Difference between revisions of "Cyber Terrorism"

From Cybersecurity Wiki
Jump to navigation Jump to search
Line 16: Line 16:
 
[[Keyword_Index_and_Glossary_of_Core_Ideas#Cyber_Terrorism | Cyber Terrorism]],
 
[[Keyword_Index_and_Glossary_of_Core_Ideas#Cyber_Terrorism | Cyber Terrorism]],
 
[[Keyword_Index_and_Glossary_of_Core_Ideas#Digital_Pearl_Harbor | Digital Pearl Harbor]],
 
[[Keyword_Index_and_Glossary_of_Core_Ideas#Digital_Pearl_Harbor | Digital Pearl Harbor]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Hacktivism | Hacktivism]],
+
[[Keyword_Index_and_Glossary_of_Core_Ideas#Hacker | Hackers]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Hacktivist | Hacktivist]]
+
[[Keyword_Index_and_Glossary_of_Core_Ideas#Hacktivism | Hacktivism]]
  
 
==Synopsis==
 
==Synopsis==

Revision as of 18:23, 19 August 2010

Full Title of Reference

Cyber Terrorism: A Clear and Present Danger, the Sum of All Fears, Breaking Point or Patriot Games?

Full Citation

Michael Stohl, Cyber Terrorism: A Clear and Present Danger, the Sum of All Fears, Breaking Point or Patriot Games? (2006), Journal of Crime, Law and Social Change, Vol. 46, No. 4. Purchase

BibTeX

Categorization

Key Words

Cyber Terrorism, Digital Pearl Harbor, Hackers, Hacktivism

Synopsis

Over the past two decades there has developed a voluminous literature on the problem of cyber terrorism. The themes developed by those writing on cyber terrorism appear to spring from the titles of Tom Clancy’s fiction, such as Clear and Present Danger, The Sum of All Fears and Breaking Point, or somewhat more cynically, Patriot Games. This essay examines both the gap between the presumed threat and the known cyber terror behaviors and the continuing literature which suggests an attack is imminent. It suggests that at least part of the explanation lies both in the continuing failure to distinguish between what Denning (Activism, hacktivism, and cyber terrorism: The internet as a tool for influencing foreign policy, 1999) referred to as hactivism and cyberterrorism and also the failure to distinguish between the use of digital means for organizational purposes (information, communication, command and control) and the use of digital communications to actually commit acts of terror.

Additional Notes and Highlights

Expertise Required: None

Video lecture by Michael Stohl: Cyber Terrorism: A Clear and Present Danger, The Sum of All Fears, Breaking Point or Patriot Games? April 12, 2007. AltWeb