terrorism, counter-terrorism

Sponsored by Project on Defense Alternatives            Editor: Carl Conetta.            05 February 2008

HOMELAND SECURITY - CYBER SECURITY

TERRORISM & COUNTER-TERRORISM Terrorism, its nature and sources
Terrorist groups, incidents, targets
Financial Aspects
Bin Laden and Al Qaeda
Counter-terror strategy & programs
US War on Terror:
     Plans, Costs, Effects

Legal Issues & Human Rights
Terrorism & WMDs
Terrorism & Informational Warfare
Terrorism &
     regional security issues

Sept. 11 attack
Resource sites

HOMELAND SECURITY
Overviews
Organization & cost
Armed forces roles and issues
Intelligence and warning
General Transport
Aviation
Rail & Road
Port & Maritime
Border & Immigration
Critical infrastructure
Cyber security
First responders &
     local preparedness

Health system preparedness
Securing agriculture
Miscellaneous problems & Issues
Technology & techniques
Legislation & legal issues
WMDs and homeland security
Resource sites


PDA SPONSORED SITES

RMA

CMP

WAR REPORT

DEFENSE STRATEGY REVIEW

PDA

E-mail This Page  |   Tag This Page (del.icio.us)


Grading Cybersecurity Initiatives: Six Necessary Components
James Jay Carafano. The Heritage Foundation, 31 October 2007 (.pdf file).

Understanding and Defending Against Foreign Cyber-Threats
Peter Allor. Journal of Homeland Security, August 2007.

Cyber Attacks Explained
James A. Lewis. Center for Strategic and International Studies, 15 June 2007. Posted on the Commonwealth Institute website (.pdf file).

Terrorist Capabilities for Cyberattack: Overview and Policy Issues
John Rollins and Clay Wilson. Congressional Research Service, 22 January 2007.

Toward a Safer and More Secure Cyberspace
Seymour E. Goodman and Herbert S. Lin. National Academies Press, 2007.

Cyber Security: Recovery and Reconstitution of Critical Networks
Testimonies before the Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security, Senate Committee on Homeland Security and Governmental Affairs, 28 July 2006.

The Best-Laid Plan?
Jennifer McAdams. Federal Computer Week Magazine Online, 12 June 2006.

Essential Steps to Strengthen America's Cyber Terrorism Preparedness
Business Roundtable, June 2006. Posted on the Commonwealth Institute website (.pdf file).

Mitigating Distributed Denial of Service Attacks in an Anonymous Routing Environment: Client Puzzles and TOR
Nicholas A. Fraser. Air Force Institute of Technology, Air University, June 2006 (.pdf file).

Federal Plan for Cyber Security and Information Assurance Research and Development
National Science and Technology Council, April 2006 (.pdf file).

Computer Security Report Card: Government-wide Grade 2005: D+
Government Reform Committee, 16 March 2006 (.pdf file).

Is the Government Ready for a Digital Pearl Harbor?
Committee on Government Reform, 14 March 2006.

Cybercrime: The Council of Europe Convention
Kristin Archick. CRS Report for Congress, 01 December 2005 (.pdf file).

Terrorist Capabilities for Cyberattack: Overview and Policy Issues
John Rollins and Clay Wilson. CRS Report for Congress, 20 October 2005 (.pdf file).

Ensuring (and Insuring?) Critical Information Infrastructure Protection
Kenneth Neil Cukier, Viktor Mayer-Schönberger, and Lewis M. Branscomb. JFK School of Government, October 2005 (.pdf file).

A Comparative Analysis of Cybersecurity Initiatives Worldwide
Myriam Dunn. WSIS Thematic Meeting on Cybersecurity, 10 June 2005 (.pdf file).

Creating a National Framework for Cybersecurity: An Analysis of Issues and Options
Eric A. Fischer. CRS Report for Congress, 22 February 2005 (.pdf file).

Cyber Security: A Crisis of Prioritization
Report to the President. President's Information Technology Advisory Committee, February 2005. Posted on the Air War College website (.pdf file).

Defending Against Cybercrime and Terrorism A New Role for Universities
Tony Aeilts. FBI Law Enforcement Bulletin, January 2005. Posted on the Air War College website (.pdf file).

Apathy and Incompetence Trump Terrorism In Cyberspace
Col. Alan D. Campen. Signal Magazine, January 2005.

Critical Information Infrastructure Protection: Analysis, Evaluation and Expectations
Eugene Nickolov. Information & Security, 2005 (.pdf file).

Blindsided
Shane Harris. Government Executive Magazine, 01 May 2004.

Cyber Terrorism 'Overhyped'
Mark Ward. BBC News, 14 March 2003.

The National Strategy to Secure Cyberspace
Department of Homeland Security, February 2003 (.pdf file).

Federal Computer Security Report Card
Subcommittee on Technology, Information Policy, Intergovernmental Relations and the Census, US House of Representatives, 9 December 2003.

Computer Attack and Cyber Terrorism:  Vulnerabilities and Policy Issues for Congress
Clay Wilson. Congressional Research Service, 17 October 2003.

Al Qaeda and the Internet:  The Danger of "Cyberplanning"
Timothy L. Thomas. Parameters, Spring 2003.

Information Security:  Progress Made, But Challenges Remain to Protect Federal Systems and the Nation's Critical Infrastructures
Robert F. Dacey. Testimony before the Subcommittee on Technology, Information Policy, Intergovernmental Relations and the Census, Committee on Government Reform, House of Representatives, 08 April 2003.

High-Risk Series Protecting Information Systems Supporting the Federal Government and the Nation's Critical Infrastructures
General Accounting Office, January 2003.

Computer Network Defense:  DoD and the National Response
Lt Col James M. Jenkins. USAF Air War College, 2 December 2002.

Computer Security:  Progress Made, But Critical Federal Operations and Assets Remain at Risk
Robert F. Dacey. Testimony Before the Subcommittee on Government Efficiency, Financial Management and Intergovernmental Relations, Committee on Government Reform, House of Representatives. General Accounting Office, 19 November 2002.

Back to Top
E-mail This Page


Search

powered by FreeFind



PDA Publications:
US Defense Policy | Regional Security
Iraq & Afghanistan | Military & Strategic Studies
Terrorism | Alternative Security & Defense

Home | Buy Publications | What's New | About PDA
Links | Search This Site | In the News | E-mail PDA

War Report | RMA Debate Page
Defense Strategy Review Page | Chinese Military Power Page
Terrorism, Counter-Terrorism, Homeland Security | Occupation Distress

Become a PDA Sustainer

The Project on Defense Alternatives
The Commonwealth Institute
P.O.Box 398105
Inman Square Post Office
Cambridge, MA 02139, USA
Phone 617/547-4474
Fax 617/868-1267
Email: pda(at)comw.org

Site designed by
IRN Internet Services
Copyright © The Commonwealth Institute. All Rights Reserved.


Please send us your comments, any corrections,
and your suggestions for additional resources.