Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities /:
The US armed forces, among other intelligence agencies, are increasingly dependent on information and information technology for both civilian and military purposes. Although there is ample literature written on the potential impact of an offensive or defensive cyberattack on societal infrastructure...
Gespeichert in:
Körperschaft: | |
---|---|
Weitere Verfasser: | , , |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Washington, D.C. :
National Academies Press,
©2009.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | The US armed forces, among other intelligence agencies, are increasingly dependent on information and information technology for both civilian and military purposes. Although there is ample literature written on the potential impact of an offensive or defensive cyberattack on societal infrastructure, little has been written about the use of cyberattack as a national policy tool. This book focuses on the potential for the use of such attacks by the United States and its policy implications. Since the primary resource required for a cyberattack is technical expertise, these attacks can be implemented by terrorists, criminals, individuals and corporate actors. Cyberattacks can be used by U.S. adversaries against particular sectors of the U.S. economy and critical national infrastructure that depend on computer systems and networks. Conversely, they can be used by the U.S. intelligence community with adequate organizational structure and appropriate oversight. Focusing on the use of cyberattack as an instrument of U.S. national policy, Technology, Policy, Law and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities explores the important characteristics of cyberattacks and why they are relatively ideal for covert action. Experts argue that the United States should establish a national policy for launching cyberattacks, whether for purposes of exploitation, offense or defense for all sectors of government. This book will be of special interest to the Department of Defense, the Department of Homeland Security, law enforcement, and the greater intelligence community. The US armed forces, among other intelligence agencies, are increasingly dependent on information and information technology for both civilian and military purposes. Although there is ample literature written on the potential impact of an offensive or defensive cyberattack on societal infrastructure, little has been written about the use of cyberattack as a national policy tool. This book focuses on the potential for the use of such attacks by the United States and its policy implications. Since the primary resource required for a cyberattack is technical expertise, these attacks can be implemented by terrorists, criminals, individuals and corporate actors. Cyberattacks can be used by U.S. adversaries against particular sectors of the U.S. economy and critical national infrastructure that depend on computer systems and networks. Conversely, they can be used by the U.S. intelligence community with adequate organizational structure and appropriate oversight. Focusing on the use of cyberattack as an instrument of U.S. national policy, Technology, Policy, Law and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities explores the important characteristics of cyberattacks and why they are relatively ideal for covert action. Experts argue that the United States should establish a national policy for launching cyberattacks, whether for purposes of exploitation, offense or defense for all sectors of government. This book will be of special interest to the Department of Defense, the Department of Homeland Security, law enforcement, and the greater intelligence community. |
Beschreibung: | 1 online resource ([xviii, 304] pages) |
ISBN: | 9780309138512 0309138515 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn320955857 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 090502s2009 dcu ob 000 0 eng d | ||
040 | |a ZCU |b eng |e pn |c ZCU |d N$T |d IDEBK |d OCLCQ |d ANG |d OCLCQ |d NLGGC |d ANG |d OCLCQ |d AGLDB |d OCLCF |d OCLCQ |d VTS |d CGU |d LVT |d STF |d M8D |d UKAHL |d OCLCO |d OCLCQ |d OCLCO |d OCLCL |d OCLCQ | ||
020 | |a 9780309138512 |q (electronic bk.) | ||
020 | |a 0309138515 |q (electronic bk.) | ||
035 | |a (OCoLC)320955857 | ||
043 | |a n-us--- | ||
050 | 4 | |a U163 |b .T43 2009eb | |
072 | 7 | |a HIS |x 027010 |2 bisacsh | |
082 | 7 | |a 355.3/43 |2 22 | |
049 | |a MAIN | ||
245 | 0 | 0 | |a Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities / |c William A. Owens, Kenneth W. Dam, and Herbert S. Lin, editors ; Committee on Offensive Information Warfare, Computer Science and Telecommunications Board, Division of Engineering and Physical Sciences, National Research Council of the National Academies. |
260 | |a Washington, D.C. : |b National Academies Press, |c ©2009. | ||
300 | |a 1 online resource ([xviii, 304] pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
520 | |a The US armed forces, among other intelligence agencies, are increasingly dependent on information and information technology for both civilian and military purposes. Although there is ample literature written on the potential impact of an offensive or defensive cyberattack on societal infrastructure, little has been written about the use of cyberattack as a national policy tool. This book focuses on the potential for the use of such attacks by the United States and its policy implications. Since the primary resource required for a cyberattack is technical expertise, these attacks can be implemented by terrorists, criminals, individuals and corporate actors. Cyberattacks can be used by U.S. adversaries against particular sectors of the U.S. economy and critical national infrastructure that depend on computer systems and networks. Conversely, they can be used by the U.S. intelligence community with adequate organizational structure and appropriate oversight. Focusing on the use of cyberattack as an instrument of U.S. national policy, Technology, Policy, Law and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities explores the important characteristics of cyberattacks and why they are relatively ideal for covert action. Experts argue that the United States should establish a national policy for launching cyberattacks, whether for purposes of exploitation, offense or defense for all sectors of government. This book will be of special interest to the Department of Defense, the Department of Homeland Security, law enforcement, and the greater intelligence community. | ||
520 | |a The US armed forces, among other intelligence agencies, are increasingly dependent on information and information technology for both civilian and military purposes. Although there is ample literature written on the potential impact of an offensive or defensive cyberattack on societal infrastructure, little has been written about the use of cyberattack as a national policy tool. This book focuses on the potential for the use of such attacks by the United States and its policy implications. | ||
520 | |a Since the primary resource required for a cyberattack is technical expertise, these attacks can be implemented by terrorists, criminals, individuals and corporate actors. Cyberattacks can be used by U.S. adversaries against particular sectors of the U.S. economy and critical national infrastructure that depend on computer systems and networks. Conversely, they can be used by the U.S. intelligence community with adequate organizational structure and appropriate oversight. | ||
520 | |a Focusing on the use of cyberattack as an instrument of U.S. national policy, Technology, Policy, Law and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities explores the important characteristics of cyberattacks and why they are relatively ideal for covert action. Experts argue that the United States should establish a national policy for launching cyberattacks, whether for purposes of exploitation, offense or defense for all sectors of government. This book will be of special interest to the Department of Defense, the Department of Homeland Security, law enforcement, and the greater intelligence community. | ||
505 | 0 | |a Synopsis -- 1. Overview, findings, and recommendations -- Part I: Framing and Basic Technology -- 2. Technical and operational considerations in cyberattack and cyberexploitation -- Part II: Mission and Institutional Perspectives -- 3. A military perspective on cyberattack -- 4. An intelligence community perspective on cyberattack and cyberexploitation -- 5. Perspectives on cyberattack outside national security -- 6. Decision making and oversight -- Part III: Intellectual Tools for Understanding and Thinking About Cyberattack -- 7. Legal and ethical perspectives on cyberattack -- 8. Insights from related areas -- 9. Speculations on the dynamics of cyberconflict -- 10. Alternative futures -- Appendixes: A: Biographies of committee members and staff ; B: Meeting participants and other contributors ; C: Illustrative criminal cyberattacks ; D: Views on the use of force in cyberspace ; E: Technical vulnerabilities targeted by cyber offensive actions. | |
588 | 0 | |a Print version record. | |
650 | 0 | |a Information warfare |x Government policy |z United States. | |
650 | 0 | |a Cyberterrorism |x Government policy |z United States. | |
650 | 0 | |a Information technology |x Military aspects |z United States. | |
650 | 6 | |a Guerre de l'information |x Politique gouvernementale |z États-Unis. | |
650 | 6 | |a Cyberterrorisme |x Politique gouvernementale |z États-Unis. | |
650 | 6 | |a Technologie de l'information |x Aspect militaire |z États-Unis. | |
650 | 7 | |a HISTORY |x Military |x Biological & Chemical Warfare. |2 bisacsh | |
651 | 7 | |a United States |2 fast |1 https://id.oclc.org/worldcat/entity/E39PBJtxgQXMWqmjMjjwXRHgrq | |
700 | 1 | |a Owens, William A., |d 1940- |1 https://id.oclc.org/worldcat/entity/E39PBJjMwyMdmYFqj69kqjFBT3 |0 http://id.loc.gov/authorities/names/n94094228 | |
700 | 1 | |a Dam, Kenneth W. |1 http://isni.org/isni/0000000383011452 |0 http://id.loc.gov/authorities/names/n50038986 | |
700 | 1 | |a Lin, Herbert. |0 http://id.loc.gov/authorities/names/n86039872 | |
710 | 2 | |a National Research Council (U.S.). |b Committee on Offensive Information Warfare. |0 http://id.loc.gov/authorities/names/no2009069035 | |
776 | 0 | 8 | |i Print version: |t Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities. |d Washington, D.C. : The National Academies Press, ©2009 |z 9780309138505 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=301427 |3 Volltext |
938 | |a Askews and Holts Library Services |b ASKH |n AH36558489 | ||
938 | |a EBSCOhost |b EBSC |n 301427 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn320955857 |
---|---|
_version_ | 1816881691922268160 |
adam_text | |
any_adam_object | |
author2 | Owens, William A., 1940- Dam, Kenneth W. Lin, Herbert |
author2_role | |
author2_variant | w a o wa wao k w d kw kwd h l hl |
author_GND | http://id.loc.gov/authorities/names/n94094228 http://id.loc.gov/authorities/names/n50038986 http://id.loc.gov/authorities/names/n86039872 |
author_corporate | National Research Council (U.S.). Committee on Offensive Information Warfare |
author_corporate_role | |
author_facet | Owens, William A., 1940- Dam, Kenneth W. Lin, Herbert National Research Council (U.S.). Committee on Offensive Information Warfare |
author_sort | Owens, William A., 1940- |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | U - Military Science |
callnumber-label | U163 |
callnumber-raw | U163 .T43 2009eb |
callnumber-search | U163 .T43 2009eb |
callnumber-sort | U 3163 T43 42009EB |
callnumber-subject | U - General Military Science |
collection | ZDB-4-EBA |
contents | Synopsis -- 1. Overview, findings, and recommendations -- Part I: Framing and Basic Technology -- 2. Technical and operational considerations in cyberattack and cyberexploitation -- Part II: Mission and Institutional Perspectives -- 3. A military perspective on cyberattack -- 4. An intelligence community perspective on cyberattack and cyberexploitation -- 5. Perspectives on cyberattack outside national security -- 6. Decision making and oversight -- Part III: Intellectual Tools for Understanding and Thinking About Cyberattack -- 7. Legal and ethical perspectives on cyberattack -- 8. Insights from related areas -- 9. Speculations on the dynamics of cyberconflict -- 10. Alternative futures -- Appendixes: A: Biographies of committee members and staff ; B: Meeting participants and other contributors ; C: Illustrative criminal cyberattacks ; D: Views on the use of force in cyberspace ; E: Technical vulnerabilities targeted by cyber offensive actions. |
ctrlnum | (OCoLC)320955857 |
dewey-full | 355.3/43 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 355 - Military science |
dewey-raw | 355.3/43 |
dewey-search | 355.3/43 |
dewey-sort | 3355.3 243 |
dewey-tens | 350 - Public administration and military science |
discipline | Militärwissenschaft |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>07109cam a2200553 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn320955857</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">090502s2009 dcu ob 000 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">ZCU</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">ZCU</subfield><subfield code="d">N$T</subfield><subfield code="d">IDEBK</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">ANG</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">NLGGC</subfield><subfield code="d">ANG</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AGLDB</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">CGU</subfield><subfield code="d">LVT</subfield><subfield code="d">STF</subfield><subfield code="d">M8D</subfield><subfield code="d">UKAHL</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780309138512</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0309138515</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)320955857</subfield></datafield><datafield tag="043" ind1=" " ind2=" "><subfield code="a">n-us---</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">U163</subfield><subfield code="b">.T43 2009eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">HIS</subfield><subfield code="x">027010</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">355.3/43</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities /</subfield><subfield code="c">William A. Owens, Kenneth W. Dam, and Herbert S. Lin, editors ; Committee on Offensive Information Warfare, Computer Science and Telecommunications Board, Division of Engineering and Physical Sciences, National Research Council of the National Academies.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Washington, D.C. :</subfield><subfield code="b">National Academies Press,</subfield><subfield code="c">©2009.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource ([xviii, 304] pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The US armed forces, among other intelligence agencies, are increasingly dependent on information and information technology for both civilian and military purposes. Although there is ample literature written on the potential impact of an offensive or defensive cyberattack on societal infrastructure, little has been written about the use of cyberattack as a national policy tool. This book focuses on the potential for the use of such attacks by the United States and its policy implications. Since the primary resource required for a cyberattack is technical expertise, these attacks can be implemented by terrorists, criminals, individuals and corporate actors. Cyberattacks can be used by U.S. adversaries against particular sectors of the U.S. economy and critical national infrastructure that depend on computer systems and networks. Conversely, they can be used by the U.S. intelligence community with adequate organizational structure and appropriate oversight. Focusing on the use of cyberattack as an instrument of U.S. national policy, Technology, Policy, Law and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities explores the important characteristics of cyberattacks and why they are relatively ideal for covert action. Experts argue that the United States should establish a national policy for launching cyberattacks, whether for purposes of exploitation, offense or defense for all sectors of government. This book will be of special interest to the Department of Defense, the Department of Homeland Security, law enforcement, and the greater intelligence community.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The US armed forces, among other intelligence agencies, are increasingly dependent on information and information technology for both civilian and military purposes. Although there is ample literature written on the potential impact of an offensive or defensive cyberattack on societal infrastructure, little has been written about the use of cyberattack as a national policy tool. This book focuses on the potential for the use of such attacks by the United States and its policy implications.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Since the primary resource required for a cyberattack is technical expertise, these attacks can be implemented by terrorists, criminals, individuals and corporate actors. Cyberattacks can be used by U.S. adversaries against particular sectors of the U.S. economy and critical national infrastructure that depend on computer systems and networks. Conversely, they can be used by the U.S. intelligence community with adequate organizational structure and appropriate oversight.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Focusing on the use of cyberattack as an instrument of U.S. national policy, Technology, Policy, Law and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities explores the important characteristics of cyberattacks and why they are relatively ideal for covert action. Experts argue that the United States should establish a national policy for launching cyberattacks, whether for purposes of exploitation, offense or defense for all sectors of government. This book will be of special interest to the Department of Defense, the Department of Homeland Security, law enforcement, and the greater intelligence community.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Synopsis -- 1. Overview, findings, and recommendations -- Part I: Framing and Basic Technology -- 2. Technical and operational considerations in cyberattack and cyberexploitation -- Part II: Mission and Institutional Perspectives -- 3. A military perspective on cyberattack -- 4. An intelligence community perspective on cyberattack and cyberexploitation -- 5. Perspectives on cyberattack outside national security -- 6. Decision making and oversight -- Part III: Intellectual Tools for Understanding and Thinking About Cyberattack -- 7. Legal and ethical perspectives on cyberattack -- 8. Insights from related areas -- 9. Speculations on the dynamics of cyberconflict -- 10. Alternative futures -- Appendixes: A: Biographies of committee members and staff ; B: Meeting participants and other contributors ; C: Illustrative criminal cyberattacks ; D: Views on the use of force in cyberspace ; E: Technical vulnerabilities targeted by cyber offensive actions.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information warfare</subfield><subfield code="x">Government policy</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberterrorism</subfield><subfield code="x">Government policy</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information technology</subfield><subfield code="x">Military aspects</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Guerre de l'information</subfield><subfield code="x">Politique gouvernementale</subfield><subfield code="z">États-Unis.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Cyberterrorisme</subfield><subfield code="x">Politique gouvernementale</subfield><subfield code="z">États-Unis.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Technologie de l'information</subfield><subfield code="x">Aspect militaire</subfield><subfield code="z">États-Unis.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">HISTORY</subfield><subfield code="x">Military</subfield><subfield code="x">Biological & Chemical Warfare.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">United States</subfield><subfield code="2">fast</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PBJtxgQXMWqmjMjjwXRHgrq</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Owens, William A.,</subfield><subfield code="d">1940-</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PBJjMwyMdmYFqj69kqjFBT3</subfield><subfield code="0">http://id.loc.gov/authorities/names/n94094228</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dam, Kenneth W.</subfield><subfield code="1">http://isni.org/isni/0000000383011452</subfield><subfield code="0">http://id.loc.gov/authorities/names/n50038986</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lin, Herbert.</subfield><subfield code="0">http://id.loc.gov/authorities/names/n86039872</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">National Research Council (U.S.).</subfield><subfield code="b">Committee on Offensive Information Warfare.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2009069035</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="t">Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities.</subfield><subfield code="d">Washington, D.C. : The National Academies Press, ©2009</subfield><subfield code="z">9780309138505</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=301427</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH36558489</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">301427</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
geographic | United States fast https://id.oclc.org/worldcat/entity/E39PBJtxgQXMWqmjMjjwXRHgrq |
geographic_facet | United States |
id | ZDB-4-EBA-ocn320955857 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:16:45Z |
institution | BVB |
institution_GND | http://id.loc.gov/authorities/names/no2009069035 |
isbn | 9780309138512 0309138515 |
language | English |
oclc_num | 320955857 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource ([xviii, 304] pages) |
psigel | ZDB-4-EBA |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | National Academies Press, |
record_format | marc |
spelling | Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities / William A. Owens, Kenneth W. Dam, and Herbert S. Lin, editors ; Committee on Offensive Information Warfare, Computer Science and Telecommunications Board, Division of Engineering and Physical Sciences, National Research Council of the National Academies. Washington, D.C. : National Academies Press, ©2009. 1 online resource ([xviii, 304] pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier The US armed forces, among other intelligence agencies, are increasingly dependent on information and information technology for both civilian and military purposes. Although there is ample literature written on the potential impact of an offensive or defensive cyberattack on societal infrastructure, little has been written about the use of cyberattack as a national policy tool. This book focuses on the potential for the use of such attacks by the United States and its policy implications. Since the primary resource required for a cyberattack is technical expertise, these attacks can be implemented by terrorists, criminals, individuals and corporate actors. Cyberattacks can be used by U.S. adversaries against particular sectors of the U.S. economy and critical national infrastructure that depend on computer systems and networks. Conversely, they can be used by the U.S. intelligence community with adequate organizational structure and appropriate oversight. Focusing on the use of cyberattack as an instrument of U.S. national policy, Technology, Policy, Law and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities explores the important characteristics of cyberattacks and why they are relatively ideal for covert action. Experts argue that the United States should establish a national policy for launching cyberattacks, whether for purposes of exploitation, offense or defense for all sectors of government. This book will be of special interest to the Department of Defense, the Department of Homeland Security, law enforcement, and the greater intelligence community. The US armed forces, among other intelligence agencies, are increasingly dependent on information and information technology for both civilian and military purposes. Although there is ample literature written on the potential impact of an offensive or defensive cyberattack on societal infrastructure, little has been written about the use of cyberattack as a national policy tool. This book focuses on the potential for the use of such attacks by the United States and its policy implications. Since the primary resource required for a cyberattack is technical expertise, these attacks can be implemented by terrorists, criminals, individuals and corporate actors. Cyberattacks can be used by U.S. adversaries against particular sectors of the U.S. economy and critical national infrastructure that depend on computer systems and networks. Conversely, they can be used by the U.S. intelligence community with adequate organizational structure and appropriate oversight. Focusing on the use of cyberattack as an instrument of U.S. national policy, Technology, Policy, Law and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities explores the important characteristics of cyberattacks and why they are relatively ideal for covert action. Experts argue that the United States should establish a national policy for launching cyberattacks, whether for purposes of exploitation, offense or defense for all sectors of government. This book will be of special interest to the Department of Defense, the Department of Homeland Security, law enforcement, and the greater intelligence community. Synopsis -- 1. Overview, findings, and recommendations -- Part I: Framing and Basic Technology -- 2. Technical and operational considerations in cyberattack and cyberexploitation -- Part II: Mission and Institutional Perspectives -- 3. A military perspective on cyberattack -- 4. An intelligence community perspective on cyberattack and cyberexploitation -- 5. Perspectives on cyberattack outside national security -- 6. Decision making and oversight -- Part III: Intellectual Tools for Understanding and Thinking About Cyberattack -- 7. Legal and ethical perspectives on cyberattack -- 8. Insights from related areas -- 9. Speculations on the dynamics of cyberconflict -- 10. Alternative futures -- Appendixes: A: Biographies of committee members and staff ; B: Meeting participants and other contributors ; C: Illustrative criminal cyberattacks ; D: Views on the use of force in cyberspace ; E: Technical vulnerabilities targeted by cyber offensive actions. Print version record. Information warfare Government policy United States. Cyberterrorism Government policy United States. Information technology Military aspects United States. Guerre de l'information Politique gouvernementale États-Unis. Cyberterrorisme Politique gouvernementale États-Unis. Technologie de l'information Aspect militaire États-Unis. HISTORY Military Biological & Chemical Warfare. bisacsh United States fast https://id.oclc.org/worldcat/entity/E39PBJtxgQXMWqmjMjjwXRHgrq Owens, William A., 1940- https://id.oclc.org/worldcat/entity/E39PBJjMwyMdmYFqj69kqjFBT3 http://id.loc.gov/authorities/names/n94094228 Dam, Kenneth W. http://isni.org/isni/0000000383011452 http://id.loc.gov/authorities/names/n50038986 Lin, Herbert. http://id.loc.gov/authorities/names/n86039872 National Research Council (U.S.). Committee on Offensive Information Warfare. http://id.loc.gov/authorities/names/no2009069035 Print version: Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities. Washington, D.C. : The National Academies Press, ©2009 9780309138505 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=301427 Volltext |
spellingShingle | Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities / Synopsis -- 1. Overview, findings, and recommendations -- Part I: Framing and Basic Technology -- 2. Technical and operational considerations in cyberattack and cyberexploitation -- Part II: Mission and Institutional Perspectives -- 3. A military perspective on cyberattack -- 4. An intelligence community perspective on cyberattack and cyberexploitation -- 5. Perspectives on cyberattack outside national security -- 6. Decision making and oversight -- Part III: Intellectual Tools for Understanding and Thinking About Cyberattack -- 7. Legal and ethical perspectives on cyberattack -- 8. Insights from related areas -- 9. Speculations on the dynamics of cyberconflict -- 10. Alternative futures -- Appendixes: A: Biographies of committee members and staff ; B: Meeting participants and other contributors ; C: Illustrative criminal cyberattacks ; D: Views on the use of force in cyberspace ; E: Technical vulnerabilities targeted by cyber offensive actions. Information warfare Government policy United States. Cyberterrorism Government policy United States. Information technology Military aspects United States. Guerre de l'information Politique gouvernementale États-Unis. Cyberterrorisme Politique gouvernementale États-Unis. Technologie de l'information Aspect militaire États-Unis. HISTORY Military Biological & Chemical Warfare. bisacsh |
title | Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities / |
title_auth | Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities / |
title_exact_search | Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities / |
title_full | Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities / William A. Owens, Kenneth W. Dam, and Herbert S. Lin, editors ; Committee on Offensive Information Warfare, Computer Science and Telecommunications Board, Division of Engineering and Physical Sciences, National Research Council of the National Academies. |
title_fullStr | Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities / William A. Owens, Kenneth W. Dam, and Herbert S. Lin, editors ; Committee on Offensive Information Warfare, Computer Science and Telecommunications Board, Division of Engineering and Physical Sciences, National Research Council of the National Academies. |
title_full_unstemmed | Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities / William A. Owens, Kenneth W. Dam, and Herbert S. Lin, editors ; Committee on Offensive Information Warfare, Computer Science and Telecommunications Board, Division of Engineering and Physical Sciences, National Research Council of the National Academies. |
title_short | Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities / |
title_sort | technology policy law and ethics regarding u s acquisition and use of cyberattack capabilities |
topic | Information warfare Government policy United States. Cyberterrorism Government policy United States. Information technology Military aspects United States. Guerre de l'information Politique gouvernementale États-Unis. Cyberterrorisme Politique gouvernementale États-Unis. Technologie de l'information Aspect militaire États-Unis. HISTORY Military Biological & Chemical Warfare. bisacsh |
topic_facet | Information warfare Government policy United States. Cyberterrorism Government policy United States. Information technology Military aspects United States. Guerre de l'information Politique gouvernementale États-Unis. Cyberterrorisme Politique gouvernementale États-Unis. Technologie de l'information Aspect militaire États-Unis. HISTORY Military Biological & Chemical Warfare. United States |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=301427 |
work_keys_str_mv | AT owenswilliama technologypolicylawandethicsregardingusacquisitionanduseofcyberattackcapabilities AT damkennethw technologypolicylawandethicsregardingusacquisitionanduseofcyberattackcapabilities AT linherbert technologypolicylawandethicsregardingusacquisitionanduseofcyberattackcapabilities AT nationalresearchcounciluscommitteeonoffensiveinformationwarfare technologypolicylawandethicsregardingusacquisitionanduseofcyberattackcapabilities |