The Active Response Continuum¶
Public/Private Partnerships to Improve Cyber Response¶
http://www.techworld.com/security/news/index.cfm?newsID=112534, APWG suggests e-crime reporting system, by Jeremy Kirk, IDG News Service, March 11, 2009
http://news.com/Police+maintain+uneasy+relations+with+cybervigilantes/2100-7348_3-6150817.html, Police maintain uneasy relations with cybervigilantes: London-area police are working with certain cybervigilante groups as sources of information in the fight against online fraud., by Tom Espiner, special to CNET News.com, January 17, 2007
http://www.dhs.gov/xlibrary/assets/niac/niac_icwgreport_july06.pdf, Public-Private Sector Intelligence Coordination, National Infrastructure Advisory Council, December, 2006
http://jolt.law.harvard.edu/articles/pdf/v11/11HarvJLTech699.pdf, Private Intrusion Response, by Stevan D. Mitchell and Elizabeth A. Banker, 11 Harvard Journal of Law & Technology 699 (Spring 1998)
http://www.ciao.gov/resource/pccip/lf07.pdf, Adequacy of Criminal Law and Procedure (Cyber), A “Legal Foundations” Study – Report 7 of 12
http://www.ciao.gov/resource/pccip/DeterrenceCyberDimension.pdf, Toward Deterrence in the Cyber Dimension
http://www.cistp.gatech.edu/catalog/publicprivate.php, Private-Public & Non-Governmental Organizations, Cyber Security Organization Catalog, Georgia Tech
History of Public and Private Police Forces¶
http://web.mit.edu/gtmarx/www/private.html, The Interweaving Of Public And Private Police Undercover Work (In C. Shearing and P. Stenning, “Private Policing,” Sage Publications, 1987)
http://faculty.ncwc.edu/toconnor/205/205lect04.htm, A Brief Guide to Police History
http://www.oldbaileyonline.org/history/crime/policing.html, Policing in London before the Bobbies
http://www.pbs.org/wgbh/amex/james/filmmore/pt.html, Transcript of “The American Experience: Jesse James” (documentary about Jesse James, including Alan Pinkerton’s pursuit of the James Gang) [Timeline]
Privateering (“Letters of Marque and Reprisal”)¶
http://college.hmco.com/history/readerscomp/mil/html/ml_040900_piracyprivat.htm, Piracy and Privateering
http://www.jmu.edu/madison/center/main_pages/madison_archives/life/war1812/privateer/marque.htm, Letter of Marque carried by Captain Millin of the American privateer Prince of Neufchâtel during the War of 1812
Attribution¶
http://handle.dtic.mil/100.2/ADA468859, Techniques for Cyber Attack Attribution, by David A. Wheeler, Institute for Defense Analyses, October 2003
http://www.nwc.navy.mil/press/review/1998/spring/art1-sp8.htm, Information Operations, Deterrence, and the Use of Force, by Roger W. Barnett, Naval War College, 1998
http://cryptome.org/traceback.htm, ARDA BAA-05-04-IFKA on Network Attack Traceback
http://www.cs3-inc.com/arda-survey.pdf, Survey/Analysis of Levels I, II, and III: Attack Attribution Techniques, Don Cohen & K. Narayanaswamy, April 27, 2004
http://www.fbi.gov/ucr/cius_04/offenses_cleared/index.html, Statistics on crime clearance
http://www.cybercrime.gov/usamay2001_2.htm, Tracking a Computer Hacker, by Daniel A. Morris, Assistant United States Attorney, Computer and Telecommunications Coordinator, District of Nebraska, May 2001
http://www.ciao.gov/resource/pccip/DeterrenceCyberDimension.pdf, Toward Deterrence in the Cyber Dimension (.pdf)
http://www.phoenixnewtimes.com/extra/cyberstalk.html, Caught in the Net: An online posse tracks down an Internet stalker, by Jack Mingo
https://staff.washington.edu/dittrich/misc/active-forensics.txt, Hack and Counter-Hack – Active Forensics: Tracking that Intruder., by Dragos Ruiu, January 30, 2001
http://arqos.csc.ncsu.edu/papers/2001-09-sleepytracing-jiw.pdf, Tracing Based Active Intrusion Response, by Xinyuan Wang, Douglas S. Reeves, S. Felix Wu, 2001
http://www.cert.org/research/isw/isw2000/papers/13.pdf, Intelligence Preparation of the Information Battlespace – A Cyber Playbook for Information Survivability, by James K. Williams, Roderick A. Moore, and Charles McCain
http://www.nbc.gov/pip.cfm, BAA 03-03-FH (Information Assurance For the US Intelligence Community Broad Agency Announcement aimed at attack attribution. Defines four levels of attribution that are useful in framing the topic.)
Law¶
http://www.usdoj.gov/criminal/cybercrime/fedcode.htm, US Federal Code related to Cybercrime, Department of Justice Computer Crime and Intellectual Property Section
http://www.ncsl.org/programs/lis/CIP/cyberter-legis02.htm, 2001-02 Cyberterrorism/Computer Crime Legislation
Council of Europe, Convention on Cybercrime (ETS No: 185) http://conventions.coe.int/Treaty/EN/WhatYouWant.asp?NT=185
http://europa.eu.int/information_society/eeurope/2005/all_about/security/handbook/text_en.htm, Handbook of Legislative Procedures of Computer and Network Misuse in EU Countries (CSIRT Project Survey)
http://www.findlaw.com/01topics/10cyberspace/computercrimes/gov_laws.html, FindLaw > Legal Subjects > Cyberspace Law > Computer Crime > Primary Materials - Laws and Government Documents
http://www.mosstingrett.no/info/legal.html, THE LEGAL FRAMEWORK - UNAUTHORIZED ACCESS TO COMPUTER SYSTEMS (PENAL LEGISLATION IN 44 COUNTRIES), by Stein Schjolberg, Chief Judge, Moss District Court, Norway, April 7, 2003
http://milcom.jag.af.mil/ch15/info.htm, LEGAL ASPECTS OF INFORMATION OPERATIONS
http://papers.ssrn.com/sol3/papers.cfm?abstract_id=399740#PaperDownload, Cybercrime’s Scope: Interpreting ‘Access’ and ‘Authorization’ in Computer Misuse Statutes, by Orin S. Kerr, New York University Law Review, Vol. 78, November 2003
http://www.safersite.com/Whitepapers/LiabilityofPests.asp, The Legal Risks of Computer Pests and Hacker Tools, by Benjamin Wright, J.D., September 25, 2001
http://www.asianlaws.org/cyberlaw/library/cc/ptscanning.htm, Port Scanning and its Legal Implications, by Adv. Abhinav Bhatt, Asian School of Cyber Laws
http://www.proxypot.org/yui.pdf, Criminal complaint in case of U.S. v. John Lin, Shao Yui, Elaine Espinosa, and Daniel Mankani, U.S. District Court, Eastern District of Michigan (spam honeypots used to collect evidence in CAN-SPAM Act case)
http://www.edp24.co.uk/Content/News/Index/TonyMartin.asp, Tony Martin: convicted killer or defender of householders’ rights?, EDP24
http://www.phillipsnizer.com/library/cases/lib_case37.cfm, Scott Moulton and Network Installation Computer Services, Inc. v. VC3, Civ. Act. No. 1:00-CV-434-TWT (N.D. Ga. November 6, 2000)
http://www.securityfocus.com/news/126, Port scans legal, judge says: Federal court finds that scanning a network doesn’t cause damage, or threaten public health and safety, by Kevin Poulsen, SecurityFocus Dec 18 2000
http://grove.ufl.edu/~techlaw/vol6/Preston.html, Finding Fences in Cyberspace: Privacy and Open Access on the Internet by Ethan Preston
International response to piracy on the high seas¶
The United Nations http://www.un.org/Depts/los/convention_agreements/convention_overview_convention.htm, Convention on the Law of the Sea
United Nations Conference on Trade and Development (UNCTAD) conference on http://www.unctad.org/Templates/Search.asp?intItemID=2068&lang=1&frmSearchStr=arrest+of+ships&frmCategory=all§ion=whole#doc, Arrest of Ships
Statutes re: use of force in defense of property (c/o Ivan Orton)¶
http://www.guamattorneygeneral.com/gca/9gc007.pdf, 9 GCA: Crimes and Corrections, Chapter 7 (See Section 7.90: “Force in Defense of Property: Defined and Allowed”)
http://www.aals.org/profdev/torts/barnes.pdf, Judges and Legis latures in 21st Century Torts: Integrating Cases and Statutes, by David W. [Jake] Barnes, Seton Hall University School of Law (See pp. 2-4)
http://www.law.sc.edu/opinions/25459.htm, State of South Carolina v. Jeffrey M. Thompson, South Carolina Supreme Court opinion 25459 (Use of force against fur bearing animals)
http://timesargus.nybor.com/Local/Story/69133.html, Bear Shootings under fire, by Stefan Hard, Times Argus, July 25, 2003 (Laws re: use of force against moose more specific than laws re: use of force against bears)
Reading list for Active Defense Workshop¶
http://www.cnn.com/2000/TECH/computing/06/01/hack.back.idg/, Can you hack back?, by Deborah Radcliff, NetworkWorld Fusion, June 1, 2000
http://www.sosresearch.org/publications/ISTAS02hackback.PDF, Internet Hack Back: Counter Attacks as Self-Defense or Vigilantism?, by Vikas Jayawal, William Yurcik, David Doss, Illinois State University
http://jolt.law.harvard.edu/articles/pdf/v11/11HarvJLTech699.pdf, Private Intrusion Response, by Stevan D. Mitchell and Elizabeth A. Banker, 11 Harvard Journal of Law & Technology 699 (Spring 1998) (.pdf)
http://www.ciao.gov/resource/pccip/lf07.pdf, Adequacy of Criminal Law and Procedure (Cyber), A “Legal Foundations” Study – Report 7 of 12 (.pdf)
http://www.ciao.gov/resource/pccip/DeterrenceCyberDimension.pdf, Toward Deterrence in the Cyber Dimension (.pdf)
http://64.225.202.40/mediadefender/press%20about%20MD/nytimes_5_8_03_pg1.htm, Software Bullet Sought to Kill Music Piracy, by Andrew Ross Sorkin, The New York Times, May 4, 2003
https://staff.washington.edu/dittrich/arc/blaster-activedefense.txt, Email from outdot@rstack.org to honeypots to honeypots mailing, detailing an active defense against the Blaster worm using Neils Provost’s honeyed, August 19, 2003
http://seattletimes.nwsource.com/html/businesstechnology/2001552302_newworm19.htm, Well-intended computer worm slows Asian networks, by Kim Peterson, Seattle Times, August 19, 2003
http://news.com/2100-1028-5108854.html, Bush pushes for cybercrime treaty, by Declan McCullagh, CNET News.com, November 18, 2003