Skip to main content

Currently Skimming:

Cybercrime and Cyberterrorism
Pages 97-103

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 97...
... ; disruption of the normal operations of computers or information networks; illegal seizure of information resources; illegal sale and distribution of special-purpose radioelectronic devices; forgery of documents with the help of computer technologies; distribution of unlicensed computer software; financial machinations over the Internet; and several other crimes.
From page 98...
... They also use computer viruses, including network worms, which modify or delete data or block the operation of computer systems; logic bombs, which are activated under certain conditions; or Trojan horses, which send various data from an infected computer to their "owners" over the Internet. The weapons of cybercriminals are constantly being improved, and their tools for mounting information attacks are becoming increasingly refined.
From page 99...
... Bush and the possible war against Iraq. Also in March 2003 an unknown hacker pretending to be Finnish Prime Minister Paavo Lipponen used his electronic mail address to inform the president of Russia of Finland's intention to take back Karelia, sending copies of this message to the international media and various diplomatic posts.
From page 100...
... Attacks on computer systems have become so frequent that after the widespread circulation of the LoveBug virus, the Pentagon decided to adopt a special InfoCon virus threat scale analogous to the DefCon scale for military threats or ThreatCon for terrorist threat. In the opinion of military experts, this will help to coordinate efforts in an emergency.
From page 101...
... In 2002, Russia already registered 3,371 computer information-related crimes, with more than 90 percent of these being crimes related to unauthorized access to information resources, or socalled computer break-ins. American intelligence services caught up with Levin in 1994, and he spent five years in an American prison.1 However, under Russian legislation Levin was not guilty, for at that time Russia had no laws covering computer crimes.
From page 102...
... The main tactics of cyberterrorism include ensuring that this form of cybercrime has dangerous consequences, is well known by the population, has broad public resonance, and creates an atmosphere that threatens repetition of the act without identifying a particular target. Cyberterrorism is oriented toward using various forms and methods of knocking out the information infrastructure of a state or using the information infrastructure to create a situation producing catastrophic consequences for society and the state.
From page 103...
... As a result, we can already speak of cyberterrorism as presenting a real threat of a new form of terrorist activity to individual countries and to the world community in general. Given the current growing number of acts of international terrorism, which presents a danger to people's lives and welfare, threatens the peace and security of all states, and undermines trust in the state authorities, it is vitally important to provide protection against this type of criminal activity.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.