H2O

This is the old version of the H2O platform and is now read-only. This means you can view content but cannot create content. You can access the new platform at https://opencasebook.org. Thank you.

    1. 1.2 Show/Hide More Ian Traynor, Russia Accused of Unleashing Cyberwar to Disable Estonia, Guardian, May 16, 2007
      Actors in Russia conduct DDoS attacks against Estonia targets following the the Estonians' relocation of the Soviet WWII memorial.
    1. 2.2 Show/Hide More John Markoff, Vast Spy System Loots Computers in 103 Countries, NY Times, Mar 28, 2009
      An electronic spying operation, controlled from computers in China, stole documents from hundreds of government and private offices around the world, including those of the Dalai Lama.
    1. 3.2 Show/Hide More David E. Sanger, Obama Ordered Sped Up Wave of Cyberattacks Against Iran, NY Times, Jun 1, 2012
      An American program of increasingly sophisticated attacks on the computer systems that ran Iran’s main nuclear enrichment facilities, allegedly responsible for production of the Flame cyber collection platform and the Stuxnet cyber weapon.
    1. 4.2 Show/Hide More Ellen Nakashima et al., U.S., Israel Developed Flame Computer Virus to Slow Iranian Nuclear Efforts, Officials Say, Washington Post, Jun 19, 2012
      Flame is malware developed under Olympic Games as a US-Israeli collaboration presumably targeting Iranian nuclear facilities. It is designed to replicate across even highly secure networks, then control everyday computer functions to send data back to its creators.
    1. 5.2 Show/Hide More Office of the National Counterintelligence Executive, Foreign Spies Stealing US Economic Secrets in Cyberspace, Report to Congress on Foreign Economic Collection and Industrial Espionage, 2009-2011, October, 2011
      Cyberspace provides relatively small-scale actors an opportunity to become players in economic espionage. Underresourced governments or corporations could build relationships with hackers to develop customized malware or remote-access exploits to steal sensitive US economic or technology information. This report gives special attention to foreign collectors’ exploitation of cyberspace, while not excluding other established tactics and methods used in foreign economic collection and industrial espionage.
    1. 6.2 Show/Hide More Part I: Saki Knafo, Anonymous And The War Over The Internet, Huffington Post, Jan 2012.
      This article traces the development of the amorphous online community known as Anonymous, pranksters who have become a force in global affairs.
    2. 6.3 Show/Hide More Part II: Saki Knafo, Anonymous And The War Over The Internet, Huffington Post, Jan 2012
      This article traces the development of the amorphous online community known as Anonymous, pranksters who have become a force in global affairs.
Close

Playlist Information

May 21, 2013

Author Stats

Jack Goldsmith and a Berkman Center Cybersecurity Team

Other Playlists by Jack Goldsmith and a Berkman Center Cybersecurity Team

Find Items

Search below to find items, then drag and drop items onto playlists you own. To add items to nested playlists, you must first expand those playlists.

SEARCH
Leitura Garamond Futura Verdana Proxima Nova Dagny Web
small medium large extra-large