1. Global Trends 2015: A Dialogue about the Future with Nongovernment Experts, 12.
2. President Clinton's January 18, 1998, State of the Union Address.
3. E.g. Don DeLillo, Underworld (Scribner, 1997), 76. “Now that power is in shatters or tatters and now that those Soviet borders don't even exist in the same way, I think we understand, we look back, we see ourselves clearly, and them as well. Power meant something thirty, forty years ago. It was stable, it was focused, it was a tangible thing. It was greatness, danger, terror, all those things. And it held us together, the Soviets and us. Maybe it held the world together. You could measure things. You could measure hope and you could measure destruction. Not that I want to bring it back. It's gone, good riddance. But the fact is… Many things that were anchored to the balance of power and the balance of terror seem to be undone, unstuck. Things have no limits now. Money has no limits. I don't understand money anymore. Money is undone. Violence is undone, violence is easier now, it's uprooted, out of control, it has no measure anymore, it has no level of values…”
4. Richard Danzig, The Big Three: Our Greatest Security Risks and How to Address Them (Institute for National Strategic Studies, 1999).
5. Michael Doyle, “Kant, Liberal Legacies and Foreign Affairs,” Philosophy and Public Affairs 12 (1983): 205, 323.
6. Thomas Schwartz and Kiron Skinner, “The Myth of Democratic Pacifism,” Wall Street Journal, January 7, 1999, A10.
7. At the same time that the pope was condemning war among Christians the Church was murdering Cathars, Albigensians, Waldensians, and others. See Wolfgang Wacker-nagel, “Two Thousand Years of Heresy: An Essay,” Diogenes 47 (Fall 1999): 134; or, for a more entertaining account, see David Roberts, “In France, an Ordeal by Fire and a Monster Weapon Called ‘Bad Neighbor’: Cathars, Nonviolent Christian Heretics, Victims of the Inquisition in the Thirteenth Century,” Smithsonian 22 (May 1991): 40.
8. R. James Woolsey, “On National Security Challenges in the 21st Century,” National Security Law Report 23 (January/February 2001): 5.
9. Rules, and also techniques.
10. See testimony of Michael Beschloss, Ed Turner, and Ted Koppel before the House Foreign Affairs Committee in Impact of Television on U.S. Foreign Policy (U.S. GPO, 1994).
11. “The defining moment was when Walter Cronkite announced on nationwide television after the Tet Offensive that he didn't believe we had any further reason to be in Vietnam.” Interview with Senator John McCain, March/April 2000, Association of Graduates, West Point.
12. David Anderson, “Is Libel Law Worth Reforming?” University of Pennsylvania Law Review 140, no. 2 (December 1991): 487.
13. In the twelve months prior to July 1994, the Defense Department detected 3,600 computer intrusions on military networks. Admiral McConnell, former head of the National Security Agency (NSA), has stated that computer intruders, in his view, have already included foreign intelligence agencies, criminals, terrorists, and members of the computer underground. A 1996 GAO report estimates, on rather slender evidence it must be said, that as many as 250,000 attempts to penetrate Defense Department computer systems occurred in 1995, and that twice that many would occur in 1997. When the Defense Department has attempted to penetrate its own systems, it succeeded in over 7,800 attempts—an 87 percent success rate, fewer than 5 percent of which attempts were even detected and fewer than 1 percent of which were reported up the chain of command.
14. An October 1996 Ernst & Young survey of corporate executives disclosed that 78 percent of respondents reported financial losses from the preceding two years that were attributable to information security problems and computer viruses. And there are escalating grounds for concern. In 1998 identified computer viruses increased from 8,000 to 12,000 within the past year, and they continued to grow at an estimated 300 per month. Intruders have compromised nearly all elements of the PSN: switching systems, operations, administration, maintenance and provisioning systems, and packet data networks. They have regularly attacked the networks linked to the PSN. And they have demonstrated great skill at manipulating data networks including the ATM (asynchronous transfer mode) networks and the synchronous optical networks (SONET).