Denning, Dorothy E.
MetadataShow full item record
In 1996, a computer hacker allegedly associated with the White Supremacist movement temporarily disabled a Massachusetts Internet Service Provider and damaged part of the ISP=s record keeping system. The ISP had attempted to stop the hacker from sending out worldwide racist messages under the ISP=s name. The hacker signed off with the threat, “you have yet to see true electronic terrorism. This is a promise.” The hacker apparently never made good on his promise, but the threat of a cyberterrorist attack has many people worried. The highly acclaimed Computers at Risk report (1991) from the National Research Council concludes “Tomorrow’s terrorist may be able to do more with a keyboard than with a bomb.” And Cybercrime, Cyberterrorims, and Cyberwarfare (1998) from the Global Organized Crime Project of the Center for Strategic and International Studies in Washington, DC says “Cyberterrorists, acting for rogue states or groups that have declared holy war against the United States, are known to be plotting America’s demise as a superpower.”
Showing items related by title, author, creator and subject.
Craddock, Douglas (Monterey, California. Naval Postgraduate School, 2003);The Internet continues to grow exponentially. It is estimated that over 1 billion people – one-sixth of humanity – will be on-line by 2005, two thirds of them abroad. Along with this increase in net users, has come an ...
Ma, Zhanshan (Sam); Krings, Axel W.; Millar, Richard C. (2009);The study of the First Passage Time (FPT) problem (also known as first passage problem, FPP) started more than a century ago, but its diverse applications in science and engineering mostly emerged in the last two to ...
The future of armed resistance: cyberterror? mass casualties? final report on a Conference held May 15-17, 2000 at the University Pantheon-Assas (Paris II) Tucker, David (2000-09);In May, 2000, a conference convened to examine the decisionmaking process that leads sub-state groups engaged in armed resistance to develop new operational methods. The conference was particularly concerned to understand ...