Main Content
EFF Wiki on Computer Fraud and Abuse Act
5.2.5
https://ilt.eff.org/index.php/Computer_Fraud_and_Abuse_Act_%28CFAA%29
Elihu Zimet and Edward Skoudis, Cyberpower and National Security, Ch. 4: A Graphical Introduction to the Structural Elements of Cyberspace, eds. Kramer, Starr, and Wentz, 2009
2.2.2.2
http://cyber.law.harvard.edu/cybersecurity/Cyberpower_and_National_Security
Ellen Nakashima et al., U.S., Israel Developed Flame Computer Virus to Slow Iranian Nuclear Efforts, Officials Say, Washington Post, Jun 19, 2012
1.4.2
http://www.washingtonpost.com/world/national-security/us-israel-developed-computer-virus-to-slow-iranian-nuclear-efforts-officials-say/2012/06/19/gJQA6xBPoV_story.html
Eric Chabrow, The Cybersecurity Czar Who Wasn't, GovInfo Security, 2 June 2012
4.2.2.1.2
http://www.govinfosecurity.com/blogs/cybersecurity-czar-who-wasnt-p-1282/op-1
Estonia
6.4.1.1
http://cyber.law.harvard.edu/cybersecurity/Estonia
Estonia Case Study - Berkman Cybersecurity Wiki
1.1.1
http://cyber.law.harvard.edu/cybersecurity/Estonia
Evgeny Morozov, Cyber-Scare: The Exaggerated Fears Over Digital Warfare, Boston Review, July/August 2009
3.2.4
http://bostonreview.net/BR34.4/morozov.php
Flame
6.4.1.3
http://cyber.law.harvard.edu/cybersecurity/Flame
Flame Case Study - Berkman Cybersecurity Wiki
1.4.1
http://cyber.law.harvard.edu/cybersecurity/Flame
Ghostnet Case Study - Berkman Cybersecurity Wiki
1.2.1
http://cyber.law.harvard.edu/cybersecurity/GhostNet
This book, and all H2O books, are Creative Commons licensed for sharing and re-use with the exception of certain excerpts. Any excerpts from the Restatements of the Law, Principles of the Law, and the Model Penal Code are copyright by The American Law Institute. Excerpts are reproduced with permission, not as part of a Creative Commons license.