Total Pageviews

Monday, January 7, 2013

News - 2012 Conference Proceedings


CCDCOE 2012 Conference on “Military and Paramilitary Activities in Cyberspace”. Proceedings are now available : http://www.ccdcoe.org/publications/2012proceedings/CyCon_2012_Proceedings.pdf

Content:

Chapter 1: Cyberspace – The Role of States in the Global Structure
Legal Implications of Territorial Sovereignty in Cyberspace by Wolff Heintschel von HeineggWhen “Not My Problem” Isn’t Enough: Political Neutrality and National Responsibility in Cyber Conflict by Jason Healey
Neutrality in Cyberspace by Wolff Heintschel von Heinegg
Impact of Cyberspace on Human Rights and Democracy by Vittorio Fanchiotti / Jean Paul Pierini

Chapter 2: Cyber Policy & Strategic Options
Russia’s Public Stance on Cyber/Information Warfare by Keir Giles
French Cyberdefense Policy by Patrice Tromparent
A Treaty for Governing Cyber-Weapons: Potential Benefits and Practical Limitations by Louise ArimatsuInternet as a Critical Infrastructure – A Framework for the Measurement of Maturity and Awareness in the Cyber Sphere by Assaf Y. Keren, Keren Elazari
The Significance of Attribution to Cyberspace Coercion: A Political Perspective by Forrest Hare
The Militarisation of Cyberspace: Why Less May Be Better by Myriam Dunn Cavelty
Chapter 3: Cyber Conflict – Theory & Principles 
Beyond Domains, Beyond Commons: The Context and Theory of Conflict in Cyberspaceby Jeffrey L. Caton
Applying Traditional Military Principles to Cyber Warfare by Samuel Liles, J. Eric Dietz, Marcus Rogers, Dean LarsonThe Principle of Maneuver in Cyber Operations by Scott D. Applegate
Countering the Offensive Advantage in Cyberspace: An Integrated Defensive Strategy by David T. FahrenkrugAn Analysis For A Just Cyber Warfare by Mariarosaria Taddeo

Chapter 4: Cyber Conflict – Actors Socially Engineered Commoners as Cyber Warriors - Estonian Future or Present? by Birgy Lorenz, Kaido KikkasThe Notion of Combatancy in Cyber Warfare by Sean Watts
Direct Participation in Cyber Hostilities: Terms of Reference for Like-Minded States? by Jody Prescott
Chapter 5: “Cyber-Attacks” – Trends, Methods & Legal Classification
Attack Trends in Present Computer Networks by Robert Koch, Björn Stelte, Mario Golling
“Attack” as a Term of Art in International Law: The Cyber Operations Context by Michael N. Schmitt
Ius ad bellum in Cyberspace – Some Thoughts on the “Schmitt-Criteria” for Use of Force by Katharina ZiolkowskiThe “Use of Force” in Cyberspace: A Reply to Dr Ziolkowski by Michael N. Schmitt
A Methodology for Cyber Operations Targeting and Control of Collateral Damage in the Context of Lawful Armed Conflict by Robert Fanelli, Gregory Conti
Command and Control of Cyber Weapons by Enn Tyugu
A Case Study on the Miner Botnet by Daniel Plohmann, Elmar Gerhards-Padilla
Chapter 6: Cyber Defence – Methods & Tools
Natural Privacy Preservation Protocol for Electronic Mail by Kim Hartmann, Christoph Steup
Paradigm Change of Vehicle Cyber-Security by Hiro Onishi
Sensing for Suspicion at Scale: A Bayesian Approach for Cyber Conflict Attribution and Reasoning by Harsha K. Kalutarage, Siraj A. Shaikh, Qin Zhou, Anne E. James
The Role of COTS Products for High Security Systems by Robert Koch, Gabi Dreo Rodosek
Conceptual Framework for Cyber Defense Information Sharing within Trust Relationships by
Diego Fernández Vázquez, Oscar Pastor Acosta, Christopher Spirito, Sarah Brown, Emily Reid

Wednesday, December 12, 2012

Publications - Sécurité & Stratégie n°11

Le nouveau numéro de la revue Sécurité & Stratégie (n°11, décembre 2012 - février 2013) est dédié au thème "Les cyber-menaces: mythe ou réalité?"
J'y publie un article intitulé "Le cyber-guerrier: nouvelle figure combattante au service de la cyber-défense" (pp. 39-47).

Au sommaire, vous retrouverez également:

- Sécurité: 15 ans d'échec. J. Brossard
- Don't Worry, we are from the Internet" - Anonymous. Fr. Bardeau, N. Danet 
- Rebond. N. Ruff 
- Nouvelles technologies et crime désorganisé: incursion au coeur d'un réseau de pirates informatiques. Benoit Dupont (CICC Montréal)
- Cybercriminalité et expertise: enjeux et défis. F. Guarnieri, E. Przyswa
- Le défi des nouveaux usages numériques: la sécurité des entreprises à la peine. B. Gruselle.
- La cybersécurité des systèmes industriels et tertiaires. S. Meynet
- Cyber-résilience, risques et dépendances: pour une nouvelle approche de la cyber-sécurité. S. Ghernaouti, Ch. Aghroum
- La cyber-sécurité en entreprise: se protéger juridiquement et se former. M. Quéméner, A. Souvira.

Friday, December 7, 2012

Article - New weapons for cyber warfare. The CHAMP project


"New weapons for cyber warfare. The CHAMP Project". Article by Pierluigi Paganini. Infosec website. December 6, 2012.

The attacks against the infrastructure of cyberespace (for instance using EMP bombs) may be considered as part of cyber warfare or information warfare. But others may consider that this is not cyberwar, just electronic warfare. Let's read the interesting article of Pierluigi Paganini, who describes what the CHAMP project is and what the impact on cyberwarfare scenario might be.

Saturday, December 1, 2012

News - Syria's Internet outage: interpretations

Land Destroyer website proposes its analysis of the means and motivations that might explain the Syria's Internet outage. Syria's Internet outage & the future of information warfare. December 1, 2012.