|
CyberWar |
|
Derived From: Air Force works to defend cyberspace, too AFCYBER
In 2003, the White House published "The National Strategy to Secure Cyberspace," a document that presents cyberspace security as a subset of Homeland Security and outlines a wide range of initiatives to "protect against the debilitating disruption of the operation of information systems for critical infrastructures and, thereby, help to protect the people, economy, and national security of the United States."
One of those initiatives calls for the government to "improve coordination for responding to cyber attacks within the U.S. national security community."
The Air Force answered that call in December 2005 when it announced its new mission statement: To deliver sovereign options for the defense of the United States of America and its global interests -- to fly and fight in air, space and cyberspace.
Derived From: 24th Air Force Press Release June 2009The Air Force activated its cyber-focused numbered Air Force, the 24th Air Force, during a ceremony here today.
Gen. C. Robert Kehler, Air Force Space Command commander, presided over the ceremony to activate the NAF, handing the command to Maj. Gen. Richard E. Webber, as the first commander of the 24 AF dedicated to cyberspace.
"Today we activated the newest numbered Air Force," General Kehler told local media representatives after the ceremony. "Through the 24 AF, our service will present a full spectrum of cyberspace capabilities vital to the joint warfighter.
"Air Force Space Command has been designated the lead Air Force command for cyberspace," he added. "By activating 24 AF, the Air Force now has an operational unit to present cyberspace forces to the joint community."
The activation of 24 AF under AFSPC is a major milestone in the combination of space and cyberspace operations within one command. The 24 AF will provide combat-ready forces trained and equipped to conduct sustained cyber operations, fully integrated within air and space operations.
"We're going to have three wings to do that - the 688th Information Operations Wing, the 67th Network Warfare Wing, and we're going to create a third wing, the 689th [Combat Communications Wing] out of the 3rd and 5th Combat Communications Groups," General Webber said.
"If you look at all the wings, we're all properly constituted," General Webber added. "We will cover everything it takes to build and create a network - whether that's in a fixed location in the United States or overseas, or in a deployed location where you're communication challenged. We'll create the domain, operate within that domain, and defend that domain."
AFSPC as the lead Air Force major command for space and cyberspace capabilities and as the component MAJCOM to United States Strategic Command, provides the management-level headquarters functions of organizing, training and equipping.
"I think we will look back at some point and we will all point to this day as the beginning of something focused in our Air Force," General Kehler said. "What we've done today is taken another step ... now there needs to be room for much discover as we go forward."
The 24 AF will provide combatant commanders with critical cyber component capabilities, ensuring a key element of joint and combined operations toward its global mission.
Agencies / Offices
- TF-GNO Online , DoD Joint Task Force - Global Network Operations (formerly DoD Computer Emergency Response Team (CERT))
- including links to
- Army CERT (ACERT)
- Navy CIRT (NAVCIRT)
- Marine Corps NOSC (MCNOSC)
- AFNOSC NSD (formerly AFCERT)
- other related organizations
- Navy Infosec , "dedicated to the protection of U.S. Navy information systems, afloat and ashore"
Law
Hague Convention (V) respecting the Rights and Duties of Neutral Powers and Persons in Case of War on Land. The Hague, 18 October 1907.
- Chapter 1, Article 3. Belligerents are likewise forbidden to:
- (a) Erect on the territory of a neutral Power a wireless telegraphy station or other apparatus for the purpose of communicating with belligerent forces on land or sea;
- (b) Use any installation of this kind established by them before the war on the territory of a neutral Power for purely military purposes, and which has not been opened for the service of public messages.
- Chapter 1, Article 7. A neutral Power is not called upon to prevent the export or transport, on behalf of one or other of the belligerents, of arms, munitions of war, or, in general, of anything which can be of use to an army or a fleet.
- Chapter 1, Article 8. A neutral Power is not called upon to forbid or restrict the use on behalf of the belligerents of telegraph or telephone cables or of wireless telegraphy apparatus belonging to it or to companies or private individuals.
- Chapter 1, Article 9. Every measure of restriction or prohibition taken by a neutral Power in regard to the matters referred to in Articles 7 and 8 must be impartially applied by it to both belligerents. A neutral Power must see to the same obligation being observed by companies or private individuals owning telegraph or telephone cables or wireless telegraphy apparatus.
Federal Activity
- 2009 US Cyber Command established as a sub unified command subordinate to US Strategic Command
- July 2009 White House releases 60 Day Cybersecurity Review
- Air Force to create cyberspace command, Reuters 11/2/2006
- CyberStorm Feb. 6-10, 2006
- DHS Releases Cyber Storm Public Exercise Report, DHS 10/30/2006
- DHS Conducts First Full Scale Syber Security Exercise to Enhance Nation's Cyber Preparedness, DHS Press Release Feb. 10, 2006
- Presentation: National Cyber Exercise: Cyber Storm, NCSD June 21, 2006 PDF
- Cyber Protests: The Threat to the US Information Infrastructure, NIPC 10/16/01
- NIPC, Cyber Protests: The Threat to the US Information Infrastructure (Oct 2001)
- Ron Dick, "The Legal Aspects of Infrastructure Protection," InfoWarCon - September 5, 2001 - Washington, DC, NIPC 9/28/01
- Feb. 29. Senate Judiciary Committee Subcommittee on Technology, Terrorism and Government Information hearing on "Cyber Attacks: Vulnerability Warnings Unheeded ." 2:00 p.m. in Room 226 of the Senate Dirksen Office Building.
Reports
- Library of Congress. Congressional Research Service. Information Operations, Electronic Warfare, and Cyberwar: Capabilities and Related Policy Issues , by Clay Wilson. Washington, CRS, March 20, 2007. 18 p.
- Duncan B. Hollis, "New Tools, New Rules: International Law and Information Operations," pp. 59-72 in Ideas as Weapons: Influence and Perception in Modern Warfare, G. David and T. McKeldin, eds., Potomac Books Inc., 2009
- Arwood, Sam. Cyberspace as a Theater of Conflict: Federal Law, National Strategy and the Departments of Defense and Homeland Security . Wright-Patterson AFB, OH, Air Force Institute of Technology, Graduate School of Engineering and Management, June 2007. 138 p.
Available online at: http://handle.dtic.mil/100.2/ADA471536 "A review and evaluation of the legal relationships between the Combatant Commanders, the Services, and DoD agencies with respect to cyberspace. Evaluation of military cyberspace activities and responsibilities. Includes a brief look at cyberspace activities not yet addressed by DoD but soon to be a responsibility of the Department."- PBS Frontline Cyberwar
- Davis Brown, "A Proposal for an International Convention to Regulate the Use of Information Systems in Armed Conflict," Harvard International Law Journal 47(1):179-221, Winter 2006
- FedCirc 03.27.02 OCTAVE: Operationally Critical Threat, Asset, and Vulnerability Evaluation
- FedCirc 01.23.02 INFOWAR: Information Warfare
- Christopher C. Joyner and Catherine Lotrionte, "Information Warfare as International Coercion: Elements of a Legal Framework," European Journal of International Law 12(5):825-865, 2001
- Gregory J. Rattray, Strategic Warfare in Cyberspace, MIT Press, Cambridge, Mass., 2001.
- Jason Barkham, "Information Warfare and International Law on the Use of Force," New York University International Law and Politics 34:57-113, 2001
- Michael Schmitt, "Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework," Columbia Journal of Transnational Law 37:885-937, 1999
- Lawrence T. Greenberg, Seymour E. Goodman, and Kevin J. Soo Hoo, Information Warfare and International Law, National Defense University Press, 1998
- Roger C. Molander, Andrew S. Riddile, and Peter A. Wilson, Strategic Information Warfare: A New Face of War, National Defense Research Institute, RAND, Washington, D.C., 1996
Russia v Georgia
- Russia's cyber blockade of Georgia worked. Could it happen here?, CW 4/28/2009
- Russian 'cybermilitia' knocks Kyrgyzstan offline, CNET 1/29/2009
- Estonia helps Georgia fight hackers, Globe and Mail 8/28/2008
- Kids, not Russian government, attacking Georgia's Net, says researcher, CNET 8/19/2008
- Website of Georgian President Under Attack, Political Motivation Suspected, CircleID 7/21/2008
- Lithuania Attacked by Russian Hacktivists, 300 Sites Defaced, CircleID 7/8/2008
Estonia
- Estonian ISP cuts off control servers for Srizbi botnet, CW 12/2/2008
- Estonia helps Georgia fight hackers, Globe and Mail 8/28/2008
- The Estonia cyberwar: One year later, CNET 5/22/2008
- NATO backs cyber defence centre, Globe and Mail 5/15/2008
- Student fined for attack against Estonian Web site, CW 1/24/2008
- Estonian Cyber-War Highlights Civilian Vulnerabilities, eweek 8/9/2007
- Estonian Premier Says Internet Attacks Not Acceptable, Bloomberg 5/25/2007
- Estonia recovers from massive DDoS attack, CW 5/18/2007
Russia
- Russians Wage War On Chechen Websites Reuters 11/15/02
"Another example is India and Pakistan engaging in a cyber protest caused by national and ethnic difference. After a cease-fire in the Kashmir Valley hackers took it upon themselves to continue the hostilities. In 2000, pro-Pakistan hackers defaced more than 500 Indian web sites. Conversely, only one known Pakistani site was hacked by the Indians. ... The group G-Force Pakistan was the most active group claiming involvement in the events." - NIPC, Cyber Protests: The Threat to the US Information Infrastructure p. 5 (Oct 2001)
- Indian hackers target Pakistan, BBC 3/14/03
- Computer Worm Linked to India-Pakistan Cyber-Spat, Reuters 3/14/03
- Indo-Pak war raging in cyberspace, The Times of India - Jan 3, 200
September 11, 2001
- Al Qaeda May Target Cyberspace, Inquirer 12/10/02
- Officials: Net attacks amount to little, CNN 9/9/02
- Hacker Attacks Fail To Materialize, USA Today 8/9/02
- U.S. Monitoring Internet Attacks, USA Today 8/7/02
- Government's NIPC warns of pending cyberattack, NW Fusion 8/7/02
- Alert 02-003: Heightened Awareness Warranted on August 5-6, 2002 By U.S. Website and ISP Administrators, NIPC 8/7/02
- FBI warns of hacker attacks, CNET 8/7/02
- Bin Laden Hunt Enters Cyberspace, Vnunet 7/26/02
- Al Qaeda Cyber Alarm Sounded, FCW 7/26/02
- U.S. Finds Clues To Potential Cyber-Attack, Wash Post 6/28/02
- Worries Mount Over Terrorist Cyber Assault, Newsfactor 6/28/02
- Secret site helps U.S. commanders, CNN 6/3/02
- FBI To Websites: Pull Pearl Video, TechTV 5/29/02
- U.S. Says Afghan Foes Used Web, Had Money to Burn , Reuters 3/19/02
- Al Qaeda Seen Using Web To Regroup, Reuters 3/6/02
- Intercepted Al Qaeda E-Mail Is Said to Hint at Regrouping, nyt 3/6/02
- Bin Laden's online foe extradited on suspicion of fraud, Guardian 1/22/02
- Singapore blasts anti-government, pro-Osama sites, CNN 1/22/02
- Report: Cyberspace ripe for terrorist attacks, USAToday 1/7/02
- Al-Qaida Cyber Capability, OCIPEP 1/7/02
- Pentagon Looks To Civilian IT For Clues, EWeek 11/19/01
- U.S. Cyber Defense Lagging, INews 11/19/01
- U.S. official warns of future attacks on vital computer systems, Nando 11/19/01
- White House Casting Cyber Nets, FCW 11/19/01
- Experts Warn Of Cyberterror Threat, Newsfactor 11/13/01
- Cybersecurity czar: Protect Net info, CNN 11/9/01
- Private-sector IT key in war on terrorism, CW 11/9/01
- Digital Pearl Harbor, Wash post 11/5/01
- U.S. prepares for cyberwar, CNN 11/9/01
- Attacks from the heart of the net, BBC 10/30/01
- Teen hacker hunts Bin Laden Money, Guardian 10/30/01
- High-tech arsenal deployed in terrorist hunt, USA Today 10/30/01
- Taliban Web Sites Remain Online, Wash Tech 10/30/01
- Gilmore Warns Congress of Cyberattack Threat, Washtech 10/18/01
- New computer worm preys on anthrax scare, Times India 10/18/01
- Pentagon is probably jamming GPS in Afghanistan, experts say, CW 10/26/01
- MI5 posts terror appeal on Arab Websites, Guardian 10/26/01
- Hacker 'Bombs' Missing Targets, Newsfactor 10/26/01
- U.S. Government Web Site Jabbed by 'Gforce', Newsfactor 10/26/01
- MI5 turns to Newsgroups to find Bin Laden Supporters, Register 10/26/01
- Pakistani Hackers Attack U.S. Gov. Site, Reuters 10/26/01
- Pakistani hackers attack U.S. government site, USAToday 10/26/01
- Online Agitators Breaching Barriers, Newsbytes 10/25/01
- Cyber Warriors Gun For Bin Laden, Reuters 10/22/01
- Anti-Taliban internet users attack wrong target, Newfactor 10/5/01
- 5 Thoughts About Cyberterrorism, Darwin 10/26/01
- Bush Panel To Fight Cyberterror, FCW 10/18/01
- U.S. Is Unprepared For IT Warfare, CW 10/12/01
- Hacked Bank Denies Ties To Bin Laden, Newsbytes 10/12/01
- Hackers Claim Arab Bank Breach, Newsbytes 10/12/01
- Net Security Beefed Up to Thwart Possible Cyberterrorism, Newsfactor 10/12/01
- Computer experts warn of attack, CNEWS 10/10/01
- Experts warn of combo terrorist assault, cyber attack, CNN 10/10/01
- FBI Warns IT World To Brace Itself, CW 10/10/01
- Experts warn of terrorist cyber attack, India Times 10/10/01
- U.S. to Intensify Effort Against Threat of Computer Terrorism, LATimes 10/10/01
- Computer experts warn Congress of cyber terrorism threat, Nando 10/10/01
- Hacker Launches Anti-Terrorism Effort, Newsbytes 10/10/01
- Cyberspace Could Be Next Target, USAToday 10/10/01
- White House Names Cyberspace Security Adviser, Washtech 10/10/01Chaos: The Coming Technology War, Newsfactor 9/25/01
- Experts fear Web wars, CNEWS 9/28/01
- Hackers urged not to deface Middle Eastern sites, USAToday 9/28/01
- Key U.S. Computer Systems Called Vulnerable to Attack, Washtech 9/28/01
- Experts Issue Warning On WTC Worm, Newsbytes 9/25/01
- Virus that exploits World Trade Center terror Unleashed, NWFusion 9/25/01
- New E-Mail Virus Exploits World Trade Center Tragedy, Standard 9/25/01
- Experts Issue Warning On WTC Worm, Washtech 9/25/01
- Hackers 'Branded As Terrorists', BBC 9/28/01
- US computer networks at risk, BBC 9/28/01
- Net freedom fears 'hurt terror fight', BBC 9/28/01
- Hackers Sabotage Web Sites They Blame for Terrorism, Newsfactor 9/28/01Voter Virus Hits Internet E-Mail, ABC 9/25/01
- Attacks Computer Virus Identified, AP 9/25/01
- Computer World Wary of Cyber Attack, AP 9/21/01
- Companies Examine Cyber-security, CNN 9/21/01
- U.S. could use cybertactics to seize bin Laden's assets, CW 9/21/01
- Hackers Strike Middle Eastern Sites, USAToday 9/20/01
- FBI Warns Of Increased Activity By 'Patriotic Hacktivists', Newsbytes 9/17/01
- Computer world on guard for cyber attacks, CNN 9/21/01
- U.S. Vs. Bin Laden In Cyberwar?, CW 9/21/01
- Businesses prepare to combat cyberterrorism, Nando 9/21/01
- "Increased Cyber Awareness", NIPC 9/14/01
- Could cyber attack be next?, USAToday 9/13/01
- Prepare For 'Electronic Pearl Harbor', Newsfactor 9/13/01
- Firms Warned About Cyberattacks, CW 09/12/01
- Companies Urged to Prepare for Cyberterrorism, Standard 09/12/01
Former U.S. Official: Prepare for 'Electronic Pearl Harbor', Newsfactor 09/12/01
China - US
"One high profile incident occurred in May 1999 after the United States accidentally bombed the Chinese embassy in Belgrade, Yugoslavia during the NATO air campaign. US web sites were defaced in the name of china and massive email campaigns were executed to gain sympathy and support for the Chinese cause. Government web sites were primarily targeted. The US Departments of Energy and the Interior, and the National Park Service all suffered web page defacements. In addition, the White House web site was taken down for three days after it was continually mail bombed. This action was relatively unorganized in fashion, short in length, and affected a small number of US sites.
"Pro Chinese hackers also acted against Taiwan during the Taiwanese presidential elections in August and September 1999. Cyber protects and hacktivists compromised 165 Taiwanese web sites, mainly defacing them, over the two month period. Their ultimate goal, as it was stated, was to negatively affect and bring own Taiwan's infrastructure. Among the targeted sites were electricity, economic institutions, telecommunications, and air traffic control. Although teams began to develop and organize near the end of the operations, the damage was relatively light, similar to the attacks on US sites earlier in the year. Importantly, strategic targeting and some organization of forces became accepted strategies for future protests and hacks. These hackers are likely to become more organized and more successful in future incidents.
"In late April and early May 2001 Pro-Chinese hacktivists and cyber protesters began a cyber assault on US web sites. This resulted from an incident in early April where a Chinese fighter was lost at sea after colliding wide a US naval reconnaissance airplane. It also coincided with the two-year anniversary of the Chinese embassy bombing by the United States in Belgrade and the traditionally celebrated May Day and Youth Day in China. Led by the Honkers Union of China (HUC), Pro-Chinese hackers defaced or crashed over 100 seemingly random web sites, mainly .gov, and .com, through DoS attacks and similar exploits. Although some of the tools used were sophisticated, they were readily available to both sides on the Internet.
"Many defacements of US sites included posting pictures of the dead Chinese pilot Wang Wei and profane messages calling for the downfall of the United States. Pro-United States hackers responded with similar defacements, messages, and damage on 300 Chinese web sites. Of interest is that some pro-Chinese hackers violated hacker etiquette by wiping some compromise servers. The rule of thumb is to deface or crash a web site but to leave the information intact, otherwise it is considered bad form." - NIPC, Cyber Protests: The Threat to the US Information Infrastructure (Oct 2001)
Official: 'Massive' Damage to China From Hacking, Wash Post 9/12/2007 China denies Pentagon cyber-raid, BBC 9/4/2007 China seen seeking to hack U.S. systems, MSNBC 4/26/02 Report: U.S. Expecting Chinese Hack Blitz, Newsfactor 4/26/02 Worries of Cyberattacks on U.S. Are Aired, Wash Tech 4/26/02 Chinese Hack U.S. Computer Systems, MSNBC 4/26/02 Red Alert Over Digital Warfare On The Net, BWO 5/1/01 It's an All-Out Cyber War as U.S. Hackers Fight Back at China, Fox 5/1/01 Is This World Cyber War I?, Wired 5/1/01 Chinese Hackers May Launch Anti-U.S. Cyber Attacks, Reuters 4/27/01 Feds Warn Of China May Day Attacks On U.S. Sites, CNN 4/27/01 China Sounds Fresh Hacking Alarm, Reuters 5/4/01 US Facing Chinese Cyber Blitz, BBC 5/3/01 US And Chinese Hackers Trade Blows, BBC 5/1/01 Hackers Hit California Offices' Web Sites, LA Times 5/1/01 Chinese hackers launch week long cyber attack, Nando 5/1/01 Experts Yawn Over US-China Hacker War, Newsbytes 5/1/01 Chinese Hackers Launch Web-Site Attacks, Washtech 5/1/01 Businesses warned of Chinese hackers' planned 'strike', Nando 4/27/01 NIPC warns companies of Chinese hacker threat, CW 4/27/01
Israel - Palestine
"In October 2000, Israeli and Palestinian hackers engaged in adversarial hacking when the prolonged peace talks between the two groups broke down. During this difficult time, hackers seized the opportunity to attack web sites belong to the opposition. Starting October 6, 2000, 40 Israeli web sites and at least 15 Palestinian web sites suffered defacements at the hands of opposing hackers. This coincided, of course, with physical violence in the region. It was also a problem for US based web sites. US web sites will often fall victim, regardless of their lack of proximity or involvement in the events. For example, several US sites were hacked by pro-Palestinian hacktivits, including the take down of a lobbyist group web site. The hackers then posted group membership information and credit card numbers. This activity did little to affect the United States as a whole although it illustrates how a seemingly unrelated event can potentially affect US sites.
"The level of sophistication ranged from low level activity using simple defacement to coordinated, relatively sophisticated attacks such as potential root access penetrations. Several hacking tools were developed specifically for this engagement. Any type of attack was considered during this time, including perpetration of viruses, DoS attacks with email bombing, and sustained, amplified pinging attacks. Web sites containing these various hacking tools were readily available for download to anyone who wanted to join the action.
"Pro-Palestinian hackers hit any type of Israeli site that they were able to compromise, many times defacing them with messages such as, "Free Palestine" or "Free Kashmir." FloodNet software was a major tool used by the Israelis. The cyber protesters simply visited a site and FloodNet would repeatedly send requests to the targeted server. This type of virtual sit-in is a popular form of a DoS attack. Many of these attacks were successful as servers were bombarded and went down repeatedly. Targets included ethnic specific organizational web sites and those of financial institutions to disrupt the infrastructure. Ecommerce sites crashed and there was an economic impact reflected in Israeli markets. It was, however, the root access attempts that were the most dangerous for the defenders. Hackers who can gain root access to sites give them unlimited freedom to do whatever they wish. This is the highest level of penetration possible although no successful root access penetrations were reported.
"These events attracted a wide variety of hackers eager to join the fight. Both sides were well-organized and used reconnaissance and intelligence gathering techniques to maximize their effectiveness. Even outside hacking groups, such as G-Force Pakistan, joined forces with the Palestinians to lend a helping hand. This is increasingly common. Some outside groups join an effort because they have similar political or ethnic motivations, however, this is not always the case. Some groups participate in hacks simply for the desire to hack or the publicity, not out of a sense of loyalty."
- NIPC, Cyber Protests: The Threat to the US Information Infrastructure (Oct 2001)Israel Blocks Palestinian ISP, Wired 7/17/02 Mideast strife echoed online, Nando 4/22/02 Middle East Conflict Spills Into Cyberspace, Register 4/17/02 Israel under hack attack, BBC 4/17/02 Israel's Seminar On Cyberwar Jan 10 wired Mideast cyberwar hits U.S. Nov 3, 2000 usatoday Israelis Hackers Vow To Defend Nov 15, 2000 wired FBI: Mideast Hackers May Strike U.S. Sites Nov 2, 2000 cnet Hackers target U.S. pro-israel site Nov 3, 2000 mercurycenter Mideast cyberwar hits U.S. Nov 3, 2000 usatoday Mideast Trouble Spills Into Cyberspace Oct 31, 2000 abcnews FBI: Mideast cyberwar could reach U.S. Oct 31, 2000 usatoday Israeli government, army Web sites crash after hostile hits Oct 26, 2000 cnn
Serbia Internet unites Kosovo foes, BBC 4/22/02 'Serb hackers' on the rampage BBC 4/14
Japan "Recently, Japan has been targeted twice in online protests. During the first week of April, 2001, pro-Korean hackers attacked Japanese organizations responsible for the approval of a new history textbook. The textbook glossed over atrocities committed by Japan during World War II and the occupation of China and South Korea. The perceived reluctance of Japan to accept responsibility for its actions triggered these events. The main participants in this incident were Korean University students, who used email bombs in a DoS attack. The students crashed several web sites, including Japan's Education Ministry, Liberal Democratic Party and the publishing company responsible for the textbook. These attacks were neither long lasting nor were they largely organized."In Early August 2001, Pro-Chinese hackers targeted Japanese web sites after Japan's Prime Minster visited a controversial war memorial, the Yasukuni Shrine. In a brief period of time, hackers defaced several web sites belonging mainly to Japanese companies and research institutes. This indicates the continuing willingness of pro- Chinese hackers to use cyberspace and hacking tools as a platform for protests and cyber civil disobedience, as well as for displaying a strong sense of patriotic nationalism." --- NIPC, Cyber Protests: The Threat to the US Information Infrastructure (Oct 2001)
Books
cyberwarcyberwar
- In Athena's Camp, Chapter 2: Cyberwar is Coming 1997
News
- GAO faults Pentagon cyber efforts, WAPO 7/28/2011
- Government Experts Confirm Nation's Critical Infrastructure Vulnerable to Cyber Threats, House Commerce 7/28/2011
- Pentagon declares cyberspace a new warfare domain, Globe and Mail 7/15/2011
- U.S. military wants to 'protect' key civilian networks, CNET 7/15/2011
- Pentagon hit by huge cyber attack, BBC 7/15/2011
- Critics: U.S. cybersecurity plan has holes, few new items, CW 7/15/2011
- China says no cyber warfare between it, U.S., Globe and Mail 6/22/2011
- Pentagon building Internet simulator to practice cyberwar, CW 6/22/2011
- Cyber Attacks May Be 'Acts Of War', NPR 6/6/2011
- US New Cybersecurity Strategy Includes Military Option, Circleid 5/20/2011
- Cyber war exaggerated says expert, BBC 2/16/2011
- Volunteer Cyber Army Emerges In Estonia, NPR 1/4/2011
- Stuxnet apparently as effective as a military strike, Ars Technica 12/17/2010
- 'Cyber war will hit all web users', BBC 12/10/2010
- Iranian Cyber Army running botnets, researchers say, CW 10/27/2010
- Jay P. Kesan, Carol M. Hayes, Thinking Through Active Defense in Cyberspace, SSRN NAS 2010, SSRN 10/21/2010
- The Militarization of the Internet, Crawford 10/21/2010
- Michael Chertoff: Respond to Cyberattacks With Overwhelming Force, Apply Cold War Principle, Circleid 10/15/2010
- Thresholds for Cyberwar, CSIS 10/4/2010
- Cyber Command chief proposes secure network for government, key industries, WAPO 9/24/2010
- Cyberwar Chief Calls for Secure Computer Network, NYT 9/24/2010
- Pentagon Disbands Network Warfare Shop, Wired 8/16/2010
- U.S. General Details the Impact of Cyber War, Internet News 7/30/2010
- FBI sought data on Defcon 'social engineering' contest, CW 7/30/2010
- Former NSA Director: Hold Nations Responsible for Cyberattacks, Period, Wired 7/30/2010
- Cyberwar vs No Cyberwar, Circleid 7/28/2010
- Cyber-war, BBC 6/17/2010
- Jeer, Cheer, and Heckle the New Cyber Commander - Live!, Wired 6/4/2010
- Cyber Command: We Don't Wanna Defend the Internet (We Just Might Have To), Wired 6/1/2010
- U.S. CyberCom launches with first commander, CNET 5/25/2010
- Senators question Cyber Command's role, CW 4/16/2010
- Air Force to add cyberwarfare training, CNET 4/16/2010
- U.S. Cyber Command prepped to launch, CNET 3/24/2010
- White House Cyber Czar: 'There Is No Cyberwar', Wired 3/9/2010
- Cyberwar Hype Intended to Destroy the Open Internet, Wired 3/2/2010
- etc: The US Navy now has its own cybersecurity organization, the US Fleet Cyber Command., Ars Technica 2/4/2010
- Is the U.S. Headed for a Cyber War?, Internet News 1/28/2010
- Pentagon computer-network defense command delayed by congressional concerns, Wash Post 1/5/2010
- Not Just Drones: Militants Can Snoop on Most U.S. Warplanes, Wired 12/18/2009
- Age of cyber warfare is 'dawning', BBC 11/17/2009
- A case for cyberwarfare?, Net Effect 8/27/2009
- Homeland Security Geek Squad: No Power, No Plan, Lots of Vacancies, Wired 6/17/2010
- Cyberattacks push CSIS to reach out to business, Globe and Mail 3/9/2010
- Lackland chosen as cyber numbered Air Force headquarters, AFCYBER 5/19/2009
- Officials say cyber defense costly, AFCYBER 4/14/2009
- Pentagon Official Warns of Risk of Cyber Attacks, Wash Post 3/18/2009
- AFOTEC announces mission realignment, AFCC 2/10/2009
- FBI: Several nations eye U.S. cybertargets, CW 10/15/2008
- One year later: Provisional team lays groundwork for Air Force cyber mission assurance, AFCYBER 10/2/2008
- What's the Cyber in Cyber-Security?, Freedom to Tinker 7/24/2008
- Symposium gets to core of AF role in cyberspace, AFCYBER 7/21/2008
- Air Force works to defend cyberspace, too, AFCC 7/3/2008
- Unit becomes Cyberspace Technical Center of Excellence, AFCC 6/30/2008
- Cyberattack Paralyzed Marshall Islands Email Service, CircleID 6/24/2008
- Statement of the Honorable Frank R. Wolf (R-10th) on House Resolution 1263, Privileged Resolution on Cyber Attacks against House Computer Systems, references the CIP Program, CIP 6/13/2008
- An Imperfect (Cyber) Storm, Internet News 4/10/2008
- DHS offers first take on Cyber Storm exercise, CW 4/10/2008
- U.S. reveals plans to hit back at cyberthreats, CNET 4/8/2008
- Chertoff on Cybersecurity: 'Reverse Manhattan Project' Needed, Ecommerce Times 4/10/2008
- Hackers Bring Down Panama Assembly`s Web Site, eweek 1/22/2008
- CIA says hackers pulled plug on power grid, CW 1/22/2008
- CIA Claims Cyberattacks At Fault In Blackouts, Techdirt 1/22/2008
- Could U.S. be at risk for cyberwarfare?, CW 9/21/2007
- Coming attractions for history's first cyberwar, CNET 6/15/2007
- NATO Ministers To Tackle Internet Attacks, Newswire 6/15/2007
- NATO Rallies to Thwart Global Cyber Bullies, Ecommerce Times 6/15/2007
- Could the U.S. repel a cyberattack?, USA Today 6/8/2007
- China Prepares for First Strike in Electronic War, eweek 6/1/2007
- When cyberattacks are politically motivated, CNET 5/30/2007
- Feds take 'cyber Pearl Harbor' seriously, FCW 5/30/2007
- Attacks Possible on Stock Market and Bank Web Sites, NYT 12/1/2006
- U.S. Reports Unconfirmed Cyber Threat, Wash Post 12/1/2006
- Asia Pacific countries hatch plan to thwart cyber attacks, AFP 7/28/2006
- Should the Government Prepare a Preemptive Cyber-Attack?, CircleID 9/20/2005
- The Web as Weapon, Wash Post 8/9/2005
- U.S. Nets Reportedly Attacked Via Chinese Web Sites, Internet Week 8/30/2005
- Air Force seeks cyberwar edge, FCW 12/21/2004
- Experts: Devastating U.S. Cyber-Attack Within 10 Years, clickz 1/11/2005
- Concerns Mount over Major Web Strike, eweek 8/25/2004
- Virtual jihad, Jerusalem Post 5/7/2004
- 'There's only one way to stop terrorists using net' - UK Foreign Secretary Jack Straw, BBC 10/1/01
- Cyberwar, NPR Frontline 5/7/2004
- Pentagon axes online terror bets, BBC 7/30/03
- Defense Department lacks data on cyberterror threat, Govexec 7/25/03
- US seeks right to wage cyberwar on whoever it likes, Inquirer 1/7/03
- Bush Considering Cyber Warfare, Internet News 2/7/03
- Bush reportedly orders cyberwarfare plan, CNET 2/7/03
- Bush gives the go-ahead for cyber attack strategy, The Hindu 2/7/03
- U.S. commanders rehearse with war sim, Mercury 1/31/03
- Study: Most cyber attacks originate in U.S., Israel, USA Today 1/28/02
© Cybertelecom ::U.S. leads in launch of cyberattacks, CNET 1/28/02 Rights Group Decries Internet Guerilla Warfare, Newsfactor 9/6/02 Mock Cyberwar Fails To End Civilization, Register 8/14/02 S. Korean Activists Plan Cyber Attack Vs. U.S., USAToday 7/17/02 The Coming Of The CyberWar, Newsfactor 5/17/02 Cyberattack Could Result In Military Response, USA Today 2/15/02 Sen. Wyden Proposes Volunteer Tech Guard, Wash Tech 12/10/01 Tech warning: we are at war, ZDNet 12/14/01 Bush taps Clarke as cyberdefense chief, CW 10/1/01 Will hacking become the new warfare?, CNET 6/21/01 Cyberspace: The next battlefield, USA Today 6/19/01 Potential Cuban cyberattacks alarm U.S. officials, USAToday 5/16/01 Cyberwars: Real-World Conflict On Web, Smart Business 2/16/01 Feds Say Fidel Is Hacker Threat, Wired 2/9/01