Cybercrime-- Cyberterrorism-- Cyberwarfare--: Averting an Electronic Waterloo
CSIS Global Organized Crime Project, Center for Strategic and International Studies (Washington, D.C.)
Csis Press, 1998 - Computers - 73 pages
What people are saying - Write a review
We haven't found any reviews in the usual places.
What Would Strategic Information Warfare Look Like?
Roles of Government and Industry
Criteria and Recommendations for Policy Response
ability addressing the SIW Arnaud de Borchgrave capabilities Central Intelligence Agency communications systems companies coordinate corporations criminal CSIS Defense Science Board detect deterrence develop disrupt economic effective electronic encryption ensure espionage example exploit federal global hacker hostile identify Information Age information industry information infrastructure Information Revolution information technology Information Warfare Attacks information warfare threat Intelligence Agency intelligence community Internet IW attack IW strike IW threats law enforcement measures Microsoft military forces national security networks offensive IW opponent Organized Crime penetration potential private sector Rajiv Chandrasekaran recent require responsible role sophisticated sources Soviet Strategic information warfare tactical target Task Force telecommunications terrorism terrorist tion tional traditional U.S. government U.S. information systems U.S. intelligence U.S. leaders U.S. military U.S. officials U.S. policy U.S. Representative U.S. Secret Service U.S. Senator United vulnerable Y2K problem