The authors thank David Alberts of the National Defense University (NDU); John Barton of Stanford Law School; George Bunn of the Stanford University Institute for International Studies; Melanie Greenberg of the Stanford University Center for International Security and Arms Control (CISAC); Daniel Kuehl of the National Defense University; Capt. Richard ONeill, USN, of the Office of the Assistant Secretary of Defense for Command, Control, Communications, and Intelligence (OASDC3I); and Edward M. Roche of The Concours Group for their helpful reviews and comments. This work was written under the auspices of the Project on Information Technology and International Security at CISAC, and an earlier version was published as a CISAC Report. We are grateful for the financial, intellectual, and moral support of Dr. Alberts and the Center for Advanced Concepts and Technology of the Institute for National Strategic Studies of the National Defense University, Capt. ONeill and OASDC3I, and Dr. Michael May of CISAC. We are also grateful for the financial support of the Carnegie Corporation of New York. All errors remain our own.
| Index | Acknowledgments | Preface | Executive Summary | Chapter 1 | Chapter 2 | Chapter 3 | Chapter 4 | About the Authors | Endnotes |