學術產出-Theses

Article View/Open

Publication Export

Google ScholarTM

政大圖書館

Citation Infomation

  • No doi shows Citation Infomation
題名 網路恐怖主義與美國防治政策
Cyberterrorism and the U.S. Prevention Policies
作者 黃書賢
Huang, Shu Hsien
貢獻者 姜家雄
黃書賢
Huang, Shu Hsien
關鍵詞 網路恐怖主義
美國反恐政策
網路犯罪
網路戰爭
保護關鍵基礎設施
國土安全部
網路空間安全國家戰略
Cyberterrorism
U.S. Counter-Cyberterrorism Policies
Cybercrime
Cyberwar
Critical Infrastructure Protection
日期 2011
上傳時間 30-Oct-2012 14:28:46 (UTC+8)
摘要   網路恐怖主義(Cyberterrorism)為「網際網路」(Internet)與「恐怖主義」(terrorism)相互結合之產物,指恐怖份子為求引發嚴重破壞,並造成平民死傷,透過網際網路入侵國家關鍵基礎設施(critical infrastructures),並以之要脅政府或人民完成其政治性、宗教性或社會性目標。至2012年7月為止,對於網路恐怖主義相關議題之討論雖已持續約30年之久,然而各界對於網路恐怖主義之「定義」及「威脅性」兩項基本問題,仍然眾說紛紜,無法取得一致共識,而全球各地缺乏網路恐怖攻擊之實際案例之情況,亦使爭辯益加激烈。
  在美國政府方面,經過2001年911事件的重大衝擊,其對於恐怖主義相關議題之敏感程度已大幅提高,並陸續制定多項反恐政策。美國是當前國際反恐行動的領導者,既為軍事與科技大國,同時也是諸多國際恐怖組織策劃攻擊之主要目標,有鑑於此,美國政府致力於防治網路恐怖主義,保護國內關鍵基礎設施不受侵襲,以維持社會安定及國家安全,其因應方式足以成為世界各國制定類似政策之重要參考對象。
  本論文經由探討網路恐怖主義之基本意涵,比較「網路恐怖主義」、「網路犯罪」及「網路戰爭」三個概念之間的差異,嘗試針對網路恐怖主義形成明確之界定;接著綜整各界針對網路恐怖主義威脅性之爭論,以了解網路恐怖主義之真實威脅程度;最後觀察美國自柯林頓(Clinton)政府至今,有關防治網路恐怖主義政策之一系列發展、美國政府如何評估網路恐怖主義之威脅,以及在當前的政策架構之下,為保護國內關鍵基礎設施,其相對應之具體措施為何,試圖對於其整體政策建立客觀評價。
Cyberterrorism, the convergence of “Internet” and “terrorism,” refers to the specific terrorist activities that were intended to cause massive destruction and casualties, proceeded by intruding the supervisory control and data acquisition (SCADA) systems of national critical infrastructures via the Internet. Even though the discussion of the related issues of Cyberterrorism has continued for nearly 30 years now, neither the definition nor the evaluation of potential threat concerning Cyberterrorism has been settled. No consensus has been achieved. Furthermore, the lack of actual cases of Cyberterrorism attack around the world makes the debates even more intense.
After the significant impact of September 11, 2001, the U.S. government has substantially raised the degree of sensitivity of the issues related to terrorism and developed a number of counter-terrorism policies. As the leader of the Global War on Terror and the greatest Power in the world, the U.S. is also the main target of many terrorist groups. With its military and scientific capabilities, the practices of the U.S. government on preventing Cyberterrorism, protecting its domestic critical infrastructures from intrusion, and maintaining social stability and national security would be excellent examples to other nations for the development of their own policies.
To clarify the explicit definition of Cyberterrorism, this research refined the basic meaning of Cyberterrorism and distinguished differences among three related concepts: Cyberterrorism, Cybercrime, and Cyberwar. Moreover, this research sought to induct major arguments brought up by scholars in many intense debates on the extent of Cyberterrorism threat. Last but not least, by observing development of the U.S. related policy frameworks, how the U.S. government evaluates the extent of Cyberterrorism threat, and the corresponding measures for protecting the U.S. domestic critical infrastructures, this research presented an objective assessment on the U.S. overall counter-Cyberterrorism policies.
參考文獻 中文部分
一、專書
王銘勇,《網路犯罪相關問題之研究》。臺北:司法院,2002。
方天賜、孫國祥,「民族主義與恐怖主義」,收於張亞中主編,《國際關係總論》,二版,頁193-218。臺北:揚智,2007。
李明峻,「美國國土安全部的設置與功能」,收於邱稔壤主編,《國際反恐與亞太情勢》。臺北:國立政治大學國際關係研究中心,2004,頁251-285。
李偉主編,《國際恐怖主義與反恐怖鬥爭年鑑》。北京:時事,2004。
宋興洲,「科技在恐怖主義與反恐行動中所扮演的角色」,收於姜新立、張錦隆主編,《政治與資訊的交鋒》,頁53-89。臺北:揚智,2010。
林山田,《刑事法論叢(一)》。臺北:臺灣大學法學院圖書部,1997。
林宜隆,《網際網路與犯罪問題之研究》。桃園:中央警察大學出版社,2000。
林義貴,《資訊社會與網路犯罪》。臺北:華立,2005。
邱伯浩,《恐怖主義與反恐》。臺北:新文京,2006。
吳永宗,《電腦運用所衍生法律問題之研究》。臺北:司法院,1998。
馬進保、袁廣林,《高科技犯罪研究》。北京:中國人民公安大學出版社,2008。
許武峰,《電腦犯罪理論與實務問題研究》。臺北:司法院,1998。
黃秋龍,《兩岸總體安全下的非傳統威脅》。臺北:法務部調查局展望與探索雜誌社,2010。
蔡瑋,「冷戰後的國際恐怖主義:趨勢與挑戰」,收於邱稔壤主編,《國際反恐與亞太情勢》。臺北:國立政治大學國際關係研究中心,2004,頁7-29。
蔡翠紅,《美國國家信息安全戰略》。上海:學林,2009。

二、期刊論文
彭慧鸞,「數位時代的國家安全與全球治理」,《問題與研究》,第43卷第6期(民國93年11、12月),頁29-52。

英文部分
一、專書
Bhatnagar, S., Encyclopaedia of Cyber and Computer Hacking, Vol. 1 & 5 (Delhi: Anmol Publications, 2009).
Brenner, S. W., “Cybercrime: Re-thinking Crime Control Strategies,” in Yvonne Jewkes, ed., Crime Online (Portland: Willan Publishing, 2007), pp. 12-28.
Clarke R. A., & Knake, R. K., Cyber War: The Next Threat to National Security and What to Do About It (New York: Ecco, 2010).
Colarik, A. M., Cyber Terrorism: Political and Economic Implications (Hershey, PA: Idea Group, 2006).
Cordesman A. H., & Cordesman, J. G., Cyber-threats, Information Warfare, and Critical Infrastructure Protection: Defending the U.S. Homeland (Westport, CT: Praeger, 2002).
Curran, K., Concannon, K., & McKeever, S., “Cyber Terrorism Attacks,” in Lech J. Janczewski & Andrew M. Colarik, eds., Cyber Warfare and Cyber Terrorism (Hershey, PA: Information Science Reference, 2008), pp. 1-6.
Dass, N., Globalization of Terror: A Threat to Global Economy (New Delhi: MD Publications, 2008).
Denning, D. E., “Activism, Hacktivism, and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy,” in John Arquilla & David Ronfeldt, eds., Networks and Netwars: The Future of Terror, Crime, and Militancy (Santa Monica, CA: RAND, 2001), pp. 239-288.
Finch, S., “Cyber-terrorism Poses a Serious Threat to Global Security,” in Louise I. Gerdes, ed., Cyber Crime (Farmington Hills, MI: Greenhaven Press, 2009), pp. 35-39.
Goodman, M. D., “Understanding International ‘Cyberterrorism’: A Law Enforcement Perspective,” in Cecilia S. Gal, Paul B. Kantor, & Bracha Shapira, eds., Security Informatics and Terrorism: Patrolling the Web (Washington, DC: IOS Press, 2008), pp. 8-16.
Green, J., “The Problem of Cyberterrorism is Exaggerated,” in Louise I. Gerdes, ed., Cyber Crime (Farmington Hills, MI: Greenhaven Press, 2009), pp. 40-50.
Higgins, G. E., Cybercrime: An Introduction to an Emerging Phenomenon (New York: McGraw-Hill, 2010).
Jaeger, C., “Cyberterrorism,” in Hossein Bidgoli, ed., The Internet Encyclopedia, Vol. 1 (New York: John Wiley & Sons, 2003), pp. 353-371.
________, “Cyberterrorism and Information Security,” in Hossein Bidgoli, ed., Global Perspectives in Information Security: Legal, Social, and International Issues (Hoboken, NJ: John Wiley & Sons, 2009), pp. 127-180.
Mooney, C., Online Social Networking (Farmington Hills, MI: Lucent Books, 2009).
National Research Council, Computers at Risk: Safe Computing in the Information Age (Washington, DC: National Academies Press, 1991).
Nelson, B., Choi, R., Iacobucci, M., Mitchell, M., & Gagnon, G., Cyberterror: Prospects and Implications (Monterey, CA: Center for the Study of Terrorism and Irregular Warfare, Naval Post Graduate School, 1999).
O’Brien, K. A., “Information Age Terrorism and Warfare,” in David M. Jones, ed., Globalisation and the New Terror: The Asia Pacific Dimension (Northampton, MA: Edward Elgar Publishing, 2004), pp. 127-158.
Owen, R. S., “Infrastructures of Cyber Warfare,” in Lech J. Janczewski & Andrew M. Colarik, eds., Cyber Warfare and Cyber Terrorism (Hershey, PA: Information Science Reference, 2008), pp. 35-41.
Özeren, S., “Cyberterrorism and International Cooperation: General Overview of the Available Mechanisms to Facilitate an Overwhelming Task,” in Centre of Excellence Defence Against Terrorism, Ankara, Turkey, ed., Responses to Cyber Terrorism (Washington, DC: IOS Press, 2008), pp. 70-88.
Pasley, J. F., “United States Homeland Security in the Information Age,” in Michael Pittaro, ed., Cybercrime: Current Perspectives from InfoTrac®, 2nd ed., (Belmont, CA: Wadsworth, 2010), pp. 127-135.
Portnoy M., & Goodman, S., eds., Global Initiatives to Secure Cyberspace: An Emerging Landscape (New York: Springer, 2009).
Rhodes, R., Cyber Meltdown: Bible Prophecy and the Imminent Threat of Cyberterrorism (Eugene, OR: Harvest House, 2011).
Ross, J. I., Criminal Investigations: Cybercrime (New York: Chelsea House, 2010).
Schell, B. H., & Martin, C., Cybercrime: A Reference Handbook (Santa Barbara, CA: ABC-CLIO, 2004).
Stiennon, R., Surviving Cyberwar (Lanham, MD: Government Institutes, 2010).
Sundaram, P. M. S., & Jaishankar, K., “Cyber Terrorism: Problems, Perspectives, and Prescription” in Frank Schmalleger & Michael Pittaro, eds., Crimes of the Internet (Upper Saddle River, NJ: Pearson Education, 2009), pp. 593-611.
Taylor, P. A., & Harris, J. Ll., “Hacktivism,” in Hossein Bidgoli, ed., Global Perspectives in Information Security: Legal, Social, and International Issues (Hoboken, NJ: John Wiley & Sons, 2009), pp. 295-317.
Tikk, E., & Oorn, R., “Legal and Policy Evaluation: International Coordination of Prosecution and Prevention of Cyber Terrorism,” in Centre of Excellence Defence Against Terrorism, Ankara, Turkey, ed., Responses to Cyber Terrorism (Washington, DC: IOS Press, 2008), pp. 89-103.
Weimann, G., Terror on the Internet: The New Arena, the New Challenges (Washington, DC: United States Institute of Peace, 2006).
Wilson, C., Computer Attack and Cyberterrorism (New York: Nova Science, 2009).

二、期刊論文
Brenner, S. W., “‘At Light Speed’: Attribution and Response to Cybercrime/Terrorism/Warfare,” The Journal of Criminal Law and Criminology, Vol. 97, No. 2 (Winter, 2007), pp. 379-475.
Cohen, A., “Cyberterrorism: Are We Legally Ready?” Journal of International Business & Law, Vol. IX, No. 1 (Spring 2010), pp. 1-40.
Conway, M., “What Is Cyberterrorism?” Current History, Vol. 101, No. 659 (December 2002), pp. 436-442.
Green, J., “The Myth of Cyberterrorism,” Washington Monthly, Vol. 34, No. 11 (November 2002), pp. 8-13.
Haimes, Y. Y., “Risk of Terrorism to Cyber-Physical and Organizational-Societal Infrastructures,” Public Works Management & Policy, Vol. 6, No. 4 (April 2002), pp. 231-240.
Jarmon, J., “Cyber-terrorism,” Journal on Terrorism and Security Analysis, Vol. 6 (April 2011), pp. 102-117.
Jones, A., “Cyber Terrorism: Fact or Fiction,” Computer Fraud and Security, Vol. 2005, No. 6 (June 2005), pp. 4-7.
Naím, M., “The Five Wars of Globalization,”Foreign Policy, No. 134 (January/February 2003), pp. 28-36.
Parks, C., “Cyber Terrorism: Hype or Reality?” The Journal of Corporate Accounting & Finance, Vol. 14, No. 5 (July/August 2003), pp. 9-11.
Stohl, M., “Cyber Terrorism: A Clear and Present Danger, the Sum of All Fears, Breaking Point or Patriot Games?” Crime, Law and Social Change, Vol. 46, No. 4-5 (December 2006), pp. 223-238.
Thomas, T. L., “Al Qaeda and the Internet: The Danger of ‘Cyberplanning’,” Parameters, Vol. 33, No. 1 (Spring 2003), pp. 112-123.
Weimann, G., “Cyberterrorism: The Sum of All Fears?” Studies in Conflict & Terrorism, Vol. 28, Iss. 5 (2005), pp. 129-149.

三、網路資料
“About the National Counterterrorism Center,” about_nctc.html>(Retrieved on June 28, 2012).
“About the Office of Infrastructure Protection,” structure/gc_1185203138955.shtm>(Retrieved on June 22, 2012).
“Air Force Mission,” (Retrieved on February 19, 2012).
Arquilla, J., & Ronfeldt, D., “Cyberwar is Coming!” in John Arquilla & David Ronfeldt, eds., In Athena`s Camp: Preparing for Conflict in the Information Age (Santa Monica: RAND, 1997), pp. 23-60, dam/rand/pubs/monograph_reports/MR880/MR880.ch2.pdf>(Retrieved on February 23, 2012).
“Background Note: Estonia,” (Retrieved on February 29, 2012).
Caruso, J. T., “Combating Terrorism: Protecting the United States,” before the House Subcommittee on National Security, Veterans Affairs, and International Relations, Washington, DC, March 21, 2002, testimony/combating-terrorism-protecting-the-united-states>(Retrieved on February 9, 2012).
Clark, T., “Clinton Outlines Cyberthreat Plan,” Clinton-outlines-cyberthreat-plan/2100-1023_3-211497.html>(Retrieved on February 1, 2012).
“Convention on Cybercrime,” 185.htm>(Retrieved on June 29, 2012).
“Convention on Cybercrime, CETS No.: 185,” Commun/ChercheSig.asp?NT=185&CL=ENG>(Retrieved on July 9, 2012).
Conway, M., “Cyberterrorism and Terrorist ‘Use’ of the Internet,” First Monday, Vol. 7, No. 11 (4 November 2002), index.php/fm/article/view/1001/922>(Retrieved on February 10, 2012).
“Critical Infrastructure Sector Partnerships,” partnerships/editorial_0206.shtm>(Retrieved on June 22, 2012).
“Cybercrime,” FHT02.pdf>(Retrieved on February 23, 2012).
“Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure,” documents/Cyberspace_Policy_Review_final.pdf>(Retrieved on June 30, 2012).
“Cyber Storm: Securing Cyber Space,” gc_1204738275985.shtm>(Retrieved on June 29, 2012).
“Defending America`s Cyberspace: National Plan for Information Systems Protection, Version 1.0,” (Retrieved on June 19, 2012).
Denning, D. E., “Cyberterrorism,” testimony before the Special Oversight Panel on Terrorism, Committee on Armed Services, U.S. House of Representatives, May 23, 2000, cyberterror.html>(Retrieved on June 19, 2012).
________, “Is Cyber Terror Next?” htm>(Retrieved on June 30, 2012).
“Department of Defense Dictionary of Military and Associated Terms,” p. 368, (Retrieved on June 13, 2012).
“Estonian DDoS - A Final Analysis,” Estonian-DDoS-a-final-analysis-732971.html>(Retrieved on March 1, 2012).
“Executive Order 13010, EO 13010: Critical Infrastructure Protection, July 15, 1996,”(Retrieved on June 17, 2012).
“Executive Order 13231 of October 16, 2001: Critical Infrastructure Protection in the Information Age,” (Retrieved on June 19, 2012).
“Executive Order 13354 of August 27, 2004: National Counterterrorism Center,” (Retrieved on June 28, 2012).
Greenwald, G., “Mike McConnell, the WashPost & the Dangers of Sleazy Corporatism,” (Retrieved on May 29, 2012).
Gross, G., “U.S. Cyber War Policy Needs New Focus, Experts Say,” pcworld.com/article/174711/us_cyber_war_policy_needs_new_focus_experts_say.html>(Retrieved on June 14, 2012).
“Highlights of the USA PATRIOT Act,” highlights.htm>(Retrieved on June 20, 2012).
Hildreth, S. A., “Cyberwarfare,” CRS Report for Congress, crs/RL30735.pdf>(Retrieved on February 20, 2012).
“Homeland Security Presidential Directive 7: Critical Infrastructure Identification, Prioritization, and Protection, December 17, 2003,” xabout/laws/gc_1214597989952.shtm#1>(Retrieved on June 28, 2012).
Kaplan, E., “Terrorists and the Internet,” terrorism-and-technology/terrorists-internet/p10005#p6>(Retrieved on January 31, 2012).
Kirk, J., “Estonia Recovers from Massive DDoS Attack,” computerworld.com/s/article/9019725/Estonia_recovers_from_massive_DDoS_attack>(Retrieved on March 3, 2012).
Krasnowski, M., “Two Men Accused of Hacking into Traffic System,” utsandiego.com/uniontrib/20070121/news_1n21traffic.html>(Retrieved on July 4, 2012).
Lawson, S., “Beyond Cyber-Doom: Cyberattack Scenarios and the Evidence of History,” beyond-cyber-doom-cyber-attack-scenarios-evidence-history_1.pdf>(Retrieved on May 29, 2012).
Lemos, R., “What are the Real Risks of Cyberterrorism?” news/what-are-the-real-risks-of-cyberterrorism/124765>(Retrieved on May 28, 2012).
Lewis, J. A., “Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats,” report submitted to the Center for Strategic and International Studies, CSIS, Washington, DC, 021101_risks_of_cyberterror.pdf>(Retrieved on February 9, 2012).
________, “Thresholds for Cyberwar,” report submitted to the Center for Strategic and International Studies, CSIS, Washington, DC, publication/101001_ieee_insert.pdf>(Retrieved on February 29, 2012).
Leyden, J., “Estonia Fines Man for DDoS Attacks: Local Pest rather than International Conspiracy,” estonian_ddos_fine/>(Retrieved on June 18, 2012).
Maynor D., & Graham, R., “SCADA Security and Terrorism: We’re Not Crying Wolf,” BH-Fed-06-Maynor-Graham-up.pdf>(Retrieved on June 13, 2012).
Moteff, J. D., “Critical Infrastructures: Background, Policy, and Implementation,” CRS report for Congress, pdf>(Retrieved on June 30, 2012).
Mueller, R. S., III, “Global Threats to the U.S. and the FBI’s Response,” testimony before the Senate Committee on Intelligence of the United States Senate, February 16, 2005, global-threats-to-the-u.s.-and-the-fbis-response-1>(Retrieved on June 4, 2012).
“National Cyber Security Division,” editorial_0839.shtm>(Retrieved on June 21, 2012).
“National Infrastructure Coordinating Center,” gc_1236629756359.shtm>(Retrieved on June 21, 2012).
“National Infrastructure Protection Plan,” editorial_0827.shtm#0>(Retrieved on June 28, 2012).
“National Infrastructure Protection Plan: Partnering to Enhance Protection and Resiliency, 2009,” (Retrieved on June 28, 2012).
“National Strategy for the Physical Protection of Critical Infrastructure and Key Assets,” (Retrieved on June 27, 2012).
“National Strategy to Secure Cyberspace,” cyberspace_strategy.pdf>(Retrieved on June 27, 2012).
“National Threat Assessment Center,” (Retrieved on July 1, 2012).
“Newsline - May 3, 2007,” (Retrieved on March 1, 2012).
O’Hara, T. F., “Cyber Warfare/Cyber Terrorism,” GetTRDoc?AD=ADA424310>(Retrieved on February 1, 2012).
“Past Events,” (Retrieved on March 1, 2012).
Pollitt, M. M., “Cyberterrorism: Fact or Fancy?” ~denning/infosec/pollitt.html>(Retrieved on June 19, 2012).
“President Decision Directives 39: U.S. Policy on Counterterrorism,” fas.org/irp/offdocs/pdd39.htm>(Retrieved on June 17, 2012).
“President Decision Directives 62: Combating Terrorism,” offdocs/pdd-62.htm>(Retrieved on June 17, 2012).
“President Decision Directives 63: Critical Infrastructure Protection,” fas.org/irp/offdocs/pdd/pdd-63.htm>(Retrieved on June 17, 2012).
Presidential Commission on Critical Infrastructure Protection, “Critical Foundations: Protecting America’s Infrastructures,” pdf>(Retrieved on June 7, 2012).
“Presidential Proclamation - Critical Infrastructure Protection Month,” whitehouse.gov/the-press-office/
presidential-proclamation-critical-infrastructure-protection-month>(Retrieved on June 30, 2012).
“Presidential Proclamation--Critical Infrastructure Protection Month: Critical Infrastructure Protection Month, 2010,” the-press-office/2010/11/30/
presidential-proclamation-critical-infrastructure-protection-month>(Retrieved on June 30, 2012).
“Presidential Proclamation -- Critical Infrastructure Protection Month, 2011,” presidential-proclamation-critical-infrastructure-protection-month-2011>(Retrieved on June 30, 2012).
“Presidential Security Directive 1: Organizing for Homeland Security and Counterterrorism,” (Retrieved on June 30, 2012).
“Public Law 107-296, Homeland Security Act of 2002,” xlibrary/assets/hr_5005_enr.pdf>(Retrieved on June 21, 2012).
“Public Law 107-305, Cyber Security Research and Development Act,” (Retrieved on June 20, 2012).
“Public Law 108-458, Intelligence Reform and Terrorism Prevention Act of 2004,” (Retrieved on June 28, 2012).
“Report of the President of the United States on the Status of Federal Critical Infrastructure Protection Activities,” CIP_2001_CongRept.pdf>(Retrieved on June 19, 2012).
Robichaux, P., “Distributed Denial-of-Service Attacks and You,” microsoft.com/en-us/library/cc722931.aspx>(Retrieved on June 26, 2012).
Rollins, J., & Wilson, C., “Terrorist Capabilities for Cyberattack: Overview and Policy Issues,” CRS Report for Congress, RL33123.pdf>(Retrieved on July 1, 2012).
Sanger, D. E., “Obama Order Sped Up Wave of Cyberattacks Against Iran,” obama-ordered-wave-of-cyberattacks-against-iran.html?pagewanted=all>(Retrieved on July 4, 2012).
Schmidt, E. E., “The Evolution of U.S. Policies against Terrorism,” thepresidency.org/storage/documents/Fellows2008/Schmidt.pdf>(Retrieved on June 20, 2012).
Shea, D. A., “Critical Infrastructure: Control Systems and the Terrorist Threat,” CRS Report for Congress, (Retrieved on June 7, 2012).
Singh, A. Kr., & Siddiqui, A. T., “New Face of Terror: Cyber Threats, Emails Containing Viruses,” Asian Journal of Technology & Management Research, Vol. 1, Iss. 1 (January - June 2011), CyberTerror.pdf>(Retrieved on July 5, 2012).
Snow, G. M., “Cybersecurity: Responding to the Threat of Cyber Crime and Terrorism,” statement before the Senate Judiciary Committee, Subcommittee on Crime and Terrorism, Washington, DC, April 12, 2011, gov/news/testimony/cybersecurity-responding-to-the-threat-of-cyber-crime-and-terrorism>(Retrieved on June 4, 2012).
Sofaer A. D., Goodman, S. E., Cuéllar, M., Drozdova, E. A., Elliott, D. D., Grove, G. D., Lukasik, S. J., Putnam, T. L., & Wilson, G. D., “A Proposal for an International Convention on Cyber Crime and Terrorism,” CISAC Report, August 2000, (Retrieved on February 12, 2012).
“Supernatural Horror in Literature by H. P. Lovecraft,” com/writings/texts/essays/shil.asp>(Retrieved on June 14, 2012).
“Synopsis for ‘Live Free or Die Hard’,” synopsis>(Retrieved on June 14, 2012).
“Terrorism 2002-2005,” p. iv, terrorism-2002-2005/terror02_05.pdf>(Retrieved on June 18, 2012).
“Terrorism FAQs,” cia-the-war-on-terrorism/terrorism-faqs.html>(Retrieved on June 18, 2012).
“The Sector-Specific Plans,” gc_1179866197607.shtm#2>(Retrieved on June 28, 2012).
“The World Factbook,” the-world-factbook/geos/en.html>(Retrieved on February 29, 2012).
Trevelyan, M., “Security Experts Split on ‘Cyberterrorism’ Threat,” reuters.com/article/2008/04/16/us-security-cyberspace-idUSL1692021220080416>(Retrieved on June 1, 2012).
“United Nations Security Council Resolution 1566, October 2004,” 1566%20(2004)&Lang=E&Area=UNDOC>(Retrieved on June 18, 2012).
“USA PATRIOT Act (H.R. 3162),” (Retrieved on June 20, 2012).
“U.S. Code Title 22, Ch. 38, Sec. 2656f,” USCODE-2011-title22/pdf/USCODE-2011-title22-chap38-sec2656f.pdf>(Retrieved on July 10, 2012).
U.S. Secret Service, & Carnegie Mellon Software Engineering Institute, “Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors,” (Retrieved on July 1, 2012).
U.S. Secret Service, & Carnegie Mellon Software Engineering Institute, “Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector,” (Retrieved on July 1, 2012).
U.S. Secret Service, & Carnegie Mellon Software Engineering Institute, “Insider Threat Study: Illicit Cyber Activity in the Government Sector,” secretservice.gov/ntac/final_government_sector2008_0109.pdf>(Retrieved on July 1, 2012).
U.S. Secret Service, & Carnegie Mellon Software Engineering Institute, “Insider Threat Study: Illicit Cyber Activity in the Information Technology and Telecommunications Sector,” final_it_sector_2008_0109.pdf>(Retrieved on July 1, 2012).
Vandiver, S., “Critical Infrastructure is Society`s Glue,” WINTER2010/ihs_articles_column.php>(Retrieved on June 20, 2012).
Walt, S. M., “Is the Cyber Threat Overblown?” posts/2010/03/30/is_the_cyber_threat_overblown>(Retrieved on May 29, 2012).
“WarGames,” (Retrieved on June 17, 2012).
Weimann, G., “Cyberterrorism: How Real is the Threat?” files/resources/sr119.pdf>(Retrieved on June 30, 2012).
________, “How Modern Terrorism Uses the Internet,” The Journal of International Security Affairs, No. 8 (Spring 2005), 2005/08/weimann.php>(Retrieved on February 23, 2012).
Wilson, C., “Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress,” CRS Report for Congress, crs/terror/RL32114.pdf>(Retrieved on February 19, 2012).
描述 碩士
國立政治大學
外交研究所
98253027
100
資料來源 http://thesis.lib.nccu.edu.tw/record/#G0098253027
資料類型 thesis
dc.contributor.advisor 姜家雄zh_TW
dc.contributor.author (Authors) 黃書賢zh_TW
dc.contributor.author (Authors) Huang, Shu Hsienen_US
dc.creator (作者) 黃書賢zh_TW
dc.creator (作者) Huang, Shu Hsienen_US
dc.date (日期) 2011en_US
dc.date.accessioned 30-Oct-2012 14:28:46 (UTC+8)-
dc.date.available 30-Oct-2012 14:28:46 (UTC+8)-
dc.date.issued (上傳時間) 30-Oct-2012 14:28:46 (UTC+8)-
dc.identifier (Other Identifiers) G0098253027en_US
dc.identifier.uri (URI) http://nccur.lib.nccu.edu.tw/handle/140.119/54971-
dc.description (描述) 碩士zh_TW
dc.description (描述) 國立政治大學zh_TW
dc.description (描述) 外交研究所zh_TW
dc.description (描述) 98253027zh_TW
dc.description (描述) 100zh_TW
dc.description.abstract (摘要)   網路恐怖主義(Cyberterrorism)為「網際網路」(Internet)與「恐怖主義」(terrorism)相互結合之產物,指恐怖份子為求引發嚴重破壞,並造成平民死傷,透過網際網路入侵國家關鍵基礎設施(critical infrastructures),並以之要脅政府或人民完成其政治性、宗教性或社會性目標。至2012年7月為止,對於網路恐怖主義相關議題之討論雖已持續約30年之久,然而各界對於網路恐怖主義之「定義」及「威脅性」兩項基本問題,仍然眾說紛紜,無法取得一致共識,而全球各地缺乏網路恐怖攻擊之實際案例之情況,亦使爭辯益加激烈。
  在美國政府方面,經過2001年911事件的重大衝擊,其對於恐怖主義相關議題之敏感程度已大幅提高,並陸續制定多項反恐政策。美國是當前國際反恐行動的領導者,既為軍事與科技大國,同時也是諸多國際恐怖組織策劃攻擊之主要目標,有鑑於此,美國政府致力於防治網路恐怖主義,保護國內關鍵基礎設施不受侵襲,以維持社會安定及國家安全,其因應方式足以成為世界各國制定類似政策之重要參考對象。
  本論文經由探討網路恐怖主義之基本意涵,比較「網路恐怖主義」、「網路犯罪」及「網路戰爭」三個概念之間的差異,嘗試針對網路恐怖主義形成明確之界定;接著綜整各界針對網路恐怖主義威脅性之爭論,以了解網路恐怖主義之真實威脅程度;最後觀察美國自柯林頓(Clinton)政府至今,有關防治網路恐怖主義政策之一系列發展、美國政府如何評估網路恐怖主義之威脅,以及在當前的政策架構之下,為保護國內關鍵基礎設施,其相對應之具體措施為何,試圖對於其整體政策建立客觀評價。
zh_TW
dc.description.abstract (摘要) Cyberterrorism, the convergence of “Internet” and “terrorism,” refers to the specific terrorist activities that were intended to cause massive destruction and casualties, proceeded by intruding the supervisory control and data acquisition (SCADA) systems of national critical infrastructures via the Internet. Even though the discussion of the related issues of Cyberterrorism has continued for nearly 30 years now, neither the definition nor the evaluation of potential threat concerning Cyberterrorism has been settled. No consensus has been achieved. Furthermore, the lack of actual cases of Cyberterrorism attack around the world makes the debates even more intense.
After the significant impact of September 11, 2001, the U.S. government has substantially raised the degree of sensitivity of the issues related to terrorism and developed a number of counter-terrorism policies. As the leader of the Global War on Terror and the greatest Power in the world, the U.S. is also the main target of many terrorist groups. With its military and scientific capabilities, the practices of the U.S. government on preventing Cyberterrorism, protecting its domestic critical infrastructures from intrusion, and maintaining social stability and national security would be excellent examples to other nations for the development of their own policies.
To clarify the explicit definition of Cyberterrorism, this research refined the basic meaning of Cyberterrorism and distinguished differences among three related concepts: Cyberterrorism, Cybercrime, and Cyberwar. Moreover, this research sought to induct major arguments brought up by scholars in many intense debates on the extent of Cyberterrorism threat. Last but not least, by observing development of the U.S. related policy frameworks, how the U.S. government evaluates the extent of Cyberterrorism threat, and the corresponding measures for protecting the U.S. domestic critical infrastructures, this research presented an objective assessment on the U.S. overall counter-Cyberterrorism policies.
en_US
dc.description.tableofcontents 國立政治大學博碩士論文全文上網授權書 I
研究生論文文責自負聲明書 III
論文考試委員簽名頁 V
謝辭 VII
中文摘要 IX
Abstract XI
第一章 緒論 1
第一節 研究緣起 2
第二節 文獻回顧 7
第三節 問題意識 17
第四節 研究方法與研究範圍 18
第五節 章節安排 19
第二章 網路恐怖主義之界定 21
第一節 網路恐怖主義之定義 21
第二節 與網路犯罪及網路戰爭之比較 36
第三節 愛沙尼亞遭受網路攻擊案例(2007年4月) 49
第三章 網路恐怖主義威脅之爭辯 57
第一節 網路恐怖主義並非嚴重威脅之主張 59
第二節 網路恐怖主義確為嚴重威脅之主張 70
第三節 網路恐怖主義威脅之爭議與評價 80
第四章 美國防治網路恐怖主義政策 87
第一節 911事件之前的防治政策 88
第二節 911事件至頒布「網路空間安全國家戰略」之前的防治政策 94
第三節 頒布「網路空間安全國家戰略」至2012年7月的防治政策 103
第五章 結論與展望 121
第一節 研究發現 121
第二節 研究限制與未來展望 127
參考文獻 131
zh_TW
dc.language.iso en_US-
dc.source.uri (資料來源) http://thesis.lib.nccu.edu.tw/record/#G0098253027en_US
dc.subject (關鍵詞) 網路恐怖主義zh_TW
dc.subject (關鍵詞) 美國反恐政策zh_TW
dc.subject (關鍵詞) 網路犯罪zh_TW
dc.subject (關鍵詞) 網路戰爭zh_TW
dc.subject (關鍵詞) 保護關鍵基礎設施zh_TW
dc.subject (關鍵詞) 國土安全部zh_TW
dc.subject (關鍵詞) 網路空間安全國家戰略zh_TW
dc.subject (關鍵詞) Cyberterrorismen_US
dc.subject (關鍵詞) U.S. Counter-Cyberterrorism Policiesen_US
dc.subject (關鍵詞) Cybercrimeen_US
dc.subject (關鍵詞) Cyberwaren_US
dc.subject (關鍵詞) Critical Infrastructure Protectionen_US
dc.title (題名) 網路恐怖主義與美國防治政策zh_TW
dc.title (題名) Cyberterrorism and the U.S. Prevention Policiesen_US
dc.type (資料類型) thesisen
dc.relation.reference (參考文獻) 中文部分
一、專書
王銘勇,《網路犯罪相關問題之研究》。臺北:司法院,2002。
方天賜、孫國祥,「民族主義與恐怖主義」,收於張亞中主編,《國際關係總論》,二版,頁193-218。臺北:揚智,2007。
李明峻,「美國國土安全部的設置與功能」,收於邱稔壤主編,《國際反恐與亞太情勢》。臺北:國立政治大學國際關係研究中心,2004,頁251-285。
李偉主編,《國際恐怖主義與反恐怖鬥爭年鑑》。北京:時事,2004。
宋興洲,「科技在恐怖主義與反恐行動中所扮演的角色」,收於姜新立、張錦隆主編,《政治與資訊的交鋒》,頁53-89。臺北:揚智,2010。
林山田,《刑事法論叢(一)》。臺北:臺灣大學法學院圖書部,1997。
林宜隆,《網際網路與犯罪問題之研究》。桃園:中央警察大學出版社,2000。
林義貴,《資訊社會與網路犯罪》。臺北:華立,2005。
邱伯浩,《恐怖主義與反恐》。臺北:新文京,2006。
吳永宗,《電腦運用所衍生法律問題之研究》。臺北:司法院,1998。
馬進保、袁廣林,《高科技犯罪研究》。北京:中國人民公安大學出版社,2008。
許武峰,《電腦犯罪理論與實務問題研究》。臺北:司法院,1998。
黃秋龍,《兩岸總體安全下的非傳統威脅》。臺北:法務部調查局展望與探索雜誌社,2010。
蔡瑋,「冷戰後的國際恐怖主義:趨勢與挑戰」,收於邱稔壤主編,《國際反恐與亞太情勢》。臺北:國立政治大學國際關係研究中心,2004,頁7-29。
蔡翠紅,《美國國家信息安全戰略》。上海:學林,2009。

二、期刊論文
彭慧鸞,「數位時代的國家安全與全球治理」,《問題與研究》,第43卷第6期(民國93年11、12月),頁29-52。

英文部分
一、專書
Bhatnagar, S., Encyclopaedia of Cyber and Computer Hacking, Vol. 1 & 5 (Delhi: Anmol Publications, 2009).
Brenner, S. W., “Cybercrime: Re-thinking Crime Control Strategies,” in Yvonne Jewkes, ed., Crime Online (Portland: Willan Publishing, 2007), pp. 12-28.
Clarke R. A., & Knake, R. K., Cyber War: The Next Threat to National Security and What to Do About It (New York: Ecco, 2010).
Colarik, A. M., Cyber Terrorism: Political and Economic Implications (Hershey, PA: Idea Group, 2006).
Cordesman A. H., & Cordesman, J. G., Cyber-threats, Information Warfare, and Critical Infrastructure Protection: Defending the U.S. Homeland (Westport, CT: Praeger, 2002).
Curran, K., Concannon, K., & McKeever, S., “Cyber Terrorism Attacks,” in Lech J. Janczewski & Andrew M. Colarik, eds., Cyber Warfare and Cyber Terrorism (Hershey, PA: Information Science Reference, 2008), pp. 1-6.
Dass, N., Globalization of Terror: A Threat to Global Economy (New Delhi: MD Publications, 2008).
Denning, D. E., “Activism, Hacktivism, and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy,” in John Arquilla & David Ronfeldt, eds., Networks and Netwars: The Future of Terror, Crime, and Militancy (Santa Monica, CA: RAND, 2001), pp. 239-288.
Finch, S., “Cyber-terrorism Poses a Serious Threat to Global Security,” in Louise I. Gerdes, ed., Cyber Crime (Farmington Hills, MI: Greenhaven Press, 2009), pp. 35-39.
Goodman, M. D., “Understanding International ‘Cyberterrorism’: A Law Enforcement Perspective,” in Cecilia S. Gal, Paul B. Kantor, & Bracha Shapira, eds., Security Informatics and Terrorism: Patrolling the Web (Washington, DC: IOS Press, 2008), pp. 8-16.
Green, J., “The Problem of Cyberterrorism is Exaggerated,” in Louise I. Gerdes, ed., Cyber Crime (Farmington Hills, MI: Greenhaven Press, 2009), pp. 40-50.
Higgins, G. E., Cybercrime: An Introduction to an Emerging Phenomenon (New York: McGraw-Hill, 2010).
Jaeger, C., “Cyberterrorism,” in Hossein Bidgoli, ed., The Internet Encyclopedia, Vol. 1 (New York: John Wiley & Sons, 2003), pp. 353-371.
________, “Cyberterrorism and Information Security,” in Hossein Bidgoli, ed., Global Perspectives in Information Security: Legal, Social, and International Issues (Hoboken, NJ: John Wiley & Sons, 2009), pp. 127-180.
Mooney, C., Online Social Networking (Farmington Hills, MI: Lucent Books, 2009).
National Research Council, Computers at Risk: Safe Computing in the Information Age (Washington, DC: National Academies Press, 1991).
Nelson, B., Choi, R., Iacobucci, M., Mitchell, M., & Gagnon, G., Cyberterror: Prospects and Implications (Monterey, CA: Center for the Study of Terrorism and Irregular Warfare, Naval Post Graduate School, 1999).
O’Brien, K. A., “Information Age Terrorism and Warfare,” in David M. Jones, ed., Globalisation and the New Terror: The Asia Pacific Dimension (Northampton, MA: Edward Elgar Publishing, 2004), pp. 127-158.
Owen, R. S., “Infrastructures of Cyber Warfare,” in Lech J. Janczewski & Andrew M. Colarik, eds., Cyber Warfare and Cyber Terrorism (Hershey, PA: Information Science Reference, 2008), pp. 35-41.
Özeren, S., “Cyberterrorism and International Cooperation: General Overview of the Available Mechanisms to Facilitate an Overwhelming Task,” in Centre of Excellence Defence Against Terrorism, Ankara, Turkey, ed., Responses to Cyber Terrorism (Washington, DC: IOS Press, 2008), pp. 70-88.
Pasley, J. F., “United States Homeland Security in the Information Age,” in Michael Pittaro, ed., Cybercrime: Current Perspectives from InfoTrac®, 2nd ed., (Belmont, CA: Wadsworth, 2010), pp. 127-135.
Portnoy M., & Goodman, S., eds., Global Initiatives to Secure Cyberspace: An Emerging Landscape (New York: Springer, 2009).
Rhodes, R., Cyber Meltdown: Bible Prophecy and the Imminent Threat of Cyberterrorism (Eugene, OR: Harvest House, 2011).
Ross, J. I., Criminal Investigations: Cybercrime (New York: Chelsea House, 2010).
Schell, B. H., & Martin, C., Cybercrime: A Reference Handbook (Santa Barbara, CA: ABC-CLIO, 2004).
Stiennon, R., Surviving Cyberwar (Lanham, MD: Government Institutes, 2010).
Sundaram, P. M. S., & Jaishankar, K., “Cyber Terrorism: Problems, Perspectives, and Prescription” in Frank Schmalleger & Michael Pittaro, eds., Crimes of the Internet (Upper Saddle River, NJ: Pearson Education, 2009), pp. 593-611.
Taylor, P. A., & Harris, J. Ll., “Hacktivism,” in Hossein Bidgoli, ed., Global Perspectives in Information Security: Legal, Social, and International Issues (Hoboken, NJ: John Wiley & Sons, 2009), pp. 295-317.
Tikk, E., & Oorn, R., “Legal and Policy Evaluation: International Coordination of Prosecution and Prevention of Cyber Terrorism,” in Centre of Excellence Defence Against Terrorism, Ankara, Turkey, ed., Responses to Cyber Terrorism (Washington, DC: IOS Press, 2008), pp. 89-103.
Weimann, G., Terror on the Internet: The New Arena, the New Challenges (Washington, DC: United States Institute of Peace, 2006).
Wilson, C., Computer Attack and Cyberterrorism (New York: Nova Science, 2009).

二、期刊論文
Brenner, S. W., “‘At Light Speed’: Attribution and Response to Cybercrime/Terrorism/Warfare,” The Journal of Criminal Law and Criminology, Vol. 97, No. 2 (Winter, 2007), pp. 379-475.
Cohen, A., “Cyberterrorism: Are We Legally Ready?” Journal of International Business & Law, Vol. IX, No. 1 (Spring 2010), pp. 1-40.
Conway, M., “What Is Cyberterrorism?” Current History, Vol. 101, No. 659 (December 2002), pp. 436-442.
Green, J., “The Myth of Cyberterrorism,” Washington Monthly, Vol. 34, No. 11 (November 2002), pp. 8-13.
Haimes, Y. Y., “Risk of Terrorism to Cyber-Physical and Organizational-Societal Infrastructures,” Public Works Management & Policy, Vol. 6, No. 4 (April 2002), pp. 231-240.
Jarmon, J., “Cyber-terrorism,” Journal on Terrorism and Security Analysis, Vol. 6 (April 2011), pp. 102-117.
Jones, A., “Cyber Terrorism: Fact or Fiction,” Computer Fraud and Security, Vol. 2005, No. 6 (June 2005), pp. 4-7.
Naím, M., “The Five Wars of Globalization,”Foreign Policy, No. 134 (January/February 2003), pp. 28-36.
Parks, C., “Cyber Terrorism: Hype or Reality?” The Journal of Corporate Accounting & Finance, Vol. 14, No. 5 (July/August 2003), pp. 9-11.
Stohl, M., “Cyber Terrorism: A Clear and Present Danger, the Sum of All Fears, Breaking Point or Patriot Games?” Crime, Law and Social Change, Vol. 46, No. 4-5 (December 2006), pp. 223-238.
Thomas, T. L., “Al Qaeda and the Internet: The Danger of ‘Cyberplanning’,” Parameters, Vol. 33, No. 1 (Spring 2003), pp. 112-123.
Weimann, G., “Cyberterrorism: The Sum of All Fears?” Studies in Conflict & Terrorism, Vol. 28, Iss. 5 (2005), pp. 129-149.

三、網路資料
“About the National Counterterrorism Center,” about_nctc.html>(Retrieved on June 28, 2012).
“About the Office of Infrastructure Protection,” structure/gc_1185203138955.shtm>(Retrieved on June 22, 2012).
“Air Force Mission,” (Retrieved on February 19, 2012).
Arquilla, J., & Ronfeldt, D., “Cyberwar is Coming!” in John Arquilla & David Ronfeldt, eds., In Athena`s Camp: Preparing for Conflict in the Information Age (Santa Monica: RAND, 1997), pp. 23-60, dam/rand/pubs/monograph_reports/MR880/MR880.ch2.pdf>(Retrieved on February 23, 2012).
“Background Note: Estonia,” (Retrieved on February 29, 2012).
Caruso, J. T., “Combating Terrorism: Protecting the United States,” before the House Subcommittee on National Security, Veterans Affairs, and International Relations, Washington, DC, March 21, 2002, testimony/combating-terrorism-protecting-the-united-states>(Retrieved on February 9, 2012).
Clark, T., “Clinton Outlines Cyberthreat Plan,” Clinton-outlines-cyberthreat-plan/2100-1023_3-211497.html>(Retrieved on February 1, 2012).
“Convention on Cybercrime,” 185.htm>(Retrieved on June 29, 2012).
“Convention on Cybercrime, CETS No.: 185,” Commun/ChercheSig.asp?NT=185&CL=ENG>(Retrieved on July 9, 2012).
Conway, M., “Cyberterrorism and Terrorist ‘Use’ of the Internet,” First Monday, Vol. 7, No. 11 (4 November 2002), index.php/fm/article/view/1001/922>(Retrieved on February 10, 2012).
“Critical Infrastructure Sector Partnerships,” partnerships/editorial_0206.shtm>(Retrieved on June 22, 2012).
“Cybercrime,” FHT02.pdf>(Retrieved on February 23, 2012).
“Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure,” documents/Cyberspace_Policy_Review_final.pdf>(Retrieved on June 30, 2012).
“Cyber Storm: Securing Cyber Space,” gc_1204738275985.shtm>(Retrieved on June 29, 2012).
“Defending America`s Cyberspace: National Plan for Information Systems Protection, Version 1.0,” (Retrieved on June 19, 2012).
Denning, D. E., “Cyberterrorism,” testimony before the Special Oversight Panel on Terrorism, Committee on Armed Services, U.S. House of Representatives, May 23, 2000, cyberterror.html>(Retrieved on June 19, 2012).
________, “Is Cyber Terror Next?” htm>(Retrieved on June 30, 2012).
“Department of Defense Dictionary of Military and Associated Terms,” p. 368, (Retrieved on June 13, 2012).
“Estonian DDoS - A Final Analysis,” Estonian-DDoS-a-final-analysis-732971.html>(Retrieved on March 1, 2012).
“Executive Order 13010, EO 13010: Critical Infrastructure Protection, July 15, 1996,”(Retrieved on June 17, 2012).
“Executive Order 13231 of October 16, 2001: Critical Infrastructure Protection in the Information Age,” (Retrieved on June 19, 2012).
“Executive Order 13354 of August 27, 2004: National Counterterrorism Center,” (Retrieved on June 28, 2012).
Greenwald, G., “Mike McConnell, the WashPost & the Dangers of Sleazy Corporatism,” (Retrieved on May 29, 2012).
Gross, G., “U.S. Cyber War Policy Needs New Focus, Experts Say,” pcworld.com/article/174711/us_cyber_war_policy_needs_new_focus_experts_say.html>(Retrieved on June 14, 2012).
“Highlights of the USA PATRIOT Act,” highlights.htm>(Retrieved on June 20, 2012).
Hildreth, S. A., “Cyberwarfare,” CRS Report for Congress, crs/RL30735.pdf>(Retrieved on February 20, 2012).
“Homeland Security Presidential Directive 7: Critical Infrastructure Identification, Prioritization, and Protection, December 17, 2003,” xabout/laws/gc_1214597989952.shtm#1>(Retrieved on June 28, 2012).
Kaplan, E., “Terrorists and the Internet,” terrorism-and-technology/terrorists-internet/p10005#p6>(Retrieved on January 31, 2012).
Kirk, J., “Estonia Recovers from Massive DDoS Attack,” computerworld.com/s/article/9019725/Estonia_recovers_from_massive_DDoS_attack>(Retrieved on March 3, 2012).
Krasnowski, M., “Two Men Accused of Hacking into Traffic System,” utsandiego.com/uniontrib/20070121/news_1n21traffic.html>(Retrieved on July 4, 2012).
Lawson, S., “Beyond Cyber-Doom: Cyberattack Scenarios and the Evidence of History,” beyond-cyber-doom-cyber-attack-scenarios-evidence-history_1.pdf>(Retrieved on May 29, 2012).
Lemos, R., “What are the Real Risks of Cyberterrorism?” news/what-are-the-real-risks-of-cyberterrorism/124765>(Retrieved on May 28, 2012).
Lewis, J. A., “Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats,” report submitted to the Center for Strategic and International Studies, CSIS, Washington, DC, 021101_risks_of_cyberterror.pdf>(Retrieved on February 9, 2012).
________, “Thresholds for Cyberwar,” report submitted to the Center for Strategic and International Studies, CSIS, Washington, DC, publication/101001_ieee_insert.pdf>(Retrieved on February 29, 2012).
Leyden, J., “Estonia Fines Man for DDoS Attacks: Local Pest rather than International Conspiracy,” estonian_ddos_fine/>(Retrieved on June 18, 2012).
Maynor D., & Graham, R., “SCADA Security and Terrorism: We’re Not Crying Wolf,” BH-Fed-06-Maynor-Graham-up.pdf>(Retrieved on June 13, 2012).
Moteff, J. D., “Critical Infrastructures: Background, Policy, and Implementation,” CRS report for Congress, pdf>(Retrieved on June 30, 2012).
Mueller, R. S., III, “Global Threats to the U.S. and the FBI’s Response,” testimony before the Senate Committee on Intelligence of the United States Senate, February 16, 2005, global-threats-to-the-u.s.-and-the-fbis-response-1>(Retrieved on June 4, 2012).
“National Cyber Security Division,” editorial_0839.shtm>(Retrieved on June 21, 2012).
“National Infrastructure Coordinating Center,” gc_1236629756359.shtm>(Retrieved on June 21, 2012).
“National Infrastructure Protection Plan,” editorial_0827.shtm#0>(Retrieved on June 28, 2012).
“National Infrastructure Protection Plan: Partnering to Enhance Protection and Resiliency, 2009,” (Retrieved on June 28, 2012).
“National Strategy for the Physical Protection of Critical Infrastructure and Key Assets,” (Retrieved on June 27, 2012).
“National Strategy to Secure Cyberspace,” cyberspace_strategy.pdf>(Retrieved on June 27, 2012).
“National Threat Assessment Center,” (Retrieved on July 1, 2012).
“Newsline - May 3, 2007,” (Retrieved on March 1, 2012).
O’Hara, T. F., “Cyber Warfare/Cyber Terrorism,” GetTRDoc?AD=ADA424310>(Retrieved on February 1, 2012).
“Past Events,” (Retrieved on March 1, 2012).
Pollitt, M. M., “Cyberterrorism: Fact or Fancy?” ~denning/infosec/pollitt.html>(Retrieved on June 19, 2012).
“President Decision Directives 39: U.S. Policy on Counterterrorism,” fas.org/irp/offdocs/pdd39.htm>(Retrieved on June 17, 2012).
“President Decision Directives 62: Combating Terrorism,” offdocs/pdd-62.htm>(Retrieved on June 17, 2012).
“President Decision Directives 63: Critical Infrastructure Protection,” fas.org/irp/offdocs/pdd/pdd-63.htm>(Retrieved on June 17, 2012).
Presidential Commission on Critical Infrastructure Protection, “Critical Foundations: Protecting America’s Infrastructures,” pdf>(Retrieved on June 7, 2012).
“Presidential Proclamation - Critical Infrastructure Protection Month,” whitehouse.gov/the-press-office/
presidential-proclamation-critical-infrastructure-protection-month>(Retrieved on June 30, 2012).
“Presidential Proclamation--Critical Infrastructure Protection Month: Critical Infrastructure Protection Month, 2010,” the-press-office/2010/11/30/
presidential-proclamation-critical-infrastructure-protection-month>(Retrieved on June 30, 2012).
“Presidential Proclamation -- Critical Infrastructure Protection Month, 2011,” presidential-proclamation-critical-infrastructure-protection-month-2011>(Retrieved on June 30, 2012).
“Presidential Security Directive 1: Organizing for Homeland Security and Counterterrorism,” (Retrieved on June 30, 2012).
“Public Law 107-296, Homeland Security Act of 2002,” xlibrary/assets/hr_5005_enr.pdf>(Retrieved on June 21, 2012).
“Public Law 107-305, Cyber Security Research and Development Act,” (Retrieved on June 20, 2012).
“Public Law 108-458, Intelligence Reform and Terrorism Prevention Act of 2004,” (Retrieved on June 28, 2012).
“Report of the President of the United States on the Status of Federal Critical Infrastructure Protection Activities,” CIP_2001_CongRept.pdf>(Retrieved on June 19, 2012).
Robichaux, P., “Distributed Denial-of-Service Attacks and You,” microsoft.com/en-us/library/cc722931.aspx>(Retrieved on June 26, 2012).
Rollins, J., & Wilson, C., “Terrorist Capabilities for Cyberattack: Overview and Policy Issues,” CRS Report for Congress, RL33123.pdf>(Retrieved on July 1, 2012).
Sanger, D. E., “Obama Order Sped Up Wave of Cyberattacks Against Iran,” obama-ordered-wave-of-cyberattacks-against-iran.html?pagewanted=all>(Retrieved on July 4, 2012).
Schmidt, E. E., “The Evolution of U.S. Policies against Terrorism,” thepresidency.org/storage/documents/Fellows2008/Schmidt.pdf>(Retrieved on June 20, 2012).
Shea, D. A., “Critical Infrastructure: Control Systems and the Terrorist Threat,” CRS Report for Congress, (Retrieved on June 7, 2012).
Singh, A. Kr., & Siddiqui, A. T., “New Face of Terror: Cyber Threats, Emails Containing Viruses,” Asian Journal of Technology & Management Research, Vol. 1, Iss. 1 (January - June 2011), CyberTerror.pdf>(Retrieved on July 5, 2012).
Snow, G. M., “Cybersecurity: Responding to the Threat of Cyber Crime and Terrorism,” statement before the Senate Judiciary Committee, Subcommittee on Crime and Terrorism, Washington, DC, April 12, 2011, gov/news/testimony/cybersecurity-responding-to-the-threat-of-cyber-crime-and-terrorism>(Retrieved on June 4, 2012).
Sofaer A. D., Goodman, S. E., Cuéllar, M., Drozdova, E. A., Elliott, D. D., Grove, G. D., Lukasik, S. J., Putnam, T. L., & Wilson, G. D., “A Proposal for an International Convention on Cyber Crime and Terrorism,” CISAC Report, August 2000, (Retrieved on February 12, 2012).
“Supernatural Horror in Literature by H. P. Lovecraft,” com/writings/texts/essays/shil.asp>(Retrieved on June 14, 2012).
“Synopsis for ‘Live Free or Die Hard’,” synopsis>(Retrieved on June 14, 2012).
“Terrorism 2002-2005,” p. iv, terrorism-2002-2005/terror02_05.pdf>(Retrieved on June 18, 2012).
“Terrorism FAQs,” cia-the-war-on-terrorism/terrorism-faqs.html>(Retrieved on June 18, 2012).
“The Sector-Specific Plans,” gc_1179866197607.shtm#2>(Retrieved on June 28, 2012).
“The World Factbook,” the-world-factbook/geos/en.html>(Retrieved on February 29, 2012).
Trevelyan, M., “Security Experts Split on ‘Cyberterrorism’ Threat,” reuters.com/article/2008/04/16/us-security-cyberspace-idUSL1692021220080416>(Retrieved on June 1, 2012).
“United Nations Security Council Resolution 1566, October 2004,” 1566%20(2004)&Lang=E&Area=UNDOC>(Retrieved on June 18, 2012).
“USA PATRIOT Act (H.R. 3162),” (Retrieved on June 20, 2012).
“U.S. Code Title 22, Ch. 38, Sec. 2656f,” USCODE-2011-title22/pdf/USCODE-2011-title22-chap38-sec2656f.pdf>(Retrieved on July 10, 2012).
U.S. Secret Service, & Carnegie Mellon Software Engineering Institute, “Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors,” (Retrieved on July 1, 2012).
U.S. Secret Service, & Carnegie Mellon Software Engineering Institute, “Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector,” (Retrieved on July 1, 2012).
U.S. Secret Service, & Carnegie Mellon Software Engineering Institute, “Insider Threat Study: Illicit Cyber Activity in the Government Sector,” secretservice.gov/ntac/final_government_sector2008_0109.pdf>(Retrieved on July 1, 2012).
U.S. Secret Service, & Carnegie Mellon Software Engineering Institute, “Insider Threat Study: Illicit Cyber Activity in the Information Technology and Telecommunications Sector,” final_it_sector_2008_0109.pdf>(Retrieved on July 1, 2012).
Vandiver, S., “Critical Infrastructure is Society`s Glue,” WINTER2010/ihs_articles_column.php>(Retrieved on June 20, 2012).
Walt, S. M., “Is the Cyber Threat Overblown?” posts/2010/03/30/is_the_cyber_threat_overblown>(Retrieved on May 29, 2012).
“WarGames,” (Retrieved on June 17, 2012).
Weimann, G., “Cyberterrorism: How Real is the Threat?” files/resources/sr119.pdf>(Retrieved on June 30, 2012).
________, “How Modern Terrorism Uses the Internet,” The Journal of International Security Affairs, No. 8 (Spring 2005), 2005/08/weimann.php>(Retrieved on February 23, 2012).
Wilson, C., “Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress,” CRS Report for Congress, crs/terror/RL32114.pdf>(Retrieved on February 19, 2012).
zh_TW