-
1
-
-
85028960825
-
Remarks by the President on Securing Our Nation's Critical Infrastructure
-
President Barack Obama, May 29, available at:
-
President Barack Obama, "Remarks by the President on Securing Our Nation's Critical Infrastructure," The White House Office of the Press Secretary, May 29, 2009, available at: http://www.whitehouse.gov/the-press-office/remarks-president-securing-our-nations-cyberinfrastructure.
-
(2009)
The White House Office of the Press Secretary
-
-
-
2
-
-
85028992292
-
Keynote Address by Deputy Secretary of Defense Ashton Carter to the RSA Conference,
-
San Francisco, California, Feb. 28, available at:
-
Ashton B. Carter, "Keynote Address by Deputy Secretary of Defense Ashton Carter to the RSA Conference," San Francisco, California, Feb. 28, 2012, available at: http://www.defense.gov/Speeches/Speech.aspx?SpeechID=1655.
-
(2012)
-
-
Carter, A.B.1
-
3
-
-
85028962286
-
-
Conference," San Francisco, California, Feb. 28, 2012, available at: 3 See Mitch Walfrop, "DARPA and the Internet Revolution," in DARPA, 50 Years of Bridging the Gap (Washington, D.C.: Defense Advanced Research Project Agency, Apr
-
Conference," San Francisco, California, Feb. 28, 2012, available at: http://www.defense.gov/Speeches/Speech.aspx?SpeechID=1655. 3 See Mitch Walfrop, "DARPA and the Internet Revolution," in DARPA, 50 Years of Bridging the Gap (Washington, D.C.: Defense Advanced Research Project Agency, Apr. 2008), pp. 78-85.
-
(2008)
, pp. 78-85
-
-
-
4
-
-
84893067830
-
Cyberspace: Definition and Implications
-
Dayton, Ohio, Apr. 8-9, (Reading: Academic Publishing Limited, 2010), 2, 3, accessed at:
-
Rain Ottis and Peeter Lorents, "Cyberspace: Definition and Implications, "in Proceedings of the 5th International Conference on Information Warfare and Security, Dayton, Ohio, Apr. 8-9, 2010 (Reading: Academic Publishing Limited, 2010), pp. 267-270, 2, 3, accessed at: http://www.ccdcoe.org/205.html.
-
(2010)
Proceedings of the 5th International Conference on Information Warfare and Security
, pp. 267-270
-
-
Ottis, R.1
Lorents, P.2
-
5
-
-
0742276097
-
Inside the Slammer Worm
-
No 4
-
David Moore, et al., "Inside the Slammer Worm," IEEE Security and rivacy, Vol 1, No 4 (2003), p.33.
-
(2003)
IEEE Security and rivacy
, vol.1
, pp. 33
-
-
Moore, D.1
-
6
-
-
84862679897
-
Statement of Commander, United States Cyber Command, before the House Committee on Armed Services
-
(Washington, DC: US Congress, Sept. 23
-
Keith B. Alexander, "Statement of Commander, United States Cyber Command, before the House Committee on Armed Services" (Washington, DC: US Congress, Sept. 23, 2010), p. 3.
-
(2010)
, pp. 3
-
-
Alexander, K.B.1
-
7
-
-
84862695285
-
-
Security Summit 2010, Emerging Cyber Threats Report 2011 (Atlanta, GA: Georgia Tech Information Security Center, Oct. 7
-
Security Summit 2010, Emerging Cyber Threats Report 2011 (Atlanta, GA: Georgia Tech Information Security Center, Oct. 7, 2010), p. 6.
-
(2010)
, pp. 6
-
-
-
8
-
-
84862695284
-
-
Cyber Power (Cambridge, MA: Belfer Center for Science and International Affairs, May
-
Joseph S. Nye, Jr. Cyber Power (Cambridge, MA: Belfer Center for Science and International Affairs, May 2010), p. 3.
-
(2010)
, pp. 3
-
-
Nye Jr., J.S.1
-
9
-
-
85028998389
-
Statistics are drawn from the Miniwatts Marketing Group
-
available at
-
Statistics are drawn from the Miniwatts Marketing Group, available at: http://www.internetworldstats.com/.
-
-
-
-
10
-
-
85028980014
-
-
I am grateful to Dennis Bartko for this insight.
-
I am grateful to Dennis Bartko for this insight.
-
-
-
-
11
-
-
84862693983
-
-
Estimating Terrorism Risk (Santa Monica, CA: RAND
-
This formulation is adapted from that presented in Henry H. Willis, et al., Estimating Terrorism Risk (Santa Monica, CA: RAND, 2005), xvi.
-
(2005)
-
-
Willis, H.H.1
-
12
-
-
85028963249
-
United States Computer Emergency Readiness Team
-
available at:
-
United States Computer Emergency Readiness Team, "Cyber Threat Source Descriptions," available at: http://www.us-cert.gov/control_systems/csthreats.html.
-
Cyber Threat Source Descriptions
-
-
-
13
-
-
85028957550
-
Remarks on Cyber at the RSA Conference
-
San Francisco, California, Feb. 15, available at:
-
William J. Lynn, III, "Remarks on Cyber at the RSA Conference," San Francisco, California, Feb. 15, 2011, available at: http://www.defense.gov/Speeches/Speech.aspx?SpeechID=1535.
-
(2011)
-
-
Lynn III, W.J.1
-
14
-
-
84862693982
-
-
Statement for the Record on the Worldwide Threat Assessment of the US Intelligence Community for the House Permanent Select Committee on Intelligence (Washington, DC: Office of the Director of National Intelligence, Feb. 10
-
James R. Clapper, Statement for the Record on the Worldwide Threat Assessment of the US Intelligence Community for the House Permanent Select Committee on Intelligence (Washington, DC: Office of the Director of National Intelligence, Feb. 10, 2011), p. 28.
-
(2011)
, pp. 28
-
-
Clapper, J.R.1
-
15
-
-
84862499008
-
Unclassified Statement for the Record on the Worldwide Threat Assessment of the US Intelligence Community for the Senate Select Committee on Intelligence Washington
-
D.C.: Office of the Director of National Intelligence, Jan. 31
-
James R. Clapper, Unclassified Statement for the Record on the Worldwide Threat Assessment of the US Intelligence Community for the Senate Select Committee on Intelligence Washington, D.C.: Office of the Director of National Intelligence, Jan. 31, 2012), p. 7.
-
(2012)
, pp. 7
-
-
Clapper, J.R.1
-
16
-
-
84862659225
-
-
Security Summit 2010, Emerging Cyber Threats Report
-
Security Summit 2010, Emerging Cyber Threats Report 2011, p. 3.
-
(2011)
, pp. 3
-
-
-
17
-
-
84862693985
-
-
"Symantec Internet Security Threat Report: Trends for 2009," Symantec, Apr.
-
"Symantec Internet Security Threat Report: Trends for 2009," Symantec, Apr. 2010.
-
(2010)
-
-
-
18
-
-
84862695290
-
Office of the National Counterintelligence Executive
-
(Washington, D.C.: Office of the National Counterintelligence Executive, Oct.
-
Office of the National Counterintelligence Executive, Foreign Spies Stealing U.S. Economic Secrets in Cyberspace (Washington, D.C.: Office of the National Counterintelligence Executive, Oct. 2011), p. i.
-
(2011)
Foreign Spies Stealing U.S. Economic Secrets in Cyberspace
-
-
-
19
-
-
85028984572
-
-
Dmitri Alperovitch, "Revealed: Operation Shady Rat," McAfee White Paper
-
Dmitri Alperovitch, "Revealed: Operation Shady Rat," McAfee White Paper, 2011, p. 2.
-
(2011)
, pp. 2
-
-
-
20
-
-
85028972775
-
Significant Cyber Incidents Since
-
available at
-
"Significant Cyber Incidents Since 2006," Center for Strategic and International Studies, available at: http://dev.csis.org/files/publication/101021_Significant%20Cyber%20Incidents%20Since%202006.pdf.
-
(2006)
Center for Strategic and International Studies
-
-
-
21
-
-
85028953222
-
-
Vice Admiral (Retired) John Michael McConnell, "The Cyber War Threat has been Grossly Exaggerated," Intelligence2 Debates, June 8, available at:
-
Vice Admiral (Retired) John Michael McConnell, "The Cyber War Threat has been Grossly Exaggerated," Intelligence2 Debates, June 8, 2010, available at: http://intelligencesquaredus.org/wpcontent/uploads/Cyber-War-060810.pdf.
-
(2010)
-
-
-
22
-
-
85028984536
-
Stock Selloff May Have Been Triggered by a Trader Error
-
CNBC.com with Reuters, May 6, available at:
-
"Stock Selloff May Have Been Triggered by a Trader Error," CNBC.com with Reuters, May 6, 2010, available at: http://www.cnbc.com/id/36999483/Stock_Selloff_May_Have_Been_Triggered_by_a_Trader_Error.
-
(2010)
-
-
-
23
-
-
85028977846
-
'Anonymous' Launches DDoS Attacks Against WikiLeaks Foes
-
PCMag.com, Dec. 8, available at:
-
Horn Leslie, "'Anonymous' Launches DDoS Attacks Against WikiLeaks Foes," PCMag.com, Dec. 8, 2010, available at: http://www.pcmag.com/article2/0,2817,2374023,00.asp.
-
(2010)
-
-
Leslie, H.1
-
25
-
-
85028959455
-
Cyber Command chief details threats to US
-
CNET News, Aug. 5, available at:
-
Lance Whitney, "Cyber Command chief details threats to US," CNET News, Aug. 5, 2010, available at: http://news.cnet.com/8301-13639_3-20012774-42.html.
-
(2010)
-
-
Whitney, L.1
-
26
-
-
84862693995
-
-
Security Summit 2010, Emerging Cyber Threats Report
-
Security Summit 2010, Emerging Cyber Threats Report 2011, p. 8.
-
(2011)
, pp. 8
-
-
-
27
-
-
85028996854
-
Speech at the RSA Cyber Security Conference
-
San Francisco, CA, Mar. 1, available at:
-
Robert S. Mueller, III, "Speech at the RSA Cyber Security Conference," San Francisco, CA, Mar. 1, 2012, available at: http://www.fbi.gov/news/speeches/combating-threats-in-the-cyber-world-..3
-
(2012)
-
-
Mueller III, R.S.1
-
28
-
-
85028980548
-
-
The White House, Cyberspace Policy Review
-
The White House, Cyberspace Policy Review, p. 1.
-
-
-
-
29
-
-
84862695288
-
-
The White House, International Strategy for Cyberspace (Washington, D.C.: The White House, May
-
The White House, International Strategy for Cyberspace (Washington, D.C.: The White House, May 2011), p. 4
-
(2011)
, pp. 4
-
-
-
30
-
-
85028998287
-
-
"Critical Infrastructure," Department of Homeland Security, accessed at:
-
"Critical Infrastructure," Department of Homeland Security, accessed at: http://www.dhs.gov/files/programs/gc_1189168948944.shtm.
-
-
-
-
31
-
-
84862695293
-
-
Department of Homeland Security, National Infrastructure Protection Plan (Washington, D.C.: Department of Homeland Security
-
Department of Homeland Security, National Infrastructure Protection Plan (Washington, D.C.: Department of Homeland Security, 2009), p. 12.
-
(2009)
, pp. 12
-
-
-
32
-
-
84862693993
-
-
Annual Threat Assessment of the US Intelligence Community for the Senate Select Committee on Intelligence (Washington, DC: Office of the Director of National Intelligence, Feb. 12
-
Dennis C. Blair, Annual Threat Assessment of the US Intelligence Community for the Senate Select Committee on Intelligence (Washington, DC: Office of the Director of National Intelligence, Feb. 12, 2009), p. 38.
-
(2009)
, pp. 38
-
-
Blair, D.C.1
-
33
-
-
84862695298
-
-
Security Summit 2010, Emerging Cyber Threats Report
-
Security Summit 2010, Emerging Cyber Threats Report 2011, p. 8
-
(2011)
, pp. 8
-
-
-
34
-
-
85029009260
-
Cyber Threat to Critical Infrastructure 2010-2015: Increased Control System Exposure
-
Idaho National Laboratory, Sept. 24, available at:
-
Peter D. Gasper, "Cyber Threat to Critical Infrastructure 2010-2015: Increased Control System Exposure," Idaho National Laboratory, Sept. 24, 2008, available at: http://usacac.army.mil/cac2/cew/repository/presentations/15_Idaho_Natl_Lab_IACSCI_Threat_2010-2015.pdf.
-
(2008)
-
-
Gasper, P.D.1
-
35
-
-
77957021089
-
Cyber War: the Next Threat to National Security and What to Do About It
-
(New York: Ecco
-
Richard A. Clarke and Robert K. Knake, Cyber War: the Next Threat to National Security and What to Do About It (New York: Ecco, 2010), p. 169.
-
(2010)
, pp. 169
-
-
Clarke, R.A.1
Knake, R.K.2
-
36
-
-
85028993635
-
First Annual Cost of Cyber Crime Study: Benchmark Study of US Companies
-
Ponemon Institute, July, available at:
-
First Annual Cost of Cyber Crime Study: Benchmark Study of US Companies, Ponemon Institute, July 2010, p. 1, available at: http://www.riskandinsurancechalkboard.com/uploads/file/Ponemon%20Study%281%29.pdf.
-
(2010)
, pp. 1
-
-
-
37
-
-
85028993947
-
-
"Chronology of Data Breaches: Security Breaches 2005-Present, Privacy Rights Clearinghouse, available at:, as cited by David Z. Bodenheimer, Esq., "Statement Before the House Armed Services Committee's Subcommittee on Terrorism, Unconventional Threats and Capabilities Concerning Private Sector Perspectives on Department of Defense Information Technology and Cybersecurity Activities" (Washington, D.C.: U.S. Congress, Feb. 25
-
"Chronology of Data Breaches: Security Breaches 2005-Present, Privacy Rights Clearinghouse, available at: http://www.privacyrights.org/data-breach#CP, as cited by David Z. Bodenheimer, Esq., "Statement Before the House Armed Services Committee's Subcommittee on Terrorism, Unconventional Threats and Capabilities Concerning Private Sector Perspectives on Department of Defense Information Technology and Cybersecurity Activities" (Washington, D.C.: U.S. Congress, Feb. 25, 2010), p. 4.
-
(2010)
, pp. 4
-
-
-
38
-
-
77958600609
-
Defending a New Domain: The Pentagon's Cyberstrategy
-
Foreign Affairs, Sept./Oct.
-
William F. Lynn III, "Defending a New Domain: The Pentagon's Cyberstrategy," Foreign Affairs, Sept./Oct. 2010, p. 98.
-
(2010)
, pp. 98
-
-
Lynn III, W.F.1
-
39
-
-
84862652975
-
-
CSIS Commission on Cybersecurity for the 44th Presidency, Cybersecurity Two Years Later (Washington, DC: Center for Strategic and International Studies, Jan.
-
CSIS Commission on Cybersecurity for the 44th Presidency, Cybersecurity Two Years Later (Washington, DC: Center for Strategic and International Studies, Jan. 2011), p. 1.
-
(2011)
, pp. 1
-
-
-
41
-
-
85029001152
-
CSIS Commission on Cybersecurity for the 44th Presidency
-
CSIS Commission on Cybersecurity for the 44th Presidency, Cybersecurity Two Years Later, p. 5
-
Cybersecurity Two Years Later
, pp. 5
-
-
-
42
-
-
85028996172
-
CyberCom: U.S. Lacks Online Situational Awareness
-
DefenseNews.com, June 3, available at:
-
"CyberCom: U.S. Lacks Online Situational Awareness," DefenseNews.com, June 3, 2010, available at: http://www.defensenews.com/story.php?i=4655216.
-
(2010)
-
-
-
43
-
-
79956266592
-
Defending a New Domain
-
Lynn, "Defending a New Domain," p. 103.
-
-
-
Lynn1
-
44
-
-
79961092543
-
Privacy Impact Assessment for the Initiative Three Exercise
-
Department of Homeland Security, Mar. 18, available at
-
Mary Ellen Callahan, "Privacy Impact Assessment for the Initiative Three Exercise," Department of Homeland Security, Mar. 18, 2010, available at: http://www.dhs.gov/xlibrary/assets/privacy/privacy_pia_nppd_initiative3exercise.pdf.
-
(2010)
-
-
Callahan, M.E.1
-
45
-
-
79956266592
-
Defending a New Domain
-
Lynn, "Defending a New Domain," p. 103.
-
-
-
Lynn1
-
46
-
-
85028962577
-
-
General Keith Alexander, as cited in Whitney, "Cyber Command chief details threats to US"
-
General Keith Alexander, as cited in Whitney, "Cyber Command chief details threats to US"
-
-
-
-
47
-
-
70449553230
-
Annual Threat Assessment of the US Intelligence Community for the Senate Select Committee on Intelligence
-
Blair, Annual Threat Assessment of the US Intelligence Community for the Senate Select Committee on Intelligence, 2009, p. 40.
-
(2009)
, pp. 40
-
-
Blair1
-
48
-
-
79956266592
-
Defending a New Domain
-
Lynn, "Defending a New Domain," pp. 104-105.
-
-
-
Lynn1
-
49
-
-
84862693997
-
-
Executive Office of the President, Director of the Office of Management and the Budget, Memorandum for the Heads of Executive Departments and Agencies, "Clarifying Cybersecurity Responsibilities and Activities of the Executive Office of the President and the Department of Homeland Security (DHS)," July 6
-
Executive Office of the President, Director of the Office of Management and the Budget, Memorandum for the Heads of Executive Departments and Agencies, "Clarifying Cybersecurity Responsibilities and Activities of the Executive Office of the President and the Department of Homeland Security (DHS)," July 6, 2010.
-
(2010)
-
-
-
50
-
-
85028971238
-
CSIS Commission on Cybersecurity for the 44th Presidency
-
especially
-
CSIS Commission on Cybersecurity for the 44th Presidency, Cybersecurity Two Years Later, especially pp. 7-8.
-
Cybersecurity Two Years Later
, pp. 7-8
-
-
-
51
-
-
84862654151
-
Multilateral Agreements to Constrain Cyberconflict
-
Arms Control Today, June, available at:
-
James Lewis, "Multilateral Agreements to Constrain Cyberconflict," Arms Control Today, June 2010, available at: http://www.armscontrol.org/act/2010_06/Lewis.
-
(2010)
-
-
Lewis, J.1
-
52
-
-
85028978920
-
-
The discussion in this paragraph has been informed by and greatly benefitted from Martin C. Libicki, Cyberdeterrence and Cyberwar (Santa Monica, CA: RAND Project Air Force, 2009).
-
The discussion in this paragraph has been informed by and greatly benefitted from Martin C. Libicki, Cyberdeterrence and Cyberwar (Santa Monica, CA: RAND Project Air Force, 2009).
-
-
-
-
53
-
-
85028996007
-
-
Statement of Commander, United States Cyber Command, before the House Committee on Armed Services
-
Alexander, "Statement of Commander, United States Cyber Command, before the House Committee on Armed Services," p. 5.
-
-
-
Alexander1
-
54
-
-
85029003678
-
CSIS Commission on Cybersecurity for the 44th Presidency
-
CSIS Commission on Cybersecurity for the 44th Presidency, Cybersecurity Two Years Later, p. 3.
-
Cybersecurity Two Years Later
, pp. 3
-
-
-
55
-
-
0004266826
-
Bureaucracy: What Government Agencies Do and Why They Do It
-
(New York: Basic Books, Inc., 1989), especially chapter 10.
-
James Q. Wilson, Bureaucracy: What Government Agencies Do and Why They Do It (New York: Basic Books, Inc., 1989), especially chapter 10.
-
-
-
Wilson, J.Q.1
-
56
-
-
84862672866
-
-
Government Accountability Office, Critical Infrastructure Protection: Key Private and Public Cyber Expectations Need to be Consistently Addressed (Washington, DC: US Government Accountability Office, July
-
Government Accountability Office, Critical Infrastructure Protection: Key Private and Public Cyber Expectations Need to be Consistently Addressed (Washington, DC: US Government Accountability Office, July 2010).
-
(2010)
-
-
-
57
-
-
84859720480
-
Memorandum of Agreement Between the Department of Homeland Security and the Department of Defense regarding Cybersecurity
-
Oct. 27, available at:
-
Memorandum of Agreement Between the Department of Homeland Security and the Department of Defense regarding Cybersecurity, Oct. 27, 2010, available at: http://www.dhs.gov/xlibrary/assets/20101013-dod-dhs-cyber-moa.pdf.
-
(2010)
-
-
-
58
-
-
85029010601
-
A Fleeting Idea: Department of Cyber
-
GovInfoSecurity.com, Feb. 16, 2011, available at:
-
Eric Chabrow, "A Fleeting Idea: Department of Cyber," GovInfoSecurity.com, Feb. 16, 2011, available at: http://www.bankinfosecurity.com/articles.php?art_id=3359.
-
-
-
Chabrow, E.1
-
59
-
-
85028963310
-
CSIS Commission on Cybersecurity for the 44th Presidency
-
CSIS Commission on Cybersecurity for the 44th Presidency, Securing Cyberspace for the 44th Presidency, p. 35.
-
Securing Cyberspace for the 44th Presidency
, pp. 35
-
-
-
60
-
-
85028991735
-
-
Statement of Commander, United States Cyber Command, before the House Committee on Armed Services
-
Alexander, "Statement of Commander, United States Cyber Command, before the House Committee on Armed Services," pp. 5-6.
-
-
-
Alexander1
-
61
-
-
85028989102
-
-
Ibid.
-
Ibid., p. 1.
-
-
-
-
62
-
-
84893129967
-
What US Cyber Command Must Do
-
Joint Force Quarterly 59, no. 4
-
Wesley R. Andrues, "What US Cyber Command Must Do," Joint Force Quarterly 59, no. 4 (2010): pp. 116-117.
-
(2010)
, pp. 116-117
-
-
Andrues, W.R.1
-
63
-
-
84862654153
-
-
General Accountability Office, Defense Department Cyber Efforts: DOD Faces Challenges in its Cyber Activities (Washington, DC: General Accountability Office, July
-
General Accountability Office, Defense Department Cyber Efforts: DOD Faces Challenges in its Cyber Activities (Washington, DC: General Accountability Office, July 2011).
-
(2011)
-
-
-
64
-
-
85028995278
-
-
Statement of Commander, United States Cyber Command, before the House Committee on Armed Services
-
Alexander, "Statement of Commander, United States Cyber Command, before the House Committee on Armed Services," p. 2.
-
-
-
Alexander1
-
65
-
-
0003460380
-
The Masks of War: American Military Styles in Strategy and Analysis
-
Carl Builder, (Baltimore, MD: The Johns Hopkins University Press
-
Carl Builder, The Masks of War: American Military Styles in Strategy and Analysis (Baltimore, MD: The Johns Hopkins University Press, 1989).
-
(1989)
-
-
-
66
-
-
85028976829
-
Operating in the Digital Domain: Organizing the Military Departments for Cyber Operations
-
Unconventional Threats and Capabilities, Sept. 23
-
"Operating in the Digital Domain: Organizing the Military Departments for Cyber Operations," Hearing of the House Armed Services Subcommittee on Terrorism, Unconventional Threats and Capabilities, Sept. 23, 2010.
-
(2010)
Hearing of the House Armed Services Subcommittee on Terrorism
-
-
-
67
-
-
84862645189
-
-
cited in CSIS Commission on Cybersecurity for the 44th Presidency, A Human Capital Crisis in Cybersecurity: Technical Proficiency Matters (Washington, DC: Center for Strategic & International Studies, July
-
James Gosler, cited in CSIS Commission on Cybersecurity for the 44th Presidency, A Human Capital Crisis in Cybersecurity: Technical Proficiency Matters (Washington, DC: Center for Strategic & International Studies, July 2010), p. 1.
-
(2010)
, pp. 1
-
-
Gosler, J.1
-
68
-
-
85028965792
-
CSIS Commission on Cybersecurity for the 44th Presidency
-
especially
-
CSIS Commission on Cybersecurity for the 44th Presidency, Cybersecurity Two Years Later, especially p. 2.\
-
Cybersecurity Two Years Later
, pp. 2
-
-
|