iws class readings

8
IW_I – Introduction to Course and Overview of Information Warfare RECOMMENDED REFERENCES : 1. Dorothy E. Denning, Information Warfare and Security , Addison Wesley, 1999. 2. Bruce Schneier, Secrets & Lies: Digital Security in a Networked World, John Wiley and Sons, Inc., 2000. 3. Alan D. Campen & Douglas H. Dearth, Cyberwar 2.0: Myths, Mysteries and Reality, AFCEA International Press, 1998. 4. www.cs.georgetown.edu/~denning/cosc511 5. Blaise Cronin and Holly Crawford, “ Information Warfare: Its Application in Military and Civilian Contexts ”, The Information Society, Vol. 15, No. 4, 1999. RECOMMENDED READING ASSIGNMENT(S) : None. IW_II – Introduction to Offensive and Defensive IW Model IW-II_1 – Resources, Values, & the Players RECOMMENDED REFERENCES : 5. Dorothy E. Denning, Information Warfare and Security , Addison Wesley, 1999. 6. Bruce Schneier, Secrets & Lies: Digital Security in a Networked World, John Wiley and Sons, Inc., 2000. 7. Alan D. Campen & Douglas H. Dearth, Cyberwar 2.0: Myths, Mysteries and Reality, AFCEA International Press, 1998. RECOMMENDED READING ASSIGNMENT(S) : 1. Denning (ref. #1): Preface, Chapters 1, 2 pp. 21-28 (32 pages). 2. Schneier (ref. #2): Preface, Chapters 1-2, 4 (42 pages). 3. OPTIONAL – John L. Petersen (ref. #3): " Living in a Wired World: Cyber Society in 2020 ," in Cyberwar 2.0, pp. 119-130. IW_II_2 – Offensive Information Warfare RECOMMENDED REFERENCES : 8. Dorothy E. Denning, Information Warfare and Security , Addison Wesley, 1999. 9. Bruce Schneier, Secrets & Lies: Digital Security in a Networked World, John Wiley and Sons, Inc., 2000. 10. Alan D. Campen & Douglas H. Dearth, Cyberwar 2.0: Myths, Mysteries and Reality, AFCEA International Press, 1998.

Upload: igor-acacio

Post on 03-Jul-2015

28 views

Category:

Documents


1 download

TRANSCRIPT

IW_I – Introduction to Course and Overview of Information Warfare

RECOMMENDED REFERENCES: 1. Dorothy E. Denning, Information Warfare and Security, Addison Wesley, 1999. 2. Bruce Schneier, Secrets & Lies: Digital Security in a Networked World, John Wiley

and Sons, Inc., 2000. 3. Alan D. Campen & Douglas H. Dearth, Cyberwar 2.0: Myths, Mysteries and Reality,

AFCEA International Press, 1998. 4. www.cs.georgetown.edu/~denning/cosc511 5. Blaise Cronin and Holly Crawford, “Information Warfare: Its Application in

Military and Civilian Contexts”, The Information Society, Vol. 15, No. 4, 1999.

RECOMMENDED READING ASSIGNMENT(S): None.

IW_II – Introduction to Offensive and Defensive IW Model IW-II_1 – Resources, Values, & the Players

RECOMMENDED REFERENCES: 5. Dorothy E. Denning, Information Warfare and Security, Addison Wesley, 1999. 6. Bruce Schneier, Secrets & Lies: Digital Security in a Networked World, John Wiley

and Sons, Inc., 2000. 7. Alan D. Campen & Douglas H. Dearth, Cyberwar 2.0: Myths, Mysteries and Reality,

AFCEA International Press, 1998.

RECOMMENDED READING ASSIGNMENT(S): 1. Denning (ref. #1): Preface, Chapters 1, 2 pp. 21-28 (32 pages). 2. Schneier (ref. #2): Preface, Chapters 1-2, 4 (42 pages). 3. OPTIONAL – John L. Petersen (ref. #3): "Living in a Wired World: Cyber Society

in 2020," in Cyberwar 2.0, pp. 119-130.

IW_II_2 – Offensive Information Warfare

RECOMMENDED REFERENCES: 8. Dorothy E. Denning, Information Warfare and Security, Addison Wesley, 1999. 9. Bruce Schneier, Secrets & Lies: Digital Security in a Networked World, John Wiley

and Sons, Inc., 2000. 10. Alan D. Campen & Douglas H. Dearth, Cyberwar 2.0: Myths, Mysteries and Reality,

AFCEA International Press, 1998.

RECOMMENDED READING ASSIGNMENT(S): 1. Denning (ref. #1): Chapter 2 pp. 28-36 (8 pages). 2. Schneier (ref. #2): Chapter 3 (18 pages). 3. John L. Petersen (ref. #3): "Living in a Wired World: Cyber Society in 2020," in Cyberwar 2.0, pp. 119-130 (11 pages). IW_II_3 – Defensive Information Warfare

RECOMMENDED REFERENCES: 11. Dorothy E. Denning, Information Warfare and Security, Addison Wesley, 1999. 12. Bruce Schneier, Secrets & Lies: Digital Security in a Networked World, John Wiley

and Sons, Inc., 2000. 13. Alan D. Campen & Douglas H. Dearth, Cyberwar 2.0: Myths, Mysteries and Reality,

AFCEA International Press, 1998.

RECOMMENDED READING ASSIGNMENT(S): 1. Denning (ref. #1): Chapter 2 pp. 36-42 (6 pages). 2. Schneier (ref. #2): Chapter 5 (25 pages). 3. Roger A. Beaumont (ref. #3), “A View from the Frontage Road: Musings on the

Risks of Traveling the Information Highway" in Cyberwar 2.0, pp. 101-117 (16 pages).

IW_II_4 – The Domain & Landscape RECOMMENDED REFERENCES : 14. Dorothy E. Denning, Information Warfare and Security, Addison Wesley, 1999. 15. Bruce Schneier, Secrets & Lies: Digital Security in a Networked World, John Wiley

and Sons, Inc., 2000. 16. Alan D. Campen & Douglas H. Dearth, Cyberwar 2.0: Myths, Mysteries and Reality,

AFCEA International Press, 1998.

RECOMMENDED READING ASSIGNMENT(S): 1. Denning (ref. #1): Chapter 3 (23 pages). 2. Schneier (ref. #2): Chapter 18 (13 pages).

IW-III – Offensive Information Warfare IW_III_1 – Open Sources, Privacy, and Intellectual Property Rights RECOMMENDED REFERENCES : 17. Dorothy E. Denning, Information Warfare and Security, Addison Wesley, 1999. 18. Georgetown Internet Privacy Policy Study,

http://www.msb.edu/faculty/culnanm/gippshome.html 19. The Privacy Foundation, http://www.privacyfoundation.org/index.cfm See "Microsoft

Word Documents That Phone Home" under Advisories and Reports, plus informa tion on privacy and copyright issues.

20. Ed Felton, Information about SDMI challenge, http://www.cs.princeton.edu/sip/sdmi/ 21. Cyberstalking A New Challenge for Law Enforcement and Industry (html file). 22. Susan Okala, “The Basics: Protect Yourself from Identity Theft”, MSN Money

Website, Microsoft Corporation, 2001.

RECOMMENDED READING ASSIGNMENT(S): 1. Denning (ref. #1): Chapter 4 (21 pages). 2. Georgetown Internet Privacy Policy Study (ref. #2), (16 pages). 3. The Privacy Foundation, "Microsoft Word Documents That Phone Home" under

Advisories and Reports, plus information on privacy and copyright issues (7 pages). 4. Ed Felton, Information about SDMI challenge, (ref. #4), (~ 14 pages). 5. Cyberstalking A New Challenge for Law Enforcement and Industry (ref. #5), (21

pages). 6. Okala (ref. #6): “The Basics: Protect Yourself from Identity Theft”, (6 pages). IW_III_2 – The Insider, Espionage and Signals Intelligence RECOMMENDED REFERENCES : 23. Dorothy E. Denning, Information Warfare and Security, Addison Wesley, 1999. 24. Lawrence D. Sloan, “Echelon and the Legal Restraints on Signals Intelligence: A

Need for Reevaluation”, 50 Duke L. J. 1467, http://www.law.duke.edu/shell/cite.pl?50+Duke+L.+J.+1467.

25. Stanley Kober, "Why Spy? The Uses and Misuses of Intelligence," CATO Policy Analysis No. 265, December 12 1996, http://www.cato.org/pubs/pas/pa-265.html

RECOMMENDED READING ASSIGNMENT(S) {LARGE ASSIGN.}: 1. Denning (ref. #1): Chapter 6 & 7 (99 pages). 2. Sloan (ref. #2): Echelon and the Legal Restraints on Signals Intelligence: A Need for

Reevaluation (~ 22 pages). 3. Kober (ref. #3): Why Spy? The Uses and Misuses of Intelligence (31 pages).

IW_III_3 – OIW: Psyops and Perception Management RECOMMENDED REFERENCES : 26. Dorothy E. Denning, Information Warfare and Security, Addison Wesley, 1999. 27. Bruce Schneier, Secrets & Lies: Digital Security in a Networked World, John Wiley

and Sons, Inc., 2000. 28. Alan D. Campen & Douglas H. Dearth, Cyberwar 2.0: Myths, Mysteries and Reality,

AFCEA International Press, 1998. 29. Charles J. Dunlap, Jr., Sometimes the Dragon Wins,

http://www.infowar.com/mil_c4i/dragon.html-ssi 30. Poisoning the Web, An ADL Report on Internet Bigotry, Extremism and Violence,

http://www.adl.org/poisoning_web/poisoning_toc.html 31. OPTIONAL: Separatist, Para-military, Military, Intelligence, and Aid Organizations,

http://cromwell.50megs.com/security/netusers.html 32. OPTIONAL: 1999 Report on Cyberstalking, Department of Justice,

http://www.usdoj.gov/criminal/cybercrime/cyberstalking.htm

RECOMMENDED READING ASSIGNMENT(S): 1. Denning (ref. #1): Chapter 5 (28 pages). 2. Schneier (ref. #2): Chapter 17 (14 pages). 3. Charles A. Williamson (ref. #3), "Psychological Operations in the Information Age" in Cyberwar 2.0 (10 pages). 4. Charles J. Dunlap, Jr. (ref. #4), Sometimes the Dragon Wins (21 pages). 5. Poisoning the Web, An ADL Report on Internet Bigotry, Extremism and Violence

(ref. #5) (Browse web site). IW_III_4 – Computer Hacking RECOMMENDED REFERENCES : 33. Dorothy E. Denning, Information Warfare and Security, Addison Wesley, 1999. 34. Greg Shipley, Anatomy of a Network Intrusion, Network Computing, October 18,

1999, http://www.networkcomputing.com/1021/1021ws1.html. 35. Steve Gibson, The Strange Tale of the Denial of Service Attacks Against GRC.COM,

May 2001, http://grc.com/dos/grcdos.htm. 36. Bruce Schneier, Secrets & Lies: Digital Security in a Networked World, John Wiley

and Sons, Inc., 2000. 5. Miscellaneous Hacking Related Websites.

?? Antionline, http://www.antionline.com/ ?? Attrition, http://www.attrition.org/ ?? Computer Emergency Response Team (CERT) Coordination Center,

http://www.cert.org ?? Cult of the Dead Cow, http://www.cultdeadcow.com/. ?? Hacker News Network, http://www.hackernews.com/ ?? Internet Fraud Watch, http://www.fraud.org/internet/intinfo.htm ?? The L0pht, http://www.l0pht.com/. ?? Phrack Magazine, http://www.phrack.com

?? Rootshell, http://www.rootshell.com ?? Security Focus, http://www.securityfocus.com/ ?? 2600 Magazine: The Hacker Quarterly, http://www.2600.com/.

RECOMMENDED READING ASSIGNMENT(S): 1. Denning (ref. #1): Chapter 2 (pp. 28-36) & Chapter 8-10 (85 pages). 2. Shipley (ref. #2): Anatomy of a Network Intrusion, Network Computing, (~ 12

pages). 6. Gibson (ref. #3), The Strange Tale of the Denial of Service Attacks Against

GRC.COM (~ 27 pages). 7. REVIEW: Schneier (ref. #4): Chapter 18 (pp.275-278). IW_III_5 – Activism, Hacktivism, and Cyber-Terrorism RECOMMENDED REFERENCES : 37. Dorothy E. Denning, "Activism, Hacktivism, and Cyberterrorism: The Internet as a

Tool for Influencing Foreign Policy," presented at The Internet and International Systems: Information Technology and American Foreign Policy Decisionmaking Workshop, the Nautilus Institute and World Affairs Council of Northern California, December 10, 1999, http://www.cs.georgetown.edu/~denning/infosec/nautilus.html.

38. Dorothy E. Denning, Cyberterrorism, Testimony before the Special Oversight Panel on Terrorism, Committee on Armed Services, U.S. House of Representative, May 23, 2000, http://www.cs.georgetown.edu/~denning/infosec/cyberterror.html.

39. Cyber Attacks During the War on Terrorism: A Predictive Analysis, Institute for Security Technology Studies, Dartmouth College, September 22, 2001, http://www.ists.dartmouth.edu/ISTS/counterterrorism/cyber_attacks.htm.

40. Poisoning the Web, An ADL Report on Internet Bigotry, Extremism and Violence, http://www.adl.org/poisoning_web/poisoning_toc.html

41. OPTIONAL: Separatist, Para-military, Military, Intelligence, and Aid Organizations, http://cromwell.50megs.com/security/netusers.html

RECOMMENDED READING ASSIGNMENT(S): 1. Denning (ref. #1): "Activism, Hacktivism, and Cyberterrorism: The Internet as a

Tool for Influencing Foreign Policy," (26 pages). 2. Denning (ref. #2): “Cyberterrorism, Testimony before the Special Oversight Panel

on Terrorism, Committee on Armed Services, U.S. House of Representative”, (5 pages).

8. Institute for Security Technology Studies, Dartmouth College (ref. #3): " Cyber Attacks During the War on Terrorism: A Predictive Analysis " , (23 pages).

9. Poisoning the Web, An ADL Report on Internet Bigotry, Extremism and Violence (ref. #5) (Browse web site).

IW_IV – Defensive Information Warfare IV_1 – Cryptography and Authentication RECOMMENDED REFERENCES : 42. Dorothy E. Denning, Information Warfare and Security, Addison Wesley, 1999. 43. Bruce Schneier, Secrets & Lies: Digital Security in a Networked World, John Wiley

and Sons, Inc., 2000. 3. C. Ellison and B. Schneier, Ten Risks of PKI: What You're Not Being Told About Public Key Infrastructure, Computer Security Journal, v 16, n 1, 2000, pp. 1-7, http://www.counterpane.com/pki-risks.html 4. Dorothy E. Denning and William E. Baugh, Jr., Hiding Crimes in Cyberspace, 1999, http://cryptome.org/hiding-db.htm.

RECOMMENDED READING ASSIGNMENT(S): *LARGE ASSIGN.* 1. Denning (ref. #1): Chapter 11-12 (58 pages). 2. Schneier (ref. #2): Chapter 6-7, 9 (36 pages). 3. C. Ellison and B. Schneier, Ten Risks of PKI: What You're Not Being Told About

Public Key Infrastructure (ref. #3): (7 pages). 4. Dorothy E. Denning and William E. Baugh, Jr., Hiding Crimes in Cyberspace (ref. #4): (22 pages). IV_2 – Filters, Monitors, & Intrusion / Misuse Detection RECOMMENDED REFERENCES: 44. Dorothy E. Denning, Information Warfare and Security, Addison Wesley, 1999. 45. Rebecca Bace and Peter Mell, Intrusion Detection, NIST, August 16, 2001,

http://cryptome.org/sp800-31.htm. 46. Jeffrey Kephart, Gregory Sorkin, David Chess, and Steve White, Fighting Computer

Viruses, Scientific American, November 1997, http://www.sciam.com/1197issue/1197kephart.html.

RECOMMENDED READING ASSIGNMENT(S): 1. Denning (ref. #1): Chapter 13 (23 pages). 2. Bace & Mell (ref. #2): Intrusion Detection, Sections 2 & 5 (23 pages). 10. Kephart, Sorkin, Chess, and White (ref. #3): Fighting Computer Viruses (9 pages).

IV_3 – Information Security & Incident Handling RECOMMENDED REFERENCES : 47. Dorothy E. Denning, Information Warfare and Security, Addison Wesley, 1999. 48. Bruce Schneier, Secrets & Lies: Digital Security in a Networked World, John Wiley

and Sons, Inc., 2000. 49. Andy Briney, “2001 Industry Survey: 2,545 information security practitioners give

the lowdown on security budgets, purchasing trends, security breaches and defenses, obstacles to security and much more” Information Security Magazine, October 2001.

50. CERT, Home Network Security, http://www.cert.org/tech_tips/home_networks.html

RECOMMENDED READING ASSIGNMENT(S): 1. Denning (ref. #1): Chapter 14 (25 pages). 2. Schneier (ref. #2): Skim Chapters 19-23, Read Chapters 24-25 (29 pages). 11. Andy Briney (ref. #3), “2001 Industry Survey: 2,545 information security

practitioners give the lowdown on security budgets, purchasing trends, security breaches and defenses, obstacles to security and much more” (11 pages).

IW-V. National and International Security Issues V_1 – Cyber Defense RECOMMENDED REFERENCES : 51. Dorothy E. Denning, Information Warfare and Security, Addison Wesley, 1999. 52. Douglas H. Dearth, “Critical Infrastructures and the Human Target in Information

Operations”, Cyberwar 3.0: Human Factors in Information Operations and Future Conflict, AFCEA International Press, 2000, pp. 203-210.

53. Patrick J. Tyrrell, “Protecting the National Critical Infrastructure: The Human Dimension from a Government Perspective”, Cyberwar 3.0: Human Factors in Information Operations and Future Conflict, AFCEA International Press, 2000, pp. 211-222.

54. Derek Long, “Protecting Critical Infrastructures: The Global Private-Sector Perspective”, Cyberwar 3.0: Human Factors in Information Operations and Future Conflict, AFCEA International Press, 2000, pp. 223-232.

55. Report of the President of the United States on the Status of Federal Critical Infrastructure Protection Activities (pdf), January 2001, http://www.ciao.gov/CIAO_Document_Library/CIP_2001_CongRept.pdf.

56. OPTIONAL: Qiao Liang and Wang Xiangsui, Unrestricted Warfare, PLA Literature and Arts Publishing House, February 1999.

RECOMMENDED READING ASSIGNMENT(S): 1. Denning (ref. #1): Chapter 15, pp. 397-407 (10 pages).

2. Dearth (ref. #2): “Critical Infrastructures and the Human Target in Information Operations” in Cyberwar 3.0 (7 pages).

12. Tyrrell (ref. #3), “Critical Infrastructures and the Human Target in Information Operations” in Cyberwar 3.0 (11 pages).

13. Long (ref. #4): “Protecting Critical Infrastructures: The Global Private-Sector Perspective” in Cyberwar 3.0 (9 pages).

14. Report of the President of the United States on the Status of Federal Critical Infrastructure Protection Activities, January 2001 (ref. #5): Preface, Overview and Section V (21 pages).

15. OPTIONAL: Qiao Liang and Wang Xiangsui (ref. #6): Unrestricted Warfare, Conclusion, Preface, & Chapter 8 (in this order) (~24 pages).

V_2 – Policies, Laws, and Ethics RECOMMENDED REFERENCES : 57. Dorothy E. Denning, Information Warfare and Security, Addison Wesley, 1999. 58. Charles J. Dunlap, Jr., “The Law of Cyberwar: A Case Study from the Future”,

Cyberwar 2.0: Myths, Mysteries and Reality, AFCEA International Press, 1998, pp. 139-150.

3. Charles J. Dunlap, Jr, “The Law and the Human Target in Information Warfare: Cautions and Opportunities ”, Cyberwar 3.0: Human Factors in Information Operations and Future Conflict, AFCEA International Press, 2000, pp. 137-151. 4. Dorothy E. Denning, Obstacles and Options for Cyber Arms Control, Arms Control in Cyberspace, Heinrich Boell Foundation, June 29-30, 2001, http://www.cs.georgetown.edu/~denning/infosec/berlin.doc. 5. Roger C. Molander and Sanyin Siang, The Legitimization of Strategic Information Warfare: Ethical Considerations, http://www.aaas.org/spp/dspp/sfrl/per/per15.htm. RECOMMENDED READING ASSIGNMENT(S): 1. Denning (ref. #1): Chapter 15, pp. 406-424 (18 pages). 2. Dunlap (ref. #2): “The Law of Cyberwar: A Case Study from the Future” in Cyberwar 2.0 (11 pages). 16. Dunlap (ref. #3): “The Law and the Human Target in Information Warfare: Cautions

and Opportunities” in Cyberwar 3.0 (10 pages). 4. Denning (ref. #4): Obstacles and Options for Cyber Arms Control, Arms Control in Cyberspace (13 pages). 5. Molander and Sing (ref. #5): The Legitimization of Strategic Information Warfare: Ethical Considerations (4 pages).