Books & Videos

Table of Contents

  1. Chapter 1 Assessing the Problem

    1. The Complex Domain of Cyberspace

    2. Cyber Crime

    3. Future Threats

    4. The Conficker Worm: The Cyber Equivalent of an Extinction Event?

    5. Africa: The Future Home of the World’s Largest Botnet?

    6. The Way Forward

  2. Chapter 2 The Rise of the Nonstate Hacker

    1. The StopGeorgia.ru Project Forum

    2. The Russian Information War

    3. The Gaza Cyber War between Israeli and Arabic Hackers during Operation Cast Lead

    4. Control the Voice of the Opposition by Controlling the Content in Cyberspace: Nigeria

    5. Are Nonstate Hackers a Protected Asset?

  3. Chapter 3 The Legal Status of Cyber Warfare

    1. Nuclear Nonproliferation Treaties

    2. The Antarctic Treaty System and Space Law

    3. UNCLOS

    4. MLAT

    5. The Law of Armed Conflict

    6. Is This an Act of Cyber Warfare?

    7. Cyber: The Chaotic Domain

  4. Chapter 4 Responding to International Cyber Attacks as Acts of War

    1. The Legal Dilemma

    2. The Law of War

    3. Nonstate Actors and the Law of War

    4. Analyzing Cyber Attacks under Jus ad Bellum

    5. The Choice to Use Active Defenses

    6. Conclusion

  5. Chapter 5 The Intelligence Component to Cyber Warfare

    1. The Korean DDoS Attacks (July 2009)

    2. One Year After the RU-GE War, Social Networking Sites Fall to DDoS Attack

    3. Ingushetia Conflict, August 2009

    4. The Predictive Role of Intelligence

  6. Chapter 6 Nonstate Hackers and the Social Web

    1. Russia

    2. China

    3. The Middle East

    4. Pakistani Hackers and Facebook

    5. The Dark Side of Social Networks

    6. TwitterGate: A Real-World Example of a Social Engineering Attack with Dire Consequences

    7. Automating the Process

  7. Chapter 7 Follow the Money

    1. False Identities

    2. Components of a Bulletproof Network

    3. The Bulletproof Network of StopGeorgia.ru

    4. SORM-2

    5. The Kremlin and the Russian Internet

    6. A Three-Tier Model of Command and Control

  8. Chapter 8 Organized Crime in Cyberspace

    1. A Subtle Threat

    2. Russian Organized Crime and the Kremlin

  9. Chapter 9 Investigating Attribution

    1. Using Open Source Internet Data

    2. Team Cymru and Its Darknet Report

    3. Using WHOIS

  10. Chapter 10 Weaponizing Malware

    1. A New Threat Landscape

  11. Chapter 11 The Role of Cyber in Military Doctrine

    1. The Russian Federation

    2. China Military Doctrine

  12. Chapter 12 A Cyber Early Warning Model

    1. The Challenge We Face

  13. Chapter 13 Advice for Policymakers from the Field

    1. When It Comes to Cyber Warfare: Shoot the Hostage

    2. The United States Should Use Active Defenses to Defend Its Critical Information Systems

    3. Scenarios and Options to Responding to Cyber Attacks

    4. In Summary

    5. Whole-of-Nation Cyber Security

  14. Chapter 14 Conducting Operations in the Cyber-Space-Time Continuum

    1. Anarchist Clusters: Anonymous, LulzSec, and the Anti-Sec Movement

    2. Social Networks: The Geopolitical Strategy of Russian Investment in Social Media

    3. Globalization: How Huawei Bypassed US Monitoring by Partnering with Symantec

  15. Chapter 15 The Russian Federation: Information Warfare Framework

    1. Russia: The Information Security State

    2. Russian Ministry of Defense

    3. Internal Security Services: Federal Security Service (FSB), Ministry of Interior (MVD), and Federal Security Organization (FSO)

    4. Russian Federation Ministry of Communications and Mass Communications (Minsvyaz)

    5. Further Research Areas

  16. Chapter 16 Cyber Warfare Capabilities by Nation-State

    1. Australia

    2. Brazil

    3. Canada

    4. Czech Republic

    5. Democratic People’s Republic of Korea

    6. Estonia

    7. European Union

    8. France

    9. Germany

    10. India

    11. Iran

    12. Israel

    13. Italy

    14. Kenya

    15. Myanmar

    16. NATO

    17. Netherlands

    18. Nigeria

    19. Pakistan

    20. People’s Republic of China

    21. Poland

    22. Republic of Korea

    23. Russian Federation

    24. Singapore

    25. South Africa

    26. Sweden

    27. Taiwan (Republic of China)

    28. Turkey

    29. United Kingdom

  17. Chapter 17 US Department of Defense Cyber Command and Organizational Structure

    1. Summary

    2. Organization

  18. Chapter 18 Active Defense for Cyber: A Legal Framework for Covert Countermeasures

    1. Covert Action

    2. Cyber Active Defense Under International Law

    3. Cyber Active Defenses as Covert Action Under International Law

    4. Cyber Attacks Under International Law: Nonstate Actors

  1. Colophon