U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Weapons of Mass Effect: Cyber-Terrorism (From Understanding Terrorism and Managing the Consequences, P 187-203, 2001, -- See NCJ-190969)

NCJ Number
190976
Author(s)
Hank T. Christen; James P. Denney; Paul M. Maniscalco
Date Published
2001
Length
17 pages
Annotation
This chapter examines use of cyber-terrorism as a weapon of mass effect.
Abstract
Information operations is a large part of America's critical infrastructure, which consists of the Nation's financial, transportation, utility, and communications systems. The public safety infrastructure includes 911, communications, computer-aided dispatch, informational databases, geo-based information systems, and electronic mail. All of these systems are based on software and electronic data systems and must be protected from intrusion and data corruption. There are no national standards for critical data protection and security. The chapter cites a need for national standards, developed by public/private partnerships, that address data storage procedures, real-time detection of running system attacks, system restoration, physical security protocols, and information technology training standards. Protection of response data and tactical information often conflicts with public records laws. For example, community right-to-know legislation requires that all citizens (including terrorists) have access to information on storage and transport of hazardous materials. The chapter recommends that the public safety community, through the legislative process, initiate a concentrated effort to protect information that makes the community vulnerable to attack. Figures, notes