Abstract
Cyber terrorism, or a computer-based attack or threat of attack intended to intimidate governments or societies in pursuit of goals that are political, religious, or ideological, has become a real possibility. Shortly after September 11, a Pakistani group hacked into two government web servers, including one at the Department of Defense, and declared a “cyber jihad” against the United States. A second series of attacks known as Moonlight Maze, was targeted against the Pentagon, Department of Energy, and NASA and allowed the perpetrators to gained access to technical defense research. Although such attacks have not, as of yet, been terribly sophisticated there is growing concern that this could soon change. There is a school of thought that believes that an enemy using effective information warfare tools and techniques will eventually attack the United States. In the fight against terrorism, the number priority is the prevention of another terrorist attack. With this in mind, this paper addresses three questions: How great is threat of cyber terrorism?; What needs to be done to mitigate the threat?; What initiatives have been undertaken in the fight against cyber terrorism?
The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-0-387-35696-9_19
Chapter PDF
References
Crude, Martin Mason, Madison Universities Team to Combat Cyber Terrorist, Washington Business Journal May 14, 2002.
Defense Intelligence Agency, Cyberterror: Prospects and Implications, Center for the Study of Terrorism and Irregular Warfare Monterey, Ca., November 1999.
Denning, Dorothy E. Activism, Hacktivism, and Cvberter orism: The Internet as a Tool for Influencing Foreign Policy. Paper presented at the Information Technology and American Foreign Policy Decision Making Workshop, April 2, 2000. http://www.com/class 2/00/class2 020400b_i.shtml.
Denning, Dorothy E. Is Cyber terrorism Next? Paper presented to the Social Sciences Research Council, November 1, 2001
Gellman, Barton, Washington Post Thursday, June 27, 2002, Page Al.
Institute for Security Technology Studies at Dartmouth University, Cyber Attacks During the War on Terrorism: A Predictive Analysis September 22, 2001.
Krady, Martin, Mason, Madison Universities Team to Combat Cyber Terrorist, Washington Business Journal May 14, 2002.
Organization for Economic Development, OECD Guidelines for the Security of Information Systems and Networks August 2002
Report of the President’s Commission on Critical Infrastructure Protection, Critical Foundations: Protecting America’s Critical Infrastructures October 1997.
Sirhal, Maureen, Critical infrastructure Operators Lack Key Information, National Journal’s Technology Daily August 13, 2002.
Statement for the Record of Michael A. Vatis, Director of the Institute for Security Technology Studies at Dartmouth College on Cyber Terrorism: The State of U.S. Preparedness before the House Committee on Government Reform Subcommittee on Government Efficiency, Financial Management ad Intergovernmental Relations, September 26, 2001
Statement for the Record of Ronald L. Dick, Director, National Infrastructure Protection Center, Federal Bureau of Investigation on Cyber Terrorism and Critical Infrastructure Protection before the House Committee on Government Reform, Government Efficiency, Financial Management and Intergovernmental Relations Subcommittee, Washington, D.C. July 24, 2002.
Statement for the Record of Ronald L. Dick, Director, National Infrastructure Protection Center, Federal Bureau of Investigation Before the Senate Committee on Governmental Affairs on Critical Infrastructure Information Sharing May 8, 2002.
Testimony of Dave McCurdy, President of Electronic Industry Alliance before the Subcommittee on Crime of the House Judiciary Committee, Fighting Cybercrime: Effortsby Private Business Interests. Fighting Cybercrime: Efforts by Private Business Interests. June 14, 2001.
United States General Accounting Office, Information Sharing: Practices That Can BenefitCritical Infrastructure Protection GAO-02–24, available at www.fas.org.irp/gao.
White Paper — The Clinton Administration’s Policy on Critical Infrastructure Protection: Presidential Decision Directive 63, May 22, 1998.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 IFIP International Federation for Information Processing
About this chapter
Cite this chapter
Tolan, K. (2003). Initiatives in the Fight Against Cyber Terrorism. In: Nardelli, E., Posadziejewski, S., Talamo, M. (eds) Certification and Security in E-Services. IFIP WCC TC11 2002. IFIP — The International Federation for Information Processing, vol 127. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35696-9_16
Download citation
DOI: https://doi.org/10.1007/978-0-387-35696-9_16
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-4737-9
Online ISBN: 978-0-387-35696-9
eBook Packages: Springer Book Archive