In the United States, the Federal Bureau of Investigations (FBI) regards terrorism as forceful and violent acts used for coercion and directed at the government, civilian population, or any portion of either for the purpose achieving either a political or a socially relevant goal (Schmalleger & Pittaro, 2009). However, with the advent of the internet acts of coercion and intimidation can be accomplished without the use of force or violence (Schmalleger & Pittaro, 2009; Stohl, 2007). Weimann (2005) defined cyber-terrorism as act performed with cyber-network tools to “shut down critical national infrastructures…” (Cited in Stohl, 2007, p. 229). Whereas, Rollins & Wilson (2005) narrowed this definition by including the ideas that the attack must create fear and disruption equal to traditional terrorist acts, or the act must cause serious physical and/or economic harm intended to force or pressure government or people to some politically or socially motivated goal (Cited in Stohl, 2007). Rollins & Wilson’s definition includes criminal acts committed for other than terrorist reason that create substantial fear or disruption; however, Stohl (2007) believed that cyber-crime and cyber-terrorism should be categorized separately. In part, Stohl believed that the Media sensationalizing every event as cyber-terrorism increases fear and anxiety in the population. Stohl himself defined terrorism as the threat or actual act of violence for the express purpose of creating fear and/or submissive behavior from the intended target. Stohl pointed out that in 2003, a time when cyber-terrorism was of lesser concern in most people’s minds, a blackout that covered the Northeast failed to generate panic, injuries, loss of military capabilities, or econom...
... middle of paper ...
...Keegan, C. (2002). Cyber-terrorism risk. Financial Executive, 18(8), 35-37.
Nguyen, R. (2013). Navigating jus ad bellum in the age of cyber warfare. California Law
Review, 101(4), 1079-1129.
Piggin, R. (2010). The reality of cyber terrorism. Engineering & Technology, 5(17), 36-38.
Schmalleger, F. & Pittaro, M. P. (2009). Crimes of the internet. Upper Saddle River, NJ:
Pearson.
Stohl, M. (2007). Cyber terrorism: A clear and present danger, the sum of all fears, breaking point or patriot games?. Crime, Law & Social Change, 46(4/5), 223-238.
Tafoya, W. L. (2011). Cyber terror. FBI Law Enforcement Bulletin, 80(11), 1-7.
U. S. Department of State, (Sept. 2006). National strategy for combating terrorism. Retrieved from http://2001-2009.state.gov/s/ct/rls/wh/71803.htm.
Weimann, G. (2011). Cyber-fatwas and terrorism. Studies in Conflict & Terrorism, 34(10),
765-781.
Taylor, R. W., Fritsch, E. J., Liederbach, J., & Holt, T. J. (2011). Digital Crime and Digital Terrorism 2nd edition. Upper Saddle River, New Jersey: Prentice Hall.
Terrorism represents a continuing threat to the United States. It is the most significant threat to our national security. Terrorist attacks have definitely left many concerns about the possibilities of future incidents of terrorism in the United States. Since the events of September 11, 2011, Americans and much of the world are afraid. Americans are at war with terrorism and no longer feel comfortable. A part of this unease feeling has to do with cyber terrorism.
Petallides, C. J. (2012). "Cyber Terrorism and IR Theory: Realism, Liberalism, and Constructivism in the New Security Threat." Student Pulse, Vol 4, No 3 Accessed online http://www.studentpulse.com/a?id=627> on 12/03/14
National and International Security is a sum of the actions taken by countries and other organizations that can guarantee the safety and well being of their population. It is vital for a nation to pre-emptively discover what issues could affect their security, and take action to prevent any detrimental or harmful events from happening. With the development of technology and the transition into a more technologically savvy society, cyber security has become one of the most prevalent and important economic and national security issues that the United States will come to face.
The term “cyber terrorism” refers to the use of the Internet as a medium in which an attack can be launched such as hacking into electrical grids, security systems, and vital information networks. Over the past four decades, cyber terrorists have been using the Internet as an advanced communication tool in which to quickly spread and organize their members and resources. For instance, by using the instantaneous spread of information provided by the Internet, several terrorist’s groups have been able to quickly share information, coordinate attacks, spread propaganda, raise funds, and find new recruits for their cause. Instantaneous and unpredictable, the technological advantages these terrorists have obtained from using the Internet includes
Masnick, Mike. "Should We Want A 'Cyberwar'? It's A Lot Less Bloody Than A Real War." Techdirt. N.p., 20 June 2012. Web. 21 Nov. 2013. (Source G)
The branches of the military, for a couple generations, have always been the Army, Navy, Air force, Marine Corps, and the Coast Guard; however, in an ever evolving digital world, the notion that outer space would be the next military front is being rapidly replaced by the idea that cyber space will be the next arms race. The United States has been defending attacks on their infrastructure day after day, night after night, when one hacker on one side of the world sleeps, another takes their place to attempt to compromise the US government. The motives may range from a political ‘hacktivist’ trying to prove a point, to an economic spy, trying to gain a competitive edge on its more upstart rivals, to an attempt to control the United States ‘smart’ power grid, giving a nation an advantage in case of an external armed conflict. With all of those types of conflicts going on at the same time, relentlessly, and growing more complex every day, the United States has to step up its game in order to survive, and the government is planning its cyber strategy accordingly. In November 16, 2011, according to an unclassified cyber-security bulletin, the United States government for the first time ever will allow offensive cyber retaliation, something that china has been doing for years; the retaliation order from the United States, however must include an approval by the president (Parnell). The United States government said they are now working on the cyber rules of engagement for this new battle “Domain” as they called it. Governments around the world are gearing up for it, but the definition of cyber warfare is a little bit hazy. Richard A. Clarke defines it in 2011 in his book Cyber War as "actions by a nation-state to penetrate another nation...
Cyber terrorism is the politically motivated use of computers and information technology to cause serious destruction and chaos or spread fear in a society. Cyber terrorist have been acknowledged by the fact that they can do a digital Pearl Harbor through the use of computers and internet technologies. They use many different electronic technologies and have many targets, but they do not leave their information up for extended periods of time so it makes it harder to track where and who the information is coming from. The longer that they leave up the information the higher chance they have of being caught. Cyber terrorist use a completely different schem...
There is a possibility that cyber terrorism could rival the September eleven terrorist attacks of 2001. “US Secretary of Defense said ‘The US is facing dramatically increasing threat from cyber-attacks and a future attack on the country’s critical infrastructure could have an effect similar to the September 11 terrorist attacks of 2001.’” (ComputerWorld).
Olender, Michael. “Keeping Pace with Cyber Power, Defense, and Warfare.” Journal of International and Global Studies 6.2 (2015): 55+. Academic OneFile. Web. 5 Oct. 2015.
The nation has become dependent on technology, furthermore, cyberspace. It’s encompassed in everything we deliver in our daily lives, our phones, internet, communication, purchases, entertainment, flying airplane, launching missiles, operating nuclear plants, and implicitly, our protection. The more ever-growing technology empower Americans, the more they become prey to cyber threats. The United States Executive Office of the President stated, “The President identified cybersecurity as one of the top priorities of his administration in doing so, directed a 60-day review to assess polices.” (United States Executive Office of the President, 2009, p.2). Furthermore, critical infrastructure, our network, and internet alike are identified as national assets upon which the administration will orchestrate integrated cybersecurity policies without infringing upon and protecting privacy. While protecting our infrastructure, personal privacy, and civil liberties, we have to keep in mind the private sector owns and operates the majority of our critical and digital infrastructure.
Plenty of researchers have done reviews about the impact of cyber warfare to take effect in the recent decades. Voices and opinions are different, when it comes to whether cyber war will take place or not, with most of the articles claiming that cyber security is alarming towards a negative effect. Like Arquilla & Ronfeldt,(1993) wrote about the coming of cyber war, and further went on to state that “industrialization led to attritional warfare by massive armies (e.g., World War I). Mechanization led to maneuver predominated by tanks (e.g., World War II). The information revolution implies the rise of cyber war”. However, Rid,(2012) pointed out that cyber war will not take place, clearly defined what cyber war entails, and make clear the difference between cyber-attacks and warfare.
Susan W. Brenner’s Cybercrime: Criminal Threats from Cyberspace is scary, exciting, and informative all in one book. It takes you on rollercoaster from start to finish as your eyes are opened to the realities of cybercrime and cybercriminals’ capabilities as our technologies have progressed. Brenner’s book is an excellent piece for those that are not savvy about technology terminology and cybercrime.
Weimann, G. (2004b). www.terror.net How modern terrorism uses the Internet. Washington DC: United States Institute of Peace.
Cybercrime is a global issue plaguing the world. The dictionary defines cybercrime as “crime conducted via the Internet or some other computer network”(Merriam-Webster). The definition remains very broad because the word “cyber” is defined as “relating to the culture of computers, information technology, and virtual reality.” Due to the growing number of people gaining access to the internet, rapid development of technology, and the globalization of the world, more of the world population is becoming susceptible to involvement in cybercrime – whether it be as a victim or a criminal. Cybercrime involves different levels of the world on both the victim and criminal side from an individual citizen, to small groups, businesses, and the government, to the countries of the world. There are different groups from law enforcement agencies to the U.S. Secret Service, that are attempting to combat the problem through cooperation and preemptive efforts. If these groups combined with the public to protect themselves and the country from criminals that commit cybercrime, the nation’s network and technology servers would be much safer for technology users. Clearly, cybercrime is a problem because it puts internet users at risk of being taken advantage of or harmed.