Cyberterrorism Database
Cyberterrorism: An Introduction
A cyber attack can mean many things in our modern world. It can describe anything from an electronic breach to a financial institution to a full fledged attack on our nation's physical infrastructures. These include our nation's defense systems, water supply systems, and transportation networks. It is critical that the public be informed of the potential threat that a cyber attack would bring. The Center for Terrorism Law recognizes the importance of keeping up with current developments regarding cyberterrorism. We are working constantly to ensure that the information on our site displays only the latest information in this emerging field.
Current Articles on Cyberterrorism
Federal Statutes
18 U.S.C. § 1030: National Information Infrastructure Protection Act: Computer Fraud and Abuse Act: *- http://www.law.cornell.edu/uscode/18/1030.html
- http://www.justice.gov/criminal/cybercrime/1030NEW.htm
- http://www.justice.gov/usao/eousa/foia_reading_room/usam/title9/crm00013.htm
- http://www.law.cornell.edu/uscode/18/usc_sec_18_00002332---b000-.html
- http://frwebgate.access.gpo.gov/cgi-bin/getdoc.cgi?dbname=107_cong_public_laws&docid=f:publ296.107
- http://www.nist.gov/director/ocla/Public_Laws/PL107-296.pdf
State Statutes
Other Cyberterrorism Resources
- Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations
- Electronic Crime Scene Investigation: A Guide for First Responders
- Computer Attack and Cyber Terrorism: Vulnerabilities and Policy Issues for Congress



Favorites
Facebook
Twitter
Digg
Del.icio.us
Technorati
Reddit
Newsvine
StumbleUpon
MySpace










