The Resource Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities, William A. Owens, Kenneth W. Dam, and Herbert S. Lin, editors ; Committee on Offensive Information Warfare, Computer Science and Telecommunications Board, Division of Engineering and Physical Sciences, National Research Council of the National Academies

Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities, William A. Owens, Kenneth W. Dam, and Herbert S. Lin, editors ; Committee on Offensive Information Warfare, Computer Science and Telecommunications Board, Division of Engineering and Physical Sciences, National Research Council of the National Academies

Label
Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities
Title
Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities
Statement of responsibility
William A. Owens, Kenneth W. Dam, and Herbert S. Lin, editors ; Committee on Offensive Information Warfare, Computer Science and Telecommunications Board, Division of Engineering and Physical Sciences, National Research Council of the National Academies
Contributor
Subject
Language
eng
Summary
  • Focusing on the use of cyberattack as an instrument of U.S. national policy, Technology, Policy, Law and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities explores the important characteristics of cyberattacks and why they are relatively ideal for covert action. Experts argue that the United States should establish a national policy for launching cyberattacks, whether for purposes of exploitation, offense or defense for all sectors of government. This book will be of special interest to the Department of Defense, the Department of Homeland Security, law enforcement, and the greater intelligence community
  • Since the primary resource required for a cyberattack is technical expertise, these attacks can be implemented by terrorists, criminals, individuals and corporate actors. Cyberattacks can be used by U.S. adversaries against particular sectors of the U.S. economy and critical national infrastructure that depend on computer systems and networks. Conversely, they can be used by the U.S. intelligence community with adequate organizational structure and appropriate oversight
  • The US armed forces, among other intelligence agencies, are increasingly dependent on information and information technology for both civilian and military purposes. Although there is ample literature written on the potential impact of an offensive or defensive cyberattack on societal infrastructure, little has been written about the use of cyberattack as a national policy tool. This book focuses on the potential for the use of such attacks by the United States and its policy implications
  • The US armed forces, among other intelligence agencies, are increasingly dependent on information and information technology for both civilian and military purposes. Although there is ample literature written on the potential impact of an offensive or defensive cyberattack on societal infrastructure, little has been written about the use of cyberattack as a national policy tool. This book focuses on the potential for the use of such attacks by the United States and its policy implications. Since the primary resource required for a cyberattack is technical expertise, these attacks can be implemented by terrorists, criminals, individuals and corporate actors. Cyberattacks can be used by U.S. adversaries against particular sectors of the U.S. economy and critical national infrastructure that depend on computer systems and networks. Conversely, they can be used by the U.S. intelligence community with adequate organizational structure and appropriate oversight. Focusing on the use of cyberattack as an instrument of U.S. national policy, Technology, Policy, Law and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities explores the important characteristics of cyberattacks and why they are relatively ideal for covert action. Experts argue that the United States should establish a national policy for launching cyberattacks, whether for purposes of exploitation, offense or defense for all sectors of government. This book will be of special interest to the Department of Defense, the Department of Homeland Security, law enforcement, and the greater intelligence community
Cataloging source
ZCU
Dewey number
355.3/43
Index
no index present
LC call number
U163
LC item number
.T43 2009eb
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
Label
Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities, William A. Owens, Kenneth W. Dam, and Herbert S. Lin, editors ; Committee on Offensive Information Warfare, Computer Science and Telecommunications Board, Division of Engineering and Physical Sciences, National Research Council of the National Academies
Publication
Antecedent source
unknown
http://library.link/vocab/branchCode
  • net
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
Synopsis -- 1. Overview, findings, and recommendations -- Part I: Framing and Basic Technology -- 2. Technical and operational considerations in cyberattack and cyberexploitation -- Part II: Mission and Institutional Perspectives -- 3. A military perspective on cyberattack -- 4. An intelligence community perspective on cyberattack and cyberexploitation -- 5. Perspectives on cyberattack outside national security -- 6. Decision making and oversight -- Part III: Intellectual Tools for Understanding and Thinking About Cyberattack -- 7. Legal and ethical perspectives on cyberattack -- 8. Insights from related areas -- 9. Speculations on the dynamics of cyberconflict -- 10. Alternative futures -- Appendixes: A: Biographies of committee members and staff ; B: Meeting participants and other contributors ; C: Illustrative criminal cyberattacks ; D: Views on the use of force in cyberspace ; E: Technical vulnerabilities targeted by cyber offensive actions
Control code
ocn320955857
Dimensions
unknown
Extent
1 online resource ([xviii, 304] pages)
File format
unknown
Form of item
online
Isbn
9780309138512
Level of compression
unknown
Media category
computer
Media MARC source
rdamedia
Media type code
c
Quality assurance targets
not applicable
http://library.link/vocab/recordID
.b25394095
Reformatting quality
unknown
Sound
unknown sound
Specific material designation
remote
System control number
  • (OCoLC)320955857
  • acaebk0309138515

Library Locations

    • Deakin University Library - Geelong Waurn Ponds CampusBorrow it
      75 Pigdons Road, Waurn Ponds, Victoria, 3216, AU
      -38.195656 144.304955
Processing Feedback ...