Skip to Main Content
Library
LibGuides
Counterintelligence
Cyber Counterintelligence (CCI)
Search this Guide
Search
Counterintelligence: Cyber Counterintelligence (CCI)
Counterintelligence can be described as activities designed to prevent or thwart spying, intelligence gathering, and sabotage by an enemy or other foreign entity. This guide provides books, articles, reports, websites, and videos on the subject.
Home
Functions of CI
Toggle Dropdown
Defensive (Denial)
Offensive (Deception)
By Country
Toggle Dropdown
Australia
Britain
Canada
China
Cuba
Germany
Iran
Israel
Japan
North Korea
Russia
Vatican
By Service/Agency
Toggle Dropdown
U.S. Air Force
U.S. Army
U.S. Coast Guard
U.S. Marine Corps
U.S. Navy
Defense Intelligence Agency
Central Intelligence Agency
Federal Bureau of Investigation
Office of Strategic Services
Department of State
Department of Energy
National Counterintelligence and Security Center
National Nuclear Security Administration
National Reconnaissance Office
National Security Agency
By Era
Toggle Dropdown
American Revolution
World War I
Spies of the 1930's
Spanish Civil War
World War II
Atomic Age
Cold War
Post-Cold War
James Jesus Angleton Era
Communism
Vietnam War
War on Terror
Covid Pandemic
Psychology of Spies/Espionage
Case Studies
Toggle Dropdown
Aldrich H. Ames
James Jesus Angleton, CIA CIC
Leandro Aragoncillo
Benedict Arnold
Mostafa Awwad
Elizabeth Bentley
Benjamin Pierce Bishop
Christopher John Boyce & Andrew Daulton Lee
Mariia Butina
Jeff Carney, USAF
Ramon de Carranza
Larry Wu-Tai Chin
Kun Shan Chun
Dongfan "Greg" Chung
Dr. Benjamin Church
Velvalee Dickinson
Nelson C. Drummond
John Semer Farnsworth
Noshir Gowadia
Paul Raphael Hall (Hassan Abujihaad)
Ron Rockwell Hansen
Robert P. Hanssen
Hiss/Chambers, DOS
James F. Hitselberger
Robert Patrick Hoffman
Egor Igorevich Kriuchkov
Bernard Julius Otto Kuehn
Craig Dee Kunkle
Jerry Chun Shing Lee
Kurt Lessenthien
Clayton John Lonetree
Lee Eugene Madsen
Chi Mak
Kevin Mallory
Sen. Joe McCarthy & McCarthyism
IS3 Bryan Minkyu Martin, USNR
Ana B. Montes, DIA
Harold James Nicholson
Stuart Nozette
Operation Lemon Aid
Operation Touchdown
Operation Underworld
J. Robert Oppenheimer
Ronald Pelton, NSA
Jonathan J. Pollard, NIS
Stephen Joseph Ratkai
Julius and Ethel Rosenberg
Hafis Salich
YN Harry Thompson
Jonathan & Diane Toebbe
George Trofimoff, Army
The Vatican/Catholic Church
John Walker
Ariel Weinmann
James Wilmoth
Monica Witt
Double Agent Case Studies
Toggle Dropdown
The Case of Col. Izmaylov
CPO Thomas Hayden, USN
John Huminik, FBI
Naveed Jamali
James Armistead Lafayette
Operation Lemon Aid
Operation Shocker
Operation Showdown
Operation Zebra Station
Nicholas Shadrin
Corporate Espionage
Academic Espionage
Cyber Counterintelligence (CCI)
CI Artificial Intelligence
Domestic CI
CI Strategy & Policy
CI Analysis
CI Legal Issues
CI Related Journals
Books
Bytes, Bombs, and Spies
by
Herbert Lin (Editor); Amy Zegart (Editor)
ISBN: 9780815735472
Publication Date: 2019-01-15
REQUEST THROUGH ILL
China and Cybersecurity
by
Jon R. Lindsay (Editor); Tai Ming Cheung (Editor); Derek S. Reveron (Editor)
Call Number: HV6773.15.C97 C45 2015
ISBN: 9780190201265
Publication Date: 2015-04-01
Counterintelligence in a Cyber World
by
Paul A. Watters
ISBN: 3031352866
Publication Date: 2023-06-27
The Cuckoo's Egg
by
Clifford Stoll
Call Number: UB271.R92 H477 1989
ISBN: 0385249462
Publication Date: 1989-09-26
Cyberspies
by
Gordon Corera
ISBN: 9781681771540
Publication Date: 2016-07-05
REQUEST THROUGH ILL
The End of Intelligence: Espionage and State Power in the Information Age
by
David Tucker
Call Number: JF1525.I6 T83 2014
ISBN: 9780804792653
Publication Date: 2014-08-20
Gray Day
by
Eric O'Neill
ISBN: 9780525573524
Publication Date: 2019-03-26
REQUEST THROUGH ILL
Great Power Cyber Competition
by
David V. Gioe (Editor); Margaret W. Smith (Editor)
ISBN: 9781032545264
Publication Date: 2024-02-20
REQUEST THROUGH ILL
National Security and Counterintelligence in the Era of Cyber Espionage
by
Eugenie de Silva (Editor)
Call Number: Online
ISBN: 9781466696617
Publication Date: 2015-11-12
Reverse Deception
by
Sean Bodmer; Max Kilger; Gregory Carpenter; Jade Jones; Jeff Jones
ISBN: 9780071772495
Publication Date: 2012-07-24
REQUEST THROUGH ILL
Spies, Lies, and Algorithms
by
Amy B. Zegart
Call Number: Online
ISBN: 9780691147130
Publication Date: 2022-02-01
Tribe of Hackers Red Team
by
Marcus J. Carey; Jennifer Jin
ISBN: 9781119643326
Publication Date: 2019-08-13
REQUEST THROUGH ILL
Podcast-- The Fight Over 5G and Chinese Spies
The Fight Over 5G and Chinese Spies
CNBC National Security Reporter Amanda Macias discusses the world of 5G networks and spies.
Articles/Reports
Building the Ideal Cyber Counterintelligence Dream Team
Jaquire, Victor ; Duvenage, Petrus ; von Solms, Sebastian. European Conference on Cyber Warfare and Security, Jun 2018.
China's Use of Cyber Warfare: Espionage Meets Strategic Deterrence
Hjortdal, Magnus. Journal of Strategic Security. Vol. 4, no. 2, 2011.
China-Based Hacking Group Goes After US Military Secrets, Political Targets: Reports
Wall Street Journal. 06 Mar 2019.
Chinese Hackers Attack U.S. Navy, Report Says
Lubold, Gordon; Volz, Dustin. Wall Street Journal. 13 Mar 2019.
Chinese Hackers Target Universities in Pursuit of Maritime Military Secrets
Volz, Dustin. Wall Street Journal. 05 Mar 2019.
The Code Not Taken: China, the United States, and the Future of Cyber Espionage
Segal, Adam. Bulletin of the Atomic Scientists. Vol 69, iss. 5, 2013.
The Complexity of Cyber Counterintelligence Training
Black, Joshua M. Dissertation, Utica College. 2014.
Conceptualising Cyber Counterintelligence: Two Tentative Building Blocks
Duvenage, Petrus; Von Solms, Sebastian. European Conference on Cyber Warfare and Security. Jul 2016.
Countering Cyber-Espionage and Sabotage
Matsubara, Mihoko. The RUSI Journal. Vol. 159, iss. 1, 2014.
Cyber Actions by State Actors: Motivation and Utility
Brantly, Aaron F. International Journal of Intelligence and Counterintelligence. Vol. 27, iss. 3, 2014.
Cyber Counterintelligence, Defending the United State's Information Technology and Communications Critical Infrastructure from Chinese Threats
Boawn, Daniel L. Distertation, Utica College. 2014.
Cyber Counterintelligence: Back to the Future
Duvenage, PC; von Solms, SH. Journal of Information Warfare. Vol 13, no. 4, 2014.
A Cyber Counterintelligence Matrix for Outsmarting Your Adversaries
Duvenage, Petrus; Jaquire, Victor; von Solms, Sebastian. European Conference on Cyber Warfare and Security. Jul 2019.
A Cyber Counterintelligence Matrix for Outsmarting Your Adversaries
Duvenage, Petrus; Jaquire, Victor; von Solms, Sebastian. European Conference on Cyber Warfare and Security. Jul 2019.
The Cyber Counterintelligence Process: A Conceptual Overview and Theoretical Proposition
Duvenage, Petrus; Von Solms, Sebastian; Corregedor, Manuel. European Conference on Cyber Warfare and Security. Jul 2015.
Cyber Espionage and the S.P.I.E.S. Taxonomy
Fitzpatrick, William M.; Dilullo, Samual A. Competition Forum. Vol. 13, iss. 2, 2015.
Digital Mirrors Casting Cyber Shadows-- The Confluence of Cyber Technology, Psychology, and Counterintelligence
Putnam, Richard Thomas. Dissertation, Utica College. 2015.
Eating the Elephant: A Structural Outline of Cyber Counterintelligence Awareness and Training
Sithole, Thenijwe; et al. International Conference on Cyber Warfare and Security. 2019.
How Chinese Spies Got the N.S.A.’s Hacking Tools, and Used Them for Attacks
Perlroth, Nicole; Sanger, David; Shane, Scott. New York Times. 06 May 2019.
Identifying Cyber Espionage: Towards a Synthesis Approach
Merritt, David; Mullins, Barry. International Conference on Information Warfare and Security. Mar 2011.
Iranian Hackers Have Hit Hundreds of Companies in Past Two Years
MacMillan, Robert. Wall Street Journal. 06 Mar 2019.
The New Counterintelligence Response to the Cyberthreat
Allen, Bobby. Military Intelligence Professional Bulletin. Vol. 29, iss. 4, 2003.
Putting Counterintelligence in Cyber Counterintelligence: Back to the Future
Duvenage, Petrus; Von Solms, Sebastian. European Conference on Cyber Warfare and Security. Jul 2014.
Online Resources
APT39: An Iranian Cyber Espionage Group Focused on Personal Information
Hawley, Sarah; et al. Fire Eye. 29 Jan 2019.
APT40: Examining a China-Nexus Espionage Actor
Plan, Fred; et al. Fire Eye. 04 Mar 2019.
China's Hackers are Stealing Secrets from U.S. Firms Again, Experts Say
Dilanian, Ken. NBC News. 09 Oct 2018.
China, Russia Biggest Cyber Offenders
Radu, Sinitia. U.S. News and World Report. 01 Feb 2019.
China Admits for the First Time that US Officials 'Have a Point' on IP Theft and Hacking
Feiner, Lauren. CNBC. 03 Apr 2019.
China is Installing Spyware on Tourists' Phones
Fox News. 03 Jul 2019.
Countering Chinese Cyber Operations: Opportunities and Challenges for U.S. Interests
Stokes, Mark A.; Hsiao, L.C. Russell. Project 2049 Institute. 29 Oct 2012.
Cyber Espionage
Freet, David; Agrawal, Rajeev. Jan 2017.
Cyber Espionage and the Vacuum of International Law
Costello, Dermot. Medium. 05 Dec 2017.
Cyber Hunt Team Operations and Counterintelligence
SpearTip. 10 Jun 2015.
Four Members of Chinese Army Charged with Stealing 145 Million Americans' Data in 2017 Equifax Hack
Johnson, Kevin. 10 Feb 2020.
Hackers Steal Data from Telcos in Espionage Campaign: Cyber Firm
Rabinovitch, Ari. Reuters. 25 Jun 2019.
Hacks, Leaks, and Disruptions: Russian Cyber Strategies
Popescu, Nicu; Secrieru, Stanislav. Chaillot Paper, no. 148. Oct 2018.
Honda's Global Operations Hit by Cyber-Attack
Tidy, Joe. BBC News. 09 Jun 2020.
How an Augmented Reality Game Escalated into Real-World Spy Warfare
Ballou, Elizabeth. Vice. 08 May 2019.
The Hunter Becomes the Hunted: How Cyber Counterintelligence Works
Panda Security. Oct 2018.
The Hunter Becomes the Hunted: How Cyber Counterintelligence Works
Panda Security. Sep 2018.
Increasing Effectiveness of U.S. Counterintelligence: Domestic and International Micro-Restructuring Initiatives to Mitigate Cyberespionage
Ferguson, Cody J. Thesis. Naval Postgraduate School. Jun 2012.
Iranian-Backed Hackers Stole Data from Major U.S. Government Contractor
De Luce, Dan; Kube, Courtney. NBC News. 08 Mar 2019.
A New Age of Espionage
The Economist. 30 Jul 2015.
Russian Cyberspies are Using One Hell of a Clever Microsoft Exchange Backdoor
Cimpanu, Catalin. ZDNet. 07 May 2019.
Russian Government Hackers are Behind a Broad Espionage Campaign that has Compromised U.S. Agencies
Nakashima, Ellen; Timberg, Craig. Washington Post. 14 Dec 2020.
Russian Security Agents Have Been Using a Secret Network of Corrupted Computers to Spy on NATO for Decades, But the US Just Busted it Open, Feds Say
Epstein, Jake. Business Insider. 09 May 2023.
Significant Cyber Incidents Since 2006
CSIS Website.
Towards Offensive Cyber Counterintelligence
Sigholm, Johan; Bang, Martin. 2013 European Intelligence and Security Informatics Conference.
<<
Previous:
Academic Espionage
Next:
CI Artificial Intelligence >>