Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Cyberterrorism and possible consequences
How cyber terrorism works
How cyber terrorism works
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Cyberterrorism and possible consequences
Cyberterrorism
Introduction
Cyberterrorism is the convergence of terrorism and cyberspace. It is generally
understood to mean unlawful attacks and threats of attack against computers,
networks, and the information stored therein. Possibly to intimidate, influence a
government or its people to further political or social gain. To qualify as
cyberterrorism, an attack should result in violence against persons or property, or
generate fear. Attacks that lead to death or bodily injury, explosions, plane
crashes, water contamination, or severe economic loss would be examples, serious
attacks against important infrastructures could be acts of cyberterrorism,
depending on their impact. This essay will illustrate and analyse the main issues
and ideas behind cyberterrorism. This will include information that has led to the
internet being used in a mailicous way, ethical issues, paradigms that
cyberterrorism follows, motivations and incidents that have occurred in the past.
One FBI spokespersons definition is-
'Cyber terrorism' means intentional use or threat of use, without legally
recognized authority, of violence, disruption, or interference against cyber
systems, when it is likely that such use would result in death or injury of a
person or persons, substantial damage to physical property, civil disorder, or
significant economic harm'.
Cyber attacks and effects
Cyberspace is constantly under assault. Cyber spies, thieves, saboteurs, and thrill
seekers break into computer systems, steal personal data and trade secrets,
vandalize Web sites, disrupt service, sabotage data and systems, launch computer
viruses and worms, conduct fraudulent transactions, and harass individuals and
companies. These attacks are facilitated with increasingly powerful and easy-to-use
software tools, which are readily available for free from thousands of Web sites on
the Internet. Many of the attacks are serious and costly. The ILOVEYOU virus for
example, was estimated to have infected tens of millions of users and cost billions
of dollars in damage.
In light of these serious threats from cyberspace, it is worth noting that the
discourse on cyberterrorism is something that – fortunately has not been
carried out in its most destructive capabilities. It is, therefore, d...
... middle of paper ...
...ital
world today. In addition to cyberattacks against digital data and systems, many
people are being terrorized on the Internet today with threats of physical violence. On
line stalking, death threats, and hate messages are abundant. These crimes are serious
and must be addressed. In so doing, governments around the world will be in a better
position to police and respond to cyberterrorism if and when the threat becomes
imminent.
Sources
Author Unknown. "Cyber Terrorism: Understanding Cyber Threats"
https://www.hamiltoncountyohio-tewg.org/cyber_terrorism/
Aldo Leon. "The New Age of Cyberterrorism"
http://www.sabianet.com/Res_The%20New%20Age%20of%20Cyberterrorism.pdf
Dorothy E. Denning. "Cyberterrorism" http://palmer.wellesley.edu/~ivolic/pdf/USEM/Cyberterror-Denning.pdf
Mohamed Chawki. "A Critical Look at the Regulation of Cybercrime"
http://www.crime-research.org/library/Critical.doc.
Robert Malý. "Virtual communities and cyber terrorism"
http://www.unob.cz/spi/2007/presentace/2007-May-03/06-Jirovsky_CyberTer.ppt.
Peter Reilly. "How Real is the Threat of Cyber Terrorism?" http://www2.lhric.org/security/desk/letter8.html
the problem is much more pressing than it has in the past, and both the
Ecoterrorism is hard to define. It is used by the FBI and other government agencies to describe individuals or groups that use arson and sabotage against property, equipment, materials, or facilities that they feel are being used to destroy the environment. This is known as direct action and many such direct action tactics exist such as ecotage, eco-drama and monkeywrenching. Ecotage Acts of major economic sabotage that are designed to hurt the profits of businesses that radical environmentalists believe are profiting from environmentally harmful practices. Eco-drama (Staging non-violent, often illicit events that cause no property damage, but that are designed for the sake of gaining media attention for an environmental cause or to expose an environmental abuse. This type of action is often designed to spur a law enforcement response to maximize sympathetic media attention. Monkeywrenching was made popular by Edward Abbey's fictional work The Monkey Wrench Gang (1975). It generally refers to minor acts of vandalism or sabotage that are undertaken to frustrate the perpetrators of a perceived environmental harm (CITE).
Identify the problems in this case and prioritize the urgency of the challenges that need to be addressed.
What concerns the government of the United States most is the security of the critical infrastructure from the cyber threats. The nation is depending heavily on the technology in most of its critical sectors to keep it up and running. Thus, this makes its more vulnerable to cyber-attacks from outsiders and insiders. Therefore, its protection must be a priority.
"Information systems are vulnerable and it is possible for terrorists to utilize the vulnerabilities of information systems to attack their adversaries" (Hua & Bapna 2013). Since the events of 9/11 the world has watched as terrorism has slowly began to escalate not only in severity but frequency however, until recently nations including the United States have been more focused on traditional methods of terrorism and paid little effort to the growing concern of cyberterrorism. Hua and Bapta (2013) define cyberterrorism as:
important problem. This problem must be focused on and dealt with or the world is going
Although an act of cyberterrorism has yet to occur, officials and scholars continuously study the possibilities of such an attack. As our physical and virtual worlds continue to intertwine the risk of such an event rapidly increases. Everything from our transportation systems to pharmaceutical manufacturing are computer controlled. The closest the world has come to an act of cyberterrorism was in 2000. Known as the Maroochy Shire case in Queensland, Australia was committed by Vitek Boden. Boden was an engineer for Pacific Paradise, a sewage pumping in Australia. He was able to successful hack into a control system modifying the operations and dumping millions of litres of raw sewage into the local waterways. Boden’s motivation was the only reason the act was not classified as cyberterrorism was his motivation. It was personal rather than political or religious in nature (Sharp Parker, 2009). The only reason this wasn’t the first act of cyberterrorism was motivation. As companies invest in upgrading their technological capabilities, they too need to invest in security structure to protect their systems and the public from threats of terrorism. Our government must also decide how to address public safety in regards to cyberterrorism. On September 11th, 2001 America was reminded how vulnerable we are when it comes to acts of terrorism. The sheer complexity and varying design of attacks often makes it very difficult to create a catch-all defense in fighting terrorism. To improve the disruption of terrorist activities by government agencies in the United States many laws needed to be updated to include the latest areas of electronic communications.
The morning of September 11, 2001, Americans experienced vulnerability and realized a new fear, the threat of a bioterrorist attack. In the days that followed the terrorist attacks letters tainted with anthrax began appearing in the U.S. mail. Five Americans were killed and 17 were sickened in what became the worst biological attacks in U.S. history (“Amerithrax or Anthrax Investigation”). Bioterrorism is defined as a criminal act against unsuspecting civilians and a threat to national security with the deliberate release of viruses, bacteria, or germs. An attack of bioterrorism is meant to cause illness or death by microorganisms that are found in nature, but they can be made more harmful because of an increased ability to cause and spread disease which resists medical treatment. These biological agents can spread from person to person or can be released into the food supply, water, or air. They can be hard to detect because they may not cause illness for hours or several days, thus giving terrorists an advantage allowing them to go escape undetected until symptoms arise and an attack is suspected. Biological weapons are appealing because they are often easy to obtain and inexpensive, and can be easily distributed. The main objective of bioterrorism is to cause panic and terror, not necessarily casualties. The social disruption they cause can be far worse than any actual damage.
Many nations in the world - the United States, China, Russia, Iran, Germany, and more- use cyber warfare as a method of conducting sabotage and espionage. Nations, such as China and Russia, use espionage in order to prevent their economy and their military technology from falling behind by stealing advanced nations’ technology. Other nations, including Israel and Iran, focus on sabotaging other nations to cripple them, by sending malwares that destroy important data on the system, from advancing their technology and costing them a decent amount of money due to repairs. Another popular cyber attack used, mainly with hacktivist, government- sympathetic groups not owned by the government, and nations less advanced in technology, is Denial-of-service, or DoS. DoS is used to hinder the target’s website and other things that are maintained by computers by making it unavailable to intended users. People argue there are no benefits for cyber warfare due to its potential destructive powers and instant process of destruction. While other people-looking from a different view find that cyber warfare does have its benefits. They argue that an important benefit is that cyber warfare takes place in cyber space meaning that it does not physically harm people. They also argue that cyber warfare draws the awareness of the nation on the ever increasing dangers of cyber warfare and forces the government to set up stronger cyber security to fend off international attacks, which also help protect the government from internal hackers. It also creates more jobs for hackers, who use their knowledge to increase the security instead of harm it. Although cyber warfare produces damaging effects on a nation, in the long run, it crea...
Terrorism and Technology It wasn’t until the morning of September 11th that America began to question just how safe we really are. As the world watched the devastation on the news, everyone was looking for comfort. However, often times when something as horrific as this happens, the ones you look to for comfort are looking back at you for comfort. Many people found what piece of mind they could, through technology, during this horrible time. The September 11 terrorist attacks have had both positive and negative impacts on the use of computers and technology.
Different authors have reviewed the cyber terrorism from different angles. Most of them have focused on the aims and objectives which terrorist wants to accomplish through cyber warfare. Moreover they have stressed over the need to the measures taken to combat cyber-attacks by terrorists.
need to be dealt with. These problems are not just intended for a certain group who are facing
The main and most important issue facing those who respond to cyber crime and terrorism threats is location. Computer based crimes differ from physical crimes because unlike physical crimes, you can commit a computer based crime from half way across the world, or even while moving location. A terrorist group could be located in Pakistan launching cyber based attacks against the United States government servers, but porting through multiple proxy servers in other countries like China. A proxy server is
We have many global problems, but we are lacking global institutions powerful enough to effectively address such problems as global terrorism, human rights abuses, global warming, the ozone layer, pollution of the oceans and rivers, arms trade, child soldiers, war, the weaponization of space, and nuclear and other weapons of mass destruction. Finding a way to participate in solving these and other global problems is one of the great challenges of our time.
The advantages of technology and the internet have led more criminals to use cyberspace to commit crimes. The threat of cybercrime is increasing as globalization continues to spread across the world. While the impact of globalization has led to amazing, new discoveries throughout the world, Internet connectivity has also made cybercrime easier. America and the rest of the world have become more reliant on technology and use it in more aspects of their lives, technology-users make themselves more vulnerable to cyber attacks. Globalization and the growing use of computers in the world have given people a motive to learn more about computing and become more knowledgeable as programmers. As these people learn more, there is a risk that they will use their new intelligence to commit cybercrimes.