2016 8Th International Conference on Cyber Conflict: Cyber Power

Total Page:16

File Type:pdf, Size:1020Kb

2016 8Th International Conference on Cyber Conflict: Cyber Power 2016 8th International Conference on Cyber Conflict: Cyber Power N.Pissanidis, H.Rõigas, M.Veenendaal (Eds.) 31 MAY - 03 JUNE 2016, TALLINN, ESTONIA 2016 8TH International ConFerence on CYBER ConFlict: CYBER POWER Copyright © 2016 by NATO CCD COE Publications. All rights reserved. IEEE Catalog Number: CFP1626N-PRT ISBN (print): 978-9949-9544-8-3 ISBN (pdf): 978-9949-9544-9-0 CopyriGHT AND Reprint Permissions No part of this publication may be reprinted, reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior written permission of the NATO Cooperative Cyber Defence Centre of Excellence ([email protected]). This restriction does not apply to making digital or hard copies of this publication for internal use within NATO, and for personal or educational use when for non-profit or non-commercial purposes, providing that copies bear this notice and a full citation on the first page as follows: [Article author(s)], [full article title] 2016 8th International Conference on Cyber Conflict: Cyber Power N.Pissanidis, H.Rõigas, M.Veenendaal (Eds.) 2016 © NATO CCD COE Publications PrinteD copies OF THIS PUBlication are availaBLE From: NATO CCD COE Publications Filtri tee 12, 10132 Tallinn, Estonia Phone: +372 717 6800 Fax: +372 717 6308 E-mail: [email protected] Web: www.ccdcoe.org Head of publishing: Jaanika Rannu Layout: Jaakko Matsalu LEGAL NOTICE: This publication contains opinions of the respective authors only. They do not necessarily reflect the policy or the opinion of NATO CCD COE, NATO, or any agency or any government. NATO CCD COE may not be held responsible for any loss or harm arising from the use of information contained in this book and is not responsible for the content of the external sources, including external websites referenced in this publication. NATO Cooperative CYBER DeFence Centre OF EXcellence The Tallinn-based NATO Cooperative Cyber Defence Centre of Excellence (NATO CCD COE) is a NATO-accredited knowledge hub, think-tank and training facility. The international military organisation focuses on interdisciplinary applied research and development, as well as consultations, trainings and exercises in the field of cyber security. The Centre’s mission is to enhance capability, cooperation and information-sharing between NATO, Allies and partners in cyber defence. The heart of the NATO Cooperative Cyber Defence Centre of Excellence is a diverse group of international experts on cyber security. They include legal scholars, policy and strategy experts as well as technology researchers with military, government and industry backgrounds. Membership of the Centre is open to all Allies. Currently, the Czech Republic, Estonia, France, Germany, Greece, Hungary, Italy, Latvia, Lithuania, the Netherlands, Poland, Slovakia, Spain, Turkey, the United Kingdom and the United States have signed on as Sponsoring Nations of the Centre. Austria and Finland have become Contributing Participants – the status available for non-NATO nations. Furthermore, Sweden and Belgium have announced their intent to join the Centre and the respective negotiations are ongoing. The Centre is staffed and financed by its sponsoring nations and contributing participants. The Centre is not part of NATO command or force structure, nor is it funded from the NATO budget. Many of the Centre’s publications, as well as a number of interactive databases, are accessible through www.ccdcoe.org. CYCON 2016 Sponsors ForeWorD This is the eighth time that the annual International Conference on Cyber Conflict (CyCon 2016), organised by the NATO Cooperative Cyber Defence Centre of Excellence, is held in the historic city of Tallinn, the capital of Estonia. Over the years the CyCon conferences have proved to be world-recognised forums addressing cyber conflict and security and their implications for society, business and world affairs. Every year the CyCon conference focusses on a specific aspect of cyber conflict. In 2013, the conference discussed the roles and methods of automated cyber defence and in 2014, it concentrated on active cyber defence. The focus of CyCon 2015 was on architectural aspects of cyberspace. CyCon 2016 concentrates its attention on ‘Cyber Power’, which can be viewed from very different angles. One might look at it as the ability to exert one’s will over the adversary via cyber operations while maintaining the security of one’s own systems; or through the perspective of controlling the development and production of software and hardware; or as the issue of trying to make oneself impervious to cyberattack by severely limiting one’s dependency on information technology. The possible viewpoints are as different as the actors that discuss them. As is true for all CyCon conferences, the notion of ‘Cyber Power’ is examined from information technology, strategic, legal, and policy perspectives, in order to provide a comprehensive and well-informed view. We would like to thank the members of the CyCon 2016 Academic Review Committee and the distinguished peer reviewers for their tireless work in identifying papers for presentation at the conference and for publication in this book. Last, but not least, we are delighted to congratulate the dedicated editors of this volume. Dr Gabriel Jakobson Chief Scientist CyberGem Consulting USA Dr Rain Ottis Associate Professor Tallinn University of Technology Estonia Brookline, Tallinn, April 2016 TABLE OF Contents Introduction 1 Assessing Cyber Power 7 Jelle van Haaster Hard Power in Cyberspace: CNA as a Political Means 23 Ragnhild Endresen Siedler Winning and Losing in Cyberspace 37 Jason Healey Towards a Theory of Cyber Power: The Israeli 51 Experience with Innovation and Strategy Lior Tabansky The Cyber-Doom Effect: The Impact 65 of Fear Appeals in the US Cyber Security Debate Sean T. Lawson, Sara K. Yeo, Haoran Yu, Ethan Greene Determining Extremist Organisations’ 81 Likelihood of Conducting Cyber Attacks Steve S. Sin, Laura A. Blackerby, Elvis Asiamah, Rhyner Washburn The Social Side of ‘Cyber Power’? Social Media and Cyber Operations 99 Drew Herrick Influence Cyber Operations: The Use of 113 Cyberattacks in Support of Influence Operations Pascal Brangetto, Matthijs A. Veenendaal Is the International Law of Cyber Security in Crisis? 127 Kubo Mačák Conceptualising Cyber Arms Races 141 Anthony Craig, Brandon Valeriano Arms Control in Cyberspace – Architecture for a 159 Trust-Based Implementation Framework Based on Conventional Arms Control Methods Markus Maybaum, Jens Tölle ii Malware Counter-Proliferation and the Wassenaar Arrangement 175 Trey Herr Weapons Systems and Cyber Security – A Challenging Union 191 Robert Koch, Mario Golling UAV Exploitation: A New Domain for Cyber Power 205 Kim Hartmann, Keir Giles Assessing the Impact of Aviation Security on Cyber Power 223 Martin Strohmeier, Matthias Schäfer, Matt Smith, Vincent Lenders, Ivan Martinovic Countering Advanced Persistent Threats through 243 Security Intelligence and Big Data Analytics Mirco Marchetti, Fabio Pierazzi, Alessandro Guido, Michele Colajanni Anonymity Networks and Access to Information 263 During Conflicts: Towards a Distributed Network Organisation Paolo Palmieri We Know Where You Are! 277 Siddharth Prakash Rao, Silke Holtmanns, Ian Oliver, Tuomas Aura Biographies 295 iii INTRODUCTION For the eighth consecutive year, the NATO Cooperative Cyber Defence Centre of Excellence (NATO CCD COE) is proud to host the International Conference on Cyber Conflict (CyCon), which gathers experts from the government, military, academia and private sector to discuss the most pressing issues related to cyber defence. Once again CyCon serves as an interdisciplinary platform for networking and sharing knowledge, bringing together the cyber security community’s technical experts, strategic thinkers, political scientists and lawyers. CyCon 2016 focuses on understanding the many aspects of ‘cyber power’ and aims to analyse how new digital technologies are affecting the traditional social, political, and technical foundations of defence and security. Power can be seen as the capacity, ability and willingness to act and is a central element of almost every form of social interaction, be it on the individual or the international level. The rapid development of the digital domain has had a substantial impact on all aspects of society but many questions about how actors can exert power through cyberspace remain unanswered. For instance, how has the rapid rise of information technologies changed the way in which different actors project their influence? How can the strategic and technical aspects of cyber power be measured? Who are the actors seeking cyber power? How do organisations achieve effective defences in cyberspace? What technical, political and legal frameworks are necessary in regard of the build-up of cyber capabilities? How will cyber power impact future military operations? These and many other questions will be addressed during the conference’s sessions and workshops, as well as in the papers that have been selected for the conference proceedings. This publication, comprising 18 articles, spans a wide spectrum of topics. It starts by focusing on the conceptual issues and asks how the phenomenon of cyber power can be defined and assessed. This is first done by Jelle van Haaster who, based on a comparative analysis of traditional approaches to power in international relations, presents a comprehensive methodology for measuring the different
Recommended publications
  • Learning to Program in Perl
    Learning to Program in Perl by Graham J Ellis Languages of the Web Learning to Program in Perl version 1.7 Written by Graham Ellis [email protected] Design by Lisa Ellis Well House Consultants, Ltd. 404, The Spa, Melksham, Wiltshire SN12 6QL England +44 (0) 1225 708 225 (phone) +44 (0) 1225 707 126 (fax) Find us on the World Wide Web at: http://www.wellho.net Or contact us at: [email protected] Copyright © 2003 by Well House Consultants, Ltd. Printed in Great Britain. Printing History May 1999 1.0 First Edition February 2000 1.1 Minor additions June 2000 1.2 Compliation of modules October 2000 1.3 Name change, revisions April 2002 1.4 Added modules September 2002 1.5 Added modules January 2003 1.6 Updated modules February 2003 1.7 Updated modules This manual was printed on 21 May 2003. Notice of Rights All rights reserved. No part of this manual, including interior design, may be reproduced or translated into any language in any form, or transmitted in any form or by any means electronic, mechanical, photocopying, recording or otherwise, without prior written permission of Well House Consultants except in the case of brief quotations embodied in critical articles and reviews. For more information on getting permission for reprints and excerpts, contact Graham Ellis at Well House Consultants. This manual is subject to the condition that it shall not, by way of trade or otherwise, be lent, sold, hired out or otherwise circulated without the publisher's prior consent, incomplete nor in any form of binding or cover other than in which it is published and without a similar condition including this condition being imposed on the subsequent receiver.
    [Show full text]
  • A the Hacker
    A The Hacker Madame Curie once said “En science, nous devons nous int´eresser aux choses, non aux personnes [In science, we should be interested in things, not in people].” Things, however, have since changed, and today we have to be interested not just in the facts of computer security and crime, but in the people who perpetrate these acts. Hence this discussion of hackers. Over the centuries, the term “hacker” has referred to various activities. We are familiar with usages such as “a carpenter hacking wood with an ax” and “a butcher hacking meat with a cleaver,” but it seems that the modern, computer-related form of this term originated in the many pranks and practi- cal jokes perpetrated by students at MIT in the 1960s. As an example of the many meanings assigned to this term, see [Schneier 04] which, among much other information, explains why Galileo was a hacker but Aristotle wasn’t. A hack is a person lacking talent or ability, as in a “hack writer.” Hack as a verb is used in contexts such as “hack the media,” “hack your brain,” and “hack your reputation.” Recently, it has also come to mean either a kludge, or the opposite of a kludge, as in a clever or elegant solution to a difficult problem. A hack also means a simple but often inelegant solution or technique. The following tentative definitions are quoted from the jargon file ([jargon 04], edited by Eric S. Raymond): 1. A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary.
    [Show full text]
  • Hacker Public Radio
    hpr0001 :: Introduction to HPR hpr0002 :: Customization the Lost Reason hpr0003 :: Lost Haycon Audio Aired on 2007-12-31 and hosted by StankDawg Aired on 2008-01-01 and hosted by deepgeek Aired on 2008-01-02 and hosted by Morgellon StankDawg and Enigma talk about what HPR is and how someone can contribute deepgeek talks about Customization being the lost reason in switching from Morgellon and others traipse around in the woods geocaching at midnight windows to linux Customization docdroppers article hpr0004 :: Firefox Profiles hpr0005 :: Database 101 Part 1 hpr0006 :: Part 15 Broadcasting Aired on 2008-01-03 and hosted by Peter Aired on 2008-01-06 and hosted by StankDawg as part of the Database 101 series. Aired on 2008-01-08 and hosted by dosman Peter explains how to move firefox profiles from machine to machine 1st part of the Database 101 series with Stankdawg dosman and zach from the packetsniffers talk about Part 15 Broadcasting Part 15 broadcasting resources SSTRAN AMT3000 part 15 transmitter hpr0007 :: Orwell Rolled over in his grave hpr0009 :: This old Hack 4 hpr0008 :: Asus EePC Aired on 2008-01-09 and hosted by deepgeek Aired on 2008-01-10 and hosted by fawkesfyre as part of the This Old Hack series. Aired on 2008-01-10 and hosted by Mubix deepgeek reviews a film Part 4 of the series this old hack Mubix and Redanthrax discuss the EEpc hpr0010 :: The Linux Boot Process Part 1 hpr0011 :: dd_rhelp hpr0012 :: Xen Aired on 2008-01-13 and hosted by Dann as part of the The Linux Boot Process series.
    [Show full text]
  • 2017-18 Florida State University Fact Book
    2017-18 FLORIDA STATE UNIVERSITY FACT BOOK Office of Institutional Research 318 Westcott Florida State University Tallahassee, FL 32306-1359 ir.fsu.edu August 2018 Executive Summary of Statistics First Time in College (FTIC) Admission Statistics (summer/fall applications) 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 Applied 25,485 23,439 26,037 28,313 30,040 29,579 30,266 29,828 29,027 35,334 Admitted 11,901 14,308 15,498 16,561 16,124 16,803 16,763 16,674 16,840 17,381 Enrolled 5,027 5,967 5,952 6,145 5,738 6,048 6,021 6,100 6,282 6,523 Average SAT Enrolled 1196.8 1195.2 1202.7 1205.7 1201.9 1199.5 1211.8 1206.1 1201.8 1259.0* Average SAT 3 Enrolled 1802.9 1800.1 1795.7 1814.2 1804.5 1797.0 Average ACT Enrolled 25.9 26.3 26.4 26.5 26.7 26.9 27.2 27.1 27.1 27.6 Average High School GPA 3.72 3.71 3.76 3.79 3.85 3.88 3.92 3.91 3.95 4.02 * Beginning in 2017, the SAT test was re-designed. There is no longer a separate writing component. The scores have not been concorded. New FTIC Students by Residency (annual total) 2008-09 2009-10 2010-11 2011-12 2012-13 2013-14 2014-15 2015-16 2016-17 2017-18 In-state 4,786 5,667 5,654 5,847 5,435 5,836 5,616 5,635 5,650 5,802 Out-of-State 246 367 386 382 383 502 745 609 776 758 Total 5,032 6,034 6,040 6,229 5,818 6,338 6,361 6,244 6,426 6,560 Final Student Instruction (SIF) files Student Enrollment - Fall Semesters 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 Full-time Undergraduate 26,463 27,684 28,148 28,797 28,769 28,859 29,083 29,104 29,248 29,325 Part-time Undergraduate 3,181 2,773 2,857
    [Show full text]
  • How to Analyze the Cyber Threat from Drones
    C O R P O R A T I O N KATHARINA LEY BEST, JON SCHMID, SHANE TIERNEY, JALAL AWAN, NAHOM M. BEYENE, MAYNARD A. HOLLIDAY, RAZA KHAN, KAREN LEE How to Analyze the Cyber Threat from Drones Background, Analysis Frameworks, and Analysis Tools For more information on this publication, visit www.rand.org/t/RR2972 Library of Congress Cataloging-in-Publication Data is available for this publication. ISBN: 978-1-9774-0287-5 Published by the RAND Corporation, Santa Monica, Calif. © Copyright 2020 RAND Corporation R® is a registered trademark. Cover design by Rick Penn-Kraus Cover images: drone, Kadmy - stock.adobe.com; data, Getty Images. Limited Print and Electronic Distribution Rights This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited. Permission is given to duplicate this document for personal use only, as long as it is unaltered and complete. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial use. For information on reprint and linking permissions, please visit www.rand.org/pubs/permissions. The RAND Corporation is a research organization that develops solutions to public policy challenges to help make communities throughout the world safer and more secure, healthier and more prosperous. RAND is nonprofit, nonpartisan, and committed to the public interest. RAND’s publications do not necessarily reflect the opinions of its research clients and sponsors. Support RAND Make a tax-deductible charitable contribution at www.rand.org/giving/contribute www.rand.org Preface This report explores the security implications of the rapid growth in unmanned aerial systems (UAS), focusing specifically on current and future vulnerabilities.
    [Show full text]
  • Hacking for ISIS: the Emergent Cyber Threat Landscape
    Hacking for ISIS: The Emergent Cyber Threat Landscape By Laith Alkhouri, Alex Kassirer, & Allison Nixon April 2016 Hacking For ISIS Contents Click on a title to navigate to the page Introduction ...........................................................................................................................................2 Cyber Caliphate ...................................................................................................................................3 Islamic State Hacking Division .......................................................................................................6 Islamic Cyber Army ............................................................................................................................9 Rabitat Al-Ansar ................................................................................................................................ 12 Sons Caliphate Army ...................................................................................................................... 15 United Cyber Caliphate .................................................................................................................. 17 Techniques, Tactics, & Procedures (TTPs) .............................................................................. 20 The Future of ISIS’s Cyber Capabilities .................................................................................... 24 Conclusion .........................................................................................................................................
    [Show full text]
  • Iran'in Siber Güvenlik Stratejisinin Saldiri Ve
    See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/334583513 İRAN’IN SİBER GÜVENLİK STRATEJİSİNİN SALDIRI VE SAVUNMA KAPASİTESİ BAKIMINDAN ANALİZİ Article in Turkish Studies - Social Sciences · January 2019 DOI: 10.29228/TurkishStudies.22799 CITATIONS READS 0 225 1 author: Ali Burak Darıcılı 35 PUBLICATIONS 21 CITATIONS SEE PROFILE All content following this page was uploaded by Ali Burak Darıcılı on 25 July 2019. The user has requested enhancement of the downloaded file. Turkish Studies Social Sciences Volume 14 Issue 3, 2019, p. 409-425 DOI: 10.29228/TurkishStudies.22799 ISSN: 2667-5617 Skopje/MACEDONIA-Ankara/TURKEY Research Article / Araştırma Makalesi A r t i c l e I n f o / M a k a l e B i l g i s i Received/Geliş: 04.02.2019 Accepted/Kabul: 10.06.2019 Report Dates/Rapor Tarihleri: Referee 1 (15.03.2019)-Referee 2 (11.03.2019)- Referee 3 (18.03.2019) This article was checked by iThenticate. ANALYSIS OF IRAN'S CYBER SECURITY STRATEGY WITH REGARD TO THE ATTACK AND THE DEFENSE CAPACITY Ali Burak DARICILI ABSTRACT The Stuxnet Virus was released in June 2010 and has affected Iran's nuclear facilities in Bushehr and Natanz. It was claimed that the United States of America (USA) and Israel secret services together have a role in the planning of this cyber-attack. Following this cover activity, also known as Operation Olympic Games in the literature, Iran considered the need to take serious measures in the field of cyber security and aimed to reach an effective cyber security capacity in cyber space with the investments made in 2010.
    [Show full text]
  • Cyber Law and Espionage Law As Communicating Vessels
    Maurer School of Law: Indiana University Digital Repository @ Maurer Law Books & Book Chapters by Maurer Faculty Faculty Scholarship 2018 Cyber Law and Espionage Law as Communicating Vessels Asaf Lubin Maurer School of Law - Indiana University, [email protected] Follow this and additional works at: https://www.repository.law.indiana.edu/facbooks Part of the Information Security Commons, International Law Commons, Internet Law Commons, and the Science and Technology Law Commons Recommended Citation Lubin, Asaf, "Cyber Law and Espionage Law as Communicating Vessels" (2018). Books & Book Chapters by Maurer Faculty. 220. https://www.repository.law.indiana.edu/facbooks/220 This Book is brought to you for free and open access by the Faculty Scholarship at Digital Repository @ Maurer Law. It has been accepted for inclusion in Books & Book Chapters by Maurer Faculty by an authorized administrator of Digital Repository @ Maurer Law. For more information, please contact [email protected]. 2018 10th International Conference on Cyber Conflict CyCon X: Maximising Effects T. Minárik, R. Jakschis, L. Lindström (Eds.) 30 May - 01 June 2018, Tallinn, Estonia 2018 10TH INTERNATIONAL CONFERENCE ON CYBER CONFLicT CYCON X: MAXIMISING EFFECTS Copyright © 2018 by NATO CCD COE Publications. All rights reserved. IEEE Catalog Number: CFP1826N-PRT ISBN (print): 978-9949-9904-2-9 ISBN (pdf): 978-9949-9904-3-6 COPYRigHT AND REPRINT PERmissiONS No part of this publication may be reprinted, reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior written permission of the NATO Cooperative Cyber Defence Centre of Excellence ([email protected]).
    [Show full text]
  • Andrew Futter Nuclear Weapons .Indd
    # 56 VALDAI PAPERS September 2016 www.valdaiclub.com NUCLEAR WEAPONS IN THE CYBER AGE: NEW CHALLENGES FOR SECURITY, STRATEGY AND STABILITY Andrew Futter About the author: Andrew Futter Senior Lecturer in International Politics, Department of Politics and International Relations, University of Leicester ; Fellow of the UK Higher Education Academy The views and opinions expressed in this Paper are those of the author and do not represent the views of the Valdai Discussion Club, unless explicitly stated otherwise. NUCLEAR WEAPONS IN THE CYBER AGE: NEW CHALLENGES FOR SECURITY, STRATEGY AND STABILITY The safe, secure and reliable management of nuclear weapons has always been a complex and complicated business, plagued by uncertainty and risks. But these challenges are being magnified and aggravated by new cyber tools, dynamics and capabilities, and from the threat posed by hackers seeking to gain access to, or interfere with, nuclear systems. The challenge is myriad in its scope, and ranges from the safe, secure and reliable nuclear C2, through fresh problems for information security, proliferation, and the safeguarding of highly sensitive nuclear secrets, to new complications for strategic deterrence and escalation, and the emergence of a cyber-nuclear security dilemma. While cyber threats may not currently undermine or supersede the role of nuclear weapons as the ultimate symbol of national security, increased uncertainty about the integrity and security of these systems raises questions for nuclear force management, thinking and strategy for all nuclear-armed states. The cyber challenge is nuanced and subtle, complicating and obfuscating the intrinsic difficulties of nuclear C2 and nuclear strategy rather than fundamentally transforming them.
    [Show full text]
  • COUF Church Order 2016
    CHURCH ORDER OF THE UNITAS FRATRUM (MORAVIAN CHURCH) 2016 AS C B H ON M Q A U L E R R E U D O • • L E M T I U H S FOLLOW Incorporating Resolutions From Previous Unity Synods Published by Order of the Unity Synod Held in Montego Bay, Jamaica 12 th – 19th August 2016 Church Order of the Unitas Fratrum (Moravian Church) 2016 © Unitas Fratrum 2017 ProRex Forlag 2017 www.prorex.dk 6070 Christiansfeld Denmark This edition of the Church Order of the Unitas Fratrum has been edited by Br. Jørgen Bøytler, Denmark, Unity Board Administrator with the assistance of Sr Jackie Morten of London and Br Robert Hopcroft of Ockbrook, Derbyshire. Printed in Denmark ISBN 978 87 7068 133 9 PREFACE As directed by the Unity Synod held in Montego Bay, Jamaica, 1 2 th-19th of August 2016, the standing order of the Unitas Fratrum or Moravian Church as revised by Unity Synod 2016 is hereby pub- lished as the Church Order of the Unitas Fratrum (Moravian Church) 2016. The book contains the principal enactments of Unity Synod currently in force throughout the Unitas Fratrum. Unity Synod has further directed that such of its resolutions and enactments as would have significance after the close of Synod, but which do not belong in the standing order of the Church, be made available in published form, together with significant resolutions of earlier Synods and The Rules of Order of Unity Synod. Note: The editing committee of the 1981 edition facilitated quick reference to each paragraph contained in the Church Order of the Unitas Fratrum.
    [Show full text]
  • Download Thesis
    This electronic thesis or dissertation has been downloaded from the King’s Research Portal at https://kclpure.kcl.ac.uk/portal/ Cyber security and the politics of time Stevens, Timothy Charles Awarding institution: King's College London The copyright of this thesis rests with the author and no quotation from it or information derived from it may be published without proper acknowledgement. END USER LICENCE AGREEMENT Unless another licence is stated on the immediately following page this work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International licence. https://creativecommons.org/licenses/by-nc-nd/4.0/ You are free to copy, distribute and transmit the work Under the following conditions: Attribution: You must attribute the work in the manner specified by the author (but not in any way that suggests that they endorse you or your use of the work). Non Commercial: You may not use this work for commercial purposes. No Derivative Works - You may not alter, transform, or build upon this work. Any of these conditions can be waived if you receive permission from the author. Your fair dealings and other rights are in no way affected by the above. Take down policy If you believe that this document breaches copyright please contact [email protected] providing details, and we will remove access to the work immediately and investigate your claim. Download date: 25. Sep. 2021 1 ] Cyber Security and the Politics of Time Timothy Charles Stevens Thesis submitted in accordance with the requirements for the degree of Doctor of Philosophy King’s College London Department of War Studies November 2013 2 Abstract Time is an under-represented topic in security studies and International Relations (IR).
    [Show full text]
  • Cyber Activities in the Syrian Conflict CSS CY
    CSS CYBER DEFENSE PROJECT Hotspot Analysis The use of cybertools in an internationalized civil war context: Cyber activities in the Syrian conflict Zürich, October 2017 Version 1 Risk and Resilience Team Center for Security Studies (CSS), ETH Zürich The use of cybertools in an internationalized civil war context: Cyber activities in the Syrian conflict Authors: Marie Baezner, Patrice Robin © 2017 Center for Security Studies (CSS), ETH Zürich Contact: Center for Security Studies Haldeneggsteig 4 ETH Zürich CH-8092 Zürich Switzerland Tel.: +41-44-632 40 25 [email protected] www.css.ethz.ch Analysis prepared by: Center for Security Studies (CSS), ETH Zürich ETH-CSS project management: Tim Prior, Head of the Risk and Resilience Research Group; Myriam Dunn Cavelty, Deputy Head for Research and Teaching; Andreas Wenger, Director of the CSS Disclaimer: The opinions presented in this study exclusively reflect the authors’ views. Please cite as: Baezner, Marie; Robin, Patrice (2017): Hotspot Analysis: The use of cybertools in an internationalized civil war context: Cyber activities in the Syrian conflict, October 2017, Center for Security Studies (CSS), ETH Zürich. 2 The use of cybertools in an internationalized civil war context: Cyber activities in the Syrian conflict Table of Contents 1 Introduction 5 2 Background and chronology 6 3 Description 9 3.1 Attribution and actors 9 Pro-government groups 9 Anti-government groups 11 Islamist groups 11 State actors 12 Non-aligned groups 13 3.2 Targets 13 3.3 Tools and techniques 14 Data breaches 14
    [Show full text]