Below are groups and resources (books, articles, websites, etc.) related to this topic. Click on an item’s title to go its resource page with author, publisher, description/abstract and other details, a link to the full text if available, as well as links to related topics in the Subject Index. You can also browse the Title, Author, Subject, Chronological, Dewey, LoC, and Format indexes, or use the Search box.
Did the US Accidentally Give the World's Most Powerful Cyberweapon to Terrorists?: Sony Hack: Made in America?
Documents Reveal Canada's Secret Hacking Tactics
Canada's electronic surveillance agency has secretly developed an arsenal of cyberweapons capable of stealing data and destroying adversaries' infrastructure, according to newly revealed classified do...
Netizen Report: Why Did YouTube Censor Your Videos? You May Never Know.: Global Voices Advocacy's Netizen Report offers an international snapshot of challenges, victories, and emerging trends in Internet rights ar
Netizen Report Team
Amid an apparent shift in YouTube’s approach to monitoring for rules violations and staying in the good graces of advertisers, a wave of YouTube users have found their work either blocked or relegated...
Preparing for a Digital 9/11
In recent years, in one of the more dangerous, if largely undiscussed, developments of our time, the Bush and then Obama administrations have launched the first state-planned war in cyber space. First...
Researchers Find 'Astonishing' Malware Linked to NSA Spying
Security researchers have uncovered highly sophisticated malware that is linked to a secret National Security Agency hacking operation.
Stuxnet on the Loose: Security for the One Percent
Suspicions that the Stuxnet computer worm was indeed developed by the United States and Israel has once again exposed American exceptionalism. Espionage and sabotage are presented as intolerable crimi...
Stuxnet-Like Digital Attack on Iran Nuclear Talks May Have Come from Israel, Security Researchers Say
Moscow-based technical security company Kaspersky Lab last week revealed evidence of a new cyber attack on both its own network and those of several European hotels that hosted nuclear negotiations be...
US: Offensive Cyber-Warfare is Illegal... Unless We Do It
The US government declares that cyberwarfare directed against the US would be an act of war -- and, oh, by the way, that it is agressively engaged in cyberwarfare against foreign countries.
Where the Anti-Russian Moral Panic is Leading Us
This is how the smear campaign scores points: you don't have to be on the Russian payroll -- you can be a "useful idiot" just because of your political views, which condemn you as an "unwitting" agent...
Sources Experts & Spokespersons
Companies that cooperate with dictatorships must be sanctioned
Sources News Release
Reporters Without Borders condemns the criminal cooperation that exists between many western companies, especially those operating in the new technology area, and authoritarian regimes.
Cybethieves, Cybercops and You
Investigative research into a hackers' cybermarket where cyberthieves exchange tricks and tips. The author finds the individuals who founded the site and also tackles the problem of policing these cri...
Obama Order Sped Up Wave of Cyberattacks Against Iran
Sanger, David E.
Polishing Putin: hacked emails suggest dirty tricks by Russian youth group
Nashi runs web of online trolls and bloggers paid to praise Vladimir Putin and denigrate enemies.
Richard O'Dwyer: living with the threat of extradition
Student who set up website posting links to TV and film content fears being used as a guinea pig by Hollywood giants
Richard O'Dwyer's web-linking site would place him at the heart of the titanic running battle between the Hollywood giants – struggling to keep their beleaguered business model intact in the online er...
Stuxnet and the Bomb
Over the past decade, US experts have strenuously warned about the ominous possibility of other nations, rogue states, or even terrorist groups attacking US infrastructure through the Internet. As it ...
The 10 Tools of Online Oppressors
The world’s worst online oppressors are using an array of tactics, some reflecting astonishing levels of sophistication, others reminiscent of old-school techniques. From China’s high-level malware at...
US was 'key player in cyber-attacks on Iran's nuclear programme'
Obama reported to have approved bid to target Tehran's nuclear efforts
Beaumont, Peter; Hopkins, Peter
Fresh light is shed on the rapid development of US cyberwarfare capability and reveal its willingness to use cyber weapons offensively to achieve policies.
Windows and online banking - Just say no
There has been a rash of online heists that have stolen millions of dollars from businesses and non-profit organizations. While circumstances are different in each case, they all point to a single poi...