AdelaideX Cyber101xCyberwar, Surveillance and Security

Rafsun Sheikh
5 min readDec 24, 2021
AdelaideX Cyber101xCyberwar, Surveillance and Security
Cyber security course resource links

This is a short writing. I did a course about Cyberwar, Surveillance and Security in Edx. That course was offered by University of Adelaide. Here is the link:

course link

This was a beginner course. And these are following things that were highlighed in that course :

WEEK 1: How the Internet Works

Further reading and information

Weblinks:

  1. Tim Berners-Lee “A Magna Carta for the Web”
  2. Schneier on Security Blog
  3. **The Big Idea:** Bruce Schneier
  4. ARPANET Maps

Electronic papers

  1. Jonathan Zittrain ‘The Generative Internet’ Harvard Law Review, Vol. 119, p. 1974, May 2006; Oxford Legal Studies Research Paper №28/2006; Berkman Center Research Publication №2006/1. Available at SSRN: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=847124
  2. Jonathan Zittrain TED talk: ‘The Web as Random Acts of Kindness’ (2009) http://www.ted.com/talks/jonathan_zittrain_the_web_is_a_random_act_of_kindness?language=en
  3. Jonathan Zittrain ‘Will the Web Break?’ (September 1, 2010). Philosophical Transactions of the Royal Society A, Forthcoming; Harvard Public Law Working Paper №12–08. Available at SSRN: http://ssrn.com/abstract=1995059
  4. Johnson, David R. and Post, David G., Law and Borders — The Rise of Law in Cyberspace. Stanford Law Review, Vol. 48, p. 1367, 1996. Available at SSRN: http://ssrn.com/abstract=535 or http://dx.doi.org/10.2139/ssrn.535

Books

  1. Travel Guide to the Digital World: Surveillance and Internation Standards (ebook)
  2. Ian Brown (Ed) — Research Handbook On Governance Of The Internet (Edward Elgar 2012)
  3. Jack Goldsmith and Tim Wu — Who Controls the Internet? Illusions of a Borderless World (OUP 2006)
  4. Andres Guadamuz — Networks, Complexity and Internet Regulation: Scale Free Law (Edward Elgar 2011)
  5. Greg Lastowka — Virtual Law (Yale University Press 2010)

WEEK 2: Hacking and Leaking

Further reading and information

Weblinks:

  1. Why the world needs WikiLeaks
  2. **Prying Eyes:** Inside the NSA’s War on Internet Security, Der Spiegel
  3. The End Of Privacy January 31, 2014, NPR Ted Radio Hour
  4. **PRISM:** Edward Snowden interview
  5. The Guardian shows NSA slides
  6. PRISM slides ‘unsucked’
  7. NSA XKeyScore tool
  8. Edward Snowden: Here’s how we take back the Internet
  9. Edward Snowden’s alternative Christmas message
  10. Richard Ledgett NSA Deputy Director response to Edward Snowden March 2014
  11. Bruce Schneier and Edward Snowden @ Harvard Data Privacy Symposium
  12. Citizenfour trailer
  13. Anonymous documentary
  14. Submarine cable taps

Electronic papers

  1. Yochai Benkler ‘The Dangerous Logic of the Bradley Manning Case’ New Republic 1 March 2013, http://www.newrepublic.com/article/112554
  2. Melissa de Zwart, Sal Humphreys and Beatrix van Dissel ‘Surveillance, Big Data and Democracy: Lessons for Australia from the US and UK’ (2014) 37 UNSW Law Journal 713 http://www.unswlawjournal.unsw.edu.au/sites/default/files/t3_de_zwart_humphreys_and_van_dissel.pdf
  3. Robert Manne ‘The Cypherpunk Revolutionary’ The Monthly (March 2011) http://www.themonthly.com.au/issue/2011/march/1324265093/robert-manne/cypherpunk-revolutionary
  4. Alan Rusbridger and Ewan MacAskill ‘Edward Snowden interview- the edited transcript’ The Guardian 19 July 2014, http://www.theguardian.com/world/2014/jul/18/-sp-edward-snowden-nsa-whistleblower-interview-transcript

Books

  1. Julian Assange (with Jacob Appelbaum, Andy Muller-Maguhn and Jeremie Zimmerman) — Cypherpunks: Freedom and the Future of the Internet (OR Books, New York, 2012)
  2. Julian Assange — When Google Met WikiLeaks (OR Books, New York, 2014)
  3. Gabriella Coleman — Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous ( Verso, London, 2014)
  4. Sulette Dreyfus and Julian Assange — Underground (William Heinemann, Sydney, 2011)
  5. Glenn Greenwald — No Place To Hide, Edward Snowden, the NSA and the Surveillance State (Penguin Books, 2014)
  6. Bruce Schneier — Data and Goliath ( WW Norton, New York, 2015)

WEEK 3: Surveillance and National Security

Further reading and information

Weblinks:

  1. Office of the Press Secretary — Signals Intelligence Activities
  2. North Korea’s cyber army
  3. Australia’s bill of amendment to the Telecommunications (Interception and Access) Act 197
  4. Operation Pendennis
  5. Operation Neath
  6. Meta data thwarted attack on army base
  7. Australian government on Five Eyes
  8. NSA on metadata success
  9. Thwarted Danish newspaper attack
  10. New York terrorist bomb plot
  11. Conspiracy charges
  12. Flight KAL007
  13. US — China collision

Articles

  1. Hansen, J (2004) ‘US Intelligence Confronts the Future’ in International Journal of Intelligence and Counterintelligence, 17(4), 691

WEEK 4: Surveillance, Privacy and Political Engagement

Further reading and information

Weblinks:

  1. **Drone attacks:** UN rights experts express concern about the potential illegal use of armed drones
  2. How Australia’s new Internet privacy laws will work

Electronic articles

  1. Bruce Schneier, In Praise of Security Theatre, New Internationalist (January 2007) https://www.schneier.com/blog/archives/2007/01/in_praise_of_se.html
  2. Ben Emmerson, Report of the Special Rapporteur on the Promotion and Protection of Human Rights and Fundamental Freedoms while Countering Terrorism. UN doc. A/69/397 (23 September 2014) http://ap.ohchr.org/documents/dpage_e.aspx?si=A/69/397 (click ‘E’ for English version)
  3. United Nations General Assembly, The Right to Privacy in the Digital Age. Resolution Adopted by the General Assembly on 18 December 2013. UN doc. A/RES/68/167 (21 January 2014) http://www.un.org/en/ga/search/view_doc.asp?symbol=A/RES/68/167
  4. United Nations Office of the High Commissioner for Human Rights, Annual Report on The Right to Privacy in the Digital Age. UN doc. A/HRC/27/37 (13 June 2014) http://www.ohchr.org/EN/HRBodies/HRC/RegularSessions/Session27/Documents/A.HRC.27.37_en.pdf
  5. Benjamin Wittes, My Constitution Day Speech at NSA, The Lawfare Podcast **(21 February 2015) http://lawfare.libsyn.com/benjamin-wittes-constitution-day-at-the-nsa
  6. UN Human Rights Council, Resolution 28/L.27, Resolution on the right to privacy in the digital age, UN Doc. A/HRC/28/L.27, 24 March 2015.
  7. International Covenant on Civil and Political Rights

Books

  1. George Orwell’s 1984 (ebook)
  2. Frank Moorhouse, Australia under Surveillance (Vintage Australia, 2014).

WEEK 5: Cyber Security and Cyber Warfare

Further reading and information

Weblinks:

  1. Tallinn Manual
  2. ILC State responsibility
  3. International Law in Cyberspace: The Koh Speech and Tallinn Manual Juxtaposed
  4. Crawford the ILC’s Articles on State Responsibility
  5. US Dept of Defense Cyber Strategy
  6. China Cyber Strategy
  7. Estonia Cyber attacks 2007
  8. Hollis Georgia attack 2008
  9. Georgia Cyber Attacks — 2008
  10. Stuxnet Iran 2009
  11. Sony Attack 2014
  12. We’re at Cyberwar: A global guide to nation state digital attacks

WEEK 6: The Future of the Internet

  1. Siva Vaidhyanathan ‘The Rise of the Cryptopticon’
  2. The Hedgehog Review: Critical Reflections on Contemporary Culture

, (Vol 17, No 1 (Spring 2015).

http://www.iasc-culture.org/THR/THR_article_2015_Spring_Vaidhyanathan.php

Weblinks

  1. ‘We Need an Invasive NSA’ New Republic, 10 October 2013
  2. Net Loss: Freedom? Edward Snowden, Scott Ludlam and Elaine Pearson on the surveillance state (Progress 2015)

Articles and books

  1. Siva Vaidhyanathan ‘The Rise of the Cryptopticon’ The Hedgehog Review: Critical Reflections on Contemporary Culture, (Vol 17, No 1 (Spring 2015). http://www.iasc-culture.org/THR/THR_article_2015_Spring_Vaidhyanathan.php
  2. danah boyd, It’s complicated : the social lives of networked teens, Yale University Press, 2014
  3. Julie Cohen, Configuring the Networked Self : Law, Code, and the Play of Everyday Practice, Yale University Press, 2012
  4. Siva Vaidhyanathan, The Googlization of Everything (And Why We Should Worry), University of California Press, 2011

Thank you all for going through this long list of links. It might not look so interesting. But you can give them a try. Happy reading. Thanks again.

--

--

Rafsun Sheikh

Loves creative works and most honestly Machine Learning.And of course Basketball is my favourite game. And I'm also a running enthusiast.