-
1
-
-
44949162596
-
Bush Orders Guidelines for Cyber-Warfare
-
February 7
-
Bradley Graham, "Bush Orders Guidelines for Cyber-Warfare," Washington Post, February 7, 2003, p. A01.
-
(2003)
Washington Post
, pp. A01
-
-
Graham, B.1
-
3
-
-
84898154813
-
-
November 29, available at
-
Reuters, "Global Cellphone Penetration Reaches 50 Pct," November 29, 2007, available at http://investing.reuters.co.uk/news/articleinvesting.aspx?type=media&storyID=nL29172095.
-
(2007)
Global Cellphone Penetration Reaches 50 Pct
-
-
-
5
-
-
84988552861
-
-
The National Academies Press, Washington D.C
-
National Research Council, Toward a Safer and More Secure Cyberspace, The National Academies Press, Washington D.C., 2007.
-
(2007)
Toward a Safer and More Secure Cyberspace
-
-
-
6
-
-
84895680647
-
Estonia, Where Being Wired Is a Human Right
-
July 1, available at
-
Colin Woodward, "Estonia, Where Being Wired Is a Human Right," Christian Science Monitor, July 1, 2003, available at http://www.csmonitor.com/2003/0701/p07s01-woeu.html
-
(2003)
Christian Science Monitor
-
-
Woodward, C.1
-
7
-
-
84988552861
-
-
The National Academies Press, Washington, D.C
-
National Research Council, Toward a Safer and More Secure Cyberspace, The National Academies Press, Washington, D.C., 2007.
-
(2007)
Toward a Safer and More Secure Cyberspace
-
-
-
9
-
-
84988552861
-
-
The National Academies Press, Washington D.C
-
National Research Council, Toward a Safer and More Secure Cyberspace, The National Academies Press, Washington D.C., 2007.
-
(2007)
Toward a Safer and More Secure Cyberspace
-
-
-
11
-
-
84988552861
-
-
The National Academies Press, Washington, D.C
-
National Research Council, Toward a Safer and More Secure Cyberspace, The National Academies Press, Washington, D.C., 2007.
-
(2007)
Toward a Safer and More Secure Cyberspace
-
-
-
12
-
-
84988804890
-
British Document Outlines Early Encryption Discovery
-
December 24
-
Peter Wayner, "British Document Outlines Early Encryption Discovery," New York Times, December 24, 1997, available at http://www.nytimes.com/library/cyber/week/122497encrypt.html#1.
-
(1997)
New York Times
-
-
Wayner, P.1
-
13
-
-
29744431605
-
-
Random House, New York
-
Max Frankel, High Noon in the Cold War: Kennedy, Khrushchev, and the Cuban Missile Crisis, Random House, New York, 2005.
-
(2005)
High Noon in the Cold War: Kennedy, Khrushchev, and the Cuban Missile Crisis
-
-
Frankel, M.1
-
15
-
-
84988552861
-
-
The National Academies Press, Washington D.C
-
National Research Council, Toward a Safer and More Secure Cyberspace, The National Academies Press, Washington D.C., 2007.
-
(2007)
Toward a Safer and More Secure Cyberspace
-
-
-
17
-
-
84906204133
-
-
Cambridge, Mass., available at
-
Daniel Geer, Measuring Security, Cambridge, Mass., 2006, available at http://geer.tinho.net/measuringsecurity.tutorialv2.pdf.
-
(2006)
Measuring Security
-
-
Geer, D.1
-
18
-
-
84861324665
-
-
presented at the National Defense Industrial Association Defense Software Strategy Summit, October 19, available at
-
Center for Strategic and International Studies, "An Assessment of the National Security Software Industrial Base," presented at the National Defense Industrial Association Defense Software Strategy Summit, October 19, 2006, available at http://www.diig-csis.org/pdf/Chao_SoftwareIndustrialBase_NDIASoftware.pdf.
-
(2006)
An Assessment of the National Security Software Industrial Base
-
-
-
21
-
-
84988879232
-
-
ESD-TR-74-193, June, HQ Electronic Systems Division, Hanscom Air Force Base, available at
-
P.A. Karger and R.R. Schell, Multics Security Evaluation: Vulnerability Analysis, ESD-TR-74-193, Vol. II, June 1974, HQ Electronic Systems Division, Hanscom Air Force Base, available at http://csrc.nist.gov/publications/history/karg74.pdf.
-
(1974)
Multics Security Evaluation: Vulnerability Analysis
, vol.2
-
-
Karger, P.A.1
Schell, R.R.2
-
27
-
-
84862357192
-
AV Vendors Split over FBI Trojan Snoops
-
(November 27)
-
John Leyden, "AV Vendors Split over FBI Trojan Snoops," The Register, November 27, 2001, available at http://www.theregister.co.uk/2001/11/27/av_vendors_split_over_fbi/).
-
(2001)
The Register
-
-
Leyden, J.1
-
28
-
-
84882765166
-
Will Security Firms Detect Police Spyware?
-
July 17
-
Declan McCullagh and Anne Broache, "Will Security Firms Detect Police Spyware?," CNET News, July 17, 2007, available at http://news.cnet.com/2100-7348-6197020.html.
-
(2007)
CNET News
-
-
McCullagh, D.1
Broache, A.2
-
30
-
-
35348822468
-
Fostering Email Security Awareness: The West Point Carronade
-
Aron J. Ferguson, "Fostering Email Security Awareness: The West Point Carronade," EDUCAUSE Quarterly 28(1):54-57, 2005, available at http://net.educause.edu/ir/library/pdf/EQM0517.pdf.
-
(2005)
EDUCAUSE Quarterly
, vol.28
, Issue.1
, pp. 54-57
-
-
Ferguson, A.J.1
-
31
-
-
72849151945
-
Social Engineering, the USB Way
-
June 7
-
Steve Stasiukonis, "Social Engineering, the USB Way," Dark Reading, June 7, 2006, available at http://www.darkreading.com/document.asp?doc_id=95556&WT.svl=column1_1.
-
(2006)
Dark Reading
-
-
Stasiukonis, S.1
-
32
-
-
70249138620
-
-
June, available at
-
LURHQ, "Phatbot Trojan Analysis," June 2004, available at http://www.lurhq.com/phatbot.html.
-
(2004)
Phatbot Trojan Analysis
-
-
-
33
-
-
24344436426
-
The Blaster Worm: Then and Now
-
Michael Bailey, Evan Cooke, Farnam Jahanian, David Watson, and Jose Nazario, "The Blaster Worm: Then and Now," IEEE Security and Privacy 3(4):26-31, 2005, available at http://ieeexplore.ieee.org/iel5/8013/32072/01492337.pdf?arnumber=1492337.
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.4
, pp. 26-31
-
-
Bailey, M.1
Cooke, E.2
Jahanian, F.3
Watson, D.4
Nazario, J.5
-
34
-
-
70249138620
-
-
March 15, available at
-
Joe Stewart, "Phatbot Trojan Analysis," March 15, 2004, available at http://www.secureworks.com/research/threats/phatbot/?threat=phatbot.
-
(2004)
Phatbot Trojan Analysis
-
-
Stewart, J.1
-
35
-
-
84988552861
-
-
The National Academies Press, Washington D.C
-
National Research Council, Toward a Safer and More Secure Cyberspace, The National Academies Press, Washington D.C., 2007.
-
(2007)
Toward a Safer and More Secure Cyberspace
-
-
-
39
-
-
68949107365
-
-
Joint Publication 3-13, U.S. Department of Defense, Washington, D.C., February 2006, available at
-
Joint Chiefs of Staff, Information Operations, Joint Publication 3-13, U.S. Department of Defense, Washington, D.C., February 2006, available at www.dtic.mil/doctrine/jel/new_pubs/jp3_13.pdf.
-
Information Operations
-
-
-
40
-
-
0242314805
-
-
undated publication, available at
-
David Moore, "The Spread of the Sapphire/Slammer Worm," undated publication, available at http://www.caida.org/publications/papers/2003/sapphire/sapphire.html.
-
The Spread of the Sapphire/Slammer Worm
-
-
Moore, D.1
-
42
-
-
84881434856
-
-
DOD definitions for "strategic operations" and "strategic air warfare," in Joint Chiefs of Staff, Joint Publication 1-02, Department of Defense, Washington, D.C., April 12, 2001 (as amended through October 17), available at
-
DOD definitions for "strategic operations" and "strategic air warfare," in Joint Chiefs of Staff, Dictionary of Military and Associated Terms, Joint Publication 1-02, Department of Defense, Washington, D.C., April 12, 2001 (as amended through October 17, 2008), available at http://www.dtic.mil/doctrine/jel/new_pubs/jp1_02.pdf.
-
(2008)
Dictionary of Military and Associated Terms
-
-
-
43
-
-
84988884118
-
Warfare, Terrorism, and Psychology
-
in Bruce Bongar et al., eds., Oxford University Press
-
L. Morgan Banks and Larry James, "Warfare, Terrorism, and Psychology," pp. 216-222 in Psychology of Terrorism, Bruce Bongar et al., eds., Oxford University Press, 2007.
-
(2007)
Psychology of Terrorism
, pp. 216-222
-
-
Banks, L.M.1
James, L.2
-
44
-
-
22144488277
-
-
Cornell University Press, Ithaca, N.Y
-
Lynn Eden, Whole World on Fire: Organizations, Knowledge, and Nuclear Weapons Devastation, Cornell University Press, Ithaca, N.Y., 2004.
-
(2004)
Whole World on Fire: Organizations, Knowledge, and Nuclear Weapons Devastation
-
-
Eden, L.1
-
45
-
-
84988820158
-
-
American Forces Press Service, May 4, available at
-
Jim Garamone, "Love Bug Bites DoD, Others," American Forces Press Service, May 4, 2000, available at http://www.defenselink.mil/news/newsarticle.aspx?id=45220
-
(2000)
Love Bug Bites DoD, Others
-
-
Garamone, J.1
-
47
-
-
36448960729
-
-
DOD JP1-02, April 12 (as amended through September 30, 2008), available at
-
DOD JP1-02, Dictionary of Military and Associated Terms, April 12, 2001 (as amended through September 30, 2008), available at http://www.dtic.mil/doctrine/jel/new_pubs/jp1_02.pdf.
-
(2001)
Dictionary of Military and Associated Terms
-
-
-
49
-
-
84988552861
-
-
The National Academies Press, Washington, D.C
-
National Research Council, Toward a Safer and More Secure Cyberspace, The National Academies Press, Washington, D.C., 2007.
-
(2007)
Toward a Safer and More Secure Cyberspace
-
-
-
50
-
-
84988827317
-
-
available at
-
Department of Homeland Security, "History: Who Became Part of the Department?," 2007, available at http://www.dhs.gov/xabout/history/editorial_0133.shtm.
-
(2007)
History: Who Became Part of the Department?
-
-
-
51
-
-
84857761673
-
-
available at
-
Annie De Montigny-Leboeuf and Frederic Massicotte, "Passive Network Discovery for Real Time Situation Awareness," 2004, available at http://www.snort.org/docs/industry/ADeMontignyNatoISTToulouse2004.pdf.
-
(2004)
Passive Network Discovery for Real Time Situation Awareness
-
-
-
53
-
-
84988821298
-
First Case of 'Drive-by Pharming' Identified in the Wild
-
January 22, available at
-
Ellen Messmer, "First Case of 'Drive-by Pharming' Identified in the Wild," Network World, January 22, 2008, available at http://www.networkworld.com/news/2008/012208-drive-by-pharming.html.
-
(2008)
Network World
-
-
Messmer, E.1
-
54
-
-
84988879789
-
The Moscow Bug Hunt
-
July 10, available at
-
Jay Peterzell, "The Moscow Bug Hunt," Time, July 10, 1989, available at http://www.time.com/time/magazine/article/0,9171,958127-4,00.html.
-
(1989)
Time
-
-
Peterzell, J.1
-
55
-
-
78651512289
-
Xerox Helped Win The Cold War
-
available at
-
Ron Laytner, "Xerox Helped Win The Cold War," Edit International, 2006, available at http://www.editinternational.com/read.php?id=47ddf19823b89.
-
(2006)
Edit International
-
-
Laytner, R.1
-
56
-
-
35348984496
-
The Athens Affair
-
July available at
-
Vassilis Prevelakis and Diomidis Spinellis, "The Athens Affair," IEEE Spectrum, July 2007, available at http://www.spectrum.ieee.org/print/5280.
-
(2007)
IEEE Spectrum
-
-
Prevelakis, V.1
Spinellis, D.2
-
57
-
-
84988795849
-
Computer Worm Snarls Web: Electronic Attack Also Affects Phone Service, BOFA's ATM Network
-
January 26, available at
-
Aaron Davis, "Computer Worm Snarls Web: Electronic Attack Also Affects Phone Service, BOFA's ATM Network," San Jose Mercury News, January 26, 2003, available at http://www.bayarea.com/mld/mercurynews/5034748.htm+atm+slammer+virus&hl=en
-
(2003)
San Jose Mercury News
-
-
Davis, A.1
-
58
-
-
84906204133
-
-
available at
-
Daniel E. Geer, "Measuring Security," 2006, pp. 170-178, available at http://geer.tinho.net/measuringsecurity.tutorialv2.pdf.
-
(2006)
Measuring Security
, pp. 170-178
-
-
Geer, D.E.1
-
59
-
-
84988850001
-
-
available at
-
F-Secure, "F-Secure Virus Descriptions: Bugbear.B," 2003, available at http://www.f-secure.com/v-descs/bugbear_b.shtml.
-
(2003)
F-Secure Virus Descriptions: Bugbear.B
-
-
-
60
-
-
33847759837
-
Flying and Fighting in Cyberspace
-
Spring available at
-
Michael W. Wynne, "Flying and Fighting in Cyberspace," Air & Space Power Journal, Spring 2007, available at http://www.airpower.maxwell.af.mil/airchronicles/apj/apj07/spr07/wynnespr07.html.
-
(2007)
Air & Space Power Journal
-
-
Wynne, M.W.1
-
61
-
-
79960209877
-
Warfighting in Cyberspace
-
Lt. Gen. Keith B. Alexander, "Warfighting in Cyberspace," Joint Force Quarterly 46(3):58-61, 2007.
-
(2007)
Joint Force Quarterly
, vol.46
, Issue.3
, pp. 58-61
-
-
Alexander, K.B.1
-
63
-
-
79960209877
-
Warfighting in Cyberspace
-
July available at
-
Keith B. Alexander, "Warfighting in Cyberspace," Joint Force Quarterly, July 2007, available at http://www.military.com/forums/0,15240,143898,00.html.
-
(2007)
Joint Force Quarterly
-
-
Alexander, K.B.1
-
65
-
-
84988820126
-
-
Memo of Robert Gates (Secretary of Defense) to DOD regarding Command and Control for Military Cyberspace Missions, November 12, 2008. Copy available from the NRC
-
Memo of Robert Gates (Secretary of Defense) to DOD regarding Command and Control for Military Cyberspace Missions, November 12, 2008. Copy available from the NRC.
-
-
-
-
66
-
-
84988909722
-
-
Minister of Defense of Estonia, presentation to Centre of Strategic and International Studies, November 28, of transcript, available at
-
Jaak Aaviksoo, Minister of Defense of Estonia, presentation to Centre of Strategic and International Studies, November 28, 2007, p. 3. of transcript, available at http://www.csis.org/component/option,com_csis_press/task,view/id,3525/.
-
(2007)
, pp. 3
-
-
Aaviksoo, J.1
-
67
-
-
34547999111
-
In Estonia, What May Be the First War in Cyberspace
-
May 28
-
Mark Landler and John Markoff, "In Estonia, What May Be the First War in Cyberspace," International Herald Tribune, May 28, 2007.
-
(2007)
International Herald Tribune
-
-
Landler, M.1
Markoff, J.2
-
68
-
-
62849125514
-
Hackers Take Down the Most Wired Country in Europe
-
Issue 15.09, August 21
-
Joshua Davis, "Hackers Take Down the Most Wired Country in Europe," Wired, Issue 15.09, August 21, 2007.
-
(2007)
Wired
-
-
Davis, J.1
-
69
-
-
84988903620
-
-
McAfee Virtual Criminology Report
-
MacAfee Corp., "Cybercrime: The Next Wave," McAfee Virtual Criminology Report, 2007, p. 9.
-
(2007)
Cybercrime: The Next Wave
, pp. 9
-
-
-
70
-
-
84988820916
-
-
Economist, "A Cyber-riot," May 10
-
Economist, "A Cyber-riot," May 10, 2007.
-
(2007)
-
-
-
71
-
-
84988879299
-
-
Minister of Defense of Estonia, presentation to Centre of Strategic and International Studies, November 28, of transcript, available at
-
Jaak Aaviksoo, Minister of Defense of Estonia, presentation to Centre of Strategic and International Studies, November 28, 2007, p. 7. of transcript, available at http://www.csis.org/component/option,com_csis_press/task,view/id,3525/.
-
(2007)
, pp. 7
-
-
Aaviksoo, J.1
-
72
-
-
84988879818
-
Cybercrime: The Next Wave
-
MacAfee Corporation, "Cybercrime: The Next Wave," McAfee Virtual Criminology Report, 2007, p. 11.
-
(2007)
McAfee Virtual Criminology Report
, pp. 11
-
-
-
73
-
-
39749115454
-
Russia Accused of Unleashing Cyberwar to Disable Estonia
-
May 17, available at
-
Ian Traynor, "Russia Accused of Unleashing Cyberwar to Disable Estonia," Guardian, May 17, 2007, available at http://www.guardian.co.uk/russia/article/0, 2081438,00.html.
-
(2007)
Guardian
-
-
Traynor, I.1
-
75
-
-
76949088842
-
Before the Gunfire, Cyberattacks
-
August 13, available at
-
John Markoff, "Before the Gunfire, Cyberattacks," New York Times, August 13, 2008, available at http://www.nytimes.com/2008/08/13/technology/13cyber.html?_r=1&oref=slogin.
-
(2008)
New York Times
-
-
Markoff, J.1
-
76
-
-
84988909728
-
Gates Unveils Overhaul of Weapons Priorities
-
April 6, available at
-
"Gates Unveils Overhaul of Weapons Priorities," Wall Street Journal, April 6, 2009, available at http://online.wsj.com/article/SB123904207376593845.html?mod=googlenews_wsj.
-
(2009)
Wall Street Journal
-
-
-
77
-
-
84988884112
-
-
Broad Agency Announcement (BAA ESC 07-0001), OL-AA 950 ELSG/KIS, Network Warfare Operations Capabilities (NWOC), Technology Concept Demonstrations, available at
-
Broad Agency Announcement (BAA ESC 07-0001), OL-AA 950 ELSG/KIS, Network Warfare Operations Capabilities (NWOC), Technology Concept Demonstrations, available at http://www.herbb.hanscom.af.mil/tbbs/R1528/Final_NWOC_BAA_Amend_5.doc.
-
-
-
-
78
-
-
84988820923
-
-
May 3, available at
-
Army Offensive Information Operations Technologies Broad Agency Announcement, May 3, 2007, available at https://abop.monmouth.army.mil/baas.nsf/Solicitation+By+Number/9BE5D8EAE22A6339852572D4004F0DD5/$File/BAA+Army+Offensive+Information+Operations+Technologies.doc.
-
(2007)
-
-
-
80
-
-
84988830925
-
-
January 7, available at
-
Swa Frantzen, WMF FAQ, January 7, 2006, available at http://isc.sans.org/diary.html?storyid=994.
-
(2006)
WMF FAQ
-
-
Frantzen, S.1
-
81
-
-
72849151945
-
Social Engineering, the USB Way
-
June 7, available at
-
Steve Stasiukonis, "Social Engineering, the USB Way," Dark Reading, June 7, 2006, available at http://www.darkreading.comdocument.asp?doc_id=95556&WT.svl=column1_1.
-
(2006)
Dark Reading
-
-
Stasiukonis, S.1
-
83
-
-
84988817997
-
Election Defeat Marks Abe's Political Future
-
July 30, available at
-
Pino Cazzaniga, "Election Defeat Marks Abe's Political Future," AsiaNews.it, July 30, 2007, available at http://www.asianews.it/index.php?l=en&art=9962.
-
(2007)
AsiaNews.it
-
-
Cazzaniga, P.1
-
84
-
-
79960435425
-
Cyberwar: A New Weapon Awaits a Set of Rules
-
July 8
-
Bradley Graham, "Cyberwar: A New Weapon Awaits a Set of Rules," Washington Post, July 8, 1998, p. A1.
-
(1998)
Washington Post
, pp. A1
-
-
Graham, B.1
-
85
-
-
0007733078
-
-
Center for Strategic and International Studies, Washington, D.C
-
Global Organized Crime Project, Cybercrime, Cyberterrorism, Cyberwarfare: Averting an Electronic Waterloo, Center for Strategic and International Studies, Washington, D.C., 1998.
-
(1998)
Cybercrime, Cyberterrorism, Cyberwarfare: Averting an Electronic Waterloo
-
-
-
88
-
-
14544291305
-
-
Computer Crime and Intellectual Property Section, Criminal Division, July, available at
-
U.S. Department of Justice, Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations, Computer Crime and Intellectual Property Section, Criminal Division, July 2002, available at http://www.usdoj.gov/criminal/cybercrime/s&smanual2002.htm#_VB1_.
-
(2002)
Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations
-
-
-
89
-
-
84917390088
-
Local Police Want Right to Jam Wireless Signals
-
February 1 available at
-
Spencer S. Hsu, "Local Police Want Right to Jam Wireless Signals," Washington Post, February 1, 2009, p. A02, available at http://www.washingtonpost.com/wp-dyn/content/article/2009/01/31/AR2009013101548_pf.html.
-
(2009)
Washington Post
, pp. A02
-
-
Hsu, S.S.1
-
90
-
-
84917390088
-
Local Police Want Right to Jam Wireless Signals
-
February 1, available at
-
Spencer S. Hsu, "Local Police Want Right to Jam Wireless Signals," Washington Post, February 1, 2009, p. A02, available at http://www.washingtonpost.com/wp-dyn/content/article/2009/01/31/AR2009013101548_pf.html.
-
(2009)
Washington Post
, pp. A02
-
-
Hsu, S.S.1
-
91
-
-
84988909725
-
Bill Would Allow Prisons to Jam Cell Phone Signals
-
January 16, available at
-
Matthew Harwood, "Bill Would Allow Prisons to Jam Cell Phone Signals," Security Management, January 16, 2009, available at http://www.securitymanagement.com/news/bill-would-allow-prisons-jam-cell-phone-signals-005082.
-
(2009)
Security Management
-
-
Harwood, M.1
-
92
-
-
0345814025
-
Criminal Law Defenses: A Systematic Analysis
-
available at
-
Paul H. Robinson, "Criminal Law Defenses: A Systematic Analysis," Columbia Law Review 82:199-291, 1982, available at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=662043.
-
(1982)
Columbia Law Review
, vol.82
, pp. 199-291
-
-
Robinson, P.H.1
-
94
-
-
84858931295
-
-
June 18, available at
-
Associated Press, "Hatch Wants to Fry Traders' PCs," June 18, 2003, available at http://www.wired.com/entertainment/music/news/2003/06/59298.
-
(2003)
Hatch Wants to Fry Traders' PCs
-
-
-
95
-
-
84869022574
-
Worm Infects Millions of Computers Worldwide
-
January 22, available at
-
John Markoff, "Worm Infects Millions of Computers Worldwide," New York Times, January 22, 2009, available at http://www.nytimes.com/2009/01/23/technology/internet/23worm.html.
-
(2009)
New York Times
-
-
Markoff, J.1
-
96
-
-
84988879271
-
-
August 20, available at
-
Excalibur R&D, "Letter of Marque and Reprisal for Fighting Terrorists," August 20, 2008, available at http://excaliburrd.com/cs/blogs/excalibur/Excalibur%20Letter%20of%20Marque%20paper%2015%20August%202008.pdf.
-
(2008)
Letter of Marque and Reprisal for Fighting Terrorists
-
-
-
97
-
-
84988552861
-
-
The National Academies Press, Washington, D.C
-
National Research Council, Toward a Safer and More Secure Cyberspace, The National Academies Press, Washington, D.C., 2007.
-
(2007)
Toward a Safer and More Secure Cyberspace
-
-
-
98
-
-
84988884074
-
-
a presentation at the Carnegie Conference on Non-Proliferation, November 7, available at
-
Robert S. Norris, "The Difficult Discipline of Nuclear History: A Perspective," a presentation at the Carnegie Conference on Non-Proliferation, November 7, 2005, available at http://www.carnegieendowment.org/static/npp/2005conference/presentations/Norris_Nuclear_History_Slides.pdf
-
(2005)
The Difficult Discipline of Nuclear History: A Perspective
-
-
Norris, R.S.1
-
99
-
-
76149108629
-
-
Sandia National Laboratories, Albuquerque, N.Mex., January, available at
-
David M. Kunsman and Douglas B. Lawson, A Primer on U.S. Strategic Nuclear Policy, Sandia National Laboratories, Albuquerque, N.Mex., January 2001, available at http://www.nti.org/e_research/official_docs/labs/prim_us_nuc_pol.pdf.
-
(2001)
A Primer on U.S. Strategic Nuclear Policy
-
-
Kunsman, D.M.1
Lawson, D.B.2
-
102
-
-
84988800100
-
What Is the Enemy Building?
-
Chapter 7, Cornell University Press, Ithaca, N.Y
-
Stephen Rosen, Chapter 7, "What Is the Enemy Building?" in Winning the Next War: Innovation and the Modern Military, Cornell University Press, Ithaca, N.Y., 1991.
-
(1991)
Winning the Next War: Innovation and the Modern Military
-
-
Rosen, S.1
-
103
-
-
84988831212
-
Cyberattacks in the Present Tense, Estonian Says
-
November 28, available at
-
William Jackson, "Cyberattacks in the Present Tense, Estonian Says," Government Computing News, November 28, 2007, available at http://www.gcn.com/online/vol1_no1/45476-1.html.
-
(2007)
Government Computing News
-
-
Jackson, W.1
-
104
-
-
85024101061
-
Trying to Kill Fidel Castro
-
June 27
-
Glenn Kessler, "Trying to Kill Fidel Castro," Washington Post, June 27, 2007, p. A06.
-
(2007)
Washington Post
, pp. A06
-
-
Kessler, G.1
-
105
-
-
84895289604
-
National Cyber Security Initiative Will Have a Dozen Parts
-
August 1, available at
-
Jill R. Aitoro, "National Cyber Security Initiative Will Have a Dozen Parts," Nextgov, August 1, 2008, available at http://www.nextgov.com/nextgov/ng_20080801_9053.php.
-
(2008)
Nextgov
-
-
Aitoro, J.R.1
-
106
-
-
84988879524
-
Cyber Chief Argues for New Approaches
-
August 22, available at
-
Wyatt Kash, "Cyber Chief Argues for New Approaches," Government Computer News, August 22, 2008, available at http://gcn.com/articles/2008/08/22/cyber-chief-argues-for-new-approaches.aspx.
-
(2008)
Government Computer News
-
-
Kash, W.1
-
108
-
-
84925900077
-
-
Ballinger Publishing, Cambridge, Mass
-
Abraham D. Sofaer, War, Foreign Affairs and Constitutional Power: The Origins, Ballinger Publishing, Cambridge, Mass., 1976.
-
(1976)
War, Foreign Affairs and Constitutional Power: The Origins
-
-
Sofaer, A.D.1
-
109
-
-
84988850089
-
-
The Records of the Federal Convention of 1787, at 318 (1911), Max Farrand, ed., rev. edition, 1966
-
The Records of the Federal Convention of 1787, at 318 (1911), Max Farrand, ed., rev. edition, 1966.
-
-
-
-
110
-
-
84988800115
-
-
Prize Cases, 67 U.S. 635 (1863) ("If a war be made by invasion of a foreign nation, the President is not only authorized but bound to resist force by force")
-
Prize Cases, 67 U.S. 635 (1863) ("If a war be made by invasion of a foreign nation, the President is not only authorized but bound to resist force by force").
-
-
-
-
113
-
-
67650330939
-
-
128 S.Ct. 1346, 1356
-
Medellin v. Texas, 128 S.Ct. 1346, 1356 (2008)
-
(2008)
Medellin v. Texas
-
-
-
114
-
-
84865407269
-
Information Warfare as International Coercion: Elements of a Legal Framework
-
Christopher C. Joyner and Catherine Lotrionte, "Information Warfare as International Coercion: Elements of a Legal Framework," European Journal of International Law 12(5):825-865, 2001.
-
(2001)
European Journal of International Law
, vol.12
, Issue.5
, pp. 825-865
-
-
Joyner, C.C.1
Lotrionte, C.2
-
117
-
-
84988884129
-
-
accessed at
-
United Nations Security Council Resolution 1368 (2001), accessed at http://daccessdds.un.org/doc/UNDOC/GEN/N01/533/82/PDF/N0153382.pdf?OpenElement.
-
(2001)
-
-
-
119
-
-
0348225147
-
Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework
-
Michael Schmitt, "Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework," Columbia Journal of Transnational Law 37:885-937, 1999
-
(1999)
Columbia Journal of Transnational Law
, vol.37
, pp. 885-937
-
-
Schmitt, M.1
-
120
-
-
84988884135
-
New Tools, New Rules: International Law and Information Operations
-
in G. David and T. McKeldin, eds., Potomac Books, Inc
-
Duncan B. Hollis, "New Tools, New Rules: International Law and Information Operations," pp. 59-72 in Ideas As Weapons: Influence and Perception in Modern Warfare, G. David and T. McKeldin, eds., Potomac Books, Inc., 2009;
-
(2009)
Ideas As Weapons: Influence and Perception in Modern Warfare
, pp. 59-72
-
-
Hollis, D.B.1
-
121
-
-
84893114477
-
Information Warfare and International Law on the Use of Force
-
Jason Barkham, "Information Warfare and International Law on the Use of Force," New York University International Law and Politics 34:57-113, 2001.
-
(2001)
New York University International Law and Politics
, vol.34
, pp. 57-113
-
-
Barkham, J.1
-
123
-
-
84893114477
-
Information Warfare and International Law on the Use of Force
-
Jason Barkham, "Information Warfare and International Law on the Use of Force," New York University International Law and Politics 34:57-113, 2001.
-
(2001)
New York University International Law and Politics
, vol.34
, pp. 57-113
-
-
Barkham, J.1
-
124
-
-
84988884135
-
New Tools, New Rules: International Law and Information Operations
-
in G. David and T. McKeldin, eds., Potomac Books, Inc
-
Duncan B. Hollis, "New Tools, New Rules: International Law and Information Operations," pp. 59-72 in Ideas As Weapons: Influence and Perception in Modern Warfare, G. David and T. McKeldin, eds., Potomac Books, Inc., 2009.
-
(2009)
Ideas As Weapons: Influence and Perception in Modern Warfare
, pp. 59-72
-
-
Hollis, D.B.1
-
125
-
-
0348225147
-
Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework
-
Michael Schmitt, "Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework," Columbia Journal of Transnational Law 37:885-937, 1999;
-
(1999)
Columbia Journal of Transnational Law
, vol.37
, pp. 885-937
-
-
Schmitt, M.1
-
127
-
-
84893114477
-
Information Warfare and International Law on the Use of Force
-
Jason Barkham, "Information Warfare and International Law on the Use of Force," New York University International Law and Politics 34:57-113, 2001.
-
(2001)
New York University International Law and Politics
, vol.34
, pp. 57-113
-
-
Barkham, J.1
-
128
-
-
0348225147
-
Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework
-
Michael Schmitt, "Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework," Columbia Journal of Transnational Law 37:885-937, 1999.
-
(1999)
Columbia Journal of Transnational Law
, vol.37
, pp. 885-937
-
-
Schmitt, M.1
-
129
-
-
84893114477
-
Information Warfare and International Law on the Use of Force
-
Jason Barkham, "Information Warfare and International Law on the Use of Force," New York University International Law and Politics 34:57-113, 2001.
-
(2001)
New York University International Law and Politics
, vol.34
, pp. 57-113
-
-
Barkham, J.1
-
130
-
-
84893114477
-
Information Warfare and International Law on the Use of Force
-
Jason Barkham, "Information Warfare and International Law on the Use of Force," New York University International Law and Politics 34:57-113, 2001
-
(2001)
New York University International Law and Politics
, vol.34
, pp. 57-113
-
-
Barkham, J.1
-
131
-
-
84930901331
-
The International Law of Intelligence Collection
-
in John Norton Moore et al., eds
-
W. Hays Parks, "The International Law of Intelligence Collection," pp. 433-434 in National Security Law, John Norton Moore et al., eds., 1990
-
(1990)
National Security Law
, pp. 433-434
-
-
Hays Parks, W.1
-
132
-
-
84988831220
-
Territorially Intrusive Intelligence Collection and International Law
-
available at
-
Roger D. Scott, "Territorially Intrusive Intelligence Collection and International Law, Air Force Law Review 46:217-226, 1999, available at http://permanent.access.gpo.gov/lps28111/Vol.46(1999)/scottfx4[1].doc.
-
(1999)
Air Force Law Review
, vol.46
, pp. 217-226
-
-
Scott, R.D.1
-
133
-
-
84988831220
-
Territorially Intrusive Intelligence Collection and International Law
-
available at
-
Roger D. Scott, "Territorially Intrusive Intelligence Collection and International Law, Air Force Law Review 46:217-226, 1999; available at http://permanent.access.gpo.gov/lps28111/Vol.46(1999)/scottfx4[1].doc.
-
(1999)
Air Force Law Review
, vol.46
, pp. 217-226
-
-
Scott, R.D.1
-
134
-
-
84865327664
-
Information Warfare and Neutrality
-
November
-
George K. Walker, "Information Warfare and Neutrality," Vanderbilt Journal of Transnational Law 33(5):1079-1200, November 2000.
-
(2000)
Vanderbilt Journal of Transnational Law
, vol.33
, Issue.5
, pp. 1079-1200
-
-
Walker, G.K.1
-
135
-
-
84920399357
-
State Responsibility for the Acts of Private Armed Groups
-
Spring
-
Derek Jinks, "State Responsibility for the Acts of Private Armed Groups," Chicago Journal of International Law 4(1):83-96, Spring 2003).
-
(2003)
Chicago Journal of International Law
, vol.4
, Issue.1
, pp. 83-96
-
-
Jinks, D.1
-
136
-
-
84893114477
-
Information Warfare and International Law on the Use of Force
-
Jason Barkham, "Information Warfare and International Law on the Use of Force," New York University International Law and Politics 34:57-113, 2001.
-
(2001)
New York University International Law and Politics
, vol.34
, pp. 57-113
-
-
Barkham, J.1
-
137
-
-
77954573134
-
-
Foreign Military Studies Office, Fort Leavenworth, Kans
-
Timothy Thomas, Decoding the Virtual Dragon, Foreign Military Studies Office, Fort Leavenworth, Kans., 2007.
-
(2007)
Decoding the Virtual Dragon
-
-
Thomas, T.1
-
138
-
-
84988821442
-
-
(House of Representatives), July 25, available at
-
Conference Report on H.R. 1455 (House of Representatives), July 25, 1991, available at http://www.fas.org/irp/congress/1991_cr/h910725-ia.htm.
-
(1991)
-
-
-
141
-
-
0004141648
-
-
Updated and Expanded Edition, MIT Press, Cambridge, Mass
-
Whitfield Diffie and Susan Landau, Privacy on the Line: The Politics of Wiretapping and Encryption, Updated and Expanded Edition, MIT Press, Cambridge, Mass., 2007.
-
(2007)
Privacy on the Line: The Politics of Wiretapping and Encryption
-
-
Diffie, W.1
Landau, S.2
-
142
-
-
85024101061
-
Trying to Kill Fidel Castro
-
Fidel Castro in June 27
-
Fidel Castro in 1960. "Trying to Kill Fidel Castro," Washington Post, June 27, 2007, p. A06.
-
(1960)
Washington Post
, pp. A06
-
-
-
143
-
-
79951987638
-
U.S. Debates Deterrence for Nuclear Terrorism
-
May 8
-
David E. Sanger and Thom Shanker, "U.S. Debates Deterrence for Nuclear Terrorism," New York Times, May 8, 2007.
-
(2007)
New York Times
-
-
Sanger, D.E.1
Shanker, T.2
-
144
-
-
0004243165
-
-
Harwood Academic Publishers, Amsterdam, the Netherlands
-
British Medical Association, Biotechnology, Weapons and Humanity, Harwood Academic Publishers, Amsterdam, the Netherlands, 1999
-
(1999)
Biotechnology, Weapons and Humanity
-
-
-
145
-
-
0035179994
-
Genomics and Future Biological Weapons: The Need for Preventive Action by the Biomedical Community
-
November 2001, available at The issue of such targeted weapons was raised as early as 1970 in the professional military literature
-
Claire M. Fraser and Malcolm R. Dando, "Genomics and Future Biological Weapons: The Need for Preventive Action by the Biomedical Community," Nature Genetics 29(3):253-256, November 2001, available at http://cmbi.bjmu.edu.cn/news/report/2001/insight-anthrax/feature/Genomics%20and%20future%20biological%20weapons.pdf. The issue of such targeted weapons was raised as early as 1970 in the professional military literature.
-
Nature Genetics
, vol.29
, Issue.3
, pp. 253-256
-
-
Fraser, C.M.1
Dando, M.R.2
-
146
-
-
34548469367
-
Ethnic Weapons
-
November 1970, available at
-
Carl Larson, "Ethnic Weapons," Military Review 50(11):3-11, November 1970, available at http://usacac.army.mil/CAC/Repository/Materials/MilitaryReview-197011300001-DOC.pdf.
-
Military Review
, vol.50
, Issue.11
, pp. 3-11
-
-
Larson, C.1
-
147
-
-
33746499664
-
As Police Use of Tasers Soars, Questions Over Safety Emerge
-
July 18
-
Alex Berenson, "As Police Use of Tasers Soars, Questions Over Safety Emerge," New York Times, July 18, 2004.
-
(2004)
New York Times
-
-
Berenson, A.1
-
149
-
-
84988879485
-
People of the Week: John Muhammad and John Malvo
-
October 24, available at
-
Jessica Reaves, "People of the Week: John Muhammad and John Malvo," Time, October 24, 2002, available at http://www.time.com/time/nation/article/0,8599,384284,00.html).
-
(2002)
Time
-
-
Reaves, J.1
-
150
-
-
84988878893
-
Fear Lingers in DC Area
-
November 12, available at
-
Susan Kim, "Fear Lingers in DC Area," Disaster News Network, November 12, 2002, available at http://www.disasternews.net/news/article.php?articleid=57).
-
(2002)
Disaster News Network
-
-
Kim, S.1
-
152
-
-
33645134706
-
A Proposal for an International Convention to Regulate the Use of Information Systems in Armed Conflict
-
Winter
-
Davis Brown, "A Proposal for an International Convention to Regulate the Use of Information Systems in Armed Conflict," Harvard International Law Journal 47(1):179-221, Winter 2006.
-
(2006)
Harvard International Law Journal
, vol.47
, Issue.1
, pp. 179-221
-
-
Brown, D.1
-
153
-
-
33645134706
-
A Proposal for an International Convention to Regulate the Use of Information Systems in Armed Conflict
-
Winter
-
Davis Brown, "A Proposal for an International Convention to Regulate the Use of Information Systems in Armed Conflict," Harvard International Law Journal 47(1):179-221, Winter 2006.
-
(2006)
Harvard International Law Journal
, vol.47
, Issue.1
, pp. 179-221
-
-
Brown, D.1
-
154
-
-
84893114477
-
Information Warfare and International Law on the Use of Force
-
Jason Barkham, "Information Warfare and International Law on the Use of Force," New York University International Law and Politics 34:57-113, 2001.
-
(2001)
New York University International Law and Politics
, vol.34
, pp. 57-113
-
-
Barkham, J.1
-
156
-
-
84988800071
-
-
United Nations Publications, New York City, available at
-
United Nations Disarmament Handbook, United Nations Publications, New York City, 2004, available at http://www.un.org/disarmament/HomePage/ODAPublications/Yearbook/2004/Html/Ch%20V6.html.
-
(2004)
United Nations Disarmament Handbook
-
-
-
157
-
-
84988831188
-
-
(Concept of Information Warfare), speech given at a Russian-U.S. conference, "Evolving Post-Cold War National Security Issues," Moscow, September 12-14
-
V. I. Tsymbal, "Kontseptsiya "Informatsionnoy Voiny'" (Concept of Information Warfare), speech given at a Russian-U.S. conference, "Evolving Post-Cold War National Security Issues," Moscow, September 12-14, 1995, p. 7
-
(1995)
Kontseptsiya "Informatsionnoy Voiny'"
, pp. 7
-
-
Tsymbal, V.I.1
-
158
-
-
84859931798
-
Deterring Information Warfare: A New Strategic Challenge
-
(Winter)
-
Timothy L. Thomas, "Deterring Information Warfare: A New Strategic Challenge," Parameters 26(Winter):82, 1996-1997.
-
Parameters
, vol.26
, Issue.82
, pp. 1996-1997
-
-
Thomas, T.L.1
-
159
-
-
0242381394
-
China's Electronic Strategies
-
(May-June), Available at
-
Timothy L. Thomas, "China's Electronic Strategies," Military Review (May-June), 2001. Available at http://leav-www.army.mil/fmso/documents/china_electric/china_elec-tric.htm.
-
(2001)
Military Review
-
-
Thomas, T.L.1
-
160
-
-
0039191632
-
The PLA and Information Warfare
-
in James C. Mulvenon (ed.), Conference Proceedings, The RAND Corporation
-
James C. Mulvenon, "The PLA and Information Warfare," in James C. Mulvenon (ed.), The People's Liberation Army in the Information Age, Conference Proceedings, The RAND Corporation, 1998.
-
(1998)
The People's Liberation Army in the Information Age
-
-
Mulvenon, J.C.1
-
161
-
-
0040376217
-
Viewing Our Army's Quality Building from the Perspective of What Information Warfare Demands
-
March 3, in FBIS-CHI-98-072, March 13, 1998
-
Wang Jianghuai and Lin Dong, "Viewing Our Army's Quality Building from the Perspective of What Information Warfare Demands," Jiefangjun bao, March 3, 1998, p. 6, in FBIS-CHI-98-072, March 13, 1998;
-
(1998)
Jiefangjun bao
, pp. 6
-
-
Jianghuai, W.1
Dong, L.2
-
162
-
-
84988822150
-
Information Insecurity
-
April 1, available at
-
Katherine McIntire Peters, "Information Insecurity," Government Executive, April 1, 1999, available at http://www.govexec.com/features/0499/0499s1.htm.
-
(1999)
Government Executive
-
-
-
166
-
-
84988884025
-
-
available at
-
Art Jahnke, "Russian Roulette," 2005, available at http://www.csoonline.com/read/010105/russian.html.
-
(2005)
Russian Roulette
-
-
Jahnke, A.1
-
174
-
-
84988903599
-
-
available at
-
Leif Nixon, "The Stakkato Intrusions," 2006, available at http://www.nsc.liu.se/nixon/stakkato.pdf.
-
(2006)
The Stakkato Intrusions
-
-
Nixon, L.1
-
176
-
-
0348225147
-
Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework
-
Michael Schmitt, "Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework," Columbia Journal of Transnational Law 37:885-937, 1999.
-
(1999)
Columbia Journal of Transnational Law
, vol.37
, pp. 885-937
-
-
Schmitt, M.1
-
177
-
-
84988884135
-
New Tools, New Rules: International Law and Information Operations
-
in G. David and T. McKeldin, eds., Potomac Books, Inc
-
Duncan B. Hollis, "New Tools, New Rules: International Law and Information Operations," pp. 59-72 in Ideas As Weapons: Influence and Perception in Modern Warfare, G. David and T. McKeldin, eds., Potomac Books, Inc., 2009.
-
(2009)
Ideas As Weapons: Influence and Perception in Modern Warfare
, pp. 59-72
-
-
Hollis, D.B.1
-
178
-
-
84988552861
-
-
The National Academies Press, Washington, D.C
-
National Research Council, Toward a Safer and More Secure Cyberspace, The National Academies Press, Washington, D.C., 2007.
-
(2007)
Toward a Safer and More Secure Cyberspace
-
-
-
179
-
-
84976781807
-
Reflections on Trusting Trust
-
August
-
Ken L. Thompson, "Reflections on Trusting Trust," Communications of the ACM 27(8):761-763, August 1984.
-
(1984)
Communications of the ACM
, vol.27
, Issue.8
, pp. 761-763
-
-
Thompson, K.L.1
-
183
-
-
84988837176
-
Why Sardonix Failed
-
February 4, available at
-
Hal Flynn, "Why Sardonix Failed," SecurityFocus, February 4, 2004, available at http://www.securityfocus.com/columnists/218.
-
(2004)
SecurityFocus
-
-
Flynn, H.1
-
184
-
-
33747367779
-
An Analysis of the Intel 80x86 Security Architecture and Implementations
-
May
-
Olin Sibert, Phillip A. Porras, and Robert Lindell, "An Analysis of the Intel 80x86 Security Architecture and Implementations," IEEE Transactions on Software Engineering, 22(5):283-293, May 1996;
-
(1996)
IEEE Transactions on Software Engineering
, vol.22
, Issue.5
, pp. 283-293
-
-
Sibert, O.1
Porras, P.A.2
Lindell, R.3
-
185
-
-
84871292064
-
-
talk presented at Hack-In-The-Box, Dubai, United Arab Emirates, PowerPoint presentation available at
-
Kris Kaspersky and Alice Chang, "Remote Code Execution Through Intel CPU Bugs," talk presented at Hack-In-The-Box, Dubai, United Arab Emirates, 2008, PowerPoint presentation available at http://nchovy.kr/uploads/3/303/D2T1%20-%20Kris%20Kaspersky%20-%20Remote%20Code%20Execution%20Through%20Intel%20CPU%20Bugs.pdf.
-
(2008)
Remote Code Execution Through Intel CPU Bugs
-
-
Kaspersky, K.1
Chang, A.2
-
186
-
-
84988837173
-
-
Security Innovation, Inc., Wilmington, Mass., available at
-
Ed Adams, "Biggest Information Security Mistakes That Organizations Make," Security Innovation, Inc., Wilmington, Mass., available at http://www.issa.org/Downloads/Whitepapers/Biggest-Information-Security-Mistakes_Security-Innovation.pdf.
-
Biggest Information Security Mistakes That Organizations Make
-
-
Adams, E.1
-
187
-
-
2442463532
-
A Taxonomy of Security Vulnerabilities
-
in Octobter, available at
-
Taimur Aslam, Ivan Krsul, and Eugene H. Spafford, "A Taxonomy of Security Vulnerabilities," in Proceedings of the 19th National Information Systems Security Conference, pp. 551-560, Octobter 1996, available at http://ftp.cerias.purdue.edu/pub/papers/taimur-aslam/aslam-krsul-spaf-taxonomy.pdf.
-
(1996)
Proceedings of the 19th National Information Systems Security Conference
, pp. 551-560
-
-
Aslam, T.1
Krsul, I.2
Spafford, E.H.3
-
190
-
-
0003714340
-
-
National Academy Press, Washington, D.C
-
CSTB/NRC, Trust in Cyberspace, National Academy Press, Washington, D.C., 1999
-
(1999)
Trust in Cyberspace
-
-
-
191
-
-
84988552861
-
-
The National Academies Press, Washington, D.C
-
NRC, Toward a Safer and More Secure Cyberspace, The National Academies Press, Washington, D.C., 2007.
-
(2007)
Toward a Safer and More Secure Cyberspace
-
-
-
194
-
-
84988821327
-
-
Director of National Intelligence, Annual Threat Assessment of the Intelligence Community for the Senate Select Committee on Intelligence, February 12, available at
-
Dennis Blair, Director of National Intelligence, Annual Threat Assessment of the Intelligence Community for the Senate Select Committee on Intelligence, February 12, 2009, available at http://intelligence.senate.gov/090212/blair.pdf.
-
(2009)
-
-
Blair, D.1
-
195
-
-
84892128175
-
National Cyber Security Initiative Will Have a Dozen Parts
-
August 1
-
Jill R. Aitoro, "National Cyber Security Initiative Will Have a Dozen Parts," Government Executive, August 1, 2008, available at http://www.nextgov.com/nextgov/ng_20080801_9053.php.
-
(2008)
Government Executive
-
-
Aitoro, J.R.1
-
197
-
-
0348225147
-
Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework
-
Michael Schmitt, "Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework," Columbia Journal of Transnational Law 37:885-937, 1999
-
(1999)
Columbia Journal of Transnational Law
, vol.37
, pp. 885-937
-
-
Schmitt, M.1
-
198
-
-
84865407269
-
Information Warfare as International Coercion: Elements of a Legal Framework
-
Christopher C. Joyner and Catherine Lotrionte, "Information Warfare as International Coercion: Elements of a Legal Framework," European Journal of International Law 12(5):825-865, 2001
-
(2001)
European Journal of International Law
, vol.12
, Issue.5
, pp. 825-865
-
-
Joyner, C.C.1
Lotrionte, C.2
-
199
-
-
84893114477
-
Information Warfare and International Law on the Use of Force
-
Jason Barkham, "Information Warfare and International Law on the Use of Force," New York University International Law and Politics 34:57-113, 2001
-
(2001)
New York University International Law and Politics
, vol.34
, pp. 57-113
-
-
Barkham, J.1
-
200
-
-
33645134706
-
A Proposal for an International Convention to Regulate the Use of Information Systems in Armed Conflict
-
Winter
-
Davis Brown, "A Proposal for an International Convention to Regulate the Use of Information Systems in Armed Conflict," Harvard International Law Journal 47(1):179-221, Winter 2006
-
(2006)
Harvard International Law Journal
, vol.47
, Issue.1
, pp. 179-221
-
-
Brown, D.1
-
201
-
-
84988884135
-
New Tools, New Rules: International Law and Information Operations
-
G. David and T. McKeldin, eds., Potomac Books Inc
-
Duncan B. Hollis, "New Tools, New Rules: International Law and Information Operations," pp. 59-72 in Ideas as Weapons: Influence and Perception in Modern Warfare, G. David and T. McKeldin, eds., Potomac Books Inc., 2009.
-
(2009)
Ideas as Weapons: Influence and Perception in Modern Warfare
, pp. 59-72
-
-
Hollis, D.B.1
-
202
-
-
0003813389
-
-
National Defense Research Institute, RAND, Washington, D.C., available at
-
Roger C. Molander, Andrew S. Riddile, and Peter A. Wilson, Strategic Information Warfare: A New Face of War, National Defense Research Institute, RAND, Washington, D.C., 1996, available at http://www.rand.org/pubs/monograph_reports/2005/MR661.pdf.
-
(1996)
Strategic Information Warfare: A New Face of War
-
-
Molander, R.C.1
Riddile, A.S.2
Wilson, P.A.3
-
204
-
-
84988827399
-
Military Command Is Created for Cyber Security
-
June 24
-
Siobhan Gorman and Yochi Dreazen, "Military Command Is Created for Cyber Security," Wall Street Journal, June 24, 2009, available at http://online.wsj.com/article/SB124579956278644449.html.
-
(2009)
Wall Street Journal
-
-
Gorman, S.1
Dreazen, Y.2
|