Cyber Terrorism: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 5: Line 5:
==Full Citation==
==Full Citation==


Michael Stohl, ''Cyber Terrorism: A Clear and Present Danger, the Sum of All Fears, Breaking Point or Patriot Games?'' (2006), Journal of Crime, Law and Social Change, Vol. 46, No. 4. [http://https://springerlink.metapress.com/content/y816117ww6058jp7/resource-secured/?target=fulltext.pdf&sid=ukox5aip0s1l2a55lur00i55&sh=www.springerlink.com ''Purchase Online'']   
Michael Stohl, ''Cyber Terrorism: A Clear and Present Danger, the Sum of All Fears, Breaking Point or Patriot Games?'' (2006), Journal of Crime, Law and Social Change, Vol. 46, No. 4. [http://www.ingentaconnect.com/content/klu/cris/2006/00000046/F0020004/00009061 ''Purchase'']   


[http://cyber.law.harvard.edu/cybersecurity/Special:Bibliography?f=wikibiblio.bib&title=Special:Bibliography&view=detailed&action=&keyword=Stohl:2006 ''BibTeX'']
[http://cyber.law.harvard.edu/cybersecurity/Special:Bibliography?f=wikibiblio.bib&title=Special:Bibliography&view=detailed&action=&keyword=Stohl:2006 ''BibTeX'']

Revision as of 16:05, 16 June 2010

Full Title of Reference

Cyber Terrorism: A Clear and Present Danger, the Sum of All Fears, Breaking Point or Patriot Games?

Full Citation

Michael Stohl, Cyber Terrorism: A Clear and Present Danger, the Sum of All Fears, Breaking Point or Patriot Games? (2006), Journal of Crime, Law and Social Change, Vol. 46, No. 4. Purchase

BibTeX

Categorization

Issues: Media Perceptions

Key Words

Digital Pearl Harbor

Synopsis

Over the past two decades there has developed a voluminous literature on the problem of cyber terrorism. The themes developed by those writing on cyber terrorism appear to spring from the titles of Tom Clancy’s fiction, such as Clear and Present Danger, The Sum of All Fears and Breaking Point, or somewhat more cynically, Patriot Games. This essay examines both the gap between the presumed threat and the known cyber terror behaviors and the continuing literature which suggests an attack is imminent. It suggests that at least part of the explanation lies both in the continuing failure to distinguish between what Denning (Activism, hacktivism, and cyber terrorism: The internet as a tool for influencing foreign policy, 1999) referred to as hactivism and cyberterrorism and also the failure to distinguish between the use of digital means for organizational purposes (information, communication, command and control) and the use of digital communications to actually commit acts of terror.


Additional Notes and Highlights

* Outline key points of interest