TITLE

"AT LIGHT SPEED": ATTRIBUTION AND RESPONSE TO CYBERCRIME/TERRORISM/WARFARE

AUTHOR(S)
Brenner, Susan W.
PUB. DATE
January 2007
SOURCE
Journal of Criminal Law & Criminology;Winter2007, Vol. 97 Issue 2, p379
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
This Article explains why and how computer technology complicates the related processes of identifying internal (crime and terrorism) and external (war) threats to social order of responding to those threats. First, it divides the process--attribution--into two categories: what-attribution (what kind of attack is this?) and who-attribution (who is responsible for this attack?). Then, it analyzes, in detail, how and why our adversaries' use of computer technology blurs the distinctions between what is now cybercrime, cyberterrorism, and cyberwarfare. The Article goes on to analyze how and why computer technology and the blurring of these distinctions erode our ability to mount an effective response to threats of either type. Finally, it explores ways in which we can modify how we currently divide responsibility for identifying and responding to the three threat categories among law enforcement and the military, respectively. The goal here is to identify, techniques we can use to improve attribution and response processes for emerging cyberthreats.
ACCESSION #
25643756

 

Related Articles

  • WHEN DID I BECOME A CRIME REPORTER? Petersen, Scot // PC Week;04/03/2000, Vol. 17 Issue 14, p29 

    Discusses the growing number of cyber-crimes being investigated by the United States Federal Bureau of Investigation. Computer-intrusion cases from 1998 to 1999; Solicitation of sex with a minor; Issue of whether posting hacking tools and source code online was a form of free speech; Web scams...

  • DIGITIZING THE FOURTH AMENDMENT: LIMITING THE PRIVATE SEARCH EXCEPTION IN COMPUTER INVESTIGATIONS. Holley, Benjamin // Virginia Law Review;May2010, Vol. 96 Issue 3, p677 

    The article discusses the importance of limiting the private search exclusion in computer investigations relative to the Fourth Amendment in the U.S. It highlights the basic information in correlation to private search exception and modern computer structure. It also reveals that individuals...

  • Introduction—Cybercrime: A Note on International Issues. Brenner, Susan W.; Schwerha IV, Joseph J. // Information Systems Frontiers;Jun2004, Vol. 6 Issue 2, p111 

    Cybercrime investigations often transcend national boundaries. This creates problems for investigators because the procedural laws that govern the conduct of criminal investigations are territorially-based; that is, they apply only within the territory of the country which promulgated those...

  • Cyber-terror could be a new and unwelcome feature of 2007, according to experts.  // SC Magazine: For IT Security Professionals (UK Edition);Jan2007, p8 

    The article considers the possible prevalence of cyber-terrorism in 2007. In late December 2006, the U.S. government issued a warning to private financial institutions that Al Qaeda was planning to ruin their databases. The idea of terrorists using the Internet as a medium for attacks is not...

  • SECURITY SKILL-BASED COURSES.  // SC Magazine: For IT Security Professionals (15476693);Feb2014 Supplement, p56 

    The article presents a summary of the SEC434 Log Management In-Depth: Compliance, Security, Forensics, and Troubleshooting two-day course offered by SANS Technology Institute which will be held on April 5-6, 2014.

  • Fighting The Electronic Crime Battle. Bryson, Curt // Information Executive;Oct2001, Vol. 5 Issue 9, p1 

    Focuses on the measures taken to counter computer crimes in the United States. Details on the statistics of computer crimes committed; List of electronic threats; Definition of computer crimes; Conduction of Internet investigations.

  • One hacker's dream. Maher, William // Australian Personal Computer;May2004, Vol. 24 Issue 5, p17 

    Five white dots on a black grid. It's not exactly an awe-inspiring sight, but it could be the world's first official emblem for computer hackers worldwide. Net geeks are already labelling sites with it, and you can find the emblem on T-shirts and coffee mugs. The image is meant to help hackers...

  • A State's Duty to Prevent and Respond to Cyberterrorist Acts. Lentz, Christopher E. // Chicago Journal of International Law;Winter2010, Vol. 10 Issue 2, p799 

    Cyberterrorism combines two of the most prominent developments of the last twenty years: the increasing reliance on the internet's infrastructure, and the threat of international terrorism committed by non-state actors. Although multilateral treaties aim to shore up some aspects of cybercrime,...

  • The World Wide Web-Miracle or Menace. Katz, Dian // Lesbian News;May2009, Vol. 34 Issue 10, p32 

    The article reflects on the positive and negative sides of the World Wide Web. The Internet was initially designed for technical groups to share information instantly with a few keystrokes. Then it evolved into something bigger over a very short span of time. People can converse with others all...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sign out of this library

Other Topics