Sunday, February 7, 2016

My Sources

The Source of the Issue
Nanking2012. "IR-40 Facility in Arak" 10/14/2012 via wikipedia. Attibution-ShareAlike 3.0 Unported
     This is source is form The Atlantic, a political science magazine that primarily targets serious national readers and "thought leaders." It is a commercial website meaning that is used to make profit. Nonetheless, this magazine has won more National Magazine Awards than any other monthly magazine meaning that it is highly credible.

This story has multiple authors:

- Patrick Lin is an associate professor of philosophy and the director of the Ethics + Emerging Science Group at California Polytechnic.This individual has experience with these types of technology-related ethics  questions. His other works include What is Nanotechnology and Why Does it Matter and Enhanced Warfighters: Risk, Ethics, and Policy.

-Neil Rowe is a professor of computer science at the U.S. Naval Postgraduate School. Rowe also lectures on cyber warfare. He has released multiple papers on cyber warfare such as "The Ethics of Cyberweapons," "Reversible Cyber Attacks," and "Fake Honeypots as a Defense Tactic." This is also another well informed individual with a strong background in computer science.

- Fritz Allhoff is an associate professor of philosophy at Western Michigan University. His research consists of applied ethics, ethical theory, and the philosophy of law. This individual brings a strong background in ethics research.

The authors of this story just seem to merge into one another beautifully. Allhoff brings in the ethics, Rowe brings in the Tech know-how, and to bride it all together, we have Lin, who essentially deals with both.

This source was released on June 5, 2012 which was right around the time when all the discovered information on Stuxnet was being released and the emergence of other cyber weapons such as flame

This source is important because it explains the aftermath of the Stuxnet incident. It talks about what it means for the future of cyber warfare and for the attackers and the defenders in such cases.

2. Wired: Legal Experts: Stuxnet Attack on Iran Was Illegal 'Act of Force'
     This source is from Wired.com, a magazine that reports on new technology and how it affects things such as culture, economics, and politics. This source has a strong background reporting on technology meaning that they are a credible source since they have experience on this type of material.

The author of this story is Kim Zetter. Kim Zetter mostly reports on cybercrime, privacy, and security. Her other works include "NSA Hacker Chief Explains How to Keep Him Out of Your System," "California Police Used Stingrays in Planes to Spy on Planes," and she is also writing a book on Stuxnet. She has experience in the subject and also has a strong interest in the Stuxnet Cyber Attack. She is also a senior staff reporter at Wired. 

This story was released in March 25, 2015. This was around the time the results of NATO lead study on cyber warfare was released. The Stuxnet Attack was over, but new threats were emerging.

This is important because it talks about what NATO, an international alliance, has to lose from such attacks. According to Article 5 of the NATO Treaty, if a NATO member is attacked by an enemy state, other member states must aid the member that came under attack. However, the big question for NATO is: does this apply to cyber attacks?
NATO. "Flag of NATO" 1/1/2013 via wikimedia. Public Domain
3. New York Times: Timeline on Iran's Nuclear Program
     The source of this one is The New York Times, a daily newspaper that talks about various topics that range from politics to sports. It is a very well known newspaper with countless recognition.

This timeline has two authors. They are Shreeya Sinha and Susan Campbell Beachy. Sinha is a report that mostly talks about international crimes. Beachy is a researcher for the New York times.

This timeline has a last updated date of April 2, 2015, which is fairly recent.

This source is important because it is an extensive timeline of all the events related to Iran's Nuclear Program. It talks about how it started, where it is now, and most importantly, about the Stuxnet attack and possible motives behind it.

4. NATO: Tallinn Manual on the International Law Applicable to Cyber Warfare
    The source of this study is NATO's Cooperative Cyber Defense Centre of Excellence. This branch of NATO deals with communications, cyber defense, research, and consultations. They were established in 2008 with the primary purpose of dealing with cyber attacks and seeing how they can affect any of the member nations of NATO.

This source was written by approximately 20 law scholars and practitioners. However, the report and project itself was directed by Professor Michale H. Schmitt, who is the chairman of the International Law Department at the United States Naval War College. This source originated from top law scholars in attempt to fill gaps created by the development of cyber warfare in international law. Basically, the best, of the best, of the best were working on this for one of the most power organizations in the world: NATO.

This was published in  April 2013. However, work on it began as earlier as 2009 which is before Stuxnet was discovered. However, simpler cyber attack had occurred, but nothing on the scale of Stuxnet.

The reason that this source is important is because it give the point of view of law makers on the issue of cyber ethics. This is to serve as an extensive law manual that has already been used to address other cyber issues.

5. Case Western Reserve University: Stuxnet and its Hidden Lessons on the Ethics of Cyber Weapons
     The of this paper is the School of Law at Case Western Reserve. The educational background means that this was highly researched and done by an individual with backgrounds in law and/or technology.

The author of this paper is Peter Warren Singer. He is a political scientist and a specialist on 21st century warfare. This means that he has strong background with both new methods of warfare, such as cyber war, and also in the politics that go along with it. War, cyber security, and politics; this guy has it all.

This source came out in spring of 2015. This is long after the events of Stuxnet which means that he had a wealth of information at his disposal for writing this paper.

This is important because it talks about how Stuxnet was different and the beginning of something new. Its focus is on ethics and it talks about Stuxnet's primary target: Iran.

6. TED: Cracking Stuxnet, a 21st-century Cyber Weapon
Urban_Data. "TED Talk" 4/4/2013 via flickr. Attribution-ShareAlike 2.0 Generic
   The source of this video is TED, which is a of conferences with the purpose of spreading new ideas and informing the public. The conference has speakers that talk about many scientific, cultural, and academic topics. It has lots of geeky facts to and well for some reason, I find the information on here really interesting. Topics range any where from particle physics to leadership advice

The author is Ralph Langner, a German Security Researcher that was at the front line of the Stuxnet attack. Langner and his team, were the ones who cracked Stuxnet. He spent countless hours on it and now has worldwide recognition for his work on Stuxnet.

This source was published in March 2011, which was towards the end of the Stuxnet Attack. Now that it was contained, it had been time to address the aftermath.

This source is important because it shows what cyber security corporations had to go through to stop Stuxnet. It gives a good point of view from their perspective. In addition to this, this is essentially a first hand report from an individual that came face to face with Stuxnet and took it apart.

7. The Washington Post:  Stuxnet was work of U.S. and Israeli experts, officials say
   The origin of this was the Washington Post, which is an American Newspaper. The Washington post is very politic intensive and follows many governmental controversies. This newspaper was one of the first to have information over who launched Stuxnet. Nonetheless, neither of the accused parties have confirmed that they were involved

The author of this story is Ellen Nakashima. Most of the articles she has written have a focus on something relating to technology, intelligence, or national defense. Her other stories include "Nationl Security Agency plans major reorganization," and "Russian hackers suspected in attack that blacked out parts of Ukraine."

This story was published on June 2, 2012. This during the aftermath of Stuxnet when multiple nations were just pointing fingers at one another without anyone really claiming responsibility.

This story talks about U.S., Israel, and possible motives for Barrack Obama to launch such an attack. This malware was just so advanced in capabilities that it had to be the U.S. right? Well they are still denying it, but individuals who apparently helped out in its creation gave information to the Washington Post that points a big old finger to the U.S. and Israel.

8. Politico: The Reality of Cyberwar
     The source of this article is Politico. Politico is a daily newspaper that reports on politics and policy of the United States. The background in politics of this newspaper means that it will mostly be political with minimal talks about the tech involved.

The author of this is Peter Warren Singer. But we already know about him. There is another author involved too though. August Cole also has a technology background but mostly reports on national security. 

This story was released in July 9, 2015. This was far after the discovery of Stuxnet which means that there was more information available to the writers. It also goes to show how to scope of the aftermath is still going

The importance of this story is that it also shows what the U.S., Israel, China, and many other industrialized nations have to gain and/ or lose from cyber warfare. It talks about how vulnerable infrastructure is and what civilian corporations have to lose from such attacks.

9. New York Times: Obama Ordered Sped Up Wave of Cyberattacks Against Iran
Souza, Pete. "Barack Obama on Phone with Benjamin Netanyahu" 6/8/2009 via wikimedia. Public Domain
     The source of this article was the New York Times, which is a very popular newspaper that talks about a vast array of topics.

The author of this source is David E. Sanger. He is the chief Washington correspondent for the New York Times. This means that he knows his politics. However, he does not really have a technology background. Nonetheless, he seems to be a highly credibly source.

This story came out on June 1, 2012, which was after the Stuxnet Attack had been discovered. This was during the finger pointing stage that I talked about earlier.

This is important because it gives a better view into the politics in Washington behind this attack. Furthermore, it solely represents the role that the U.S. government had in releasing Stuxnet. The government itself has not really confirmed it, but other officials have.

10. To Kill a Centrifuge
     This document was published by Ralph Langner, the world renowned expert that cracked Stuxnet. It was posted by him on his website by the Langner Group.

We already know about the author and if you don't, well I should really emphasize his role in all of this in my QRG.

This was released in November of 2013. This was once Stuxnet had been cracked, patched, and contained.

This document contains a detailed explanation of Stuxnet and its creators. Its important because it was developed by THE Ralph Langner. It also clears many misconceptions about the attack.

No comments:

Post a Comment