Cyberwar Writings, Presentations, Resources, and References
William F. Slater, III, M.S. in Cybersecurity
(click map or scroll down)
 
    
A 2002 article I wrote on the October 2002 Internet_Outage_and DDoS_on the 13 DNS Root Servers
Presentations
Suppose They Gave a Cyberwar and Everybody Came? 
- Presentation for Northshore ASIS - August 8, 2013 (PDF version)
Suppose They Gave a Cyberwar and Everybody Came? (on YouTube.com)
Suppose They Gave a Cyberwar and Everybody Came? (PDF version)
What's in Presidential Policy Directive 20 (PPD 20)? How It Will Affect America and Americans and Why You Should Care (on YouTube.com)
What's in Presidential Policy Directive 20 (PPD 20)? How It Will Affect America and Americans and Why You Should Care (PDF version)
Real-Time Resources
Kaspersky Real-Time Cyber Threat Map
References
Beidleman, 
S. W. (2009). Defining and Deterring Cyber War - Homeland Security Digital 
Library. Retrieved from 
https://www.hsdl.org/?view&did=28659  on March 18, 2013.
Bousquet, A. (2009). The Scientific Way of Warfare: Order and Chaos on the 
Battlefields of Modernity. New York, NY: Columbia University Press.
Carr, J. (2012). Inside Cyber Warfare, second edition. Sebastopol, CA: O’Reilly.
Crosston, M. (2011). World Gone Cyber MAD: How “Mutually Assured Debilitation” 
Is the Best Hope for Cyber Deterrence. An article published in the Strategic 
Studies Quarterly, Spring 2011. Retrieved from
http://www.au.af.mil/au/ssq/2011/spring/crosston.pdf  on October 10, 
2012.
Fayutkin, D. (2012). The American and Russian Approaches to Cyber Challenges. 
Defence Force Officer, Israel. Retrieved from
http://omicsgroup.org/journals/2167-0374/2167-0374-2-110.pdf  on 
September 30, 2012.
Gray, C.S. 
(2013). Making Strategic Sense of Cyber Power: Why the Sky Is Not Falling. 
Retrieved from
http://www.strategicstudiesinstitute.army.mil/pubs/display.cfm?pubID=1147  
on May 26, 2013.
Hyacinthe, B. P. (2009). Cyber Warriors at War: U.S. National Security Secrets & 
Fears Revealed. Bloomington, IN: Xlibris Corporation.
Kramer, F. D. (ed.), et al. (2009). Cyberpower and National Security. 
Washington, DC: National Defense University.
Libicki, M.C. (2014). Why Cyberwar Will Not and Should Not Have Its Grand Strategist. Retrieved from http://www.au.af.mil/au/ssq/digital/pdf/spring_2014/libicki.pdf .
Libicki, M.C. (2012). Cyberspace Is Not a Warfighting Domain. Retrieved from http://moritzlaw.osu.edu/students/groups/is/files/2012/02/4.Libicki.pdf.
Libicki, M.C. (2009). Cyberdeterrence and Cyberwar. Santa Monica, CA: Rand 
Corporation.
Markoff, J. and Kramer, A. E. (2009). U.S. and Russia Differ on a Treaty for 
Cyberspace. An article published in the New York Times on June 28, 2009. 
Retrieved from
http://www.nytimes.com/2009/06/28/world/28cyber.html?pagewanted=all  on 
June 28, 2009.
Obama, B. H. (2012). Defense Strategic Guidance 2012 - Sustaining Global 
Leadership: Priorities for 21st Century Defense. Published January 3, 2012. 
Retrieved from
http://www.defense.gov/news/Defense_Strategic_Guidance.pdf  on January 
5, 2012.
Saadawi, T. N. [Editor], and Jordan, L. H. Jr. (2011) [Editor] . Cyber Infrastructure Protection. Strategic Studies Institute. Retrieved from http://www.strategicstudiesinstitute.army.mil/pubs/display.cfm?pubID=1067 on May 26, 2013.
Saadawi, 
T. N. [Editor], et al. (2013). Cyber Infrastructure Protection: Vol. II. 
Strategic Studies Institute. Retrieved from
http://www.strategicstudiesinstitute.army.mil/pubs/display.cfm?pubID=1145  
on May 26, 2013.
Technolytics. (2012). Cyber Commander's eHandbook: The Weaponry and Strategies 
of Digital Conflict, third edition. Purchased and downloaded on September 26, 
2012.
Turzanski, E. and Husick, L. (2012). “Why Cyber Pearl Harbor Won't Be Like Pearl 
Harbor At All...” A webinar presentation held by the Foreign Policy Research 
Institute (FPRI) on October 24, 2012. Retrieved from
http://www.fpri.org/multimedia/2012/20121024.webinar.cyberwar.html  on 
October 25, 2012.
U.S. Army. (1997). Toward Deterrence in the Cyber Dimension: A Report to the 
President's Commission on Critical Infrastructure Protection. Retrieved from
http://www.carlisle.army.mil/DIME/documents/173_PCCIPDeterrenceCyberDimension_97.pdf  
on November 3, 2012.
U.S. Department of Defense. (2013). Department of Defense - Defense Science 
Board – Task Force Report: Resilient Military Systems and the Advanced Cyber 
Threat, published January 2013. Retrieved from
http://www.acq.osd.mil/dsb/reports/ResilientMilitarySystems.CyberThreat.pdf  
on March 16, 2013.
U.S. 
Strategic Command information (2013). 
https://www.facebook.com/billslater/posts/10152788814120456
Wagner, K. (2013). The NSA Is Training 13 Teams of Covert Hackers to Attack 
Other Countries. And article published on March 13, 2013. Retrieved from
http://gizmodo.com/5990346/the-nsa-is-training-13-teams-of-covert-hackers-to-attack-other-countries  
on March 19, 2013.
Articles at http://www.cyberwarzone.com 
Papers at http://billslater.com/writing 
Papers at 
http://billslater.com/cyberwar
More References
Rand Beers is the current Under Secretary of Homeland Security for National 
Protection and Programs. Beers was appointed as Under Secretary by President 
Barack Obama on June 19, 2009.
March 20, 2013, he delivered this 12-page report, a Statement for the Record 
Before the United States House of Representatives Appropriations Committee 
Subcommittee on Homeland Security. It gives unusually detailed review of how the 
Executive Branch, particularly the Department of Homeland Security sees its role 
in defining and protecting Critical Infrastructure, both physical and virtual 
from cyber threats related to cyberattacks. It also discusses the contents the 
contents and intent of PPD 21, EO 13636, both of which are related specifically 
to cybersecurity and protection of critical infrastructure. 
For your edification:
http://appropriations.house.gov/uploadedfiles/hhrg-113-ap15-wstate-beersr-20130320.pdf 
More information:
EO 13636
http://blog.zwillgen.com/wp-content/uploads/2013/02/CybersecurityEO-201302122.pdf 
PPD 21
http://blog.zwillgen.com/wp-content/uploads/2013/02/PPD21-201302124.pdf 
Update Presentation on the OBAMA Administration Priorities on DHS Highlights 
Efforts to Strengthen Cybersecurity for the Nations Critical Infrastructure
http://www.dhs.gov/news/2013/02/13/dhs-highlights-efforts-strengthen-cybersecurity-nations-critical-infrastructure 
Commentary:
http://blog.zwillgen.com/2013/02/13/for-obama-a-cybersecurity-triple-play /
= = = = = = = = = = = = = = = = = = = = = 
= = = =
Quotes in News 
Articles
= = = = = = = = = = = = = = = = = = = = = = = = 
=
This is 
the link is James Temple’s article in the San Francisco Chronicle regarding 
recent computer security threats and issues.
Internet is still vulnerable to cyber-criminals
--James Temple, Chronicle Columnist, Saturday, January 21, 2012
I was one of his subject matter experts that he interviewed for the article. He 
found me because of a 2002 article I wrote for the
Internet Society about DDoS attacks on the 13 DNS Root Servers in October 2002.
Other Cybersecurity-Related Writing
M.S. in Cybersecurity at Bellevue University
Visitor Count
Copyright 1996 - 2013 by William F. Slater, III, 
Chicago, IL, USA
All
    Rights Reserved, Nationally and Internationally.
| 
	 |