Read Cybersecurity and Cyberwar Online

Authors: Peter W. Singer Allan Friedman,Allan Friedman

Cybersecurity and Cyberwar (47 page)

simulated catastrophic failure
Scott W. Beidleman, “Defining and Deterring Cyber War,” strategy research project, US Army War College, 2009, p. 6.

Guantánamo Bay
Ibid., p. 7.

“as much clarity as cybersecurity”
Cyber Terrain Conference, Spy Museum, Washington, DC, May 18, 2011.

Mohmedou Ould Slahi
Rattray and Healey, “Non-state Actors and Cyber Conflict,” p. 72.

1700 percent
General Martin Dempsey, “Defending the Nation at Network Speed,” remarks at the Brookings Institution, Washington, DC, June 27, 2013.

less than a week
Ken Dilanian, “Virtual War a Real Threat,”
Los Angeles Times
, March 28, 2011, p. 28.

“fundamental way of life”
Cyber Terrain Conference, Spy Museum, Washington, DC, May 18, 2011.

“drinking Red Bull”
Spencer Ackerman, “Pentagon Deputy: What If al-Qaeda Got Stuxnet?”
Danger Room
(blog),
Wired
, February 15, 2011,
http://www.wired.com/dangerroom/2011/02/pentagon-deputy-what-if-al-qaeda-got-stuxnet/
.

“Glen Canyon and Hoover Dams”
George R. Lucas, Jr., “Permissible Preventive Cyberwar: Restricting Cyber Conflict to Justified Military Targets,” presentation at the Society of Philosophy and Technology Conference, University of North Texas, May 28, 2011.

“cyber-sophistication”
Joseph S. Nye, “Power and National Security in Cyberspace,” in
America's Cyber Future: Security and Prosperity in the Information Age
, vol. 2, edited by Kristin M. Lord and Travis Shard (Washington, DC: Center for a New American Security, June 2011), p. 16.

S
O
H
OW
D
O
T
ERRORISTS
A
CTUALLY
U
SE THE
W
EB?

$70 a month
Joby Warrick, “Extremist Web Sites Are Using U.S. Hosts,”
Washington Post
, April 9, 2009, p. A01.

Osama bin Laden's lieutenants
Jacob Fenton, “Student's Web Site Hacked by al-Qaida,”
Vanguard
, April 8, 2003,
http://psuvanguard.com/uncategorized/students-web-site-hacked-by-al-qaida/
.

from Iraq to Afghanistan
Department of Homeland Security, “Domestic Improvised Explosive Device (IED) Threat Overview,” PDF briefing,
http://info.publicintelligence.net/DHS-DomesticIED.pdf
, accessed January 14, 2013.

four of the helicopters
“Islamists Destroyed US Helicopters Found in Online Photos,” Yahoo! News, March 16, 2012,
http://news.yahoo.com/insurgents-destroyed-us-helicopters-found-online-photos-165609778.html
.

Fort Benning, Georgia
Cheryl Rodewig, “Geotagging Posts Security Risks,” US Army, March 7, 2012,
http://www.army.mil/article/75165/Geotagging_poses_security_risks/
.

W
HAT ABOUT
C
YBER
C
OUNTERTERRORISM?

“a link for download”
Adam Rawnsley, “‘Spyware' Incident Spooks Jihadi Forum,”
Danger Room
(blog),
Wired
, September 1, 2011,
http://www.wired.com/dangerroom/2011/09/jihadi-spyware/
.

for terrorists to target and kill
Ibid.

RAND Corporation
Warrick, “Extremist Web Sites Are Using U.S. Hosts,” p. A01.

“mysteriously resurfaced”
Rawnsley, “‘Spyware' Incident Spooks Jihadi Forum.”

Mujahideen Secrets 2.0
Ibid.


housewife-next-door” genre
Fenton, “Student's Web Site Hacked by al-Qaida.”

S
ECURITY
R
ISK OR
H
UMAN
R
IGHT?
F
OREIGN
P
OLICY AND THE
I
NTERNET

Dutch government in 2011
Loek Essers, “Dutch Minister Changes Patriot Act Stance,”
Computerworld
, September 21, 2011,
http://www.computerworld.com/s/article/9220165/Dutch_minister_changes_Patriot_Act_stance
.

“regardless of frontier”
Fontaine and Rogers, “Internet Freedom and Its Discontents,” p. 148.

“a church or a labor hall”
Ibid.

Nazi memorabilia
“France Bans Internet Nazi Auctions,” BBC News, May 23, 2000,
http://news.bbc.co.uk/2/hi/europe/760782.stm
.

blackout of Wikipedia
Allan A. Friedman, “Cybersecurity in the Balance: Weighing the Risks of the PROTECT IP Act and the Stop Online Piracy Act,” remarks at the Brookings Institution, Washington, DC, November 15, 2011,
http://www.brookings.edu/papers/2011/1115_cybersecurity_friedman.aspx
.

F
OCUS:
W
HAT
I
S
T
OR AND
W
HY
D
OES
P
EELING
B
ACK THE
O
NION
M
ATTER?

surveillance by the NSA
Kurt Opsahl, “Exactly How the NSA is Getting Away with Spying on US Citizens,”
Gizmodo
, June 23, 2013,
http://gizmodo.com/exactly-how-the-nsa-is-getting-away-with-spying-on-us-c-540606531?

“36 million people”
John Sullivan, “2010 Free Software Awards Announced,” Free Software Foundation, March 22, 2011,
http://www.fsf.org/news/2010-free-software-awards-announced
.

“dark corner of the Internet”
“Monetarists Anonymous,”
Economist
, September 29, 2012,
http://www.economist.com/node/21563752?fb_action_ids=10152174673925385&fb_action_types=og.likes&fb_ref=scn%2Ffb_ec%2Fmonetarists_anonymous&fb_source=aggregation&fb_aggregation_id=246965925417366
.

endpoint of a conversation
The Tor Project, Inc.,
https://www.torproject.org/
, accessed March 17, 2013.

Tor built in
The Tor Project, Inc., “Tor Browser Bundle,”
https://www.torproject.org/projects/torbrowser.html.en
, accessed March 17, 2013.

circumvent each new technique
“How China Blocks the Tor Anonymity Network,”
The Physics arXiv
(blog),
MIT Technology Review
, April 4, 2012,
http://www.technology-review.com/view/427413/how-china-blocks-the-tor-anonymity-network/
.

Skype's importance
Hooman Mohajeri Moghaddam, Baiyu Li, Mohammad Derakhshani, et al.,
Skypemorph: Protocol Obfuscation for Tor Bridges
(Waterloo, ON: University of Waterloo, 2010),
http://cacr.uwaterloo.ca/techreports/2012/cacr2012-08.pdf
.

W
HO
A
RE
P
ATRIOTIC
H
ACKERS?

“Russia is attacking Estonia”
“Statement by the Foreign Minister Urmas Paet,” Estonian Foreign Ministry statement, May 1, 2007,
http://www.epl.ee/news/eesti/statement-by-the-foreign-minister-urmas-paet.d?id=51085399
.

“carried out by my assistant”
R. Coulson, “Behind the Estonia Cyberattacks,” Radio Free Europe, March 6, 2009,
http://www.rferl.org/content/Behind_The_Estonia_Cyberattacks/1505613.html
.

Markov's young assistant
Charles Clover, “Kremlin-Backed Group behind Estonia Cyber Blitz,”
Financial Times
, March 11, 2009,
http://www.ft.com/cms/s/0/57536d5a-0ddc-11de-8ea3-0000779fd2ac.html
.

“anti-Fatherland” forces
J. R. Jones,
“Putin's Kiss
: The Kids Are Hard Right,”
Chicago Reader
, March 7, 2012,
http://www.chicagoreader.com/chicago/putins-kiss-the-kids-are-hard-right/Content?oid=5787547
.

“Nazism and liberalism”
Ibid.

Russian intelligence
Carr,
Inside Cyber Warfare
, p. 3.

“Cyber-space is everywhere”
Ian Traynor, “Russia Accused of Unleashing Cyberwar to Disable Estonia,”
Guardian
, May 16, 2007,
http://www.guardian.co.uk/world/2007/may/17/topstories3.russia
.

hacker magazine
Xaker
Khatuna Mshvidobadze, “Is Russia on the Wrong Side of the Net?”
Jane's Defence Weekly
48, no. 9 (March 2, 2011): p. 22.

Syrian president Assad
Max Fisher and Jared Keller, “Syria's Digital Counter-revolutionaries,”
Atlantic
, August 31, 2011,
http://www.theatlantic.com/international/archive/2011/08/syrias-digital-counter-revolutionaries/244382/
.

hacker group Javaphile
Krekel, “Capability of the People's Republic of China to Conduct Cyber Warfare and Computer Network Exploitation.”

“Iranian Cyber Army”
Tim Stevens, “Breaching Protocol,”
Janes Intelligence Review
22, no. 3 (March 2010): pp. 8–13.

170,000 members
Ibid.

“computer network experts”
Krekel, “Capability of the People's Republic of China to Conduct Cyber Warfare and Computer Network Exploitation.”

200,000 members
Ibid.

F
OCUS:
W
HAT
W
AS
S
TUXNET?

“indiscriminate and destructive”
Lucas, “Permissible Preventive Cyberwar.” A study of the spread of Stuxnet was undertaken by a number of international computer security firms, including Symantec Corporation. Their report, “W32.Stuxnet Dossier,” compiled by noted computer security experts Nicholas Falliere, Liam O'Murchu, and Eric Chien, and released in February 2011, showed that the main countries affected during the early days of the infection were Iran, Indonesia, and India:
http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_stuxnet_dossier.pdf
, accessed August 11, 2013.

lingering in the wild forever
Lucas, “Permissible Preventive Cyberwar.”

replacing the broken centrifuges
Mark Clayton, “How Stuxnet Cyber Weapon Targeted Iran Nuclear Plant,”
Christian Science Monitor
, November 16, 2010,
http://www.csmonitor.com/USA/2010/1116/How-Stuxnet-cyber-weapon-targeted-Iran-nuclear-plant
.

“Chinese water torture”
Ralph Langner, “Better than bunker busters: the virtual Chinese water torture,” Langer.com, November 15, 2010,
http://www.langner.com/en/2010/11/15/better-than-bunker-busters-the-virtual-chinese-water-torture/
.


Olympic Games”
David Sanger, “Obama Order Sped Up Wave of Cyberattacks against Iran,”
New York Times
, June 1, 2012,
http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html
.

W
HAT
I
S THE
H
IDDEN
L
ESSON OF
S
TUXNET?
T
HE
E
THICS O
C
YBERWEAPONS

“Its atomic bomb?”
“The FP Survey: The Internet,”
Foreign Policy
(September–October 2011): p. 116.

planes and nuclear reactors
Clayton, “How Stuxnet Cyber Weapon Targeted Iran Nuclear Plant.”

says Leslie Harris
“The FP Survey,” p. 116.

“civilian personnel and infrastructure”
Neil C. Rowe, “Ethics of Cyber War Attacks,” in
Cyber Warfare and Cyber Terrorism
, edited by Lech J. Janczewski and Andrew M. Colarik (Hershey, PA: Information Science Reference, 2008), p. 109.

“984 Siemens centrifuges”
Ibid.

“Pandora's box”
Mark Clayton, “From the Man Who Discovered Stuxnet, Dire Warnings One Year Later,”
Christian Science Monitor
, September 22, 2011,
http://www.csmonitor.com/USA/2011/0922/From-the-man-who-discovered-Stuxnet-dire-warnings-one-year-later
.

“C
YBERWAR,
U
GH,
W
HAT
A
RE
Z
EROS AND
O
NES
G
OOD
F
OR?”:
D
EFINING
C
YBERWAR

“hereby formally declared”
Historical Resources about the Second World War, “Text of Declaration of War on Bulgaria—June 5, 1942,” August 7, 2008,
http://historicalresources.wordpress.com/2008/08/07/text-of-declaration-of-war-on-bulgaria-june-5-1942/
.

War on Christmas
Anna Dimond, “O'Reilly: ‘War' on Christmas Part of ‘Secular Progressive Agenda' That Includes ‘Legalization of Narcotics, Euthanasia, Abortion at Will, Gay Marriage,'”
Media Matters for America
, November 21, 2005,
http://mediamatters.org/video/2005/11/21/oreilly-war-on-christmas-part-of-secular-progre/134262
.

“significant destruction”
Aram Roston, “U.S.: Laws of War Apply to Cyber Attacks,”
Defense News
, September 18, 2012,
http://www.defensenews.com/article/20120918/DEFREG02/309180012/U-S-Laws-War-Apply-Cyber-Attacks
.

“intensive cyberconflict with us”
Clayton, “The New Cyber Arms Race.”

“without triggering a shooting war”
David Sanger, “A New Cold War in Cyberspace, Tests US Times to China,”
New York Times
, February 25, 2013,
http://www.nytimes.com/2013/02/25/world/asia/us-confronts-cyber-cold-war-with-china.html?pagewanted=2&_r=1&partner=rss&emc=rss
.

A
W
AR BY
A
NY
O
THER
N
AME?
T
HE
L
EGAL
S
IDE OF
C
YBER
C
ONFLICT

“an attack against them all”
North Atlantic Treaty Organization, “The North Atlantic Treaty,” April 4, 1949,
http://www.nato.int/cps/en/natolive/official_texts_17120.htm
, accessed August 11, 2013.

Other books

The Favor by Elle Luckett
All the Dead Yale Men by Craig Nova
Oasis of Night by J.S. Cook
Don't Blame the Devil by Pat G'Orge-Walker
Bumpy Ride Ahead! by Wanda E. Brunstetter
Sweet Addiction by Maya Banks


readsbookonline.com Copyright 2016 - 2024