Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities (2009)

Chapter: 4 An Intelligence Community Perspective on Cyberattack and Cyberexploitation

Previous Chapter: 3 A Military Perspective on Cyberattack
Suggested Citation: "4 An Intelligence Community Perspective on Cyberattack and Cyberexploitation." National Research Council. 2009. Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities. Washington, DC: The National Academies Press. doi: 10.17226/12651.
Page 188
Suggested Citation: "4 An Intelligence Community Perspective on Cyberattack and Cyberexploitation." National Research Council. 2009. Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities. Washington, DC: The National Academies Press. doi: 10.17226/12651.
Page 189
Suggested Citation: "4 An Intelligence Community Perspective on Cyberattack and Cyberexploitation." National Research Council. 2009. Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities. Washington, DC: The National Academies Press. doi: 10.17226/12651.
Page 190
Suggested Citation: "4 An Intelligence Community Perspective on Cyberattack and Cyberexploitation." National Research Council. 2009. Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities. Washington, DC: The National Academies Press. doi: 10.17226/12651.
Page 191
Suggested Citation: "4 An Intelligence Community Perspective on Cyberattack and Cyberexploitation." National Research Council. 2009. Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities. Washington, DC: The National Academies Press. doi: 10.17226/12651.
Page 192
Suggested Citation: "4 An Intelligence Community Perspective on Cyberattack and Cyberexploitation." National Research Council. 2009. Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities. Washington, DC: The National Academies Press. doi: 10.17226/12651.
Page 193
Suggested Citation: "4 An Intelligence Community Perspective on Cyberattack and Cyberexploitation." National Research Council. 2009. Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities. Washington, DC: The National Academies Press. doi: 10.17226/12651.
Page 194
Suggested Citation: "4 An Intelligence Community Perspective on Cyberattack and Cyberexploitation." National Research Council. 2009. Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities. Washington, DC: The National Academies Press. doi: 10.17226/12651.
Page 195
Suggested Citation: "4 An Intelligence Community Perspective on Cyberattack and Cyberexploitation." National Research Council. 2009. Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities. Washington, DC: The National Academies Press. doi: 10.17226/12651.
Page 196
Suggested Citation: "4 An Intelligence Community Perspective on Cyberattack and Cyberexploitation." National Research Council. 2009. Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities. Washington, DC: The National Academies Press. doi: 10.17226/12651.
Page 197
Suggested Citation: "4 An Intelligence Community Perspective on Cyberattack and Cyberexploitation." National Research Council. 2009. Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities. Washington, DC: The National Academies Press. doi: 10.17226/12651.
Page 198
Suggested Citation: "4 An Intelligence Community Perspective on Cyberattack and Cyberexploitation." National Research Council. 2009. Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities. Washington, DC: The National Academies Press. doi: 10.17226/12651.
Page 199
Next Chapter: 5 Perspectives on Cyberattack Outside National Security
Subscribe to Email from the National Academies
Keep up with all of the activities, publications, and events by subscribing to free updates by email.