Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities (2009)

Chapter: 5 Perspectives on Cyberattack Outside National Security

Previous Chapter: 4 An Intelligence Community Perspective on Cyberattack and Cyberexploitation
Suggested Citation: "5 Perspectives on Cyberattack Outside National Security." National Research Council. 2009. Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities. Washington, DC: The National Academies Press. doi: 10.17226/12651.
Page 200
Suggested Citation: "5 Perspectives on Cyberattack Outside National Security." National Research Council. 2009. Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities. Washington, DC: The National Academies Press. doi: 10.17226/12651.
Page 201
Suggested Citation: "5 Perspectives on Cyberattack Outside National Security." National Research Council. 2009. Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities. Washington, DC: The National Academies Press. doi: 10.17226/12651.
Page 202
Suggested Citation: "5 Perspectives on Cyberattack Outside National Security." National Research Council. 2009. Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities. Washington, DC: The National Academies Press. doi: 10.17226/12651.
Page 203
Suggested Citation: "5 Perspectives on Cyberattack Outside National Security." National Research Council. 2009. Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities. Washington, DC: The National Academies Press. doi: 10.17226/12651.
Page 204
Suggested Citation: "5 Perspectives on Cyberattack Outside National Security." National Research Council. 2009. Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities. Washington, DC: The National Academies Press. doi: 10.17226/12651.
Page 205
Suggested Citation: "5 Perspectives on Cyberattack Outside National Security." National Research Council. 2009. Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities. Washington, DC: The National Academies Press. doi: 10.17226/12651.
Page 206
Suggested Citation: "5 Perspectives on Cyberattack Outside National Security." National Research Council. 2009. Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities. Washington, DC: The National Academies Press. doi: 10.17226/12651.
Page 207
Suggested Citation: "5 Perspectives on Cyberattack Outside National Security." National Research Council. 2009. Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities. Washington, DC: The National Academies Press. doi: 10.17226/12651.
Page 208
Suggested Citation: "5 Perspectives on Cyberattack Outside National Security." National Research Council. 2009. Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities. Washington, DC: The National Academies Press. doi: 10.17226/12651.
Page 209
Suggested Citation: "5 Perspectives on Cyberattack Outside National Security." National Research Council. 2009. Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities. Washington, DC: The National Academies Press. doi: 10.17226/12651.
Page 210
Suggested Citation: "5 Perspectives on Cyberattack Outside National Security." National Research Council. 2009. Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities. Washington, DC: The National Academies Press. doi: 10.17226/12651.
Page 211
Suggested Citation: "5 Perspectives on Cyberattack Outside National Security." National Research Council. 2009. Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities. Washington, DC: The National Academies Press. doi: 10.17226/12651.
Page 212
Suggested Citation: "5 Perspectives on Cyberattack Outside National Security." National Research Council. 2009. Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities. Washington, DC: The National Academies Press. doi: 10.17226/12651.
Page 213
Next Chapter: 6 Decision Making and Oversight
Subscribe to Email from the National Academies
Keep up with all of the activities, publications, and events by subscribing to free updates by email.