Uneingeschränkter Zugang

Non-State Actors in Cyberspace Operations

   | 23. Nov. 2016

Zitieren

[1] Amorosi, D., “Chinese State of Denial,” Infosecurity, Vol 8 Issue 6, Elsevier, Nov.-Dec. 2011.10.1016/S1754-4548(11)70076-6Search in Google Scholar

[2] Andress, J. and Winterfeld, S., “Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners,” Elsevier, 2011, p. 199.10.1016/B978-1-59749-637-7.00001-0Search in Google Scholar

[3] Applegate, S. D., “Cybermilitias and Political Hackers: Use of Irregular Forces in cyberwarfare,” IEEE Security & Privacy, Volume 9, Issue 5, Sep.-Oct. 2011.10.1109/MSP.2011.46Search in Google Scholar

[4] Arquilla, J. and Ronfeldt D. F., “Networks and Netwars: The Future of Terror, Crime, and Militancy,” RAND Corporation, 2001.Search in Google Scholar

[5] Arquilla, J. and Ronfeldt, D., “In Athena’s Camp: Preparing for Conflict in the Information Age,” RAND Corporation, 1997.Search in Google Scholar

[6] BBC News, “US prepares first-strike cyber-forces,” BBC News Technology, Oct. 12, 2012. Available: http://www.bbc.co.uk/news/technology-19922421Search in Google Scholar

[7] Beidleman, S. W., “Defining and Deterring Cyber War”, Strategy Research Project, U.S. Army War College, Jan. 2009.10.21236/ADA500795Search in Google Scholar

[8] Bernstein, M. S., Monroy-Hernándex, Harry D., Andreé, P., Panovich, K. and Vargas, G., “4chan and /b/: An Analysis of Anonymity and Ephemerality in a Large Online Community,” In Proc. Fifth International AAAI Conference on Weblogs and Social Media (ICWSM-11), Jul. 2011.Search in Google Scholar

[9] Bhattacharjee, Y., “How a Remote Town in Romania Has Become Cybercrime Central,” Wired Magazine, Jan. 31 2011. Available: http://www.wired.com/magazine/2011/01/ff_hackerville_romania/Search in Google Scholar

[10] Bradbury, D., “The Spy Who Hacked Me,” Infosecurity, Vol 8 Issue 5, Elsevier, Sep./Oct. 2011.10.1016/S1754-4548(11)70063-8Search in Google Scholar

[11] Cabinet Office of the United Kingdom, “Cyber Security Strategy of the United Kingdom,” Nov. 25 2011.Search in Google Scholar

[12] Carr, J. “Inside Cyber Warfare,” O’Reilly, 2010. Search in Google Scholar

[13] Clausewitz, C. von, “On War”, originally Vom Kriege (3 vols., Berlin: 1832-34), translated by J. J. Graham,Wordsworth Editions Limited, Hertfordshire, U.K., 1997.Search in Google Scholar

[14] Deibert, R. and Rohozinski, R., “Tracking GhostNet: Investigating a Cyber Espionage Network,” Information Warfare Monitor, University of Toronto, Munk Centre for International Studies at Trinity College, Toronto, Mar. 2009.Search in Google Scholar

[15] Deibert, R. J., Palfrey, J. G., Rohozinski, R. and Zittrain, J. (Eds.), “Access Contested: Security, Identity and Resistance in Asian Cyberspace”, MIT Press, 2011.10.7551/mitpress/9780262016780.001.0001Search in Google Scholar

[16] Deibert, R. J., Palfrey, J. G., Rohozinski, R. and Zittrain, J. (Eds.), “Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace,” The MIT Press, Apr. 2010.10.7551/mitpress/8551.001.0001Search in Google Scholar

[17] Deibert, R. J., Palfrey, J. G., Rohozinski, R. and Zittrain, J. (Eds.), “Access Denied: The Practice and Policy of Global Internet Filtering,” The MIT Press, Apr. 2008.10.7551/mitpress/7617.001.0001Search in Google Scholar

[18] Denning, D. E., “Activism, Hacktivism, and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy”, The Internet and International Systems: Information Technology and American Foreign Policy Decisionmaking Workshop, Nautilus Institute, Dec. 1999.Search in Google Scholar

[19] Denning, D. E., “Cyber Conflict as an Emergent Social Phenomenon,” Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications (T. Hold and B. Schell eds.), IGI Global, 2011.10.4018/978-1-61692-805-6.ch009Search in Google Scholar

[20] Diplomatic Conference of Geneva of 1949, “Convention (III) relative to the Treatment of Prisoners of War”. Available: http://www.icrc.org/ihl.nsf/FULL/375Search in Google Scholar

[21] Drew, C. and Markoff, J., “Contractors Vie for Plum Work, Hacking for U.S.,” The New York Times, May 30, 2009. Available: www.nytimes.com/2009/05/31/us/31cyber.htmlSearch in Google Scholar

[22] Drummond, D., “A new approach to China: an update,” Google Official Blog, Mar. 22 2010. Available: http://googleblog.blogspot.se/2010/03/new-approach-to-china-update.html10.12968/htup.2010.13.9.78401Search in Google Scholar

[23] Dunn Cavelty, M., “The Militarisation of Cyberspace: Why Less May Be Better,” in Proc. 4th International Conference on Cyber Conflict (CYCON 2012), Tallinn, Estonia, Jun. 2012.Search in Google Scholar

[24] Greenberg, A., “WikiLeaks’ Julian Assange Wants To Spill Your Corporate Secrets,” Forbes Magazine, Dec. 2010. Available: http://www.forbes.com/sites/andygreenberg/2010/11/29/wikileaks-julian-assange-wants-to-spill-your-corporate-secrets/Search in Google Scholar

[25] Greitzer, F. L., Moore, A. P., Cappelli, D. M., Andrews, D. H., Carroll, L. A., Hull, T. D., “Combating the Insider Cyber Threat,” IEEE Security & Privacy, Volume 6, Issue 1, Jan.-Feb. 2008.10.1109/MSP.2008.8Search in Google Scholar

[26] Hållén, J. and Dahlin N., ”Undergroundhackare skapade Stuxnet” (Underground hackers created Stuxnet), Ny Teknik, Jan. 19 2011.Search in Google Scholar

[27] Harlan Reynolds, G., “The Blogs of War,” The National Interest, spring issue, Mar. 2004. Search in Google Scholar

[28] Hassan, A. B., Funmi, D. L., and Makinde, J., “Cybercrime in Nigeria: Causes, Effects and the Way Out,” ARPN Journal of Science and Technology, Vol. 2, No. 7, Aug. 2012.Search in Google Scholar

[29] Healey, J., “The Five Futures of Cyber Conflict and Cooperation,” Georgetown Journal of International Affairs, International Engagement on Cyber: Establishing International Norms and Improved Cybersecurity, Special issue, 2011.Search in Google Scholar

[30] Hvistendahl, M., “China’s Hacker Army,” Foreign Policy, Mar. 3 2010. Available: http://www.foreignpolicy.com/articles/2010/03/03/china_s_hacker_armySearch in Google Scholar

[31] Karatgozianni, A., “Blame It on the Russians: Tracking the Portrayal of Russian Hackers during Cyber Conflict Incidents,” Digital Icons: Studies in Russian, Eurasian and Central European New Media, Issue 4, 2010.Search in Google Scholar

[32] Kramer, D., Starr, S. H, and Wentz, L. K. (Eds.), “Cyber Power and National Security,” National Defense University Press, Washington, D.C., 2009.Search in Google Scholar

[33] Lachow, I., “Cyber Terrorism: Menace or Myth?” in F. D. Kramer, S. H. Starr & L. K. Wentz (eds.), Cyberpower and National Security, National Defense University Press, Washington, D.C., 2009.Search in Google Scholar

[34] Lewis, J. A. “Cyberwarfare and its impact on international security,” United Nations Office for Disarmament Affairs, UNODA Occasional Papers, No. 19, Jun. 2010.Search in Google Scholar

[35] Lewis, J. A., “Cyberwar Thresholds and Effects,” IEEE Security & Privacy, Volume 9, Issue 5, Sep.-Oct. 2011.10.1109/MSP.2011.25Search in Google Scholar

[36] Lewis, J. A., “The ‘Korean’ Cyber Attacks and Their Implications for Cyber Conflict,” Center for Strategic and International Studies, Washington, D.C, Oct. 2009.Search in Google Scholar

[37] Lewis, J. A., “The Cyber War Has Not Begun,” Center for Strategic and International Studies, Mar. 2010.Search in Google Scholar

[38] Malkin, G., “Internet Users’ Glossary,” Request for Comments: 1983, Internet Engineering Task Force, Aug. 1996.10.17487/rfc1983Search in Google Scholar

[39] Mansfield-Devine, S., “Anonymous: serious threat or mere annoyance?” Elsevier Network Security, Volume 2011, Issue 1, Jan. 2011.10.1016/S1353-4858(11)70004-6Search in Google Scholar

[40] McGuire, M., “Organised Crime in the Digital Age,” research report, John Grieve Centre for Policing and Community Safety, London Metropolitan University, Mar. 2012.Search in Google Scholar

[41] Metasploit. Available: http://www.metasploit.com/Search in Google Scholar

[42] Muñiz Jr., J., “Declawing the Dragon: Why the U.S. Must Counter Chinese Cyber-Warriors,” Master’s Thesis, U.S. Army Command and General Staff College, Fort Leavenworth, Kansas, Jun. 2009.Search in Google Scholar

[43] Nakashima, E., “Pentagon to boost cybersecurity force,” The Washington Post, Jan. 27 2013.Search in Google Scholar

[44] Netherlands Ministry of Defence, “The Defence Cyber Strategy,” Jun. 27 2012. Search in Google Scholar

[45] Nicola, S., “The World's First Internet War,” United Press International, Aug. 6 2007. Available: http://www.upi.com/Emerging_Threats/2007/08/06/Analysis-The-worlds-first-Internet-war/UPI-93861186432610/Search in Google Scholar

[46] O’Leary, A., “Worries Over Defense Department Money for ‘Hackerspaces’,” The New York Times, Oct. 5 2012.Search in Google Scholar

[47] Olson, P., “We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency,” Little, Brown and Company, Jun. 2012.Search in Google Scholar

[48] Ottis, R., “From Pitch Forks to Laptops: Volunteers in Cyber Conflicts.” In Czosseck, C. and Podins, K. (Eds.) Conference on Cyber Conflict. Proceedings 2010. Tallinn: CCD COE Publications, pp. 97-109.Search in Google Scholar

[49] Ottis, R., “Proactive Defense Tactics Against On-Line Cyber Militia,” in the proceedings of the 9th European Conference on Information Warfare and Security (ECIW 2010), Thessaloniki, Greece, Jul. 2010.Search in Google Scholar

[50] Ottis, R., “Theoretical Offensive Cyber Militia Models,” in Proc. 6th International Conference on Information Warfare and Security (ICIW), Washington, D.C., USA, Mar. 2011.Search in Google Scholar

[51] Phneah, E., “Anonymous hacks Japanese govt sites,” ZDNet, Jun. 28 2012. Available: http://www.zdnet.com/anonymous-hacks-japanese-govt-sites-2062305268/Search in Google Scholar

[52] Roberts, P., “UK’s top ecrime investigator describes a life fighting cybercrime,” Sophos Naked Security, Sep. 25 2012. Available: http://nakedsecurity.sophos.com/2012/09/25/interview-bob-burls/Search in Google Scholar

[53] Schneier, B., “Threat of ‘cyberwar’ has been hugely hyped,” CNN, Jul. 7, 2010. Available: http://edition.cnn.com/2010/OPINION/07/07/schneier.cyberwar.hyped/10.18356/2169da18-enSearch in Google Scholar

[54] Serrano, A. F., “Cyber Crime Pays: A $114 Billion Industry,” The Fiscal Times, Sep. 14, 2011. Available: http://www.thefiscaltimes.com/Articles/2011/09/14/Cyber-Crime-Pays-A-114-Billion-Industry.aspxSearch in Google Scholar

[55] Shane, S., “Cyberwarfare Emerges From Shadows for Public Discussion by U.S. Officials,” The New York Times, Sep. 26 2012.Search in Google Scholar

[56] Simma, B., “The Charter of the United Nations: A Commentary,” Second Edition, Oxford University Press, 2002.Search in Google Scholar

[57] Sternstein, A., “Former CIA Director: Build a new Internet to improve cybersecurity,” Nextgov, Jul. 6 2011. Available: http://www.nextgov.com/cybersecurity/2011/07/former-cia-director-build-a-new-internet-to-improve-cybersecurity/49354/Search in Google Scholar

[58] Theriault, C., “Brazil’s cybercrime evolution - it doesn’t look pretty,” Sophos Naked Security, Oct. 5 2011. Available: http://nakedsecurity.sophos.com/2011/10/05/brazils-cybercrime-evolution-it-doesnt-look-pretty/Search in Google Scholar

[59] Thibodeau, P., “Cyberattacks an ‘existential threat’ to U.S., FBI says,” Computerworld, March 24 2010. Available: http://www.computerworld.com/s/article/9173967/Cyberattacks_an_existential_threat_to_U.S._FBI_says Search in Google Scholar

[60] U.S. Defense Advanced Research Projects Agency (DARPA), Cyber-Insider Threat (CINDER) program. Available: http://www.darpa.mil/Our_Work/I2O/Programs/Cyber-Insider_Threat_(CINDER).aspxSearch in Google Scholar

[61] U.S. Department of Defense, “Strategy for Operating in Cyberspace,” July 2011.10.21236/ADA545385Search in Google Scholar

[62] U.S. Department of Defense, Department of Defense Cyberspace Policy Report, Report to Congress Pursuant to the National Defense Authorization Act for Fiscal Year 2011, Section 934, Nov. 2011.Search in Google Scholar

[63] United Nations Charter, Article 2(4). Available: http://www.un.org/aboutun/charter/Search in Google Scholar

[64] United Nations Office on Drugs and Crime (UNODC), “The Globalization of Crime: A Transnational Organized Crime Threat Assessment,” United Nations publication E.10.IV.6, 2010.Search in Google Scholar

[65] United States Department of Defense, “Dictionary of Military and Associated Terms,” Joint Publication 1-02, Nov. 8, 2010.Search in Google Scholar

[66] Verizon Business Inc., “The 2012 Data Breach Investigations Report.” Available: http://www.verizonbusiness.com/resources/reports/rp_data-breach-investigations-report-2012_en_xg.pdfSearch in Google Scholar

[67] Watts, S., “Combatant Status and Computer Network Attack,” Virginia Journal of International Law, Vol. 50, No. 2, 2010.10.2139/ssrn.1460680Search in Google Scholar

[68] Weimann, G., “Cyberterrorism: How Real is the Threat?” United States Institute of Peace, special report, May 2004.Search in Google Scholar

[69] Werbach, K., “The Centripetal Network: How the Internet Holds Itself Together, and the Forces Tearing It Apart,” UC Davis Law Review, Vol. 42, 2009.Search in Google Scholar

[70] Wilson, C., “Cyber Crime,” in F. D. Kramer, S. H. Starr & L. K. Wentz (eds.), Cyberpower and National Security, National Defense University Press, Washington, D.C., 2009.Search in Google Scholar

[71] Wittman, G. H., “China’s Cyber Militia,” The American Spectator, Oct. 21 2011. Available: http://spectator.org/archives/2011/10/21/chinas-cyber-militiaSearch in Google Scholar

[72] Yoon, S., “North Korea recruits hackers at school,” Al Jazeera, Jun. 20 2011. Available: http://www.aljazeera.com/indepth/features/2011/06/201162081543573839.html Search in Google Scholar

eISSN:
1799-3350
Sprache:
Englisch
Zeitrahmen der Veröffentlichung:
Volume Open
Fachgebiete der Zeitschrift:
Geschichte, Themen der Geschichte, Militärgeschichte, Sozialwissenschaften, Politikwissenschaften, Militärpolitik