Mark M. Pollitt
FBI Laboratory
935 Pennsylvania Ave. NW
Washington, D. C. 20535
Abstract:
This paper discusses the definition of cyberterrorism, its potential, and suggests an approach to the minimization of its’ dangers. The definition of cyberterrorism used in this paper is combines the United States Department of State’s definition of terrorism as politically motivated acts of violence against non-combatants with a definition of cyberspace as the computers, networks, programs and data which make up the information infrastructure. The conclusion is that by limiting the physical capabilities of the information infrastructure, we can limit it potential for physical destruction.
Keywords:
Terrorism, cyberspace, cyberterrorism, information infrastructure, computer security.
Disclaimer:
This paper was submitted by the author in connection with academic studies at George Washington University. It does not represent the policy, opinions, or conclusions of the United States Government or of the Federal Bureau of Investigation. The opinions expressed herein are wholly that of the author.
CYBERTERRORISM - Fact or Fancy?
by Mark M. Pollitt
Introduction
“We are at risk. Increasingly, America depends on computers. They control power delivery, communications, aviation, and financial services. They are used to store vital information, from medical records to business plans to criminal records. Although we trust them, they are vulnerable - to the effects of poor design and insufficient quality control, to accident, and perhaps most alarmingly, to deliberate attack. The modern thief can steal more with a computer than with a gun. Tomorrow’s terrorist may be able to do more damage with a keyboard than with a bomb.”(1)
Thus began the opening chapter of one of the foundation books in the computer security field. This book, commissioned by the National Academy of sciences, was the product of twenty-one