Conference - "Social Media for Operations", 27th February 2013, Amsterdam, Netherlands, http://www.smi-online.co.uk/defence/europe/workshop/social-media-for-operations
eConflicts is a blog about cyberconflicts, cyberwar, cyberdefense, cybersecurity, information warfare, cybercrime, political science and international relations
Total Pageviews
Wednesday, February 6, 2013
Conference - Social media within the military and the defence sector
Conference: "Social media within the military and the defence sector", 25-26 february 2013, Amsterdam. http://www.smi-online.co.uk/defence/europe/social-media-within-the-military-and-defence-sector-europe
Monday, January 7, 2013
News - 2012 Conference Proceedings
CCDCOE 2012 Conference on “Military and Paramilitary Activities in Cyberspace”. Proceedings are now available : http://www.ccdcoe.org/publications/2012proceedings/CyCon_2012_Proceedings.pdf
Content:
Chapter 1: Cyberspace – The Role of States in the Global Structure
Legal Implications of Territorial Sovereignty in Cyberspace by Wolff Heintschel von HeineggWhen “Not My Problem” Isn’t Enough: Political Neutrality and National Responsibility in Cyber Conflict by Jason Healey
Neutrality in Cyberspace by Wolff Heintschel von Heinegg
Impact of Cyberspace on Human Rights and Democracy by Vittorio Fanchiotti / Jean Paul Pierini
Chapter 2: Cyber Policy & Strategic Options
Russia’s Public Stance on Cyber/Information Warfare by Keir Giles
French Cyberdefense Policy by Patrice Tromparent
A Treaty for Governing Cyber-Weapons: Potential Benefits and Practical Limitations by Louise ArimatsuInternet as a Critical Infrastructure – A Framework for the Measurement of Maturity and Awareness in the Cyber Sphere by Assaf Y. Keren, Keren Elazari
The Significance of Attribution to Cyberspace Coercion: A Political Perspective by Forrest Hare
The Militarisation of Cyberspace: Why Less May Be Better by Myriam Dunn Cavelty
Chapter 3: Cyber Conflict – Theory & Principles
Beyond Domains, Beyond Commons: The Context and Theory of Conflict in Cyberspaceby Jeffrey L. Caton
Applying Traditional Military Principles to Cyber Warfare by Samuel Liles, J. Eric Dietz, Marcus Rogers, Dean LarsonThe Principle of Maneuver in Cyber Operations by Scott D. Applegate
Countering the Offensive Advantage in Cyberspace: An Integrated Defensive Strategy by David T. FahrenkrugAn Analysis For A Just Cyber Warfare by Mariarosaria Taddeo
Chapter 4: Cyber Conflict – Actors Socially Engineered Commoners as Cyber Warriors - Estonian Future or Present? by Birgy Lorenz, Kaido KikkasThe Notion of Combatancy in Cyber Warfare by Sean Watts
Direct Participation in Cyber Hostilities: Terms of Reference for Like-Minded States? by Jody Prescott
Chapter 5: “Cyber-Attacks” – Trends, Methods & Legal Classification
Attack Trends in Present Computer Networks by Robert Koch, Björn Stelte, Mario Golling
“Attack” as a Term of Art in International Law: The Cyber Operations Context by Michael N. Schmitt
Ius ad bellum in Cyberspace – Some Thoughts on the “Schmitt-Criteria” for Use of Force by Katharina ZiolkowskiThe “Use of Force” in Cyberspace: A Reply to Dr Ziolkowski by Michael N. Schmitt
A Methodology for Cyber Operations Targeting and Control of Collateral Damage in the Context of Lawful Armed Conflict by Robert Fanelli, Gregory Conti
Command and Control of Cyber Weapons by Enn Tyugu
A Case Study on the Miner Botnet by Daniel Plohmann, Elmar Gerhards-Padilla
Chapter 6: Cyber Defence – Methods & Tools
Natural Privacy Preservation Protocol for Electronic Mail by Kim Hartmann, Christoph Steup
Paradigm Change of Vehicle Cyber-Security by Hiro Onishi
Sensing for Suspicion at Scale: A Bayesian Approach for Cyber Conflict Attribution and Reasoning by Harsha K. Kalutarage, Siraj A. Shaikh, Qin Zhou, Anne E. James
The Role of COTS Products for High Security Systems by Robert Koch, Gabi Dreo Rodosek
Conceptual Framework for Cyber Defense Information Sharing within Trust Relationships by
Diego Fernández Vázquez, Oscar Pastor Acosta, Christopher Spirito, Sarah Brown, Emily Reid
Legal Implications of Territorial Sovereignty in Cyberspace by Wolff Heintschel von HeineggWhen “Not My Problem” Isn’t Enough: Political Neutrality and National Responsibility in Cyber Conflict by Jason Healey
Neutrality in Cyberspace by Wolff Heintschel von Heinegg
Impact of Cyberspace on Human Rights and Democracy by Vittorio Fanchiotti / Jean Paul Pierini
Chapter 2: Cyber Policy & Strategic Options
Russia’s Public Stance on Cyber/Information Warfare by Keir Giles
French Cyberdefense Policy by Patrice Tromparent
A Treaty for Governing Cyber-Weapons: Potential Benefits and Practical Limitations by Louise ArimatsuInternet as a Critical Infrastructure – A Framework for the Measurement of Maturity and Awareness in the Cyber Sphere by Assaf Y. Keren, Keren Elazari
The Significance of Attribution to Cyberspace Coercion: A Political Perspective by Forrest Hare
The Militarisation of Cyberspace: Why Less May Be Better by Myriam Dunn Cavelty
Chapter 3: Cyber Conflict – Theory & Principles
Beyond Domains, Beyond Commons: The Context and Theory of Conflict in Cyberspaceby Jeffrey L. Caton
Applying Traditional Military Principles to Cyber Warfare by Samuel Liles, J. Eric Dietz, Marcus Rogers, Dean LarsonThe Principle of Maneuver in Cyber Operations by Scott D. Applegate
Countering the Offensive Advantage in Cyberspace: An Integrated Defensive Strategy by David T. FahrenkrugAn Analysis For A Just Cyber Warfare by Mariarosaria Taddeo
Chapter 4: Cyber Conflict – Actors Socially Engineered Commoners as Cyber Warriors - Estonian Future or Present? by Birgy Lorenz, Kaido KikkasThe Notion of Combatancy in Cyber Warfare by Sean Watts
Direct Participation in Cyber Hostilities: Terms of Reference for Like-Minded States? by Jody Prescott
Chapter 5: “Cyber-Attacks” – Trends, Methods & Legal Classification
Attack Trends in Present Computer Networks by Robert Koch, Björn Stelte, Mario Golling
“Attack” as a Term of Art in International Law: The Cyber Operations Context by Michael N. Schmitt
Ius ad bellum in Cyberspace – Some Thoughts on the “Schmitt-Criteria” for Use of Force by Katharina ZiolkowskiThe “Use of Force” in Cyberspace: A Reply to Dr Ziolkowski by Michael N. Schmitt
A Methodology for Cyber Operations Targeting and Control of Collateral Damage in the Context of Lawful Armed Conflict by Robert Fanelli, Gregory Conti
Command and Control of Cyber Weapons by Enn Tyugu
A Case Study on the Miner Botnet by Daniel Plohmann, Elmar Gerhards-Padilla
Chapter 6: Cyber Defence – Methods & Tools
Natural Privacy Preservation Protocol for Electronic Mail by Kim Hartmann, Christoph Steup
Paradigm Change of Vehicle Cyber-Security by Hiro Onishi
Sensing for Suspicion at Scale: A Bayesian Approach for Cyber Conflict Attribution and Reasoning by Harsha K. Kalutarage, Siraj A. Shaikh, Qin Zhou, Anne E. James
The Role of COTS Products for High Security Systems by Robert Koch, Gabi Dreo Rodosek
Conceptual Framework for Cyber Defense Information Sharing within Trust Relationships by
Diego Fernández Vázquez, Oscar Pastor Acosta, Christopher Spirito, Sarah Brown, Emily Reid
Monday, December 31, 2012
Wednesday, December 12, 2012
Publications - Sécurité & Stratégie n°11
Le nouveau numéro de la revue Sécurité & Stratégie (n°11, décembre 2012 - février 2013) est dédié au thème "Les cyber-menaces: mythe ou réalité?"
J'y publie un article intitulé "Le cyber-guerrier: nouvelle figure combattante au service de la cyber-défense" (pp. 39-47).
Au sommaire, vous retrouverez également:
- Sécurité: 15 ans d'échec. J. Brossard
- Don't Worry, we are from the Internet" - Anonymous. Fr. Bardeau, N. Danet
- Rebond. N. Ruff
- Nouvelles technologies et crime désorganisé: incursion au coeur d'un réseau de pirates informatiques. Benoit Dupont (CICC Montréal)
- Cybercriminalité et expertise: enjeux et défis. F. Guarnieri, E. Przyswa
- Le défi des nouveaux usages numériques: la sécurité des entreprises à la peine. B. Gruselle.
- La cybersécurité des systèmes industriels et tertiaires. S. Meynet
- Cyber-résilience, risques et dépendances: pour une nouvelle approche de la cyber-sécurité. S. Ghernaouti, Ch. Aghroum
- La cyber-sécurité en entreprise: se protéger juridiquement et se former. M. Quéméner, A. Souvira.
Friday, December 7, 2012
Article - New weapons for cyber warfare. The CHAMP project
"New weapons for cyber warfare. The CHAMP Project". Article by Pierluigi Paganini. Infosec website. December 6, 2012.
The attacks against the infrastructure of cyberespace (for instance using EMP bombs) may be considered as part of cyber warfare or information warfare. But others may consider that this is not cyberwar, just electronic warfare. Let's read the interesting article of Pierluigi Paganini, who describes what the CHAMP project is and what the impact on cyberwarfare scenario might be.
Saturday, December 1, 2012
News - Syria's Internet outage: interpretations
Land Destroyer website proposes its analysis of the means and motivations that might explain the Syria's Internet outage. Syria's Internet outage & the future of information warfare. December 1, 2012.
Subscribe to:
Posts (Atom)