NCJ Number
189547
Date Published
May 2001
Length
57 pages
Annotation
This report discusses the threat of cyber-attacks around the world.
Abstract
The pervasiveness of the Internet has created significant personal, organizational, and infrastructure dependencies that are not confined by national borders. Globalization and the advent of the Information Age have empowered individuals, national subgroups, and non-state actors. Disruptive attacks can be perpetrated not only by nation-states, but also by national opposition groups, ideological radicals, terrorist organizations, and individuals. Several sorts of threats emerge from this new environment, each with varying levels of national security concern. The first is the threat of disruption of communication flows, economic transactions, public information campaigns, electric power grids, and political negotiations. Second is the threat of exploitation of sensitive, proprietary, or classified information. Third is the threat of manipulation of information for political, economic, military, or trouble-making purposes. And last is the threat of destruction of information or, potentially, of critical infrastructure components that can have deleterious economic and national security consequences. Government can improve cooperation with the private sector through information sharing on vulnerabilities; continued facilitation of discussions within industry sectors; and through national coordination for cyber concerns and alerts. Government can also provide specific incentives to the private sector to better protect its systems by establishing liability limits against disruption of service for companies using security “best practices;” and providing specific awards or credits for information leading to hacker arrests. Government can also increase its credibility with the private sector by taking certain internal measures by agreeing on a clear definition of the problem and a clear delineation of responsibilities; improving education and training of professionals and government employees; and working toward comprehensive legislation for international collaboration for the prevention and prosecution of cyber crimes. 29 footnotes