Nachfolgend eine Liste der Veröffentlichungen zum Theme Cyberpeace und Cyberwar aus den vergangenen Jahren. Soweit frei verfügbar sind außerdem Downloads der Veröffentlichungen beigefügt. Diese Downloads sind zur weiteren Verwendung frei gegeben, ich würde mich jedoch sehr über Rückmeldungen freuen wo, wer und wie sie genutzt wurden. Ein Upload auf andere Webseiten dieser Inhalte ist jedoch aus urheberrechtlichen Gründen nicht zulässig. Bitte haben Sie dafür Verständnis. In Einzelfällen kann ich auf Rückfrage unter Umständen auch einige der anderen Beiträge anbieten.
2023
Reinhold, Thomas; Reuter, Christian
In: Zeitschrift für Friedens- und Konfliktforschung (ZeFKo), 2023.
@article{Reinhold2022b,
title = {Preventing the Escalation of Cyber Conflicts: Towards an Approach To Plausibly Assure the Non-Involvement in a Cyberattack},
author = {Thomas Reinhold and Christian Reuter},
url = {https://link.springer.com/article/10.1007/s42597-023-00099-7},
doi = {https://doi.org/10.1007/s42597-023-00099-7},
year = {2023},
date = {2023-01-01},
journal = {Zeitschrift für Friedens- und Konfliktforschung (ZeFKo)},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Reinhold, Thomas; Kühn, Philipp; Günther, Daniel; Schneider, Thomas; Reuter, Christian
In: IEEE Transactions on Technology and Society, 2023.
@article{Reinhold2022c,
title = {EXTRUST: Reducing Exploit Stockpiles With a Privacy-Preserving Depletion System for Inter-State Relationship},
author = {Thomas Reinhold and Philipp Kühn and Daniel Günther and Thomas Schneider and Christian Reuter},
url = {https://ieeexplore.ieee.org/document/10138062},
doi = {10.1109/TTS.2023.3280356},
year = {2023},
date = {2023-01-01},
journal = {IEEE Transactions on Technology and Society},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Reinhold, Thomas; Reuter, Christian
In: Zeitschrift für Friedens- und Konfliktforschung, 2023, ISSN: 2192-1741, 2524-6976.
@article{Reinhold2023a,
title = {Zur Debatte über die Einhegung eines Cyberwars: Analyse militärischer Cyberaktivitäten im Krieg Russlands gegen die Ukraine},
author = {Thomas Reinhold and Christian Reuter},
url = {https://link.springer.com/10.1007/s42597-023-00094-y},
doi = {10.1007/s42597-023-00094-y},
issn = {2192-1741, 2524-6976},
year = {2023},
date = {2023-01-01},
urldate = {2023-04-20},
journal = {Zeitschrift für Friedens- und Konfliktforschung},
abstract = {Der Überfall Russlands auf die Ukraine und der sich anschließende Krieg haben neben vielen anderen sicherheitspolitischen Gewissheiten auch zum ersten Mal die Rolle des Cyberspace in einem offenen Angriffskrieg demonstriert und bedenkenswerte Entwicklungen offenbart. Ziel dieses Beitrags ist es, die militärischen Aktivitäten im Cyberspace im Rahmen des Krieges Russlands gegen die Ukraine auf der Grundlage der öffentlich verfügbaren Informationen zu analysieren und im Hinblick auf die bis dato gängigen Vorstellungen eines Cyberwars zu bewerten. Darauf aufbauend werden mögliche Schlussfolgerungen betrachtet, zum einen mit Blick auf die zukünftige Bedeutung von Cyberaktivitäten für Russland, hinsichtlich des generellen militärischen Einsatzes von Cyberwirkmitteln und dessen weiterer Entwicklung, und in Bezug auf zukünftige internationale Debatten zur Einhegung von Cyberwars und des schädigenden Einsatzes von Cyberwirkmitteln.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Reinhold, Thomas; Pleil, Helene; Reuter, Christian
Challenges for Cyber Arms Control: A Qualitative Expert Interview Study Artikel
In: Zeitschrift für Außen- und Sicherheitspolitik (ZfAS), 2023.
@article{Reinhold2023b,
title = {Challenges for Cyber Arms Control: A Qualitative Expert Interview Study},
author = {Thomas Reinhold and Helene Pleil and Christian Reuter},
url = {https://link.springer.com/article/10.1007/s12399-023-00960-w},
doi = {https://doi.org/10.1007/s12399-023-00960-w},
year = {2023},
date = {2023-01-01},
journal = {Zeitschrift für Außen- und Sicherheitspolitik (ZfAS)},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Reinhold, Thomas
Technical University Darmstadt, 2023.
@phdthesis{Reinhold2023Diss,
title = {Towards a Peaceful Development of Cyberspace - Challenges and Technical Measures for the De-escalation of State-led Cyberconflicts and Arms Control of Cyberweapons},
author = {Thomas Reinhold},
url = {https://tuprints.ulb.tu-darmstadt.de/24559/},
year = {2023},
date = {2023-01-01},
address = {Darmstadt, Germany},
school = {Technical University Darmstadt},
keywords = {},
pubstate = {published},
tppubtype = {phdthesis}
}
2022
Franken, Jonas; Reinhold, Thomas; Reichert, Lilian; Reuter, Christian
The Digital Divide in State Vulnerability to Submarine Communications Cable Failure Artikel
In: International Journal of Critical Infrastructure Protection, Bd. 38, S. 100522, 2022, ISSN: 1874-5482.
@article{Franken2022b,
title = {The Digital Divide in State Vulnerability to Submarine Communications Cable Failure},
author = {Jonas Franken and Thomas Reinhold and Lilian Reichert and Christian Reuter},
url = {https://www.sciencedirect.com/science/article/pii/S1874548222000130},
doi = {10.1016/j.ijcip.2022.100522},
issn = {1874-5482},
year = {2022},
date = {2022-01-01},
urldate = {2023-04-11},
journal = {International Journal of Critical Infrastructure Protection},
volume = {38},
pages = {100522},
abstract = {The backbone network of submarine communication cables (SCC) carries 98% of international internet traffic. Coastal and island states strongly depend on this physical internet infrastructure to provide internet connectivity. Although about 100 SCC breakdowns of human or natural origin occur at yearly average, a literature review reveals that there is no approach to assess individual state vulnerability to SCC failure in global comparison. In this article, the global SCC network is modeled based on publicly available data. Besides the analysis of the global network properties, a focus is put on remaining bandwidth capacities in three different failure scenario simu lations of SCC breakdowns. As a result, this study identifies 15 highly vulnerable states and overseas territories, and another 28 territories that are classified as partially vulnerable to SCC failures. Since economic market decisions shape the structure of the SCC network, an uneven distribution of redundancies and the resulting vulnerability of disadvantaged economies can be confirmed. Therefore, the study’s findings may contribute to a better assessment of the necessity of preventive protection measures of critical telecommunication in frastructures in states and territories characterized by high and medium vulnerability.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Herpig, Sven; Reinhold, Thomas
Spotting the Bear: Credible Attribution and Russian Operations in Cyberspace Buchabschnitt
In: Popescu, Nicu; Secrieru, Stanislav (Hrsg.): Hacks, leaks and disruptions: Russian cyber strategies, Bd. 148, S. 33–42, European Union Institute for Security Studies (EUISS), Paris, 2022, ISBN: 978-92-9198-763-4.
@incollection{Herpig2018,
title = {Spotting the Bear: Credible Attribution and Russian Operations in Cyberspace},
author = {Sven Herpig and Thomas Reinhold},
editor = {Nicu Popescu and Stanislav Secrieru},
url = {https://www.fr.de/politik/ukraine-krieg-starlink-elon-musk-kosmische-launen-milliardaer-netzwerk-news-91863875.html.},
isbn = {978-92-9198-763-4},
year = {2022},
date = {2022-01-01},
urldate = {2023-04-11},
booktitle = {Hacks, leaks and disruptions: Russian cyber strategies},
volume = {148},
pages = {33–42},
publisher = {European Union Institute for Security Studies (EUISS)},
address = {Paris},
keywords = {},
pubstate = {published},
tppubtype = {incollection}
}
Reinhold, Thomas
2022.
@misc{Reinhold2022,
title = {Export Control of Surveillance Software from Germany and Europe - Regulations , Limits and Weaknesses},
author = {Thomas Reinhold},
url = {https://il.boell.org/en/2021/12/27/export-control-surveillance-software-germany-and-europe-regulations-limits-and},
year = {2022},
date = {2022-01-01},
keywords = {},
pubstate = {published},
tppubtype = {misc}
}
Reinhold, Thomas; Schörnig, Niklas (Hrsg.)
1, Springer Cham, Cham, 2022, ISBN: 978-3-031-11043-6 978-3-031-11042-9, (Issue: 1).
@book{Reinhold2022a,
title = {Armament, Arms Control and Artificial Intelligence: The Janus-faced Nature of Machine Learning in the Military Realm},
editor = {Thomas Reinhold and Niklas Schörnig},
url = {https://link.springer.com/book/10.1007/978-3-031-11043-6},
doi = {10.1007/978-3-031-11043-6},
isbn = {978-3-031-11043-6 978-3-031-11042-9},
year = {2022},
date = {2022-01-01},
urldate = {2023-04-18},
number = {1},
publisher = {Springer Cham},
address = {Cham},
edition = {1},
series = {Studies in Peace and Security (SPS)},
abstract = {Looking at a variety of armament sectors, the book examines how Artificial Intelligence (AI) impacts the fields of armament and arms control, how existing arms control measures will be affected by AI, and what new approaches based on AI have been or are currently developed. The significant increase in computing power, the increasing reliance on software, and the advent of (narrow) AI and deep-learning algorithms all have the potential to lead to disruptive changes for military operations and warfare, rendering many classical arms control instruments less effective, or even useless. On the other hand, AI might lead to completely new arms control approaches, raising the effectiveness and reliability of new verification measures. To provide a common understanding, the book starts by presenting a general introduction to the state of the art in artificial intelligence and arms control, and how the two topics are interrelated. The second part of the book looks at examples from various fields of weapon technology, including weapons of mass destruction (WMD), conventional armament, and emerging technologies. The final section offers a cross-cutting perspective based on the examples presented in the second part. This volume will appeal to students and scholars of international relations, as well as policy-makers and practitioners interested in a better understanding of peace and security studies in general, and armament and arms control in particular with a strong focus on AI},
note = {Issue: 1},
keywords = {},
pubstate = {published},
tppubtype = {book}
}
Reinhold, Thomas; Reuter, Christian
Cyber Weapons and Artificial Intelligence: Impact, Influence and the Challenges for Arms Control Buchabschnitt
In: Reinhold, Thomas; Schörnig, Niklas (Hrsg.): Armament, Arms Control and Artificial Intelligence: The Janus-faced Nature of Machine Learning in the Military Realm, S. 145–158, Springer International Publishing, Cham, 2022, ISBN: 978-3-031-11042-9 978-3-031-11043-6, (Series Title: Studies in Peace and Security).
@incollection{Reinhold2022g,
title = {Cyber Weapons and Artificial Intelligence: Impact, Influence and the Challenges for Arms Control},
author = {Thomas Reinhold and Christian Reuter},
editor = {Thomas Reinhold and Niklas Schörnig},
url = {https://link.springer.com/10.1007/978-3-031-11043-6_11},
doi = {10.1007/978-3-031-11043-6_11},
isbn = {978-3-031-11042-9 978-3-031-11043-6},
year = {2022},
date = {2022-01-01},
urldate = {2023-03-30},
booktitle = {Armament, Arms Control and Artificial Intelligence: The Janus-faced Nature of Machine Learning in the Military Realm},
pages = {145–158},
publisher = {Springer International Publishing},
address = {Cham},
series = {Studies in Peace and Security},
abstract = {As cyber weapons and artificial intelligence technologies share the same technological foundation of bits and bytes, there is a strong trend of connecting both, thus addressing the imminent challenge of cyber weapons of processing, filtering and aggregating huge amounts of digital data in real time into decisions and actions. This chapter will analyze this development and highlight the increasing tendency towards AI enabled autonomous decisions in defensive as well as offensive cyber weapons, the arising additional challenges for attributing cyberattacks and the problems for developing arms control measures for this “technology fusion”. However, the article also ventures an outlook how AI methods can help to mitigate these challenges if applied for arms control measures itself.},
note = {Series Title: Studies in Peace and Security},
keywords = {},
pubstate = {published},
tppubtype = {incollection}
}
Reinhold, Thomas
Arms Control for Artificial Intelligence Buchabschnitt
In: Reinhold, Thomas; Schörnig, Niklas (Hrsg.): Armament, Arms Control and Artificial Intelligence: The Janus-faced Nature of Machine Learning in the Military Realm, S. 211–226, Springer International Publishing, Cham, 2022, ISBN: 978-3-031-11042-9 978-3-031-11043-6, (Series Title: Studies in Peace and Security).
@incollection{Reinhold2022h,
title = {Arms Control for Artificial Intelligence},
author = {Thomas Reinhold},
editor = {Thomas Reinhold and Niklas Schörnig},
url = {https://link.springer.com/10.1007/978-3-031-11043-6_15},
doi = {10.1007/978-3-031-11043-6_15},
isbn = {978-3-031-11042-9 978-3-031-11043-6},
year = {2022},
date = {2022-01-01},
urldate = {2023-03-27},
booktitle = {Armament, Arms Control and Artificial Intelligence: The Janus-faced Nature of Machine Learning in the Military Realm},
pages = {211–226},
publisher = {Springer International Publishing},
address = {Cham},
series = {Studies in Peace and Security},
abstract = {With military weapon systems getting more and more improved by artificial intelligence and states competing about the leading role in this development, the question arises how arms control measures can be applied to decrease this equipment spiral. The ongoing debates on cyber weapons have already highlighted the problems with controlling or limiting digital technologies, not to mention the dual use problems. While still in an early stage, this chapter develops possible approaches for AI arms control by considering the different life cycle steps of a typical AI enabled system, based on lessons learned from other arms control approaches. It will discuss the different starting points, their arms control potential as well as its limitations to provide a holistic perspective for necessary further develops and debates.},
note = {Series Title: Studies in Peace and Security},
keywords = {},
pubstate = {published},
tppubtype = {incollection}
}
Reuter, Christian; Riebe, Thea; Haunschild, Jasmin; Reinhold, Thomas; Schmid, Stefka
In: Zeitschrift für Friedens- und Konfliktforschung, Bd. 11, Nr. 2, S. 129–140, 2022, ISSN: 2192-1741, 2524-6976.
@article{Reuter2022a,
title = {Zur Schnittmenge von Informatik mit Friedens- und Sicherheitsforschung: Erfahrungen aus der interdisziplinären Lehre in der Friedensinformatik},
author = {Christian Reuter and Thea Riebe and Jasmin Haunschild and Thomas Reinhold and Stefka Schmid},
url = {https://link.springer.com/10.1007/s42597-022-00078-4},
doi = {10.1007/s42597-022-00078-4},
issn = {2192-1741, 2524-6976},
year = {2022},
date = {2022-01-01},
urldate = {2023-04-07},
journal = {Zeitschrift für Friedens- und Konfliktforschung},
volume = {11},
number = {2},
pages = {129–140},
abstract = {Interdisziplinäre Forschung und Lehre zwischen Informatik sowie Friedens- und Sicherheitsforschung ist vor dem Hintergrund der Bedeutung möglicher Konflikte im Cyberspace unabdingbar. Auch wenn sowohl in der einen als auch der anderen Disziplin zahlreiche etablierte Lehrveranstaltungen und Lehrbücher existieren, gilt dies nicht für deren Schnittmenge. Dieser Beitrag reflektiert die Einführung der in Bezug auf Thematik und Hörerschaft interdisziplinären Lehrveranstaltung „Informationstechnologie für Frieden und Sicherheit“ für Studierende der Informatik, IT-Sicherheit und Wirtschaftsinformatik der Technischen Universität Darmstadt sowie Friedens- und Konfliktforschung der TU Darmstadt in Kooperation mit der Goethe-Universität Frankfurt. Hierbei werden Herausforderungen und Lösungsansätze der interdisziplinären Lehre dargestellt und die Bedeutung dieser Lehre hervorgehoben.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Schörnig, Niklas; Reinhold, Thomas
Introduction Buchabschnitt
In: Reinhold, Thomas; Schörnig, Niklas (Hrsg.): Armament, Arms Control and Artificial Intelligence: The Janus-faced Nature of Machine Learning in the Military Realm, S. 1–9, Springer International Publishing, Cham, 2022, ISBN: 978-3-031-11042-9 978-3-031-11043-6, (Series Title: Studies in Peace and Security).
@incollection{Schornig2022a,
title = {Introduction},
author = {Niklas Schörnig and Thomas Reinhold},
editor = {Thomas Reinhold and Niklas Schörnig},
url = {https://link.springer.com/10.1007/978-3-031-11043-6_1},
doi = {10.1007/978-3-031-11043-6_1},
isbn = {978-3-031-11042-9 978-3-031-11043-6},
year = {2022},
date = {2022-01-01},
urldate = {2023-04-19},
booktitle = {Armament, Arms Control and Artificial Intelligence: The Janus-faced Nature of Machine Learning in the Military Realm},
pages = {1–9},
publisher = {Springer International Publishing},
address = {Cham},
series = {Studies in Peace and Security},
abstract = {In 1987, Allan Din published the seminal book “Arms and Artificial Intelligence,” in which he argued that the future military use of AI would be a double-edged sword. Warning about control failures and accidental war on one hand, Din also pointed out the potential of AI to enhance arms control. 35 years later, what was a niche technology in Din’s day has since become one of the most influential technologies in both the civilian and military sectors. In addition, AI has evolved from sophisticated yet deterministic expert systems to machine learning algorithms. Today, AI is about to be introduced in almost every branch of the military, with a variety of implications for arms control. This book reflects the work of the individual authors and identifies common themes and areas where AI can be used for the greater good or where its use calls for particular vigilance. It offers an essential primer for interested readers, while also encouraging experts from the arms control community to dig more deeply into the issues.},
note = {Series Title: Studies in Peace and Security},
keywords = {},
pubstate = {published},
tppubtype = {incollection}
}
2021
Reinhold, Thomas; Reuter, Christian
In: IEEE Transactions on Technology and Society, Bd. 3, Nr. 3, S. 226–239, 2021, ISSN: 2637-6415.
@article{Reinhold2021,
title = {Towards a Cyber Weapons Assessment Model – Assessment of the Technical Features of Malicious Software},
author = {Thomas Reinhold and Christian Reuter},
url = {https://ieeexplore.ieee.org/document/9631968},
doi = {10.1109/TTS.2021.3131817},
issn = {2637-6415},
year = {2021},
date = {2021-01-01},
journal = {IEEE Transactions on Technology and Society},
volume = {3},
number = {3},
pages = {226–239},
abstract = {The revelation of the Stuxnet malware in 2010 shed light on the presence of state actors that are willing and capable of developing and using highly sophisticated, specialized malicious software for their political interests. These tools -often dubbed cyber weapons -are expected to become the next major advancement in weaponry technology. Besides the threats of offensive cyber operations for civil IT systems due to the interconnected nature of the cyberspace, international regulation of cyber weapons is -among other aspects -hindered by the fact that the military development and the strategic and tactical deployment of cyber weapons differ significantly from other weapons technologies. In order to establish measures of cyber arms related control treaties, it is crucial to identify these particular characteristics. Based on this premise, the article analyzes the current perspectives on cyber weapons, identifying their weaknesses of being either based on assumptions about adversarial actors or being applicable only after the usage of a malicious tool. In contrast to these approaches, the article focuses on the specific functional aspects of malware and presents an indicator-based assessment model based on parameters that can be measured prior to the application of malicious software. This enables the categorization of malicious tools as cyber weapons. Besides this, the article aims to introduce thought-provoking impulses with regard to social responsibility in computer science.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Reinhold, Thomas
Export Controls on Cyber-Surveillance Items Artikel
In: Newsletter of the EU Non-Proiliferation and Disarmament Consortium, Nr. 33, S. 1, 2021.
@article{Reinhold2021a,
title = {Export Controls on Cyber-Surveillance Items},
author = {Thomas Reinhold},
url = {https://www.iai.it/sites/default/files/eunpd_e-newsletter_33.pdf},
year = {2021},
date = {2021-01-01},
urldate = {2023-03-31},
journal = {Newsletter of the EU Non-Proiliferation and Disarmament Consortium},
number = {33},
pages = {1},
series = {Enewsletter Nonproliferation.Eu},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Reinhold, Thomas
Zur Rolle und Verantwortung der Informatik für die Friedensforschung und Rüstungskontrolle Artikel
In: FIfF Kommunikation, Nr. 4, S. 47–49, 2021, ISSN: 0938-3476.
@article{Reinhold2021b,
title = {Zur Rolle und Verantwortung der Informatik für die Friedensforschung und Rüstungskontrolle},
author = {Thomas Reinhold},
url = {https://www.fiff.de/publikationen/fiff-kommunikation/fk-2021/fk-2021-4/fk-2021-4-content/fk-4-21-p47.pdf},
issn = {0938-3476},
year = {2021},
date = {2021-01-01},
urldate = {2023-04-07},
journal = {FIfF Kommunikation},
number = {4},
pages = {47–49},
series = {FIfF Kommunikation: Zeitschrift für Informatik und Gesellschaft},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Reinhold, Thomas
Der Weg zu einem sicheren zivilen Cyberspace Artikel
In: Hoch3 - Die Zeitung der Technischen Universität Darmstadt, Bd. 17, Nr. 10, S. 14, 2021.
@article{Reinhold2021c,
title = {Der Weg zu einem sicheren zivilen Cyberspace},
author = {Thomas Reinhold},
url = {https://www.tu-darmstadt.de/universitaet/aktuelles_meldungen/publikationen/publikationen_archiv/einzelansicht_12672.de.jsp},
year = {2021},
date = {2021-01-01},
urldate = {2023-04-18},
journal = {Hoch3 - Die Zeitung der Technischen Universität Darmstadt},
volume = {17},
number = {10},
pages = {14},
series = {Hoch3},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Reinhold, Thomas
In: Wissenschaft und Frieden - Dossier, Bd. 4, Nr. 93, 2021.
@article{Reinhold2021d,
title = {Überlegungen zur Militarisierung Künstlicher Intelligenz - Von Fallstricken, Grenzen und Problemen der Rüstungskontrolle},
author = {Thomas Reinhold},
url = {https://wissenschaft-und-frieden.de/dossier/kuenstliche-intelligenz-zieht-in-den-krieg/},
year = {2021},
date = {2021-01-01},
urldate = {2023-04-12},
journal = {Wissenschaft und Frieden - Dossier},
volume = {4},
number = {93},
series = {Wissenschaft und Frieden - Dossier},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
2020
Reinhold, Thomas
Russian Hacker Wanted! Sonstige
2020, (Issue: June).
@misc{Reinhold2020b,
title = {Russian Hacker Wanted!},
author = {Thomas Reinhold},
url = {https://directionsblog.eu/russian-hacker-wanted/},
year = {2020},
date = {2020-01-01},
urldate = {2023-04-11},
number = {June},
abstract = {The arrest warrant for the Bundestag hacker represents a new German response to cyberattacks - and has potentially major implications…},
note = {Issue: June},
keywords = {},
pubstate = {published},
tppubtype = {misc}
}
2019
Reinhold, Thomas
Rüstungskontrolle für den Cyberspace – Herausforderungen und erste Ansätze Artikel
In: FIfF-Kommunikation 3/2019 "Cyberpeace und IT-Security", Nr. 3, S. 26–29, 2019, ISSN: 0938-3476.
@article{Reinhold2019a,
title = {Rüstungskontrolle für den Cyberspace – Herausforderungen und erste Ansätze},
author = {Thomas Reinhold},
url = {https://www.fiff.de/publikationen/fiff-kommunikation/fk-jhrg-2019/FK-2019-3},
issn = {0938-3476},
year = {2019},
date = {2019-01-01},
urldate = {2023-04-11},
journal = {FIfF-Kommunikation 3/2019 "Cyberpeace und IT-Security"},
number = {3},
pages = {26–29},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Reinhold, Thomas; Reuter, Christian
Arms Control and its Applicability to Cyberspace Buchabschnitt
In: Reuter, Christian (Hrsg.): Information Technology for Peace and Security: IT Applications and Infrastructures in Conflicts, Crises, War, and Peace, S. 207–231, Springer Vieweg, Wiesbaden, 2019, ISBN: 978-3-658-25652-4.
@incollection{Reinhold2019c,
title = {Arms Control and its Applicability to Cyberspace},
author = {Thomas Reinhold and Christian Reuter},
editor = {Christian Reuter},
url = {https://doi.org/10.1007/978-3-658-25652-4_10},
doi = {10.1007/978-3-658-25652-4_10},
isbn = {978-3-658-25652-4},
year = {2019},
date = {2019-01-01},
urldate = {2023-04-12},
booktitle = {Information Technology for Peace and Security: IT Applications and Infrastructures in Conflicts, Crises, War, and Peace},
pages = {207–231},
publisher = {Springer Vieweg},
address = {Wiesbaden},
abstract = {Arms control aims at preventing conflicts and fostering stability in inter-state relations by either reducing the probability of usage of a specific weapon or regulating its use and thus, reducing the costs of armament. Several approaches to arms control exist: limiting or reducing numbers of weapons and armed forces, disarmament (“down to zero”) or prohibiting certain weapons. To illustrate these further, this chapter elaborates on the necessity of arms control and presents some historical examples, including an overview of existing measures of arms control. Extrapolating from these, the general architecture of arms control regimes and the complex issue of establishing and verifying compliance with agreements will be discussed, not least with respect to cyberspace. Building on these theoretical considerations, the chapter presents important treaties and first approaches, including the Wassenaar Arrangement, the recommendations of the OSCE, and the UN GGE 2015.},
keywords = {},
pubstate = {published},
tppubtype = {incollection}
}
Reinhold, Thomas
Myth #11: Arms control in cyberspace is not possible Buchabschnitt
In: BUSTED ! THE TRUTH COMMON INTERNET, 2019.
@incollection{Reinhold2019d,
title = {Myth #11: Arms control in cyberspace is not possible},
author = {Thomas Reinhold},
year = {2019},
date = {2019-01-01},
booktitle = {BUSTED ! THE TRUTH COMMON INTERNET},
keywords = {},
pubstate = {published},
tppubtype = {incollection}
}
Reinhold, Thomas
Counting Cyber Weapons – New Approaches to Regulate and Control Destructive Cyber Tools Proceedings Article
In: SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges, S. 41–45, TUprints, Darmstadt, Germany, 2019.
@inproceedings{Reinhold2019e,
title = {Counting Cyber Weapons – New Approaches to Regulate and Control Destructive Cyber Tools},
author = {Thomas Reinhold},
url = {https://tuprints.ulb.tu-darmstadt.de/9164/2/2019_SciencePeaceSecurity_Proceedings-TUprints.pdf},
year = {2019},
date = {2019-01-01},
urldate = {2023-04-18},
booktitle = {SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges},
pages = {41–45},
publisher = {TUprints},
address = {Darmstadt, Germany},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Reinhold, Thomas
Neue Cyberagentur : Spagat zwischen innerer und äußerer Sicherheit Artikel
In: IFSH Policy-Brief, 2019.
@article{Reinhold2019h,
title = {Neue Cyberagentur : Spagat zwischen innerer und äußerer Sicherheit},
author = {Thomas Reinhold},
year = {2019},
date = {2019-01-01},
journal = {IFSH Policy-Brief},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Reinhold, Thomas
Cyberspace as Military Domain: Monitoring Cyberweapons Buchabschnitt
In: Feldner, Denise (Hrsg.): Redesigning Organizations: Concepts for the Connected Society, S. 267–278, Springer International Publishing, Cham, 2019, ISBN: 978-3-030-27957-8.
@incollection{Reinhold2019i,
title = {Cyberspace as Military Domain: Monitoring Cyberweapons},
author = {Thomas Reinhold},
editor = {Denise Feldner},
url = {https://doi.org/10.1007/978-3-030-27957-8_20},
doi = {10.1007/978-3-030-27957-8_20},
isbn = {978-3-030-27957-8},
year = {2019},
date = {2019-01-01},
urldate = {2023-03-30},
booktitle = {Redesigning Organizations: Concepts for the Connected Society},
pages = {267–278},
publisher = {Springer International Publishing},
address = {Cham},
keywords = {},
pubstate = {published},
tppubtype = {incollection}
}
Reinhold, Thomas; Reuter, Christian
From Cyber War to Cyber Peace Buchabschnitt
In: Reuter, Christian (Hrsg.): Information Technology for Peace and Security: IT Applications and Infrastructures in Conflicts, Crises, War, and Peace, S. 139–164, Springer Vieweg, Wiesbaden, 2019, ISBN: 978-3-658-25652-4.
@incollection{Reinhold2019j,
title = {From Cyber War to Cyber Peace},
author = {Thomas Reinhold and Christian Reuter},
editor = {Christian Reuter},
url = {https://doi.org/10.1007/978-3-658-25652-4_7},
doi = {10.1007/978-3-658-25652-4_7},
isbn = {978-3-658-25652-4},
year = {2019},
date = {2019-01-01},
urldate = {2023-03-31},
booktitle = {Information Technology for Peace and Security: IT Applications and Infrastructures in Conflicts, Crises, War, and Peace},
pages = {139–164},
publisher = {Springer Vieweg},
address = {Wiesbaden},
keywords = {},
pubstate = {published},
tppubtype = {incollection}
}
Reinhold, Thomas; Reuter, Christian
Verification in Cyberspace Buchabschnitt
In: Reuter, Christian (Hrsg.): Information Technology for Peace and Security: IT Applications and Infrastructures in Conflicts, Crises, War, and Peace, S. 257–275, Springer Vieweg, Wiesbaden, 2019, ISBN: 978-3-658-25652-4.
@incollection{Reinhold2019k,
title = {Verification in Cyberspace},
author = {Thomas Reinhold and Christian Reuter},
editor = {Christian Reuter},
url = {https://doi.org/10.1007/978-3-658-25652-4_12},
doi = {10.1007/978-3-658-25652-4_12},
isbn = {978-3-658-25652-4},
year = {2019},
date = {2019-01-01},
urldate = {2023-04-12},
booktitle = {Information Technology for Peace and Security: IT Applications and Infrastructures in Conflicts, Crises, War, and Peace},
pages = {257–275},
publisher = {Springer Vieweg},
address = {Wiesbaden},
abstract = {Verification is one of the pillars of arms control and non-proliferation treaties as well as an important part of confidence building measures. It defines practical measures that enable treaty members to check the treaty compliance by observing, counting or monitoring specific actions and their accordance with the respective rules. In contrast to historical examples of former military technologies, cyberspace features some unique characteristics making it hard to apply established measures. The chapter describes these peculiarities and assesses distinguishing problems compared to selected verification measures for nuclear, biological and chemicals weapons technology. Yet, cyberspace is a human-made domain and adjusting its technical setting, rules and principles may help to reduce the threat of ongoing militarisation. Offering some alternatives, the chapter elaborates on suitable and measurable parameters for this domain and presents potentially useful verification approaches.},
keywords = {},
pubstate = {published},
tppubtype = {incollection}
}
Reuter, Christian; Riebe, Thea; Aldehoff, Larissa; Kaufhold, Marc-André; Reinhold, Thomas
Cyberwar zwischen Fiktion und Realität – technologische Möglichkeiten Buchabschnitt
In: Werkner, Ines-Jacqueline; Schörnig, Niklas (Hrsg.): Cyberwar – die Digitalisierung der Kriegsführung: Fragen zur Gewalt. Band 6, S. 15–38, Springer VS, Wiesbaden, 2019, ISBN: 978-3-658-27713-0.
@incollection{Reuter2019e,
title = {Cyberwar zwischen Fiktion und Realität – technologische Möglichkeiten},
author = {Christian Reuter and Thea Riebe and Larissa Aldehoff and Marc-André Kaufhold and Thomas Reinhold},
editor = {Ines-Jacqueline Werkner and Niklas Schörnig},
url = {https://doi.org/10.1007/978-3-658-27713-0_2},
doi = {10.1007/978-3-658-27713-0_2},
isbn = {978-3-658-27713-0},
year = {2019},
date = {2019-01-01},
urldate = {2023-03-30},
booktitle = {Cyberwar – die Digitalisierung der Kriegsführung: Fragen zur Gewalt. Band 6},
pages = {15–38},
publisher = {Springer VS},
address = {Wiesbaden},
series = {Gerechter Frieden},
abstract = {Im Dezember 2017 wurde eine Invasion des deutschen Regierungsnetzwerks entdeckt; dieses vernetzt Bundesministerien und Behörden (vgl. Reinhold 2018a). Die Angreifer nutzten das Intranet der Hochschule des Bundes für öffentliche Verwaltung und der Bundesakademie für öffentliche Verwaltung als Einfallstor. Dieses ist der am wenigsten gesicherte Teil des Systems, da externe Teilnehmerinnen und Teilnehmer auch außerhalb der Einrichtung darauf zugreifen müssen, beispielsweise für Fortbildungen des Auswärtigen Amtes.},
keywords = {},
pubstate = {published},
tppubtype = {incollection}
}
Riebe, Thea; Kaufhold, Marc-André; Kumar, Tarun; Reuter, Christian; Reinhold, Thomas
Threat Intelligence Application for Cyber Attribution Proceedings Article
In: SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges, S. 56–59, TUprints, Darmstadt, Germany, 2019.
@inproceedings{Riebe2019,
title = {Threat Intelligence Application for Cyber Attribution},
author = {Thea Riebe and Marc-André Kaufhold and Tarun Kumar and Christian Reuter and Thomas Reinhold},
url = {https://tubiblio.ulb.tu-darmstadt.de/116000/},
year = {2019},
date = {2019-01-01},
urldate = {2023-04-12},
booktitle = {SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges},
pages = {56–59},
publisher = {TUprints},
address = {Darmstadt, Germany},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
2018
Reinhold, T.
Maßnahmen für den Cyberpeace Sonstige
2018.
@misc{Reinhold2018,
title = {Maßnahmen für den Cyberpeace},
author = {T. Reinhold},
url = {https://cyber-peace.org/cyberpeace-cyberwar/masnahmen-fur-den-cyberpeace/},
year = {2018},
date = {2018-01-01},
urldate = {2023-04-07},
keywords = {},
pubstate = {published},
tppubtype = {misc}
}
Reinhold, Thomas
Der Cyberspace ein neuer Kriegsschauplatz? Herausforderungen für Völkerrecht und Sicherheitspolitik Artikel
In: Der Auftrag, Verbandszeitschrift der Gemeinschaft Katholischer Soldaten (GKS), Bd. 302, Nr. 2, S. 30–35, 2018, ISSN: 866-0843.
@article{Reinhold2019f,
title = {Der Cyberspace ein neuer Kriegsschauplatz? Herausforderungen für Völkerrecht und Sicherheitspolitik},
author = {Thomas Reinhold},
url = {file:///home/thomas/FILES/Desktop/Dropzone/Downloads/Auftrag_302_PDF_W.pdf},
issn = {866-0843},
year = {2018},
date = {2018-01-01},
urldate = {2023-04-19},
journal = {Der Auftrag, Verbandszeitschrift der Gemeinschaft Katholischer Soldaten (GKS)},
volume = {302},
number = {2},
pages = {30–35},
series = {Der Auftrag, Verbandszeitschrift der Gemeinschaft Katholischer Soldaten},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Schulze, M.; Reinhold, T.
Wannacry About the Tragedy of the Commons? Game-Theory and the Failure of Global Vulnerability Disclosure Proceedings Article
In: European Conference on Information Warfare and Security, ECCWS, S. 454–463, ECCWS, Oslo, Norway, 2018, ISBN: 978-1-911218-85-2, (ISSN: 20488610).
@inproceedings{Schulze2018a,
title = {Wannacry About the Tragedy of the Commons? Game-Theory and the Failure of Global Vulnerability Disclosure},
author = {M. Schulze and T. Reinhold},
url = {https://www.proquest.com/openview/f6ccddd62973bd8997c3fcd40951f4f1/1},
isbn = {978-1-911218-85-2},
year = {2018},
date = {2018-01-01},
urldate = {2023-04-12},
booktitle = {European Conference on Information Warfare and Security, ECCWS},
volume = {2018-June},
pages = {454–463},
publisher = {ECCWS},
address = {Oslo, Norway},
abstract = {© 2018 Curran Associates Inc. All rights reserved. Vulnerabilities in Soft- and Hardware have global implications in an interconnected world since they affect every user who uses a system containing such a vulnerability. Since cyber-attacks relying on software vulnerabilities produce significant costs for national economies world wide and affect societies in its entirety due to the strong dependencies from IT systems, finding and closing these vulnerabilities is in the rational interest of many countries. Coordinating vulnerability disclosure and timely patching on global scale thus would be a common interest shared by all states targeted by cyber-attacks. However, states in particular also maintain more narrow interests, like withholding software vulnerabilities for the purpose of foreign espionage, for surveillance and law enforcement purposes or military cyber weapons. Thus, common and particular national security interests collide, resulting in what game theory calls a tragedy of the commons: Global cyberspace becomes more insecure as more and more states withhold critical software vulnerabilities for reasons of national security. In game theoretic terms, rational-actions on a local level produce irrational effects on a global scale, representing a prisoners dilemma. The paper uses game theory to develop a set of international best practices to escape the prisoners dilemma of software vulnerabilities. In international relations, global regimes and norms are generally seen as a way out of prisoners dilemmas. The questions thus becomes, what the smallest common denominator of such a global vulnerability disclosure regime could be and under what conditions can such an agreement could reached. The case for developing these proposition is the EternalBlue incident of 2017, a software vulnerability that was hold back by an intelligence service and whose unintended disclosure resulted in several destructive malware campaigns with economic damage on a global scale.},
note = {ISSN: 20488610},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
2017
Reinhold, Thomas; Schulze, Matthias
Digitale Gegenangriffe Eine Analyse der technischen und politischen Implikationen von „hack backs“ Artikel
In: SWP Arbeitspapier, Bd. 01.08.2017, Nr. 1, S. 1–18, 2017.
@article{Reinhold2017,
title = {Digitale Gegenangriffe Eine Analyse der technischen und politischen Implikationen von „hack backs“},
author = {Thomas Reinhold and Matthias Schulze},
url = {https://www.swp-berlin.org/publications/products/arbeitspapiere/AP_Schulze_Hackback_08_2017.pdf},
year = {2017},
date = {2017-01-01},
urldate = {2023-03-30},
journal = {SWP Arbeitspapier},
volume = {01.08.2017},
number = {1},
pages = {1–18},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
2016
Reinhold, Thomas
In: Internationale Politik und Gesellschaft der Friedrich-Eberst-Stiftung, 2016.
@article{Reinhold2016a,
title = {Vom Hindukusch zum Cyberspace – Wie die Bundeswehr unsere Sicherheit im virtuellen Raum verteidigen will},
author = {Thomas Reinhold},
url = {http://www.ipg-journal.de/schwerpunkt-des-monats/cyber-sicherheit/artikel/detail/vom-hindukusch-zum-cyberspace-1564/},
year = {2016},
date = {2016-01-01},
journal = {Internationale Politik und Gesellschaft der Friedrich-Eberst-Stiftung},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Reinhold, Thomas
Der Cyberspace – Vorfälle, militärische Aufrüstung und erste Friedensbestrebungen Artikel
In: Welttrends – das außenpolitische Journal, Bd. 113, Nr. 3, S. 22–27, 2016, ISSN: 0944-8101.
@article{Reinhold2016c,
title = {Der Cyberspace – Vorfälle, militärische Aufrüstung und erste Friedensbestrebungen},
author = {Thomas Reinhold},
issn = {0944-8101},
year = {2016},
date = {2016-01-01},
journal = {Welttrends – das außenpolitische Journal},
volume = {113},
number = {3},
pages = {22–27},
series = {Welttrends - das außenpolitische Journal},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Reinhold, Thomas
In: Aus Politik und Zeitgeschichte (APUZ), Bundeszentrale für politische Bildung, Bd. 35–36, 2016.
@article{Reinhold2016e,
title = {Cyberspace als Kriegsschauplatz? Herausforderungen für Völkerrecht und Sicherheitspolitik“ (APUZ 35–36/2016)},
author = {Thomas Reinhold},
url = {http://www.bpb.de/apuz/232966/cyberspace-als-kriegsschauplatz},
year = {2016},
date = {2016-01-01},
urldate = {2023-04-19},
journal = {Aus Politik und Zeitgeschichte (APUZ), Bundeszentrale für politische Bildung},
volume = {35–36},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Reinhold, Thomas
Zur Verantwortung der Informatik in einer technologisierten Gesellschaft Artikel
In: Sicherheit und Frieden, Bd. 34, Nr. 4, S. 253–256, 2016, ISSN: 0175-274x.
@article{Reinhold2017a,
title = {Zur Verantwortung der Informatik in einer technologisierten Gesellschaft},
author = {Thomas Reinhold},
url = {https://doi.org/10.5771/0175-274X-2016-4-253},
doi = {10.5771/0175-274X-2016-4-253},
issn = {0175-274x},
year = {2016},
date = {2016-01-01},
urldate = {2023-04-07},
journal = {Sicherheit und Frieden},
volume = {34},
number = {4},
pages = {253–256},
series = {S+F Sicherheit und Frieden},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
2015
Reinhold, Thomas; Neuneck, Götz
Die Militarisierung des Cyberspace – Die Informatik ist gefordert! Artikel
In: Wissenschaft & Frieden, 2015.
@article{Reinhold2015,
title = {Die Militarisierung des Cyberspace – Die Informatik ist gefordert!},
author = {Thomas Reinhold and Götz Neuneck},
url = {http://www.wissenschaft-und-frieden.de/seite.php?dossierID=083#b},
year = {2015},
date = {2015-01-01},
journal = {Wissenschaft & Frieden},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Reinhold, Thomas
Militarisierung des Cyberspace – Friedens- und Sicherheitspolitische Fragen Artikel
In: Wissenschaft und Frieden, Nr. 2, S. 31–34, 2015.
@article{Reinhold2015b,
title = {Militarisierung des Cyberspace – Friedens- und Sicherheitspolitische Fragen},
author = {Thomas Reinhold},
url = {https://wissenschaft-und-frieden.de/artikel/militarisierung-des-cyberspace/},
year = {2015},
date = {2015-01-01},
urldate = {2023-04-02},
journal = {Wissenschaft und Frieden},
number = {2},
pages = {31–34},
series = {Wissenschaft und Frieden},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Reinhold, Thomas
In: FIfF Kommunikation, Nr. 1, S. 6–7, 2015.
@article{Reinhold2015c,
title = {Betrifft: Cyberpeace – Auswirkungen der Exportbeschränkungen von Cyberwaffen durch das Wassenaar-Abkommen},
author = {Thomas Reinhold},
url = {https://www.fiff.de/publikationen/fiff-kommunikation/fk-2015/fk-2015-1/fk-2015-1-content/fk-1-15-s6.pdf},
year = {2015},
date = {2015-01-01},
urldate = {2023-04-18},
journal = {FIfF Kommunikation},
number = {1},
pages = {6–7},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Reinhold, Thomas
Möglichkeiten und Grenzen zur Bestimmung von Cyberwaffen Proceedings Article
In: Cunningham, Douglas; Hofstedt, Petra; Meer, Klaus; Schmitt, Ingo (Hrsg.): INFORMATIK 2015, S. 587–596, Gesellschaft für Informatik e.V., Bonn, 2015, ISBN: 978-3-88579-640-4.
@inproceedings{Reinhold2015d,
title = {Möglichkeiten und Grenzen zur Bestimmung von Cyberwaffen},
author = {Thomas Reinhold},
editor = {Douglas Cunningham and Petra Hofstedt and Klaus Meer and Ingo Schmitt},
url = {http://dl.gi.de/handle/20.500.12116/2219},
isbn = {978-3-88579-640-4},
year = {2015},
date = {2015-01-01},
urldate = {2023-04-19},
booktitle = {INFORMATIK 2015},
volume = {246},
pages = {587–596},
publisher = {Gesellschaft für Informatik e.V.},
address = {Bonn},
abstract = {Seit der Entdeckung der Schadsoftware Stuxnet ist der Cyberspace in den Fokus der internationalen Sicherheitspolitik gerückt. Während Staaten zunehmend die neue Domäne in ihre Sicherheitsund Militärdoktrinen aufnehmen, verdeutlichen Vorkommnisse wie der Sony-Hack oder die Beschädigung eines deutschen Stahlwerks die komplexen Abhängigkeiten von IT- Systemen und deren Verwundbarkeiten. Internationale Bemühungen um die Etablierung verbindlicher Regelungen für das staatliche und militärische Agieren im Cyberspace werden durch ein fehlendes gemeinschaftlich akzeptiertes Verständnis des Themas oder der Definition von Begrifflichkeiten erschwert. Insbesondere das Konzept der “Cyberwaffe” und eine tragfähige und im Kontext international verpflichtender Konventionen belastbare Eingrenzung dieses Begriffs ist dabei für Abrüstungsund Rüstungskontrollabkommen von zentraler Bedeutung. Eine Gegenüberstellung unterschiedlicher, sowohl generalisierender als auch situationsbezogener Definitionsansätze von Cyberwaffen verdeutlicht dabei die verschiedenen zu integrierenden Betrachtungsebenen. Die im Gegensatz zu konventionellen Waffentechnologien spezifischen Eigenschaften von Software zeigen aber auch die Schwierigkeiten und Grenzen derartiger Ansätze auf.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Reinhold, Thomas
Von den Realitäten im Cyberwar, oder: Die Bedeutung des Sony-Hacks für zukünftige Cyber-Konflikte Sonstige
2015.
@misc{Reinhold2015e,
title = {Von den Realitäten im Cyberwar, oder: Die Bedeutung des Sony-Hacks für zukünftige Cyber-Konflikte},
author = {Thomas Reinhold},
url = {http://www.sicherheitspolitik-blog.de/2015/01/27/von-den-realitaeten-im-cyberwar-oder-die-bedeutung-des-sony-hack-fuer-zukuenftige-cyber-konflikte/},
year = {2015},
date = {2015-01-01},
keywords = {},
pubstate = {published},
tppubtype = {misc}
}
Reinhold, T.
Possibilities and limits for the determination of cyber weapons Proceedings Article
In: Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI), S. 587–596, Gesellschaft für Informatik e.V., Bonn, 2015, ISBN: 978-3-88579-640-4, (ISSN: 16175468).
@inproceedings{Reinhold2015f,
title = {Possibilities and limits for the determination of cyber weapons},
author = {T. Reinhold},
url = {https://dl.gi.de/handle/20.500.12116/2219},
isbn = {978-3-88579-640-4},
year = {2015},
date = {2015-01-01},
urldate = {2023-04-19},
booktitle = {Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI)},
volume = {246},
pages = {587–596},
publisher = {Gesellschaft für Informatik e.V.},
address = {Bonn},
note = {ISSN: 16175468},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Reinhold, Thomas
In: Issue brief 2: Briefing and memos from the research advisory group of the Global Commission on the Stability of Cyberspace (GCSC), Nr. 2, S. 134–149, 2015.
@article{Reinhold2018b,
title = {Rethinking the Attribution Problem – A Plausible Proof of Non-Involvement as an Alternative to Credible Attribution},
author = {Thomas Reinhold},
url = {https://papers.ssrn.com/abstract=2692422},
year = {2015},
date = {2015-01-01},
urldate = {2023-04-11},
journal = {Issue brief 2: Briefing and memos from the research advisory group of the Global Commission on the Stability of Cyberspace (GCSC)},
number = {2},
pages = {134–149},
abstract = {The debate surrounding “unwilling or unable” states and terrorist attacks stemming from their territory reached a zenith during the US led strikes against IS posts in Syria. The questions raised mainly concern the concept of “armed attack” within the meaning of Art. 51 UNC. Concentrating on the notion of “attribution” of non-state actor conduct to states this article evidences that all approaches put forward in favor of grounding attribution on “unwillingness” or “inability” of states to suppress terrorist activities have not reached the level of lex lata. The systematics of the Charter allocate the responsibility to deal with “unwilling or unable” states to the Security Council. Even if the Security Council is paralyzed and fails to act, “armed enforcement actions” by states against non-state actors are as of current law not legal. This result makes sense also from a policy perspective.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
2014
Reinhold, T.
Die neuen digitalen Waffenhändler? Sonstige
2014.
@misc{Reinhold2014a,
title = {Die neuen digitalen Waffenhändler?},
author = {T. Reinhold},
url = {https://cyber-peace.org/2014/04/22/die-neuen-digitalen-waffenhaendler/},
year = {2014},
date = {2014-01-01},
urldate = {2023-04-05},
keywords = {},
pubstate = {published},
tppubtype = {misc}
}
Reinhold, Thomas
Internationale Kooperationsrichtlinien – ein Ausweg aus dem Attributionsdilemma Artikel
In: Sicherheit und Frieden (S+F) / Security and Peace, Bd. 32, Nr. 1, S. 23–27, 2014, ISSN: 0175-274X, (Publisher: Nomos Verlagsgesellschaft mbH).
@article{Reinhold2014b,
title = {Internationale Kooperationsrichtlinien – ein Ausweg aus dem Attributionsdilemma},
author = {Thomas Reinhold},
url = {https://www.jstor.org/stable/24233888},
issn = {0175-274X},
year = {2014},
date = {2014-01-01},
urldate = {2023-03-31},
journal = {Sicherheit und Frieden (S+F) / Security and Peace},
volume = {32},
number = {1},
pages = {23–27},
publisher = {Nomos Verlagsgesellschaft mbH},
series = {Sicherheit und Frieden (S+F) / Security and Peace},
note = {Publisher: Nomos Verlagsgesellschaft mbH},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Reinhold, Thomas
Friedens- und Sicherheitspolitische Fragen zur Militarisierung des Cyberspace Artikel
In: FIfF Kommunikation, Nr. 4, S. 70–73, 2014, ISSN: 0938-3476.
@article{Reinhold2015a,
title = {Friedens- und Sicherheitspolitische Fragen zur Militarisierung des Cyberspace},
author = {Thomas Reinhold},
url = {https://www.act.nato.int/images/stories/media/doclibrary/legal_gazette_35.pdf},
issn = {0938-3476},
year = {2014},
date = {2014-01-01},
urldate = {2023-04-07},
journal = {FIfF Kommunikation},
number = {4},
pages = {70–73},
series = {FIfF Kommunikation: Forum für InformatikerInnen für Frieden und gesellschaftliche Verantwortung e.V.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Reinhold, Thomas
In: Blätter für deutsche und internationale Politik, S. 17–20, 2014.
@article{Reinhold2016d,
title = {Die Bundeswehr zieht ins Cyberfeld – Ein Kommentar zum Aufbau des neuen Bundeswehr-Organisationsbereiches Cyber- und Informationsraum},
author = {Thomas Reinhold},
url = {https://cyber-peace.org/2014/04/22/die-neuen-digitalen-waffenhaendler/},
year = {2014},
date = {2014-01-01},
urldate = {2023-04-18},
journal = {Blätter für deutsche und internationale Politik},
pages = {17–20},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
2013
Reinhold, Thomas
Malware als Waffe Artikel
In: ADLAS Magazin für Außen- und Sicherheitspolitik, Bd. 13, Nr. 1, S. 7–11, 2013, ISSN: 1869-1684.
@article{Reinhold2013,
title = {Malware als Waffe},
author = {Thomas Reinhold},
url = {https://adlasmagazin.files.wordpress.com/2013/02/adlas-0113.pdf},
issn = {1869-1684},
year = {2013},
date = {2013-01-01},
urldate = {2023-03-31},
journal = {ADLAS Magazin für Außen- und Sicherheitspolitik},
volume = {13},
number = {1},
pages = {7–11},
series = {ADLAS Magazin für Außen- und Sicherheitspolitik},
keywords = {},
pubstate = {published},
tppubtype = {article}
}