語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Penetrate, Exploit, Disrupt, Destroy...
~
ProQuest Information and Learning Co.
Penetrate, Exploit, Disrupt, Destroy : = The Rise of Computer Network Operations as a Major Military Innovation.
紀錄類型:
書目-語言資料,手稿 : Monograph/item
正題名/作者:
Penetrate, Exploit, Disrupt, Destroy :/
其他題名:
The Rise of Computer Network Operations as a Major Military Innovation.
作者:
Wiener, Craig J.
面頁冊數:
1 online resource (443 pages)
附註:
Source: Dissertation Abstracts International, Volume: 78-06(E), Section: A.
Contained By:
Dissertation Abstracts International78-06A(E).
標題:
Political science. -
電子資源:
click for full text (PQDT)
ISBN:
9781369551631
Penetrate, Exploit, Disrupt, Destroy : = The Rise of Computer Network Operations as a Major Military Innovation.
Wiener, Craig J.
Penetrate, Exploit, Disrupt, Destroy :
The Rise of Computer Network Operations as a Major Military Innovation. - 1 online resource (443 pages)
Source: Dissertation Abstracts International, Volume: 78-06(E), Section: A.
Thesis (Ph.D.)
Includes bibliographical references
This dissertation assesses that computer network operations are a major military innovation (MMI). It examines the role of the US Intelligence Community in the development of computer network exploitation and attack over four discrete time periods spanning approximately 30 years. The study draws upon a range of theories from the field of security studies and disruptive innovation management and a wealth of newly available information due to recently declassified documents and interviews with elite members of the US Intelligence Community. My analysis yields three major findings while providing key additions to the history of computer network attack developmental activities.
Electronic reproduction.
Ann Arbor, Mich. :
ProQuest,
2018
Mode of access: World Wide Web
ISBN: 9781369551631Subjects--Topical Terms:
558774
Political science.
Index Terms--Genre/Form:
554714
Electronic books.
Penetrate, Exploit, Disrupt, Destroy : = The Rise of Computer Network Operations as a Major Military Innovation.
LDR
:05036ntm a2200409Ki 4500
001
911648
005
20180531091026.5
006
m o u
007
cr mn||||a|a||
008
190606s2016 xx obm 000 0 eng d
020
$a
9781369551631
035
$a
(MiAaPQ)AAI10248369
035
$a
(MiAaPQ)gmu:11318
035
$a
AAI10248369
040
$a
MiAaPQ
$b
eng
$c
MiAaPQ
099
$a
TUL
$f
hyy
$c
available through World Wide Web
100
1
$a
Wiener, Craig J.
$3
1183610
245
1 0
$a
Penetrate, Exploit, Disrupt, Destroy :
$b
The Rise of Computer Network Operations as a Major Military Innovation.
264
0
$c
2016
300
$a
1 online resource (443 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
500
$a
Source: Dissertation Abstracts International, Volume: 78-06(E), Section: A.
500
$a
Adviser: Gregory Koblentz.
502
$a
Thesis (Ph.D.)
$c
George Mason University
$d
2016.
504
$a
Includes bibliographical references
520
$a
This dissertation assesses that computer network operations are a major military innovation (MMI). It examines the role of the US Intelligence Community in the development of computer network exploitation and attack over four discrete time periods spanning approximately 30 years. The study draws upon a range of theories from the field of security studies and disruptive innovation management and a wealth of newly available information due to recently declassified documents and interviews with elite members of the US Intelligence Community. My analysis yields three major findings while providing key additions to the history of computer network attack developmental activities.
520
$a
First, the case history and associated analysis proves that the US Intelligence Community produced, for the first time, a weapons system that can be considered a MMI. Since existing theories of major military innovation development fail to account for the role of intelligence in the creation of a MMI, and have never addressed a case where the Intelligence Community actually created a MMI, this finding is significant.
520
$a
Second, Stephen Rosen's intraservice rivalry theory of MMI development best explains why Computer Network Operations (CNO) emerged as a MMI. Third, substantial elements of Clayton Christensen's disruptive innovation management model were found to be an operant factor in how CNO developed as a MMI, a related question not covered in dominant MMI development theory.
520
$a
Several key, historically important findings resulted from this study. The case history reveals an interesting nexus to nuclear weapons activities as key drivers in the development and early doctrinal use of CNO capabilities as a weapon. The early development of CNO grew out of the US desire to disrupt command and control networks through critical node analysis, as part of the US targeting process for strategic nuclear war. The information network penetration capabilities developed during this era, designed to disrupt or deny communications on early Soviet systems, provided key elements for a proof of concept for Information Warfare, the initial nomenclature used for CNO. Similarly, hypothetical studies related to the introduction of subversions in complex hardware and software systems originated as part of adversarial vulnerability assessments for the US nuclear weapons program, influenced the technical approaches taken by the Central Intelligence Agency's (CIA) Clandestine Information Technology Office, a precursor organization to CIA's Information Operations Center and newly formed Directorate of Digital Intelligence. Once a full operational capability was developed during the early to mid-2000s, a certain class of Computer Network Attack (CNA) capabilities falling under the US Strategic Command's use authorities were treated as special weapons, with use authority approval granted only by the President of the United States or his designee, the Secretary of Defense, the same national command release authority required for nuclear weapons. Furthermore, recently declassified documents show the National Security Agency (NSA) engaged in computer exploitation as early as 1986. A basket of operations, technology and research organizations evolved and merged over time to create Tailored Access Operations, which was established in 1995 as the K7 organization. CNA tool development was led by NSA through a quasi independent organization named the Information Operations Technology Center from 1997 until its reabsorption into NSA in late 2004, where CNA and dual-use Computer Network Exploitation (CNE) capabilities were merged.
533
$a
Electronic reproduction.
$b
Ann Arbor, Mich. :
$c
ProQuest,
$d
2018
538
$a
Mode of access: World Wide Web
650
4
$a
Political science.
$3
558774
650
4
$a
Computer engineering.
$3
569006
650
4
$a
Military studies.
$3
1148605
650
4
$a
Information technology.
$3
559429
655
7
$a
Electronic books.
$2
local
$3
554714
690
$a
0615
690
$a
0464
690
$a
0750
690
$a
0489
710
2
$a
ProQuest Information and Learning Co.
$3
1178819
710
2
$a
George Mason University.
$b
Biodefense.
$3
1183611
773
0
$t
Dissertation Abstracts International
$g
78-06A(E).
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10248369
$z
click for full text (PQDT)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入