Author: National Research Council
Publisher: National Academies Press
ISBN: 0309138507
Category : Technology & Engineering
Languages : en
Pages : 391
Book Description
The United States is increasingly dependent on information and information technology for both civilian and military purposes, as are many other nations. Although there is a substantial literature on the potential impact of a cyberattack on the societal infrastructure of the United States, little has been written about the use of cyberattack as an instrument of U.S. policy. Cyberattacks-actions intended to damage adversary computer systems or networks-can be used for a variety of military purposes. But they also have application to certain missions of the intelligence community, such as covert action. They may be useful for certain domestic law enforcement purposes, and some analysts believe that they might be useful for certain private sector entities who are themselves under cyberattack. This report considers all of these applications from an integrated perspective that ties together technology, policy, legal, and ethical issues. Focusing on the use of cyberattack as an instrument of U.S. national policy, Technology, Policy, Law and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities explores important characteristics of cyberattack. It describes the current international and domestic legal structure as it might apply to cyberattack, and considers analogies to other domains of conflict to develop relevant insights. Of special interest to the military, intelligence, law enforcement, and homeland security communities, this report is also an essential point of departure for nongovernmental researchers interested in this rarely discussed topic.
Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities
Author: National Research Council
Publisher: National Academies Press
ISBN: 0309138507
Category : Technology & Engineering
Languages : en
Pages : 391
Book Description
The United States is increasingly dependent on information and information technology for both civilian and military purposes, as are many other nations. Although there is a substantial literature on the potential impact of a cyberattack on the societal infrastructure of the United States, little has been written about the use of cyberattack as an instrument of U.S. policy. Cyberattacks-actions intended to damage adversary computer systems or networks-can be used for a variety of military purposes. But they also have application to certain missions of the intelligence community, such as covert action. They may be useful for certain domestic law enforcement purposes, and some analysts believe that they might be useful for certain private sector entities who are themselves under cyberattack. This report considers all of these applications from an integrated perspective that ties together technology, policy, legal, and ethical issues. Focusing on the use of cyberattack as an instrument of U.S. national policy, Technology, Policy, Law and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities explores important characteristics of cyberattack. It describes the current international and domestic legal structure as it might apply to cyberattack, and considers analogies to other domains of conflict to develop relevant insights. Of special interest to the military, intelligence, law enforcement, and homeland security communities, this report is also an essential point of departure for nongovernmental researchers interested in this rarely discussed topic.
Publisher: National Academies Press
ISBN: 0309138507
Category : Technology & Engineering
Languages : en
Pages : 391
Book Description
The United States is increasingly dependent on information and information technology for both civilian and military purposes, as are many other nations. Although there is a substantial literature on the potential impact of a cyberattack on the societal infrastructure of the United States, little has been written about the use of cyberattack as an instrument of U.S. policy. Cyberattacks-actions intended to damage adversary computer systems or networks-can be used for a variety of military purposes. But they also have application to certain missions of the intelligence community, such as covert action. They may be useful for certain domestic law enforcement purposes, and some analysts believe that they might be useful for certain private sector entities who are themselves under cyberattack. This report considers all of these applications from an integrated perspective that ties together technology, policy, legal, and ethical issues. Focusing on the use of cyberattack as an instrument of U.S. national policy, Technology, Policy, Law and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities explores important characteristics of cyberattack. It describes the current international and domestic legal structure as it might apply to cyberattack, and considers analogies to other domains of conflict to develop relevant insights. Of special interest to the military, intelligence, law enforcement, and homeland security communities, this report is also an essential point of departure for nongovernmental researchers interested in this rarely discussed topic.
A Prehistory of the Cloud
Author: Tung-Hui Hu
Publisher: MIT Press
ISBN: 0262529963
Category : Computers
Languages : en
Pages : 241
Book Description
The militarized legacy of the digital cloud: how the cloud grew out of older network technologies and politics. We may imagine the digital cloud as placeless, mute, ethereal, and unmediated. Yet the reality of the cloud is embodied in thousands of massive data centers, any one of which can use as much electricity as a midsized town. Even all these data centers are only one small part of the cloud. Behind that cloud-shaped icon on our screens is a whole universe of technologies and cultural norms, all working to keep us from noticing their existence. In this book, Tung-Hui Hu examines the gap between the real and the virtual in our understanding of the cloud. Hu shows that the cloud grew out of such older networks as railroad tracks, sewer lines, and television circuits. He describes key moments in the prehistory of the cloud, from the game “Spacewar” as exemplar of time-sharing computers to Cold War bunkers that were later reused as data centers. Countering the popular perception of a new “cloudlike” political power that is dispersed and immaterial, Hu argues that the cloud grafts digital technologies onto older ways of exerting power over a population. But because we invest the cloud with cultural fantasies about security and participation, we fail to recognize its militarized origins and ideology. Moving between the materiality of the technology itself and its cultural rhetoric, Hu's account offers a set of new tools for rethinking the contemporary digital environment.
Publisher: MIT Press
ISBN: 0262529963
Category : Computers
Languages : en
Pages : 241
Book Description
The militarized legacy of the digital cloud: how the cloud grew out of older network technologies and politics. We may imagine the digital cloud as placeless, mute, ethereal, and unmediated. Yet the reality of the cloud is embodied in thousands of massive data centers, any one of which can use as much electricity as a midsized town. Even all these data centers are only one small part of the cloud. Behind that cloud-shaped icon on our screens is a whole universe of technologies and cultural norms, all working to keep us from noticing their existence. In this book, Tung-Hui Hu examines the gap between the real and the virtual in our understanding of the cloud. Hu shows that the cloud grew out of such older networks as railroad tracks, sewer lines, and television circuits. He describes key moments in the prehistory of the cloud, from the game “Spacewar” as exemplar of time-sharing computers to Cold War bunkers that were later reused as data centers. Countering the popular perception of a new “cloudlike” political power that is dispersed and immaterial, Hu argues that the cloud grafts digital technologies onto older ways of exerting power over a population. But because we invest the cloud with cultural fantasies about security and participation, we fail to recognize its militarized origins and ideology. Moving between the materiality of the technology itself and its cultural rhetoric, Hu's account offers a set of new tools for rethinking the contemporary digital environment.
Challenges to Effective Acquisition and Management of Information Technology Systems
Author: United States. Congress. House. Committee on Armed Services. Panel on Defense Acquisition Reform
Publisher:
ISBN:
Category : Business & Economics
Languages : en
Pages : 556
Book Description
Publisher:
ISBN:
Category : Business & Economics
Languages : en
Pages : 556
Book Description
Critical Code
Author: National Research Council
Publisher: National Academies Press
ISBN: 0309159482
Category : Computers
Languages : en
Pages : 160
Book Description
Critical Code contemplates Department of Defense (DoD) needs and priorities for software research and suggests a research agenda and related actions. Building on two prior booksâ€"Summary of a Workshop on Software Intensive Systems and Uncertainty at Scale and Preliminary Observations on DoD Software Research Needs and Prioritiesâ€"the present volume assesses the nature of the national investment in software research and, in particular, considers ways to revitalize the knowledge base needed to design, produce, and employ software-intensive systems for tomorrow's defense needs. Critical Code discusses four sets of questions: To what extent is software capability significant for the DoD? Is it becoming more or less significant and strategic in systems development? Will the advances in software producibility needed by the DoD emerge unaided from industry at a pace sufficient to meet evolving defense requirements? What are the opportunities for the DoD to make more effective use of emerging technology to improve software capability and software producibility? In which technology areas should the DoD invest in research to advance defense software capability and producibility?
Publisher: National Academies Press
ISBN: 0309159482
Category : Computers
Languages : en
Pages : 160
Book Description
Critical Code contemplates Department of Defense (DoD) needs and priorities for software research and suggests a research agenda and related actions. Building on two prior booksâ€"Summary of a Workshop on Software Intensive Systems and Uncertainty at Scale and Preliminary Observations on DoD Software Research Needs and Prioritiesâ€"the present volume assesses the nature of the national investment in software research and, in particular, considers ways to revitalize the knowledge base needed to design, produce, and employ software-intensive systems for tomorrow's defense needs. Critical Code discusses four sets of questions: To what extent is software capability significant for the DoD? Is it becoming more or less significant and strategic in systems development? Will the advances in software producibility needed by the DoD emerge unaided from industry at a pace sufficient to meet evolving defense requirements? What are the opportunities for the DoD to make more effective use of emerging technology to improve software capability and software producibility? In which technology areas should the DoD invest in research to advance defense software capability and producibility?
Hacking the Bomb
Author: Andrew Futter
Publisher: Georgetown University Press
ISBN: 1626165661
Category : Political Science
Languages : en
Pages : 286
Book Description
Are nuclear arsenals safe from cyber-attack? Could terrorists launch a nuclear weapon through hacking? Are we standing at the edge of a major technological challenge to global nuclear order? These are among the many pressing security questions addressed in Andrew Futter’s ground-breaking study of the cyber threat to nuclear weapons. Hacking the Bomb provides the first ever comprehensive assessment of this worrying and little-understood strategic development, and it explains how myriad new cyber challenges will impact the way that the world thinks about and manages the ultimate weapon. The book cuts through the hype surrounding the cyber phenomenon and provides a framework through which to understand and proactively address the implications of the emerging cyber-nuclear nexus. It does this by tracing the cyber challenge right across the nuclear weapons enterprise, explains the important differences between types of cyber threats, and unpacks how cyber capabilities will impact strategic thinking, nuclear balances, deterrence thinking, and crisis management. The book makes the case for restraint in the cyber realm when it comes to nuclear weapons given the considerable risks of commingling weapons of mass disruption with weapons of mass destruction, and argues against establishing a dangerous norm of “hacking the bomb.” This timely book provides a starting point for an essential discussion about the challenges associated with the cyber-nuclear nexus, and will be of great interest to scholars and students of security studies as well as defense practitioners and policy makers.
Publisher: Georgetown University Press
ISBN: 1626165661
Category : Political Science
Languages : en
Pages : 286
Book Description
Are nuclear arsenals safe from cyber-attack? Could terrorists launch a nuclear weapon through hacking? Are we standing at the edge of a major technological challenge to global nuclear order? These are among the many pressing security questions addressed in Andrew Futter’s ground-breaking study of the cyber threat to nuclear weapons. Hacking the Bomb provides the first ever comprehensive assessment of this worrying and little-understood strategic development, and it explains how myriad new cyber challenges will impact the way that the world thinks about and manages the ultimate weapon. The book cuts through the hype surrounding the cyber phenomenon and provides a framework through which to understand and proactively address the implications of the emerging cyber-nuclear nexus. It does this by tracing the cyber challenge right across the nuclear weapons enterprise, explains the important differences between types of cyber threats, and unpacks how cyber capabilities will impact strategic thinking, nuclear balances, deterrence thinking, and crisis management. The book makes the case for restraint in the cyber realm when it comes to nuclear weapons given the considerable risks of commingling weapons of mass disruption with weapons of mass destruction, and argues against establishing a dangerous norm of “hacking the bomb.” This timely book provides a starting point for an essential discussion about the challenges associated with the cyber-nuclear nexus, and will be of great interest to scholars and students of security studies as well as defense practitioners and policy makers.
Foreign Influence on Software
Author: James Andrew Lewis
Publisher: CSIS
ISBN: 9780892064977
Category : Business & Economics
Languages : en
Pages : 52
Book Description
"Globalization drives change. The immense economic transition that comes with globalization has brought an unprecedented prosperity to the world. The United States is among the chief beneficiaries. However, America and other countries have learned that with the benefits come new risks. Nations face different and unexpected threats to their safety. Opponents will look to the immense global economic machine created for commerce to find new ways to attack. Creating policies that can maintain economic opportunity while managing new risks is one of the most complex challenges that governments face today. This report looks at one new set of risks created by changes in how companies write software and considers how best to mitigate that risk."--Publisher's website
Publisher: CSIS
ISBN: 9780892064977
Category : Business & Economics
Languages : en
Pages : 52
Book Description
"Globalization drives change. The immense economic transition that comes with globalization has brought an unprecedented prosperity to the world. The United States is among the chief beneficiaries. However, America and other countries have learned that with the benefits come new risks. Nations face different and unexpected threats to their safety. Opponents will look to the immense global economic machine created for commerce to find new ways to attack. Creating policies that can maintain economic opportunity while managing new risks is one of the most complex challenges that governments face today. This report looks at one new set of risks created by changes in how companies write software and considers how best to mitigate that risk."--Publisher's website
Department of Defense Policies and Procedures for the Acquisition of Information Technology
Author:
Publisher: DIANE Publishing
ISBN: 1437917151
Category : Technology & Engineering
Languages : en
Pages : 109
Book Description
This report examines the challenges facing the DoD in acquiring information technology (IT) and offers recommendations to improve current circumstances. The fundamental problem DoD faces is that the deliberate process through which weapon systems and IT are acquired does not match the speed at which new IT capabilities are being introduced in today¿s information age. Consequently, the principal recommendation of the study is that DoD needs a new acquisition system for IT. Roles and responsibilities for those involved in the acquisition process must be clarified and strengthened and the IT system acquisition skills required in the workforce must also be strengthened. Illustrations.
Publisher: DIANE Publishing
ISBN: 1437917151
Category : Technology & Engineering
Languages : en
Pages : 109
Book Description
This report examines the challenges facing the DoD in acquiring information technology (IT) and offers recommendations to improve current circumstances. The fundamental problem DoD faces is that the deliberate process through which weapon systems and IT are acquired does not match the speed at which new IT capabilities are being introduced in today¿s information age. Consequently, the principal recommendation of the study is that DoD needs a new acquisition system for IT. Roles and responsibilities for those involved in the acquisition process must be clarified and strengthened and the IT system acquisition skills required in the workforce must also be strengthened. Illustrations.
The Competitive Status of the U.S. Electronics Sector
Author:
Publisher:
ISBN:
Category : Competition, International
Languages : en
Pages : 244
Book Description
Publisher:
ISBN:
Category : Competition, International
Languages : en
Pages : 244
Book Description
What Makes Industries Strategic
Author: Martin C. Libicki
Publisher: DIANE Publishing
ISBN: 0788131559
Category :
Languages : en
Pages : 95
Book Description
Contents: technology development as strategy (America in the world economy); technological dependence; networks of development (corporate and local networks; leading-edge sectors as engines of growth); the strategic content of key industries (agriculture, chemicals, motor vehicles, semiconductors, military aerospace, fashion); perspectives on defense policy (the challenge of industrial integration); perspectives on commercial policy (trade, standards, foreign direct investment); and national stakes in the globalization of industry.
Publisher: DIANE Publishing
ISBN: 0788131559
Category :
Languages : en
Pages : 95
Book Description
Contents: technology development as strategy (America in the world economy); technological dependence; networks of development (corporate and local networks; leading-edge sectors as engines of growth); the strategic content of key industries (agriculture, chemicals, motor vehicles, semiconductors, military aerospace, fashion); perspectives on defense policy (the challenge of industrial integration); perspectives on commercial policy (trade, standards, foreign direct investment); and national stakes in the globalization of industry.
Official (ISC)2 Guide to the CSSLP CBK
Author: Mano Paul
Publisher: CRC Press
ISBN: 1000758117
Category : Computers
Languages : en
Pages : 556
Book Description
Application vulnerabilities continue to top the list of cyber security concerns. While attackers and researchers continue to expose new application vulnerabilities, the most common application flaws are previous, rediscovered threats. The text allows readers to learn about software security from a renowned security practitioner who is the appointed software assurance advisor for (ISC)2. Complete with numerous illustrations, it makes complex security concepts easy to understand and implement. In addition to being a valuable resource for those studying for the CSSLP examination, this book is also an indispensable software security reference for those already part of the certified elite. A robust and comprehensive appendix makes this book a time-saving resource for anyone involved in secure software development.
Publisher: CRC Press
ISBN: 1000758117
Category : Computers
Languages : en
Pages : 556
Book Description
Application vulnerabilities continue to top the list of cyber security concerns. While attackers and researchers continue to expose new application vulnerabilities, the most common application flaws are previous, rediscovered threats. The text allows readers to learn about software security from a renowned security practitioner who is the appointed software assurance advisor for (ISC)2. Complete with numerous illustrations, it makes complex security concepts easy to understand and implement. In addition to being a valuable resource for those studying for the CSSLP examination, this book is also an indispensable software security reference for those already part of the certified elite. A robust and comprehensive appendix makes this book a time-saving resource for anyone involved in secure software development.