U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Cyber Terrorism: An Examination of the Critical Issues

NCJ Number
199966
Journal
Journal of Information Warfare Volume: 2 Issue: 2 Dated: 2003 Pages: 1-14
Author(s)
Mark Henych; Stephen Holmes; Charles Mesloh
Date Published
2003
Length
14 pages
Annotation
This paper discusses types of cyber (computer-related) terrorist attacks and documents instances of such attacks, followed by policy recommendations for countering such attacks.
Abstract
"Cyber terrorism" involves the use of computer networks, including the Internet, to steal, damage, and alter information. The current literature indicates that incidences of this type of activity are on the rise, such that this type of crime poses a real and present danger to the United States' critical information infrastructure (CII). These crimes and criminals are not only financially motivated, but some may attempt to hack into private and government networks for peer recognition. A review of military literature indicates that the CII and the defense information infrastructure are under constant, organized, and repetitious attacks from other nation states, as well as from points of origin within the Continental United States. Examples of private-sector intrusions are endless. The threat of cyber terrorism is proportionate to the increasing dependence on computers and their interconnectivity. The various types of attacks in cyber space include but are not limited to computer viruses, denial-of-service attacks, distributed denial-of-service attacks, tribal flood network attacks, Internet worms, Trojan horse attacks, spoofing, hacking, and zombie programs. This paper profiles some of the more conventional cyber terrorist attacks and techniques. This paper advises that additional research is needed to more accurately quantify the threat to the United States' CII. Also, policies should be considered for the regulation of the Internet, which has become an instrument of "war." 36 references