LEADER 03996nam 2200757Ia 450 001 9910963701403321 005 20240417004802.0 010 $a9786612437236 010 $a9781282437234 010 $a1282437232 010 $a9780309138512 010 $a0309138515 035 $a(CKB)2670000000015885 035 $a(OCoLC)649901504 035 $a(CaPaEBR)ebrary10355550 035 $a(SSID)ssj0000343558 035 $a(PQKBManifestationID)11280707 035 $a(PQKBTitleCode)TC0000343558 035 $a(PQKBWorkID)10306934 035 $a(PQKB)11016066 035 $a(MiAaPQ)EBC3378552 035 $a(Au-PeEL)EBL3378552 035 $a(CaPaEBR)ebr10355550 035 $a(CaONFJC)MIL243723 035 $a(OCoLC)923280651 035 $a(Perlego)4738772 035 $a(EXLCZ)992670000000015885 100 $a20090610d2009 uy 0 101 0 $aeng 135 $aurcn||||||||| 181 $ctxt 182 $cc 183 $acr 200 00$aTechnology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities /$fWilliam A. Owens, Kenneth W. Dam, and Herbert S. Lin, editors ; Committee on Offensive Information Warfare, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, National Research Council of the National Academies 205 $a1st ed. 210 $aWashington, DC $cNational Academies Press$dc2009 215 $a1 online resource (390 p.) 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a9780309138505 311 08$a0309138507 320 $aIncludes bibliographical references. 327 $aFrontMatter -- Preface -- Acknowledgment of Reviewers -- Contents -- Synopsis -- 1 Overview, Findings, and Recommendations -- Part I: Framing and Basic Technology -- 2 Technical and Operational Considerations in Cyberattack and Cyberexploitation -- Part II: Mission and Institutional Perspectives -- 3 A Military Perspective on Cyberattack -- 4 An Intelligence Community Perspective on Cyberattack and Cyberexploitation -- 5 Perspectives on Cyberattack Outside National Security -- 6 Decision Making and Oversight -- Part III: Intellectual Tools for Understanding and Thinking About Cyberattack -- 7 Legal and Ethical Perspectives on Cyberattack -- 8 Insights from Related Areas -- 9 Speculations on the Dynamics of Cyberconflict -- 10 Alternative Futures -- Appendixes -- Appendix A: Biographies of Committee Members and Staff -- Appendix B: Meeting Participants and Other Contributors -- Appendix C: Illustrative Criminal Cyberattacks -- Appendix D: Views on the Use of Force in Cyberspace -- Appendix E: Technical Vulnerabilities Targeted by Cyber Offensive Actions. 606 $aComputer networks$xSecurity measures$xGovernment policy$zUnited States 606 $aComputer networks$xSecurity measures$zUnited States 606 $aCyberspace$xSecurity measures$zUnited States 606 $aCyberterrorism$zUnited States$xPrevention 606 $aInformation warfare$zUnited States 615 0$aComputer networks$xSecurity measures$xGovernment policy 615 0$aComputer networks$xSecurity measures 615 0$aCyberspace$xSecurity measures 615 0$aCyberterrorism$xPrevention. 615 0$aInformation warfare 676 $a355.3/43 701 $aDam$b Kenneth W$0141275 701 $aLin$b Herbert$01093194 701 $aOwens$b William A.$f1940-$01808673 712 02$aNational Research Council (U.S.).$bCommittee on Offensive Information Warfare. 712 02$aNational Research Council (U.S.).$bComputer Science and Telecommunications Board. 712 02$aNational Research Council (U.S.).$bDivision on Engineering and Physical Sciences. 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910963701403321 996 $aTechnology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities$94359052 997 $aUNINA