Abstract
Intelligent agents known as malware are rapidly becoming the tool of choice for nations, criminals, and terrorists in finding the high ground of the 21st Century’s cyber battlefields. Malware is making information control the capital of peace and the currency of cyber war.
References
Arquilla, J. and D. Ronfeldt (1993) “Cyberwar Is Coming,” Comparative Strategy, 12(2): 141–165.10.1080/01495939308402915Suche in Google Scholar
Ball, D. (2011) “China’s cyber warfare capabilities,” Security Challenges, 7(2):81–103.Suche in Google Scholar
Baase, S. (2008) A Gift of Fire. Upper Saddle River, NJ: Pearson Prentice Hall.Suche in Google Scholar
Benniger, J. (1986) The Control Revolution. Cambridge, MA: Harvard University Press.Suche in Google Scholar
Brenner, J. (2011) America the Vulnerable. New York, NY: Penguin Press.Suche in Google Scholar
Dirks, N. (2012, August 17) “Scholars, Spies, and Global Studies,” The Chronicle Review, p. B5.Suche in Google Scholar
Everetts, R. (2007) “Information Assurance Management in the Federal Sector.” Unpublished doctoral dissertation, University of Maryland University College, College Park, MD.Suche in Google Scholar
Goldstein, M. (2010, May 6) “US Stock Plunge Raises Alarm on Algo Trading,” Reuters. Available at: http://www.reuters.com/article/2010/05/07/market-selloff-idUSN0624451020100507.Suche in Google Scholar
Hopkins, N. (2012, April 16) “US and China Engage in Cyber War Games,” The Guardian. Available at: www.Guardian.co.uk.Suche in Google Scholar
Kaspersky, E. (2012) “Kaspersky Lab and ITU Research Reveals New Advanced Cyber Threat.” Available at: http://www.kaspersky.com/about/news/virus/2012/Kaspersky_Lab_and_ITU_Research_Reveals_New_Advanced_Cyber_Threat/.Suche in Google Scholar
Krekel, B., P. Adams and G. Bakos (2012) “Occupying the Information High Ground: Chinese Capabilities for Computer Network Operations and Cyber Espionage.” Prepared for the U.S.-China Economic and Security Review Commission. Northrop Grumman Corp.Suche in Google Scholar
National Science Foundation, National Center for Science and Engineering Statistics (2012) Doctorate Recipients from U.S. Universities: 2010. Special Report NSF 12-305. Arlington, VA: National Science Foundation. Available at: http://www.nsf.gov/statistics/sed/.Suche in Google Scholar
Nicholson, C. (2010, May 7) “Market Madness: A Post-Mortem,” Deal Book. Retrieved from http://dealbook.nytimes.com/2010/05/07/market-madness-a-post-mortem/.Suche in Google Scholar
Stytz, M., D. Lichtblau and S. Banks (2005) “Track 7: Information Operations/Assurance: Toward Using Intelligent Agents to Detect, Assess, and Counter Cyber Attacks in a Network Centric Environment.” 10th International Command and Control Research and Technology Symposium, Vienna, VA, June 13–16, 2005. Washington, DC: National Defense University. Available at: http://www.dodccrp.org/events/10th_ICCRTS/CD/papers/282.pdf.Suche in Google Scholar
©2013 by Walter de Gruyter Berlin Boston
Artikel in diesem Heft
- Masthead
- Masthead
- Research Articles
- Integrating Federal Approaches to Post-Cyber Incident Mitigation
- Cybersecurity and US Legislative Efforts to address Cybercrime
- The Military’s Response to Domestic CBRNE Incidents
- Building Public Health Preparedness and Food and Agriculture Defense Capabilities Using Whole Community and One Health Concepts
- Situated Response and Learning of Distributed Bushfire Coordinating Teams
- A Critical Examination of the Assumptions Regarding Centralized Coordination in Large-Scale Emergency Situations
- “Of Gods and Men”: Selected Print Media Coverage of Natural Disasters and Industrial Failures in Three Westminster Countries
- Spontaneous Planning after the San Bruno Gas Pipeline Explosion: A Case Study of Anticipation and Improvisation during Response and Recovery Operations
- Understanding Incident Response to Unplanned Releases at Chemical Facilities
- A Study on the Responsiveness of Local Health Departments that Use Facebook
- Texas takes on the TSA: The Constitutional Fight over Airport Security
- The Gulf Oil Spill and Economic Impacts: Extending the National Interstate Economic Model (NIEMO) to Account for Induced Impacts
- The Economic Value of Water: Providing Confidence and Context to FEMA’s Methodology
- Diffusion of Emergency Information during a Crisis within a University
- Resilience Building Policies and their Influence in Crisis Prevention, Absorption and Recovery
- Communication and News
- A Practitioner-Researcher Partnership to Develop and Deliver Operational Value of Threat, Risk and Vulnerability Assessment Training to meet the Requirements of Emergency Responders
- Regional Public-Private Interoperable Communications for Catastrophic Events Using a Cloud Computing Based Portal
- It’s Never Too Late: Restructuring the Department of Homeland Security’s Regional Framework
- Finding the New High Ground in Cyber War: Malware as an Instrument of War
- Opinions
- Cybersecurity and Emergency Management: Encryption and the Inability to Communicate
- Assessing the Chemical Facility Anti-Terrorism Standards after 5 Years: Achievements, Challenges, and Risks Ahead
- Book Review
- Emergency Management: The American Experience 1900–2010 (2nd Edition)
Artikel in diesem Heft
- Masthead
- Masthead
- Research Articles
- Integrating Federal Approaches to Post-Cyber Incident Mitigation
- Cybersecurity and US Legislative Efforts to address Cybercrime
- The Military’s Response to Domestic CBRNE Incidents
- Building Public Health Preparedness and Food and Agriculture Defense Capabilities Using Whole Community and One Health Concepts
- Situated Response and Learning of Distributed Bushfire Coordinating Teams
- A Critical Examination of the Assumptions Regarding Centralized Coordination in Large-Scale Emergency Situations
- “Of Gods and Men”: Selected Print Media Coverage of Natural Disasters and Industrial Failures in Three Westminster Countries
- Spontaneous Planning after the San Bruno Gas Pipeline Explosion: A Case Study of Anticipation and Improvisation during Response and Recovery Operations
- Understanding Incident Response to Unplanned Releases at Chemical Facilities
- A Study on the Responsiveness of Local Health Departments that Use Facebook
- Texas takes on the TSA: The Constitutional Fight over Airport Security
- The Gulf Oil Spill and Economic Impacts: Extending the National Interstate Economic Model (NIEMO) to Account for Induced Impacts
- The Economic Value of Water: Providing Confidence and Context to FEMA’s Methodology
- Diffusion of Emergency Information during a Crisis within a University
- Resilience Building Policies and their Influence in Crisis Prevention, Absorption and Recovery
- Communication and News
- A Practitioner-Researcher Partnership to Develop and Deliver Operational Value of Threat, Risk and Vulnerability Assessment Training to meet the Requirements of Emergency Responders
- Regional Public-Private Interoperable Communications for Catastrophic Events Using a Cloud Computing Based Portal
- It’s Never Too Late: Restructuring the Department of Homeland Security’s Regional Framework
- Finding the New High Ground in Cyber War: Malware as an Instrument of War
- Opinions
- Cybersecurity and Emergency Management: Encryption and the Inability to Communicate
- Assessing the Chemical Facility Anti-Terrorism Standards after 5 Years: Achievements, Challenges, and Risks Ahead
- Book Review
- Emergency Management: The American Experience 1900–2010 (2nd Edition)