Cargando…

Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities /

The US armed forces, among other intelligence agencies, are increasingly dependent on information and information technology for both civilian and military purposes. Although there is ample literature written on the potential impact of an offensive or defensive cyberattack on societal infrastructure...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: National Research Council (U.S.). Committee on Offensive Information Warfare
Otros Autores: Owens, William A., 1940-, Dam, Kenneth W., Lin, Herbert
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Washington, D.C. : National Academies Press, ©2009.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBSCO_ocn320955857
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 090502s2009 dcu ob 000 0 eng d
040 |a ZCU  |b eng  |e pn  |c ZCU  |d N$T  |d IDEBK  |d OCLCQ  |d ANG  |d OCLCQ  |d NLGGC  |d ANG  |d OCLCQ  |d AGLDB  |d OCLCF  |d OCLCQ  |d VTS  |d CGU  |d LVT  |d STF  |d M8D  |d UKAHL  |d OCLCO  |d OCLCQ  |d OCLCO 
020 |a 9780309138512  |q (electronic bk.) 
020 |a 0309138515  |q (electronic bk.) 
029 1 |a DEBBG  |b BV043097554 
029 1 |a DEBSZ  |b 421925027 
029 1 |a GBVCP  |b 802843646 
035 |a (OCoLC)320955857 
043 |a n-us--- 
050 4 |a U163  |b .T43 2009eb 
072 7 |a HIS  |x 027010  |2 bisacsh 
082 0 4 |a 355.3/43  |2 22 
049 |a UAMI 
245 0 0 |a Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities /  |c William A. Owens, Kenneth W. Dam, and Herbert S. Lin, editors ; Committee on Offensive Information Warfare, Computer Science and Telecommunications Board, Division of Engineering and Physical Sciences, National Research Council of the National Academies. 
260 |a Washington, D.C. :  |b National Academies Press,  |c ©2009. 
300 |a 1 online resource ([xviii, 304] pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 |a The US armed forces, among other intelligence agencies, are increasingly dependent on information and information technology for both civilian and military purposes. Although there is ample literature written on the potential impact of an offensive or defensive cyberattack on societal infrastructure, little has been written about the use of cyberattack as a national policy tool. This book focuses on the potential for the use of such attacks by the United States and its policy implications. Since the primary resource required for a cyberattack is technical expertise, these attacks can be implemented by terrorists, criminals, individuals and corporate actors. Cyberattacks can be used by U.S. adversaries against particular sectors of the U.S. economy and critical national infrastructure that depend on computer systems and networks. Conversely, they can be used by the U.S. intelligence community with adequate organizational structure and appropriate oversight. Focusing on the use of cyberattack as an instrument of U.S. national policy, Technology, Policy, Law and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities explores the important characteristics of cyberattacks and why they are relatively ideal for covert action. Experts argue that the United States should establish a national policy for launching cyberattacks, whether for purposes of exploitation, offense or defense for all sectors of government. This book will be of special interest to the Department of Defense, the Department of Homeland Security, law enforcement, and the greater intelligence community. 
520 |a The US armed forces, among other intelligence agencies, are increasingly dependent on information and information technology for both civilian and military purposes. Although there is ample literature written on the potential impact of an offensive or defensive cyberattack on societal infrastructure, little has been written about the use of cyberattack as a national policy tool. This book focuses on the potential for the use of such attacks by the United States and its policy implications. 
520 |a Since the primary resource required for a cyberattack is technical expertise, these attacks can be implemented by terrorists, criminals, individuals and corporate actors. Cyberattacks can be used by U.S. adversaries against particular sectors of the U.S. economy and critical national infrastructure that depend on computer systems and networks. Conversely, they can be used by the U.S. intelligence community with adequate organizational structure and appropriate oversight. 
520 |a Focusing on the use of cyberattack as an instrument of U.S. national policy, Technology, Policy, Law and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities explores the important characteristics of cyberattacks and why they are relatively ideal for covert action. Experts argue that the United States should establish a national policy for launching cyberattacks, whether for purposes of exploitation, offense or defense for all sectors of government. This book will be of special interest to the Department of Defense, the Department of Homeland Security, law enforcement, and the greater intelligence community. 
505 0 |a Synopsis -- 1. Overview, findings, and recommendations -- Part I: Framing and Basic Technology -- 2. Technical and operational considerations in cyberattack and cyberexploitation -- Part II: Mission and Institutional Perspectives -- 3. A military perspective on cyberattack -- 4. An intelligence community perspective on cyberattack and cyberexploitation -- 5. Perspectives on cyberattack outside national security -- 6. Decision making and oversight -- Part III: Intellectual Tools for Understanding and Thinking About Cyberattack -- 7. Legal and ethical perspectives on cyberattack -- 8. Insights from related areas -- 9. Speculations on the dynamics of cyberconflict -- 10. Alternative futures -- Appendixes: A: Biographies of committee members and staff ; B: Meeting participants and other contributors ; C: Illustrative criminal cyberattacks ; D: Views on the use of force in cyberspace ; E: Technical vulnerabilities targeted by cyber offensive actions. 
588 0 |a Print version record. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Information warfare  |x Government policy  |z United States. 
650 0 |a Cyberterrorism  |x Government policy  |z United States. 
650 0 |a Information technology  |x Military aspects  |z United States. 
650 6 |a Guerre de l'information  |x Politique gouvernementale  |z États-Unis. 
650 6 |a Cyberterrorisme  |x Politique gouvernementale  |z États-Unis. 
650 6 |a Technologie de l'information  |x Aspect militaire  |z États-Unis. 
650 7 |a HISTORY  |x Military  |x Biological & Chemical Warfare.  |2 bisacsh 
651 7 |a United States  |2 fast 
700 1 |a Owens, William A.,  |d 1940- 
700 1 |a Dam, Kenneth W.  |1 http://isni.org/isni/0000000383011452 
700 1 |a Lin, Herbert. 
710 2 |a National Research Council (U.S.).  |b Committee on Offensive Information Warfare. 
776 0 8 |i Print version:  |t Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities.  |d Washington, D.C. : The National Academies Press, ©2009  |z 9780309138505 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=301427  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH36558489 
938 |a EBSCOhost  |b EBSC  |n 301427 
994 |a 92  |b IZTAP