U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Cyberterrorism: The Sum of All Fears?

NCJ Number
209205
Journal
Studies in Conflict & Terrorism Volume: 28 Issue: 2 Dated: March-April 2005 Pages: 129-149
Author(s)
Gabriel Weimann
Date Published
March 2005
Length
21 pages
Annotation
This article assesses the risk of successful terrorist attacks on critical computer networks ("cyberterrorism") that would severely disrupt a nation's military, financial, and service functions.
Abstract
Psychological, political, and economic forces have combined to foster the fear of cyberterrorism. As people become more aware of national and international dependence on computer networks for the management and performance of essential economic, military, government, and private services, anxiety about the vulnerability of these services to terrorist attacks has heightened. This anxiety has been fueled by media attention to the issue, fear of the unknown, and misinformation about computer technology and existing security measures. Cyberterrorism is clearly an attractive option for modern terrorists because of the variety and number of targets, the impact it can have, and the fact that it can be conducted by a few individuals operating anonymously from anywhere in the world. Further, new vulnerabilities to cyber attacks are being identified regularly, including the possibility that terrorists may themselves secretly design computer software for government agencies. Although the knowledge and resourcefulness required for a successful cyber attack may not currently exist among terrorists, the next generation of terrorists is being cultivated in a digital world where hacking tools are certain to become more powerful, numerous, and easier to use. The challenge must always be to develop security measures that will keep pace with emerging cyber vulnerabilities and cyber weapons. 58 notes

Downloads

No download available

Availability