메뉴 건너뛰기




Volumn , Issue , 2009, Pages 1-367

Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities

Author keywords

[No Author keywords available]

Indexed keywords

LAW ENFORCEMENT; NETWORK SECURITY;

EID: 84988815150     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.17226/12651     Document Type: Book
Times cited : (145)

References (204)
  • 1
    • 44949162596 scopus 로고    scopus 로고
    • Bush Orders Guidelines for Cyber-Warfare
    • February 7
    • Bradley Graham, "Bush Orders Guidelines for Cyber-Warfare," Washington Post, February 7, 2003, p. A01.
    • (2003) Washington Post , pp. A01
    • Graham, B.1
  • 3
    • 84898154813 scopus 로고    scopus 로고
    • November 29, available at
    • Reuters, "Global Cellphone Penetration Reaches 50 Pct," November 29, 2007, available at http://investing.reuters.co.uk/news/articleinvesting.aspx?type=media&storyID=nL29172095.
    • (2007) Global Cellphone Penetration Reaches 50 Pct
  • 5
    • 84988552861 scopus 로고    scopus 로고
    • The National Academies Press, Washington D.C
    • National Research Council, Toward a Safer and More Secure Cyberspace, The National Academies Press, Washington D.C., 2007.
    • (2007) Toward a Safer and More Secure Cyberspace
  • 6
    • 84895680647 scopus 로고    scopus 로고
    • Estonia, Where Being Wired Is a Human Right
    • July 1, available at
    • Colin Woodward, "Estonia, Where Being Wired Is a Human Right," Christian Science Monitor, July 1, 2003, available at http://www.csmonitor.com/2003/0701/p07s01-woeu.html
    • (2003) Christian Science Monitor
    • Woodward, C.1
  • 7
    • 84988552861 scopus 로고    scopus 로고
    • The National Academies Press, Washington, D.C
    • National Research Council, Toward a Safer and More Secure Cyberspace, The National Academies Press, Washington, D.C., 2007.
    • (2007) Toward a Safer and More Secure Cyberspace
  • 9
    • 84988552861 scopus 로고    scopus 로고
    • The National Academies Press, Washington D.C
    • National Research Council, Toward a Safer and More Secure Cyberspace, The National Academies Press, Washington D.C., 2007.
    • (2007) Toward a Safer and More Secure Cyberspace
  • 11
    • 84988552861 scopus 로고    scopus 로고
    • The National Academies Press, Washington, D.C
    • National Research Council, Toward a Safer and More Secure Cyberspace, The National Academies Press, Washington, D.C., 2007.
    • (2007) Toward a Safer and More Secure Cyberspace
  • 12
    • 84988804890 scopus 로고    scopus 로고
    • British Document Outlines Early Encryption Discovery
    • December 24
    • Peter Wayner, "British Document Outlines Early Encryption Discovery," New York Times, December 24, 1997, available at http://www.nytimes.com/library/cyber/week/122497encrypt.html#1.
    • (1997) New York Times
    • Wayner, P.1
  • 15
    • 84988552861 scopus 로고    scopus 로고
    • The National Academies Press, Washington D.C
    • National Research Council, Toward a Safer and More Secure Cyberspace, The National Academies Press, Washington D.C., 2007.
    • (2007) Toward a Safer and More Secure Cyberspace
  • 17
    • 84906204133 scopus 로고    scopus 로고
    • Cambridge, Mass., available at
    • Daniel Geer, Measuring Security, Cambridge, Mass., 2006, available at http://geer.tinho.net/measuringsecurity.tutorialv2.pdf.
    • (2006) Measuring Security
    • Geer, D.1
  • 18
    • 84861324665 scopus 로고    scopus 로고
    • presented at the National Defense Industrial Association Defense Software Strategy Summit, October 19, available at
    • Center for Strategic and International Studies, "An Assessment of the National Security Software Industrial Base," presented at the National Defense Industrial Association Defense Software Strategy Summit, October 19, 2006, available at http://www.diig-csis.org/pdf/Chao_SoftwareIndustrialBase_NDIASoftware.pdf.
    • (2006) An Assessment of the National Security Software Industrial Base
  • 21
    • 84988879232 scopus 로고
    • ESD-TR-74-193, June, HQ Electronic Systems Division, Hanscom Air Force Base, available at
    • P.A. Karger and R.R. Schell, Multics Security Evaluation: Vulnerability Analysis, ESD-TR-74-193, Vol. II, June 1974, HQ Electronic Systems Division, Hanscom Air Force Base, available at http://csrc.nist.gov/publications/history/karg74.pdf.
    • (1974) Multics Security Evaluation: Vulnerability Analysis , vol.2
    • Karger, P.A.1    Schell, R.R.2
  • 27
    • 84862357192 scopus 로고    scopus 로고
    • AV Vendors Split over FBI Trojan Snoops
    • (November 27)
    • John Leyden, "AV Vendors Split over FBI Trojan Snoops," The Register, November 27, 2001, available at http://www.theregister.co.uk/2001/11/27/av_vendors_split_over_fbi/).
    • (2001) The Register
    • Leyden, J.1
  • 28
    • 84882765166 scopus 로고    scopus 로고
    • Will Security Firms Detect Police Spyware?
    • July 17
    • Declan McCullagh and Anne Broache, "Will Security Firms Detect Police Spyware?," CNET News, July 17, 2007, available at http://news.cnet.com/2100-7348-6197020.html.
    • (2007) CNET News
    • McCullagh, D.1    Broache, A.2
  • 30
    • 35348822468 scopus 로고    scopus 로고
    • Fostering Email Security Awareness: The West Point Carronade
    • Aron J. Ferguson, "Fostering Email Security Awareness: The West Point Carronade," EDUCAUSE Quarterly 28(1):54-57, 2005, available at http://net.educause.edu/ir/library/pdf/EQM0517.pdf.
    • (2005) EDUCAUSE Quarterly , vol.28 , Issue.1 , pp. 54-57
    • Ferguson, A.J.1
  • 31
    • 72849151945 scopus 로고    scopus 로고
    • Social Engineering, the USB Way
    • June 7
    • Steve Stasiukonis, "Social Engineering, the USB Way," Dark Reading, June 7, 2006, available at http://www.darkreading.com/document.asp?doc_id=95556&WT.svl=column1_1.
    • (2006) Dark Reading
    • Stasiukonis, S.1
  • 32
    • 70249138620 scopus 로고    scopus 로고
    • June, available at
    • LURHQ, "Phatbot Trojan Analysis," June 2004, available at http://www.lurhq.com/phatbot.html.
    • (2004) Phatbot Trojan Analysis
  • 33
    • 24344436426 scopus 로고    scopus 로고
    • The Blaster Worm: Then and Now
    • Michael Bailey, Evan Cooke, Farnam Jahanian, David Watson, and Jose Nazario, "The Blaster Worm: Then and Now," IEEE Security and Privacy 3(4):26-31, 2005, available at http://ieeexplore.ieee.org/iel5/8013/32072/01492337.pdf?arnumber=1492337.
    • (2005) IEEE Security and Privacy , vol.3 , Issue.4 , pp. 26-31
    • Bailey, M.1    Cooke, E.2    Jahanian, F.3    Watson, D.4    Nazario, J.5
  • 34
    • 70249138620 scopus 로고    scopus 로고
    • March 15, available at
    • Joe Stewart, "Phatbot Trojan Analysis," March 15, 2004, available at http://www.secureworks.com/research/threats/phatbot/?threat=phatbot.
    • (2004) Phatbot Trojan Analysis
    • Stewart, J.1
  • 35
    • 84988552861 scopus 로고    scopus 로고
    • The National Academies Press, Washington D.C
    • National Research Council, Toward a Safer and More Secure Cyberspace, The National Academies Press, Washington D.C., 2007.
    • (2007) Toward a Safer and More Secure Cyberspace
  • 39
    • 68949107365 scopus 로고    scopus 로고
    • Joint Publication 3-13, U.S. Department of Defense, Washington, D.C., February 2006, available at
    • Joint Chiefs of Staff, Information Operations, Joint Publication 3-13, U.S. Department of Defense, Washington, D.C., February 2006, available at www.dtic.mil/doctrine/jel/new_pubs/jp3_13.pdf.
    • Information Operations
  • 40
    • 0242314805 scopus 로고    scopus 로고
    • undated publication, available at
    • David Moore, "The Spread of the Sapphire/Slammer Worm," undated publication, available at http://www.caida.org/publications/papers/2003/sapphire/sapphire.html.
    • The Spread of the Sapphire/Slammer Worm
    • Moore, D.1
  • 42
    • 84881434856 scopus 로고    scopus 로고
    • DOD definitions for "strategic operations" and "strategic air warfare," in Joint Chiefs of Staff, Joint Publication 1-02, Department of Defense, Washington, D.C., April 12, 2001 (as amended through October 17), available at
    • DOD definitions for "strategic operations" and "strategic air warfare," in Joint Chiefs of Staff, Dictionary of Military and Associated Terms, Joint Publication 1-02, Department of Defense, Washington, D.C., April 12, 2001 (as amended through October 17, 2008), available at http://www.dtic.mil/doctrine/jel/new_pubs/jp1_02.pdf.
    • (2008) Dictionary of Military and Associated Terms
  • 43
    • 84988884118 scopus 로고    scopus 로고
    • Warfare, Terrorism, and Psychology
    • in Bruce Bongar et al., eds., Oxford University Press
    • L. Morgan Banks and Larry James, "Warfare, Terrorism, and Psychology," pp. 216-222 in Psychology of Terrorism, Bruce Bongar et al., eds., Oxford University Press, 2007.
    • (2007) Psychology of Terrorism , pp. 216-222
    • Banks, L.M.1    James, L.2
  • 45
    • 84988820158 scopus 로고    scopus 로고
    • American Forces Press Service, May 4, available at
    • Jim Garamone, "Love Bug Bites DoD, Others," American Forces Press Service, May 4, 2000, available at http://www.defenselink.mil/news/newsarticle.aspx?id=45220
    • (2000) Love Bug Bites DoD, Others
    • Garamone, J.1
  • 47
    • 36448960729 scopus 로고    scopus 로고
    • DOD JP1-02, April 12 (as amended through September 30, 2008), available at
    • DOD JP1-02, Dictionary of Military and Associated Terms, April 12, 2001 (as amended through September 30, 2008), available at http://www.dtic.mil/doctrine/jel/new_pubs/jp1_02.pdf.
    • (2001) Dictionary of Military and Associated Terms
  • 49
    • 84988552861 scopus 로고    scopus 로고
    • The National Academies Press, Washington, D.C
    • National Research Council, Toward a Safer and More Secure Cyberspace, The National Academies Press, Washington, D.C., 2007.
    • (2007) Toward a Safer and More Secure Cyberspace
  • 50
    • 84988827317 scopus 로고    scopus 로고
    • available at
    • Department of Homeland Security, "History: Who Became Part of the Department?," 2007, available at http://www.dhs.gov/xabout/history/editorial_0133.shtm.
    • (2007) History: Who Became Part of the Department?
  • 51
  • 53
    • 84988821298 scopus 로고    scopus 로고
    • First Case of 'Drive-by Pharming' Identified in the Wild
    • January 22, available at
    • Ellen Messmer, "First Case of 'Drive-by Pharming' Identified in the Wild," Network World, January 22, 2008, available at http://www.networkworld.com/news/2008/012208-drive-by-pharming.html.
    • (2008) Network World
    • Messmer, E.1
  • 54
    • 84988879789 scopus 로고
    • The Moscow Bug Hunt
    • July 10, available at
    • Jay Peterzell, "The Moscow Bug Hunt," Time, July 10, 1989, available at http://www.time.com/time/magazine/article/0,9171,958127-4,00.html.
    • (1989) Time
    • Peterzell, J.1
  • 55
    • 78651512289 scopus 로고    scopus 로고
    • Xerox Helped Win The Cold War
    • available at
    • Ron Laytner, "Xerox Helped Win The Cold War," Edit International, 2006, available at http://www.editinternational.com/read.php?id=47ddf19823b89.
    • (2006) Edit International
    • Laytner, R.1
  • 56
    • 35348984496 scopus 로고    scopus 로고
    • The Athens Affair
    • July available at
    • Vassilis Prevelakis and Diomidis Spinellis, "The Athens Affair," IEEE Spectrum, July 2007, available at http://www.spectrum.ieee.org/print/5280.
    • (2007) IEEE Spectrum
    • Prevelakis, V.1    Spinellis, D.2
  • 57
    • 84988795849 scopus 로고    scopus 로고
    • Computer Worm Snarls Web: Electronic Attack Also Affects Phone Service, BOFA's ATM Network
    • January 26, available at
    • Aaron Davis, "Computer Worm Snarls Web: Electronic Attack Also Affects Phone Service, BOFA's ATM Network," San Jose Mercury News, January 26, 2003, available at http://www.bayarea.com/mld/mercurynews/5034748.htm+atm+slammer+virus&hl=en
    • (2003) San Jose Mercury News
    • Davis, A.1
  • 58
    • 84906204133 scopus 로고    scopus 로고
    • available at
    • Daniel E. Geer, "Measuring Security," 2006, pp. 170-178, available at http://geer.tinho.net/measuringsecurity.tutorialv2.pdf.
    • (2006) Measuring Security , pp. 170-178
    • Geer, D.E.1
  • 59
  • 60
    • 33847759837 scopus 로고    scopus 로고
    • Flying and Fighting in Cyberspace
    • Spring available at
    • Michael W. Wynne, "Flying and Fighting in Cyberspace," Air & Space Power Journal, Spring 2007, available at http://www.airpower.maxwell.af.mil/airchronicles/apj/apj07/spr07/wynnespr07.html.
    • (2007) Air & Space Power Journal
    • Wynne, M.W.1
  • 61
    • 79960209877 scopus 로고    scopus 로고
    • Warfighting in Cyberspace
    • Lt. Gen. Keith B. Alexander, "Warfighting in Cyberspace," Joint Force Quarterly 46(3):58-61, 2007.
    • (2007) Joint Force Quarterly , vol.46 , Issue.3 , pp. 58-61
    • Alexander, K.B.1
  • 63
    • 79960209877 scopus 로고    scopus 로고
    • Warfighting in Cyberspace
    • July available at
    • Keith B. Alexander, "Warfighting in Cyberspace," Joint Force Quarterly, July 2007, available at http://www.military.com/forums/0,15240,143898,00.html.
    • (2007) Joint Force Quarterly
    • Alexander, K.B.1
  • 65
    • 84988820126 scopus 로고    scopus 로고
    • Memo of Robert Gates (Secretary of Defense) to DOD regarding Command and Control for Military Cyberspace Missions, November 12, 2008. Copy available from the NRC
    • Memo of Robert Gates (Secretary of Defense) to DOD regarding Command and Control for Military Cyberspace Missions, November 12, 2008. Copy available from the NRC.
  • 66
    • 84988909722 scopus 로고    scopus 로고
    • Minister of Defense of Estonia, presentation to Centre of Strategic and International Studies, November 28, of transcript, available at
    • Jaak Aaviksoo, Minister of Defense of Estonia, presentation to Centre of Strategic and International Studies, November 28, 2007, p. 3. of transcript, available at http://www.csis.org/component/option,com_csis_press/task,view/id,3525/.
    • (2007) , pp. 3
    • Aaviksoo, J.1
  • 67
    • 34547999111 scopus 로고    scopus 로고
    • In Estonia, What May Be the First War in Cyberspace
    • May 28
    • Mark Landler and John Markoff, "In Estonia, What May Be the First War in Cyberspace," International Herald Tribune, May 28, 2007.
    • (2007) International Herald Tribune
    • Landler, M.1    Markoff, J.2
  • 68
    • 62849125514 scopus 로고    scopus 로고
    • Hackers Take Down the Most Wired Country in Europe
    • Issue 15.09, August 21
    • Joshua Davis, "Hackers Take Down the Most Wired Country in Europe," Wired, Issue 15.09, August 21, 2007.
    • (2007) Wired
    • Davis, J.1
  • 69
    • 84988903620 scopus 로고    scopus 로고
    • McAfee Virtual Criminology Report
    • MacAfee Corp., "Cybercrime: The Next Wave," McAfee Virtual Criminology Report, 2007, p. 9.
    • (2007) Cybercrime: The Next Wave , pp. 9
  • 70
    • 84988820916 scopus 로고    scopus 로고
    • Economist, "A Cyber-riot," May 10
    • Economist, "A Cyber-riot," May 10, 2007.
    • (2007)
  • 71
    • 84988879299 scopus 로고    scopus 로고
    • Minister of Defense of Estonia, presentation to Centre of Strategic and International Studies, November 28, of transcript, available at
    • Jaak Aaviksoo, Minister of Defense of Estonia, presentation to Centre of Strategic and International Studies, November 28, 2007, p. 7. of transcript, available at http://www.csis.org/component/option,com_csis_press/task,view/id,3525/.
    • (2007) , pp. 7
    • Aaviksoo, J.1
  • 72
    • 84988879818 scopus 로고    scopus 로고
    • Cybercrime: The Next Wave
    • MacAfee Corporation, "Cybercrime: The Next Wave," McAfee Virtual Criminology Report, 2007, p. 11.
    • (2007) McAfee Virtual Criminology Report , pp. 11
  • 73
    • 39749115454 scopus 로고    scopus 로고
    • Russia Accused of Unleashing Cyberwar to Disable Estonia
    • May 17, available at
    • Ian Traynor, "Russia Accused of Unleashing Cyberwar to Disable Estonia," Guardian, May 17, 2007, available at http://www.guardian.co.uk/russia/article/0, 2081438,00.html.
    • (2007) Guardian
    • Traynor, I.1
  • 75
    • 76949088842 scopus 로고    scopus 로고
    • Before the Gunfire, Cyberattacks
    • August 13, available at
    • John Markoff, "Before the Gunfire, Cyberattacks," New York Times, August 13, 2008, available at http://www.nytimes.com/2008/08/13/technology/13cyber.html?_r=1&oref=slogin.
    • (2008) New York Times
    • Markoff, J.1
  • 76
    • 84988909728 scopus 로고    scopus 로고
    • Gates Unveils Overhaul of Weapons Priorities
    • April 6, available at
    • "Gates Unveils Overhaul of Weapons Priorities," Wall Street Journal, April 6, 2009, available at http://online.wsj.com/article/SB123904207376593845.html?mod=googlenews_wsj.
    • (2009) Wall Street Journal
  • 77
    • 84988884112 scopus 로고    scopus 로고
    • Broad Agency Announcement (BAA ESC 07-0001), OL-AA 950 ELSG/KIS, Network Warfare Operations Capabilities (NWOC), Technology Concept Demonstrations, available at
    • Broad Agency Announcement (BAA ESC 07-0001), OL-AA 950 ELSG/KIS, Network Warfare Operations Capabilities (NWOC), Technology Concept Demonstrations, available at http://www.herbb.hanscom.af.mil/tbbs/R1528/Final_NWOC_BAA_Amend_5.doc.
  • 78
    • 84988820923 scopus 로고    scopus 로고
    • May 3, available at
    • Army Offensive Information Operations Technologies Broad Agency Announcement, May 3, 2007, available at https://abop.monmouth.army.mil/baas.nsf/Solicitation+By+Number/9BE5D8EAE22A6339852572D4004F0DD5/$File/BAA+Army+Offensive+Information+Operations+Technologies.doc.
    • (2007)
  • 80
    • 84988830925 scopus 로고    scopus 로고
    • January 7, available at
    • Swa Frantzen, WMF FAQ, January 7, 2006, available at http://isc.sans.org/diary.html?storyid=994.
    • (2006) WMF FAQ
    • Frantzen, S.1
  • 81
    • 72849151945 scopus 로고    scopus 로고
    • Social Engineering, the USB Way
    • June 7, available at
    • Steve Stasiukonis, "Social Engineering, the USB Way," Dark Reading, June 7, 2006, available at http://www.darkreading.comdocument.asp?doc_id=95556&WT.svl=column1_1.
    • (2006) Dark Reading
    • Stasiukonis, S.1
  • 83
    • 84988817997 scopus 로고    scopus 로고
    • Election Defeat Marks Abe's Political Future
    • July 30, available at
    • Pino Cazzaniga, "Election Defeat Marks Abe's Political Future," AsiaNews.it, July 30, 2007, available at http://www.asianews.it/index.php?l=en&art=9962.
    • (2007) AsiaNews.it
    • Cazzaniga, P.1
  • 84
    • 79960435425 scopus 로고    scopus 로고
    • Cyberwar: A New Weapon Awaits a Set of Rules
    • July 8
    • Bradley Graham, "Cyberwar: A New Weapon Awaits a Set of Rules," Washington Post, July 8, 1998, p. A1.
    • (1998) Washington Post , pp. A1
    • Graham, B.1
  • 88
    • 14544291305 scopus 로고    scopus 로고
    • Computer Crime and Intellectual Property Section, Criminal Division, July, available at
    • U.S. Department of Justice, Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations, Computer Crime and Intellectual Property Section, Criminal Division, July 2002, available at http://www.usdoj.gov/criminal/cybercrime/s&smanual2002.htm#_VB1_.
    • (2002) Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations
  • 89
    • 84917390088 scopus 로고    scopus 로고
    • Local Police Want Right to Jam Wireless Signals
    • February 1 available at
    • Spencer S. Hsu, "Local Police Want Right to Jam Wireless Signals," Washington Post, February 1, 2009, p. A02, available at http://www.washingtonpost.com/wp-dyn/content/article/2009/01/31/AR2009013101548_pf.html.
    • (2009) Washington Post , pp. A02
    • Hsu, S.S.1
  • 90
    • 84917390088 scopus 로고    scopus 로고
    • Local Police Want Right to Jam Wireless Signals
    • February 1, available at
    • Spencer S. Hsu, "Local Police Want Right to Jam Wireless Signals," Washington Post, February 1, 2009, p. A02, available at http://www.washingtonpost.com/wp-dyn/content/article/2009/01/31/AR2009013101548_pf.html.
    • (2009) Washington Post , pp. A02
    • Hsu, S.S.1
  • 91
    • 84988909725 scopus 로고    scopus 로고
    • Bill Would Allow Prisons to Jam Cell Phone Signals
    • January 16, available at
    • Matthew Harwood, "Bill Would Allow Prisons to Jam Cell Phone Signals," Security Management, January 16, 2009, available at http://www.securitymanagement.com/news/bill-would-allow-prisons-jam-cell-phone-signals-005082.
    • (2009) Security Management
    • Harwood, M.1
  • 92
    • 0345814025 scopus 로고
    • Criminal Law Defenses: A Systematic Analysis
    • available at
    • Paul H. Robinson, "Criminal Law Defenses: A Systematic Analysis," Columbia Law Review 82:199-291, 1982, available at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=662043.
    • (1982) Columbia Law Review , vol.82 , pp. 199-291
    • Robinson, P.H.1
  • 94
    • 84858931295 scopus 로고    scopus 로고
    • June 18, available at
    • Associated Press, "Hatch Wants to Fry Traders' PCs," June 18, 2003, available at http://www.wired.com/entertainment/music/news/2003/06/59298.
    • (2003) Hatch Wants to Fry Traders' PCs
  • 95
    • 84869022574 scopus 로고    scopus 로고
    • Worm Infects Millions of Computers Worldwide
    • January 22, available at
    • John Markoff, "Worm Infects Millions of Computers Worldwide," New York Times, January 22, 2009, available at http://www.nytimes.com/2009/01/23/technology/internet/23worm.html.
    • (2009) New York Times
    • Markoff, J.1
  • 96
    • 84988879271 scopus 로고    scopus 로고
    • August 20, available at
    • Excalibur R&D, "Letter of Marque and Reprisal for Fighting Terrorists," August 20, 2008, available at http://excaliburrd.com/cs/blogs/excalibur/Excalibur%20Letter%20of%20Marque%20paper%2015%20August%202008.pdf.
    • (2008) Letter of Marque and Reprisal for Fighting Terrorists
  • 97
    • 84988552861 scopus 로고    scopus 로고
    • The National Academies Press, Washington, D.C
    • National Research Council, Toward a Safer and More Secure Cyberspace, The National Academies Press, Washington, D.C., 2007.
    • (2007) Toward a Safer and More Secure Cyberspace
  • 98
    • 84988884074 scopus 로고    scopus 로고
    • a presentation at the Carnegie Conference on Non-Proliferation, November 7, available at
    • Robert S. Norris, "The Difficult Discipline of Nuclear History: A Perspective," a presentation at the Carnegie Conference on Non-Proliferation, November 7, 2005, available at http://www.carnegieendowment.org/static/npp/2005conference/presentations/Norris_Nuclear_History_Slides.pdf
    • (2005) The Difficult Discipline of Nuclear History: A Perspective
    • Norris, R.S.1
  • 99
    • 76149108629 scopus 로고    scopus 로고
    • Sandia National Laboratories, Albuquerque, N.Mex., January, available at
    • David M. Kunsman and Douglas B. Lawson, A Primer on U.S. Strategic Nuclear Policy, Sandia National Laboratories, Albuquerque, N.Mex., January 2001, available at http://www.nti.org/e_research/official_docs/labs/prim_us_nuc_pol.pdf.
    • (2001) A Primer on U.S. Strategic Nuclear Policy
    • Kunsman, D.M.1    Lawson, D.B.2
  • 103
    • 84988831212 scopus 로고    scopus 로고
    • Cyberattacks in the Present Tense, Estonian Says
    • November 28, available at
    • William Jackson, "Cyberattacks in the Present Tense, Estonian Says," Government Computing News, November 28, 2007, available at http://www.gcn.com/online/vol1_no1/45476-1.html.
    • (2007) Government Computing News
    • Jackson, W.1
  • 104
    • 85024101061 scopus 로고    scopus 로고
    • Trying to Kill Fidel Castro
    • June 27
    • Glenn Kessler, "Trying to Kill Fidel Castro," Washington Post, June 27, 2007, p. A06.
    • (2007) Washington Post , pp. A06
    • Kessler, G.1
  • 105
    • 84895289604 scopus 로고    scopus 로고
    • National Cyber Security Initiative Will Have a Dozen Parts
    • August 1, available at
    • Jill R. Aitoro, "National Cyber Security Initiative Will Have a Dozen Parts," Nextgov, August 1, 2008, available at http://www.nextgov.com/nextgov/ng_20080801_9053.php.
    • (2008) Nextgov
    • Aitoro, J.R.1
  • 106
    • 84988879524 scopus 로고    scopus 로고
    • Cyber Chief Argues for New Approaches
    • August 22, available at
    • Wyatt Kash, "Cyber Chief Argues for New Approaches," Government Computer News, August 22, 2008, available at http://gcn.com/articles/2008/08/22/cyber-chief-argues-for-new-approaches.aspx.
    • (2008) Government Computer News
    • Kash, W.1
  • 109
    • 84988850089 scopus 로고    scopus 로고
    • The Records of the Federal Convention of 1787, at 318 (1911), Max Farrand, ed., rev. edition, 1966
    • The Records of the Federal Convention of 1787, at 318 (1911), Max Farrand, ed., rev. edition, 1966.
  • 110
    • 84988800115 scopus 로고    scopus 로고
    • Prize Cases, 67 U.S. 635 (1863) ("If a war be made by invasion of a foreign nation, the President is not only authorized but bound to resist force by force")
    • Prize Cases, 67 U.S. 635 (1863) ("If a war be made by invasion of a foreign nation, the President is not only authorized but bound to resist force by force").
  • 113
    • 67650330939 scopus 로고    scopus 로고
    • 128 S.Ct. 1346, 1356
    • Medellin v. Texas, 128 S.Ct. 1346, 1356 (2008)
    • (2008) Medellin v. Texas
  • 114
    • 84865407269 scopus 로고    scopus 로고
    • Information Warfare as International Coercion: Elements of a Legal Framework
    • Christopher C. Joyner and Catherine Lotrionte, "Information Warfare as International Coercion: Elements of a Legal Framework," European Journal of International Law 12(5):825-865, 2001.
    • (2001) European Journal of International Law , vol.12 , Issue.5 , pp. 825-865
    • Joyner, C.C.1    Lotrionte, C.2
  • 117
    • 84988884129 scopus 로고    scopus 로고
    • accessed at
    • United Nations Security Council Resolution 1368 (2001), accessed at http://daccessdds.un.org/doc/UNDOC/GEN/N01/533/82/PDF/N0153382.pdf?OpenElement.
    • (2001)
  • 119
    • 0348225147 scopus 로고    scopus 로고
    • Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework
    • Michael Schmitt, "Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework," Columbia Journal of Transnational Law 37:885-937, 1999
    • (1999) Columbia Journal of Transnational Law , vol.37 , pp. 885-937
    • Schmitt, M.1
  • 120
    • 84988884135 scopus 로고    scopus 로고
    • New Tools, New Rules: International Law and Information Operations
    • in G. David and T. McKeldin, eds., Potomac Books, Inc
    • Duncan B. Hollis, "New Tools, New Rules: International Law and Information Operations," pp. 59-72 in Ideas As Weapons: Influence and Perception in Modern Warfare, G. David and T. McKeldin, eds., Potomac Books, Inc., 2009;
    • (2009) Ideas As Weapons: Influence and Perception in Modern Warfare , pp. 59-72
    • Hollis, D.B.1
  • 121
    • 84893114477 scopus 로고    scopus 로고
    • Information Warfare and International Law on the Use of Force
    • Jason Barkham, "Information Warfare and International Law on the Use of Force," New York University International Law and Politics 34:57-113, 2001.
    • (2001) New York University International Law and Politics , vol.34 , pp. 57-113
    • Barkham, J.1
  • 123
    • 84893114477 scopus 로고    scopus 로고
    • Information Warfare and International Law on the Use of Force
    • Jason Barkham, "Information Warfare and International Law on the Use of Force," New York University International Law and Politics 34:57-113, 2001.
    • (2001) New York University International Law and Politics , vol.34 , pp. 57-113
    • Barkham, J.1
  • 124
    • 84988884135 scopus 로고    scopus 로고
    • New Tools, New Rules: International Law and Information Operations
    • in G. David and T. McKeldin, eds., Potomac Books, Inc
    • Duncan B. Hollis, "New Tools, New Rules: International Law and Information Operations," pp. 59-72 in Ideas As Weapons: Influence and Perception in Modern Warfare, G. David and T. McKeldin, eds., Potomac Books, Inc., 2009.
    • (2009) Ideas As Weapons: Influence and Perception in Modern Warfare , pp. 59-72
    • Hollis, D.B.1
  • 125
    • 0348225147 scopus 로고    scopus 로고
    • Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework
    • Michael Schmitt, "Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework," Columbia Journal of Transnational Law 37:885-937, 1999;
    • (1999) Columbia Journal of Transnational Law , vol.37 , pp. 885-937
    • Schmitt, M.1
  • 127
    • 84893114477 scopus 로고    scopus 로고
    • Information Warfare and International Law on the Use of Force
    • Jason Barkham, "Information Warfare and International Law on the Use of Force," New York University International Law and Politics 34:57-113, 2001.
    • (2001) New York University International Law and Politics , vol.34 , pp. 57-113
    • Barkham, J.1
  • 128
    • 0348225147 scopus 로고    scopus 로고
    • Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework
    • Michael Schmitt, "Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework," Columbia Journal of Transnational Law 37:885-937, 1999.
    • (1999) Columbia Journal of Transnational Law , vol.37 , pp. 885-937
    • Schmitt, M.1
  • 129
    • 84893114477 scopus 로고    scopus 로고
    • Information Warfare and International Law on the Use of Force
    • Jason Barkham, "Information Warfare and International Law on the Use of Force," New York University International Law and Politics 34:57-113, 2001.
    • (2001) New York University International Law and Politics , vol.34 , pp. 57-113
    • Barkham, J.1
  • 130
    • 84893114477 scopus 로고    scopus 로고
    • Information Warfare and International Law on the Use of Force
    • Jason Barkham, "Information Warfare and International Law on the Use of Force," New York University International Law and Politics 34:57-113, 2001
    • (2001) New York University International Law and Politics , vol.34 , pp. 57-113
    • Barkham, J.1
  • 131
    • 84930901331 scopus 로고
    • The International Law of Intelligence Collection
    • in John Norton Moore et al., eds
    • W. Hays Parks, "The International Law of Intelligence Collection," pp. 433-434 in National Security Law, John Norton Moore et al., eds., 1990
    • (1990) National Security Law , pp. 433-434
    • Hays Parks, W.1
  • 132
    • 84988831220 scopus 로고    scopus 로고
    • Territorially Intrusive Intelligence Collection and International Law
    • available at
    • Roger D. Scott, "Territorially Intrusive Intelligence Collection and International Law, Air Force Law Review 46:217-226, 1999, available at http://permanent.access.gpo.gov/lps28111/Vol.46(1999)/scottfx4[1].doc.
    • (1999) Air Force Law Review , vol.46 , pp. 217-226
    • Scott, R.D.1
  • 133
    • 84988831220 scopus 로고    scopus 로고
    • Territorially Intrusive Intelligence Collection and International Law
    • available at
    • Roger D. Scott, "Territorially Intrusive Intelligence Collection and International Law, Air Force Law Review 46:217-226, 1999; available at http://permanent.access.gpo.gov/lps28111/Vol.46(1999)/scottfx4[1].doc.
    • (1999) Air Force Law Review , vol.46 , pp. 217-226
    • Scott, R.D.1
  • 134
    • 84865327664 scopus 로고    scopus 로고
    • Information Warfare and Neutrality
    • November
    • George K. Walker, "Information Warfare and Neutrality," Vanderbilt Journal of Transnational Law 33(5):1079-1200, November 2000.
    • (2000) Vanderbilt Journal of Transnational Law , vol.33 , Issue.5 , pp. 1079-1200
    • Walker, G.K.1
  • 135
    • 84920399357 scopus 로고    scopus 로고
    • State Responsibility for the Acts of Private Armed Groups
    • Spring
    • Derek Jinks, "State Responsibility for the Acts of Private Armed Groups," Chicago Journal of International Law 4(1):83-96, Spring 2003).
    • (2003) Chicago Journal of International Law , vol.4 , Issue.1 , pp. 83-96
    • Jinks, D.1
  • 136
    • 84893114477 scopus 로고    scopus 로고
    • Information Warfare and International Law on the Use of Force
    • Jason Barkham, "Information Warfare and International Law on the Use of Force," New York University International Law and Politics 34:57-113, 2001.
    • (2001) New York University International Law and Politics , vol.34 , pp. 57-113
    • Barkham, J.1
  • 137
    • 77954573134 scopus 로고    scopus 로고
    • Foreign Military Studies Office, Fort Leavenworth, Kans
    • Timothy Thomas, Decoding the Virtual Dragon, Foreign Military Studies Office, Fort Leavenworth, Kans., 2007.
    • (2007) Decoding the Virtual Dragon
    • Thomas, T.1
  • 138
    • 84988821442 scopus 로고
    • (House of Representatives), July 25, available at
    • Conference Report on H.R. 1455 (House of Representatives), July 25, 1991, available at http://www.fas.org/irp/congress/1991_cr/h910725-ia.htm.
    • (1991)
  • 142
    • 85024101061 scopus 로고    scopus 로고
    • Trying to Kill Fidel Castro
    • Fidel Castro in June 27
    • Fidel Castro in 1960. "Trying to Kill Fidel Castro," Washington Post, June 27, 2007, p. A06.
    • (1960) Washington Post , pp. A06
  • 143
    • 79951987638 scopus 로고    scopus 로고
    • U.S. Debates Deterrence for Nuclear Terrorism
    • May 8
    • David E. Sanger and Thom Shanker, "U.S. Debates Deterrence for Nuclear Terrorism," New York Times, May 8, 2007.
    • (2007) New York Times
    • Sanger, D.E.1    Shanker, T.2
  • 144
    • 0004243165 scopus 로고    scopus 로고
    • Harwood Academic Publishers, Amsterdam, the Netherlands
    • British Medical Association, Biotechnology, Weapons and Humanity, Harwood Academic Publishers, Amsterdam, the Netherlands, 1999
    • (1999) Biotechnology, Weapons and Humanity
  • 145
    • 0035179994 scopus 로고    scopus 로고
    • Genomics and Future Biological Weapons: The Need for Preventive Action by the Biomedical Community
    • November 2001, available at The issue of such targeted weapons was raised as early as 1970 in the professional military literature
    • Claire M. Fraser and Malcolm R. Dando, "Genomics and Future Biological Weapons: The Need for Preventive Action by the Biomedical Community," Nature Genetics 29(3):253-256, November 2001, available at http://cmbi.bjmu.edu.cn/news/report/2001/insight-anthrax/feature/Genomics%20and%20future%20biological%20weapons.pdf. The issue of such targeted weapons was raised as early as 1970 in the professional military literature.
    • Nature Genetics , vol.29 , Issue.3 , pp. 253-256
    • Fraser, C.M.1    Dando, M.R.2
  • 146
    • 34548469367 scopus 로고    scopus 로고
    • Ethnic Weapons
    • November 1970, available at
    • Carl Larson, "Ethnic Weapons," Military Review 50(11):3-11, November 1970, available at http://usacac.army.mil/CAC/Repository/Materials/MilitaryReview-197011300001-DOC.pdf.
    • Military Review , vol.50 , Issue.11 , pp. 3-11
    • Larson, C.1
  • 147
    • 33746499664 scopus 로고    scopus 로고
    • As Police Use of Tasers Soars, Questions Over Safety Emerge
    • July 18
    • Alex Berenson, "As Police Use of Tasers Soars, Questions Over Safety Emerge," New York Times, July 18, 2004.
    • (2004) New York Times
    • Berenson, A.1
  • 149
    • 84988879485 scopus 로고    scopus 로고
    • People of the Week: John Muhammad and John Malvo
    • October 24, available at
    • Jessica Reaves, "People of the Week: John Muhammad and John Malvo," Time, October 24, 2002, available at http://www.time.com/time/nation/article/0,8599,384284,00.html).
    • (2002) Time
    • Reaves, J.1
  • 150
    • 84988878893 scopus 로고    scopus 로고
    • Fear Lingers in DC Area
    • November 12, available at
    • Susan Kim, "Fear Lingers in DC Area," Disaster News Network, November 12, 2002, available at http://www.disasternews.net/news/article.php?articleid=57).
    • (2002) Disaster News Network
    • Kim, S.1
  • 152
    • 33645134706 scopus 로고    scopus 로고
    • A Proposal for an International Convention to Regulate the Use of Information Systems in Armed Conflict
    • Winter
    • Davis Brown, "A Proposal for an International Convention to Regulate the Use of Information Systems in Armed Conflict," Harvard International Law Journal 47(1):179-221, Winter 2006.
    • (2006) Harvard International Law Journal , vol.47 , Issue.1 , pp. 179-221
    • Brown, D.1
  • 153
    • 33645134706 scopus 로고    scopus 로고
    • A Proposal for an International Convention to Regulate the Use of Information Systems in Armed Conflict
    • Winter
    • Davis Brown, "A Proposal for an International Convention to Regulate the Use of Information Systems in Armed Conflict," Harvard International Law Journal 47(1):179-221, Winter 2006.
    • (2006) Harvard International Law Journal , vol.47 , Issue.1 , pp. 179-221
    • Brown, D.1
  • 154
    • 84893114477 scopus 로고    scopus 로고
    • Information Warfare and International Law on the Use of Force
    • Jason Barkham, "Information Warfare and International Law on the Use of Force," New York University International Law and Politics 34:57-113, 2001.
    • (2001) New York University International Law and Politics , vol.34 , pp. 57-113
    • Barkham, J.1
  • 156
    • 84988800071 scopus 로고    scopus 로고
    • United Nations Publications, New York City, available at
    • United Nations Disarmament Handbook, United Nations Publications, New York City, 2004, available at http://www.un.org/disarmament/HomePage/ODAPublications/Yearbook/2004/Html/Ch%20V6.html.
    • (2004) United Nations Disarmament Handbook
  • 157
    • 84988831188 scopus 로고
    • (Concept of Information Warfare), speech given at a Russian-U.S. conference, "Evolving Post-Cold War National Security Issues," Moscow, September 12-14
    • V. I. Tsymbal, "Kontseptsiya "Informatsionnoy Voiny'" (Concept of Information Warfare), speech given at a Russian-U.S. conference, "Evolving Post-Cold War National Security Issues," Moscow, September 12-14, 1995, p. 7
    • (1995) Kontseptsiya "Informatsionnoy Voiny'" , pp. 7
    • Tsymbal, V.I.1
  • 158
    • 84859931798 scopus 로고    scopus 로고
    • Deterring Information Warfare: A New Strategic Challenge
    • (Winter)
    • Timothy L. Thomas, "Deterring Information Warfare: A New Strategic Challenge," Parameters 26(Winter):82, 1996-1997.
    • Parameters , vol.26 , Issue.82 , pp. 1996-1997
    • Thomas, T.L.1
  • 159
    • 0242381394 scopus 로고    scopus 로고
    • China's Electronic Strategies
    • (May-June), Available at
    • Timothy L. Thomas, "China's Electronic Strategies," Military Review (May-June), 2001. Available at http://leav-www.army.mil/fmso/documents/china_electric/china_elec-tric.htm.
    • (2001) Military Review
    • Thomas, T.L.1
  • 160
    • 0039191632 scopus 로고    scopus 로고
    • The PLA and Information Warfare
    • in James C. Mulvenon (ed.), Conference Proceedings, The RAND Corporation
    • James C. Mulvenon, "The PLA and Information Warfare," in James C. Mulvenon (ed.), The People's Liberation Army in the Information Age, Conference Proceedings, The RAND Corporation, 1998.
    • (1998) The People's Liberation Army in the Information Age
    • Mulvenon, J.C.1
  • 161
    • 0040376217 scopus 로고    scopus 로고
    • Viewing Our Army's Quality Building from the Perspective of What Information Warfare Demands
    • March 3, in FBIS-CHI-98-072, March 13, 1998
    • Wang Jianghuai and Lin Dong, "Viewing Our Army's Quality Building from the Perspective of What Information Warfare Demands," Jiefangjun bao, March 3, 1998, p. 6, in FBIS-CHI-98-072, March 13, 1998;
    • (1998) Jiefangjun bao , pp. 6
    • Jianghuai, W.1    Dong, L.2
  • 162
    • 84988822150 scopus 로고    scopus 로고
    • Information Insecurity
    • April 1, available at
    • Katherine McIntire Peters, "Information Insecurity," Government Executive, April 1, 1999, available at http://www.govexec.com/features/0499/0499s1.htm.
    • (1999) Government Executive
  • 166
    • 84988884025 scopus 로고    scopus 로고
    • available at
    • Art Jahnke, "Russian Roulette," 2005, available at http://www.csoonline.com/read/010105/russian.html.
    • (2005) Russian Roulette
    • Jahnke, A.1
  • 168
  • 174
  • 176
    • 0348225147 scopus 로고    scopus 로고
    • Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework
    • Michael Schmitt, "Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework," Columbia Journal of Transnational Law 37:885-937, 1999.
    • (1999) Columbia Journal of Transnational Law , vol.37 , pp. 885-937
    • Schmitt, M.1
  • 177
    • 84988884135 scopus 로고    scopus 로고
    • New Tools, New Rules: International Law and Information Operations
    • in G. David and T. McKeldin, eds., Potomac Books, Inc
    • Duncan B. Hollis, "New Tools, New Rules: International Law and Information Operations," pp. 59-72 in Ideas As Weapons: Influence and Perception in Modern Warfare, G. David and T. McKeldin, eds., Potomac Books, Inc., 2009.
    • (2009) Ideas As Weapons: Influence and Perception in Modern Warfare , pp. 59-72
    • Hollis, D.B.1
  • 178
    • 84988552861 scopus 로고    scopus 로고
    • The National Academies Press, Washington, D.C
    • National Research Council, Toward a Safer and More Secure Cyberspace, The National Academies Press, Washington, D.C., 2007.
    • (2007) Toward a Safer and More Secure Cyberspace
  • 179
    • 84976781807 scopus 로고
    • Reflections on Trusting Trust
    • August
    • Ken L. Thompson, "Reflections on Trusting Trust," Communications of the ACM 27(8):761-763, August 1984.
    • (1984) Communications of the ACM , vol.27 , Issue.8 , pp. 761-763
    • Thompson, K.L.1
  • 183
    • 84988837176 scopus 로고    scopus 로고
    • Why Sardonix Failed
    • February 4, available at
    • Hal Flynn, "Why Sardonix Failed," SecurityFocus, February 4, 2004, available at http://www.securityfocus.com/columnists/218.
    • (2004) SecurityFocus
    • Flynn, H.1
  • 184
    • 33747367779 scopus 로고    scopus 로고
    • An Analysis of the Intel 80x86 Security Architecture and Implementations
    • May
    • Olin Sibert, Phillip A. Porras, and Robert Lindell, "An Analysis of the Intel 80x86 Security Architecture and Implementations," IEEE Transactions on Software Engineering, 22(5):283-293, May 1996;
    • (1996) IEEE Transactions on Software Engineering , vol.22 , Issue.5 , pp. 283-293
    • Sibert, O.1    Porras, P.A.2    Lindell, R.3
  • 185
    • 84871292064 scopus 로고    scopus 로고
    • talk presented at Hack-In-The-Box, Dubai, United Arab Emirates, PowerPoint presentation available at
    • Kris Kaspersky and Alice Chang, "Remote Code Execution Through Intel CPU Bugs," talk presented at Hack-In-The-Box, Dubai, United Arab Emirates, 2008, PowerPoint presentation available at http://nchovy.kr/uploads/3/303/D2T1%20-%20Kris%20Kaspersky%20-%20Remote%20Code%20Execution%20Through%20Intel%20CPU%20Bugs.pdf.
    • (2008) Remote Code Execution Through Intel CPU Bugs
    • Kaspersky, K.1    Chang, A.2
  • 186
    • 84988837173 scopus 로고    scopus 로고
    • Security Innovation, Inc., Wilmington, Mass., available at
    • Ed Adams, "Biggest Information Security Mistakes That Organizations Make," Security Innovation, Inc., Wilmington, Mass., available at http://www.issa.org/Downloads/Whitepapers/Biggest-Information-Security-Mistakes_Security-Innovation.pdf.
    • Biggest Information Security Mistakes That Organizations Make
    • Adams, E.1
  • 190
    • 0003714340 scopus 로고    scopus 로고
    • National Academy Press, Washington, D.C
    • CSTB/NRC, Trust in Cyberspace, National Academy Press, Washington, D.C., 1999
    • (1999) Trust in Cyberspace
  • 191
    • 84988552861 scopus 로고    scopus 로고
    • The National Academies Press, Washington, D.C
    • NRC, Toward a Safer and More Secure Cyberspace, The National Academies Press, Washington, D.C., 2007.
    • (2007) Toward a Safer and More Secure Cyberspace
  • 194
    • 84988821327 scopus 로고    scopus 로고
    • Director of National Intelligence, Annual Threat Assessment of the Intelligence Community for the Senate Select Committee on Intelligence, February 12, available at
    • Dennis Blair, Director of National Intelligence, Annual Threat Assessment of the Intelligence Community for the Senate Select Committee on Intelligence, February 12, 2009, available at http://intelligence.senate.gov/090212/blair.pdf.
    • (2009)
    • Blair, D.1
  • 195
    • 84892128175 scopus 로고    scopus 로고
    • National Cyber Security Initiative Will Have a Dozen Parts
    • August 1
    • Jill R. Aitoro, "National Cyber Security Initiative Will Have a Dozen Parts," Government Executive, August 1, 2008, available at http://www.nextgov.com/nextgov/ng_20080801_9053.php.
    • (2008) Government Executive
    • Aitoro, J.R.1
  • 197
    • 0348225147 scopus 로고    scopus 로고
    • Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework
    • Michael Schmitt, "Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework," Columbia Journal of Transnational Law 37:885-937, 1999
    • (1999) Columbia Journal of Transnational Law , vol.37 , pp. 885-937
    • Schmitt, M.1
  • 198
    • 84865407269 scopus 로고    scopus 로고
    • Information Warfare as International Coercion: Elements of a Legal Framework
    • Christopher C. Joyner and Catherine Lotrionte, "Information Warfare as International Coercion: Elements of a Legal Framework," European Journal of International Law 12(5):825-865, 2001
    • (2001) European Journal of International Law , vol.12 , Issue.5 , pp. 825-865
    • Joyner, C.C.1    Lotrionte, C.2
  • 199
    • 84893114477 scopus 로고    scopus 로고
    • Information Warfare and International Law on the Use of Force
    • Jason Barkham, "Information Warfare and International Law on the Use of Force," New York University International Law and Politics 34:57-113, 2001
    • (2001) New York University International Law and Politics , vol.34 , pp. 57-113
    • Barkham, J.1
  • 200
    • 33645134706 scopus 로고    scopus 로고
    • A Proposal for an International Convention to Regulate the Use of Information Systems in Armed Conflict
    • Winter
    • Davis Brown, "A Proposal for an International Convention to Regulate the Use of Information Systems in Armed Conflict," Harvard International Law Journal 47(1):179-221, Winter 2006
    • (2006) Harvard International Law Journal , vol.47 , Issue.1 , pp. 179-221
    • Brown, D.1
  • 201
    • 84988884135 scopus 로고    scopus 로고
    • New Tools, New Rules: International Law and Information Operations
    • G. David and T. McKeldin, eds., Potomac Books Inc
    • Duncan B. Hollis, "New Tools, New Rules: International Law and Information Operations," pp. 59-72 in Ideas as Weapons: Influence and Perception in Modern Warfare, G. David and T. McKeldin, eds., Potomac Books Inc., 2009.
    • (2009) Ideas as Weapons: Influence and Perception in Modern Warfare , pp. 59-72
    • Hollis, D.B.1
  • 204
    • 84988827399 scopus 로고    scopus 로고
    • Military Command Is Created for Cyber Security
    • June 24
    • Siobhan Gorman and Yochi Dreazen, "Military Command Is Created for Cyber Security," Wall Street Journal, June 24, 2009, available at http://online.wsj.com/article/SB124579956278644449.html.
    • (2009) Wall Street Journal
    • Gorman, S.1    Dreazen, Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.