skip navigation


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.


NCJ Number: 193455 Find in a Library
Title: Get Ready for Cyberwar
Author(s): Sam Nunn
Date Published: 2000
Page Count: 4
Sponsoring Agency: Progressive Policy Institute
Washington, DC 20003
Sale Source: Progressive Policy Institute
600 Pennsylvania Ave., SE
Suite 400
Washington, DC 20003
United States of America
Document: HTML
Type: Research Paper
Format: Article
Language: English
Country: United States of America
Annotation: This article reviews the threats of cyberterrorism to the United States.
Abstract: One reason for the threat of a cyber attack is the open architecture of the digital revolution. The highly networked environment has been built on an intentionally insecure foundation: ARPANET, the Internet predecessor, which devised packet switching as a means of communication, was not meant to be secure. As a result, the interconnected vital national functions, from credit card transactions to emergency services, present a target rich environment for cyberterrorists. With the United States as the dominant military force in the world, cyberwar has become the preferred option of smaller players. The way to prepare for a cyberdefense in the digital age is problematic. One of the first problems is determining who the enemy is. Distinguishing a terrorist from a hacker, or a foreign intelligence agent from a competitor stealing secrets is not easy. Today, the culprit has to be apprehended before it is determined who has jurisdiction to investigate. There is also a need to redefine who the defender will be. Many of the future defenders will be young computer wizards. The sandal culture is challenging the wingtips and the combat boots. A key to the success of cyberdefense is realizing that it is no longer armed troops that stand between the United States and its enemies, but it is the entire cyberworld. Private industry has its own large stake in security. While governmental actions are essential, the business community must assume much more responsibility for protecting itself. Business should also share information among themselves. In addition, the Federal Government should provide more support for research on the threats from cyberspace. Finally, the United States should train for a cyberattack just as it does for conventional or nuclear warfare.
Main Term(s): Counter-terrorism intelligence; Counter-terrorism tactics; Terrorism/Mass Violence
Index Term(s): Critical Infrastructure Protection; Cyber Terrorism; Domestic Preparedness; Information Security; Subversive activities; Threat assessment
Note: From Blueprint Magazine, January 1, 2002; downloaded March 8, 2002.
To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.