Naval Postgraduate School
Dudley Knox Library
NPS Dudley Knox Library
View Item 
  •   Calhoun Home
  • Centers and Institutes Publications
  • Cebrowski Institute
  • Cebrowski Institute Publications
  • View Item
  •   Calhoun Home
  • Centers and Institutes Publications
  • Cebrowski Institute
  • Cebrowski Institute Publications
  • View Item
  • How to search in Calhoun
  • My Accounts
  • Ask a Librarian
JavaScript is disabled for your browser. Some features of this site may not work without it.

Browse

All of CalhounCollectionsThis Collection

My Account

LoginRegister

Statistics

Most Popular ItemsStatistics by CountryMost Popular Authors

Cyberterror Prospects and Implications

Thumbnail
Download
IconCyberterror Prospects and Implications.pdf (1.069Mb)
Download Record
Download to EndNote/RefMan (RIS)
Download to BibTex
Author
Nelson, Bill
Choi, Rodney
Iacobucci, Michael
Mitchell, Mark
Gagnon, Greg
Date
1999-10
Advisor
Arquilla, John
Tucker, David
Metadata
Show full item record
Description
Much has been made of the threat of cyberterrorism since the report of the Marsh Commission in 1997. However, current analyses have merely identified the plethora of vulnerabilities in automated information systems (computers) and assumed that terrorist organizations would be willing to exploit these vulnerabilities. They adopt a rudimentary strategic analysis and conclude that cyberterrorism is inevitable because it provides terrorists with a potentially strategic advantage over the United States. We do not dispute the fact that our vulnerabilities are real and numerous. Further, we do not dispute that the consequences of exploitation are potentially severe, even strategically debilitating, if events unfolded in a manner described in some scenarios. However, based on our research, we also do not believe that terrorist organizations will soon possess the capabilities described in many of these scenarios. According to many analyses, the necessary tools for exploiting vulnerabilities in the infrastructure are immediately available, easy to use, and proliferating at an alarming rate. Yet, the United States has not experienced any strategic attacks on critical infrastructure by terrorist organizations (or any other organization, for that matter). Even during the conflict in Kosovo, the most serious "attacks" consisted of vandalizing web pages and denial of service attacks on e-mail servers. Annoying, yes, but hardly a strategic threat to the United States or NATO. This suggests that these tools are still insufficient for the purpose of mass disruption, and that there are requirements for effective use that go beyond the mere possession of these tools and a desire to inflict damage. Therefore, a key question we have asked is "Why haven't terrorist organizations taken advantage of this opportunity?" We believe that the costs of creating a capability sufficient to achieve terrorists’ ultimate goals are much higher than the conventional wisdom indicates. Likewise, simply offsetting development costs is but one of several challenges that must be taken into account. Terrorist organizations will likely measure the benefits of pursuing cyberterrorism from the perspective of both internal and external incentives. Besides development costs, internal incentives must also include the individual and group psychological processes that heavily affect terrorist organizations. In terms of external interests, the costs of pursuing cyberterror may never be attractive as long as traditional terrorist methods remain viable. We examined the issue of cyberterrorism from the perspective of an organization seeking to conduct a comprehensive assessment of its activities. Our assessment explores the costs, risks and benefits of adopting cyberterror, either as a stand-alone operation or as an adjunct to traditional terrorist operations. We believe that this analysis fills a gap in the current literature on cyberterrorism. While the assessment is by no means comprehensive, it offers the intelligence community a much-needed starting point for better understanding the true potential of this threat.
URI
http://hdl.handle.net/10945/27344
Collections
  • Cebrowski Institute Publications

Related items

Showing items related by title, author, creator and subject.

  • Thumbnail

    Homeland Security Affairs Journal, Volume II - 2006: Issue 2, July 

    Naval Postgraduate School Center for Homeland Defense and Security (CHDS) (Monterey, California. Naval Postgraduate SchoolCenter for Homeland Defense and Security, 2006-07);
    July 2006. The July 2006 issue of Homeland Security Affairs offers articles about risk perception, domestic right wing extremist groups, social network analysis, and the impact of foreign policy on homeland security. It ...
  • Thumbnail

    Homeland Security Affairs Journal, Volume V - 2009: Issue 1, January 

    Naval Postgraduate School Center for Homeland Defense and Security (CHDS) (Monterey, California. Naval Postgraduate SchoolCenter for Homeland Defense and Security, 2009-01);
    January 2009. In this issue of Homeland Security Affairs we offer one essay that outlines some of the important homeland security issues of 2008 and a set of essays that describes a potentially significant change in the ...
  • Thumbnail

    Homeland Security Affairs Journal, Volume VII - 2011, 10 Years After: The 9/11 Essays 

    Naval Postgraduate School Center for Homeland Defense and Security (CHDS) (Monterey, California. Naval Postgraduate SchoolCenter for Homeland Defense and Security, 2011);
    10 Years After: the 9/11 Essays. Homeland Security Affairs (HSA) is pleased to present this special collection of essays in remembrance of the ten-year anniversary of September 11, 2001. We chose to honor those who lost ...
NPS Dudley Knox LibraryDUDLEY KNOX LIBRARY
Feedback

411 Dyer Rd. Bldg. 339
Monterey, CA 93943
circdesk@nps.edu
(831) 656-2947
DSN 756-2947

    Federal Depository Library      


Start Your Research

Research Guides
Academic Writing
Ask a Librarian
Copyright at NPS
Graduate Writing Center
How to Cite
Library Liaisons
Research Tools
Thesis Processing Office

Find & Download

Databases List
Articles, Books & More
NPS Theses
NPS Faculty Publications: Calhoun
Journal Titles
Course Reserves

Use the Library

My Accounts
Request Article or Book
Borrow, Renew, Return
Tech Help
Remote Access
Workshops & Tours

For Faculty & Researchers
For International Students
For Alumni

Print, Copy, Scan, Fax
Rooms & Study Spaces
Floor Map
Computers & Software
Adapters, Lockers & More

Collections

NPS Archive: Calhoun
Restricted Resources
Special Collections & Archives
Federal Depository
Homeland Security Digital Library

About

Hours
Library Staff
About Us
Special Exhibits
Policies
Our Affiliates
Visit Us

NPS-Licensed Resources—Terms & Conditions
Copyright Notice

Naval Postgraduate School

Naval Postgraduate School
1 University Circle, Monterey, CA 93943
Driving Directions | Campus Map

This is an official U.S. Navy Website |  Please read our Privacy Policy Notice  |  FOIA |  Section 508 |  No FEAR Act |  Whistleblower Protection |  Copyright and Accessibility |  Contact Webmaster

Export search results

The export option will allow you to export the current search results of the entered query to a file. Different formats are available for download. To export the items, click on the button corresponding with the preferred download format.

A logged-in user can export up to 15000 items. If you're not logged in, you can export no more than 500 items.

To select a subset of the search results, click "Selective Export" button and make a selection of the items you want to export. The amount of items that can be exported at once is similarly restricted as the full export.

After making a selection, click one of the export format buttons. The amount of items that will be exported is indicated in the bubble next to export format.