Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
897493 | Technological Forecasting and Social Change | 2007 | 18 Pages |
Given that terrorists are quickly acquiring technical skills that increase the utility of cyberspace to an effective distributed organizational network and the likelihood of potential attacks on U.S. critical infrastructure and defense systems, we consider the value of cyberspace to terrorists. To this end, it is necessary to address the following questions pertinent to the attributes of cyberspace to examine why and how terrorists may utilize cyberspace to advance their goals: (1) What is cyberterrorism? (2) Is cyberterrorism warfare? (3) Why would terrorists use cyberspace? (4) What do we know or anticipate that terrorists want to do in cyberspace? (5) How do we deal with terrorists in cyberspace? We conclude with an assessment of the cyberterrorism threat facing the U.S. today and recommendations that address increasing technical capabilities and security measures for intelligence gathering, digital control and supervisory control and data acquisition (DC/SCADA) systems, and emergency response systems.