語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Penetrate, Exploit, Disrupt, Destroy...
~
Wiener, Craig J.
FindBook
Google Book
Amazon
博客來
Penetrate, Exploit, Disrupt, Destroy: The Rise of Computer Network Operations as a Major Military Innovation.
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Penetrate, Exploit, Disrupt, Destroy: The Rise of Computer Network Operations as a Major Military Innovation./
作者:
Wiener, Craig J.
出版者:
Ann Arbor : ProQuest Dissertations & Theses, : 2016,
面頁冊數:
443 p.
附註:
Source: Dissertation Abstracts International, Volume: 78-06(E), Section: A.
Contained By:
Dissertation Abstracts International78-06A(E).
標題:
Political science. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10248369
ISBN:
9781369551631
Penetrate, Exploit, Disrupt, Destroy: The Rise of Computer Network Operations as a Major Military Innovation.
Wiener, Craig J.
Penetrate, Exploit, Disrupt, Destroy: The Rise of Computer Network Operations as a Major Military Innovation.
- Ann Arbor : ProQuest Dissertations & Theses, 2016 - 443 p.
Source: Dissertation Abstracts International, Volume: 78-06(E), Section: A.
Thesis (Ph.D.)--George Mason University, 2016.
This dissertation assesses that computer network operations are a major military innovation (MMI). It examines the role of the US Intelligence Community in the development of computer network exploitation and attack over four discrete time periods spanning approximately 30 years. The study draws upon a range of theories from the field of security studies and disruptive innovation management and a wealth of newly available information due to recently declassified documents and interviews with elite members of the US Intelligence Community. My analysis yields three major findings while providing key additions to the history of computer network attack developmental activities.
ISBN: 9781369551631Subjects--Topical Terms:
528916
Political science.
Penetrate, Exploit, Disrupt, Destroy: The Rise of Computer Network Operations as a Major Military Innovation.
LDR
:04697nmm a2200361 4500
001
2157131
005
20180531091026.5
008
190424s2016 ||||||||||||||||| ||eng d
020
$a
9781369551631
035
$a
(MiAaPQ)AAI10248369
035
$a
(MiAaPQ)gmu:11318
035
$a
AAI10248369
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Wiener, Craig J.
$0
(orcid)0000-0001-5746-8948
$3
3344919
245
1 0
$a
Penetrate, Exploit, Disrupt, Destroy: The Rise of Computer Network Operations as a Major Military Innovation.
260
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2016
300
$a
443 p.
500
$a
Source: Dissertation Abstracts International, Volume: 78-06(E), Section: A.
500
$a
Adviser: Gregory Koblentz.
502
$a
Thesis (Ph.D.)--George Mason University, 2016.
520
$a
This dissertation assesses that computer network operations are a major military innovation (MMI). It examines the role of the US Intelligence Community in the development of computer network exploitation and attack over four discrete time periods spanning approximately 30 years. The study draws upon a range of theories from the field of security studies and disruptive innovation management and a wealth of newly available information due to recently declassified documents and interviews with elite members of the US Intelligence Community. My analysis yields three major findings while providing key additions to the history of computer network attack developmental activities.
520
$a
First, the case history and associated analysis proves that the US Intelligence Community produced, for the first time, a weapons system that can be considered a MMI. Since existing theories of major military innovation development fail to account for the role of intelligence in the creation of a MMI, and have never addressed a case where the Intelligence Community actually created a MMI, this finding is significant.
520
$a
Second, Stephen Rosen's intraservice rivalry theory of MMI development best explains why Computer Network Operations (CNO) emerged as a MMI. Third, substantial elements of Clayton Christensen's disruptive innovation management model were found to be an operant factor in how CNO developed as a MMI, a related question not covered in dominant MMI development theory.
520
$a
Several key, historically important findings resulted from this study. The case history reveals an interesting nexus to nuclear weapons activities as key drivers in the development and early doctrinal use of CNO capabilities as a weapon. The early development of CNO grew out of the US desire to disrupt command and control networks through critical node analysis, as part of the US targeting process for strategic nuclear war. The information network penetration capabilities developed during this era, designed to disrupt or deny communications on early Soviet systems, provided key elements for a proof of concept for Information Warfare, the initial nomenclature used for CNO. Similarly, hypothetical studies related to the introduction of subversions in complex hardware and software systems originated as part of adversarial vulnerability assessments for the US nuclear weapons program, influenced the technical approaches taken by the Central Intelligence Agency's (CIA) Clandestine Information Technology Office, a precursor organization to CIA's Information Operations Center and newly formed Directorate of Digital Intelligence. Once a full operational capability was developed during the early to mid-2000s, a certain class of Computer Network Attack (CNA) capabilities falling under the US Strategic Command's use authorities were treated as special weapons, with use authority approval granted only by the President of the United States or his designee, the Secretary of Defense, the same national command release authority required for nuclear weapons. Furthermore, recently declassified documents show the National Security Agency (NSA) engaged in computer exploitation as early as 1986. A basket of operations, technology and research organizations evolved and merged over time to create Tailored Access Operations, which was established in 1995 as the K7 organization. CNA tool development was led by NSA through a quasi independent organization named the Information Operations Technology Center from 1997 until its reabsorption into NSA in late 2004, where CNA and dual-use Computer Network Exploitation (CNE) capabilities were merged.
590
$a
School code: 0883.
650
4
$a
Political science.
$3
528916
650
4
$a
Computer engineering.
$3
621879
650
4
$a
Military studies.
$3
2197382
650
4
$a
Information technology.
$3
532993
690
$a
0615
690
$a
0464
690
$a
0750
690
$a
0489
710
2
$a
George Mason University.
$b
Biodefense.
$3
3344920
773
0
$t
Dissertation Abstracts International
$g
78-06A(E).
790
$a
0883
791
$a
Ph.D.
792
$a
2016
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10248369
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9356678
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入