"Das Internet hat in den vergangenen Jahrzehnten einen historisch einzigartigen globalen Kommunikationsraum geschaffen. Doch zunehmend zeigen sich nicht nur die Möglichkeiten, sondern auch die Gefahren dieser Vernetzung: Kriminelle Hacker nutzen aktiv Sicherheitslücken aus, um Privatpersonen oder
...
Unternehmen zu erpressen oder zu berauben. Staatliche Akteure und Sicherheitsdienste setzen ausgeklügelte, im Geheimen entwickelte Software zu Spionagezwecken ein. Seit 2010 sei ein Trend hin zur digitalen Kriegsführung zu beobachten, so die Journalistin Eva Wolfangel: Hacker greifen, wie aktuell beim russischen Angriffskrieg gegen die Ukraine zu beobachten sei, im staatlichen Auftrag gezielt die kritische Infrastruktur anderer Staaten an, etwa Kraftwerke oder Kliniken. Anhand zahlreicher Beispiele veranschaulicht die Autorin die Gefahren der digitalen Welt und zeigt das Vorgehen der beteiligten Akteure auf. Sie zeichnet die größten „Coups“ der jüngeren Vergangenheit und damit die Entwicklung von Cyberkriminalität und Cyberkriegsführung bis heute nach. Wolfangel macht deutlich, dass potenziell jede und jeder von Cyberkriminalität bedroht sei und legt dar, was Unternehmen, Behörden und Einzelpersonen zum eigenen Schutz tun können." (Verlagsbeschriebung)
more
"Welche Rolle spielen nichtstaatliche Akteure, sogenannte "Proxys", in staatlichen Cyberkonflikten? Und wie unterscheidet sich regimetypenspezifisch das (De-)Eskalationsmanagement? Kerstin Zettl-Schabath vergleicht mithilfe eines umfassenden Datensatzes für die Jahre 2000-2019 die staatlichen Cyber
...
-Proxy-Strategien von China, Russland, den USA und Israel. Dabei zeigen sich je nach politischem System deutliche Abweichungen: Autokratien nutzen Proxys als "Puffer" gegenüber Demokratien, um für ihre Taten nicht belangt zu werden. Für Demokratien dagegen können Berichte privater IT-Unternehmen "Täter-Wissen" kommunizieren sowie Handlungsdruck infolge politischer Verantwortungszuweisungen reduzieren." (Verlagbeschreibung)
more
"[...] this is the first anthology to specifically investigate the history and state of cyber warfare in the Middle East. It gathers an array of technical practitioners, social science scholars, and legal experts to provide a panoramic overview and cross-sectional analysis covering four main areas:
...
privacy and civil society; the types of cyber conflict; information and influence operations; and methods of countering extremism online. The book highlights the real threat of hacktivism and informational warfare between state actors and the specific issues affecting the MENA region. These include digital authoritarianism and malware attacks in the Middle East, analysis of how ISIS and the Syrian electronic army use the internet, and the impact of disinformation and cybercrime in the Gulf. The book captures the flashpoints and developments in cyber conflict in the past 10 years and offers a snapshot of the region's still-early cyber history. It also clarifies how cyber warfare may develop in the near- to medium-term future and provides ideas of how its greatest risks can be avoided." (Publisher description)
more
"States should interpret – and apply – existing rules in a manner that ensures adequate and sufficient protection for civilians and civilian infrastructure, information and communication technology (ICT) systems and data in our ever-increasingly digitalised societies. Academia, tech companies, s
...
tates and humanitarians should work together to better understand the impact of misinformation, disinformation, and hate speech in contexts affected by armed conflict and violence, and to identify ways to address it. The humanitarian community must join forces – and find partners – to ensure the best possible protection against cyber operations targeting humanitarian operations and personal data entrusted to us." (Key issues, page 1)
more
"This book intends to provide a conceptual framework and a methodological guide, enriched with vivid and compelling use cases for the readers (e.g. technologists, academicians, military, government) interested in what Information Warfare really means, when its lenses are applied to current technolog
...
y. Without sacrificing accuracy, rigor and, most importantly, the big picture of Information Warfare, this book dives into several relevant and up-to-date critical domains. The authors illustrate how finance (an always green target of Information Warfare) is intertwined with Social Media, and how an opponent could exploit these latter ones to reach its objectives. Also, how cryptocurrencies are going to reshape the economy, and the risks involved by this paradigm shift. Even more compelling is how the very fabric of society is going to be reshaped by technology, for instance how our democratic elections are exposed to risks that are even greater than what appears in the current public discussions. Not to mention how our Critical Infrastructure is becoming exposed to a series of novel threats, ranging from state-supported malware to drones. A detailed discussion of possible countermeasures and what the open issues are for each of the highlighted threats complete this book." (Publisher description)
more
"Die Digitalisierung hat nicht nur zu tiefgreifenden Veränderungen der Lebens-, Arbeits- und Wirtschaftswelt geführt, sie hat auch massive Auswirkungen auf die internationale Politik. Diese Auswirkungen, so Yvonne Hofstetter, stellen die Sicherheitspolitik der Staaten vor massive Herausforderungen
...
. So haben etwa im letzten US-Wahlkampf die sogenannte Russland-Affäre oder der Skandal um die Datenauswertungen von Cambridge Analytica gezeigt, welch schädlichen Einfluss digitale Techniken auf demokratische Systeme haben können. Diese liefen, so die Autorin, Gefahr, durch autoritäre Akteure mit ihren eigenen Waffen geschlagen zu werden, da der freie Verkehr von Informationen auch zur Manipulation demokratischer Prozesse missbraucht werden kann und überdies sicherheitspolitische Konzepte ins Wanken bringt. So wandelt sich auch die Natur zwischenstaatliche Konflikte in Zeiten von künstlicher Intelligenz, Hackerangriffen und neuen Propagandastrategien. Die demokratischen Staaten, so Yvonne Hofstetter, müssten sich in der digitalen Sphäre wappnen, um Sicherheit, Stabilität und Liberalität für ihre Bürgerinnen und Bürger auf Dauer gewährleisten zu können." (Klappentext)
more
"This textbook offers an accessible introduction to the historical, technical, and strategic context of global cyber conflict. The second edition has been revised and updated throughout, with three new chapters. Cyber warfare involves issues of doctrine, strategy, policy, international relations (IR
...
) and operational practice associated with computer network attack, computer network exploitation and computer network defense. However, it is conducted within complex sociopolitical settings alongside related forms of digital contestation. This book provides students with a comprehensive perspective on the technical, strategic and policy issues associated with cyber conflict, as well as an introduction to key state and non-state actors." (Publisher description)
more
"This guide aims to help correct the imbalance in capacity and expertise between human rights defenders and cybersecurity professionals and policy-makers. At the heart of the guide is an attempt to address perhaps the fundamental barrier: the absence of clear definitions and agreed terms. It will do
...
this by closely examining three separate policy areas which are often conflated under the umbrella of cybersecurity – information security, cybercrime, and cyber conflict – unpacking their policy and legal dimensions, mapping relevant stakeholders, and outlining the issues at stake. It is hoped this will help human rights defenders engage effectively in cyber policy debates at the domestic, regional and international levels." (Overview, page 6)
more
"Vom eigenen Staat auf Schritt und Tritt überwacht zu werden, ist eine Horrorvision für viele Menschen. Möglich wird dies auch durch den Spion in der Hosentasche. Smartphones kommunizieren ständig mit staatlichen Lauschern, ohne dass wir es wollen – und bemerken. Stefan Aust und Thomas Ammann
...
erhellen die politischen Hintergründe und schildern, wie die Informationstechnologie aus den Denkfabriken der Militärs zum weltumspannenden Machtinstrument wurde. Längst tobt ein Krieg um Informationen zwischen Geheimdiensten, Staaten und Konzernen – um die Daten von uns allen." (Verlagsbeschreibung)
more
"The book first provides a historical reference, detailing the emergence of viruses, worms, malware, and other cyber threats that created the need for the cybersecurity field. It then discusses the vulnerabilities of our critical infrastructures, the broad arsenal of cyber attack tools, and the vari
...
ous engineering design issues involved in protecting our infrastructures. It goes on to cover cyber intelligence tactics, recent examples of cyber conflict and warfare, and the key issues in formulating a national strategy to defend against cyber warfare. The book also discusses how to assess and measure the cost of cybersecurity. It examines the many associated cost factors and presents the results of several important industry-based economic studies of security breaches that have occurred within many nations. The book concludes with a look at future trends in cybersecurity. It discusses the potential impact of industry-wide transformational changes, such as virtualization, social media, cloud computing, structured and unstructured data, big data, and data analytics." (Publisher description)
more
"Based on the case study of the cyber war between Russia and Georgia in August 2008, this paper is a theoretical deliberation in an attempt to illustrate connection between the Digital Divide and cyber security. Through a qualitative study of cyber warfare between the two countries, one on the devel
...
oped and one on the underdeveloped side of Digital Divide, it shows that disadvantaged states are subject to cyber insecurity. As a result, even though relatively low dependence of their vital systems on online networks supposedly makes them less vulnerable to cyber offensives, disruptions to communication infrastructures cause these states turn dysfunctional. To test the dependence of cyber security on Digital Divide, this paper also reviews other instances of coordinated cyber-attacks between countries, but in these cases, with both parties digitally advanced (Russia vs. Estonia, China vs. USA). These cases show that differences in states’ capabilities and available resources allowed them to withstand and relatively quickly repel cyber offensives without outside support and great harm. The general conclusion is that country’s position along Digital Divide translates into the level of that country’s cyber security, which serves as a litmus test for the level of its cyber power that, in turn, is indicative of the country’s strategic political standing among other states." (Abstract)
more
"The articles contained in this publication are dispatches from a new frontline in humanitarian action: the digital frontier. All are written by those observing, experiencing and attempting to respond to the challenges created by the digital revolution and the very real threats it is creating for hu
...
manitarian operations, and exploring the potential of new tools to create a safer, more responsive operational environment for aid workers." (Page 5)
more
"Given the Internet’s potential for full-spectrum surveillance and information disruption, the marshaling of computer networks represents the next stage of cyberwar. Indeed, it is upon us already. The recent Stuxnet episode, in which Israel fed a malignant computer virus into Iran’s nuclear faci
...
lities, is one such example. Penetration into US government computer systems by Chinese hackers-presumably sponsored by the Chinese government-is another. Together, they point to a new era in the evolution of human conflict. In Cybersecurity: What Everyone Needs to Know, noted experts Peter W. Singer and Allan Friedman lay out how the revolution in military cybernetics occurred and explain where it is headed. They begin with an explanation of what cyberspace is before moving on to discussions of how it can be exploited and why it is so hard to defend. Throughout, they discuss the latest developments in military and security technology. Singer and Friedman close with a discussion of how people and governments can protect themselves." (Publisher description)
more
"In this timely and eye-opening volume, Gabriel Weimann reveals that terrorist organizations and their supporters maintain hundreds of Web sites, taking advantage of the unregulated, anonymous, and accessible nature of the Internet to target an array of messages to diverse audiences. Drawing on an e
...
ight-year study of the World Wide Web, the author examines how modern terrorist organizations exploit the Internet to raise funds, recruit members, plan and launch attacks, and publicize their chilling results. Weimann also investigates the effectiveness of counterterrorism measures, and warns that this cyberwar may cost us dearly in terms of civil rights." (Publisher description)
more