Difference between revisions of "Espionage"

From Cybersecurity Wiki
Jump to navigation Jump to search
Line 10: Line 10:
  
 
Hollis, Duncan B. (2007) [[Why States Need an International Law for Information Operations]]  
 
Hollis, Duncan B. (2007) [[Why States Need an International Law for Information Operations]]  
 
Nye, Joseph (2010) [[Cyber Power]]
 
 
  
 
{| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;"
 
{| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;"
Line 27: Line 24:
 
|-
 
|-
 
|Deputy Chief of Staff for Intelligence||||2006||[[Critical Infrastructure Threats and Terrorism]]||Government Report||Low:Organizational Analysis; Low:Risk Management||[http://www.fas.org/irp/threat/terrorism/sup2.pdf  ''Pdf'']
 
|Deputy Chief of Staff for Intelligence||||2006||[[Critical Infrastructure Threats and Terrorism]]||Government Report||Low:Organizational Analysis; Low:Risk Management||[http://www.fas.org/irp/threat/terrorism/sup2.pdf  ''Pdf'']
 +
|-
 +
|Nye, Joseph||||2010||[[Cyber Power]]||Book Excerpt||Low:Technology; Low:Policy||[http://belfercenter.ksg.harvard.edu/files/cyber-power.pdf ''Pdf'']
 
|-
 
|-
 
|Todd, Graham H.|| ||2009||[[Armed Attack in Cyberspace]]||Law Review||Moderate:Law||[http://www.afjag.af.mil/shared/media/document/AFD-091026-024.pdf ''Pdf'']
 
|Todd, Graham H.|| ||2009||[[Armed Attack in Cyberspace]]||Law Review||Moderate:Law||[http://www.afjag.af.mil/shared/media/document/AFD-091026-024.pdf ''Pdf'']

Revision as of 17:15, 11 August 2010

TOC-> Issues->Espionage

Brown, Davis (2006) A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict

Center for Strategic and International Studies (2008) Securing Cyberspace for the 44th Presidency

Department of Defense (2007) Mission Impact of Foreign Influence on DoD Software

Department of Defense Office of General Counsel (1999) An Assessment of International Legal Issues in Information Operations

Hollis, Duncan B. (2007) Why States Need an International Law for Information Operations

Author 1 Author 2 Year Title Source Expertise Full Text
Anderson, Ross J. 2008 Security Engineering Book Moderate:Technology; Moderate:Cryptography N/A
Deputy Chief of Staff for Intelligence 2006 Critical Infrastructure Threats and Terrorism Government Report Low:Organizational Analysis; Low:Risk Management Pdf
Nye, Joseph 2010 Cyber Power Book Excerpt Low:Technology; Low:Policy Pdf
Todd, Graham H. 2009 Armed Attack in Cyberspace Law Review Moderate:Law Pdf

Jump to Table of Contents