Cc Index.Pdf

Total Page:16

File Type:pdf, Size:1020Kb

Cc Index.Pdf Index Symbols 2010 Times Square car bombing attempt, 189 song), 123 2011 f8 Conference, 173) صلاخ قشع 강남스타일 (song), 123 2011 State of the Union Address, 184 Biдлyння мpiй (song), 123 2011 USENIX Security Symposium, 315 #JewsAndArabsRefuseToBeEnemies, 125 2012 Aspen Security Forum, 206, 301 #myfirstpaycheck, 276 2012 Benghazi attack, 12, 86 /dev/ttyS0, 217 2012 Black Hat Conference, 189, 217, 256 2012 presidential election, 184 2012 RSA Conference, 202 0–9 2013 Black Hat conference, 82 4Deck, 425 2013 RSA conference, 174 7 Seconds (song), 123 2013 State of the Union Address, 111 9/11 attacks, 3, 12, 38, 46 2013 TechCrunch Disrupt Conference, 174 9/11 Commission, 28 2014 Black Hat Conference, 268 9/11 Commission Report, 52 2014 DEF CON Diversity Panel, 313 12 Years a Slave (film), 223 2014 RSA conference, 175 24 2015 Consumer Electronics Show, 15, 231, Live Another Day, 78, 227 312 24 (TV series), 8, 26, 78, 80 2015 DEF CON Diversity Panel, 314 64-bit counter, 123 100 Day Plan for Integration and Collaboration, 32 A 198 methods of nonviolent action, 88, 95 @AP, 203 500 Day Plan for Integration and Aaron Brothers, 258 Collaboration, 32 Aaron’s, 269 1983 Beirut barracks bombing, 63 Aaron’s Law, 316 1984, 141 Abbott, Tony, 99 1984 National Security Decision Directive Abbas, Mahmoud, 62, 76 138, 136 Abbottabad, Pakistan, 11, 53, 220 1985 Beirut car bombing, 63 ABC, 48, 84 1996 Summer Olympics, 55 Abduction, 328 2001 Abortion clinics, 60 A Space Odyssey, 324 Abu Ghraib, 61, 118 2003 Northeast blackout, 207 Academy Award, 46, 123, 125 2008 presidential campaign, 212 Accumulo, 214 2009 Supplemental-War Funding Bill, 159 Accuvant, 217 2010 Flash Crash, 435 Achieve Cybersecurity Together, 252, 254 © Springer International Publishing Switzerland 2015 457 N. Lee, Counterterrorism and Cybersecurity, DOI 10.1007/978-3-319-17244-6 458 Index ACK. See Acknowledgement Air Force Intelligence, Surveillance, and Acknowledgement, 352 Reconnaissance, 32 ACLU. See American Civil Liberties Union Air Force Research Laboratory, 49 ACM. See Association of Computing Air traffic control, 215, 315 Machinery Aitel, Dave, 274 ACM Computers in Entertainment, 122 Akdogan, Yalcin, 62, 88 Acquired immune deficiency syndrome, 337 Al-Abadi, Haider, 52 ACT. See Achieve Cybersecurity Together Al-Aqsa Mosque, 59 Ada, 213, 215 Al-Ashja’i, Rakan, 83 Ad Age, 185 Al-Asiri, Ibrahim, 53 Ada Mandate, 213 Al-Assad, Bashar, 221, 222 Ada Programming Support Environment, 4, Al-Awlaki, Anwar, 49, 53, 60, 87, 193 213 Al-Bahri, Nasser, 26, 80 ADAMS. See Anomaly Detection at Multiple Albert Einstein Institution, The, 89 Scales Albright, Madeleine, 63 Addams Family, The (film), 229 Alcoa, 224 Address Resolution Protocol, 208 Aldrin, Buzz, 126 Address Space Layout Randomization, 267 Alexander, Keith, 82, 169, 206, 249, 272, 301, Adebolajo, Michael, 225 309, 313 Adebowale, Michael, 225 Algeria, 54, 62 Adichie, Chimamanda Ngozi, 45, 62, 64, 81 Al-Hazmi, Nawaf, 25, 28 Adobe, 256, 257 Alijazeera, 56 Adobe Acrobat, 267 Ali, Wajahat, 77 Adobe Flash, 267 Al-Jaabari, Ahmed, 109 Adobe Reader, 267 Al Jazeera, 23, 77, 88 ADS-B. See Automatic Dependent Alkemade, Thijs, 271 Surveillance - Broadcast system Alkhouri, Laith, 47 Advanced Research Projects Agency, 136 Allah, 49 Advanced Research Projects Agency Network, Allegheny Technologies, 224 137 Allen, Ernie, 157 Advanced persistent threat, 202 Al-Libi, Abu Yahya, 12, 76 AeroVironment, 186 Al-Mihdhar, Khalid, 25, 28, 142 Aesop, 29, 75, 80 Al-Muslimi, Farea, 45, 51 AFDI. See American Freedom Defense Al-Najadi, Abu Mus’ab, 56 Initiative Alperovitch, Dmitri, 221, 223, 255 A Few Good Men (film), 21 Al-Qaeda, 11, 34, 49–52, 54, 58, 61, 74, 142, Afghanistan, 11, 39, 47, 50, 54–56, 59, 61, 74, 190, 202, 225 87, 108, 110, 111, 212, 227, 327 Al-Qaeda in the Arabian Peninsula, 8, 60 Afghan Peace Volunteers, 81, 108 Al-Qaeda in the Islamic Maghreb, 54 AF ISR. See Air Force Intelligence, Al-Qaradawi, Yusuf, 58 Surveillance, and Reconnaissance Al-Quso, Fahd, 26 AFP. See Australian Federal Police Al-Raimi, Qassim, 8 African, 123 Al-Sharia, Ansar, 12, 76 Aftergood, Steven, 85 Alternative energy, 137 Agent.btz, 212 Al-Wuhayshi, Basir, 60 Ahmad, 158 Al-Zawahiri, Ayman, 54 A Higher Call, 111 Alzheimer’s disease, 337 AI. See Artificial intelligence Amanpour, Christiane, 52 A.I. Amazon.com, 202, 257, 259, 261, 264 Artificial Intelligence (film), 324 Ambassador, 125 AIDS. See Acquired immune deficiency AMC, 13, 206, 229 syndrome Amelie (film), 123 Air Force Institute of Technology, 308 America at war, 9 AIG. See American International Group American, 46 Index 459 American Civil Liberties Union, 152, 157, 316 Arab-Israeli conflict, 121 American Civil War, 111 Arabic, 123 American Freedom Defense Initiative, 87 Arabic language, 26, 143 American International Group, 227 Arab Spring, 54, 95, 192 American Muslim, 59 Arafat, Yasser, 146 American Revolution, 81 Aramco, 221 American Sniper, 74 Arash. See Labaf, Arash Americans, The (TV series), 46, 223 Arduino, 360, 411 American University, 116 Argentina, 82, 156 America’s Most Wanted, 337 Argo (film), 221 Aminah, 60, 193 Argus, 155 Amnesty International, 50, 118, 262 Ariane 5, 437 Amsterdam, 115 Aristophanes, 96 Analytic Space, 193 Arkin, Brad, 257 Analytical models, 329, 330, 332, 333 Armstrong, Neil, 122, 126 Anarchist terrorism, 54 Armstrong, Tim, 177 Anderson Cooper 360°, 38 Army Intelligence, 32 Anderson, L.V., 96 Arnold, Douglas N., 437 Anderson, Sulome, 125 ARP. See Address Resolution Protocol Android, 187, 218, 309, 315 ARPA. See Advanced Research Projects Andrus, Calvin, 192 Agency Angry Birds Space, 268, 270 ARPANET. See Advanced Research Projects Angry Birds Star Wars, 271 Agency Network Animal Farm (film), 64 ARP spoofing, 208 Annie (film), 228 Arquette, Patricia, 274 Anomaly Detection at Multiple Scales, 156 Arranged marriage, 125 Anonymizer, 161 Arrow III missile, 212 Anonymous, 47, 76, 221, 256, 259, 309, 316 Ars Technica, 218 Ansar al-Sharia, 86 Artificial cardiac pacemaker, 226 Anti-colonial terrorism, 55 Artificial immune system, 451 Anti-malware definitions, 269 Artificial intelligence, 4, 158, 323, 326, 327, 329 Anti-Phishing Working Group, 263 Asia, 119, 188 AOL, 162, 187, 258 Asimov, Isaac, 324 AP. See Associated Press ASLR. See Address Space Layout Apache Foundation, 215 Randomization Apatow, Judd, 228 A-Space, 193 Apollo 11, 122 Aspen Institute Security Conference, 34 Apple, 162, 173, 214, 261, 264, 267, 268 Aspen Security Forum, 74, 332 Apple App Store, 268 Assange, Julian, 85, 86, 173, 186, 191, 193 AppleID, 261 Assassination, 52, 53, 63, 97 Apple malware, 269 Assembly language, 453 Apple Pay, 274 Associated Press, 203 Applied Cryptography, 431 Association for Computing Machinery, 141, App Store, 271 326 APSE. See Ada Programming Support Asymmetrical warfare, 346 Environment Atkins, Christopher R., 83, 191 APT. See Advanced persistent threat Atlanta, 55, 186 APWG. See Anti-Phishing Working Group AT&T, 123, 153, 154, 202 AQAP. See al-Qaeda in the Arabian Peninsula Atta, Mohammed, 26 AQIM. See al Qaeda in the Islamic Maghreb Attack vector, 344 Aquino, Benigno, 116 Auburn University, 308 AR. See Augmented reality Augmented reality, 308 Arab, 125 AUMF. See Authorization for the Use of Arabian Peninsula, 54 Military Force 460 Index Auriemma, Luigi, 261 Barkun, Michael, 60 Aurora, Colorado, 58 Barnes and Noble, 257 Aurora theater shooting, 9 Barr, Tara Lynne, 9 Australia, 98, 156 Barsamian, David, 62 Australian Federal Police, 260 Barstow, Martin, 124 Austria, 59 Base transceiver station, 274 Authorization for the Use of Military Force, Bash shell, 214 63 Basic Input/Output System, 217 Automated Speech and Text Exploitation in Battle for public opinion, 221 Multiple Languages, 147, 156 Battle of Fredericksburg, 109 Automated defenders, 446 Bauer, Jack, 26, 78, 80, 227 Automated teller machine ATM, 184 BBC News, 59, 98 Automated teller machine, 203, 338 Bcrypt, 266 Automatic Dependent Surveillance - Bdeir, Ayah, 312 Broadcast system, 315 BeagleBoard-xM, 425 Automation, 430 BeagleBone, 425 Automobile, 216, 315 BeagleBone Black, 422 Autonomous analysis, 453 Behavioral causality, 331 Autonomous Network Defense, 454 Beirut Marathon Association, 112 Autonomous Patching, 453 Beirut, 63 Autonomous Service Resiliency, 454 Belasco, Amy, 142 Autonomous Vulnerability Scanning, 454 Belgium, 58 AVG, 309 Bell Laboratories, 4, 123, 126, 220 Avner, Carmela, 201, 221 BellSouth, 154 AVR microcontroller, 411 Benghazi, 38 Axelson, Jan, 351, 360 Benghazi, Libya, 12, 38, 54, 76 Azerbauan, 208 Ben-Itzhak, Yuval, 309 Bergen, Peter, 35, 49, 58 Berry, Halle, 8 B Beslan school hostage crisis, 36 Babbage, Charles, 213 Betty Boop, 265 Babylon, 147, 156 BGP. See Border Gateway Protocol Babylonian Empire, 75 Bharara, Preet, 206 Bacile, Sam, 87 Bibi, Mamana, 50 Backdoor, 173, 174, 217 Bidirectional authentication, 264 Backdoor.Agent.RS, 274 Big Brother, 141, 184, 189 Backward chaining, 328 Big data, 184, 214, 326 Bacon, Sir Francis, 78 Big Data Research and Development BadUSB, 349 Initiative, 156, 326 Baghdad, 76 Bill & Melinda Gates Foundation, 74 Bakker, Jim, 77 Bill of Rights, 152 Ballistic Missile Defense System, 218 Bin Abdulaziz, Sultan, 23, 76 Bamford, James, 160 Bin Laden of the Internet, 53, 87, 193 Ban, Ki-moon, 88, 110 Bin Laden raid, 190, 220 Bandwidth, 352 Bin Laden, Osama, 9, 10, 23, 33, 52–54, 56, Bandwidth over-provisioning, 253 59, 76, 78, 81, 98, 190 Bangkok, 28 Bin Laden, Usama. See Bin Laden, Osama Bank fraud, 206 Binney, William, 153 Banking, 215 Bin Rashid Al Maktoum, Mohammed, 82 Bank of America, 221, 253
Recommended publications
  • ASEC REPORT Malicious Code Trend 5 6 Vol.17 Security Trend Web Security Trend
    Disclosure to or reproduction for others without the specific written authorization of AhnLab is prohibited. ASEC Copyright (c) AhnLab, Inc. All rights reserved. REPORT VOL.17 | 2011.6 AhnLab Monthly Security Report AhnLab ASEC (AhnLab Security Emergency Response Center) is a Security global security response group consisting of virus analysts and CONTENTS Emergency security experts. This monthly report is published by ASEC, response and it focuses on the most significant security threats and the latest security technologies to guard against these threats. For 01. Malicious Code Trend 02. Security Trend Center further information about this report, please refer to AhnLab, a. Malicious Code Statistics 05 a. Security Statistics 14 Inc.’s homepage (www.ahnlab.com). - Top 20 Malicious Code Reports - Microsoft Security Updates- May 2011 - Top 20 Malicious Code Variant Reports b. Malicious Code Issues 16 - Breakdown of Primary Malicious Code Types - Comparison of Malicious Codes with - Zeus Source Code Leaked and Spyeye Trend Previous Month - Coreflood, a Banking Trojan - Monthly Malicious Code Reports - Online Banking Hacking Scam - Top 20 New Malicious Code Reports - Breakdown of New Malicious Code Types 03. Web Security Trend b. Malicious Code Issues 10 a. Web Security Statistics 17 - 'Dislike' Button Scam - Web Security Summary - AntiVirus AntiSpyware 2011 Scam - Monthly Blocked Malicious URLs - Scam Emails From Bobijou Inc. - Monthly Reported Types of Malicious Code - Spam Promising Nude Photo Spreads Malware - Monthly Domains with Malicious Code - Osama Bin Laden Themed Malware - Monthly URLs with Malicious Code - Distribution of Malicious Codes by Type - Top 10 Distributed Malicious Codes b. Web Security Issues 20 - May 2011 Malicious Code Intrusion: Website ASEC REPORT Malicious Code Trend 5 6 Vol.17 Security Trend Web Security Trend 01.
    [Show full text]
  • Homeland Threats and Agency Responses”
    STATEMENT OF ROBERT S. MUELLER, III DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS UNITED STATES SENATE AT A HEARING ENTITLED “HOMELAND THREATS AND AGENCY RESPONSES” PRESENTED SEPTEMBER 19, 2012 Statement of Robert S. Mueller, III Director Federal Bureau of Investigation Before the Committee on Homeland Security and Governmental Affairs United States Senate At a Hearing Entitled “Homeland Threats and Agency Responses” Presented September 19, 2012 Good morning, Chairman Lieberman, Ranking Member Collins, and Members of the Committee. Thank you for the opportunity to appear before the Committee today and for your continued support of the men and women of the FBI. As you know, the Bureau has undergone unprecedented transformation in recent years. Since the attacks of September 11th, we have refocused our efforts to address and prevent emerging terrorist threats. The terrorist threat is more diverse than it was 11 years ago, but today, we in the FBI are better prepared to meet that threat. We also face increasingly complex threats to our nation’s cyber security. Nation-state actors, sophisticated organized crime groups, and hackers for hire are stealing trade secrets and valuable research from America’s companies, universities, and government agencies. Cyber threats also pose a significant risk to our nation’s critical infrastructure. As these threats continue to evolve, so too must the FBI change to counter those threats. We must continue to build partnerships with our law enforcement and private sector partners, as well as the communities we serve. Above all, we must remain firmly committed to carrying out our mission while protecting the civil rights and civil liberties of the people we serve.
    [Show full text]
  • The Book of Apigee Edge Antipatterns V2.0
    The Book of Apigee Edge Antipatterns Avoid common pitfalls, maximize the power of your APIs Version 2.0 Google Cloud ​Privileged and confidential. ​apigee 1 Contents Introduction to Antipatterns 3 What is this book about? 4 Why did we write it? 5 Antipattern Context 5 Target Audience 5 Authors 6 Acknowledgements 6 Edge Antipatterns 1. Policy Antipatterns 8 1.1. Use waitForComplete() in JavaScript code 8 1.2. Set Long Expiration time for OAuth Access and Refresh Token 13 1.3. Use Greedy Quantifiers in RegularExpressionProtection policy​ 16 1.4. Cache Error Responses 19 1.5. Store data greater than 512kb size in Cache ​24 1.6. Log data to third party servers using JavaScript policy 27 1.7. Invoke the MessageLogging policy multiple times in an API proxy​ 29 1.8. Configure a Non Distributed Quota 36 1.9. Re-use a Quota policy 38 1.10. Use the RaiseFault policy under inappropriate conditions​ 44 1.11. Access multi-value HTTP Headers incorrectly in an API proxy​ 49 1.12. Use Service Callout policy to invoke a backend service in a No Target API proxy 54 Google Cloud ​Privileged and confidential. ​apigee 2 2. Performance Antipatterns 58 2.1. Leave unused NodeJS API Proxies deployed 58 3. Generic Antipatterns 60 3.1. Invoke Management API calls from an API proxy 60 3.2. Invoke a Proxy within Proxy using custom code or as a Target 65 3.3. Manage Edge Resources without using Source Control Management 69 3.4. Define multiple virtual hosts with same host alias and port number​ 73 3.5.
    [Show full text]
  • A Strategy for Success in Libya
    A Strategy for Success in Libya Emily Estelle NOVEMBER 2017 A Strategy for Success in Libya Emily Estelle NOVEMBER 2017 AMERICAN ENTERPRISE INSTITUTE © 2017 by the American Enterprise Institute. All rights reserved. The American Enterprise Institute (AEI) is a nonpartisan, nonprofit, 501(c)(3) educational organization and does not take institutional positions on any issues. The views expressed here are those of the author(s). Contents Executive Summary ......................................................................................................................1 Why the US Must Act in Libya Now ............................................................................................................................1 Wrong Problem, Wrong Strategy ............................................................................................................................... 2 What to Do ........................................................................................................................................................................ 2 Reframing US Policy in Libya .................................................................................................. 5 America’s Opportunity in Libya ................................................................................................................................. 6 The US Approach in Libya ............................................................................................................................................ 6 The Current Situation
    [Show full text]
  • Google for Education National Parks VR Google Expeditions Google Arts & Culture Be Internet Awesome Made with Code CS First Google Science Fair
    Google For Education National Parks VR Google Expeditions Google Arts & Culture Be Internet Awesome Made with Code CS First Google Science Fair Learn how tools built for teaching and learning, Discover the hidden worlds of our Take a field trip to virtually anywhere (even Explore works of art and stories from around Teach learners the fundamentals of digital Make the connection between coding and Learn the basics of Computer Science using the Create projects that show how Science, like Classroom, G Suite for Education, and National Parks on ranger-guided trips places school buses can’t go) using immersive the world with 360° tours of exhibits in over 70 safety and citizenship so they can be safe, creativity, empowering girls to engage with block-based programming language, Scratch. Technology, Engineering, and Math can be used Chromebooks, can increase engagement through virtual reality. AR and VR technology. different countries. confident explorers of the online world. technology and bring their ideas to life. to impact the world around us. and inspire curiosity. Google for National Google Google Arts Education Parks VR Expeditions & Culture Discover the hidden worlds of Explore works of art and stories Tools built for teaching and learning. Field trips to virtually anywhere. our National Parks. from around the world. Over 80 million teachers and students around the world Take a ranger-guided journey through the glaciers of What if you could journey to the surface of Mars or From The Metropolitan Museum of Art to Nairobi’s communicate and collaborate using Classroom and Alaska’s Kenai Fjords or get up close with active climb to the top of Machu Picchu without ever leaving Kenya National Archives, Google Arts & Culture offers G Suite for Education, while Chromebooks are the most volcanoes in Hawai’i.
    [Show full text]
  • Code Girl Tracey Acosta Santa Clara University
    Santa Clara University Scholar Commons Computer Engineering Senior Theses Engineering Senior Theses 6-1-2015 Code girl Tracey Acosta Santa Clara University Amanda Holl Santa Clara University Paige Rogalski Santa Clara University Follow this and additional works at: https://scholarcommons.scu.edu/cseng_senior Part of the Computer Engineering Commons Recommended Citation Acosta, Tracey; Holl, Amanda; and Rogalski, Paige, "Code girl" (2015). Computer Engineering Senior Theses. 43. https://scholarcommons.scu.edu/cseng_senior/43 This Thesis is brought to you for free and open access by the Engineering Senior Theses at Scholar Commons. It has been accepted for inclusion in Computer Engineering Senior Theses by an authorized administrator of Scholar Commons. For more information, please contact [email protected]. Code Girl by Tracey Acosta Amanda Holl Paige Rogalski Submitted in partial fulfillment of the requirements for the degrees of Bachelor of Science Computer Science and Engineering Bachelor of Science in Web Design and Engineering School of Engineering Santa Clara University Santa Clara, California June 1, 2015 Code Girl Tracey Acosta Amanda Holl Paige Rogalski Computer Science and Engineering Web Design and Engineering Santa Clara University June 1, 2015 ABSTRACT Despite the growing importance of technology and computing, fewer than 1% of women in college today choose to major in computer science.[1] Educational programs and games created to interest girls in computing, such as Girls Who Code and Made With Code, have been successful in engaging girls with interactive and creative learning environments, but they are too advanced for young girls to benefit from. To address the lack of educational, computer science games designed specifically for young girls, we developed a web-based application called Code Girl for girls age five to eight to customize their own avatar using Blockly, an open-source visual coding editor developed by Google.
    [Show full text]
  • Pirates of the Isps: Tactics for Turning Online Crooks Into International Pariahs
    21st CENTURY DEFENSE INITIATIVE CyBER SECuRITy #1 July 2011 Pirates of the ISPs: Tactics for Turning Online Crooks Into International Pariahs Noah Shachtman 1775 Massachusetts Ave., NW Washington, D.C. 20036 brookings.edu Pirates of the ISPs: Tactics for Turning Online Crooks Into International Pariahs Noah Shachtman CyberSeCurity #1 July 2011 21st CENTURY DEFENSE INITIATIVE Acknowledgements every research paper is a group effort, no mat- My Wired.com colleagues—ryan Singel, kevin ter what it says on the byline. this project relied Poulsen, kim Zetter and David kravets—cover more on outside assistance than most. brookings the cybersecurity beat better than anyone. this Senior fellows Peter Singer and ken lieberthal paper would have been impossible without them, were the ones who convinced me to explore the and without brian krebs, master investigator of broad topic of cybersecurity. the panel they as- the online underworld. sembled gave me new insight with every meeting; my colleague allan friedman was an especially bill Woodcock, rick Wesson, Jeff Cooper, tyler invaluable tutor and remarkably generous with Moore, audrey Plonk, Jim lewis, Dmitri alpero- his time. heather Messera and robert o’brien vitch, Paul Nicholas, Jessica herrera-flannigan, provided important research and logistical sup- Jart armin, richard bejtlich, Steve Schleien, Jona- port. My research assistant, adam rawnsley, was than Zittrain and many, many others steered me tireless in his exploration of the minutiae of ev- away from my worst ideas and towards those few erything from tort law to pirate havens. not-so-bad ones. for that, i am deeply in their debt. brookings recognizes that the value it provides to any supporter is in its absolute commitment to quality, independence and impact.
    [Show full text]
  • Hacks, Leaks and Disruptions | Russian Cyber Strategies
    CHAILLOT PAPER Nº 148 — October 2018 Hacks, leaks and disruptions Russian cyber strategies EDITED BY Nicu Popescu and Stanislav Secrieru WITH CONTRIBUTIONS FROM Siim Alatalu, Irina Borogan, Elena Chernenko, Sven Herpig, Oscar Jonsson, Xymena Kurowska, Jarno Limnell, Patryk Pawlak, Piret Pernik, Thomas Reinhold, Anatoly Reshetnikov, Andrei Soldatov and Jean-Baptiste Jeangène Vilmer Chaillot Papers HACKS, LEAKS AND DISRUPTIONS RUSSIAN CYBER STRATEGIES Edited by Nicu Popescu and Stanislav Secrieru CHAILLOT PAPERS October 2018 148 Disclaimer The views expressed in this Chaillot Paper are solely those of the authors and do not necessarily reflect the views of the Institute or of the European Union. European Union Institute for Security Studies Paris Director: Gustav Lindstrom © EU Institute for Security Studies, 2018. Reproduction is authorised, provided prior permission is sought from the Institute and the source is acknowledged, save where otherwise stated. Contents Executive summary 5 Introduction: Russia’s cyber prowess – where, how and what for? 9 Nicu Popescu and Stanislav Secrieru Russia’s cyber posture Russia’s approach to cyber: the best defence is a good offence 15 1 Andrei Soldatov and Irina Borogan Russia’s trolling complex at home and abroad 25 2 Xymena Kurowska and Anatoly Reshetnikov Spotting the bear: credible attribution and Russian 3 operations in cyberspace 33 Sven Herpig and Thomas Reinhold Russia’s cyber diplomacy 43 4 Elena Chernenko Case studies of Russian cyberattacks The early days of cyberattacks: 5 the cases of Estonia,
    [Show full text]
  • The 2016 U.S. Election
    April 2017, Volume 28, Number 2 $14.00 The 2016 U.S. Election William Galston John Sides, Michael Tesler, and Lynn Vavreck James Ceaser Nathaniel Persily Charles Stewart III The Modernization Trap Jack Snyder The Freedom House Survey for 2016 Arch Puddington and Tyler Roylance Sheriff Kora and Momodou Darboe on the Gambia Thomas Pepinsky on Southeast Asia Nic Cheeseman, Gabrielle Lynch, and Justin Willis on Ghana’s Elections Kai M. Thaler on Nicaragua Sean Yom on Jordan and Morocco The End of the Postnational Illusion Ghia Nodia The 2016 U.S. Election Longtime readers will be aware that this is the first time the Journal of Democracy has ever devoted a set of articles to the situation of democracy in the United States. Our traditional focus has been on the problems and prospects of democracy in developing and postcommunist countries. In the introduction to the group of essays in our October 2016 issue entitled “The Specter Haunting Europe,” we explained why we felt we had to redirect some of our attention to the growing vulnerability of democracy in the West, and promised that we would not refrain from examining the United States as well. This is an especially delicate task for us because our parent organization, the National Endowment for Democracy, is a reso- lutely bipartisan institution that seeks to steer clear of the controversies of U.S. domestic politics. We hope we have succeeded in avoiding the pitfalls of partisanship; but in an era when the trends that are weakening liberal democracy are increasingly global, an editorial version of “Ameri- can isolationism” no longer seemed a defensible policy.
    [Show full text]
  • Successes and Failures in the Enactment of Humanitarian Intervention During the Obama Administration
    “THE ROAD TO HELL AND BACK”: SUCCESSES AND FAILURES IN THE ENACTMENT OF HUMANITARIAN INTERVENTION DURING THE OBAMA ADMINISTRATION A Thesis submitted to the FaCulty of the Graduate SChool of Arts and SCiences of Georgetown University in partial fulfillment of the requirements for the degree of Master of Arts in ConfliCt Resolution By Justine T. Robinson, B.A. Washington, DC DeCember 10, 2020 Copyright 2020 by Justine T. Robinson All Rights Reserved ii “THE ROAD TO HELL AND BACK”: SUCCESSES AND FAILURES IN THE ENACTMENT OF HUMANITARIAN INTERVENTION DURING THE OBAMA ADMINISTRATION Justine T. Robinson, M.A. Thesis Advisor: Andrew Bennett, Ph.D. ABSTRACT This thesis examines how United States presidential administrations change over time in their poliCies on humanitarian intervention. More speCifiCally, how and why do AmeriCan presidential administrations (and the offiCials in those administrations) fail in some cases and sucCeed in others in enaCting ConfliCt resolution and genocide preventative measures? This thesis will focus on why offiCials in the two Obama administration sometimes used ambitious means of humanitarian intervention to prevent or mitigate genocide and other mass atrocities, as in the Cases of Libya and the Yazidis in Iraq, and sometimes took only limited steps to aChieve humanitarian goals, as in the case of the Syrian Civil War and Syrian refugees. This thesis is partiCularly interested in cases where earlier Obama administration aCtions and outComes forced the president and his advisors to rethink their approaCh to potential humanitarian intervention cases. The central hypothesis of this thesis is that poliCy changes on humanitarian intervention over time within U.S.
    [Show full text]
  • P40 Layout 1
    Egyptian female cyclists pedal for acceptance TUESDAY, JANUARY 27, 2015 36 All the contestants pose on stage during the Miss Universe pageant in Miami. (Inset) Miss Colombia Paulina Vega is crowned Miss Universe 2014.— AP/AFP photos Colombia’s Paulina Vega wins Miss Universe title olombia’s Paulina Vega was Venezuelan Gabriela Isler. She edged the map. Cuban soap opera star William Levy and crowned Miss Universe Sunday, out first runner-up, Nia Sanchez from the “We are persevering people, despite Philippine boxing great Manny Cbeating out contenders from the United States, hugging her as the win all the obstacles, we keep fighting for Pacquiao. The event is actually the 2014 United States, Ukraine, Jamaica and The was announced. what we want to achieve. After years of Miss Universe pageant. The competition Netherlands at the world’s top beauty London-born Vega dedicated her title difficulty, we are leading in several areas was scheduled to take place between pageant in Florida. The 22-year-old mod- to Colombia and to all her supporters. on the world stage,” she said earlier dur- the Golden Globes and the Super Bowl el and business student triumphed over “We are proud, this is a triumph, not only ing the question round. Colombian to try to get a bigger television audi- 87 other women from around the world, personal, but for all those 47 million President Juan Manuel Santos applaud- ence. and is only the second beauty queen Colombians who were dreaming with ed her, praising the brown-haired beau- The contest, owned by billionaire from Colombia to take home the prize.
    [Show full text]
  • Crowdstrike Global Threat Intel Report
    TWO THOUSAND FOURTEEN CROWDSTRIKE GLOBAL THREAT INTEL REPORT www.crowdstrike.com TWO THOUSAND FOURTEEN CROWDSTRIKE GLOBAL THREAT INTEL REPORT INTRODUCTION .........................................................................4 Table of KEY FINDINGS ............................................................................7 STATE OF THE UNION .............................................................9 Contents: NOTABLE ACTIVITY ............................................................... 13 Criminal ................................................................................ 13 State ...................................................................................... 19 Hacktivist/Nationalist ............................................................. 25 2014 Zero-Day Activity ........................................................... 34 Event-Driven Operations ......................................................... 39 KNOW THE ADVERSARY ....................................................49 Effect of Public Reporting on Adversary Activity ........................ 49 HURRICANE PANDA .................................................................50 GOTHIC PANDA ..........................................................................55 Overview of Russian Threat Actors ........................................... 57 2015 PREDICTIONS.................................................................61 CONCLUSION ........................................................................... 73 2 Introduction Intelligence
    [Show full text]