Page 130 - Encyclopedia Of Terrorism
P. 130

C-Kushner.qxd  26-10-02 10:37 AM  Page 104



           104———Cyberterrorism


           protection of critical infrastructure for the National  believed to have been perpetrated by hackers in
           Security Council, stated that cyberattacks could act as a  China.
           “force multiplier” for a bombing or attack either by  Though CIA director John Deutch warned in
           posting false information on the Internet to create panic  1996 of an upcoming  “electronic Pearl Harbor,”
           or by sabotaging financial, emergency, or communi-  little, thus far, has supported that claim. Most believe
           cation networks. In 1997, the Clinton administration’s  that hacking will be used as a “weapon of mass dis-
           Commission on Critical Infrastructure Protection con-  ruption” in conjunction with traditional terrorist
           cluded that electronic money transfers, the power grid,  attacks, while skeptics argue that cyberterror offers
           911 services, and military command sites were also  little to traditional terrorists, due to the lack of
           vulnerable to cyberattack.  The study stated, “Our  drama and small likelihood of significant injury or
           dependence on the information and communications   death, but also because traditional terrorist tools,
           infrastructure has created new cyber-vulnerabilities,  such as suicide bombings, are still quite effective.
           which we are only starting to understand.”         According to Frank Cilluffo, of the Center for
             In response to the commission’s finding, in May  Strategic and International Studies in Washington,
           1998 President Clinton issued an order to create the  “Bits and bytes are never going to replace bullets
           National Infrastructure Protection Center, to protect  and bombs.” Nevertheless, a coordinated cyberat-
           vital national systems, such as telecommunication  tack against certain infrastructures, such as the com-
           networks and the power grid, and to upgrade govern-  puters that control and coordinate airplanes or the
           ment computer security. One of Clinton’s officials,  ones that run the stock market, could cause signifi-
           Richard Clarke, has continued under the Bush admin-  cant havoc.
           istration to deal directly with the threat of cyberterror.
                                                              See also ASYMMETRICAL WARFARE
           He was named special adviser for cybersecurity to the
           president shortly after the September 11, 2001, terror-
           ist attacks.                                       Further Reading
             Today, the U.S. government faces daily cyberas-  Aldrich, Richard W.  Cyberterrorism and Computer
           saults on its computers and Web sites. Attacks against  Crimes: Issues Surrounding the Establishment of an
           Department of Defense computers rose from less       International Regime. Colorado Springs, CO: USAF
           than 1,000 in 1997 to nearly 23,000 in 1999. A series  Institute for National Security Studies, 2000.
           of cyberattacks on high-level businesses and the   Alexander, Yonah, and Michael S. Swetnam, eds.  Cyber
           Pentagon, beginning in 1998, is believed to be linked  Terrorism and Information Warfare. Dobbs Ferry, NY:
           to organized crime in Russia. Currently, American    Oceana, 1999.
                                                              Arquilla, John, and David Ronfeldt, eds.  Networks and
           hackers are engaged in a “cyberwar” with their
                                                                Netwars: The Future of Terror, Crime, and Militancy.
           Chinese counterparts (which thus far has consisted of
                                                                Santa Monica, CA: RAND, 2001.
           little more than defacing the other country’s  Web
                                                              Global Organized Crime Project.  Cybercrime—Cyber-
           sites). Of more concern are espionage-like hacks into
                                                                terrorism—Cyberwarfare: Averting an Electronic
           sensitive information systems, such as the 1998 hack  Waterloo. Washington, DC: CSIS, 1998.
           into NASA’s Jet Propulsion Laboratory, and forays  Yourdon, Edward. Byte Wars: The Impact of September 11
           into large-scale sabotage, such as the 2000 hack into  on Information  Technology. Upper Saddle River, NJ:
           one of California’s electrical transmitting stations,  Prentice Hall PTR, 2002.
   125   126   127   128   129   130   131   132   133   134   135