CYBERSPACE AND NATIONAL SECURITY


September 2010

Compiled by Bibliography Branch
Muir S. Fairchild Research Information Center
Maxwell AFB, AL


Contents

The appearance of hyperlinks does not constitute endorsement by the U.S. Air Force of this web site or the information, products, or services contained therein.  For other than authorized activities such as military exchanges and morale, welfare and recreation sites, the U.S. Air Force does not exercise any editorial control over the information you may find at these locations.  Such links are provided consistent with the stated purpose of this DoD web site.

Some materials listed below require access to subscription databases.  If you cannot gain access, contact your local library for availability.  AU students and faculty can contact the Center's Web Maintainer for a password.

If a file does not open by clicking on the link, right click on the link, copy shortcut and paste into your browser's address bar.


Internet Resources


24th Air Force.
Available online at:  http://www.24af.af.mil/
The mission is to provide combatant commanders with trained and ready cyber forces to plan and conduct cyberspace operations, and to extend, maintain and defend the Air Force portion of the global information grid.

Aftab, Parry.  The PR Professional's Role in Handling Cyberwarfare.  Public Relations Strategist  Summer 2005.
Available online at:  http://proquest.umi.com/pqdweb?did=885859521&Fmt=7&clientId=417&RQT=309&VName=PQD

Air Force Space Command.  High Frontier Journal:  The Journal for Space and Cyberspace Professionals.
Available online at:  http://www.afspc.af.mil/library/highfrontierjournal.asp
Excellent periodical to review for articles related to cyberspace.  Issues from March 2007 issue through 2010 are available online. This is a quarterly journal sponsored by the Air Force Space Command. 

Air University Research Information Management System (AURIMS).
Available online at:  http://www.afresearch.org
Offers access to Air University student research reports with numerous items concerning Cyberspace.  Offers an internal search engine for keyword searching.  Also provides access to AU Press books, the AU Blue Dart System, AF Research Institute, and the Air & Space Power Journal.  Restricted site

Air War College Gateway.  Cyberspace and Information Operations Study Center.
Available online at:  http://www.au.af.mil/info-ops/index.htm
Links to information on cyberspace, network warfare, electronic warfare and influence operations.

Air War College Gateway.  National Strategies, Military Strategies, Military Doctrine & Space Doctrine
Available online at:  http://www.au.af.mil/au/awc/awcgate/awc-doct.htm
Provides links to: Presidential Directives & Exec. Orders, National Strategy, Homeland Defense Strategy, National Defense Strategy (NDS) and National Military Strategy (NMS) documents. Has links to Joint, Army, Navy, Air Force, Marine, and International doctrine. Other related links to National Strategy topics.

Challenges Remain in Securing the Nation’s Cyber Infrastructure.  Washington, DC, Office of Inspector General; U.S. Department of Homeland Security, June 2007.  44 p.
Available online at:  http://www.dhs.gov/xoig/assets/mgmtrpts/OIG_07-48_Jun07.pdf

Critical Issues for Cyber Assurance Policy Reform:  An Industry Assessment.
Available online at:  http://www.whitehouse.gov/
These industrial recommendations aim to address key problems of the defense industrial base, critical infrastructure sections, and our national information infrastructure.

Cushman, Jeremiah.  Foreign Hackers Focus on Military Targets.  Military Periscope Special Reports  September 24, 2009.
Available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=mth&AN=44499704&site=ehost-live&custid=airuniv
"The article reports on the increasing threats posed by foreign hackers to military cyberspace networks.  It explores cases of cyber attacks in the U.S., China and Russia.  It notes that the military has relied on computer networks to achieve operation precision in modern warfare but exposes vulnerabilities that can be exploited.  It adds that military and civilian planners have been dealing with the effects of the attacks but have difficulty tracing its origin."--from Abstract.

Cyber Storm Exercise.  Department of Homeland Security, September 2006.
Available online at:  http://www.dhs.gov/xnews/releases/pr_1158340980371.shtm
Includes fact sheet and exercise report.

Cyber Storm II Exercise:  Final Report.  Department of Homeland Security, July 2009.
Available online at:  http://www.dhs.gov/xlibrary/assets/csc_ncsd_cyber_stormII_final09.pdf

Cyber Storm II Final Report.  Australia Government:  Attorney-General's Department, August 2008.
Available online at:  http://www.ag.gov.au/
National Cyber Security Exercise:  Final Report.

Cyberspace Policy Review.
Available online at:  http://www.whitehouse.gov/cyberreview/documents
Site has more than 100 linked papers that relate to Cyberspace National Security issues.

Cyberterrorism.
Available online at:  http://www.au.af.mil/au/awc/awcgate/crs/index.htm#cyberterrorism
Access to several CRS Reports for Congress.

Daggett, Stephen.  Quadrennial Defense Review 2010:  Overview and Implications for National Security Planning.  Congressional Research Service, May 17, 2010.
Available online at:  http://handle.dtic.mil/100.2/ADA522091

Defense Department; Intelligence and Security; Doctrine, Directives and Instructions.
Available online at:  http://www.fas.org/irp/doddir/dod/index.html
The site provides numerous links to DOD Doctrine, Directives and Instructions, plus JCS Joint Publications, and other documents.

Department of Homeland Security Cyber Security.  NIPP-Cyber Security:  Implementing the National Infrastructure Protection Plan
Available online at:  http://www.us-cert.gov/reading_room/infosheet_NIPP.pdf

Fahrenkrug, David T.  The Age of Cyber Warfare.  The Wright Stuff  Maxwell AFB, AL, Air University, November 29, 2007.
Available online at:  http://www.au.af.mil/au/aunews/archive/2007/0222/Articles/TheAgeofCyberWarfare.html

Fahrenkrug, David T.  Cyberspace Defined.  The Wright Stuff  Maxwell AFB, AL, Air University, May 17, 2007.
Available online at:  http://www.au.af.mil/au/awc/awcgate/wrightstuff/cyberspace_defined_wrightstuff_17may07.htm

Garamone, Jim.  New National Strategy Takes ‘Whole-of-Government’ Approach.  Washington, DC, American Forces Press Service, May 27, 2010.
Available online at:  http://www.defense.gov/News/NewsArticle.aspx?ID=59377

Gjelten, Tom.  Cyberwarrior Shortage Threatens U.S. Security.  National Public Radio.
Available online at:  http://www.npr.org/templates/story/story.php?storyId=128574055

Global Cyberspace Integration Center.
Available online at:  http://www.gcic.af.mil/
Site offers publications, news, and videos.  "The Air Force Global Cyberspace Integration Center, slated to transition into AFCYBER, teams with major commands, joint and coalition partners, national agencies, industry and academia to develop, integrate and standardize air, space, and cyberspace components."--Abstract from Web site.

Grant, Ian.  Cyber Storm 2 Exercise Reveals Security Preparedness.  March 2008.
Available online at:  http://www.computerweekly.com/Articles/2008/03/18/229909/cyber-storm-2-exercise-reveals-security-preparedness.htm
Article recaps the Cyber Storm II exercise.  Scroll to end of the article, provided here are links to related articles and white papers.

Hare, Forrest B.  Air Force Strategy for Cyberspace.  The Wright Stuff  Maxwell AFB, AL, Air University, November 29, 2007.
Available online at:  http://www.au.af.mil/au/aunews/archive/2007/0222/Articles/strategy%20for%20cyberspace%20essay%20v3.pdf

Hathaway, Melissa.  Securing Our Digital Future.  The White House Blog.
Available online at:  http://www.whitehouse.gov/cyberReview
Melissa Hathaway, Cybersecurity Chief at the National Security Council, discusses securing our nation's digital future.

Information & Cyberspace.
Available online at:  http://homeland.au.af.mil/information.htm
On the AWC Gateway that provides links to National Strategy and Policy Documents concerning cyberspace.

Information Security and Cyberwar
Available online at:  http://www.au.af.mil/au/awc/awcgate/crs/index.htm#infosec
On the AWC Gateway that provides links to numerous Congressional Research Service Reports concerning cyberspace.

Kuehl, Daniel.  From Cyberspace to Cyberpower:  Defining the Problem.  Washington, DC, National Defense University, 2008.  23 p.
Available online at:  http://www.carlisle.army.mil/DIME/documents/Cyber%20Chapter%20Kuehl%20Final.doc

This publication focus on the information component of national power.

LaFranchi, Howard.  National Security Strategy:  Derailed by Debt?  Christian Science Monitor May 27, 2010.
Available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=50999878&site=ehost-live&custid=airuniv

Library of Congress.  Information Operations, Electronic Warfare, and Cyberwar:  Capabilities and Related Policy Issues, edited by Clay Wilson.  Washington, DC, Congressional Research Service.  March 20, 2007.  18 p.
Available online at:  http://handle.dtic.mil/100.2/ADA466599

Liepman, James M. Jr.  Cyberspace:  The Third Domain.  The Wright Stuff  Maxwell AFB, AL, Air University, December 13, 2007.
Available online at:  http://www.au.af.mil/au/aunews/archive/2007/0223/Articles/Cyberspace%20Third%20Domain%20-%20Liepman.pdf

Long, Kerry S.  Catching the Cyber Spy.  December 1, 2004.  3 p.
Available online at:  http://handle.dtic.mil/100.2/ADA432198

McDonald, Todd and others.  Guarding the Cybercastle in 2020.  IAnewsletter Fall 2008.
Available online at:  http://iac.dtic.mil/iatac/download/Vol11_No3.pdf

Miller, Robert A. and Kuehl, Daniel T.  Cyberspace and the 'First Battle' in 21st-Century War (Defense Horizons, Number 68, September 2009).  Washington, DC, Center for Technology and National Security Policy, National Defense University, September, 2009.  7 p.
Available online at:  http://handle.dtic.mil/100.2/ADA508696
Early forms of cyberwar may have already been seen in Estonia and Georgia.  Control of cyberspace may thus be as decisive in the network-dependent early 21st century as control of the air was for most of the 20th century.  This article presents thought provoking questions i.e.:   "What constitutes an attack by a country on another county in cyberspace?" and others.

National Security Threats in Cyberspace:  Post-Workshop Report – September 2009
Available online at:  http://nationalstrategy.com/Portals/0/National%20Security%20Threats%20in%20Cyberspace%20%20FINAL%2009-15-09.pdf
The workshop brought together more than two dozen experts with diverse backgrounds.  The discussion was under Chatham House Rules – their comments were for the public record, but they were not for attribution.

Nissenbaum, Helen.  Where Computer Security Meets National Security.  Ethics and Information Technology  New York University, NY, Dept of Culture and Communication, June 2005.

Northrop Grummann Corp.  Integration into Cyber Security Management System.  October 1, 2005.
Available online at:  http://handle.dtic.mil/100.2/ADA440652

Schwalm, Keith T.  National Strategy to Secure Cyberspace.  Rome, NY, Air Force Research Laboratory, August 2006.  27 p.
Available online at:  http://handle.dtic.mil/100.2/ADA457208
The objective was to coordinate research and development activities throughout private industry, academic laboratories, and private research laboratories to support the development of a national strategy for securing cyberspace.

Snyderman, Judith.  Experts Provide Insights on Strategic Reports.  American Forces Press Service, February 4, 2010.
Available online at:  http://www.defense.gov/news/newsarticle.aspx?id=57854
Defense officials who helped to write the Quadrennial Defense Review and the related Ballistic Missile Defense Review offered insights into their analyses.

Studies Strategic Studies Institute.  National Security Strategy Studies.  United States Army War College.
Available online at:  http://www.strategicstudiesinstitute.army.mil/national-security-strategy-policy/national-military-strategy/
A collection of articles and paper on National Security.

U.S. Air Force Posture Statement
Available online at:  http://www.posturestatement.af.mil/shared/media/document/AFD-090522-062.pdf
2009 U.S. Air Force Posture Statement.

U.S. Army War College.  DIME:  Information as Power
Available online at:  http://www.carlisle.army.mil/dime/
"Resource for military researchers, students, faculty and practitioners, looking for current information related to the information element of national power.  Areas addressed include Information Operations, Strategic Communication, Network Centric Warfare and to a lesser degree, military robotics and information assurance"

United States.  Congress.  Senate.  Senate Judiciary Committee.  Subcommittee on Terrorism and Homeland Security.  Cybersecurity:  Preventing Terrorist Attacks and Protecting Privacy in Cyberspace.  GPO, November 17, 2009.
Available online at:  http://judiciary.senate.gov/hearings/hearing.cfm?id=4169
Witness testimony is obtained by clicking on the Witness’s name in the right side navigation bar under witness testimony.  Witnesses:  James Baker, Associate Deputy Attorney General, Office of the Deputy Attorney General U.S. Department of Justice; Philip Reitinger, Deputy Under Secretary, National Protection and Programs Directorate, Director, National Cyber Security Center, U.S. Department of Homeland Security; Richard Schaeffer, Director, Information Assurance Directorate, National Security Agency, U.S. Department of Defense; Steven R. Chabinsky, Deputy Assistant Director, Cyber Division Federal Bureau of Investigation, U.S. Department of Justice; Gregory T. Nojeim, Senior Counsel and Director, Project on Freedom, Security & Technology, Center for Democracy and Technology; Larry Clinton, President, Internet Security Alliance, and Larry M. Wortzel, Ph.D., Vice Chairman, U.S.-China Economic and Security Review Commission.

United States.  Department of Homeland Security.  National Cyber Security Division
Available online at:  http://www.dhs.gov/xabout/structure/editorial_0839.shtm
Includes mission statement, strategic objectives, organization and functions and cyber-risk management programs.

United States.  Department of Homeland Security.  Protecting America's Critical Infrastructure - Cyber Security
Available online at:  http://www.dhs.gov/files/programs/gc_1234200709381.shtm
Fact sheet.

United States.  Department of the Air Force.  Air Force Doctrine Document 2-11 (DRAFT – NOT FOR IMPLEMENTATION).  2008.
Available online at:  http://www.au.af.mil/au/awc/cyberspace/documents/AF%20Symposium%20AFDD%202-11.pdf
This (draft) Air Force Doctrine Document (AFDD) establishes doctrinal guidance for the employment of United States (US) Air Force forces in, through, and from cyberspace.  It is the keystone of Air Force operational-level doctrine for cyberspace operations.

United States.  Government Accountability Office.  Information Security:  Emerging Cybersecurity Issues Threaten Federal Information Systems.  May 2005.
Available online at:  http://www.au.af.mil/au/awc/awcgate/gao/d05231.pdf

United States.  Joint Chiefs of Staff.  Joint Publication 3-13:  Information Operations.  February 13, 2006.
Available online at:  http://www.dtic.mil/doctrine/new_pubs/jp3_13.pdf
This publication provides doctrine for information operations planning, preparation, execution, and assessment in support of joint operations.

Woolley, Pamela L.  Defining Cyberspace as a United States Air Force Mission.  Wright-Patterson AFB, OH, Air Force Institute of Technology, School of Engineering and Management, June 2006.  55 p.
Available online at:  http://handle.dtic.mil/100.2/ADA453972
"Provides a common framework and language for the definition of cyberspace."--from Abstract .


Internet Resources (Student Research)


Beeker, Kevin R.  Strategic Deterrence in Cyberspace:  Practical Application.  Wright-Patterson AFB, OH, Air Force Institute of Technology, June 2009.  119 p.
Available online at:  http://handle.dtic.mil/100.2/ADA502250
This research project outlines practical steps that the United States can take to improve strategic deterrence in cyberspace.

Farmer, David B.  Do the Principles of War Apply to Cyber War?  Fort Leavenworth, KS, School of Advance Military Studies, U. S. Army Command and General Staff College, May 2010.
Available online at:  http://handle.dtic.mil/100.2/ADA522972

Gale, David.  Cybermad:  Should the United States Adopt a Mutually Assured Destruction Policy for Cyberspace?  Maxwell AFB AL, Air Command and Staff College, 2009.  33 p.
Available online at:  https://www.afresearch.org/
Cyber threats can be categorized as state or non-state actors.  This research paper looks at state actors.  It asks the question, should the US adopt a mutually assured destruction (MAD) doctrine for cyberspace?  Scroll to bottom to download paper.

Glebocki, Joseph.  DOD Computer Network Operations:  Time to Hit the Send Button.  Carlisle Barracks, PA, Army War College, 2008.  42 p.
Available online at:  http://handle.dtic.mil/100.2/ADA478337
"Due to the highly automated and interconnected nature of U.S. critical infrastructure, it is not practical to erect a barrier between military and civilian operations that can serve U.S. national interests."--Abstract.

Keller, Rebecca.  Influence Operations and the Internet:  A 21st Century Issue - Legal, Doctrinal and Policy Challenges in the Cyber World.  Maxwell AFB, AL, Air War College, February 2010.  28 p.
Available online at:  https://www.afresearch.org/
This paper addresses seven distinct areas that must be examined and updated for cyber operations.  Scroll to bottom to download paper.

Kinley, Kelli.  What Constitutes an Act of War in Cyberspace?  Wright-Patterson AFB, OH, Air Force Institute of Technology, August 2008.  80 p.
Available online at:  http://handle.dtic.mil/100.2/ADA480404
This research and it’s resulting data analysis provides a better understanding of what the current laws of war are and how they relate to cyber war and the complexities that exist, along with recommendation on future revisions of the laws.

Schilling, Jeffery R.  Defining Our National Cyberspace Boundaries.  Carlisle Barracks, PA, Army War College, February 2010.  31 p.
Available online at:  http://handle.dtic.mil/100.2/ADA518322
"Identifying our national cyberspace boundaries is a fundamental step required before the United States can define hostile acts and intent by cyberspace adversaries and assign jurisdictions for a collective defense.  In order for the United States to execute a unilateral cyberspace response action (RA) against hostile actors, we must be able to declare that the hostile act or intent took place within our national cyberspace boundaries.--Abstract.

Zoller, Richard G.  Russian Cyberspace Strategy and a Proposed United States Response.  Carlisle Barracks, PA, Army War College, January 2010.  32 p.
Available online at:  http://handle.dtic.mil/100.2/ADA522027


Books


Access Controlled:  The Shaping of Power, Rights, and Rule in Cyberspace, edited by Ronald Deibert and others.  Cambridge, MA, MIT Press, 2010.  617 p.
This book is an examination of internet censorship and filtering practices worldwide that strategist need to be familiar with.
Book call no.:  005.8 A171

Allen, Patrick D.  Information Operations Planning.  Norwood, MA, Artech House, 2007.  323 p.
Book call no.:  355.343 A428i

Amoroso, Edward G.  Cyber Security.  Summit, NJ, Silicon Press, 2007.  177 p.
Table of contents available at:  http://www.loc.gov/catdir/toc/ecip068/2006005166.html
Book call no.:  363.325 A524c

Buttyan, Levente and Hubaux, Jean-Pierre.  Security and Cooperation in Wireless Networks:  Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing.  New York, Cambridge University Press, 2008.  485 p.
"Analyzes major networking trends; Describes key problems such as "stealing of bandwidth", cheating with identities, illegitimate access to confidential data, and attacks against privacy."
Book call no.:  005.8 B989s

Caralli, Richard A and others.  Preparing to Fight in Cyberspace.  Pittsburgh, PA, Carnegie Mellon, 2007.  106 p.
"This document consists of five white papers written between June 2006 and June 2007 by members of the technical staff at Carnegie Mellon University’s Software Engineering Institute.  The USAF Cyberspace Task Force ... selected paper topics to help meet the tremendous challenges in planning and conducting military operations in th electromagnetic spectrum."--P. 11
Book call no.:  355.343 P927

Caulkins, Bruce D.  Proactive Self-Defense in Cyberspace.  Arlington, VA, Institute of Land Warfare, Association of the United States Army, August 2009.  14 p.
This paper discusses that the DoD’s cyber defense strategy must be proactive, dynamic and polymorphic in nature to anticipate future attacks.
Also available online at:  http://handle.dtic.mil/100.2/ADA494722
Book call no.:  55.343 C372p

Clarke, Richard A. and Knake, Robert K.  Cyber War:  The Next Threat to National Security and What to Do about It.  New York, ECCO, 2010.  290 p.
The book explains how cyber weapons work and how vulnerable America is to the new world of nearly untraceable cyber criminals and spies.  This story of technology, government, and military strategy involving criminals, spies, soldiers, and hackers begins the much needed public policy debate about what America’s doctrine and strategy should be, not just for waging, but for preventing the First Cyber War.
Book call no.:  363.32593843 C594c

Convertino, Sebastian M. and others.  Flying and Fighting in Cyberspace.  Maxwell Air Force Base, AL, Air University Press, 2007.  82 p.
"Develops the foundation for a new military operation concept for "fighting the net" war.
Book call no.:  355.343 C766f

Courville, Shane P.  Air Force and the Cyberspace Mission:  Defending the Air Force's Computer Networks in the Future.  Maxwell Air Force Base, AL, Center for Strategy and Technology, Air War College, 2007.  53 p.
Available online at:  http://www.au.af.mil/au/awc/awcgate/cst/csat63.pdf.
Also available online at:  http://handle.dtic.mil/100.2/ADA474828
Book call no.:  005.8 C866a

CSIS Commission on Cybersecurity for the 44th Presidency.  Securing Cyberspace for the 44th Presidency/A Report of the CSIS Commission on Cybersecurity for the 44th Presidency.  Washington, DC, Center for Strategic and International Studies, 2008.  90 p.
Cochairs:  Representative James R.  Langevin, Representative Michael T. McCaul, Scott Charney, Lt. General Harry Raduege, USAF (Ret.); Project Director:  James A. Lewis.
Also available online at:  http://www.csis.org/media/csis/pubs/081208_securingcyberspace_44.pdf
Book call no.:  005.80973 S446

Cyber Warfare and Cyber Terrorism, edited by Lech J. Janczewski and Andrew M. Colarik.  Hershey, PA, Information Science Reference, 2008.  532 p.
Review section VII, Chapter LII.  "Reviews problems, issues, and presentations of the newest research in the field of cyberwarfare and cyberterrorism.  While enormous efficiencies have been gained as a result of computers and telecommunications technologies, use of these systems and networks translates into a major concentration of information resources, creating a vulnerability to a host of attacks and exploitations."--Abstract from publication.  Table of contents at:  http://www.loc.gov/catdir/toc/ecip077/2006102336.html.
Book call no.:  355.343 C9944

Cyberpower and National Security, edited by Franklin D. Kramer and others.  Washington, DC, Potomac Books, 2009.  642 p.
Read introduction, and Chapters 13, 14, and 22.
Book call no.:  355.343 C9945

Delibasis, D.  The Right to National Self-Defense:  In Information Warfare Operations.  Bury St. Edmunds, England, Arena, 2007.  418 p.
Addresses topics that should be considered when dealing with national security issues.
Book call no.:  341.63 D353r

Drapeau, Mark D.  Social Software and National Security:  An Initial Net Assessment.  Washington, DC, Center for Technology and National Security Policy, National Defense University, April 2009.  35 p.
Discusses uses of social software by the United States government and associated national security concerns.
Book call no.:  303.4833 D765s

Drew, Dennis M. and Snow, Donald M.  Making Twenty-First-Century Strategy:  An Introduction to Modern National Security Processes and Problems.  Maxwell AFB, AL, Air University Press, November 2006.  268 p.
Cyberspace is indexed one time in this book, Chapter 1, page 1.  However the fundamental functions of developing, deploying and orchestrating cyberspace is the same as with other domains.  This work defines national security strategy, its objectives, the problems it confronts, and the influences that constrain and facilitate its development and implementation in a post-Cold War, post-9/11 environment.
Also available online at:  http://aupress.maxwell.af.mil/Books/Drew_Snow/DrewSnow.pdf
Book call no.:  355.03 D776ma

Geise, Norman P.  National Defense, Security, and Strategy.  New York, Nova Science Publishers, 2010.  98 p.
A collection of articles related to National Security. 
Book call no.:  355.033073 N2777

Grant, Rebecca.  Rise of Cyber War.  Washington, DC, Mitchell Institute Press, November 2008.  32 p.
This special report provides insight to and background on the thinking of major contributors to cyberspace policy development decisions.  Of interest is the section on Foundational Doctrine Statement and Selected Definitions pp. 31-32.
Also available online at:  http://www.afa.org/Mitchell/reports/1108cyberwar.pdf
Book call no.:  355.343 G762r

Grant, Rebecca.  Victory in Cyberspace.  Arlington, VA, Air Force Association, 2007.  32 p.
An Air Force Association special report. Note the
Also available online at:  http://www.afa.org/media/reports/victorycyberspace.pdf
Book call no.:  005.8 G762v

Jane's Radar and Electronic Warfare Systems 2007-2008.  Alexandria, VA, Jane's Information Group, 2007.  664 p.
Detailed information about the world's military radars and electronic warfare systems.
Book call no.:  R 623.73 J33 19th ed. 2007/2008

Kizza, Joseph and Kizza, Florence Migga.  Securing the Information Infrastructure.  Hershey, PA, Cybertech Pub., 2008.  368 p.
Table of contents available online at:  http://www.loc.gov/catdir/toc/ecip0712/2007007405.html
Book call no.:  005.8 K62s

Knapp, Kenneth J.  Cyber-Security and Global Information Assurance:  Threat Analysis and Response Solutions.  Hershey, PA, Information Science Reference, 2009.  434 p.
Addresses issues facing cyber-security from both a national and global perspective.
Book call no.:  005.8 C9941

Knapp, Kenneth J.  Threat Analysis and Response Solutions.  Hershey, PA, Information Science Reference, 2009.  454 p.
"This book provides a valuable resource by addressing the most pressing issues facing cyber-security from both a national and global perspective"--provided by publisher.
Book call no.:  005.8 C9941

Kramer, Franklin D.  Frameworks and Insights Characterizing Trends in Cyberspace and Cyberpower.  Washington, DC, National Defense University, Center for Technology and National Security Policy, June 2007.  34 p.
Also available online at:  http://handle.dtic.mil/100.2/ADA481375
Book call no.:  355.033573 F8131

Krekel, Bryan A.  Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation.  McLean, VA, Northrop Grumman Corp., Information Systems Sector, October 2009.  88.
Presents an open source assessment of China’s capability to conduct computer network operations and information warfare both during peacetime and periods of conflict.
Also available online at:  http://handle.dtic.mil/100.2/ADA509000
Book call no.:  355.343 K92c

Lewis, Ted G.  Critical Infrastructure Protection in Homeland Security:  Defending a Networked Nation.  Hoboken, NJ, Wiley-Interscience, 2006.  474 p.
Ted G. Lewis is Professor of Computer Science and Academic Associate of the Homeland Defense and Security curriculum at the Naval Postgraduate School.
Book call no.:  005.80973 L676c

Libicki, Martin C.  Conquest in Cyberspace:  National Security and Information Warfare.  New York, Cambridge University Press, 2007.  323 p.
Table of contents at:  http://www.loc.gov/catdir/toc/ecip071/2006030973.html
Book call no.:  355.343 L695c

Libicki, Martin C.  Cyberdeterrence and Cyberwar.  Santa Monica, CA, RAND, 2009.  214 p.
Cyberwar is nothing so much as the manipulation of ambiguity.  The author explores these in detail and uses the results to address such issues as the pros and cons of counterattack, the value of deterrence and vigilance, and other actions the United States and the U.S. Air Force can take to protect itself in the face of deliberate cyberattack."--P. [4] off the cover.
Also available online at:  http://handle.dtic.mil/100.2/ADA508151
Book call no.:  355.343 L695ca

Mesic, Rich.  Air Force Cyber Command (provisional) Decision Support.  Santa Monica, CA, RAND, 2010.  23 p.
"Because cyberspace can affect core missions and capabilities, it seems obvious that the Air Force should take steps to establish an organization to address this medium.  The details have been difficult to establish, however, because this medium is very different from air and space.  The Air Force initially instituted a provisional major command but has since instead replaced it with a numbered air force, the 24th Air Force, under Space Command."--Rand web site.
Also available online at:  http://handle.dtic.mil/100.2/ADA517283
Book call no.:  358.41683 A298

Military Perspectives on Cyber Power, edited by Larry K. Wentz and others.  Washington, DC, National Defense University, Center for Technology and National Security Policy, July 2009.  115 p.
This book is a collection of white papers identifying cyberspace issues.  Of interest is chapter 4, The Air Force in Cyberspace:  Five Myths of Cyberspace Superiority, pp. 87 - 95.
Also available online at:  http://handle.dtic.mil/100.2/ADA505424
Book call no.:  355.3430973 M644

Military Perspectives on Cyberpower, edited by Larry K. Wentz and others.  Washington, DC, National Defense University, Center for Technology and National Security Policy, July 2009.  105 p.
Center for Technology and National Security Policy Center for Technology and National Security Policy (CTNSP) and National Defense University (NDU), has conducted extensive research to identify and explore major cyber issues.  Each of the Services were asked if they could contribute to the public debate on these cyber issue ...  To put those contributions in context, Dr. Elihu Zimet and Dr. Charles Barry from CTNSP have written an initial chapter that briefly summarizes the major findings and recommendations from the individual authors.
Also available online at:  http://handle.dtic.mil/100.2/ADA505424
Book call no.:  355.3430973 M644

Owens, William A.  Technology, Policy, Law, and Ethics regarding U.S. Acquisition and use of Cyberattack Capabilities.  Washington, DC, National Academies Press, 2009.  367 p.
See chapter on "Perspectives on Cyberattack Outside National Security", pp 200-213.
Book call no.:  355.343 T255

Power and Security in the Information Age:  Investigating the Role of the State in Cyberspace, edited by Myriam Dunn Cavelty and others.  Aldershot, Hants, England; Burlington, VT, Ashgate, 2007.  167 p.
"This volume focuses on the role of the state in defending against cyber-threats and in securing the information age.  The notion that is most uncritically accepted within the overall information security debate is that state power is eroding due to the effects of information and communication technology and that the state is unable to provide security in the information age.  This volume challenges the unidimensionality of this statement."--BOOK JACKET.
Book call no.:  005.8 P887

President's Information Technology Advisory Committee.  Cyber Security:  A Crisis of Prioritization.  Arlington, VA, National Coordination Office for Information Technology Research and Development, 2005.  58 p.
Also available online at:  http://handle.dtic.mil/100.2/ADA449192
Book call no.:  005.8 P933c

Renshon, Stanley Allen.  National Security in the Obama Administration:  Reassessing the Bush Doctrine.  Milton Park, Abingdon, Oxon; NY, Routledge, 2010.  291 p.
Book call no.:  355.033073 R421n

Schiller, Craig A. and others.  Botnets:  The Killer Web App.  Rockland, MA, Syngress Publishing, 2007.  464 p.
"Information on the newest Internet threat, Botnets, Zombie Armies and Botherders.  Discusses Botnets, how they spread, how they work and how to detect them."--Abstract from publication.
Book call no.:  005.8 S334b

Securing Freedom in the Global Commons, edited by Scott Jasper.  Stanford, CA, Stanford Security Studies, 2010.  293 p.
This book was written for anyone wishing to understand the challenges we face to our use of the global commons.  The global commons—outer space, international waters, international airspace, and cyberspace—are assets outside of national jurisdiction that serve as essential conduits for these networks, facilitating the free flow of trade, finance, information, people, and technology.
Book call no.:  355.0335 S446

United States.  Air Force.  Cyber Command.  Air Force Cyber Command Strategic Vision.  United States, Air Force Cyber Command, 2008.  18 p.
"This Air Force Cyber Command Strategic Vision is a foundation for the tremendous work that lies ahead as the organization achieves initial operational capability in 2008 and postures for full operational capability in 2009.  It explains the mission of Air Force Cyberspace Command in the context of the strategic realities faced by the United States".-- Abstract.
Also available online at:  http://handle.dtic.mil/100.2/ADA479060
Book call no.:  005.8 U583a

United States.  Congress.  House.  Committee on Oversight and Government Reform.  Cybersecurity:  A Review of Public and Private Efforts to Secure Our Nation's Internet Infrastructure.  Washington, GPO, 2008.  136 p.
Hearing before the Subcommittee on Information Policy, Census, and National Archives of the Committee on Oversight and Government Reform, House of Representatives, October 23, 2007.
Also available online at:  http://purl.access.gpo.gov/GPO/LPS99161
Book call no.:  005.8 U58cb

United States.  Congress.  House.  Committee on Oversight and Government Reform.  Cybersecurity:  A Review of Public and Private Efforts to Secure our Nation’s Internet Infrastructure.  One Hundred Tenth Congress, first session, October 23, 2007.  Washington, DC, U.S. GPO., 2007.  136 p.
Book call no.:  005.8 U58cb

United States.  Congress.  Senate.  Committee on Homeland Security and Governmental Affairs.  National Cyber Security:  Research and Development Challenges Related to Economics, Physical Infrastructure and Human Behavior:  An Industry, Academic and Government Perspective.  Hanover, NH, Institute for Information Infrastructure Protection (I3P), 2009.  32 p.
An examination of the cyber security challenges facing the economic, physical, and human infrastructures underscores the need to make cyber security a national priority.
Also available online at:  http://www.thei3p.org/docs/publications/i3pnationalcybersecurity.pdf
Book call no.:  364.1680973 N277

United States.  Defense Investigative Service.  Counterintelligence Office and United States.  Defense Security Service.  Counterintelligence Office.  Technology Collection Trends in the U.S. Defense Industry.  Alexandria, VA, DSS Counterintelligence Office, June 20, 2006.  34 p.
Also available online at:  http://handle.dtic.mil/100.2/ADA464851
Book call no.:  658.47 T255 2006

United States.  Dept. of Defense.  National Defense Strategy.  Washington DC, Department of Defense, June 2008.  23 p.
Also available online at:  http://handle.dtic.mil/100.2/ADA484448
Book call no.:  355.033073 N2779 2008

United States.  Dept. of Defense.  Quadrennial Defense Review Report (QDR).  Washington, DC, U.S. Dept. of Defense, February 2010.  105 p.
Fairchild Reference Section.
Also available online at:  http://www.defense.gov/qdr/QDR%20as%20of%2026JAN10%200700.pdf
Book call no.:  355.033573 Q1 2010

United States.  Dept. of Defense.  Quadrennial Roles and Missions Review Report .  Washington, DC, Dept. of Defense, January 2009.  39 p.
Teams of senior civilian and military leaders from the Military Services, Joint Staff, Combatant Commands, and Office of the Secretary of Defense worked together to develop a framework that defines and links the Department's Core Mission Areas with its Core Competencies and Functions of the Armed Forces.  Cyberspace is addressed on pp. 14-18.
Also available online at:  http://handle.dtic.mil/100.2/ADA493403
Book call no.:  355.033573 U582gb

United States.  Executive Office of the President.  Cyberspace Policy Review:  Assuring a Trusted and Resilient Information and Communications Infrastructure.  Washington, DC, Executive Office of the President of the United States, 2009.  38 p.
"The government has a responsibility to address these strategic vulnerabilities to ensure that the United States and its citizens, together with the larger community of nations, can realize the full potential of the information technology revolution."--Preface.
Also available online at:  http://handle.dtic.mil/100.2/ADA501541
Book call no.:  303.4833 U58c

United States.  President (2009 - :  Obama).  National Security Strategy.  Washington, DC, White House, May 2010.  52 p.
Also available online at:  http://www.whitehouse.gov/sites/default/files/rss_viewer/national_security_strategy.pdf
Book call no.:  355.033073 U583n 2010

United States.  White House Communications Agency.  The National Strategy to Secure Cyberspace 2003.  Washington, DC, White House Communications Agency, February 2003.  61 p.
"The National Strategy to Secure Cyberspace provides a framework for protecting this infrastructure that is essential to our economy, security, and way of life." -- from letter on page iii.
Also available online at:  http://handle.dtic.mil/100.2/ADA413614
Book call no.:  005.8 U582n 2003

Unrestricted Warfare Symposium:  Proceedings on Combating the Unrestricted Warfare Threat:  Terrorism, Resources, Economics, and Cyberspace, Executive editor, Ronald R. Luman.  Laurel, MD, Johns Hopkins University, Applied Physics Laboratory, 2010.  488 p.
Also available online at:  http://www.jhuapl.edu/urw_symposium/Proceedings/2009/Book/2009URWBook.pdf
Book call no.:  355.02 U58u 2009

Waters, Gary and others.  Australia and Cyber-Warfare.  Canberra, Australia, ANU E Press, 2008.  173 p.  (Canberra Papers on Strategy and Defence, No. 168)
Also available online at:  http://epress.anu.edu.au/sdsc/cyber_warfare/pdf/whole_book.pdf
Book call no.:  355.033094 W329a


Documents


Cybercrime:  An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws.  Washington, DC, Congressional Research Service, Library of Congress, February 2008.  97 p.
Doc. call no.:  M-U 42953-1 no.08-97-1025

Library of Congress.  Congressional Research Service.  Botnets, Cybercrime and Cyberterrorism:  Vulnerabilities and Policy Issues for Congress, by Clay Wilson.  Washington, CRS, November 15, 2007.  40 p.
Also available online at:  http://handle.dtic.mil/100.2/ADA474929
Doc. call no.:  M-U 42953-1 no.SER-RL32114

Library of Congress.  Congressional Research Service.  Botnets, Cybercrime and Cyberterrorism:  Vulnerabilities and Policy Issues for Congress, by Clay Wilson.  Washington, CRS, January 29, 2008.  40 p.
Also available online at:  http://handle.dtic.mil/100.2/ADA474929
Doc. call no.:  M-U 42953-1 no.SER-RL32114

Library of Congress.  Congressional Research Service.  Computer Attack and Cyberterrorism:  Vulnerabilities and Policy Issues for Congress.  Washington, CRS, 2003, 2005, 2007, 2008
Also available online at:  http://opencrs.com/document/RL32114/2005-04-01/
Doc. call no.:  M-U 42953-1 no.05-RL32114

Library of Congress.  Congressional Research Service.  Cybersecurity:  Current Legislation, Executive Branch Initiatives, and Options for Congress, by Catherine A. Theohary and John Rollins.  Washington, DC, CRS, January 12, 2010.  26 p.
Updated on an irregular basis.  Includes bibliographical references.  This report identifies cybersecurity policy issues that have been proposed for priority consideration.  The report lists and synopsizes current legislation that has been developed to address various aspects of the cybersecurity problem.
Also available online at:  http://opencrs.com/document/R40836/2010-01-12/
Doc. call no.:  M-U 42953-1 no.R40836

United States.  Army Training and Doctrine Command.  Office of the Assistant Deputy Chief of Staff for Intelligence-Threats.  Cyber Operations and Cyber Terrorism.  Fort Leavenworth, KS, US Army Training and Doctrine Command, 2005.  1 vol.
Also available online at:  http://handle.dtic.mil/100.2/ADA439217
Doc. call no.:  M-U 42934-86b

United States.  Government Accountability Office.  Critical Infrastructure Protection:  OMB Leadership Needed to Strengthen Agency Planning Efforts to Protect Federal Cyber Assets:  Report to Congressional Requesters.  Washington, DC, GAO, October 2009.  51 p.
Also available online at:  http://www.gao.gov/cgi-bin/getrpt?GAO-10-148
Doc. call no.:  M-U 41026-173 no.10-148

United States.  Government Accountability Office.  Cybersecurity:  Progress Made but Challenges Remain in Defining and Coordinating the Comprehensive National Initiative.  Washington, DC, GAO, March 2010.  60 p.
Also available online at:  http://www.gao.gov/cgi-bin/getrpt?GAO-10-338
Doc. call no.:  M-U 41026-173 no.10-338

United States.  Office of the Chairman of the Joint Chiefs of Staff.  The National Military Strategy for Cyberspace Operations.  Washington, DC, U.S. Dept. of Defense, Joint Chiefs of Staff, December 2006.  54 p.
Also available online at:  http://www.dod.mil/pubs/foi/ojcs/07-F-2105doc1.pdf
Doc. call no.:  M-U 40592-239


Documents (Student Research)


Arwood, Sam.  Cyberspace as a Theater of Conflict:  Federal Law, National Strategy and the Department of Defense and Homeland Security.  Wright-Patterson AFB, OH, Air Force Institute of Technology, June 2007.  127 p.
The research is divided into three distinct parts.  First is a review and an evaluation of the legal relationships between the Combatant Commanders, the Services, and DoD Agencies with respect to cyberspace.  Second, linked National Strategy to a Service's targeting strategy via the Effects Based Planning process.  Last, is an evaluation of military cyberspace activities and responsibilities based upon the conclusions and observations of the first two sections.  Also included is a brief evaluation of cyberspace activities not yet addressed by the DoD but soon to be a responsibility of the Department.
Also available online at:  http://handle.dtic.mil/100.2/ADA471536
Doc. call no.:  M-U 39567-5 A796c

Beeker, Kevin R.  Strategic Deterrence in Cyberspace:  Practical Applications.  Wright-Patterson Air Force Base, OH, Air Force Institute of Technology, June 2009.  109 p.
The author outlines practical steps that the United States can take to improve strategic deterrence in cyberspace.
Also available online at:  http://handle.dtic.mil/100.2/ADA502250
Doc. call no.:  M-U 39567-5 B414s

Bohannon, Leland.  Cyberspace and the New Age of Influence.  Maxwell AFB, AL, School of Advanced Air and Space Studies, June 2008.  88 p.
The thesis analysis shows that capabilities developed to exploit the unique nature of the cyber domain can be extremely persuasive if properly integrated into a well-crafted grand strategy.  Effects created within the cyber domain can have real-world results that drive an opposing state’s leaders to make decisions favorable to the state that is able to wield power in the domain.
Also available online at:  https://www.afresearch.org/
Doc. call no.:  M-U 43998-1 B676c

Clagnaz, John J.  U.S. Cyber Command Cyberspace Superiority in the 21st Century.  Wright-Patterson Air Force Base, OH, Air Force Institute of Technology, March 2010.  93 p.
Distribution authorized to U.S. Gov’t. agencies only.
Doc. call no.:  M-U 39567-5 C584u

Cochran, Jordon T.  Ten Propositions Regarding Cyberpower.  Maxwell AFB, AL, School of Advanced Air and Space Studies, June 2008.  59 p.
The objective of this thesis is to stimulate discussions and help those who do not yet understand or appreciate the nature of cyberpower in modern warfare.
Also available online at:  https://www.afresearch.org/
Doc. call no.:  M-U 43998-1 C663t

Griffin, Jane J.  DoD Role for Securing United States Cyberspace.  Wright-Patterson AFB, OH, Air Force Institute of Technology, 2008.  99 p.
"The Department of Defense is responsible for protecting the nation and its geographical boundaries from attack, but what is DoD’s role for securing the United States’ cyberspace?  Research was conducted by studying national orders, strategies, policies plans, and doctrine to determine DoD’s role for securing the United States’ cyberspace."--Abstract.
Also available online at:  http://handle.dtic.mil/100.2/ADA487518
Doc. call no.:  M-U 39567-5 G851d

Hamilton, Brian P.  Our National Information Infrastructure:  An Immediate Strategic Concern in National Security Policy.  Carlisle Barracks, PA, U.S. Army War College, March 2004.  18 p.
This paper provides an assessment of national efforts to secure cyberspace and puts forward recommendations to strengthen this critical national infrastructure.
Also available online at:  http://handle.dtic.mil/100.2/ADA423907
Doc. call no.:  M-U 39080-537 H2171o

Knapp, Kenneth J.  Cyber Warfare:  Raising Information Security to a Top Priority.  Wright-Patterson AFB, OH, Air Force Institute of Technology, 2004.  32 p.
"This article provides a summary of the twelve selected characteristics of information conflict and offers a comprehensive strategy to promote effective information security in organizations."--Abstract from web site.
Also available online at:  http://handle.dtic.mil/100.2/ADA425352
Doc. call no.:  M-U 43567-995

Knapp, Laura L.  Interpreting Chinese Cyber Attacks of 2007:  Indications of China’s Cyber Warfare Strategy.  Maxwell AFB, AL, Air Command and Staff College, April 2007.  61 p.
The thesis asserts that China is conducting a systematic, long-range cyber campaign designed to achieve regional hegemony, continued economic advancement, and global superpower status.
Also available online at:  https://www.afresearch.org/
Doc. call no.:  M-U 43122 K673i

Mattison, Mark.  Achieving Decision Making Superiority:  USAF Cyber Weapons School.  Maxwell AFB, AL, Air War College, 2007.  52 p.
Also available online at:  https://research.au.af.mil/papers/ay2007/awc/Mattison.pdf
Doc. call no.:  M-U 43117 M444a

Muniz, Jorge Jr.  Declawing the Dragon:  Why the U.S. Must Counter Chinese Cyber-Warriors.  Fort Leavenworth, KS, U.S. Army Command and General Staff College, June 2009.  71 p.
"This paper will seek to ascertain the United States military’s ability to defend and enforce our national interests, both in regards to our own domestic infrastructures as well as our partners abroad from Chinese-directed cyber-attacks."--Abstract.
Also available online at:  http://handle.dtic.mil/100.2/ADA502899
Doc. call no.:  M-U 42022 M966d

O'Hara, Timothy M.  Department of Homeland Security Policy for Defense of Cyberspace.  Carlisle Barracks, PA, U.S. Army War College, 2003.  22 p.
Also available online at:  http://handle.dtic.mil/100.2/ADA414513
Doc. call no.:  M-U 39080-537 O36d

Ortiz, Osvaldo.  Joint Interagency Coordination Group - Cyber:  Empowering the Combatant Commanders Against the No-Borders Threat.  Newport, RI, Naval War College, May 2009.  24 p.
Strategists need to be familiar with the concepts presented in this paper.
Also available online at:  http://handle.dtic.mil/100.2/ADA503033
Doc. call no.:  M-U 41662 O77j

Rogers, John C.  Shaping the Air Force Operational Environment in Cyberspace.  Maxwell AFB, AL, Air War College, February 2010.  33 p.
The AF must get back to basics and apply the same strategies and doctrine to the cyberspace domain which are applied to air, land, space, and sea domains.  Scroll to bottom to download paper.
Also available online at:  https://www.afresearch.org/
Doc. call no.:  M-U 43117 R727s

Schrader, John F.  Future Air Force Operations in Cyberspace:  Organizing for a New Operational Domain.  Maxwell AFB, AL, Air War College, 2007.  42 p.
Also available online at:  https://research.au.af.mil/papers/ay2007/awc/Schrader.pdf
Doc. call no.:  M-U 43117 S3771f

Simcox, Frank W.  Flexible Options for Cyber Deterrence.  Maxwell AFB, AL, Air War College, February 2009.  43 p.
Winner, 2008 Air Force Homeland Security.  This paper describes options for cyber deterrence to address both asymmetric threats from terrorists and the intimidation associated with nation-state peer competitors in the cyber domain.
Also available online at:  https://www.afresearch.org/
Doc. call no.:  M-U 43117 S5881f

Sinks, Michael A.  Cyber Warfare and International Law.  Maxwell AFB, AL, Air Command and Staff College, April 2008.  32 p.
This paper addresses that cyberspace is its own domain, but there are unique demands placed on nations by cyber warfare, existing international laws and definitions are applicable to cyber warfare.
Doc. call no.:  M-U 43122 S6174c

Tobin, Scott D.  Establishing a Cyber Warrior Force.  Wright-Patterson Air Force Base, OH, Air Force Institute of Technology, 2004.  51 p.
Available online at:  http://handle.dtic.mil/100.2/ADA428120
Doc. call no.:  M-U 39567-5 T629e

Upton, Oren K.  Asserting National Sovereignty in Cyberspace:  The Case for Internet Border Inspection.  Monterey, CA, Naval Postgraduate School, June 2003.  79 p.
National sovereignty is a fundamental principle of national security and the modern international system.  This thesis builds a case that national sovereignty inherently and logically gives a sovereign state, such as the United States, the right to establish appropriate Internet border inspection stations.
Also available online at:  http://handle.dtic.mil/100.2/ADA417582
Doc. call no.:  M-U 42525 U71a

Veazie, Arnold K.  US Strategy for Cyberspace.  Carlisle Barracks, PA, U.S. Army War College, April, 2003.  43 p.
This strategic research paper analyzes the U.S. President's 2003 National Strategy to Secure Cyberspace to determine whether it effectively provides solutions for securing cyberspace.  The proposed alternative strategy for securing cyberspace is worth reviewing.
Also available online at:  http://handle.dtic.mil/100.2/ADA416602
Doc. call no.:  M-U 39080-537 V395u

Veit, Joseph L.  How to Defend Cyberspace?:  Future of Defense in Depth in an Offensive Minded World.  Maxwell AFB, AL, Air Command and Staff College, April 2008.  30 p.
This paper recommends a cyber defense strategy that couples a Defense in Depth strategy and an offensive element.  Neither strategy alone can provide the level of protection that is needed.  Together a Defense in Depth approach and an offensive strategy is needed to ensure the necessary Freedom of Action in Cyberspace.
Also available online at:  https://www.afresearch.org/
Doc. call no.:  M-U 43122 V428h

Walker, Allen D.  Applying International Law to the Cyber Attacks in Estonia.  Maxwell AFB, AL, Air Command and Staff College, April 2008.  35 p.
This paper analyses the Estonian cyber attack thus revealing recommendations that apply to both the U.S. and the Department of Defense.
Also available online at:  https://www.afresearch.org/
Doc. call no.:  M-U 43122 W1771a


Periodicals


Ackerman, Robert K.  The Corporate Cyberspace Menace You Don't KnowSignal 62:44-46 August 2008.
Dr. Joel F. Brenner, national counterintelligence executive in the Office of the Director of National Intelligence, warns that virtually no communication or networking device is safe from a broad range of cvberspies.
Also available online at:  http://proquest.umi.com/pqdlink?did=1550080231&Fmt=7&clientId=417&RQT=309&VName=PQD

Alexander, Keith B.  Warfighting in Cyberspace.  Joint Force Quarterly No. 46:58-61 2007.
Also available online at:  http://handle.dtic.mil/100.2/ADA518148

Ashmore, William C.  Impact of Alleged Russian Cyber Attacks.  Baltic Security & Defence Review 11, no. 1:4-41 2009.
Estonia and other former Soviet satellites need to cooperate with North Atlantic Treaty Organization (NATO) to develop a coherent cyber strategy.  Possible countermeasures to a cyber attack are discussed.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=mth&AN=45162390&site=ehost-live&custid=airuniv

Beggs, C. and Warren M.  Safeguarding Australia from Cyber-terrorism:  A Proposed Cyber-terrorism SCADA Risk Framework for Australia.  Journal of Information Warfare 7:24-35 2008.
"Examines a cyber-terrorism SCADA risk framework and proposes a high level managerial framework which is designed to measure and protect SCADA systems from the threat of cyber-terrorism within Australia."

Berg, Paul D.  Dominant Air, Space, and Cyberspace Operations.  Air & Space Power Journal 21:30-31 Spring 2007.
Available online at:  http://www.airpower.maxwell.af.mil/airchronicles/apj/apj07/spr07/focusspr07.html
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=25000329&site=ehost-live&custid=airuniv

Blank, Stephen.  Web War I:  Is Europe's First Information War a New Kind of War?  Comparative Strategy 27:227-247 May-June 2008.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=33190125&site=ehost-live&custid=airuniv

Chaisson, K.  China Report Looks at "Informationization".  Journal of Electronic Defense 30:20 July 2007.
"Reports on the pursuit of cyber warfare and electronic warfare capabilities by China based on a report released by the U.S. Department of Defense.  The term informationization quoted in the report refers to the understanding of information technology as a significant component of the modern battlefield."--Abstract from Web site.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=25657991&site=ehost-live&custid=airuniv

Croom, Charles E. Jr.  Guarding Cyberspace:  Global Network Operations.  Joint Force Quarterly No. 46:64-66 Third Quarter 2007.
Lieutenant General Charles E. Croom, Jr., USAF, is Director, Defense Information Systems Agency.  He is also Commander, Joint Task Force-Global Network Operations, U.S. Strategic Command.  Addresses most of the elements in DIME.
Also available online at:  http://proquest.umi.com/pqdlink?did=1284736971&sid=1&Fmt=1&clientId=417&RQT=309&VName=PQD

Deibert, Ronald J. and Rohozinski, Rafal.  Risking Security:  Policies and Paradoxes of Cyberspace SecurityInternational Political Sociology 4:15-32 March 2010.
The article examines the perennial debates about how to define cyberspace and distinguish it from related concepts, like the Internet.
Also available online at:  http://www3.interscience.wiley.com/cgi-bin/fulltext/123314073/PDFSTART

Doyle, John M.  COIN of the Realm.  Aviation Week & Space Technology 165:122 October 23, 2006.
Discusses the role of cyberspace in terrorism and this should be considered in national strategy.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=23696580&site=ehost-live&custid=airuniv

Epstein, Keith and Grow, Brian.  Recruiting for the Cyber Wars.  Business Week Online  April 15, 2008.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=mth&AN=31711942&site=ehost-live&custid=airuniv

Etzioni, Amitai.  A National Security Strategy for the NEXT ADMINISTRATION.  Military Review 88:99-105 September-October 2008.
The article lays out a set of broad principles and sets of priorities to guide the U.S. military and diplomatic policy.  A good article presenting a methodology for national security policy.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=mth&AN=34448909&site=ehost-live&custid=airuniv

Finding Nemo.  Jane's Terrorism & Security Monitor, pp 18-20, July 2008.
Discusses cyber jihadists Nemo. A national security strategist should be aware that individuals like Nemo exist.

Fulghum, David A. and Norris, Guy.  Cyber Realities.  Aviation Week & Space Technology 168:62 April 21, 2008.

Goodman, G.  "CYBER" Included in Roles and Missions Review.  Journal of Electronic Defense 31:16-17 June 2008.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=mth&AN=32767322&site=ehost-live&custid=airuniv

Goodman, G.  Cyber Warfighting Domain.  Journal of Electronic Defense 31:22 April 2008.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=mth&AN=31640191&site=ehost-live&custid=airuniv

Greatest Hits.  Economist 383:64 May 26, 2007.
"Presents a timeline of information warfare.  In 1986 the Cuckoo's Egg, a Soviet-supported hacker, broke into computers at the Lawrence Berkeley Labs in an attempt to steal U.S. missile defense secrets.  In 1999 Chinese hackers vandalized American website, shutting down the White House site for three days in retaliation for the bombing of the Chinese embassy in Belgrade, Serbia.  Throughout four months in 2000 and 2001 Israeli and Arab hackers vandalized each others' websites."--Abstract from Web site.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=25216496&site=ehost-live&custid=airuniv

House Armed Services Subcommittee Reviews. Cybersecurity Enabling Network Centric Operations.  US Fed News Service April 2, 2008.
Also available online at:  http://proquest.umi.com/pqdweb?did=1457885081&Fmt=7&clientId=417&RQT=309&VName=PQD

Hughes, Rex.  A Treaty for Cyberspace.  International Affairs 86:523-541 March 2010.
The article discusses why; Now may be the time for international society to begin working towards ratification of a global cyber treaty.
Also available online at:  http://web.ebscohost.com/

Kehler, Robert.  Shaping the Joint Fight in AIR, SPACE, and CYBERSPACE.  Joint Force Quarterly No. 49:32-37 2nd Quarter 2008.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=mth&AN=31425522&site=ehost-live&custid=airuniv

Kramer, Franklin D. and Wentz, Larry.  Cyber Influence and International Security.  Defense Horizons 61:1-11 January 2008.
Also available online at:  http://handle.dtic.mil/100.2/ADA479370

Latt, Khine.  Future Naval Supremacy.  Military Technology 31:134-139 2007.
"Discusses the challenges of the Maritime Network Centric Warfare in the United States.  According to the author, for network operations, maritime means dealing with two radically various propagation environments, the waterspace and the airspace.  Moreover, to work with the harsh littoral maritime environment, technology innovations are needed combined with real system solutions to provide effective connectivity to command nodes and undersea domains."--Abstract from Web site.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=26011187&site=ehost-live&custid=airuniv

Lewis, James A.  Sovereignty and the Role of Government in Cyberspace.  Brown Journal of World Affairs 16:55-65 Spring-Summer 2010.
The article explores assertions about sovereignty and the role of the U.S. government in cyberspace.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=50883224&site=ehost-live&custid=airuniv

Libicki, Martine.  Deterrence in Cyberspace.  High Frontier Journal 6, no. 3:16-20 May 2009.
Also available online at:  http://www.afspc.af.mil/shared/media/document/AFD-090519-102.pdf

Lonsdale, David.  The Impact of Cyberspace on Strategy.  High Frontier Journal 6, no. 3:21-25 May 2009.
Entire journal dedicated to cyberspace.  Scroll down to the article.
Also available online at:  http://www.afspc.af.mil/shared/media/document/AFD-090519-102.pdf

Lord, William T.  Cyberspace Operations:  Air Force Space Command Takes the Lead.  High Frontier Journal 6, no. 3:3-5 May 2009.
Maj. Gen Lord, USAF, Commander, Air Force Cyberspace Command.  Entire journal is dedicated to cyberspace.  Scroll down to the article.
Also available online at:  http://www.afspc.af.mil/shared/media/document/AFD-090519-102.pdf

Lord, William T.  USAF Cyberspace Command:  To Fly and Fight in Cyberspace.  Strategic Studies Quarterly 2:5-17 Fall 2008.
Also available online at:  http://www.au.af.mil/au/ssq/2008/fall/lord.pdf

Luber, David R and Wilkinson, David H.  Defining Cyberspace for Military Operations.  Marine Corps Gazette 93:40-46 February 2009.
The article presets a logically definition of cyberspace for military operations that facilitates understanding, thereby enhancing our war fighting effectiveness.
Also available online at:  http://proquest.umi.com/pqdlink?did=1637641151&sid=1&Fmt=2&clientId=417&RQT=309&VName=PQD

Marching Off to Cyberwar.  The Economist 389:20-21 December 6, 2008.
"Attacks launched over the internet on Estonia and Georgia highlight the difficulty of defining and dealing with "cyberwar"."--Abstract from publication.  See special section, Technology Quarterly.

Matthews, William.  In Cyber War, Most of U.S. Must Defend Itself:  As Global Threat Grows, Military Protects Only Its Own Digital Networks.  Defense News 25, no. 5:29  February 1, 2010.
Part 1 in a three-part series called "The Cyber Threat".

Matthews, William.  China Cited as Biggest Cyber Threat to U.S.  Defense News 25, no. 6:30 February 8, 2010.
Part 2 in a three-part series called "The Cyber Threat".

Matthews, William.  U.S. Net-Defense Firms Chase Growing Cybersecurity Market.  Defense News 25, no. 7:10 February 15, 2010.
Part 3 in a three-part series called "The Cyber Threat".

Moon, Terry.  Net-centric or Networked Military Operations?  Defense & Security Analysis 23:55-67 March 2007.
"The contention of this article is that there is an ongoing problem arising from the confusion between "networked" and "net-centric" and that the potential difference has not been adequately addressed in the literature; Argues that, while these terms are often used interchangeably, a well-networked force is not necessarily the same as a net-centric one."--Abstract from publication.

Moseley, Michael.  America's Air Force the Nation's Guardian.  Joint Force Quarterly No. 49:10-15 2008.
The article discusses several strategies implemented for the U.S. Air Force and the challenges they will likely face in the future.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=mth&AN=31425518&site=ehost-live&custid=airuniv

Munns, David W.  The Cyber Dilemma.  Sea Power 50:50-52 May 2007.
"Reports on the increase in attacks utilizing computer operation or cyberspace in the United States.  Cyberspace is used by intruders to organize attacks from a distance, keeping their locations, identity and method of attack anonymous."--Abstract from Web site.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=f5h&AN=25953883&site=ehost-live&custid=airuniv

Murphy, Dennis M.  Attack or Defend? Leveraging Information and Balancing Risk in Cyberspace.  Military Review 90:88-96 May-June 2010.
Will the Army develop an "Airland Battle" equivalent for cyberspace?
Also available online at:  http://usacac.army.mil/CAC2/MilitaryReview/Archives/English/MilitaryReview_20100630_art013.pdf

National Security Space Institute (NSSI) Space News.
The NSSI Space News is a weekly compilation of published items and commentary concerning significant defense-related issues for space professionals.  Individual subscriptions to this news service are available to Air University personnel.  Fairchild Center keeps print copies of the latest few versions only.
Also available online at:  https://www2.peterson.af.mil/NSSI/CESET/DotNet/(S(4um1kk55u00ezrbjcdpkrzyo))/NewsLetter.aspx?s=2  (to subscribe)

Rosine, Matthew.  Deciphering Cyberspace.  Airman 51:10-15 Fall 2007.
"The Air Force's offensive cyberspace operations against its adversaries include denial of service attacks, network hacking, simple deterrence, and complete destruction."--Abstract from Web site.
Also available online at:  http://proquest.umi.com/pqdweb?did=1374187881&Fmt=7&clientId=417&RQT=309&VName=PQD

Shachtman, Noah.  Cyber Attack Flares Up in Eastern Europe.  Discover 30:48 January 2009.

Shaud, John A.  Air Force Research Institute Strategic Concept for 2018–2023.  Strategic Studies Quarterly 2, no. 2:14-42 Winter 2008.
Cyberspace is addressed on pages 35-41.
Also available online at:  http://www.au.af.mil/au/ssq/2008/Winter/shaud.pdf

Shorer-Zeltser, M. and Ben-Israel, G. M.  Religious Internet Networks and Mobilization to Terror.  Journal of Information Warfare 6:1-14 August 2007.
"The current research is a part of a broader investigation on patterns of political involvement of Diaspora Internet communities.  The study has compared the Internet content of three religious groups (Muslim, Jewish and Sikh) with an attempt to reveal certain cultural and religious codes that bring the potential terrorists to use the Internet as a tool for mobilization and coordination of their actions."--Abstract from publication.

Taylor, P. M. and Yin, J.  Information Operations from an Asian Perspective:  A Comparative Analysis.  Journal of Information Warfare 7:1-23 2008.
"A comparative study of the practice of state-sponsored influence activities, propaganda, public diplomacy, psychological operations, public affairs, cyber warfare, electronic warfare in China, Taiwan, Thailand and Japan."

Umphress, David A.  Cyberspace:  The New Air and Space?  Air & Space Power Journal 21:55-60 Spring 2007.
The article examines the significance and implication of the revised mission of the U.S. Air Force as it flies and fights in cyberspace.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=f5h&AN=25000335&site=ehost-live&custid=airuniv

Wall, David.  Old Tricks, New Dogs:  How to Regulate Cybercrimes.  Jane's Intelligence Review 20:45-47 October 2008.
Explores the legal, regulatory and enforcement challenges that cybercrimes present.

Weiss, Geoffrey F.  Exposing the Information Domain Myth:  A New Concept for Air Force and Information Operations Doctrine.  Air & Space Power Journal 22:49-62 Spring 2008.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=mth&AN=31391146&site=ehost-live&custid=airuniv

Wolf, Walter.  Information - The Fabric of Cyberspace.  Journal of Electronic Defense 30:12 March 2007.
"Argues that information is the fabric of cyberspace.  According to the author, information is the driving force of cyberspace warriors and that operationalized cyberspace will change according to how information operates, transforms and matures."--Abstract from Web site.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=24965703&site=ehost-live&custid=airuniv

Wynne, Michael W.  Flying and Fighting in Cyberspace.  Air & Space Power Journal 21:5-9 Spring 2007.
"Offers a look at the role of airmen in the U.S. Air Force whom every minute of every day are flying and fighting in cyberspace.  According to the author, the efforts in cyberspace must be accelerated because without dominance, operations in the air and space domains as well as those on land and at sea remain at risk."--Abstract from Web site.
Also available online at:  http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=25000314&site=ehost-live&custid=airuniv


This page was last updated on 02/20/2014 03:59 PM

Back Arrow Return to Bibliography List

Back ArrowReturn to the Fairchild Research Information Center Homepage

Accessibility/Section 508