Information Terrorism: Political Violence in the Information Age

被引:10
|
作者
Devost, Matthew G. [1 ]
Houghton, Brian K. [1 ]
Pollard, Neal Allen [1 ]
机构
[1] George Washington Univ, Terrorism Studies Program, Washington, DC 20052 USA
关键词
D O I
10.1080/09546559708427387
中图分类号
D81 [国际关系];
学科分类号
030207 ;
摘要
Information warfare represents a threat to American national security and defense. There are two general methods in which a terrorist might employ an information terrorist attack: (1) when information technology (IT) is a target, and/or (2) when IT is the tool of a larger operation. The first method would target an information system for sabotage, either electronic or physical, thus destroying or disrupting the information system itself and any information infrastructure (e. g., power, communications, etc.) dependent upon it. The second would manipulate and exploit an information system, altering or stealing data, or forcing the system to perform a function for which it was not meant (such as spoofing air traffic control). A perennial dilemma of combating terrorism in a democratic society is finding the right balance between civil liberties and civil security. The special problems associated with IT are examined. The US national security establishment needs to use a flexible, integrated response to counter information terrorists - one which employs information warfare tactics tailored to counter gray-area phenomena, but which also pools resources from 'conventional' counter-terrorism and law enforcement authorities.
引用
收藏
页码:72 / 83
页数:12
相关论文
共 50 条