메뉴 건너뛰기




Volumn 28, Issue 2, 2005, Pages 129-149

Cyberterrorism: The sum of all fears?

Author keywords

[No Author keywords available]

Indexed keywords


EID: 27944454740     PISSN: 1057610X     EISSN: 15210731     Source Type: Journal    
DOI: 10.1080/10576100590905110     Document Type: Review
Times cited : (114)

References (64)
  • 1
    • 0004184890 scopus 로고
    • Washington, DC: National Academy Press
    • National Research Council. Computers at Risk (Washington, DC: National Academy Press, 1991).
    • (1991) Computers at Risk
  • 2
    • 84898288063 scopus 로고    scopus 로고
    • Statement to the subcommittee on Government Efficiency, Financial Management and Intergovernmental Relations, 24 July
    • D. Thomas. "Cyber Terrorism and Critical Infrastructure Protection." Statement to the subcommittee on Government Efficiency, Financial Management and Intergovernmental Relations, 24 July 2002.
    • (2002) Cyber Terrorism and Critical Infrastructure Protection
    • Thomas, D.1
  • 4
    • 27944455431 scopus 로고    scopus 로고
    • The Myth of Cyberterrorism
    • November
    • J. Green. 2002. "The Myth of Cyberterrorism." Washington Monthly, November, also available at (www.washingtonmonthly.com/features/2001/ 0211/green/html).
    • (2002) Washington Monthly
    • Green, J.1
  • 5
    • 27944503720 scopus 로고    scopus 로고
    • note
    • For example, the downing of a U.S. spy plane in Chinese airspace (April 2001) resulted in an increase in attacks from both Chinese and U.S. hackers (mostly web site defacements). Another example occurred in 1997 when a group aligned with the Liberation Tigers of Tamil Elam (LTTE) reportedly swamped Sri Lankan embassies with 800 e-mails a day over a two-week period.
  • 8
    • 27944466951 scopus 로고    scopus 로고
    • New York: U.S. Social Science Research Council
    • D. Denning. "Is Cyber Terror Next?" New York: U.S. Social Science Research Council, available at (http://www.ssrc.org/sept11/essays/ denning.htm.2001).
    • Is Cyber Terror Next?
    • Denning, D.1
  • 13
    • 27944445166 scopus 로고
    • The Power of Terror
    • edited by J. D. Elliot and L. K. Gibson (Gaithersburg, MD: IACP)
    • Smart, I. "The Power of Terror," in Contemporary Terrorism: Selected Readings, edited by J. D. Elliot and L. K. Gibson (Gaithersburg, MD: IACP, 1978).
    • (1978) Contemporary Terrorism: Selected Readings
    • Smart, I.1
  • 14
    • 0004095933 scopus 로고    scopus 로고
    • New York: Columbia University Press
    • B. Hoffman. Inside Terrorism (New York: Columbia University Press, 1998).
    • (1998) Inside Terrorism
    • Hoffman, B.1
  • 15
    • 27944497096 scopus 로고    scopus 로고
    • What is Cyberterrorism? The Story so Far
    • M. Conway. "What is Cyberterrorism? The Story so Far." Journal of Information Warfare, 2(2) (2003), pp. 33-42;
    • (2003) Journal of Information Warfare , vol.2 , Issue.2 , pp. 33-42
    • Conway, M.1
  • 16
    • 0012422098 scopus 로고    scopus 로고
    • Reality Bytes: Cyberterrorism and Terrorist 'Use' of the Internet
    • M. Conway. "Reality Bytes: Cyberterrorism and Terrorist 'Use' of the Internet." First Monday, 7(11) (2002), available at (http://www. firstmonday.org/issues/issue7_11/conway/index.html).
    • (2002) First Monday , vol.7 , Issue.11
    • Conway, M.1
  • 17
    • 85023972678 scopus 로고    scopus 로고
    • WWW.Terrorism.com: Terror on the Internet
    • On the use of the Internet for "conventional" purposes by modern terrorists, see Y. Tzfati and G. Weimann. "WWW.Terrorism.com: Terror on the Internet." Studies in Conflict and Terrorism 25(5) (2002), pp. 317-332;
    • (2002) Studies in Conflict and Terrorism , vol.25 , Issue.5 , pp. 317-332
    • Tzfati, Y.1    Weimann, G.2
  • 18
    • 33745594976 scopus 로고    scopus 로고
    • WWW.Terror.Net: How Modern Terrorism Uses the Internet
    • Washington DC: United States Institute of Peace
    • G. Weimann. "WWW.Terror.Net: How Modern Terrorism Uses the Internet." Special Report, 116 (Washington DC: United States Institute of Peace, 2004).
    • (2004) Special Report , vol.116
    • Weimann, G.1
  • 19
    • 27944494998 scopus 로고    scopus 로고
    • WWW.Terror.Net: How Modern Terrorism Uses the Internet
    • Cited by Green, "WWW.Terror.Net: How Modern Terrorism Uses the Internet." Special Report, 116 2004). ibid.
    • (2004) Special Report , vol.116
    • Green1
  • 20
    • 27944460144 scopus 로고    scopus 로고
    • US commission eyes cyberterrorism threat ahead
    • 17 September
    • Cited in P. Thibodeau. "US commission eyes cyberterrorism threat ahead," Computerworld, 17 September 2001, available at (http://www. computerworld.com/securitytopics/security/story/0,10801,63965,00.html).
    • (2001) Computerworld
    • Thibodeau, P.1
  • 21
    • 27944465906 scopus 로고    scopus 로고
    • note
    • From NPR's Bob Edwards talk with senators Jon Kyl and Dianne Feinstein, 18 March 2004.
  • 23
    • 27944460781 scopus 로고    scopus 로고
    • Green, 2002
    • Green, 2002.
  • 24
    • 27944502735 scopus 로고    scopus 로고
    • Security Expected to Take a Larger Bite of IT Budgets
    • 8 June
    • A. Gonsalves. "Security Expected to Take a Larger Bite of IT Budgets." TechWeb News, 8 June 2004, available at (http://www.crime- research.org/news/08.06.2004/414).
    • (2004) TechWeb News
    • Gonsalves, A.1
  • 25
    • 27944473451 scopus 로고    scopus 로고
    • Green, 2002
    • Green, 2002.
  • 26
    • 27944510828 scopus 로고    scopus 로고
    • To illustrate the supposed ease with which our enemies could subvert a dam, The Washington Post's June story on Al Qaeda cyberterrorism related an anecdote about a 12-year-old who hacked into the SCADA system at Arizona's Theodore Roosevelt Dam in 1998, and was, the article intimated, within mere keystrokes of unleashing millions of gallons of water on helpless downstream communities. But a subsequent investigation by the tech-news site CNet.com revealed the tale to be largely apocryphal - the incident occurred in 1994, the hacker was 27, and, most importantly, investigators concluded that he could not have gained control of the dam and that no lives or property were ever at risk.
    • The Washington Post's
  • 27
    • 0008791326 scopus 로고    scopus 로고
    • Networks, Netwars, and the Fight for the Future
    • D. Ronfeldt and J. Arquilla. "Networks, Netwars, and the Fight for the Future." First Monday 6(10) (2001);
    • (2001) First Monday , vol.6 , Issue.10
    • Ronfeldt, D.1    Arquilla, J.2
  • 28
    • 4043091585 scopus 로고    scopus 로고
    • The Advent of Netwar
    • revisited edited by J. Arquilla and D. Ronfeldt (Santa Monica: RAND Corporation)
    • J. Arquilla and D. Ronfeldt. "The Advent of Netwar" (revisited) (2001). In Networks and Netwars, edited by J. Arquilla and D. Ronfeldt (Santa Monica: RAND Corporation), pp. 1-25).
    • (2001) Networks and Netwars , pp. 1-25
    • Arquilla, J.1    Ronfeldt, D.2
  • 30
    • 70449634816 scopus 로고    scopus 로고
    • U.S. House of Representatives, Committee on Armed Services 23 May 2000a
    • D. Denning. 2000a. Testimony before the Special Oversight Panel on Terrorism, U.S. House of Representatives, Committee on Armed Services 23 May 2000a, available at (http://www.cs.georgetown.edu/~denning/infosec/cyberterror. html);
    • (2000) Testimony before the Special Oversight Panel on Terrorism
    • Denning, D.1
  • 31
    • 0347810284 scopus 로고    scopus 로고
    • Cyberterrorism
    • Autumn, (2000b)
    • D. Denning. 2000b. "Cyberterrorism." Global Dialogue (Autumn), (2000b), available at (http://www.cs.georgetown.edu/~denning/infosec/ cyberterror-GD.doc);
    • (2000) Global Dialogue
    • Denning, D.1
  • 35
    • 84859596962 scopus 로고    scopus 로고
    • Crime and Justice International (March issue, 1997)
    • B. Collin. 1997. "The Future of Cyberterrorism." Crime and Justice International (March issue, 1997), pp. 15-18, available at (http://afgen.com/terrorism1.html).
    • (1997) The Future of Cyberterrorism , pp. 15-18
    • Collin, B.1
  • 36
    • 0003661005 scopus 로고    scopus 로고
    • a report prepared by the Committee to Review DOD C4I Plans and Programs, Commission on Physical Sciences, Mathematics, and Applications, National Research Council
    • See "Realizing the Potential of C4I: Fundamental Challenges," a report prepared by the Committee to Review DOD C4I Plans and Programs, Commission on Physical Sciences, Mathematics, and Applications, National Research Council, 1999. Available at (http://www.nap.edu/catalog/6457.html).
    • (1999) Realizing the Potential of C4I: Fundamental Challenges
  • 38
    • 27944454176 scopus 로고    scopus 로고
    • Reported at (http://www.computerworld.com/securitytopics/security/story/) .
  • 40
    • 27944437655 scopus 로고    scopus 로고
    • Feds Building Internet Monitoring Center
    • January 31
    • Reported by B. Krebs. 2003. "Feds Building Internet Monitoring Center." The Washington Post Online, January 31, at: http://www. washingtonpost.com/ac2/wp-dyn/A3409-2003Jan30.
    • (2003) The Washington Post Online
    • Krebs, B.1
  • 41
    • 27944437655 scopus 로고    scopus 로고
    • Feds Building Internet Monitoring Center
    • Cited in Krebs
    • Cited in Krebs, B. Krebs. 2003. Feds Building Internet Monitoring Center. The Washington Post Online, http://www.washingtonpost.com/ac2/wp-dyn/A3409- 2003Jan30. ibid.
    • (2003) The Washington Post Online
    • Krebs, B.1
  • 42
    • 0141630655 scopus 로고    scopus 로고
    • 3 September
    • Cited in The Washington Post, 3 September 2003.
    • (2003) The Washington Post
  • 43
    • 0011370467 scopus 로고    scopus 로고
    • New York: Little, Brown and Company
    • A. Lake. Six Nightmares (New York: Little, Brown and Company, 2000).
    • (2000) Six Nightmares
    • Lake, A.1
  • 44
    • 3042688765 scopus 로고    scopus 로고
    • Cyber Terrorism
    • 10 October 2003
    • K. Coleman. 2003. "Cyber Terrorism." Directions Magazine, 10 October 2003, available at (http://www.directionsmag.com/article.php?article_id= 432).
    • (2003) Directions Magazine
    • Coleman, K.1
  • 45
    • 0008783791 scopus 로고    scopus 로고
    • Special Report, Institute for Security and Technology Studies
    • M. A. Vatis.. "Cyber Attacks During the War on Terrorism: A Predictive Analysis," 2001. Special Report, Institute for Security and Technology Studies, available at (http://www.ists.dartmouth.edu/ISTS/ counterterrorism/cyber_attacks.htm).
    • (2001) Cyber Attacks during the War on Terrorism: A Predictive Analysis
    • Vatis, M.A.1
  • 48
    • 27944493401 scopus 로고    scopus 로고
    • Terrorists on the Net? Who cares?
    • 20 December 2002
    • Cited in N. Shachtman. 2002. "Terrorists on the Net? Who cares?" Wired News, 20 December 2002, available at (http://www.wired.com/ news/infostructure/0,1377,56935,00.html).
    • (2002) Wired News
    • Shachtman, N.1
  • 49
    • 27944493401 scopus 로고    scopus 로고
    • Terrorists on the Net? Who cares?
    • N. Shachtman. 2002. Terrorists on the Net? Who cares? Wired News, (http://www.wired.com/news/infostructure/0,1377,56935,00.html). Op. cit.
    • (2002) Wired News
    • Shachtman, N.1
  • 50
    • 27944509964 scopus 로고    scopus 로고
    • See (http://2004.rsaconference.com/).
  • 51
    • 27944498810 scopus 로고    scopus 로고
    • Homeland Security Chair likens 'Cyber Terrorists' to Al Qaeda
    • Cited in E. Montalbano. 2004. "Homeland Security Chair likens 'Cyber Terrorists' to Al Qaeda." CRN News, available at (http://www.crn.com/ sections/BreakingNews/dailyarchives.asp?ArticleID=48215).
    • (2004) CRN News
    • Montalbano, E.1
  • 52
    • 27944499162 scopus 로고    scopus 로고
    • Green, 2002
    • Green, 2002.
  • 57
    • 27944477943 scopus 로고    scopus 로고
    • Expert: U.S. at Risk of Cyberterrorism
    • 19 April 2004
    • T. Spellman. 2004. "Expert: U.S. At Risk of Cyberterrorism." The Dartmouth Online, 19 April 2004, available at (http://www.thedartmouth.com/ article.php?aid=2004041901010k/).
    • (2004) The Dartmouth Online
    • Spellman, T.1
  • 58
    • 27944477943 scopus 로고    scopus 로고
    • Expert: U.S. at Risk of Cyberterrorism
    • Cited in Spellman
    • Cited in Spellman, T. Spellman. 2004. Expert: U.S. At Risk of Cyberterrorism. The Dartmouth Online, (http://www.thedartmouth.com/article.php? aid=2004041901010k/). ibid.
    • (2004) The Dartmouth Online
    • Spellman, T.1
  • 59
    • 27944477943 scopus 로고    scopus 로고
    • Expert: U.S. at Risk of Cyberterrorism
    • T. Spellman. 2004. Expert: U.S. At Risk of Cyberterrorism. The Dartmouth Online, (http://www.thedartmouth.com/article.php?aid=2004041901010k/). ibid.
    • (2004) The Dartmouth Online
    • Spellman, T.1
  • 60
    • 27944471182 scopus 로고    scopus 로고
    • Expert: U.S. at Risk of Cyberterrorism
    • Verton, 2003a, Expert: U.S. At Risk of Cyberterrorism." The Dartmouth Online, op. cit., p. 93.
    • (2003) The Dartmouth Online , pp. 93
    • Verton1
  • 61
    • 27944496266 scopus 로고    scopus 로고
    • Hamid Mir, editor of Ausaf newspaper, cited in Verton 2003a, op. cit., p. 108.
    • Hamid Mir, editor of Ausaf newspaper, cited in Verton 2003a, op. cit., p. 108.
  • 62
    • 27944483486 scopus 로고    scopus 로고
    • Court transcript, U.S. vs. Osama bin Laden, 21 February 2002
    • Court transcript, U.S. vs. Osama bin Laden, 21 February 2002.
  • 63
    • 27944450591 scopus 로고    scopus 로고
    • Ibid
    • Ibid.
  • 64
    • 27944455430 scopus 로고    scopus 로고
    • Cyberterrorism & security: New definitions for new realities
    • paper presented 12 November
    • D. Verton. Cyberterrorism & security: New definitions for new realities, paper presented at the Cato Institute Book Forum, 12 November 2003b, Washington, DC.
    • (2003) Cato Institute Book Forum
    • Verton, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.