Cyberthreats: The Emerging Fault Lines of the Nation StateAs new technologies develop, terrorist groups are developing new methods of attack by using the Internet, and by using cyberspace as a battlefield, it has become increasingly difficult to discover the identity of attackers and bring them to justice. The seemingly limitless boundaries of cyberspace has allowed virtually anyone to launch an attack from a remote and anonymous location. But once these attacks occur, it raises several important questions; who should respond, and how?; how should nation-states effectively deal with a cyber-attack?; and will the United States and other nation-states be able to survive in a world where virtual boundaries are limitless? In Cyberthreats: The Emerging Fault Lines of the Nation State Susan Brenner gives a thorough explanation of how military and law enforcement personnel respond to these attacks and why bringing cyber-terrorist to justice can be difficult and sometimes impossible. |
Other editions - View all
Common terms and phrases
ability activity Al-Qaeda armed Army artifacts of power assume attack origin attacker-attribution authority botnets century China civilian law enforcement civilian participation Congress countries create crime and terrorism criminal Cyber Storm cyberattacks cybercrime cybercriminals cyberspace cyberstrikes cyberterrorism cyberthreats cyberwar cyberwarfare cyberwarfare attacks DDoS attacks Defense ECTF effect effort entities eroding Estonian attacks external threats federal Fourth Amendment hackers hacktivism harm identify inflict InfraGard institution International Law investigators jus ad bellum launched law enforcement officers law enforcement personnel Law of War Law Review maintain internal order maintain order military force military personnel militia nation-state nation-state’s networks non-nation-state cyberwarfare operational organization Peace of Westphalia physical point of attack police Posse Comitatus Act real-world crime response processes role rules Russian saw earlier saw in Chapter scenario state-sponsored state-sponsored terrorism state’s supra target territory terrorist Thomson West U.S. Constitution United victim vigilantism warfare what-attribution Wikipedia