Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress Page: 2 of 43
This report is part of the collection entitled: Congressional Research Service Reports and was provided to UNT Digital Library by the UNT Libraries Government Documents Department.
Extracted Text
The following text was automatically extracted from the image on this page using optical character recognition software:
Botnets, Cybercrime, and Cyberterrorism:
Vulnerabilities and Policy Issues for Congress
Summary
Cybercrime is becoming more organized and established as a transnational
business. High technology online skills are now available for rent to a variety of
customers, possibly including nation states, or individuals and groups that could
secretly represent terrorist groups. The increased use of automated attack tools by
cybercriminals has overwhelmed some current methodologies used for tracking
Internet cyberattacks, and vulnerabilities of the U.S. critical infrastructure, which are
acknowledged openly in publications, could possibly attract cyberattacks to extort
money, or damage the U.S. economy to affect national security.
In April and May 2007, NATO and the United States sent computer security
experts to Estonia to help that nation recover from cyberattacks directed against
government computer systems, and to analyze the methods used and determine the
source of the attacks.1 Some security experts suspect that political protestors may
have rented the services of cybercriminals, possibly a large network of infected PCs,
called a "botnet," to help disrupt the computer systems of the Estonian government.
DOD officials have also indicated that similar cyberattacks from individuals and
countries targeting economic, political, and military organizations may increase in
the future.2
Cybercriminals have reportedly made alliances with drug traffickers in
Afghanistan, the Middle East, and elsewhere where profitable illegal activities are
used to support terrorist groups. In addition, designs for cybercrime botnets are
becoming more sophisticated, and future botnet architectures may be more resistant
to computer security countermeasures.3
This report discusses options now open to nation states, extremists, or terrorist
groups for obtaining malicious technical services from cybercriminals to meet
political or military objectives, and describes the possible effects of a coordinated
cyberattack against the U.S. critical infrastructure. This report will be updated as
events warrant.
Larry Greenemeier, "Estonian Attacks Raise Concern Over Cyber 'Nuclear Winter,'
Information Week, May 24, 2007, at [http://www.informationweek.com/news/showArticle.
jhtml?articlelD=199701774].
2 Jeanne Meserve, "Official: International Hackers Going After U.S. Networks," CNN.com,
October 19, 2007, [http://www.cnn.com/2007/US/10/19/cyber.threats/index.html].
Sebastian Sprenger, "Maj. Gen. Lord Is a Groundbreaker," Federal Computer Week,
October 15, 2007, vol. 21, no. 34, p. 44.
3 Tom Espiner, "Security Expert: Storm Botnet 'Services' Could Be Sold," CnetNews.com,
October 16, 2007, [http://www.news.com/Security-expert-Storm-botnet-services-could-be-
sold/2100-7349_3-6213781.html]. Dan Sullivan, "P2P Botnets Increasingly Sophisticated,
Realtime-Websecurity," April 18, 2007, [http://www.realtime-websecurity.com/articles_
andanalysis/2007/04/p2pbotnets_increasinglysophi.html].
Upcoming Pages
Here’s what’s next.
Search Inside
This report can be searched. Note: Results may vary based on the legibility of text within the document.
Tools / Downloads
Get a copy of this page or view the extracted text.
Citing and Sharing
Basic information for referencing this web page. We also provide extended guidance on usage rights, references, copying or embedding.
Reference the current page of this Report.
Wilson, Clay. Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress, report, January 29, 2008; Washington D.C.. (https://digital.library.unt.edu/ark:/67531/metadc818098/m1/2/: accessed April 19, 2024), University of North Texas Libraries, UNT Digital Library, https://digital.library.unt.edu; crediting UNT Libraries Government Documents Department.