Bibliography
- Assistant Comptroller General of the U.S., ‘Report to the Chairman, Subcommittee on Telecommunications and Finance, Committee on Energy and Commerce, House of Representatives: Computer Security – Virus Highlights Need for Improved Internet Management’, Jun. (Washington DC: General Accounting Office, 1989).
- Berkowitz, Bruce, The New Face of War (New York NY: The Free Press 2003).
- Campen, Alan D., ’Iraqi Command and Control: The Information Differential’, in Campen (ed.), The First Information War (Fairfax VA: AFCEA International Press 1992), 172.
- Central Intelligence Agency, ‘Soviet Naval Strategy and Programs Through the 1990s’, Mar. (Washington DC: Central Intelligence Agency 1985). This document is now declassified.
- Clarke, Richard D., Cyber War: The Next Threat to National Security and What to Do About It (New York NY: Harper Collins 2010).
- Denning, Peter J., ’The Science of Computing: The Internet Worm’, American Scientist 77/2 (Mar.–Apr. 1989), 127.
- Department of Defense, Information Operations Roadmap, Oct. 2003, 45–48. Document is now partially declassified.
- Department of Defense Directive TS 3600.1, Information Warfare, 21 Dec. 1992. Document is now partially declassified.
- ’FBI Eyes Teens in Pentagon “Attacks”’, Wired, 27 Feb. 1998, https://www.wired.com/1998/02/fbi-eyes-teens-in-pentagon-attacks/ accessed 24 Feb. 2022.
- Federal Bureau of Investigations, ‘History: Morris Worm’, accessed 17 Jan. 2022, https://www.fbi.gov/history/famous-cases/morris-worm.
- Gates, Robert, Duty (New York City NY: Alfred A. Knopf 2014).
- Graham, Bradley, ‘Bush Orders Guidelines for Cyber-Warfare’, The Washington Post, 7 Feb. 2003.
- Hamre, John J. ‘Deputy Secretary of Defense, Speech to the Fortune 500 CIO Forum, Aspen, Colorado’, 21 Jul. 1998, https://www.globalsecurity.org/intell//library/news/1998/07/t08121998_t072198.html.
- Healey, Jason ed., Fierce Domain: Conflict in Cyberspace, 1986–2012 (Vienna VA: Cyber Conflict Studies Association 2013).
- Herring, George C., From Colony to Superpower: U.S. Foreign Relations Since 1776 (Oxford , UK: Oxford UP 2011).
- House of Representatives, ‘Computer Security: Hearings Before the Subcommittee on Technology and Competitiveness of the Committee on Science, Space, and Technology’, 102nd Cong., 1st Session, Washington, DC, 27 Jun. 1991.
- Joint Chiefs of Staff, National Military Strategy, Jan. 1992.
- Joint Chiefs of Staff, National Military Strategy, 1995.
- Joint Chiefs of Staff, National Military Strategy, May 1997.
- Joint Chiefs of Staff, National Military Strategy, 2004.
- Joint Chiefs of Staff, National Military Strategy for Cyberspace Operations, Dec. 2006. Document is now partially declassified.
- Kaplan, Frank, Dark Territory: The Secret History of Cyber War (New York NY: Simon & Schuster Paperbacks 2016).
- Loeb, Vernon, ‘NSA Adviser Says Cyber-Assaults on Pentagon Persist with Few Clues’, The Washington Post, 7 May 2001.
- Marsh, Robert T., ‘Critical Foundations: Protecting America’s Infrastructures’, The Report of the President’s Commission on Critical Infrastructure Protection, 13 Oct. (Washington DC 1997).
- Martin, Jennifer, ‘Nunn: End of Cold War Destabilized World’, South Bend Tribune, 19 Mar. 1998, https://www.proquest.com/newspapers/nunn-end-cold-war-destabilized-world-ex-senator/docview/416888814/se-2?accountid=4332.
- McConnell, Mike, Interview by Charlie Rose, The Charlie Rose Show, PBS, 8 Jan. 2009.
- Molander, Roger C., Andrew S. Riddile, and Peter A. Wilson, Strategic Information Warfare: A New Face of War (Santa Monica CA: RAND 1996).
- National Security Presidential Directive 54, Cybersecurity Policy, 8 Jan. 2008.
- Office of the Under Secretary of Defense for Acquisition & Technology, ‘Report of the Defense Science Board Task Force on Information Warfare-Defense (IW-D)’, Nov. 1996, https://apps.dtic.mil/docs/citations/ADA319571.
- Perera, David, ‘Stop Saying “Cyber Pearl Harbor”’,Fierce Government IT, 13 Jun. 2012, https://web.archive.org/web/20120617204335/http://www.fiercegovernmentit.com/story/stop-saying-cyber-pearl-harbor/2012-06-13.
- Rona, Thomas, Weapon Systems and Information War, 1 Jul. (Seattle, WA: Boeing Corporation, for the Office of the Secretary of Defense 1976).
- Ryan, Jason, ‘CIA Director Leon Panetta Warns of Possible Cyber-Pearl Harbor’ ,ABC News, 10 Feb. 2011, https://abcnews.go.com/News/cia-director-leon-panetta-warns-cyber-pearl-harbor/story?id=12888905.
- Schulte, Stephanie Ritter, ’The WarGames Scenario’, Journal of Television and New Media 9/6 (2008), 487–513. https://www.academia.edu/download/32038664/III.C.FRC-Articles_Schulte_8_TVNMedia_2008.pdf.
- Secretary of Defense, National Defense Strategy, Mar. 2005.
- Senate, ‘Security in Cyberspace: Hearings Before the Permanent Subcommittee on Investigations of the Committee on Governmental Affairs’, 104th Cong., 2nd Session, 16 Jul. 1996, https://babel.hathitrust.org/cgi/pt?id=uc1.31210010684072&view=1up&seq=161.
- Smith, George, ’An Electronic Pearl Harbor? Not Likely’, Issues in Science and Technology 15/1 ( Fall 1998). https://www.jstor.org/stable/43311853.
- US Congress, General Accounting Office, ‘Information Security: Computer Attacks at Department of Defense Pose Increasing Risks’, Technical Report GAO/AIMD-96-84, 22 May 1996.
- Warner, Michael, ’Cybersecurity: A Pre-History’, Intelligence & National Security 27/5 (October 2012), 781–99. doi:10.1080/02684527.2012.708530.
- Warner, Michael, ’A Brief History of Cyber Conflict’, in Schneider (ed.), Ten Years In (Newport RI: Naval War College 2020), 15.
- ’We’re in the Middle of a Cyberwar’, Newsweek, 19 Sep. 1999.
- White House, ‘National Security Decision Directive 145’, National Policy on Telecommunications and Automated Information Systems, 17 Sep. 1984. Document is now partially declassified.
- White House, National Security Strategy, Feb. 1996.
- White House, National Security Strategy, 1997.
- White House, National Security Strategy, Dec. 1999.
- White House, National Security Strategy, Dec. 2000.
- White House, National Security Strategy, Sep. 2002.
- White House, National Security Strategy, Mar. 2006.
- White House, National Security Strategy, May 2010.
- Wiener, Craig, ‘Penetrate, Exploit, Disrupt, Destroy: The Rise of Computer Network Operations as a Major Military Innovation’, PhD Dissertation, George Mason Univ., 2015.