23.04.2017 Views

RAND_MR1382

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Conference, October 1997, pp. 285–289.<br />

122 National Research Council, Computers at Risk, Washington, D.C.: National Academy Press, 1991.<br />

123 Kevin Soo Hoo, Seymour Goodman, and Lawrence Greenberg, “Information Technology and the Terrorist Threat,”<br />

Survival, Vol. 39, No. 3, Autumn 1997, pp. 135–155. See also unpublished <strong>RAND</strong> research by Martin Libicki, James<br />

Mulvenon, and Zalmay Khalilzad, on information warfare, which examines these issues in some detail.<br />

124 Barry Collin, “The Future of Cyberterrorism,” Crime and Justice International, March 1997, pp. 15–18. In terms of<br />

scenario building, <strong>RAND</strong>’s longstanding “The Day After … in Cyberspace” research effort has done much pioneering work.<br />

See, for example, Roger C. Molander, Andrew S. Riddile, and Peter A. Wilson, Strategic Information Warfare: A New Face<br />

of War, Santa Monica, Calif.: <strong>RAND</strong>, 1996.<br />

125 Mark M. Pollitt, “Cyberterrorism: Fact or Fancy?” Proceedings of the 20th National Information Systems Security<br />

Conference, October 1997, pp. 285–289.<br />

126 Clark L. Staten, testimony before the Subcommittee on Technology, Terrorism and Government Information, U.S.<br />

Senate Judiciary Committee, February 24, 1998.<br />

127 “‘Dangerous’ Militant Stalks Internet,” Detroit News, November 9, 1998.<br />

128 G.A. Res. 53/70, U.N. GAOR, 53rd Sess., U.N. Doc. A/RES/53/70.<br />

129 Critical Foundations: Protecting America’s Infrastructures, The Report of the President’s Commission on Critical<br />

Infrastructure Protection, October 1997, report summary, www.pccip.gov.<br />

130 Ibid.<br />

131 Ibid.<br />

132 Protecting America’s Critical Infrastructures: PDD 63, The White House, May 22, 1998. See also the White Paper The<br />

Clinton Administration’s Policy on Critical Infrastructure Protection: Presidential Decision Directive 63, May 22, 1998, and<br />

“National Infrastructure Assurance Council,” Executive Order, The White House, July 14, 1999.<br />

133 CIWARS Intelligence Report, Centre for Infrastructural Warfare Studies, June 21, 1998; “Pentagon Computer Systems<br />

Hacked,” Info Security News, June 1998; Douglas Pasternak and Bruce B. Auster, “Terrorism at the Touch of a Keyboard,”<br />

U.S. News & World Report, July 13, 1998, p. 37.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!