A ( VERY) SELECT BIBLIOGRAPHY
A comprehensive bibliography covering issues of electronic warfare, intelligence, and government reform, as well as cyber- and physical security, would itself be a large book. On cybersecurity alone, the number of papers and books constantly emerging is daunting. I offer a few suggestions—necessarily subjective—for basic reading for those interested in these areas. Those who wish to plunge deeper will follow the endnotes and the emerging literature. Those interested in technical issues will know to look elsewhere.

STRATEGIC THINKING ABOUT THE INTERNET

Jack Goldsmith and Tim Wu, Who Controls the Internet? Illusions of a Borderless World (New York: Oxford University Press, 2006).
Lawrence Lessig, Code and Other Laws of Cyberspace (New York: Basic Books, 1999).
Jonathan Zittrain, The Future of the Internet and How to Stop It (New Haven: Yale University Press, 2008).
The White House, “Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure,” May 29, 2009. The principal author of this study is Melissa Hathaway, who also ran cybersecurity policy under President George W. Bush. This review contains a useful bibliography.

CYBERCRIME AND SOCIAL DISRUPTION

John Arquilla and David Ronfeldt, Networks and Netwars: The Future of Terror, Crime, and Militancy (Santa Monica, CA: RAND Corporation, 2001).
Joseph Menn, Fatal System Error: The Hunt for the New Crime Lords Who Are Bringing Down the Internet (New York: Perseus Books, 2010).

PRIVACY

Whitfield Diffie and Susan Landau, Privacy on the Line: The Politics of Wiretapping and Encryption , 2nd ed. (Cambridge, MA: MIT Press, 2007).
Jeffrey Rosen, The Unwanted Gaze: The Destruction of Privacy in Amercia (New York: Random House, 2000).

ELECTRONIC WARFARE AND INTERNATIONAL CONFLICT

Adda B. Bozeman, Strategic Intelligence and Statecraft: Selected Essays (Washington, D.C.: Brassey’s, Inc., 1992). This erudite volume has nothing to do with electronic networks and everything to do with the profound impact of patterns of thought on international conflict.
Jeffrey Carr, Inside Cyber Warfare (Sebastapol, CA: O’Reilly, 2010).
Richard A. Clarke and Robert K. Knake, Cyber War: The Next Threat to National Security and What to Do About It (New York: HarperCollins, 2010).
Martin Libicki, Cyberdeterrence and Cyberwar (Santa Monica, CA: RAND Corporation, 2009).
Joseph S. Nye Jr., The Future of Power (New York: Public Affairs, 2011).
Timothy L. Thomas, Dragon Bytes: Chinese Information-War Theory and Practice (Fort Leavenworth, KS: Foreign Military Studies Office, 2004).

CYBERSECURITY OF THE ELECTRIC GRID

Stewart Baker, Natalia Filipiak, and Ktrina Timlin, “In the Dark,” a report by the Center for Strategic and International Studies and McAfee, April 18, 2011, at www.mcafee.com/us/resources/reports/rp-critical-infrastructure-protection.pdf.
U.S. Department of Energy, Office of Inspector General, “Federal Energy Regulatory Commission’s Monitoring of Power Grid Cyber Security.” Report no. DOE/IG-0846, January 2011, at www.ig.energy.gov/documents/IG-0846.pdf.
Juniper Networks, “Architecture for Secure Scada and Distributed Control System Networks,” 2010, at www.juniper.net/us/en/local/pdf/whitepapers/2000276-en.pdfhttp://www.juniper.net/us/en/local/pdf/whitepapers/2000276-en.pdf.
John D. Moteff, “Critical Infrastructure: Background, Policy, and Implementation,” Congressional Research Service, March 13, 2007, p. 1, n. 1, at http://assets.opencrs.com/rpts/RL30153_20081010.pdf.
North American Electric Reliability Corporation and U.S. Department of Energy, “High-Impact, Low-Frequency Event Risk to the North American Bulk Power System” (“High-Impact, Low-Frequency Report”), June 2010, p. 30, at www.nerc.com/files/HILF.pdf.
U.S.-Canada Power System Outage Task Force, August 14th Blackout: Causes and Recommendations , (“Blackout Report”) April 2004, at https://reports.energy.gov/.
Joseph Weiss, Protecting Industrial Control Systems from Electronic Threats (New York: Momentum Press, 2010).

COUNTERINTELLIGENCE AND ECONOMIC ESPIONAGE

James Gosler, “Counterintelligence: Too Narrowly Practiced,” in Vaults, Mirrors, and Masks: Rediscovering U.S. Counterintelligence, J. E. Sims and B. Gerber, eds. (Washington, D.C.: Georgetown University Press, 2009).
Eamon Javers, Broker, Trader, Lawyer, Spy: The Secret World of Corporate Espionage (New York: HarperCollins, 2010).
Harvey Rishikof, “Economic and Industrial Espionage: Who Is Eating America’s Lunch, and How Do We Stop It?” in Sims and Gerber, Vaults.
U.S.-China Economic and Security Review Commission, 2010 Report to Congress (Washington, D.C.: USGPO, 2010), at www.uscc.gov/annual_report/2010/annual_report_full_10.pdf.