{"id":4827,"date":"2016-12-23T15:05:22","date_gmt":"2016-12-23T19:05:22","guid":{"rendered":"http:\/\/ncjolt.org\/?p=4827"},"modified":"2020-06-04T20:52:57","modified_gmt":"2020-06-04T20:52:57","slug":"cyberattack-next-pearl-harbor","status":"publish","type":"post","link":"https:\/\/journals.law.unc.edu\/ncjolt\/articles\/cyberattack-next-pearl-harbor\/","title":{"rendered":"Is Cyberattack the Next Pearl Harbor?"},"content":{"rendered":"<p>Central Intelligence Agency Director, Leon Panetta, states in his Secretary of Defense confirmation testimony before the Senate Armed Services Committee that, \u201c[t]he next Pearl Harbor that we confront could very well be a cyberattack that cripples America\u2019s electrical grid and its security and financial systems.\u201d Cyberattacks have become a daily threat to businesses, consumers,\u00a0and all nation states resulting in the profound loss of economic assets and intellectual property. Cyberattack represents a real threat to geopolitical stability and world peace. This article depicts a fictional scenario of what a cyberattack on a massive scale might look like and examines current and historical factors to better understand how such a devastating cyberattack is set in motion and how we might avoid it.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Central Intelligence Agency Director, Leon Panetta, states in his Secretary of Defense confirmation testimony before the Senate Armed Services Committee that, \u201c[t]he next Pearl Harbor that we confront could very well be a cyberattack that cripples America\u2019s electrical grid and its security and financial systems.\u201d Cyberattacks have become a daily threat to businesses, consumers,\u00a0and all <a href=\"https:\/\/journals.law.unc.edu\/ncjolt\/articles\/cyberattack-next-pearl-harbor\/\" class=\"more-link\">&#8230;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[5,74,77],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/4827"}],"collection":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/comments?post=4827"}],"version-history":[{"count":1,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/4827\/revisions"}],"predecessor-version":[{"id":7133,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/4827\/revisions\/7133"}],"wp:attachment":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/media?parent=4827"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/categories?post=4827"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/tags?post=4827"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}