U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Cyber-Terrorism: The Shape of Future Conflict?

NCJ Number
177187
Journal
Journal of Financial Crime Volume: 6 Issue: 3 Dated: January 1999 Pages: 277-283
Author(s)
A Rathmell
Date Published
1999
Length
7 pages
Annotation
This article assesses the extent of the future threat from cyber-terrorism.
Abstract
The article describes what is meant by "information warfare" (IW) and discusses which aspects of IW may be of use to sub-state groups. It also assesses the extent of use of IW techniques today and analyzes how one specific group, the Provisional Irish Republican Army (PIRA), may use IW. The US Department of Defense calls IW "actions taken to achieve information superiority by affecting adversary information, information-based processes, information systems and computer-based networks while leveraging and defending one's own information." The UK Ministry of Defence speaks of "deliberate ... and systematic attack on critical information activities" which seeks to exploit, modify, or corrupt information to deny service. Among the users of IW are amateur and professional computer hackers, criminal groups and politically motivated sub-state groups. With regard to the PIRA, the advantages of a digital attack over a physical attack are obvious: it can be implemented from a distance, it is more flexible and has greater leverage. However, there are three key drawbacks: (1) the technical expertise to hack into a site, plan an attack and design attack weapons is not easily available; (2) the PIRA's extreme concern with operational security makes it reluctant to allow outsiders close to its intelligence and planning functions; and (3) the self-image of the PIRA is rooted in glorification of physical violence and PIRA senior leaders do not understand IW and the threat to their command, control and communications systems. References