Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities (2009)

Chapter: Appendix D: Views on the Use of Force in Cyberspace

Previous Chapter: Appendix C: Illustrative Criminal Cyberattacks
Suggested Citation: "Appendix D: Views on the Use of Force in Cyberspace." National Research Council. 2009. Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities. Washington, DC: The National Academies Press. doi: 10.17226/12651.
Page 356
Suggested Citation: "Appendix D: Views on the Use of Force in Cyberspace." National Research Council. 2009. Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities. Washington, DC: The National Academies Press. doi: 10.17226/12651.
Page 357
Suggested Citation: "Appendix D: Views on the Use of Force in Cyberspace." National Research Council. 2009. Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities. Washington, DC: The National Academies Press. doi: 10.17226/12651.
Page 358
Suggested Citation: "Appendix D: Views on the Use of Force in Cyberspace." National Research Council. 2009. Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities. Washington, DC: The National Academies Press. doi: 10.17226/12651.
Page 359
Next Chapter: Appendix E: Technical Vulnerabilities Targeted by Cyber Offensive Actions
Subscribe to Emails from the National Academies
Stay up to date on activities, publications, and events by subscribing to email updates.