Skip to main content

Cyber Warfare: Weapon of Mass Disruption

  • Chapter
  • First Online:
Book cover Counterterrorism and Cybersecurity

Abstract

Like counter-terrorism, cyber security is in the forefront of the U.S. national security agenda. President Barack Obama remarked from the White House on May 29, 2009 about a weapon of mass disruption.

This world—cyberspace—is a world that we depend on every single day.… America’s economic prosperity in the 21st century will depend on cyber security.

—President Barack Obama’s remark from the White House (May 29, 2009).

Terrorism does remain the FBI’s top priority, but in the not too-distant-future we anticipate that the cyber threat will pose the greatest threat to our country.

—FBI Director Robert Mueller (March 1, 2012).

The war is being fought on three fronts. The first is physical, the second is the world of social networks, and the third is cyber attacks.

—Carmela Avner, Israel’s Chief Information Officer (November 18, 2012).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Obama, Barack. Remarks By The President On Securing Our Nation’s Cyber Infrastructure. [Online] The White House, May 29, 2009. http://www.whitehouse.gov/the-press-office/remarks-president-securing-our-nations-cyber-infrastructure.

  2. Mueller, Robert S. III. Remarks by Robert S. Mueller, III. [Online] Federal Bureau of Investigation, March 1, 2012. http://www.fbi.gov/news/speeches/combating-threats-in-the-cyber-world-outsmarting-terrorists-hackers-and-spies.

  3. Hickins, Michael and Clark, Don. Questions Over Break-In at Security Firm RSA. [Online] The Wall Street Journal, March 18, 2011. http://online.wsj.com/article/SB10001424052748703512404576208983743029392.html.

  4. Krebs, Brian. Who Else Was Hit by the RSA Attackers? [Online] Kerbs on Security, October 11, 2011. http://krebsonsecurity.com/2011/10/who-else-was-hit-by-the-rsa-attackers/.

  5. CERT Coordination Center. CERT® Advisory CA-2001-26 Nimda Worm. [Online] Carneige Mellon Software Engineering Institute, September 18, 2001. http://www.cert.org/advisories/CA-2001-26.html.

  6. Green, Joshua. The Myth of Cyberterrorism. [Online] Washington Monthly, November 2002. http://www.washingtonmonthly.com/features/2001/0211.green.html.

  7. Leyden, John. Virus writers are industrial terrorists–MS. [Online] The Register, October 23, 2001. http://www.theregister.co.uk/2001/10/23/virus_writers_are_industrial_terrorists/.

  8. Malicious Code Attacks Had $13.2 Billion Economic Impact in 2001. [Online] Computer Economics, September 2002. http://www.computereconomics.com/article.cfm?id=133.

  9. Marquit, Miranda. The 12 costliest computer viruses ever. [Online] The Fine Print, August 3, 2010. http://blog.insure.com/2010/08/03/the-12-costliest-computer-viruses-ever/.

  10. McAfee, Inc. McAfee Looks Back on a Decade of Cybercrime. [Online] McAfee, January 25, 2011. http://www.mcafee.com/us/about/news/2011/q1/20110125-01.aspx.

  11. Help Net Security. Mydoom.A: Timeline of an Epidemic. [Online] Help Net Security, March 2, 2004. http://www.net-security.org/malware_news.php?id=359.

  12. Roberts, Paul. Sobig: Spam, virus or both? [Online] Computerworld, June 5, 2003. http://www.computerworld.com/s/article/81825/Sobig_Spam_virus_or_both_.

  13. CNN. Destructive ILOVEYOU computer virus strikes worldwide. [Online] CNN, May 4, 2000. http://articles.cnn.com/2000-05-04/tech/iloveyou.01_1_melissa-virus-antivirus-companies-iloveyou-virus.

  14. Danchev, Dancho. Conficker’s estimated economic cost? $9.1 billion. [Online] ZDNet, April 23, 2009. http://www.zdnet.com/blog/security/confickers-estimated-economic-cost-9-1-billion/3207.

  15. Reuters. ‘Code Red II’ spreading quickly, causing damage. [Online] USA Today, August 8, 2001. http://usatoday30.usatoday.com/life/cyber/tech/2001-08-08-code-red-2.htm.

  16. Northcutt, Stephen. Intrusion Detection FAQ: What was the Melissa virus and what can we learn from it? [Online] SANS, March 28, 1999. http://www.sans.org/security-resources/idfaq/what_melissa_teaches_us.php.

  17. Thorsberg, Frank. Sircam Worm: Crawling Fast but Easily Crushed. [Online] PCWorld, July 26, 2001. http://www.pcworld.com/article/56284/article.html.

  18. Lemos, Robert. Counting the cost of Slammer. [Online] CNet, January 31, 2003. http://news.cnet.com/Counting-the-cost-of-Slammer/2100-1001_3-982955.html.

  19. Lemos, Robert. ‘Nimda’ worm strikes Net, e-mail. [Online] CNet, September 18, 2001. http://news.cnet.com/2100-1001-273128.html.

  20. Lemos, Robert. Sasser worm begins to spread. [Online] CNet, May 1, 2004. http://news.cnet.com/Sasser-worm-begins-to-spread/2100-7349_3-5203764.html.

  21. Messmer, Ellen. Blaster Worm Racks Up Victims. [Online] PCWorld, August 15, 2003. http://www.pcworld.com/article/112047/article.html.

  22. Markoff, John. Student, After Delay, Is Charged In Crippling of Computer Network. [Online] The New York Times, July 27, 1989. http://www.nytimes.com/1989/07/27/us/student-after-delay-is-charged-in-crippling-of-computer-network.html.

  23. Simons, John. How an FBI Cybersleuth Busted a Hacker Ring. [Online] The Wall Street Journal, October 3, 1999. http://massis.lcs.mit.edu/archives/security-fraud/phonemasters-fraud.

  24. Johnston, David Cay. Russian Accused of Citibank Computer Fraud. [Online] The New York Times, August 18, 1995. http://www.nytimes.com/1995/08/18/business/russian-accused-of-citibank-computer-fraud.html.

  25. Evans, James. Mafiaboy’s Story Points to Net Weaknesses. [Online] PCWorld, January 24, 2001. http://www.pcworld.com/article/39142/article.html.

  26. Twin, Alexandra. Glitches send Dow on wild ride. [Online] CNNMoney, May 6, 2010. http://money.cnn.com/2010/05/06/markets/markets_newyork/index.htm.

  27. Eha, Brian Patrick. Is Knight’s $440 million glitch the costliest computer bug ever? [Online] CNNMoney, August 9, 2012. http://money.cnn.com/2012/08/09/technology/knight-expensive-computer-bug/index.html.

  28. Yousuf, Hibah. Facebook trader: Nasdaq ‘blew it’. [Online] CNNMoney, May 21, 2012. http://money.cnn.com/2012/05/21/markets/facebook-nasdaq/index.htm.

  29. Yousuf, Hibah. UBS lost $356 million on Facebook, suing Nasdaq for it. [Online] CNNMoney, July 31, 2012. http://buzz.money.cnn.com/2012/07/31/ubs-loss-facebook-ipo/.

  30. Hasegawa, Toshiro, Nohara, Yoshiaki and Ikeda, Yumi. Tokyo System Errors Underscore Decline in Japan’s Equity Market. [Online] Bloomberg, August 7, 2012. http://www.bloomberg.com/news/2012-08-07/second-system-error-in-seven-months-halts-tokyo-derivative-trade.html.

  31. Rooney, Ben. Spanish stocks halted for 5 hours due to trading glitch. [Online] CNNMoney, August 6, 2012. http://buzz.money.cnn.com/2012/08/06/spain-stocks-trading-glitch/.

  32. TED. The technological future of crime: Marc Goodman at TEDGlobal 2012. [Online] TED, June 28, 2012. http://blog.ted.com/2012/06/28/the-technological-future-of-crime-marc-goodman-at-tedglobal-2012/.

  33. Symantec. Cybercrime Report 2011. [Online] Symantec Corporation, 2011. http://www.symantec.com/content/en/us/home_homeoffice/html/cybercrimereport/assets/downloads/en-us/NCR-DataSheet.pdf.

  34. Sherstobitoff, Ryan. Analyzing Project Blitzkrieg, a Credible Threat. [Online] McAfee Labs, December 13, 2012. http://www.mcafee.com/us/resources/white-papers/wp-analyzing-project-blitzkrieg.pdf.

  35. RSA FraudAction Research Labs. Cyber Gang Seeks Botmasters to Wage Massive Wave of Trojan Attacks Against U.S. Banks. [Online] RSA, October 4, 2012. https://blogs.rsa.com/cyber-gang-seeks-botmasters-to-wage-massive-wave-of-trojan-attacks-against-u-s-banks/.

  36. What are the differences between NSA/CSS’ and U.S. Cyber Command’s roles? [Online] National Security Agency / Central Security Service, January 13, 2011. http://www.nsa.gov/about/faqs/about_nsa.shtml#about10.

  37. Sanger, David E. and Schmitt, Eric. Rise Is Seen in Cyberattacks Targeting U.S. Infrastructure. [Online] The New York Times, July 26, 2012. http://www.nytimes.com/2012/07/27/us/cyberattacks-are-up-national-security-chief-says.html?_r=0.

  38. Merica, Dan. DoD official: Vulnerability of U.S. electrical grid is a dire concern. [Online] CNN, July 27, 2012. http://security.blogs.cnn.com/2012/07/27/dod-official-vulnerability-of-u-s-electrical-grid-is-a-dire-concern/.

  39. National Research Council of the National Academies. Electric Power Grid ‘Inherently Vulnerable’ to Terrorist Attacks. [Online] The National Academies Press, November 14, 2012. http://www8.nationalacademies.org/onpinews/newsitem.aspx?RecordID=12050.

  40. Barron, James. The Blackout Of 2003: The Overview; Power Surge Blacks Out Northeast, Hitting Cities In 8 States And Canada; Midday Shutdowns Disrupt Millions. [Online] The New York Times, August 15, 2003. http://www.nytimes.com/2003/08/15/nyregion/blackout-2003-overview-power-surge-blacks-northeast-hitting-cities-8-states.html?pagewanted=all.

  41. Anderson, Patrick L. and Geckil, Ilhan K. Northeast Blackout Likely to Reduce US Earnings by $6.4 Billion. [Online] Anderson Economic Group (AEG), August 19, 2003. http://www.andersoneconomicgroup.com/Portals/0/upload/Doc544.pdf.

  42. Communication Technologies, Inc. Supervisory Control and Data Acquisition (SCADA) Systems. [Online] National Communications System, October 2004. http://www.ncs.gov/library/tech_bulletins/2004/tib_04-1.pdf.

  43. Poulsen, Kevin. Slammer worm crashed Ohio nuke plant network. [Online] Security Focus, August 19, 2003. http://www.securityfocus.com/news/6767.

  44. McMillan, Robert. New virus targets industrial secrets. [Online] Computerworld, July 17, 2010. http://www.computerworld.com/s/article/9179298/New_virus_targets_industrial_secrets.

  45. Ulasen, Sergey. Rootkit.TmpHider. [Online] Wilders Security Forums, July 12, 2010. http://www.wilderssecurity.com/showthread.php?t=276994.

  46. Keizer, Gregg. Is Stuxnet the ‘best’ malware ever? [Online] Computerworld, September 16, 2010. http://www.computerworld.com/s/article/9185919/Is_Stuxnet_the_best_malware_ever_.

  47. Thakur, Vikram. W32.Stuxnet — Network Information. [Online] Symantec, July 23, 2010. http://www.symantec.com/connect/blogs/w32stuxnet-network-information.

  48. McMillan, Robert. Siemens: Stuxnet worm hit industrial systems. [Online] Computerworld, September 14, 2010. http://www.computerworld.com/s/article/9185419/Siemens_Stuxnet_worm_hit_industrial_systems.

  49. Broad, William J., Markoff, John and Sanger, David E. Israeli Test on Worm Called Crucial in Iran Nuclear Delay. [Online] The New York Times, January 15, 2011. http://www.nytimes.com/2011/01/16/world/middleeast/16stuxnet.html?pagewanted=all.

  50. Sanger, David E. Obama Order Sped Up Wave of Cyberattacks Against Iran. [Online] The New York Times, June 1, 2012. http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html?pagewanted=all.

  51. DHS ICS-CERT. ICS-CERT Monitor. [Online] U.S. Department of Homeland Security, October/November/December 2012. http://www.us-cert.gov/control_systems/pdf/ICS-CERT_Monthly_Monitor_Oct-Dec2012.pdf.

  52. ICS-CERT. ICS-CERT Monthly Monitor. [Online] Industrial Control Systems Cyber Emergency Response Team, April 2012. http://www.us-cert.gov/control_systems/pdf/ICS-CERT_Monthly_Monitor_Apr2012.pdf.

  53. Control Systems Security Program, National Cyber Security Division. Recommended Practice: Improving Industrial Control Systems Cybersecurity with Defense-In-Depth Strategies. [Online] U.S. Department of Homeland Security, October 2009. http://www.us-cert.gov/control_systems/practices/documents/Defense_in_Depth_Oct09.pdf.

  54. Shachtman, Noah. Insiders Doubt 2008 Pentagon Hack Was Foreign Spy Attack (Updated). [Online] Wired, August 25, 2010. http://www.wired.com/dangerroom/2010/08/insiders-doubt-2008-pentagon-hack-was-foreign-spy-attack/.

  55. Lynn, William J. III. Defending a New Domain. [Online] Foreign Affairs, September/October 2010. http://www.foreignaffairs.com/articles/66552/william-j-lynn-iii/defending-a-new-domain.

  56. Shachtman, Noah. Exclusive: Computer Virus Hits U.S. Drone Fleet. [Online] Wired, October 7, 2011. http://www.wired.com/dangerroom/2011/10/virus-hits-drone-fleet/.

  57. Rundle, Katherine Fernandez; Horn, Donl; Dechovitz, Susan Leah. Final Report Of The Miami-Dade County Grand Jury. [Online] The Circuit Court Of The Eleventh Judicial Circuit Of Florida In And For The County Of Miami-Dade, December 19, 2012. http://www.miamisao.com/publications/grand_jury/2000s/gj2012s.pdf

  58. Bull, Alister and Finkle, Jim. Fed says internal site breached by hackers, no critical functions affected. [Online] Reuters, February 6, 2013. http://www.reuters.com/article/2013/02/06/net-us-usa-fed-hackers-idUSBRE91501920130206.

  59. Green, Joshua. The Myth of Cyberterrorism. [Online] Washington Monthly, November 2002. http://www.washingtonmonthly.com/features/2001/0211.green.html.

  60. Ada Resource Association. Ada Overview. [Online] Ada Information Clearinghouse. [Cited: January 8, 2013.] http://www.adaic.org/advantages/ada-overview/.

  61. Computer History Museum. Ada Lovelace. [Online] Computer History Museum. [Cited: January 8, 2013.] http://www.computerhistory.org/babbage/adalovelace/.

  62. Ada Joint Program Office. Military Standard Common APSE (Ada Programming Support Environment) Interface Set (CAIS). [Online] Defense Technical Information Center, 1985. http://books.google.com/books/about/Military_Standard_Common_APSE_Ada_Progra.html?id=EjEYOAAACAAJ.

  63. Keller, John. DOD officials eye scrapping mandate to use Ada programming. [Online] Military and Aerospace Electronics, May 1, 1997. http://www.militaryaerospace.com/articles/print/volume-8/issue-5/departments/trends/dod-officials-eye-scrapping-mandate-to-use-ada-programming.html.

  64. Nakashima, Ellen, Miller, Greg and Tate, Julie. U.S., Israel developed Flame computer virus to slow Iranian nuclear efforts, officials say. [Online] The Washington Post, June 19, 2012. http://articles.washingtonpost.com/2012-06-19/world/35460741_1_stuxnet-computer-virus-malware.

  65. Erdbrink, Thomas. Iran Confirms Attack by Virus That Collects Information. [Online] The New York Times, May 29, 2012. http://www.nytimes.com/2012/05/30/world/middleeast/iran-confirms-cyber-attack-by-new-virus-called-flame.html.

  66. Kaspersky Lab security researchers. Kaspersky Lab and ITU Research Reveals New Advanced Cyber Threat. [Online] Kaspersky Lab, May 28, 2012. http://www.kaspersky.com/about/news/virus/2012/Kaspersky_Lab_and_ITU_Research_Reveals_New_Advanced_Cyber_Threat.

  67. Global Research & Analysis Team (GReAT), Kaspersky Lab. Gauss: Abnormal Distribution. [Online] Kaspersky Lab, August 9, 2012. http://www.securelist.com/en/analysis/204792238/Gauss_Abnormal_Distribution.

  68. O’Reilly, Patrick J. Lieutenant General Patrick J. O’Reilly, USA, Director, Missile Defense Agency Before the Senate Armed Services Committee. [Online] U.S. Senate Armed Services Committee, November 8, 2011. http://www.armed-services.senate.gov/statemnt/2011/11%20November/OReilly%2011-08-11.pdf.

  69. Goldman, David. Fake tech gear has infiltrated the U.S. government. [Online] CNNMoney, November 8, 2012. http://money.cnn.com/2012/11/08/technology/security/counterfeit-tech/index.html.

  70. Carl Levin - U.S. Senate Newsroom. Senate Approves Amendment to Strengthen Protections Against Counterfeit Electronic Parts in Defense Supply System. [Online] U.S. Senate, November 29, 2011. http://www.levin.senate.gov/newsroom/press/release/senate-approves-amendment-to-strengthen-protections-against-counterfeit-electronic-parts-in-defense-supply-system.

  71. U.S. Department of Justice. Departments of Justice and Homeland Security Announce International Initiative Against Traffickers in Counterfeit Network Hardware. [Online] U.S. Department of Justice, February 28, 2008. http://www.justice.gov/opa/pr/2008/February/08_crm_150.html.

  72. Grimes, Roger A. Stuxnet marks the start of the next security arms race. [Online] InfoWorld, January 25, 2011. http://www.infoworld.com/d/security-central/stuxnet-marks-the-start-the-next-security-arms-race-282.

  73. Ross, Brian, et al. Top Secret Stealth Helicopter Program Revealed in Osama Bin Laden Raid: Experts. [Online] ABC Good Morning America, May 4, 2011. http://abcnews.go.com/Blotter/top-secret-stealth-helicopter-program-revealed-osama-bin/story?id=13530693&page=2.

  74. Zetter, Kim. Son of Stuxnet Found in the Wild on Systems in Europe. [Online] Wired, October 18, 2011. http://www.wired.com/threatlevel/2011/10/son-of-stuxnet-in-the-wild/.

  75. Goodman, David. Major banks hit with biggest cyberattacks in history. [Online] CNNMoney, September 28, 2012. http://money.cnn.com/2012/09/27/technology/bank-cyberattacks/index.html.

  76. Goldman, David. The real Iranian threat: Cyberattacks. [Online] CNNMoney, November 5, 2012. http://money.cnn.com/2012/11/05/technology/security/iran-cyberattack/index.html.

  77. Brumfield, Ben. Computer spyware is newest weapon in Syrian conflict. [Online] CNN, February 17, 2012. http://www.cnn.com/2012/02/17/tech/web/computer-virus-syria/index.html.

  78. Fung, Brian. Military Strikes Go Viral: Israel Is Live-Tweeting Its Own Offensive Into Gaza. [Online] The Atlantic, November 14, 2012. http://www.theatlantic.com/international/archive/2012/11/military-strikes-go-viral-israel-is-live-tweeting-its-own-offensive-into-gaza/265227/.

  79. Hachman, Mark. IDF vs. Hamas War Extends to Social Media. [Online] PC Magazine, November 16, 2012. http://www.pcmag.com/slideshow/story/305065/idf-vs-hamas-war-extends-to-social-media.

  80. Sutter, John D. Will Twitter war become the new norm? [Online] CNN, November 19, 2012. http://www.cnn.com/2012/11/15/tech/social-media/twitter-war-gaza-israel/index.html.

  81. Chan, Casey. Anonymous Targets Israel by Taking Down Hundreds of Websites and Leaking Emails and Passwords. [Online] Gizmodo, November 16, 2012. http://gizmodo.com/5961399/anonymous-destroys-israel-by-taking-down-hundreds-of-websites-and-leaking-emails-and-passwords.

  82. Greenberg, Andy. Anonymous Hackers Ramp Up Israeli Web Attacks And Data Breaches As Gaza Conflict Rages. [Online] Forbes, November 19, 2012. http://www.forbes.com/sites/andygreenberg/2012/11/19/anonymous-hackers-ramp-up-israeli-web-attacks-and-data-breaches-as-gaza-conflict-rages-2/.

  83. Osborne, Charlie. Anonymous takes on Israeli websites, wipes Jerusalem bank. [Online] ZDNet, November 16, 2012. http://www.zdnet.com/anonymous-takes-on-israeli-websites-wipes-jerusalem-bank-7000007537/.

  84. Sutter, John D. Anonymous declares ‘cyberwar’ on Israel. [Online] CNN, November 20, 2012. http://www.cnn.com/2012/11/19/tech/web/cyber-attack-israel-anonymous/index.html.

  85. McMillian, Robert and Ackerman, Spencer. Despite Ceasefire, Israel-Gaza War Continues Online. [Online] Wired, November 28, 2012. http://www.wired.com/dangerroom/2012/11/israel-gaza-ddos/.

  86. Mullen, Jethro. Coming soon: Iran’s response to ‘Argo’. [Online] CNN, January 14, 2013. http://www.cnn.com/2013/01/14/world/meast/iran-argo-response/index.html.

  87. Mullen, Jethro; Brumfield, Ben. Iran to add lawsuit over 'Argo' to cinematic response. [Online] CNN, March 14, 2013. http://www.cnn.com/2013/03/13/world/meast/iran-argo-response/index.html

  88. Goldman, David. China vs. U.S.: The cyber Cold War is raging. [Online] CNNMoney, July 28, 2011. http://money.cnn.com/2011/07/28/technology/government_hackers/index.htm.

  89. Ryan, Jason. US Government and Military Websites Redirected to Chinese Servers. [Online] ABC News, November 17, 2010. http://abcnews.go.com/Technology/american-government-websites-hijacked-chinese-hackers-massive-april/story?id=12165826.

  90. Beech, Hannah. Meet China’s Newest Soldiers: An Online Blue Army. [Online] Time Magazine, May 27, 2011. http://world.time.com/2011/05/27/meet-chinas-newest-soldiers-an-online-blue-army/.

  91. Mullen, Jethro. New York Times, Wall Street Journal say Chinese hackers broke into computers. [Online] CNN, January 31, 2013. http://www.cnn.com/2013/01/31/tech/china-nyt-hacking/index.html.

  92. Riley, Charles. China's military denies hacking allegations. [Online] CNNMoney, February 20, 2013. http://money.cnn.com/2013/02/20/technology/china-cyber-hacking-denial/index.html

  93. Shane, Scott. Cyberwarfare Emerges From Shadows for Public Discussion by U.S. Officials. [Online] 2012, 26 September. http://www.nytimes.com/2012/09/27/us/us-officials-opening-up-on-cyberwarfare.html?pagewanted=all.

  94. Kwon, K.J.; Mullen, Jethro; Pearson, Michael. Hacking attack on South Korea traced to Chinese address, officials say. [Online] CNN, March 21, 2013. http://www.cnn.com/2013/03/21/world/asia/south-korea-computer-outage/index.html

  95. Botelho, Greg. North Korea says it's the victim of 'intensive' cyberattacks. [Online] CNN, March 15, 2013. http://www.cnn.com/2013/03/14/world/asia/north-korea-cyberattacks/index.html

  96. Kingsbury, Alex. The Secret History of the National Security Agency. [Online] US News and World Report, June 19, 2009. http://www.usnews.com/opinion/articles/2009/06/19/the-secret-history-of-the-national-security-agency.

  97. Air Force News Service (AFNS). ‘Aim High … Fly-Fight-Win’ to be Air Force motto. [Online] U.S. Air Force, October 7, 2010. http://www.af.mil/news/story.asp?id=123225546.

  98. Collin, Barry. The Future of Cyberterrorism. [Online] Crime & Justice International, March 1997. http://www.cjimagazine.com/archives/cji4c18.html?id=415.

  99. Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats. [Online] Center for Strategic and International Studies (CSIS), December 2002. http://csis.org/files/media/csis/pubs/021101_risks_of_cyberterror.pdf .

  100. Tafoya, William L. Cyber Terror. [Online] Federal Bureau of Investigation, November 2011. http://www.fbi.gov/stats-services/publications/law-enforcement-bulletin/november-2011/cyber-terror.

  101. Foster, John S., et al. Report of the Commission to Assess the Threat to the United States from Electromagnetic Pulse (EMP) Attack. [Online] The EMP Commission, April 2008. http://www.empcommission.org/docs/A2473-EMP_Commission-7MB.pdf.

  102. Bumiller, Elisabeth and Shanker, Thom. Panetta Warns of Dire Threat of Cyberattack on U.S. [Online] The New York Times, October 11, 2012. http://www.nytimes.com/2012/10/12/world/panetta-warns-of-dire-threat-of-cyberattack.html?pagewanted=all.

  103. Goldman, David. Nations prepare for cyber war. [Online] CNNMoney, January 7, 2013. http://money.cnn.com/2013/01/07/technology/security/cyber-war/index.html.

  104. Lourdeau, Keith. Keith Lourdeau, Cyber Division, FBI, Before the Senate Judiciary Subcommittee on Terrorism, Technology, and Homeland Security. [Online] 2004, 24 February. http://www.fbi.gov/news/testimony/hearing-on-cyber-terrorism.

  105. National Intelligence Council. Global Trends 2030: Alternative Worlds. [Online] U.S. National Intelligence Council, December 2012. http://www.dni.gov/files/documents/GlobalTrends_2030.pdf.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Newton Lee .

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media New York

About this chapter

Cite this chapter

Lee, N. (2013). Cyber Warfare: Weapon of Mass Disruption. In: Counterterrorism and Cybersecurity. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-7205-6_7

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-7205-6_7

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-7204-9

  • Online ISBN: 978-1-4614-7205-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics