-
1
-
-
78650464753
-
-
(National Security Agency: Center for Cryptologic History
-
Thomas R. Johnson, American Cryptology During the Cold War, 1945-1989, Book II, Centralization Wins, 1960-1972 (National Security Agency: Center for Cryptologic History 1995) p.368 http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB260/nsa-3.pdf.
-
(1995)
American Cryptology During the Cold War, 1945-1989, Book II, Centralization Wins, 1960-1972
, pp. 368
-
-
Johnson, T.R.1
-
2
-
-
78650464753
-
-
(National Security Agency: Center for Cryptologic History
-
Thomas R. Johnson, American Cryptology During the Cold War, 1945-1989, Book II, Centralization Wins, 1960-1972 (National Security Agency: Center for Cryptologic History 1995) p.368 http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB260/nsa-3.pdf.
-
(1995)
American Cryptology During the Cold War, 1945-1989, Book II, Centralization Wins, 1960-1972
, pp. 368
-
-
Johnson, T.R.1
-
3
-
-
84976815513
-
-
See also, 967 Spring Joint Computer Conference, AFIPS Proa, (accessed 26 September 2011)
-
See also, B. Peters, 'Security Considerations in a Multi-programmed Computer System', 1967 Spring Joint Computer Conference, AFIPS Proa, vol 30, 1967, pp.283-6 http://dl.acm.org/citation.cfm?id=1465524&dl=ACM&coll=DL&CFID=44685134&CFTOKEN=30141640 (accessed 26 September 2011).
-
(1967)
Security Considerations In a Multi-programmed Computer System
, vol.30
, pp. 283-286
-
-
Peters, B.1
-
4
-
-
84867283197
-
-
remarks at the 1967 Spring Joint Computer Conference, (accessed 26 September 2011)
-
Willis H. Ware, 'Security and Privacy in Computer Systems', remarks at the 1967 Spring Joint Computer Conference, p.11 http://www.rand.org/content/dam/rand/pubs/papers/2005/P3544.pdf (accessed 26 September 2011)
-
Security and Privacy In Computer Systems
, pp. 11
-
-
Ware, W.H.1
-
6
-
-
84867321117
-
EDV abgezapft
-
14 April, (accessed 26 September 2011)
-
'EDV abgezapft', Der Spiegel, 14 April 1969 http://www.spiegel.de/spiegel/print/d-45702341.html (accessed 26 September 2011)
-
(1969)
Der Spiegel
-
-
-
7
-
-
0001712220
-
-
The ubiquitous Markus Wolf sheds additional light on this operation in Markus Wolf with, (New York: PublicAffairs
-
The ubiquitous Markus Wolf sheds additional light on this operation in Markus Wolf with Anne McElvoy, Man Without a Face: The Autobiography of Communism's Greatest Spymaster (New York: PublicAffairs 1997) p.201.
-
(1997)
Man Without a Face: The Autobiography of Communism's Greatest Spymaster
, pp. 201
-
-
McElvoy, A.1
-
8
-
-
0006291871
-
-
Report of the Defense Science Board Task Force on Computer Security, [the Ware Report], published by RAND for the Office of the Director of Defense Research, 11 February, (accessed 26 September 2011)
-
Report of the Defense Science Board Task Force on Computer Security, Security Controls for Computer Systems [the Ware Report], published by RAND for the Office of the Director of Defense Research, 11 February 1970 http://seclab.cs.ucdavis.edu/projects/history/papers/ware70.pdf (accessed 26 September 2011).
-
(1970)
Security Controls For Computer Systems
-
-
-
9
-
-
84867283194
-
Unclassified Summary: Involvement of NSA in the Development of the Data Encryption Standard
-
US Senate, Select Committee on Intelligence, April, (accessed 26 September 2011)
-
US Senate, Select Committee on Intelligence, 'Unclassified Summary: Involvement of NSA in the Development of the Data Encryption Standard', Staff Report, April 1978 http://intelligence.senate.gov/pdfs/95nsa.pdf (accessed 26 September 2011).
-
(1978)
Staff Report
-
-
-
10
-
-
3943108716
-
Computer Security: The Achilles' Heel of the Electronic Air Force?
-
January/February, (accessed 26 September 2011)
-
Roger R. Schell, 'Computer Security: The Achilles' Heel of the Electronic Air Force?', Air University Review January/February (1979) http://www.airpower.maxwell.af.mil/airchro-nicles/aureview/1979/jan-feb/schell.html#schell (accessed 26 September 2011).
-
(1979)
Air University Review
-
-
Schell, R.R.1
-
12
-
-
0004170717
-
-
During the Cuban Missile Crisis in 1962, for example, an exercise tape inadvertently fed into an operational computer briefly made American radar operators believe they were tracking a missile; see, (Princeton: Princeton University Press
-
During the Cuban Missile Crisis in 1962, for example, an exercise tape inadvertently fed into an operational computer briefly made American radar operators believe they were tracking a missile; see Scott D. Sagan, The Limits of Safety: Organisations, Accidents, and Nuclear Weapons (Princeton: Princeton University Press 1993), pp.238-41
-
(1993)
The Limits of Safety: Organisations, Accidents, and Nuclear Weapons
, pp. 238-241
-
-
Sagan, S.D.1
-
13
-
-
84867321129
-
-
US Congress, General Accounting Office (Comptroller General), report to the Chairman of the Committee on Government Operations [Rep. Jack Brooks], 15 May, (accessed 26 September 2011)
-
US Congress, General Accounting Office (Comptroller General), report to the Chairman of the Committee on Government Operations [Rep. Jack Brooks], 'NORAD's Missile Warning System: What Went Wrong?', 15 May 1981, p.13 http://archive.gao.gov/f0102/115265.pdf (accessed 26 September 2011).
-
(1981)
NORAD's Missile Warning System: What Went Wrong?
, pp. 13
-
-
-
15
-
-
0003726032
-
-
notes that the salience of the, incident is that NORAD reported it to the Pentagon in real time; earlier such mishaps had been contained at the individual tracking sites
-
Sagan, The Limits of Safety, notes that the salience of the 1979 incident is that NORAD reported it to the Pentagon in real time; earlier such mishaps had been contained at the individual tracking sites.
-
(1979)
The Limits of Safety
-
-
Sagan1
-
16
-
-
0003640065
-
-
Reagan enjoyed a private screening of WarGames the weekend it opened; his recounting of it is from, (New York: PublicAffairs
-
Reagan enjoyed a private screening of WarGames the weekend it opened; his recounting of it is from Lou Cannon, President Reagan: The Role of Lifetime (New York: PublicAffairs 1991) p.38.
-
(1991)
President Reagan: The Role of Lifetime
, pp. 38
-
-
Cannon, L.1
-
17
-
-
84867326084
-
Computer Security Worries Military Experts
-
25 September
-
William. J. Broad, 'Computer Security Worries Military Experts', New York Times, 25 September 1983.
-
(1983)
New York Times
-
-
Broad, W.J.1
-
18
-
-
84867283755
-
-
National Security Decision Directive 145, 17 September, (accessed 11 February 2009). NSA's concerns over the security of government networks already dated back more than a decade. The Agency had created a Computer Security Center (CSC) in 1981 to guard Department of Defense systems, and it responded to NSDD-145 by transforming CSC into the National Computer Security Center
-
National Security Decision Directive 145, 'National Policy on Telecommunications and Automated Information Systems Security', 17 September 1984 http://www.fas.org/irp/offdocs/nsddl45.htm (accessed 11 February 2009). NSA's concerns over the security of government networks already dated back more than a decade. The Agency had created a Computer Security Center (CSC) in 1981 to guard Department of Defense systems, and it responded to NSDD-145 by transforming CSC into the National Computer Security Center
-
(1984)
National Policy On Telecommunications and Automated Information Systems Security
-
-
-
20
-
-
84867321123
-
Computer Security Shift is Approved by Senate
-
24 December
-
Linda Greenhouse, 'Computer Security Shift is Approved by Senate', New York Times, 24 December 1987
-
(1987)
New York Times
-
-
Greenhouse, L.1
-
21
-
-
84961772683
-
The National Guards
-
May
-
Donald Goldberg, 'The National Guards', OMNI Magazine, May 1987.
-
(1987)
OMNI Magazine
-
-
Goldberg, D.1
-
24
-
-
84867298027
-
-
House Committee on Government Operations, Committee on Science, Space, and Technology, Report to accompany H.R. 145, June 11, (accessed 26 September 2011)
-
House Committee on Government Operations, Committee on Science, Space, and Technology, Computer Security Act of 1987, Report to accompany H.R. 145, June 11, 1987 http://csrc.nist.gov/groups/SMA/ispab/documents/csa_87.txt (accessed 26 September 2011).
-
(1987)
Computer Security Act of 1987
-
-
-
25
-
-
84867321118
-
-
National Security Directive 42, 'National Policy for the Security of National Security Telecommunications and Information Systems', 5 July, (accessed 26 September
-
Greenhouse, 'Computer Security Shift is Approved by Senate'. National Security Directive 42, 'National Policy for the Security of National Security Telecommunications and Information Systems', 5 July 1990 http://www.fas.org/irp/offdocs/nsd/nsd42.pdf (accessed 26 September 2011).
-
(1990)
Computer Security Shift is Approved By Senate
-
-
Greenhouse1
-
26
-
-
0004182242
-
-
(Seattle: Boeing, 1 July, Thinkers in the Soviet Union seemed to pondered similar ideas, like the notion of 'reflexive control', at roughly the same time
-
Thomas P. Rona, 'Weapon Systems and Information War' (Seattle: Boeing, 1 July 1976) p.50 http://www.google.com/url?sa=t&rct=j&q=thomas%20p.%20rona%2C%20%E2%80%98weapon%20systems%20and%20information%20war%E2%80%99%20(seattle%3A%20boeing%2C%201%20july%201976)%20p.50.&source=web&cd=l&sqi=2&ved=0CFEQFjAA&url=http%3A%2F%2Fwww.dod.mil%2Fpubs%2Ffoi%2Fhomeland_defense%2Fmissile_defense_agency%2F09-F-0070WeaponSystems_and_Information_War.pdf&:ei=4NkWUJaKKeHr6wHmyoHoDg&usg=AFQjCNGGlcfmXsy_BqwAWZre8AOrUN_pGg&cad=rja. Thinkers in the Soviet Union seemed to pondered similar ideas, like the notion of 'reflexive control', at roughly the same time
-
(1976)
Weapon Systems and Information War
, pp. 50
-
-
Rona, T.P.1
-
29
-
-
84867321121
-
-
(Moscow: Military Publishing House, Brusnitsin, a lieutenant general, was then Deputy Chairman of the State Technical Commission of the USSR
-
Nikolai Brusnitsin, Openness and Espionage (Moscow: Military Publishing House 1990), pp.28-9. Brusnitsin, a lieutenant general, was then Deputy Chairman of the State Technical Commission of the USSR.
-
(1990)
Openness and Espionage
, pp. 28-29
-
-
Brusnitsin, N.1
-
30
-
-
84867326085
-
-
Chairman of the Joint Chiefs of Staff, Memorandum of Policy 30, 8 March, (accessed 26 September 2011)
-
Chairman of the Joint Chiefs of Staff, Memorandum of Policy 30, 'Command and Control Warfare', 8 March 1993 http://dodreports.com/pdf/ada389344.pdf (accessed 26 September 2011).
-
(1993)
Command and Control Warfare
-
-
-
31
-
-
0242381404
-
-
Secretary of the Air Force and Chief of Staff of the Air Force, (accessed 26 September 2011)
-
Secretary of the Air Force and Chief of Staff of the Air Force, 'Cornerstones of Information Warfare', 1995 http://www.c4i.org/cornerstones.html (accessed 26 September 2011)
-
(1995)
Cornerstones of Information Warfare
-
-
-
33
-
-
84867295009
-
The Challenge of Information Warfare
-
Spring, (accessed 14 September 2011)
-
Wang Pufeng, 'The Challenge of Information Warfare', China Military Science, Spring 1995 http://www.fas.org/irp/world/china/docs/iw_mg_wang.htm (accessed 14 September 2011).
-
(1995)
China Military Science
-
-
Pufeng, W.1
-
34
-
-
84905321169
-
Information War: A New Form of People's War
-
25 June, (accessed 14 September 2011)
-
Wei Jincheng, 'Information War: A New Form of People's War', Liberation Army Daily, 25 June 1996 http://www.fas.org/irp/world/china/docs/iw_wei.htm (accessed 14 September 2011).
-
(1996)
Liberation Army Daily
-
-
Jincheng, W.1
-
35
-
-
84867326088
-
Computer Virus Infections: Is NSA Vulnerable?
-
Author's name redacted
-
[Author's name redacted], 'Computer Virus Infections: Is NSA Vulnerable?', Cryptologic Quarterly 4/Fall (1985) http://www.nsa.gov/public_info/_files/cryptologic_quarterly/com-putervirus.pdf.
-
(1985)
Cryptologic Quarterly
, vol.4
-
-
-
36
-
-
0004184890
-
-
National Academy of Science, Computer Science and Telecommunications Board, (Washington: National Academy Press, (accessed 26 September 2011)
-
National Academy of Science, Computer Science and Telecommunications Board, 'Computers at Risk: Safe Computing in the Information Age' (Washington: National Academy Press 1991) http://www.nap.edu/openbook.php?record_id=1581&:page=7 (accessed 26 September 2011).
-
(1991)
Computers At Risk: Safe Computing In the Information Age
-
-
-
38
-
-
0003813389
-
-
(Santa Monica, CA: RAND, xvii, 3, 9, 31, (accessed 30 November 2011)
-
Roger C. Molander, Andrew S. Riddile and Peter A. Wilson, Strategic Information Warfare: A New Face of War (Santa Monica, CA: RAND 1996) pp.xi, xvii, 3, 9, 31 http://www.rand.org/pubs/monograph_reports/2005/MR661.pdf (accessed 30 November 2011).
-
(1996)
Strategic Information Warfare: A New Face of War
-
-
Molander, R.C.1
Riddile, A.S.2
Wilson, P.A.3
-
39
-
-
84867326091
-
-
US Congress, General Accounting Office, Technical Report GAO/AIMD-96-84, 22 May, (accessed 26 September 2011)
-
US Congress, General Accounting Office, 'Information Security: Computer Attacks at Department of Defense Pose Increasing Risks', Technical Report GAO/AIMD-96-84, 22 May 1996 http://www.fas.org/irp/gao/aim96084.htm (accessed 26 September 2011)
-
(1996)
Information Security: Computer Attacks At Department of Defense Pose Increasing Risks
-
-
-
40
-
-
3242850472
-
-
Office of the Under Secretary of Defense for Acquisition &c Technology, November, (accessed 26 September 2011)
-
Office of the Under Secretary of Defense for Acquisition &c Technology, 'Report of the Defense Science Board Task Force on Information Warfare-Defense (IW-D)', November 1996 http://cryptome.org/iwd.htm (accessed 26 September 2011).
-
(1996)
Report of the Defense Science Board Task Force On Information Warfare-Defense (IW-D)
-
-
-
41
-
-
0003994024
-
-
President's Commission on Critical Infrastructure Protection, Final Report, October, (accessed 14 September 2011)
-
President's Commission on Critical Infrastructure Protection, Final Report, Critical Foundations: Protecting America's Infrastructures, October 1997, p.10 http://www.fas.org/sgp/library/pccip.pdf (accessed 14 September 2011).
-
(1997)
Critical Foundations: Protecting America's Infrastructures
, pp. 10
-
-
-
42
-
-
84867307264
-
-
Director, National Security Agency, testimony before the Senate Governmental Affairs Committee, 24 June, (accessed 26 September 2011)
-
Kenneth A. Minihan, Director, National Security Agency, 'Cyber Attack: Is Our Nation at Risk?', testimony before the Senate Governmental Affairs Committee, 24 June 1998 http://www.defense.gov/speeches/speech.aspx?speechid=704 (accessed 26 September 2011)
-
(1998)
Cyber Attack: Is Our Nation At Risk?
-
-
Minihan, K.A.1
-
43
-
-
84867287385
-
-
Transcript of a press conference at the Pentagon held by, 16 April, (accessed 14 September 2011)
-
Transcript of a press conference at the Pentagon held by Kenneth H. Bacon, Assistant Secretary of Defense for Public Affairs, 16 April 1998 http://www.defense.gov/transcripts/transcript.aspx?transcriptid=793 (accessed 14 September 2011)
-
(1998)
Assistant Secretary of Defense For Public Affairs
-
-
Bacon, K.H.1
-
44
-
-
84867321130
-
Eligible Receiver
-
See also, 16 April
-
See also Bill Gertz, 'Eligible Receiver', Washington Times, 16 April 1998 http://www.deaddrop.com/InfoSec/Papers/EligibleReceiver.html
-
(1998)
Washington Times
-
-
Gertz, B.1
-
45
-
-
84867326090
-
-
Aspen, Colorado, 21 July, (accessed 14 September 2011)
-
John J. Hamre, Deputy Secretary of Defense, speech to the Fortune 500 CIO Forum, Aspen, Colorado, 21 July 1998 http://www.fas.org/irp/congress/1998_hr/98-06-llhamre.htm (accessed 14 September 2011).
-
(1998)
Deputy Secretary of Defense, Speech to The Fortune 500 CIO Forum
-
-
Hamre, J.J.1
-
47
-
-
84867287386
-
-
Transcript of a press conference by
-
Transcript of a press conference by Kenneth H. Bacon, http://www.defense.gov/transcripts/transcript.aspx?transcriptid=793
-
-
-
Bacon, K.H.1
-
48
-
-
84867326092
-
Hackers Victimize CalTSO
-
9 June
-
'Hackers Victimize CalTSO', Los Angeles Times, 9 June 2001
-
(2001)
Los Angeles Times
-
-
-
49
-
-
6244245533
-
Virtual Defense
-
James Adams, 'Virtual Defense', Foreign Affairs 80/3 (2001) p.99.
-
(2001)
Foreign Affairs
, vol.80
, Issue.3
, pp. 99
-
-
Adams, J.1
|