Members Log-in
To access special member content and services, legislators, legislative staff and Foundation for State Legislatures sponsors must log in. (Clear this notice.)
 What is Cyberterrorism?
Cyberterrorism can be defined as the use of information technology by terrorist groups and individuals to further their agenda. This can include use of information technology to organize and execute attacks against networks, computer systems and telecommunications infrastructures, or for exchanging information or making threats electronically. Examples are hacking into computer systems, introducing viruses to vulnerable networks, web site defacing, denial-of-service attacks, or terroristic threats made via electronic communication.

 

Legislation
 
As of December 2002, at least fourteen states have pending legislation that address cyberterrorism.

 

Statutes Electronic Threats & Terroristic Activities
Several states have addressed terrorism in state criminal codes, including statutes that address terroristic activities and threats. But at least three states- California, Georgia, and Pennsylvania - have laws specifically aimed at electronic terroristic threats or acts.

Hacking, Viruses & Unauthorized Access
Cyberterrorism can include direct attacks on networks, computer systems, computer programs, and data, which may result in potentially disastrous consequences like shutting down vital infrastructure facilities such as power stations. Nearly every state has statutes banning hacking and unauthorized access, and at least sixteen states ban unleashing harmful computer viruses and contaminants.

 

Links to Resources
National Infrastructure Protection Center
The National Infrastructure Protection Center (NIPC) serves as a national critical infrastructure threat assessment, warning, vulnerability, and law enforcement investigation and response entity.

Computer Crime and Intellectual Property Section (CCIPS)
Criminal Division of the U.S. Department of Justice

Activism, Hacktivism, and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy
Dorothy E. Denning, Georgetown University

Cyberterrorism Resources Center
From the Global Development Center.

 

Contacts
Pam Greenberg and Janna Goodwin
303-364-7700

NCSL Protecting Democracy



pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy