-
1
-
-
0004184890
-
-
Washington, DC: National Academy Press
-
National Research Council. Computers at Risk (Washington, DC: National Academy Press, 1991).
-
(1991)
Computers at Risk
-
-
-
2
-
-
84898288063
-
-
Statement to the subcommittee on Government Efficiency, Financial Management and Intergovernmental Relations, 24 July
-
D. Thomas. "Cyber Terrorism and Critical Infrastructure Protection." Statement to the subcommittee on Government Efficiency, Financial Management and Intergovernmental Relations, 24 July 2002.
-
(2002)
Cyber Terrorism and Critical Infrastructure Protection
-
-
Thomas, D.1
-
3
-
-
14844325969
-
-
Report submitted to the Center for Strategic and International Studies (CSIS), Washington, DC
-
J. Lewis. "Assessing the Risks of Cybertwrrorism, Cyber War, and Other Cyber Threats." Report submitted to the Center for Strategic and International Studies (CSIS), Washington, DC, 2002), p. 1.
-
(2002)
Assessing the Risks of Cybertwrrorism, Cyber War, and Other Cyber Threats
, pp. 1
-
-
Lewis, J.1
-
4
-
-
27944455431
-
The Myth of Cyberterrorism
-
November
-
J. Green. 2002. "The Myth of Cyberterrorism." Washington Monthly, November, also available at (www.washingtonmonthly.com/features/2001/ 0211/green/html).
-
(2002)
Washington Monthly
-
-
Green, J.1
-
5
-
-
27944503720
-
-
note
-
For example, the downing of a U.S. spy plane in Chinese airspace (April 2001) resulted in an increase in attacks from both Chinese and U.S. hackers (mostly web site defacements). Another example occurred in 1997 when a group aligned with the Liberation Tigers of Tamil Elam (LTTE) reportedly swamped Sri Lankan embassies with 800 e-mails a day over a two-week period.
-
-
-
-
8
-
-
27944466951
-
-
New York: U.S. Social Science Research Council
-
D. Denning. "Is Cyber Terror Next?" New York: U.S. Social Science Research Council, available at (http://www.ssrc.org/sept11/essays/ denning.htm.2001).
-
Is Cyber Terror Next?
-
-
Denning, D.1
-
13
-
-
27944445166
-
The Power of Terror
-
edited by J. D. Elliot and L. K. Gibson (Gaithersburg, MD: IACP)
-
Smart, I. "The Power of Terror," in Contemporary Terrorism: Selected Readings, edited by J. D. Elliot and L. K. Gibson (Gaithersburg, MD: IACP, 1978).
-
(1978)
Contemporary Terrorism: Selected Readings
-
-
Smart, I.1
-
14
-
-
0004095933
-
-
New York: Columbia University Press
-
B. Hoffman. Inside Terrorism (New York: Columbia University Press, 1998).
-
(1998)
Inside Terrorism
-
-
Hoffman, B.1
-
15
-
-
27944497096
-
What is Cyberterrorism? The Story so Far
-
M. Conway. "What is Cyberterrorism? The Story so Far." Journal of Information Warfare, 2(2) (2003), pp. 33-42;
-
(2003)
Journal of Information Warfare
, vol.2
, Issue.2
, pp. 33-42
-
-
Conway, M.1
-
16
-
-
0012422098
-
Reality Bytes: Cyberterrorism and Terrorist 'Use' of the Internet
-
M. Conway. "Reality Bytes: Cyberterrorism and Terrorist 'Use' of the Internet." First Monday, 7(11) (2002), available at (http://www. firstmonday.org/issues/issue7_11/conway/index.html).
-
(2002)
First Monday
, vol.7
, Issue.11
-
-
Conway, M.1
-
17
-
-
85023972678
-
WWW.Terrorism.com: Terror on the Internet
-
On the use of the Internet for "conventional" purposes by modern terrorists, see Y. Tzfati and G. Weimann. "WWW.Terrorism.com: Terror on the Internet." Studies in Conflict and Terrorism 25(5) (2002), pp. 317-332;
-
(2002)
Studies in Conflict and Terrorism
, vol.25
, Issue.5
, pp. 317-332
-
-
Tzfati, Y.1
Weimann, G.2
-
18
-
-
33745594976
-
WWW.Terror.Net: How Modern Terrorism Uses the Internet
-
Washington DC: United States Institute of Peace
-
G. Weimann. "WWW.Terror.Net: How Modern Terrorism Uses the Internet." Special Report, 116 (Washington DC: United States Institute of Peace, 2004).
-
(2004)
Special Report
, vol.116
-
-
Weimann, G.1
-
19
-
-
27944494998
-
WWW.Terror.Net: How Modern Terrorism Uses the Internet
-
Cited by Green, "WWW.Terror.Net: How Modern Terrorism Uses the Internet." Special Report, 116 2004). ibid.
-
(2004)
Special Report
, vol.116
-
-
Green1
-
20
-
-
27944460144
-
US commission eyes cyberterrorism threat ahead
-
17 September
-
Cited in P. Thibodeau. "US commission eyes cyberterrorism threat ahead," Computerworld, 17 September 2001, available at (http://www. computerworld.com/securitytopics/security/story/0,10801,63965,00.html).
-
(2001)
Computerworld
-
-
Thibodeau, P.1
-
21
-
-
27944465906
-
-
note
-
From NPR's Bob Edwards talk with senators Jon Kyl and Dianne Feinstein, 18 March 2004.
-
-
-
-
23
-
-
27944460781
-
-
Green, 2002
-
Green, 2002.
-
-
-
-
24
-
-
27944502735
-
Security Expected to Take a Larger Bite of IT Budgets
-
8 June
-
A. Gonsalves. "Security Expected to Take a Larger Bite of IT Budgets." TechWeb News, 8 June 2004, available at (http://www.crime- research.org/news/08.06.2004/414).
-
(2004)
TechWeb News
-
-
Gonsalves, A.1
-
25
-
-
27944473451
-
-
Green, 2002
-
Green, 2002.
-
-
-
-
26
-
-
27944510828
-
-
To illustrate the supposed ease with which our enemies could subvert a dam, The Washington Post's June story on Al Qaeda cyberterrorism related an anecdote about a 12-year-old who hacked into the SCADA system at Arizona's Theodore Roosevelt Dam in 1998, and was, the article intimated, within mere keystrokes of unleashing millions of gallons of water on helpless downstream communities. But a subsequent investigation by the tech-news site CNet.com revealed the tale to be largely apocryphal - the incident occurred in 1994, the hacker was 27, and, most importantly, investigators concluded that he could not have gained control of the dam and that no lives or property were ever at risk.
-
The Washington Post's
-
-
-
27
-
-
0008791326
-
Networks, Netwars, and the Fight for the Future
-
D. Ronfeldt and J. Arquilla. "Networks, Netwars, and the Fight for the Future." First Monday 6(10) (2001);
-
(2001)
First Monday
, vol.6
, Issue.10
-
-
Ronfeldt, D.1
Arquilla, J.2
-
28
-
-
4043091585
-
The Advent of Netwar
-
revisited edited by J. Arquilla and D. Ronfeldt (Santa Monica: RAND Corporation)
-
J. Arquilla and D. Ronfeldt. "The Advent of Netwar" (revisited) (2001). In Networks and Netwars, edited by J. Arquilla and D. Ronfeldt (Santa Monica: RAND Corporation), pp. 1-25).
-
(2001)
Networks and Netwars
, pp. 1-25
-
-
Arquilla, J.1
Ronfeldt, D.2
-
29
-
-
4644344259
-
-
Washington, DC: Nautilus, 1999
-
D. Denning. 1999. Activism, Hacktivism, and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy (Washington, DC: Nautilus, 1999), available at (http://www.nautilus.org/info-policy/workshop/papers/denning.html);
-
(1999)
Activism, Hacktivism, and Cyberterrorism: The Internet As a Tool for Influencing Foreign Policy
-
-
Denning, D.1
-
30
-
-
70449634816
-
-
U.S. House of Representatives, Committee on Armed Services 23 May 2000a
-
D. Denning. 2000a. Testimony before the Special Oversight Panel on Terrorism, U.S. House of Representatives, Committee on Armed Services 23 May 2000a, available at (http://www.cs.georgetown.edu/~denning/infosec/cyberterror. html);
-
(2000)
Testimony before the Special Oversight Panel on Terrorism
-
-
Denning, D.1
-
31
-
-
0347810284
-
Cyberterrorism
-
Autumn, (2000b)
-
D. Denning. 2000b. "Cyberterrorism." Global Dialogue (Autumn), (2000b), available at (http://www.cs.georgetown.edu/~denning/infosec/ cyberterror-GD.doc);
-
(2000)
Global Dialogue
-
-
Denning, D.1
-
35
-
-
84859596962
-
-
Crime and Justice International (March issue, 1997)
-
B. Collin. 1997. "The Future of Cyberterrorism." Crime and Justice International (March issue, 1997), pp. 15-18, available at (http://afgen.com/terrorism1.html).
-
(1997)
The Future of Cyberterrorism
, pp. 15-18
-
-
Collin, B.1
-
36
-
-
0003661005
-
-
a report prepared by the Committee to Review DOD C4I Plans and Programs, Commission on Physical Sciences, Mathematics, and Applications, National Research Council
-
See "Realizing the Potential of C4I: Fundamental Challenges," a report prepared by the Committee to Review DOD C4I Plans and Programs, Commission on Physical Sciences, Mathematics, and Applications, National Research Council, 1999. Available at (http://www.nap.edu/catalog/6457.html).
-
(1999)
Realizing the Potential of C4I: Fundamental Challenges
-
-
-
38
-
-
27944454176
-
-
Reported at (http://www.computerworld.com/securitytopics/security/story/) .
-
-
-
-
40
-
-
27944437655
-
Feds Building Internet Monitoring Center
-
January 31
-
Reported by B. Krebs. 2003. "Feds Building Internet Monitoring Center." The Washington Post Online, January 31, at: http://www. washingtonpost.com/ac2/wp-dyn/A3409-2003Jan30.
-
(2003)
The Washington Post Online
-
-
Krebs, B.1
-
41
-
-
27944437655
-
Feds Building Internet Monitoring Center
-
Cited in Krebs
-
Cited in Krebs, B. Krebs. 2003. Feds Building Internet Monitoring Center. The Washington Post Online, http://www.washingtonpost.com/ac2/wp-dyn/A3409- 2003Jan30. ibid.
-
(2003)
The Washington Post Online
-
-
Krebs, B.1
-
42
-
-
0141630655
-
-
3 September
-
Cited in The Washington Post, 3 September 2003.
-
(2003)
The Washington Post
-
-
-
43
-
-
0011370467
-
-
New York: Little, Brown and Company
-
A. Lake. Six Nightmares (New York: Little, Brown and Company, 2000).
-
(2000)
Six Nightmares
-
-
Lake, A.1
-
44
-
-
3042688765
-
Cyber Terrorism
-
10 October 2003
-
K. Coleman. 2003. "Cyber Terrorism." Directions Magazine, 10 October 2003, available at (http://www.directionsmag.com/article.php?article_id= 432).
-
(2003)
Directions Magazine
-
-
Coleman, K.1
-
45
-
-
0008783791
-
-
Special Report, Institute for Security and Technology Studies
-
M. A. Vatis.. "Cyber Attacks During the War on Terrorism: A Predictive Analysis," 2001. Special Report, Institute for Security and Technology Studies, available at (http://www.ists.dartmouth.edu/ISTS/ counterterrorism/cyber_attacks.htm).
-
(2001)
Cyber Attacks during the War on Terrorism: A Predictive Analysis
-
-
Vatis, M.A.1
-
48
-
-
27944493401
-
Terrorists on the Net? Who cares?
-
20 December 2002
-
Cited in N. Shachtman. 2002. "Terrorists on the Net? Who cares?" Wired News, 20 December 2002, available at (http://www.wired.com/ news/infostructure/0,1377,56935,00.html).
-
(2002)
Wired News
-
-
Shachtman, N.1
-
49
-
-
27944493401
-
Terrorists on the Net? Who cares?
-
N. Shachtman. 2002. Terrorists on the Net? Who cares? Wired News, (http://www.wired.com/news/infostructure/0,1377,56935,00.html). Op. cit.
-
(2002)
Wired News
-
-
Shachtman, N.1
-
50
-
-
27944509964
-
-
See (http://2004.rsaconference.com/).
-
-
-
-
51
-
-
27944498810
-
Homeland Security Chair likens 'Cyber Terrorists' to Al Qaeda
-
Cited in E. Montalbano. 2004. "Homeland Security Chair likens 'Cyber Terrorists' to Al Qaeda." CRN News, available at (http://www.crn.com/ sections/BreakingNews/dailyarchives.asp?ArticleID=48215).
-
(2004)
CRN News
-
-
Montalbano, E.1
-
52
-
-
27944499162
-
-
Green, 2002
-
Green, 2002.
-
-
-
-
57
-
-
27944477943
-
Expert: U.S. at Risk of Cyberterrorism
-
19 April 2004
-
T. Spellman. 2004. "Expert: U.S. At Risk of Cyberterrorism." The Dartmouth Online, 19 April 2004, available at (http://www.thedartmouth.com/ article.php?aid=2004041901010k/).
-
(2004)
The Dartmouth Online
-
-
Spellman, T.1
-
58
-
-
27944477943
-
Expert: U.S. at Risk of Cyberterrorism
-
Cited in Spellman
-
Cited in Spellman, T. Spellman. 2004. Expert: U.S. At Risk of Cyberterrorism. The Dartmouth Online, (http://www.thedartmouth.com/article.php? aid=2004041901010k/). ibid.
-
(2004)
The Dartmouth Online
-
-
Spellman, T.1
-
59
-
-
27944477943
-
Expert: U.S. at Risk of Cyberterrorism
-
T. Spellman. 2004. Expert: U.S. At Risk of Cyberterrorism. The Dartmouth Online, (http://www.thedartmouth.com/article.php?aid=2004041901010k/). ibid.
-
(2004)
The Dartmouth Online
-
-
Spellman, T.1
-
60
-
-
27944471182
-
Expert: U.S. at Risk of Cyberterrorism
-
Verton, 2003a, Expert: U.S. At Risk of Cyberterrorism." The Dartmouth Online, op. cit., p. 93.
-
(2003)
The Dartmouth Online
, pp. 93
-
-
Verton1
-
61
-
-
27944496266
-
-
Hamid Mir, editor of Ausaf newspaper, cited in Verton 2003a, op. cit., p. 108.
-
Hamid Mir, editor of Ausaf newspaper, cited in Verton 2003a, op. cit., p. 108.
-
-
-
-
62
-
-
27944483486
-
-
Court transcript, U.S. vs. Osama bin Laden, 21 February 2002
-
Court transcript, U.S. vs. Osama bin Laden, 21 February 2002.
-
-
-
-
63
-
-
27944450591
-
-
Ibid
-
Ibid.
-
-
-
-
64
-
-
27944455430
-
Cyberterrorism & security: New definitions for new realities
-
paper presented 12 November
-
D. Verton. Cyberterrorism & security: New definitions for new realities, paper presented at the Cato Institute Book Forum, 12 November 2003b, Washington, DC.
-
(2003)
Cato Institute Book Forum
-
-
Verton, D.1
|