Difference between revisions of "Espionage"

From Cybersecurity Wiki
Jump to navigation Jump to search
Line 13: Line 13:
 
Nye, Joseph (2010) [[Cyber Power]]
 
Nye, Joseph (2010) [[Cyber Power]]
  
Todd, Graham H. (2009) [[Armed Attack in Cyberspace]]
 
  
 
{| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;"
 
{| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;"
Line 28: Line 27:
 
|-
 
|-
 
|Deputy Chief of Staff for Intelligence||||2006||[[Critical Infrastructure Threats and Terrorism]]||Government Report||Low:Organizational Analysis; Low:Risk Management||[http://www.fas.org/irp/threat/terrorism/sup2.pdf  ''Pdf'']
 
|Deputy Chief of Staff for Intelligence||||2006||[[Critical Infrastructure Threats and Terrorism]]||Government Report||Low:Organizational Analysis; Low:Risk Management||[http://www.fas.org/irp/threat/terrorism/sup2.pdf  ''Pdf'']
 +
|-
 +
|Todd, Graham H.|| ||2009||[[Armed Attack in Cyberspace]]||Law Review||Moderate:Law||[http://www.afjag.af.mil/shared/media/document/AFD-091026-024.pdf ''Pdf'']
 
|}
 
|}
  

Revision as of 17:07, 11 August 2010

TOC-> Issues->Espionage

Brown, Davis (2006) A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict

Center for Strategic and International Studies (2008) Securing Cyberspace for the 44th Presidency

Department of Defense (2007) Mission Impact of Foreign Influence on DoD Software

Department of Defense Office of General Counsel (1999) An Assessment of International Legal Issues in Information Operations

Hollis, Duncan B. (2007) Why States Need an International Law for Information Operations

Nye, Joseph (2010) Cyber Power


Author 1 Author 2 Year Title Source Expertise Full Text
Anderson, Ross J. 2008 Security Engineering Book Moderate:Technology; Moderate:Cryptography N/A
Deputy Chief of Staff for Intelligence 2006 Critical Infrastructure Threats and Terrorism Government Report Low:Organizational Analysis; Low:Risk Management Pdf
Todd, Graham H. 2009 Armed Attack in Cyberspace Law Review Moderate:Law Pdf

Jump to Table of Contents