Contents: Part I Counterterrorism in retrospect: then and now 1 September 11 attacks 2 U.S. intelligence community Part II Counterterrorism technologies: total information awareness 3 The rise fall of total information awareness 4 The afterlife of total information awareness 5 Artificial intelligence and data mining Part III Counterterrorism technologies: social media nad cyberse…
Contents: 1 Cybersecurity & its origins 2 About the case studies 3 Case-study target 2013 4 The disciplines within cybersecurity 5 Case-study Edward snowden 2013 6 Basic cybersecurity concepts 7 Human factors 8 Technical cybersecurity 9 Evolting attack and defence methods 10 Case-study sony (2014) 11 The cybersecurity cold war 12 Risk-based cybersecurity & stacked risk 1…
Contents: Chapter 1 Could something like this really happen Chapter 2 It’s all about the information Chapter 3 A cyber pearl harbor Chapter 4 Eligible receiver Chapter 5 Solar sunrise, moonlight maze Chapter 6 The coordinator meets mudge Chapter 7 Deny, exploit, corrupt, destroy Chapter 8 Tailored access Chapter 9 Cyber wars Chapter 10 Buckshot yankee Chapter 11 The who…
Part I FOUNDATIONAL QUESTIONS OF CYBERWAR 1.The Nature of War and the Idea of "Cyberwar" / Larry May 2.Is There Anything Morally Special about Cyberwar? / James L Cook 3.Cyber Causation / Jens David Ohlin Part II CONCEPTUALIZING CYBER ATTACKS: THE CIVIL-MILITARY DIVIDE 4.Cyberterrorism and Enemy Criminal Law / Stuart Macdonald 5.Cyberwar versus Cyber Attack: The Role of Rhet…
THE NEXT WAR ZONE CONFRONTING THE GLOBAL THREAT OF CYBERTERRORISM JAMES F. DUNNIGAN CHAPTER 1: Cyberwar and You 1 Technical Terms You Might Not Recognize in This Chapter 1 Good News, Bad News 2 Bringing the War Home 5 Let’s Just Do It 6 The Bad Guys and What They Do 7 Cyberwar 10 The Major Unknown 13 The Most Likely Cyberwars 14 The Usual Suspects 15 What Can Be Done? 17 CHAPTER…