Previous Chapter: Appendix B: Meeting Participants and Other Contributors
Suggested Citation: "Appendix C: Illustrative Criminal Cyberattacks." National Research Council. 2009. Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities. Washington, DC: The National Academies Press. doi: 10.17226/12651.
Page 350
Suggested Citation: "Appendix C: Illustrative Criminal Cyberattacks." National Research Council. 2009. Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities. Washington, DC: The National Academies Press. doi: 10.17226/12651.
Page 351
Suggested Citation: "Appendix C: Illustrative Criminal Cyberattacks." National Research Council. 2009. Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities. Washington, DC: The National Academies Press. doi: 10.17226/12651.
Page 352
Suggested Citation: "Appendix C: Illustrative Criminal Cyberattacks." National Research Council. 2009. Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities. Washington, DC: The National Academies Press. doi: 10.17226/12651.
Page 353
Suggested Citation: "Appendix C: Illustrative Criminal Cyberattacks." National Research Council. 2009. Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities. Washington, DC: The National Academies Press. doi: 10.17226/12651.
Page 354
Suggested Citation: "Appendix C: Illustrative Criminal Cyberattacks." National Research Council. 2009. Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities. Washington, DC: The National Academies Press. doi: 10.17226/12651.
Page 355
Next Chapter: Appendix D: Views on the Use of Force in Cyberspace
Subscribe to Email from the National Academies
Keep up with all of the activities, publications, and events by subscribing to free updates by email.