Main Content
Robert Knake, Internet Governance in an Age of Cyber Insecurity, Council on Foreign Relations, September 2010
4.1.1.2
http://www.cfr.org/publication/22832/internet_governance_in_an_age_of_cyber_insecurity.html
Roger D. Scott, Territorially Intrusive Intelligence Collection and International Law, 46 Air Force L. Rev. 217, 1999
6.4.6
http://www.afjag.af.mil/shared/media/document/AFD-090108-036.pdf
Ross Anderson, Why Information Security is Hard -- An Economic Perspective, 17th Annual Computer Security Applications Conference (ACSAC'01), IEEE Computer Society, December, 2001
3.1.4.1
http://cyber.law.harvard.edu/cybersecurity/Why_Information_Security_is_Hard
Ross Anderson, Why Information Security is Hard -- An Economic Perspective, 17th Annual Computer Security Applications Conference (ACSAC'01), IEEE Computer Society, December, 2001. Section 4: Information Warfare - Offense and Defense
3.1.3.1
http://cyber.law.harvard.edu/cybersecurity/Why_Information_Security_is_Hard
Russian Proposal, Convention on International Information Security, November 2011
7.2.4
http://www.lawfareblog.com/wp-content/uploads/2012/02/russian-draft-cyber-convention.doc
Seth Schoen, The Message of Firesheep:”Baaaad Websites, Implement Sitewide HTTPS Now!”, EFF, Oct 29, 2010
2.3.3.3
https://www.eff.org/deeplinks/2010/10/message-firesheep-baaaad-websites-implement
Seymour E. Goodman and Herbert S. Lin, Toward a Safer and More Secure Cyberspace, Ch. 6.4: The Economics of Cybersecurity, National Research Council, 2007, pp. 133-42
3.1.4.2
http://www.cyber.st.dhs.gov/docs/Toward_a_Safer_and_More_Secure_Cyberspace-Full_report.pdf
Shin, M., Wireless Network Security and Interworking, Proceedings of the IEEE, Vol. 94 (2), Feb 2006. pp455-466
2.2.3.3.1
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1580513
Simon Chesterman, The Spy Who Came In from the Cold War: Intelligence and International Law, 27 Mich. J. Int’l L. 1071, 2006
6.4.4
https://papers.ssrn.com/sol3/papers.cfm?abstract_id=969551
Statement of General Keith B. Alexander, Commander, United States Cyber Command, before the House Committee on Armed Services, 23 September 2010
4.2.2.2.4
http://www.defense.gov/home/features/2010/0410_cybersec/docs/USCC%20Command%20Posture%20Statement_HASC_22SEP10_FINAL%20_OMB%20Approved_.pdf
This book, and all H2O books, are Creative Commons licensed for sharing and re-use with the exception of certain excerpts. Any excerpts from the Restatements of the Law, Principles of the Law, and the Model Penal Code are copyright by The American Law Institute. Excerpts are reproduced with permission, not as part of a Creative Commons license.