Robotics and Drones

DRONES:   Drones in Domestic Surveillance Operations: Fourth Amendment Implications and Legislative Responses – Richard M. Thompson II (2013) http://www.fas.org/sgp/crs/natsec/R42701.pdf   Remotely Piloted Aircraft Systems & Journalism. Opportunities and Challenges of Drones in News Gathering. David Goldberg, Mark Corcoran, and Robert G. Picard (2013) https://reutersinstitute.politics.ox.ac.uk/fileadmin/documents/Publications/Working_Papers/Remotely_Piloted_Aircraft_and_Journalism.pdf   The Great Drone Debate – Amitai Etzioni (2013) http://icps.gwu.edu/files/2013/03/Etzioni_DroneDebate.pdf   Drones: What […]

Cybersecurity

Cybersecurity cooperation – Defending the digital frontline: http://www.enisa.europa.eu/media/key-documents/cybersecurity-cooperation-defending-the-digital-frontline Cyber Security without Cyber War Mary Ellen O’Connell (2012) http://jcsl.oxfordjournals.org/content/17/2/187.full Defence In-Depth for Cyber Security with Custom Anti-Virus Signature Definition Markson Aigbodi, Karim Ouazzane, Daniel Mitchell, Vassil Vassilev http://sdiwc.net/digital-library/web-admin/upload-pdf/00000402.pdf

Cybercrime

Cyber Crime: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2340803&download=yes Understanding cybercrime: a guide for developing countries Marco Gercke, (ITU, 2012) http://www.itu.int/ITU-D/cyb/cybersecurity/docs/Cybercrime%20legislation%20EV6.pdf

Cyberwar and Cyberterrorism

Japan attacked: can we say ‘cyber war’ now? T. Brewster (2011) Itpro.co.uk 20.09.2011 http://www.itpro.co.uk/636271/japan-attacked-can-we-say-cyber-war-now What is Cyberwar? J. Carr (2011) http://www.slate.com/articles/technology/future_tense/2011/08/what_is_cyberwar.html The Rewards (and Risks) of Cyber War Coll, S. (2012) http://www.newyorker.com/online/blogs/comment/2012/06/the-rewards-and-risks-of-cyberwar.html Deterrence doesn’t work in cyberspace: CCSA, AOL Defence. Freedberg S. (2012) http://defense.aol.com/2012/07/10/cyberspace-fundamentally-unstable-because-cyber-deterrence-doe/ Six Degrees of Desperation: When Defense Becomes Offense Hoff (2012) http://www.rationalsurvivability.com/blog/2012/07/six-degrees-of-desperation/ […]

Digital Forensics and Digital Evidence

Google Drive: Forensic Analysis of Cloud Storage Data Remnants  http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2340234 IOS Anti-Forensics: How Can We Securely Conceal, Delete and Insert Data? http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2339819   Digital Evidence on Mobile Devices Eoghan Casey and Benjamin Turnbull (Elsevier, 2009) http://www.elsevierdirect.com/companions/9780123742681/Chapter_20_Final.pdf Digital Evidence: A Guide to Forensics Readiness for Organisations, Security Advisers and Lawyers Peter Sommer (IAAC, 2012) http://www.iaac.org.uk/_media/DigitalInvestigations2012.pdf Commentary: Defining […]

Cloud Computing

The Cloud Computing Workshop Open forum Accademy (March 2012) http://openforumacademy.org/library/ofa-research/Report%20of%20the%20Cloud%20Computing%20Workshop_Final_V1.1.pdf Jurisdictional Aspects of Cloud Computing Cristos Velasco San Martin, (COE, 2009) http://www.coe.int/t/dghl/cooperation/economiccrime/cybercrime/Documents/Reports-Presentations/2079%20if09%20pres%20cristos%20cloud.pdf