NCJ Number
225432
Date Published
2007
Length
11 pages
Annotation
This chapter distinguishes the threat of “cyberterrorism” from “cyber attacks” and describes some tools that have been used to counter cyberterrorism attacks.
Abstract
“Cyber attacks” involve activities that can disrupt, corrupt, deny, or destroy information stored in computers or computer networks. “Cyberterrorism” attacks are distinguished as cyber attacks or physical attacks that impair the informational infrastructure. In testimony before the U.S. Senate in 2004, the FBI’s Deputy Director of the Cyberterrorism Division stated, “The FBI predicts that terrorist groups will either develop or hire hackers, particularly for the purpose of complementing large-scale attacks with cyber attacks.” There is no doubt that terrorists are studying means of attacking the West’s infrastructure through cyberspace. Al-Qaeda, in particular, is expanding recruitment efforts to include computer scientists, engineers, and mathematicians. The main priority of the U.S. National Strategy to Secure Cyberspace is for the establishment of a reliable national cyberspace security response system. The plan calls upon all sectors of society to engage in focused and coordinated efforts to secure cyberspace. The Department of Homeland Security has been developing a response system that unites the government and private sector in providing analysis, warning information, and crisis management response infrastructure if a major cyberterrorist attack were to occur. The program would locate and remedy vulnerabilities, develop new systems and technology to reduce future vulnerabilities, and pursue and prosecute attackers. Despite its inability to achieve all of its desired goals, the strategy has proven to be moderately effective. Other efforts to secure cyberspace against attack are also described. Partnering government and private industry to combat cyberterrorism is in its infancy. If the private sector resists progress in this partnership, the government may be forced to ensure that private industry shares information and develops security systems. 39 references