Courses/Computer Science/CPSC 601.65.Cyberwar.F2012
This page serves as the main course page for CPSC 601.65. It contains the course policies, syllabus (topics/sessions), and a list for background reading and viewing of material related to the study of cyberwar, cyberterror, and cyberprotest.
This course will examine cyberwar, cyberterrorism, and cyberprotest: are these credible threats? Is it meaningful to talk about them? What mechanisms are used to perpetrate and defend against them? Who are the actors involved and what are their motivations? Ethical and legal considerations will be introduced as necessary. Students are expected to complete assigned readings prior to class time and participate in discussion. This course is structured as half lecture / half debate; lectures provide introductory material to certain topics and debates offer the chance for participants to present and discuss their understanding of topic matter. This course is interdisciplinary in nature and focus, but emphasizes technical content; it specifically seeks understanding of how technical knowledge informs lay perspectives of the topics in the course title.
Contents
- 1 Course Description
- 2 Course Information
- 3 References / Reading List
- 4 Notes
- 5 Debates
- 6 Meeting Notes
- 7 Policies
- 8 Discussion Topics / Syllabus
- 9 Blog Post Topics
- 10 Other Cyberwar Courses
- 11 Related Work
- 12 Related Work Topics / Categories
- 12.1 Policy and Law (Benedict)
- 12.2 CyberOperations and tactics (Casper)
- 12.3 Cybercrime (Danny)
- 12.4 The Big Picture: Timeline and Background (Sarah)
- 12.5 Techniques: Affecting the Real World / Cyberphysical Systems (Sarah)
- 12.6 Major Incidents: Stuxnet, Flame, and other "Cyberweapons" Incidents (Casper)
- 12.7 Minor Incidents: Malware and other Malicious Activities
- 12.8 Robots, Drones, and Automation (Danny)
- 12.9 Government Responsibility and Power (Michael)
- 12.10 Training Cyber-warriors (Benedict)
- 12.11 Selling Exploits and Regulating or Controlling Sale thereof (Michael)
- 12.12 The West vs. China, Iran, and ? (Chad)
- 12.13 Cyberterrorism (Chad)
- 12.14 Miscellaneous
- 12.15 Uncategorized Links
Course Description
Cyberwarfare is an ill-defined topic that cuts across the boundaries between cyber-espionage, criminal cyber attacks and activity, information security, economic espionage, "traditional" kinetic conflict, and kinetic war with electronic weapons and targeting systems.
The use of digital techniques to commit traditional crimes, undertake legally and morally murky activities, and engage in "the continuation of politics by another means" presents a fascinating lens with which to understand the contemporary geopolitical climate. From Estonia to Stuxnet to the Arab Spring, the recent impact of digital technology and information security on global affairs has been sharp and striking. Where are these trends leading our society?
People in Western societies fear the potential that cyber attacks have to wreak havoc on basic services like water, energy, sewer, food, transportation, and communication systems -- not to mention financial systems, entertainment systems, television and broadcast media, personal devices, cars, medical devices, health care, etc. Western governments and military are especially sensitive to the perceived vulnerabilities of a highly electronic logistics system and weapons systems and platforms. A great deal of risk seems to exist partly because the complete interface between ordered civil society and Internet and computer-based services has not been well--defined.
Yet all too often, discussion of this concept is based on supposition rather than knowledge. It invites panic rather than prudence. Is cyberwar hype? Do we need social, legal, diplomatic, technical, and military deterrents to it? Is anything really different from 10 years ago? Do we need treaties to govern cyberweapons? What is a cyberweapon, anyway?
Course Information
Web Tools and Discussion
The course blog is located at:
http://uofccyberwar.blogspot.ca/
The Piazza site is here:
https://piazza.com/ucalgary.ca/fall2012/cpsc60165/home
Meetings
Meetings take place most Tuesdays (see schedule below) from 4:00pm to 6:50pm Mountain Time in the University of Calgary's ICT 616 room.
Some sessions will also be available to a select number of external participants via a G+ hangout.
The course blog will limit authors to official course participants, but external participants may post comments to blog discussion threads if they authenticate with a Google account or other OpenID account.
We will also use Piazza for some internal discussions and items related to class logistics.
2014 Session List and Schedule
Your grade is determined by:
- 3 essays (60% of your grade)
- 3 commentaries (30% of your grade)
- 2 in-class exercises (10% of your grade)
Essays and commentary will be submitted via Piazza. The two in-class exercises will use the EDURange framework.
Essays and commentaries are graded on a check, check minus, and check plus system. You are required to offer well-thought out criticism and commentary (not just opinion) on three essays (from other students) during the course of the semester. Essays will focus on the set of readings.
There is no final exam.
Session | Date | Title / Topic | Reading | Supplemental Readings / Notes |
---|---|---|---|---|
0 | 12 Sept. | No class | no class | (nien; Locasto is away for NSPW) |
1 | 19 Sept. | Introduction, Overview, Ethics, What is Cyberwar? | (9) | (2 3 4 5) |
2 | 26 Sept. | Two Viewpoints on Cyberwar: The Three Cyber-War Fallacies by Dave Aitel (slides) Gen. Keith Alexander's AEI talk | (22) | () |
3 | 3 Oct. | Outline TOC for Book, Discuss (22) | none, catch up on existing | none, work on categorizations |
4 | 10 Oct. | Work on git repo, International Cyber video, SB & FX slides | (26) | none |
5 | 17 Oct. | Game Theory vid1 [stuxnet vid] vid3 | (25) | (n21, going bright hotsec Canada Cybersecurity Website ) |
6 | 24 Oct. | S1: Exploit Sales, S2: Stuxnet | n2 n3 n4 n5 n6 n7 [n8,n9,n10,n11,n12,n13,n14,n15,n16] | (14, 16, opt:15) |
7 | 31 Oct. | Opening Pandora's Box, Automating War | (Curbing) | (;login:) |
8 | 7 Nov. | Regulation of Offensive Security Tools | (drones, DOJ whitepaper) | (LPR) |
9 | 14 Nov. | Rescheduled | (21,20) | none |
10 | 21 Nov. | Robots and Cyberweapons | (cybersecurity treaties: a skeptical view) | none |
11 | 28 Nov. | International Agreements and Cyber-treaties | (yellowcake) | n19 |
12 | 5 Dec. | Whence cyberwar? | none | none |
2012 Session List and Schedule
Class is held once per week for just shy of three hours; we will (usually) discuss two topics per session. Prof. Locasto will hand out any physical readings at the previous session. Blog authors must post essays for that week by that week's class period (for example, the blog essay authors indicated in the "2 Oct." row should have posted their essays by 2 October before class). Readings listed in Week W are for discussion the following week. For example, the readings listed in the "2 Oct." row will be discussed on 9 Oct. The exceptions are the 11 Sept readings; they will be discussed on 25 Sept.
Session | Date | Title / Topic | Notes | Readings | Essay Authors | Scribes |
---|---|---|---|---|---|---|
1 | 11 Sept. | Introduction and Overview | 1 hour organizational meeting | (2 3 4 5) | x | x |
2 | 18 Sept. | Two Viewpoints on Cyberwar: The Three Cyber-War Fallacies by Dave Aitel (slides) Gen. Keith Alexander's AEI talk | videos and discussion; Prof. Locasto is away at NSPW | (see above) | x | x |
3 | 25 Sept. | S1: Ethical Considerations, S2: Definitions | x | (6, 7, 8) | Madison, Eraisuithon | Gonzalez, Samba Shiva |
4 | 2 Oct. | S1: What is War?, S2: Discussing a definition of Cyberwar | x | none | x | Clark, Costa |
5 | 9 Oct. | S1: Essay Discussions, S2: The concept of "Cyberweapons" | n0 | (1,9: Ch1..4) | Franklin, Caeser | Dey, Kumari |
6 | 16 Oct. | S1: Essay Discussion / Libicki, S2: HBGary case study | n1 | (11,12,13) | Publius, Adams | Lindner, Robson |
7 | 23 Oct. | S1: Exploit Sales, S2: Stuxnet | n2 n3 n4 n5 n6 n7 [n8,n9,n10,n11,n12,n13,n14,n15,n16] | (14, 16, opt:15) | Cicero, Lee | Ranshaw, Matheron |
8 | 30 Oct. | S1: blog posts; mindset video, S2: sample debate | cheating is fundamental | (18,19,20) | Dickens, Lincoln | Sherlock, Sultana |
9 | 6 Nov. | S1: Cyberterrorism - Attribution - Irregular Forces, S2: Debate 1 v 2 | n19 (24) | (21,22,23,25) | Washington, Smith | Thompson, Trnavskis |
10 | 13 Nov. | Reading Week | No class. | (17, 9:Ch5..7) | x | x |
11 | 20 Nov. | S1: TBD, S2: Debate 3 v 4 | x | (9:Ch5..7) | Jefferson, Paine | Williams, Gonzalez |
12 | 27 Nov. | S1: TBD, S2: Debate 1 v 4 | x | () | Hamilton, Jay | Samba Shiva, Clark |
13 | 4 Dec. | S1: TBD, S2: Debate 2 v 3 | guest speaker; Prof. Locasto will be at ACSAC | tbd | open | Costa, Dey |
References / Reading List
- Unmasked, Ars Technica editorial staff e-book: http://arstechnica.com/tech-policy/2011/03/hbgaryanonymous-special-report/ ($1.99 from BN.com)
- Civil Disobedience ebook, PDF, HTML (Project Gutenberg)
- UofC Statement of Intellectual Honesty
- ACM Code of Ethics
- Towards an Ethical Code for Information Security
- Epilogue to "War and the Rise of the State" by Bruce D. Porter
- Conclusion to "A History of Warfare" by John Keegan
- "Human Subjects, Agents, or Bots: Current Issues in Ethics and Computer Security Research" by John Aycock, Elizabeth Buchanan, Scott Dexter and David Dittrich
- Cyberdeterrence and Cyberwar, Martin C. Libicki, RAND Corporation links to ebooks and PDF
- The Tallinn Manual on the International Law Applicable to Cyber Warfare
- Daily Dave thread on "Neal Stephenson, the EFF and Exploit Sales", paying particular attention to the EFF article:
- "Zero-day exploit sales should be key point in cybersecurity debate"
- "The EFF is Losing Its Way on Internet Freedom" by Dave Aitel
- J. Aycock. Stux in a Rut: Why Stuxnet is Boring. Virus Bulletin, September 2011, pp. 14-17.
- W32.Stuxnet Dossier by Symantec
- "The (Almost) Complete History of Memory Corruption Attacks" http://prezi.com/iemlmzvpnk_d/the-almost-complete-history-of-memory-corruption-attacks/
- NDU Press: Book Review of Cyberdeterrence and Cyberwar http://www.ndu.edu/press/cyberdeterrence-and-cyberwar.html
- Obama Order Sped Up Wave of Cyberattacks Against Iran NYTimes Article by David Sanger
- Stuxnet: Leaks or Lies? by Steven Cherry (commentary on Sanger's NYTimes article)
- War 2.0: Cyberweapons and Ethics By Patrick Lin, Fritz Allhoff, Neil C. Rowe. Communications of the ACM, Vol. 55 No. 3, Pages 24-26
- A Comparative Study of Cyberattacks
- Cybermilitias and Political Hackers—Use of Irregular Forces in Cyberwarfare by Scott D. Applegate
- Ready Player One
- read/listen Massive Cyberattack: Act 1 Of Israeli Strike On Iran? by TOM GJELTEN (NPR)
- Cyberterrorism
- Would a Cyber Warrior Protect Us? Exploring Trade-offs Between Attack and Defense of Information Systems NSPW 2010. Tyler Moore et al.
Notes
- n0 example code injection countermeasures
- n1 http://dazzlepod.com/rootkit/?email=%40gmail.com
- n2 Langner TED talk on Stuxnet
- n3 Timeline of Memory Exploit Techniques
- n4 Why antivirus companies like mine failed to catch Flame and Stuxnet
- n5 Report: Stuxnet delivered to Iranian nuclear plant on thumb drive by Daniel Terdiman (CBSNews)
- n6 Stuxnet Will Come Back to Haunt Us
- n7 "The History of Cyber warfare" Infographic
- n8 Kaspersky: Cyberweapons Flame and Stuxnet share code
- n9 Meet The Hackers Who Sell Spies The Tools To Crack Your PC (And Get Paid Six-Figure Fees)
- n10 Security firm exploits Chrome zero-day to hack browser, escape sandbox
- n11 Vupen Chrome Demo
- n12 Kaminsky's viewpoint "VUPEN vs. Google: They’re Both Right (Mostly)"
- n13 Secrecy surrounding ‘zero-day exploits’ industry spurs calls for government oversight
- n14 price list for zero days: "Shopping For Zero-Days: A Price List For Hackers' Secret Software Exploits"
- n15 From March 29: EFF Position on Exploit Sales: “Zero-day” exploit sales should be key point in cybersecurity debate
- n16 an opinion on selling zero day exploits
- n17 EFF clarification on n15
- n18 viewpoint on EFF position
- n19 CNN on Panetta's "cyber pearl harbor" speech
- n20 Anonymous Targets Israel
- n21 http://www.foxbusiness.com/economy-policy/2014/10/12/obama-said-to-warn-crippling-cyber-attack-potential/
Debates
1 v 2: Be it resolved: Hacker tools are cyberweapons and should be licensed or banned.
Affirmative: 2 Negative: 1
3 v 4: Be it resolved: People should be able to shed their national or sovereign allegiance or identification when participating in online conversations, information exchange, or transactions.
Affirmative: 3 Negative: 4
1 v 4: Be it resolved: Cyberwar can be effectively regulated through multilateral treaties.
Affirmative: 4 Negative: 1
2 v 3: Be it resolved: Cyberware is the new "yellow cake."
Affirmative: 3 Negative: 2
Debate Format:
This is a combination of Oxford and Mace styles.
- Audience Vote: For, Against, Undecided
- 7 minute opening for Affirmative
- 7 minute opening for Negative
- 7 minute follow up for Affirmative
- 7 minute follow up for Negative
- 10 minutes of audience questions
- 4 minute closing by Affirmative
- 4 minute closing by Negative
- Audience Vote: For, Against, Undecided
Meeting Notes
Courses/Computer_Science/CPSC_601.65.Cyberwar.F2012/Lecture Notes
Policies
Goal and Structure
The overriding aim of this class is to help build an understanding of this complex topic so that participants can have a more effective and informed opinion when discussing technical or policy initiatives related to the topic. This seminar class will begin with a consideration of the definition of war and cyberwar and whether the cyberwar concept exists independently of traditional kinetic conflicts. It will then cover technical material dealing with actual offensive cyber operations techniques. The course will move to a debate-style seminar, where teams of students will debate a central question arising from the different aspects of this complex topic.
I have organized meeting sessions in three general groupings. The first provides background and overview material. The second offers a taste of various offensive cyber operations tools and techniques. The third is a collection of debate topics informed by the first two parts of the course. Many later class sessions will utilize a debate-style interaction to explore the topic and readings for that session.
Assessment
Students should emerge from the course with an appreciation for the ethical issues surrounding the use of digital techniques to engage in "armed" conflict along with an understanding of how our society should best steer a course forward in setting norms, international guidelines, and expected behavior in the use of digital weapons and cyber conflict.
The instructor will assess student proficiency through (1) student performance in debates, (2) students' skill in evaluating the arguments of others (both in debates and in blog comments), and (3) a series of brief written opinion pieces published via the course blog.
- Team debate performances: 50%
- Blog comments / Debate evaluations / Class participation: 10%
- Blog essays: 40% of your grade
Peer review is an important skill to nurture in an academic and professional setting. Most of the evaluated skills in this course are purposefully on the "soft" side of the discipline: how to construct and write effective arguments, how to construct terse but convincing essays, and how to argue viewpoints based on technical merit of the ideas. This is not a course that asks participants to demonstrate skill in actual hacking techniques; CPSC has other graduate and undergraduate courses (601.29, 626, 627, 628) for that purpose.
Course Policies
- Course communication and discussion should take place via the blog (blog posts and comments) and wiki talk page (if applicable). You are expected to be an active contributor to the blog forum both through your formal posts and the follow-up comments and discussion.
- Pseudonyms in Piazza are not an option (for grading and attribution); psuedonyms will be used on the blog.
- Late work is not accepted.
- There will be no curve.
- Please keep email traffic limited; use Piazza instead. Feel free to use email for personal or grade-related matters.
- This course is a seminar and largely discussion-based (both in class and via the blog). Please treat your colleagues with respect and treat their opinions with the level of professionalism you expect your contributions to command. This course should provide a safe environment for expressing, exploring, and testing opinions, facts, arguments, and assertions related to many potentially controversial topics about which people get very passionate.
- Prof. Locasto will be offline and unavailable Nov 10 through Nov 13. (Reading Days, Remembrance Day)
- Prof. Locasto will be offline and unavailable from Nov 21 through Nov 25. (US Thanksgiving)
Discussion Topics / Syllabus
I list possible session topics here; we may not cover all of these depending on time, class interest, and the path various discussion take.
Unit 1: Introduction
- What is security? This session will run as a lecture and consider various definitions of "security", particularly in two contexts: information security and global security. Basic terms like confidentiality, integrity, availability; basic concepts and principles of information security. The security mindset. We offer this session to help orient students (including undergraduates or CMSS students) who may not have a background in information security.
- Ethical Considerations A discussion of what moral frameworks might apply to studying cyberwar; a discussion of what ethical principles should guide the studies in this course including the ACM Code of Conduct and the UofC Academic Honesty Policy (Statement of Intellectual Honesty). Additional readings for this session will come from Applying Moral Theories (C.E. Harris, Jr.) and Towards an Ethical Code for Information Security?
- What is war? This session will involve an overview of and discussion of the emergence, evolution, and characteristics of war, particularly as experienced in Western society. This topic will likely take two sessions. See wiki for texts.
- What is cyberwar? This session will focus on trying to reach a definition of cyberwar; nature and characteristics of cyberwar; comparison with cyberterrorism, cyber-espionage, and cyber-crime. A viewing of General Alexander's briefing "Cybersecurity and American Power" at the American Enterprise Institute.
- The Three Fallacies of Cyberwar This session will center on viewing and discussing the video of Dave Aitel's talk from RSA or USENIX Security. Costs involved in information warfare and developing reliable, high-value cyberweapons.
Unit 2: Cyber Weapons
This unit aims to give students hands-on experience with actual infosec techniques and tools.
- Cryptography as digital munitions One of the earliest mixtures (in recent history) of the concept of computer security technology and war was the designation of cryptograpy as a munitions by the US government. This session will discuss the history of legal control over the export of cryptographic software and algorithms.
- Hacker Tools I (Network Analysis) A technical overview of various systems and network security tools and penetration testing techniques. Includes discussion of network mapping, tracing, sniffing, and injection.
- Web Attacks A hands-on session for learning how to attack web servers, web services, etc. Students will be guided through two online learning sites: hack-test.com and Google's Gruyere web application.
- Hacker Tools II (Host Analysis and Debuggers) A technical overview of various systems tools and penetration testing techniques. Includes discussion of shellcode, debuggers like OllyBone, OllyDbg, gdb, Immunity Debugger, Rasta debugger, Phrack , and IDAPro.
- Anatomy of Polymorphic Shellcode A lecture on shellcode disassembly, polymorphic shellcode, English shellcode, shellcode disassembly. A self-guided exercise in disassembling and hand-executing a piece of polymorphic shellcode. Requires a working Linux environment.
- Stuxnet Overview. A technical overview of Stuxnet, Duqu, and Flame (time permitting).
- HBGary Case Study A discussion session based on Ars Technica's reporting about the Anonymous and HBGary Federal interaction from 2011.
- Anonymity Systems An overview session on research in and technical systems for network-based anonymous communication, including overlay networks, onion routing, Tor, Freenet, Crowds, and similar technology. Include discussion of recent work in browser-based anonymous chat.
- Design Exercise In this session, we will engage in a thought experiment based on targeting the University of Calgary's network and computer systems.
- Guest Speaker We will have a guest speaker on the future zoning or fragmentation of the Internet due to cyber arms control, attempts to filter or censor Internet content, and attempts to provide and enforce attribution.
Unit 3: Debates
- Estonia Be it resolved: Estonia was the first example of cyberwar. Support or refute with counterexamples.
- Cyberweapons I Be it resolved: Hacker tools are cyberweapons and should be licensed or banned.
- Stuxnet Be it resolved: Stuxnet is not a significant development in cyber weapon technology.
- Protest Be it resolved: Distributed Denial of Service (DDoS) is a valid, morally permissible form of protest; it is the equivalent of a digital sit-in. Examples include LulzSec's attention to PayPal and Anonymous's attention to Visa and others.
- Hacktivism and Lulz Be it resolved: LulzSec and Anonymous are not engaging in cyberwar. Debate positions should be backed up by an examination of last year's activities and current efforts as recorded on Twitter, pastebin, and other resources provided by the instructor or credible online sources.
- Anonymity Be it resolved: People should be able to shed their national or sovereign allegiance or identification when participating in online conversations, information exchange, or transactions.
- Tor Be it resolved: Tor is a cyberweapon.
- Hype Be it resolved: Cyberwar is the new yellow cake. In this capstone session, the class will explore the position stated in the Wired article
Wired Opinion: Cyberwar Is the New Yellowcake by Brito and Watkins. A discussion of whether or not cyberwar is a black swan, a real technical possibility, or is a political diversion much like the ``yellow cake argument circa 2002. This session is a bookend to the session What is cyberwar?
Blog Post Topics
Below appears a list of possible topics for blog posts. You have the freedom to select one of these topics or a topic of your own choosing when writing your posts. Posts should be well-researched, include citations, and present a coherent and terse argument.
Social Networking and Social Movements. Twitter. Arab Spring. Quebec student protests. Unintended Consequences. Government responses. Legislation. Regulation. Effects on liberal democratic society. Open source projectile guidance and flight software. Cyberterror. Can a small group of non-state actors (e.g., students in this class) engage in cyberwar? Whistleblowing. Bradley Manning. Assange. Wikileaks. Industrial espionage.
Other Cyberwar Courses
Cyberwar is a hot topic, and other people teach courses about it. You may be interested in the material you find at those pages.
- http://www.au.af.mil/info-ops/
- http://homelandsecurity.sdsu.edu/690 (Steven Andrés)
- http://courses.georgetown.edu/?CourseID=SEST-569 (Martin C. Libicki)
- SS490 Strategy and Policy of Cyberwar (Greg Conti, USMA)
Related Work
Books
- Stealing the Network: How to Own a Continent, various
- Unmasked, Ars Technica editorial staff e-book: http://arstechnica.com/tech-policy/2011/03/hbgaryanonymous-special-report/
- Inside Cyber Warfare: Mapping the Cyber Underworld, Jeffery Carr
- Cyber War (The Next Threat to National Security and What to do About it), Richard Clarke
- Wired for War, Peter Singer http://wiredforwar.pwsinger.com/
- Civil Disobedience, Henry David Thoreau
- A History of Warfare, John Keegan
- War and the Rise of the State, Bruce D. Porter
- Ride of the Second Horseman, Robert L. O'Connell
Talks and Videos
- Dave Aitel's talk on cyberwar costs http://prezi.com/vunircise2q8/three-cyber-war-fallacies/
- http://www.aei.org/events/2012/07/09/cybersecurity-and-american-power/
- Greg Conti, Shmoocon 2012: http://www.youtube.com/watch?v=v0JHDr1oT0Y
- Bruce, RSA: http://www.youtube.com/watch?v=SrjgXHAYvxk
- http://www.ists.dartmouth.edu/events/abstract-cyberops.html
- DEF CON 21 Presentation By Mudge - Unexpected Stories From a Hacker Inside the Government http://youtu.be/TSR-b9yuTbM?t=11m20s
Related Work Topics / Categories
Policy and Law (Benedict)
- "The Wassenaar Arrangement" http://www.armscontrol.org/factsheets/wassenaar http://www.armscontrol.org/factsheets/wassenaar
- "U.S. Law Enforcement Seeks to Halt Apple-Google Encryption of Mobile Data" http://www.bloomberg.com/news/2014-09-30/u-s-seeks-to-reverse-apple-android-data-locking-decision.html
- International laws on CyberSecurity "CYBERPOWER AND INTERNATIONAL SECURITY – ANALYSIS" http://www.eurasiareview.com/08062012-cyberpower-and-international-security-analysis/
- Columbia's Law School on "THE IMPORTANCE OF INCORPORATING PRIVACY & CIVIL LIBERTIES CONSIDERATIONS INTO CYBER OPERATIONS AND CYBER SECURITY" http://www.law.columbia.edu/calendar?main.rtresume=/calendar&main.cal=we&main.id=612645&main.ctrl=eventmgr.detail&main.view=calendar.detail
- "Beyond Boundaries: Canadian Defence and Strategic Studies" http://uofcpress.com/book-series/beyond
- "The Cybersecurity Act of 2012: Are We Smarter Than a Fifth Grader?" http://www.huffingtonpost.com/dave-aitel/the-cybersecurity-act-of-_b_1737129.html?utm_hp_ref=tw
- RT @daveaitel Leon Panetta Warns of Digital 9/11 Cyber Attack - The CIO Report - WSJ http://t.co/TEwyK6MU
- U.S. Information Operations Roadmap (Oct. 2003) http://news.bbc.co.uk/2/shared/bsp/hi/pdfs/27_01_06_psyops.pdf
- Internet Posting Removal Act (Illinois State Bill) http://legiscan.com/IL/text/SB1614
- whistleblowers: http://watchdog.org/169622/federal-whistleblowers-threatened/
- surveillance: http://www.bloomberg.com/news/2014-09-30/u-s-seeks-to-reverse-apple-android-data-locking-decision.html
- "Inside Citizen Lab, the “Hacker Hothouse” protecting you from Big Brother" http://arstechnica.com/security/2014/07/inside-citizen-lab-the-hacker-hothouse-protecting-you-from-big-brother/2/
- legal, survilliance, govt control http://www.tomsguide.com/us/california-kill-switch-law,news-19392.html
- https://www.privacyinternational.org/news/blog/international-agreement-reached-controlling-export-of-mass-and-intrusive-surveillance
- weev is freed: https://torekeland.com/news/u-s-v-weev-prosecutors-agree-dismissal-indictment-unconditional-release
- "Hacker" charged in CRA heartbleed breach: http://globalnews.ca/news/1274997/hacker-charged-in-cra-heartbleed-breach/
- Judge N on drone warfare: http://www.foxnews.com/opinion/2014/04/24/obama-drone-warfare-legal-way-to-kill/?intcmp=obnetwork
- permissionless innovation: http://www.circleid.com/posts/20140424_permissionless_innovation_why_it_matters/
- Cybercrime laws used to target hackers? http://www.theguardian.com/technology/2014/may/29/us-cybercrime-laws-security-researchers
- snowden internal email: http://icontherecord.tumblr.com/post/87218708448/edward-j-snowden-email-inquiry-to-the-nsa-office
- white house details thinking on cybersecurity flaws: http://www.nytimes.com/2014/04/29/us/white-house-details-thinking-on-cybersecurity-gaps.html?emc=edit_th_20140429&nl=todaysheadlines&nlid=3428777&_r=0
- Judge N. on "No Place to Hide" http://www.foxnews.com/opinion/2014/05/29/glenn-greenwald-new-book-no-place-to-hide-tells-how-nsa-spies-on-us/
- At the Nexus of Cybersecurity and Public Policy: http://www.nap.edu/catalog.php?record_id=18749
- NSA sued for hoarding zero day: http://rinf.com/alt-news/sicence-technology/nsa-sued-hoarding-details-use-zero-day-exploits/
- https://www.eff.org/deeplinks/2013/12/meet-co-traveler-nsas-cell-phone-location-tracking-program
- ...of this report: http://www.whitehouse.gov/blog/2013/12/18/liberty-and-security-changing-world
- http://www.dni.gov/index.php/newsroom/press-releases/198-press-releases-2014/994-foreign-intelligence-surveillance-court-approves-government%E2%80%99s-application-to-renew-telephony-metadata-program
- https://freedom-to-tinker.com/blog/felten/a-court-order-is-an-insider-attack/
- https://ssd.eff.org/
- https://globalchokepoints.org/
- https://www.eff.org/free-speech-weak-link#isp
- http://arstechnica.com/tech-policy/2012/03/sealand-and-havenco/4/
- https://www.eff.org/deeplinks/2013/08/eff-victory-results-expected-release-secret-court-opinion-finding-nsa-surveillance
- drones and judges: http://www.usnews.com/news/politics/articles/2013/07/19/judge-govt-position-in-drone-suit-disconcerting
- http://www.theguardian.com/world/2013/jul/24/nsa-surveillance-amash-amendment?CMP=twt_fd
- http://maradydd.livejournal.com/528620.html
- http://www.theregister.co.uk/2007/11/08/hushmail_court_orders/
- http://politicalticker.blogs.cnn.com/2013/06/11/king-journalists-in-classified-leak-cases-should-face-punishment/?hpt=hp_t1
- http://www.guardian.co.uk/world/interactive/2013/jun/07/obama-cyber-directive-full-text
- http://blogs.technet.com/b/microsoft_on_the_issues/archive/2013/06/14/microsoft-s-u-s-law-enforcement-and-national-security-requests-for-last-half-of-2012.aspx
- http://online.wsj.com/article/SB10001424127887324235304578438571356460546.html
- http://www.nybooks.com/blogs/nyrblog/2012/apr/19/39-ways-limit-free-speech/
- weev: http://www.wired.com/threatlevel/2012/11/att-hacker-found-guilty/
- http://blog.thephoenix.com/BLOGS/phlog/archive/2012/04/06/when-police-subpoena-your-facebook-information-heres-what-facebook-sends-cops.aspx
- Internet Freedome report: http://us.cnn.com/2012/09/27/world/world-internet-freedom-report/index.html?hpt=hp_t3
- UK blocks extradition to US: http://us.cnn.com/2012/10/16/world/europe/uk-us-mckinnon-extradition/index.html?hpt=hp_t3
CyberOperations and tactics (Casper)
- "New Snowden docs: NSA spies on pretty much everyone abroad" http://arstechnica.com/tech-policy/2014/07/new-snowden-docs-nsa-spies-on-pretty-much-everyone-abroad/
- "Exclusive: Spy agency seeks cyber-ops curriculum" http://www.reuters.com/article/2012/05/22/us-usa-intelligence-education-idUSBRE84L12T20120522
- "Homeland Security was built to fend off terrorists. Why's it so busy arming cops to fight average Americans?" http://www.theguardian.com/commentisfree/2014/sep/02/homeland-security-department-prevent-terrorism-busy-arming-cops
- http://www.forbes.com/sites/ciocentral/2012/08/02/its-time-for-the-security-industry-to-step-up-and-play-offense/
- The Jester Dynamic: A Lesson in Asymmetric Unmanaged Cyber Warfare http://www.sans.org/reading_room/whitepapers/attacking/jester-dynamic-lesson-asymmetric-unmanaged-cyber-warfare_33889
- Van Riper's Asymmetric Strategy http://en.wikipedia.org/wiki/Millennium_Challenge_2002
- Canadian security agencies reports on Anonymous http://www.scribd.com/doc/117399813/Canadian-security-agencies-reports-on-Anonymous -- CANNOT DOWNLOAD PDF
- The Hackers of Damascus http://www.businessweek.com/articles/2012-11-15/the-hackers-of-damascus
- http://doi.acm.org/10.1145/1363686.1364193
- McGraw on proactive defense: http://searchsecurity.techtarget.com/news/2240169976/Gary-McGraw-Proactive-defense-prudent-alternative-to-cyberwarfare
- An article/paper on network warfare with a military perspective http://www.au.af.mil/au/awc/awcgate/cst/bugs_ch01.pdf
- http://fabiusmaximus.com/2012/08/20/41929/
- Harvard B Center wiki: http://bit.ly/PMLGYz - NOT IN BIBTEX
- http://us.cnn.com/2012/10/10/tech/web/syria-internet/index.html?hpt=hp_c3
- on disclosure of intrusion events in cyberwar: http://blog.hacktalk.net/on-disclosure-of-intrusion-events-in-a-cyberwar/
- http://www.businessweek.com/news/2012-10-10/spyware-leaves-trail-to-beaten-activist-through-microsoft-flaw#p3 multiple pages. Should we save all?
- http://arstechnica.com/information-technology/2012/09/big-brother-meets-big-data-the-next-wave-in-net-surveillance-tech/ multiple pages. Should we save all?
- http://online.wsj.com/news/articles/SB10000872396390444375104577593543203853710?mg=reno64-wsj&url=http%3A%2F%2Fonline.wsj.com%2Farticle%2FSB10000872396390444375104577593543203853710.html
- http://www.wired.com/2012/11/president-hunt-you/#slideid-192147
- http://www.taipeitimes.com/News/front/archives/2013/04/28/2003560895
- http://www.reuters.com/article/2013/05/10/us-usa-cyberweapons-specialreport-idUSBRE9490EL20130510
- http://www.thedailybeast.com/articles/2013/06/25/greenwald-snowden-s-files-are-out-there-if-anything-happens-to-him.html
- http://kieranhealy.org/blog/archives/2013/06/09/using-metadata-to-find-paul-revere/
- http://www.washingtonpost.com/blogs/the-switch/wp/2013/08/31/the-nsa-hacks-other-countries-by-buying-millions-of-dollars-worth-of-computer-vulnerabilities/?Post+generic=%3Ftid%3Dsm_twitter_washingtonpost
- http://mobile.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?ref=us
- http://www.groklaw.net/article.php?story=20130818120421175
- http://www.theatlantic.com/technology/archive/2013/08/the-nsa-is-commandeering-the-internet/278572/
- http://www.theatlantic.com/international/archive/2013/09/the-us-should-use-cyber-weapons-against-assad/279266/
- joint operation planning manual; http://t.co/1FCBm8qaNl
- http://www.links.org/?p=1283
- http://www.washingtonpost.com/business/technology/google-encrypts-data-amid-backlash-against-nsa-spying/2013/09/06/9acc3c20-1722-11e3-a2ec-b47e45e6f8ef_story.html
- http://www.propublica.org/article/the-nsas-secret-campaign-to-crack-undermine-internet-encryption
- http://www.washingtonpost.com/world/national-security/us-documents-detail-al-qaedas-efforts-to-fight-back-against-drones/2013/09/03/b83e7654-11c0-11e3-b630-36617ca6640f_story.html?Post+generic=%3Ftid%3Dsm_twitter_washingtonpost
- https://www.eff.org/free-speech-weak-link#isp
- https://ssd.eff.org/
- blog.sfgate.com/techchron/2013/10/10/stanford-researchers-discover-alarming-method-for-phone-tracking-fingerprinting-through-sensor-flaws/
- http://edition.cnn.com/2013/12/30/us/nsa-spying-hacking-program/
- crowdsourcing threat intelligence: http://www.invincea.com/2014/05/crowdsourcing-threat-intelligence-with-automated-tool-support-2/
- Aitel on NSA's zero day practice: http://www.businessinsider.com/why-a-time-limit-on-zero-days-is-a-bad-idea-2014-7
- white house details thinking on cybersecurity flaws: http://www.nytimes.com/2014/04/29/us/white-house-details-thinking-on-cybersecurity-gaps.html?emc=edit_th_20140429&nl=todaysheadlines&nlid=3428777&_r=0
- NSA harvesting images: http://www.foxnews.com/politics/2014/06/01/nsa-steps-up-digital-image-harvesting-to-feed-its-advancing-facial-recognition/
- http://www.2501research.com/new-blog/
- http://www.foxnews.com/tech/2014/10/03/3-ways-crooks-attack-on-public-wi-fi/
- http://cacm.acm.org/magazines/2012/3/146243-a-comparative-study-of-cyberattacks/fulltext
- surveillance http://www.foxnews.com/tech/2014/09/06/spying-cell-towers-may-be-spread-across-us/?intcmp=obnetwork
- security advice: http://www.tomsguide.com/us/computer-security-mistakes,news-19391.html
- backdoors, supply chain: http://www.tomsguide.com/us/chinese-router-backdoor,news-19398.html
- Project Zero: http://venturebeat.com/2014/07/15/google-forms-project-zero-a-group-aiming-to-stop-zero-day-attacks/
- Malware: https://github.com/MAECProject/schemas/wiki/Malware-Capabilities?utm_content=bufferb2a2f&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer
Maybe?
- Raytheon's 'Google for Spies' http://www.guardian.co.uk/world/2013/feb/10/software-tracks-social-media-defence
- http://us.cnn.com/2012/11/16/tech/social-media/social-media-war-gaza-israel/index.html?hpt=hp_bn5
- us.cnn.com/2012/11/19/tech/web/cyber-attack-israel-anonymous/index.html?hpt=hp_t1
- http://www.foxnews.com/world/2012/11/19/hackers-target-israel-with-millions-attacks-as-hamas-rockets-continue-to-fall/
- http://us.cnn.com/2013/04/07/world/meast/israel-cyberattacks/index.html?hpt=hp_t2
- http://www.buzzfeed.com/hunterschwarz/americans-are-more-concerned-about-the-government-spying-on#88ffgg
- http://us.cnn.com/2013/08/09/politics/nsa-documents-scope/index.html?hpt=hp_t2
- http://mobile.bloomberg.com/news/2013-06-14/u-s-agencies-said-to-swap-data-with-thousands-of-firms.html
- http://www.securityweek.com/isis-cyber-ops-empty-threat-or-reality
- https://firstlook.org/theintercept/2014/08/05/watch-commander/
Cybercrime (Danny)
- "The Ex-Google Hacker Taking on the World’s Spy Agencies" http://www.wired.com/2014/07/morgan-marquis-boire-first-look-media/?mbid=social_twitter
- "Curbing the Market for Cyber Weapons" http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2364658
- "3 ways crooks attack on public Wi-Fi" http://www.foxnews.com/tech/2014/10/03/3-ways-crooks-attack-on-public-wi-fi/
- "New Mac Malware Used in Cyberespionage Campaign" http://www.tomsguide.com/us/mac-malware-advanced-threat,news-19461.html
- "Transparently bad: U.S. whistleblowers feel blowback" http://watchdog.org/169622/federal-whistleblowers-threatened/
- "Possible Backdoor Found in Chinese-Made Routers" http://www.tomsguide.com/us/chinese-router-backdoor,news-19398.html
- "Hackers used police tool to steal celebrity nude photos" http://www.foxnews.com/tech/2014/09/05/hackers-used-police-tool-to-steal-celebrity-nude-photos/?intcmp=obnetwork
- "Sex, Drugs, and the Biggest Cybercrime of All Time" http://www.rollingstone.com/culture/news/sex-drugs-and-the-biggest-cybercrime-of-all-time-20101111
- "DoD Communications Systems Breach in 9/11 Trials" http://cryptome.org/2013/04/dod-911-trial-breach.htm
- dual use, police forensic tools, celeb photos: http://www.foxnews.com/tech/2014/09/05/hackers-used-police-tool-to-steal-celebrity-nude-photos/?intcmp=obnetwork
- http://money.cnn.com/2012/09/27/technology/bank-cyberattacks/index.html?hpt=hp_t3
- zero day price list: http://www.forbes.com/sites/andygreenberg/2012/03/23/shopping-for-zero-days-an-price-list-for-hackers-secret-software-exploits/?
- weev: http://www.wired.com/threatlevel/2012/11/att-hacker-found-guilty/
- http://news.cnet.com/8301-13578_3-57533001-38/verizon-draws-fire-for-monitoring-app-usage-browsing-habits/
- https://krebsonsecurity.com/2013/04/fool-me-once/
- http://www.guardian.co.uk/world/2013/jul/12/edward-snowden-full-statement-moscow?CMP=twt_fd
- http://www.redorbit.com/news/technology/1112735903/hacker-greek-personal-data-programmer-112312/
- http://us.cnn.com/2012/10/29/opinion/jaffer-abdo-wiretapping/index.html?hpt=hp_t3
The Big Picture: Timeline and Background (Sarah)
- An illustration of the cyberwar timeline: http://online.lewisu.edu/the-history-of-cyber-warfare.asp
- http://security.blogs.cnn.com/2012/07/09/cyber-chief-warns-of-rising-danger-from-cyber-attacks/?hpt=hp_t2
- "Four Ways the Internet Could Go Down" http://www.cnn.com/2012/07/10/tech/web/internet-down-eagleman/index.html?iref=obnetwork
- (Broken Link) http://www.ndu.edu/press/cyberdeterrence-and-cyberwar.html
- http://www.wired.com/threatlevel/2012/02/yellowcake-and-cyberwar/
- http://cacm.acm.org/magazines/2012/3/146243-a-comparative-study-of-cyberattacks
- (Broken Link) http://mlocasto.blogspot.ca/2010/03/cyberwar-and-non-military-cyber.html
- Cyberwar is expensive: https://www.usenix.org/conference/usenix-security-11/three-cyber-war-fallacies
- "Cyber war realities—What lies ahead Pages 84-85 by Robert A. Miller" http://pdn.sciencedirect.com/science?_ob=MiamiImageURL&_cid=277415&_user=1067480&_pii=S1874548211000436&_check=y&_origin=browse&_zone=rslt_list_item&_coverDate=2012-07-31&wchp=dGLbVlk-zSkzk&md5=454f605b5d12e1594cdb6fe5f61f610a&pid=1-s2.0-S1874548211000436-main.pdf&sqtrkid=0.7252857018475265
- McGraw on proactive defense: http://searchsecurity.techtarget.com/news/2240169976/Gary-McGraw-Proactive-defense-prudent-alternative-to-cyberwarfare
- An article/paper on network warfare with a military perspective http://www.au.af.mil/au/awc/awcgate/cst/bugs_ch01.pdf
- http://fabiusmaximus.com/2012/08/20/41929/
- Harvard B Center wiki: http://bit.ly/PMLGYz
- the fog of cyberwar: http://www.foreignaffairs.com/articles/138443/brandon-valeriano-and-ryan-maness/the-fog-of-cyberwar?cid=soc-twitter-in-snapshots-fog_of_cyberwar-120612
Techniques: Affecting the Real World / Cyberphysical Systems (Sarah)
- "This thumbdrive hacks computers. “BadUSB” exploit makes devices turn “evil”" http://arstechnica.com/security/2014/07/this-thumbdrive-hacks-computers-badusb-exploit-makes-devices-turn-evil/
- power grid threats: http://news.cnet.com/8301-1009_3-57501660-83/feds-power-grid-vulnerable-to-fast-moving-cybersecurity-threats/
- http://security.blogs.cnn.com/2012/05/08/cyber-attack-targets-gas-pipeline-companies/?hpt=hp_t3
- homemade GPS jammers
- Hijacking Airplanes with an Android phone http://net-security.org/secworld.php?id=14733
- Trolling
- see, e.g., ACSAC 2013 and 2014 special focus
Major Incidents: Stuxnet, Flame, and other "Cyberweapons" Incidents (Casper)
- Stuxnet: leaks or lies? http://spectrum.ieee.org/podcast/computing/embedded-systems/stuxnet-leaks-or-lies
- http://cacm.acm.org/magazines/2012/3/146257-war-20-cyberweapons-and-ethics
- A Weapon We Can't Control http://www.nytimes.com/2012/06/25/opinion/stuxnet-will-come-back-to-haunt-us.html?emc=eta1
- http://www.symantec.com/connect/blogs/w32stuxnet-dossier - would have to walk through it for non-CS types
- http://arstechnica.com/security/2012/08/mystery-malware-amateur-coding-error/
- http://www.kaspersky.com/about/news/virus/2012/Kaspersky_Lab_and_ITU_Research_Reveals_New_Advanced_Cyber_Threat
- http://www.cnn.com/2012/06/04/opinion/rushkoff-flame-virus/index.html
- J. Aycock. Stux in a Rut: Why Stuxnet is Boring. Virus Bulletin, September 2011, pp. 14-17. Copyright is held by Virus Bulletin Ltd., but is made available on this site for personal use free of charge by permission of Virus Bulletin. http://pages.cpsc.ucalgary.ca/~aycock/papers/vb-stuxnet.pdf
- "Red October" Diplomatic Cyber Attacks Investigation
- Adventures in Analyzing Stuxnet: http://www.youtube.com/watch?v=fVNHX1Hrr6w
- http://online.lewisu.edu/the-history-of-cyber-warfare.asp
- "Hacker" charged in CRA heartbleed breach: http://globalnews.ca/news/1274997/hacker-charged-in-cra-heartbleed-breach/
- Mentions heartbleed white house details thinking on cybersecurity flaws: http://www.nytimes.com/2014/04/29/us/white-house-details-thinking-on-cybersecurity-gaps.html?emc=edit_th_20140429&nl=todaysheadlines&nlid=3428777&_r=0
- http://www.smithsonianmag.com/history-archaeology/Richard-Clarke-on-Who-Was-Behind-the-Stuxnet-Attack.html?c=y&story=fullstory
- Canadian security agencies reports on Anonymous http://www.scribd.com/doc/117399813/Canadian-security-agencies-reports-on-Anonymous -- CANNOT DOWNLOAD PDF
Minor Incidents: Malware and other Malicious Activities
- Malware spying on govt computers for decades: http://arstechnica.com/security/2013/03/decade-old-espionage-malware-found-targeting-government-computers/
- Malware: https://github.com/MAECProject/schemas/wiki/Malware-Capabilities?utm_content=bufferb2a2f&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer
- badusb: http://arstechnica.com/security/2014/07/this-thumbdrive-hacks-computers-badusb-exploit-makes-devices-turn-evil/
- badbios: http://arstechnica.com/security/2013/10/meet-badbios-the-mysterious-mac-and-pc-malware-that-jumps-airgaps/
- malware, badbios: http://www.securityartwork.es/2013/10/30/badbios-2/?lang=en
- cyberespionage: http://www.tomsguide.com/us/mac-malware-advanced-threat,news-19461.html
- surveillance http://www.foxnews.com/tech/2014/09/06/spying-cell-towers-may-be-spread-across-us/?intcmp=obnetwork
- "BadBios" http://www.securityartwork.es/2013/10/30/badbios-2/?lang=en
Robots, Drones, and Automation (Danny)
- "Obama's drone warfare: A legal way to kill?" http://www.foxnews.com/opinion/2014/04/24/obama-drone-warfare-legal-way-to-kill/?intcmp=obnetwork
- "Keep Killer Robots Fictional" http://www.ottawacitizen.com/opinion/op-ed/Keep+killer+robots+fictional/9780860/story.html
- http://m.theatlantic.com/politics/archive/2012/04/this-industrys-voice-on-capitol-hill-the-drone-industrial-complex/256177/
- is the drone program secret? or not? http://security.blogs.cnn.com/2012/05/23/deadly-drones-and-the-classified-conundrum/?hpt=hp_bn2
- Essay on targeted drone killings: http://us.cnn.com/2012/08/15/opinion/oconnell-targeted-killing/index.html?hpt=hp_t2
- http://www.guardian.co.uk/commentisfree/cifamerica/2012/jan/20/why-obama-targeted-killing-is-like-bush-torture
- Russia Stockpiling Drones to Spy on Protesters: http://www.cnn.com/2012/07/25/tech/innovation/russia-stockpiling-drones-wired/index.html
- Drones are Obama's weapon of choice: http://www.cnn.com/2012/09/05/opinion/bergen-obama-drone/index.html?hpt=hp_t3
- recommendations on drones: http://www.aclu.org/blog/technology-and-liberty/police-chiefs-issue-recommendations-drones-look-how-they-measure
- asymmetry: 1LPR != 1LEO: http://arstechnica.com/tech-policy/2012/09/your-car-tracked-the-rapid-rise-of-license-plate-readers/
- CNN Video: Robots training for war: http://us.cnn.com/video/?hpt=hp_t2#/video/bestoftv/2012/08/01/exp-lawrence-robot-boot-camp.cnn
- https://twitter.com/drunkenpredator
- The Al-Qaida Papers - Drones http://cryptome.org/2013/02/al-qaida-drones.pdf
- http://www.guardian.co.uk/commentisfree/2013/mar/10/paul-filibuster-drones-progressives
- http://www.policymic.com/articles/29569/i-filibustered-to-defend-millennials
- http://www.mcclatchydc.com/2013/04/09/188062/obamas-drone-war-kills-others.html
- http://www.washingtonpost.com/world/national-security/us-documents-detail-al-qaedas-efforts-to-fight-back-against-drones/2013/09/03/b83e7654-11c0-11e3-b630-36617ca6640f_story.html?
- drones and judges: http://www.usnews.com/news/politics/articles/2013/07/19/judge-govt-position-in-drone-suit-disconcerting
- http://doi.acm.org/10.1145/1363686.13641
- http://www.lawfareblog.com/2013/03/the-faa-wants-to-hear-from-you-about-privacy-and-domestic-drones/
- drones http://us.cnn.com/2012/10/25/us/drones-privacy/index.html?hpt=hp_bn1
- drones http://news.cnet.com/8301-13578_3-57572207-38/dhs-built-domestic-surveillance-tech-into-predator-drones/
- 7 technologies that will make it easier for the president to hunt and kill you: http://www.wired.com/dangerroom/2012/11/president-hunt-you/
- http://www.motherjones.com/politics/2012/06/obamas-whistleblowers-stuxnet-leaks-drones
Government Responsibility and Power (Michael)
- algorithmic regulation: http://www.theguardian.com/technology/2014/jul/20/rise-of-data-death-of-politics-evgeny-morozov-algorithmic-regulation
- new technology should be presumed illegal https://www.techdirt.com/blog/innovation/articles/20120927/00320920527/former-copyright-boss-new-technology-should-be-presumed-illegal-until-congress-says-otherwise.shtml
- http://www.mcclatchydc.com/2014/04/21/225055/us-intelligence-chief-bars-unauthorized.html
- http://m.theatlantic.com/magazine/archive/2014/05/we-need-more-secrecy/359820/
- Aitel on Obama and information security policy: http://cybersecpolitics.blogspot.ca/2012/07/obama-and-cyber-security.html
- http://arstechnica.com/information-technology/2012/09/big-brother-meets-big-data-the-next-wave-in-net-surveillance-tech/
- Govt. reading your tweets? http://www.cnn.com/2012/03/09/opinion/obeidallah-social-media/index.html
- FISA: http://www.wired.com/threatlevel/2012/09/house-approves-spy-bill/?utm_source=twitter&utm_medium=socialmedia&utm_campaign=twitterclickthru
- FISA: http://www.wired.com/threatlevel/2012/06/fisa-amendments-act-fate/
- "Is the Govt Doing Enough to Protect Us?" http://us.cnn.com/2012/07/25/tech/regulating-cybersecurity/index.html?hpt=hp_bn5
- http://www.google.com/transparencyreport/removals/government/data/
- Google Transparency Report: http://us.cnn.com/2012/06/18/tech/web/google-transparency-report/index.html?hpt=hp_t1
- http://www.wired.com/threatlevel/2012/08/administrative-subpoenas/all/
- http://us.cnn.com/2012/05/29/tech/web/internet-defense-league/index.html?hpt=hp_t3
- "Project Farewell" https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/96unclass/farewell.htm
- "Darpa Looks to Make Cyberwar Routine With Secret ‘Plan X’" http://www.wired.com/dangerroom/2012/08/plan-x/
- "Obama signs secret directive to help thwart cyberattacks" http://www.washingtonpost.com/world/national-security/obama-signs-secret-cybersecurity-directive-allowing-more-aggressive-military-role/2012/11/14/7bf51512-2cde-11e2-9ac2-1c61452669c3_print.html
- "Jeremy Hammond on Aaron Swartz and the Criminalization of Digital Dissent" http://freehammond.com/node/jeremy-article-aaron-swartz-and-the-criminalization-of-digital-dissent
- "Obama officials refuse to say if assassination power extends to US soil" http://www.guardian.co.uk/commentisfree/2013/feb/22/obama-brennan-paul-assassinations-filibuster
- Wikimedia Foundation elaborates on recent demand by French governmental agency to remove Wikipedia content. https://fr.wikipedia.org/w/index.php?title=Wikip%C3%A9dia:Bulletin_des_administrateurs/2013/Semaine_14&diff=91740048&oldid=91739287#Wikimedia_Foundation_elaborates_on_recent_demand_by_French_governmental_agency_to_remove_Wikipedia_content.
Training Cyber-warriors (Benedict)
- "Some People Want A Time Limit On The NSA's 'Zero-Day' Exploits — Here's Why That's A Terrible Idea" http://www.businessinsider.com/why-a-time-limit-on-zero-days-is-a-bad-idea-2014-7#ixzz3Fmda9q7Z
- "Privacy Pragmatism" http://www.foreignaffairs.com/articles/140741/craig-mundie/privacy-pragmatism
- "NSA steps up digital image harvesting to feed its facial recognition program" http://www.foxnews.com/politics/2014/06/01/nsa-steps-up-digital-image-harvesting-to-feed-its-advancing-facial-recognition/
- "Coders’ Rights Project Reverse Engineering FAQ" https://www.eff.org/issues/coders/reverse-engineering-faq
- "12 Computer Security Mistakes You’re Probably Making" http://www.tomsguide.com/us/computer-security-mistakes,news-19391.html
- "Why you should be wary of the cloud" http://www.foxnews.com/tech/2014/09/05/why-should-be-wary-cloud/?intcmp=obnetwork
- "Google forms Project Zero, a group aiming to stop zero-day attacks" http://venturebeat.com/2014/07/15/google-forms-project-zero-a-group-aiming-to-stop-zero-day-attacks/
- http://www.theinquirer.net/inquirer/news/2199376/uks-first-cyber-security-camp-aims-to-train-an-army-of-cyber-warriors
- http://www.lawfareblog.com/2012/05/state-department-hackers/
- http://cryptome.org/2013/03/call-to-cyber-arms.pdf
- A little project involving unethical experiments: http://www.ceas.uc.edu/current_students/Student_Stories/cyber_war_.html
- http://www.ists.dartmouth.edu/events/abstract-mcgraw.html
- http://www.cnn.com/2012/11/05/world/meast/israel-iran-war-games/index.html?iref=obinsite
- Mudge Zatko, Defense Advanced Research Projects Agency (DARPA) program manager [Reddit AMA] http://www.reddit.com/r/netsec/comments/18dz1q/im_mudge_zatko_darpa_program_manager_amaa/
- Van Riper's Asymmetric Strategy http://en.wikipedia.org/wiki/Millennium_Challenge_2002
Selling Exploits and Regulating or Controlling Sale thereof (Michael)
- secrecy around zero-day exploits spurs calls for govt regulation http://www.washingtonpost.com/world/national-security/secrecy-surrounding-zero-day-exploits-industry-spurs-calls-for-government-oversight/2012/09/01/46d664a6-edf7-11e1-afd6-f55f84bc0c41_story.html
- EFF position
- DD mail thread
- http://torontogoat.wordpress.com/2012/09/05/my-thoughts-on-exploit-sales/
- Forget Disclosure — Hackers Should Keep Security Holes to Themselves http://www.wired.com/opinion/2012/11/hacking-choice-and-disclosure/
The West vs. China, Iran, and ? (Chad)
Who are the combatants?
- RIM and China: http://www.huffingtonpost.ca/dave-aitel/rim-china_b_1672276.html?utm_hp_ref=canada-business
- http://www.schneier.com/blog/archives/2012/08/us_and_china_ta.html
- http://us.cnn.com/2012/06/06/tech/google-hacking-alerts/index.html?hpt=hp_t3
http://money.cnn.com/2013/02/19/technology/china-military-cybercrime/index.html?hpt=hp_t2
Cyberterrorism (Chad)
- "Department of Defense to study bitcoin as possible terrorist threat" http://www.foxnews.com/tech/2014/05/05/department-defense-to-study-bitcoin-as-terrorist-threat/?intcmp=obnetwork
- http://www.nextgov.com/cybersecurity/2012/05/al-qaeda-video-calls-electronic-jihad-government-computers/55886/?oref=ng-dropdown
- Ford & Gordon’s cyberterrorism paper (http://www.symantec.com/avcenter/reference/cyberterrorism.pdf, also in Computers & Security IIRC)
- Why Pols and Academics Don't Just Say What They Mean: http://www.cbc.ca/news/world/why-politicians-and-academics-don-t-just-say-what-they-mean-1.2618268
Miscellaneous
- "14th European Conference on Cyber Warfare and Security ECCWS-2015 (formally the European Conference on Information Warfare and Security)" http://academic-conferences.org/eccws/eccws2015/eccws15-home.htm
- "Panel Discussion about Information Security War Held in USENIX 2014" https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/information-security-war-room
- "Cyber Security and Foreign Affairs - Managing Tensions, Maintaining Stability" http://www.youtube.com/watch?v=6Vcv5djKJLs
Uncategorized Links
When adding an uncategorized link, try to prefix it with a keyword or tag that might help future classification
- russia hacks whitehouse? http://www.foxnews.com/politics/2014/10/29/russia-reportedly-suspected-being-behind-breach-white-house-computers/
- US Loyalty Day: www.whitehouse.gov/the-press-office/2014/05/01/presidential-proclamation-loyalty-day-2014
- crowdsourcing threat intelligence: http://www.invincea.com/2014/05/crowdsourcing-threat-intelligence-with-automated-tool-support-2/
- war gear flows to PDs: http://www.nytimes.com/2014/06/09/us/war-gear-flows-to-police-departments.html?_r=1
- exploit control: http://dymaxion.org/essays/wa-items.html
- http://billmoyers.com/2014/02/21/anatomy-of-the-deep-state/
- https://www.eff.org/deeplinks/2013/12/meet-co-traveler-nsas-cell-phone-location-tracking-program
- a review... http://www.newyorker.com/online/blogs/johncassidy/2013/12/nsa-report-white-house-the-good-and-the-bad.html?mobify=0
- ...of this report: http://www.whitehouse.gov/blog/2013/12/18/liberty-and-security-changing-world
- http://edition.cnn.com/2013/12/30/us/nsa-spying-hacking-program/
- http://www.dni.gov/index.php/newsroom/press-releases/198-press-releases-2014/994-foreign-intelligence-surveillance-court-approves-government%E2%80%99s-application-to-renew-telephony-metadata-program
- https://freedom-to-tinker.com/blog/felten/a-court-order-is-an-insider-attack/
- http://blog.sfgate.com/techchron/2013/10/10/stanford-researchers-discover-alarming-method-for-phone-tracking-fingerprinting-through-sensor-flaws/
- http://www.washingtonpost.com/world/national-security/nsa-collects-millions-of-e-mail-address-books-globally/2013/10/14/8e58b5be-34f9-11e3-80c6-7e6dd8d22d8f_story_2.html
- http://www.nytimes.com/2012/06/17/technology/acxiom-the-quiet-giant-of-consumer-database-marketing.html?_r=1&pagewanted=all
- https://ssd.eff.org/
- https://globalchokepoints.org/
- https://www.eff.org/free-speech-weak-link#isp
- http://us.cnn.com/2012/06/21/tech/web/internet-data-evernote/index.html?hpt=hp_t3
- http://www.robertgraham.com/journal/030815-blaster.c
- http://www.washingtonpost.com/world/national-security/us-documents-detail-al-qaedas-efforts-to-fight-back-against-drones/2013/09/03/b83e7654-11c0-11e3-b630-36617ca6640f_story.html?Post+generic=%3Ftid%3Dsm_twitter_washingtonpost
- http://www.propublica.org/article/the-nsas-secret-campaign-to-crack-undermine-internet-encryption
- http://www.washingtonpost.com/business/technology/google-encrypts-data-amid-backlash-against-nsa-spying/2013/09/06/9acc3c20-1722-11e3-a2ec-b47e45e6f8ef_story.html
- http://www.links.org/?p=1283
- http://www.smithsonianmag.com/history-archaeology/Richard-Clarke-on-Who-Was-Behind-the-Stuxnet-Attack.html?c=y&story=fullstory
- http://arstechnica.com/tech-policy/2012/03/sealand-and-havenco/4/
- joint operation planning manual; http://t.co/1FCBm8qaNl
- http://www.theatlantic.com/international/archive/2013/09/the-us-should-use-cyber-weapons-against-assad/279266/
- Cyberswitzerland: http://spiresecurity.com/?p=1345
- http://mobile.bloomberg.com/news/2013-06-14/u-s-agencies-said-to-swap-data-with-thousands-of-firms.html
- http://www.theatlantic.com/technology/archive/2013/08/the-nsa-is-commandeering-the-internet/278572/
- http://www.theguardian.com/world/2013/aug/18/glenn-greenwald-guardian-partner-detained-heathrow
- http://www.theguardian.com/commentisfree/2013/aug/18/david-miranda-detained-uk-nsa
- Groklaw shutdown: http://www.groklaw.net/article.php?story=20130818120421175
- http://patrickcollison.com/post/government-internet
- https://www.eff.org/deeplinks/2013/08/eff-victory-results-expected-release-secret-court-opinion-finding-nsa-surveillance
- http://fdlaction.firedoglake.com/2013/08/23/obama-is-just-going-to-pretend-the-nsa-phone-sex-abuses-never-happened/?utm_source=twitterfeed&utm_medium=twitter
- http://www.washingtonpost.com/blogs/the-switch/wp/2013/08/29/the-nsa-has-its-own-team-of-elite-hackers/?wprss=rss_social-postbusinessonly&Post+generic=%3Ftid%3Dsm_twitter_washingtonpost&clsrd
- http://mobile.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?ref=us&
- http://www.washingtonpost.com/blogs/the-switch/wp/2013/08/31/the-nsa-hacks-other-countries-by-buying-millions-of-dollars-worth-of-computer-vulnerabilities/?Post+generic=%3Ftid%3Dsm_twitter_washingtonpost
- http://us.cnn.com/2013/08/09/politics/nsa-documents-scope/index.html?hpt=hp_t2
- http://us.cnn.com/2013/08/09/politics/obama-news-conference/index.html?hpt=hp_t2
- drones and judges: http://www.usnews.com/news/politics/articles/2013/07/19/judge-govt-position-in-drone-suit-disconcerting
- cybercrime and entrapment: http://www.wired.com/threatlevel/2013/07/open-market/
- http://kieranhealy.org/blog/archives/2013/06/09/using-metadata-to-find-paul-revere/
- rise of the warrior cop: http://online.wsj.com/article/SB10001424127887323848804578608040780519904.html
- http://www.theguardian.com/world/2013/jul/24/nsa-surveillance-amash-amendment?CMP=twt_fd
- http://maradydd.livejournal.com/528620.html
- http://articles.washingtonpost.com/2013-07-07/opinions/40427629_1_daniel-ellsberg-pentagon-papers-snowden-s/2
- http://www.techdirt.com/articles/20130726/01200123954/obama-promise-to-protect-whistleblowers-just-disappeared-changegov.shtml
- http://www.washingtonpost.com/opinions/the-white-house-should-end-the-bulk-collection-of-americans-phone-records/2013/07/26/c3c0103e-f553-11e2-9434-60440856fadf_story.html
- http://www.newyorker.com/online/blogs/closeread/2013/07/holder-we-wont-torture-or-kill-snowden.html?mobify=0
- http://www.theguardian.com/world/2013/jul/27/nsa-snowden-father-justice-russia?CMP=twt_fd
- http://www.out.com/news-commentary/2011/04/18/glenn-greenwald-life-beyond-borders
- http://www.buzzfeed.com/hunterschwarz/americans-are-more-concerned-about-the-government-spying-on
- http://slog.thestranger.com/slog/archives/2013/07/31/police-threatened-to-arrest-me-for-taking-their-photo-last-night
- http://www.nytimes.com/2013/08/06/us/tsa-expands-duties-beyond-airport-security.html?partner=rss&emc=rss&smid=tw-nytimes&_r=3&
- https://lavabit.com/
- http://www.ottawacitizen.com/news/national/Canada%20cyberspace%20talks%20military%20strategy/8754132/story.html
- https://www.eff.org/deeplinks/2013/08/lavabit-encrypted-email-service-shuts-down-cant-say-why
- http://techcrunch.com/2013/08/08/silent-circle-preemptively-shuts-down-encrypted-email-service-to-prevent-nsa-spying/
- http://www.theregister.co.uk/2007/11/08/hushmail_court_orders/
- https://ilt.eff.org/index.php/Speech:_Anonymity
- http://preview.reuters.com/2013/8/9/nsa-to-cut-system-administrators-by-90-percent-to
- http://www.techdirt.com/articles/20130809/16320324131/doj-theres-no-expectation-privacy-your-phone-records-because-people-dont-like-terrorists.shtml
- http://us.cnn.com/2012/10/29/opinion/jaffer-abdo-wiretapping/index.html?hpt=hp_t3
- http://us.cnn.com/2012/11/14/tech/petraeus-email-privacy/index.html?hpt=hp_c1
- http://www.redorbit.com/news/technology/1112735903/hacker-greek-personal-data-programmer-112312/
- http://us.cnn.com/2013/05/01/opinion/chertoff-wearable-devices/index.html?hpt=hp_t3
- http://www.cnn.com/2013/06/08/opinion/cheng-privacy-snooping/index.html?hpt=hp_t4
- http://www.cbc.ca/news/canada/story/2013/06/10/surveillance-canadians-target-data-collect.html
- http://us.cnn.com/2013/06/12/opinion/deibert-nsa-surveillance/index.html?hpt=hp_t4
- http://politicalticker.blogs.cnn.com/2013/06/11/king-journalists-in-classified-leak-cases-should-face-punishment/?hpt=hp_t1
- http://us.cnn.com/2013/06/12/politics/nsa-leak/index.html?hpt=hp_t1
- http://www.salon.com/2013/07/12/stop_ray_kelly_from_leading_homeland_security_department/
- http://www.thedailybeast.com/articles/2013/06/25/greenwald-snowden-s-files-are-out-there-if-anything-happens-to-him.html
- http://www.economist.com/blogs/democracyinamerica/2013/07/secret-government
- http://thehill.com/blogs/global-affairs/human-rights/310773-obama-administration-urges-human-rights-groups-to-abandon-snowden
- http://www.guardian.co.uk/world/interactive/2013/jun/07/obama-cyber-directive-full-text
- http://www.motherjones.com/politics/2012/06/obamas-whistleblowers-stuxnet-leaks-drones
- http://wemeantwell.com/blog/2011/08/25/us-military-spare-parts-went-to-qaddafi-in-2009/
- http://www.guardian.co.uk/world/2013/jul/12/edward-snowden-full-statement-moscow?CMP=twt_fd
- http://blogs.technet.com/b/microsoft_on_the_issues/archive/2013/06/14/microsoft-s-u-s-law-enforcement-and-national-security-requests-for-last-half-of-2012.aspx
- http://wikileaks.org/wiki/On_the_take_and_loving_it
- http://mg.co.za/article/2013-05-10-00-why-the-geeks-will-inherit-the-earth
- http://www.foxnews.com/politics/2013/07/20/state-department-agency-deemed-critical-to-information-security-is-mess-report/?utm_source=dlvr.it&utm_medium=twitter
- http://wiki.ucalgary.ca/page/Courses/Computer_Science/CPSC_601.65.Cyberwar.F2012
- http://online.wsj.com/article/SB10001424127887324235304578438571356460546.html
- http://news.yahoo.com/special-report-u-cyberwar-strategy-stokes-fear-blowback-110055163.html
- https://krebsonsecurity.com/2013/04/fool-me-once/
- http://www.taipeitimes.com/News/front/archives/2013/04/28/2003560895
- http://cacm.acm.org/news/163284-obama-budget-makes-cybersecurity-a-growing-us-priority/fulltext
- http://cacm.acm.org/news/164128-china-sees-cyberwar-as-reducing-us-advantage-in-future-conflict/fulltext
- http://us.cnn.com/2013/04/07/world/meast/israel-cyberattacks/index.html?hpt=hp_t2
- http://www.nytimes.com/2013/03/21/world/asia/south-korea-computer-network-crashes.html?ref=world&_r=1&
- the fog of cyberwar: http://www.foreignaffairs.com/articles/138443/brandon-valeriano-and-ryan-maness/the-fog-of-cyberwar?cid=soc-twitter-in-snapshots-fog_of_cyberwar-120612
- 7 technologies that will make it easier for the president to hunt and kill you: http://www.wired.com/dangerroom/2012/11/president-hunt-you/
- can't say anything about nuclear power plant security: http://nakedsecurity.sophos.com/2012/10/31/nuclear-security-silence/?utm_medium=linkedin&utm_source=twitterfeed
- http://news.cnet.com/8301-13578_3-57533001-38/verizon-draws-fire-for-monitoring-app-usage-browsing-habits/
- http://online.wsj.com/article/SB10000872396390444375104577593543203853710.html
- http://arstechnica.com/information-technology/2012/09/big-brother-meets-big-data-the-next-wave-in-net-surveillance-tech/
- air force seeking cyberweapons http://blog.spaf.us/post/30499344542/air-force-openly-seeking-cyber-weapons-threatpost?b0772f58?52d8de80?07e70040?9fa24270
- http://www.nybooks.com/blogs/nyrblog/2012/apr/19/39-ways-limit-free-speech/
- spyware leads to activist: http://www.businessweek.com/news/2012-10-10/spyware-leaves-trail-to-beaten-activist-through-microsoft-flaw#p3
- homeland security budget: http://www.schneier.com/blog/archives/2012/10/2013_us_homelan.html
- weev: http://www.wired.com/threatlevel/2012/11/att-hacker-found-guilty/
- zero day price list: http://www.forbes.com/sites/andygreenberg/2012/03/23/shopping-for-zero-days-an-price-list-for-hackers-secret-software-exploits/?utm_campaign=techtwittersf&utm_source=twitter&utm_medium=social
- on disclosure of intrusion events in cyberwar: http://blog.hacktalk.net/on-disclosure-of-intrusion-events-in-a-cyberwar/
- http://blog.thephoenix.com/BLOGS/phlog/archive/2012/04/06/when-police-subpoena-your-facebook-information-heres-what-facebook-sends-cops.aspx
- http://theweek.com/bullpen/column/239929/americas-embarrassingly-redundant-and-entangled-cybersecurity-complex
- malware spying on govt computers for decades: http://arstechnica.com/security/2013/03/decade-old-espionage-malware-found-targeting-government-computers/
- drones http://us.cnn.com/2012/10/25/us/drones-privacy/index.html?hpt=hp_bn1
- drones http://news.cnet.com/8301-13578_3-57572207-38/dhs-built-domestic-surveillance-tech-into-predator-drones/
- http://www.lawfareblog.com/2013/03/the-faa-wants-to-hear-from-you-about-privacy-and-domestic-drones/
- http://security.blogs.cnn.com/category/cybersecurity/
- http://money.cnn.com/2012/09/27/technology/bank-cyberattacks/index.html?hpt=hp_t3
- Internet Freedome report: http://us.cnn.com/2012/09/27/world/world-internet-freedom-report/index.html?hpt=hp_t3
- http://www.haaretz.com/opinion/how-many-rockets-has-iron-dome-really-intercepted.premium-1.508277
- syria might shut down internet http://us.cnn.com/2012/10/10/tech/web/syria-internet/index.html?hpt=hp_c3
- UK blocks extradition to US: http://us.cnn.com/2012/10/16/world/europe/uk-us-mckinnon-extradition/index.html?hpt=hp_t3
- Harvard B Center wiki: http://bit.ly/PMLGYz
- http://fabiusmaximus.com/2012/08/20/41929/
- A little project involving unethical experiments: http://www.ceas.uc.edu/current_students/Student_Stories/cyber_war_.html
- An article/paper on network warfare with a military perspective http://www.au.af.mil/au/awc/awcgate/cst/bugs_ch01.pdf
- http://www.ists.dartmouth.edu/events/abstract-mcgraw.html
- McGraw on proactive defense: http://searchsecurity.techtarget.com/news/2240169976/Gary-McGraw-Proactive-defense-prudent-alternative-to-cyberwarfare
- http://doi.acm.org/10.1145/1363686.1364193
- http://www.cnn.com/2012/11/05/world/meast/israel-iran-war-games/index.html?iref=obinsite
- The Hackers of Damascus http://www.businessweek.com/articles/2012-11-15/the-hackers-of-damascus
- Canadian security agencies reports on Anonymous http://www.scribd.com/doc/117399813/Canadian-security-agencies-reports-on-Anonymous
- http://www.foxnews.com/world/2012/11/19/hackers-target-israel-with-millions-attacks-as-hamas-rockets-continue-to-fall/
- us.cnn.com/2012/11/19/tech/web/cyber-attack-israel-anonymous/index.html?hpt=hp_t1
- http://us.cnn.com/2012/11/16/tech/social-media/social-media-war-gaza-israel/index.html?hpt=hp_bn5
- http://www.ccdcoe.org/249.html
- bug bounties: http://www.wired.com/threatlevel/2012/11/bug-bounties/all/
- Mudge Zatko, Defense Advanced Research Projects Agency (DARPA) program manager [Reddit AMA] http://www.reddit.com/r/netsec/comments/18dz1q/im_mudge_zatko_darpa_program_manager_amaa/
- Van Riper's Asymmetric Strategy http://en.wikipedia.org/wiki/Millennium_Challenge_2002
- Raytheon's 'Google for Spies' http://www.guardian.co.uk/world/2013/feb/10/software-tracks-social-media-defence
- http://us.cnn.com/2013/02/19/opinion/hayden-courage-security-decisions/index.html?hpt=hp_c3