This is the old version of the H2O platform and is now read-only. This means you can view content but cannot create content. You can access the new platform at https://opencasebook.org. Thank you.
Edit playlist item notes below to have a mix of public & private notes, or:MAKE ALL NOTES PUBLIC (5/5 playlist item notes are public) MAKE ALL NOTES PRIVATE (0/5 playlist item notes are private)
|1||Show/Hide More||Department of Defense, Strategy for Operating in Cyberspace, July 2011|
|2||Show/Hide More||Department of Defense Cyberspace Policy Report, November 2011|
|3||Show/Hide More||The Secretary of Defense, Establishment of a Subordinate Unified U.S. Cyber Command Under U.S. Strategic Command for Military Cyberspace Operations, 23 June 2009|
|4||Show/Hide More||Statement of General Keith B. Alexander, Commander, United States Cyber Command, before the House Committee on Armed Services, 23 September 2010|
|5||Show/Hide More||William A. Owens, Kenneth W. Dam, and Herbert S. Lin, editors, Committee on Offensive Information Warfare, National Research Council; Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities; Pages 161-187, 2009|
May 21, 2013
Jack Goldsmith and a Berkman Center Cybersecurity Team
This is the old version of the H2O platform and is now read-only. This means you can view content but cannot create content. If you would like access to the new version of the H2O platform and have not already been contacted by a member of our team, please contact us at email@example.com. Thank you.