Startseite Finding the New High Ground in Cyber War: Malware as an Instrument of War
Artikel
Lizenziert
Nicht lizenziert Erfordert eine Authentifizierung

Finding the New High Ground in Cyber War: Malware as an Instrument of War

  • Guy Philbin EMAIL logo und Tobias R. Philbin
Veröffentlicht/Copyright: 13. April 2013

Abstract

Intelligent agents known as malware are rapidly becoming the tool of choice for nations, criminals, and terrorists in finding the high ground of the 21st Century’s cyber battlefields. Malware is making information control the capital of peace and the currency of cyber war.


Corresponding author: Guy Philbin, DSc, Robert Morris University, Pittsburgh, PA, USA, e-mail:

References

Arquilla, J. and D. Ronfeldt (1993) “Cyberwar Is Coming,” Comparative Strategy, 12(2): 141–165.10.1080/01495939308402915Suche in Google Scholar

Ball, D. (2011) “China’s cyber warfare capabilities,” Security Challenges, 7(2):81–103.Suche in Google Scholar

Baase, S. (2008) A Gift of Fire. Upper Saddle River, NJ: Pearson Prentice Hall.Suche in Google Scholar

Benniger, J. (1986) The Control Revolution. Cambridge, MA: Harvard University Press.Suche in Google Scholar

Brenner, J. (2011) America the Vulnerable. New York, NY: Penguin Press.Suche in Google Scholar

Dirks, N. (2012, August 17) “Scholars, Spies, and Global Studies,” The Chronicle Review, p. B5.Suche in Google Scholar

Everetts, R. (2007) “Information Assurance Management in the Federal Sector.” Unpublished doctoral dissertation, University of Maryland University College, College Park, MD.Suche in Google Scholar

Goldstein, M. (2010, May 6) “US Stock Plunge Raises Alarm on Algo Trading,” Reuters. Available at: http://www.reuters.com/article/2010/05/07/market-selloff-idUSN0624451020100507.Suche in Google Scholar

Hopkins, N. (2012, April 16) “US and China Engage in Cyber War Games,” The Guardian. Available at: www.Guardian.co.uk.Suche in Google Scholar

Kaspersky, E. (2012) “Kaspersky Lab and ITU Research Reveals New Advanced Cyber Threat.” Available at: http://www.kaspersky.com/about/news/virus/2012/Kaspersky_Lab_and_ITU_Research_Reveals_New_Advanced_Cyber_Threat/.Suche in Google Scholar

Krekel, B., P. Adams and G. Bakos (2012) “Occupying the Information High Ground: Chinese Capabilities for Computer Network Operations and Cyber Espionage.” Prepared for the U.S.-China Economic and Security Review Commission. Northrop Grumman Corp.Suche in Google Scholar

National Science Foundation, National Center for Science and Engineering Statistics (2012) Doctorate Recipients from U.S. Universities: 2010. Special Report NSF 12-305. Arlington, VA: National Science Foundation. Available at: http://www.nsf.gov/statistics/sed/.Suche in Google Scholar

Nicholson, C. (2010, May 7) “Market Madness: A Post-Mortem,” Deal Book. Retrieved from http://dealbook.nytimes.com/2010/05/07/market-madness-a-post-mortem/.Suche in Google Scholar

Stytz, M., D. Lichtblau and S. Banks (2005) “Track 7: Information Operations/Assurance: Toward Using Intelligent Agents to Detect, Assess, and Counter Cyber Attacks in a Network Centric Environment.” 10th International Command and Control Research and Technology Symposium, Vienna, VA, June 13–16, 2005. Washington, DC: National Defense University. Available at: http://www.dodccrp.org/events/10th_ICCRTS/CD/papers/282.pdf.Suche in Google Scholar

Published Online: 2013-04-13
Published in Print: 2013-01-01

©2013 by Walter de Gruyter Berlin Boston

Artikel in diesem Heft

  1. Masthead
  2. Masthead
  3. Research Articles
  4. Integrating Federal Approaches to Post-Cyber Incident Mitigation
  5. Cybersecurity and US Legislative Efforts to address Cybercrime
  6. The Military’s Response to Domestic CBRNE Incidents
  7. Building Public Health Preparedness and Food and Agriculture Defense Capabilities Using Whole Community and One Health Concepts
  8. Situated Response and Learning of Distributed Bushfire Coordinating Teams
  9. A Critical Examination of the Assumptions Regarding Centralized Coordination in Large-Scale Emergency Situations
  10. “Of Gods and Men”: Selected Print Media Coverage of Natural Disasters and Industrial Failures in Three Westminster Countries
  11. Spontaneous Planning after the San Bruno Gas Pipeline Explosion: A Case Study of Anticipation and Improvisation during Response and Recovery Operations
  12. Understanding Incident Response to Unplanned Releases at Chemical Facilities
  13. A Study on the Responsiveness of Local Health Departments that Use Facebook
  14. Texas takes on the TSA: The Constitutional Fight over Airport Security
  15. The Gulf Oil Spill and Economic Impacts: Extending the National Interstate Economic Model (NIEMO) to Account for Induced Impacts
  16. The Economic Value of Water: Providing Confidence and Context to FEMA’s Methodology
  17. Diffusion of Emergency Information during a Crisis within a University
  18. Resilience Building Policies and their Influence in Crisis Prevention, Absorption and Recovery
  19. Communication and News
  20. A Practitioner-Researcher Partnership to Develop and Deliver Operational Value of Threat, Risk and Vulnerability Assessment Training to meet the Requirements of Emergency Responders
  21. Regional Public-Private Interoperable Communications for Catastrophic Events Using a Cloud Computing Based Portal
  22. It’s Never Too Late: Restructuring the Department of Homeland Security’s Regional Framework
  23. Finding the New High Ground in Cyber War: Malware as an Instrument of War
  24. Opinions
  25. Cybersecurity and Emergency Management: Encryption and the Inability to Communicate
  26. Assessing the Chemical Facility Anti-Terrorism Standards after 5 Years: Achievements, Challenges, and Risks Ahead
  27. Book Review
  28. Emergency Management: The American Experience 1900–2010 (2nd Edition)
Heruntergeladen am 29.9.2025 von https://www.degruyterbrill.com/document/doi/10.1515/jhsem-2012-0041/html
Button zum nach oben scrollen