References
Chapter 1: Crime, Terrorism, Spying, and War
- Cyberconflicts and National Securityhttps://www.un.org/wcm/content/site/chronicle/home/archive/issues2013/security/cyberconfzictsandnationalsecurity
- Counterterrorism Mission Creephttp://www.theatlantic.com/politics/archive/2013/07/mission-creep-when-everything-is-terrorism/277844/
- Syrian Electronic Army Cyberattackshttp://blogs.wsj.com/speakeasy/2013/08/29/syrian-electronic-army-a-brief-look-at-what-businesses-need-to-know/
- The Limitations of Intelligencehttp://www.cnn.com/2013/09/11/opinion/schneier-intelligence-limitation
- Computer Network Exploitation vs. Computer Network Attackhttp://www.theatlantic.com/technology/archive/2014/03/theres-no-real-difference-between-online-espionage-and-online-attack/284233/
- iPhone Encryption and the Return of the Crypto Warshttps://www.schneier.com/essays/archives/2014/10/stop_the_hysteria_ov.html
- Attack Attribution and Cyber Conflicthttp://www.csmonitor.com/World/Passcode/Passcode-Voices/2015/0304/Hacker-or-spy-In-today-s-cyberattacks-finding-the-culprit-is-a-troubling-puzzle
Chapter 2: Travel and Security
- Hacking Airplanes ...
Get We Have Root now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.