Cybercrime is becoming more organized and established as a transnational business. High technology online skills are now available for rent to a variety of customers, possibly including nation states, or individuals and groups that could secretly represent terrorist groups. The increased use of automated attack tools by cybercriminals has overwhelmed some current methodologies used for tracking Internet cyberattacks, and vulnerabilities of the U.S. critical infrastructure, which are acknowledged openly in publications, could possibly attract cyberattacks to extort money, or damage the U.S. economy to affect national security. This report discusses options now open to nation states, extremists, or terrorist groups for obtaining malicious technical services from cybercriminals to meet political or military objectives, and describes the possible effects of a coordinated cyberattack against the U.S. critical infrastructure. This report will be updated as events warrant.
Description based on title screen as viewed on December 3, 2007. "Order Code RL32114." "Updated November 15, 2007." Updates can be received through CRS Web.
Bibliography, etc. Note
Includes bibliographical references.
Digital File Characteristics
System Details Note
Mode of access: World Wide Web. System requirements: Adobe Acrobat Reader.