US aim for cyber shields, not weapons [LINK]
    • The great Aussie firewall is back - and this time it's personal [LINK]
    • Australian Spy fears as Chinese firm eyes NBN deal [LINK]
    • Australia: Cyber espionage besieges military [LINK]
    • US eyes Australian government web plan [LINK]
    • Strategic Risk and North West Australia’s Critical Infrastructure[LINK]

    ISRAEL



    [02-2006]

    • Interfada: The Israeli-Palestinian Cyberconflict2006(PDF)

    [07-2006] 

    [08-2006] 

    [06-2007] 

    [06-2009] 

    • Israel suffered massive cyber attack during Gaza offensive (06/2009)article
    • Israel: Information Operations Threats And Countermeasures (PDF)

    [12-2009]

    [02-2010]

    [03-2010]

    [04-2010]

    [06-2010]

    [07-2010] 

    [08-2010] 



    [09-2010]

    [10-2010] 

    [11-2010]

    • Israel’s cyber warsarticle(11/2010)
    • Israel Adds Cyber-Attack to IDF article(11/2010)
    • Google Earth and iPhone trouble Israeli security chief article(11/2010)
    • Cyberwarzone.com has the rights to copy the content from Study4Cyberwar.com.

    Published by:

    Reza Rafati's picture

    Name
    Reza Rafati

    Information
    Hi, I'm the founder of Cyberwarzone and i'm here to collect and share a lot of information. So stay tuned!

    Country
    The Netherlands

    My website
    www.cyberwarzone.com

    Twitter:
    http://twitter.com/#!/rezarafati