Cyber Operations and Cyber Terrorism
ARMY TRAINING AND DOCTRINE COMMAND FORT LEAVENWORTH KS DEPUTY CHIEF OF STAFF FOR INTELLIGENCE
Pagination or Media Count:
This handbook is one in a series of supplements to TRADOC DCSINT Handbook No. 1, A Military Guide to Terrorism in the Twenty-First Century, which is a basic terrorism primer prepared under the direction of the U.S. Army Training and Doctrine Command, Assistant Deputy Chief of Staff for Intelligence-Threats. The terrorist threat confronting our military spans foreign and domestic threats of nation-states, rogue states with international or transnational agent demonstrations, and actors with specific strategies, tactics, and targets. A major tactic used by many terrorist groups is Cyber Terrorism. Although Cyber Terrorism is covered in the capstone terrorism handbook, this supplement provides more detail and insight. This informational document supplements the basic terrorism handbook and supports operational missions, institutional training, and professional military education for U.S. military forces in the Global War on Terrorism GWOT. This document provides an introduction to Cyber Terrorism, and addresses the history of the phenomena, how terrorist organizations recruit, the motivations behind use of the tactic, characteristics of Cyber Terrorism, and the types of attacks against networks. Finally, the handbook addresses specific threats to military forces. This document exists primarily for U.S. military forces, however, other applicable groups include interagency intergovernmental civilian contractor and, nongovernmental, private volunteer, and humanitarian relief organizations. Compiled from open source materials, this supplement promotes a Threats perspective of suicide terrorism. Neither a counter-terrorism directive nor anti-terrorism manual, the supplement complements but does not replace training and intelligence products on terrorism.
- Information Science
- Computer Systems Management and Standards