Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities (2009)

Chapter: Appendix D: Views on the Use of Force in Cyberspace

Previous Chapter: Appendix C: Illustrative Criminal Cyberattacks
Suggested Citation: "Appendix D: Views on the Use of Force in Cyberspace." National Research Council. 2009. Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities. Washington, DC: The National Academies Press. doi: 10.17226/12651.
Page 356
Suggested Citation: "Appendix D: Views on the Use of Force in Cyberspace." National Research Council. 2009. Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities. Washington, DC: The National Academies Press. doi: 10.17226/12651.
Page 357
Suggested Citation: "Appendix D: Views on the Use of Force in Cyberspace." National Research Council. 2009. Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities. Washington, DC: The National Academies Press. doi: 10.17226/12651.
Page 358
Suggested Citation: "Appendix D: Views on the Use of Force in Cyberspace." National Research Council. 2009. Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities. Washington, DC: The National Academies Press. doi: 10.17226/12651.
Page 359
Next Chapter: Appendix E: Technical Vulnerabilities Targeted by Cyber Offensive Actions
Subscribe to Email from the National Academies
Keep up with all of the activities, publications, and events by subscribing to free updates by email.