RAND_MR1382
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Conference, October 1997, pp. 285–289.<br />
122 National Research Council, Computers at Risk, Washington, D.C.: National Academy Press, 1991.<br />
123 Kevin Soo Hoo, Seymour Goodman, and Lawrence Greenberg, “Information Technology and the Terrorist Threat,”<br />
Survival, Vol. 39, No. 3, Autumn 1997, pp. 135–155. See also unpublished <strong>RAND</strong> research by Martin Libicki, James<br />
Mulvenon, and Zalmay Khalilzad, on information warfare, which examines these issues in some detail.<br />
124 Barry Collin, “The Future of Cyberterrorism,” Crime and Justice International, March 1997, pp. 15–18. In terms of<br />
scenario building, <strong>RAND</strong>’s longstanding “The Day After … in Cyberspace” research effort has done much pioneering work.<br />
See, for example, Roger C. Molander, Andrew S. Riddile, and Peter A. Wilson, Strategic Information Warfare: A New Face<br />
of War, Santa Monica, Calif.: <strong>RAND</strong>, 1996.<br />
125 Mark M. Pollitt, “Cyberterrorism: Fact or Fancy?” Proceedings of the 20th National Information Systems Security<br />
Conference, October 1997, pp. 285–289.<br />
126 Clark L. Staten, testimony before the Subcommittee on Technology, Terrorism and Government Information, U.S.<br />
Senate Judiciary Committee, February 24, 1998.<br />
127 “‘Dangerous’ Militant Stalks Internet,” Detroit News, November 9, 1998.<br />
128 G.A. Res. 53/70, U.N. GAOR, 53rd Sess., U.N. Doc. A/RES/53/70.<br />
129 Critical Foundations: Protecting America’s Infrastructures, The Report of the President’s Commission on Critical<br />
Infrastructure Protection, October 1997, report summary, www.pccip.gov.<br />
130 Ibid.<br />
131 Ibid.<br />
132 Protecting America’s Critical Infrastructures: PDD 63, The White House, May 22, 1998. See also the White Paper The<br />
Clinton Administration’s Policy on Critical Infrastructure Protection: Presidential Decision Directive 63, May 22, 1998, and<br />
“National Infrastructure Assurance Council,” Executive Order, The White House, July 14, 1999.<br />
133 CIWARS Intelligence Report, Centre for Infrastructural Warfare Studies, June 21, 1998; “Pentagon Computer Systems<br />
Hacked,” Info Security News, June 1998; Douglas Pasternak and Bruce B. Auster, “Terrorism at the Touch of a Keyboard,”<br />
U.S. News & World Report, July 13, 1998, p. 37.