In this nation, having a solid critical infrastructure is a very fundamental part of a highly functioning government. According to the Department of Homeland Security (2017), the country’s critical infrastructure provides the essential services that underpin American society and serve as the backbone of our nation’s economy, security, and health. It keeps all parts of a government intact and running effectively, and without it, the processes, systems, and facilities cannot operate appropriately. There are many reasons as to why terrorist groups would want to target infrastructure, including breaching through the government to create chaos and havoc. By doing this, terrorists can produce disorganization and concern among our economy, security …show more content…
This term became official after a bombing attack, with the government realizing that there is a greater need for more protection of certain systems that keep this nation running. In addition, after past terrorist threats and attacks such as 9/11, the definition of critical infrastructure expanded to a purpose of the coordination of the cyber-related federal efforts and programs associated with protecting critical information infrastructure systems (Forest & Howard, 2013). Following this, there were many plans and programs created to increase security of the critical infrastructure of this nation. Unfortunately, there are a few generalizations concerning the nature of critical infrastructure that can be made in the context of terrorism. The first generalization is that critical infrastructures are made up of a vast and diverse set of systems and assets (Forest & Howard, 2013). There are many categories within critical infrastructure, and with new ones emerging regularly, it is easier to list examples of the critical infrastructure types. These examples, by all means, do not consider all types and should be referenced in broadening the understanding of critical infrastructure. Secondly, it is clear that almost all aspects of critical infrastructure can be broadly recognized as either “physical” or “cyber” targets, …show more content…
Critical infrastructures, or governmental infrastructures in general, are a major target for terrorist groups and there are many reasons as to why these systems are targeted. At first, certain aspects for carrying out an attack, such as on critical infrastructure, could include desired casualty levels, the degree of publicity sought, whether a target should be symbolic or suffices, the type of reaction the attack will cause, expected secondary effects and reactions, and how large or small the attack (Forest & Howard, 2013). Having knowledge of all these elements for carrying out an attack, the government can make sure to be prepared for any type of situation that may take place. On the other hand, there are numerous reasons why terrorist groups might attack critical infrastructure including, the disruption of society, ideological predilection towards a critical infrastructure sector, symbolic relevance of critical infrastructure, attacking critical infrastructure as organization building, casualty control, familiarity with critical infrastructure, and precedent and adaptation (Forest & Howard, 2013). Any of these reasons could be why terrorist groups would want to attack infrastructures, but more than likely it will be due to multiple reasons at once and not one sole reason. There is no single explanation
The terrorist attacks on September 11, 2011 prompted the world to reevaluate and drastically modify airport and airline security. “Four targets had been chosen, all iconic American buildings that would send a clear message of the depth of their hatred for the United States. All four planes crashed, killing all on board—terrorists, crew members, and passengers, along with hundreds who were killed inside the structures, on the ground, and the men and women who ran into collapsing buildings in an effort to try and save others” (Smutz 1). As Jason Villemez said “the decade after the 9/11 attacks reshaped many facets of life in America” (Villemez 1). Before the attacks, people did not think that large scale hostility towards innocent people in our country was remotely possible. Ever since that fateful moment, citizens in America are on their toes every day worrying about another attack happening. United States citizens have had to adapt and change in response to this fear of further terrorist assault on our country. One of the ways they have adapted is by changing their means of security concerning airline travel.
At this juncture, it may be somewhat difficult to accept the proposition that a threat to the telecommunications grid, both wired and wireless, in the United States could potentially be subject to a catastrophic cyber attack. After careful research on the subject, it appears the potentiality of an event of such magnitude, which either disrupts one or the other grids for a long period or destroys either, is both theoretically and realistically impossible. It may be that proponents—those who advance such theories—equate such “doomsday” scenarios as if a cyber attack would or could be of the same magnitude as a conventional or nuclear military strike. Terms such as “cyber Pearl Harbor,” “cyber 9/11” and “cyber Vietnam” have been used to describes potential catastrophic cyber attacks and yet, “Though many have posited notions on what a ‘real’ cyber war would be like, we lack the understanding of how such conflicts will be conducted and evolve.” (Rattray & Healey, 2010, p. 77). Yet, the U.S. government continues to focus on such events, as if the plausibility of small-scale cyber attacks were not as pressing.
Although an act of cyberterrorism has yet to occur, officials and scholars continuously study the possibilities of such an attack. As our physical and virtual worlds continue to intertwine the risk of such an event rapidly increases. Everything from our transportation systems to pharmaceutical manufacturing are computer controlled. The closest the world has come to an act of cyberterrorism was in 2000. Known as the Maroochy Shire case in Queensland, Australia was committed by Vitek Boden. Boden was an engineer for Pacific Paradise, a sewage pumping in Australia. He was able to successful hack into a control system modifying the operations and dumping millions of litres of raw sewage into the local waterways. Boden’s motivation was the only reason the act was not classified as cyberterrorism was his motivation. It was personal rather than political or religious in nature (Sharp Parker, 2009). The only reason this wasn’t the first act of cyberterrorism was motivation. As companies invest in upgrading their technological capabilities, they too need to invest in security structure to protect their systems and the public from threats of terrorism. Our government must also decide how to address public safety in regards to cyberterrorism. On September 11th, 2001 America was reminded how vulnerable we are when it comes to acts of terrorism. The sheer complexity and varying design of attacks often makes it very difficult to create a catch-all defense in fighting terrorism. To improve the disruption of terrorist activities by government agencies in the United States many laws needed to be updated to include the latest areas of electronic communications.
This problem is a direct result of the “gray areas” that make it difficult to tell the difference between a common crime and a political crime. It combines the two acts into one, blurring the line of distinction (Anderson). The government being attacked sees it as a common criminal attack on its sovereignty, while the terrorist sees it as a legitimate means to an end. The government behind which the terrorist is trying to...
The recent horrific attacks on France highlighted one of the number one threats to Homeland Security, which is the evolving terrorist. The Evolving terrorist threat is of major concern since 9/11 because “its demonstrated and continued interest in advancing plots to attack the United States” (). A major concern in this area for the United States is the propaganda that is used to motivate individuals who have not participated in terrorist activities or traveled to conflict zones, teaching and training them to plot and carry out attacks on civilian populations. Another huge concern to Homeland security is the threat to our cyber-physical infrastructure. “A vast array of interdependent information technology network, systems, services, and resources enable communication, facilitate travel, power our homes, run our economy and provide essential government services” (). The everyday citizen is so reliant on technology and everything in our country is so interconnected that if the cyber-physical infrastructure would to be compromised it would create a devastating chain reaction across the country. The third concern for Homeland Security is the threat of a pandemic. Even though it is noted as being a very low probability, the impact of it happening even once would be very high impact. “Increasing global
Founded by the Monterey Group (Terrorism Committee for the U.S. Legislature), the United States adopted a three-level categorization for cyber-terror including simple-unstructured, advanced-structures, and complex-coordinated (Findlay, 2014). At the first level of cyber-terror is a simple unstructured attack. Under this category, a simple-unstructured attack involves very diminutive target analysis, command and control, or learning skills. This type of attack is normally planned within a matter of months and targets a general organization. Next is the level of an advanced-structured attack, which requires a straightforward target analysis, command and control, learning skills, and a high amount of planning in order to cause extensive damage. For example, in 2007, there was a three-week period of cyber-attacks on Estonia (located in Northern Europe), which targeted the country’s government, financial, and security divisions. Due to the extensive planning of this sophisticated attack, Estonia’s government was thrown into chaos and was unable to operate at full capacity. Finally, at the last level of cyber terrorism is the complex-coordinated attack (Extremely rare). At the highest level of terror, these attacks require substantial time, specialized skills, resources, and a highly capable target analysis. One of these substantially rare attacks
The concept of homeland security has developed over the last decade. Homeland security as a concept was precipitated by the terrorist attacks of 9/11. However, prior to 9/11 such entities as the Gilmore Commission and the United States Commission on National Security discussed the need to evolve the way national security policy was conceptualized due to the end of the Cold War and the rise of radicalized terrorism. After 9/11, policymakers concluded that a new approach was needed to address the large-scale terrorist attacks. A presidential council and department were established, and a series of presidential directives were issued in the name of “homeland security.” These developments established that homeland security was a distinct, but undefined
Homeland security is the way Americans put forth the effort to ensure the homeland is safe, secure, and stands firm against terrorist acts and other hazard that could put the health and welfare of the American people. The mission of the Homeland Security is to prevent terrorism, secure and protect our open borders, uphold all immigration laws, safeguard and secure cyberspace, and be content and resilient when it pertains to disasters.
Terrorism represents a continuing threat to the United States. It is the most significant threat to our national security. Terrorist attacks have definitely left many concerns about the possibilities of future incidents of terrorism in the United States. Since the events of September 11, 2011, Americans and much of the world are afraid. Americans are at war with terrorism and no longer feel comfortable. A part of this unease feeling has to do with cyber terrorism.
When it comes to protecting an infrastructure, careful planning and coordination needs to take place. Protecting an infrastructure takes an important security initiative called Critical Infrastructure Protection (CIP). The United States critical infrastructure is protected by the Department of Homeland Security.
What concerns the government of the United States most is the security of the critical infrastructure from the cyber threats. The nation is depending heavily on the technology in most of its critical sectors to keep it up and running. Thus, this makes its more vulnerable to cyber-attacks from outsiders and insiders. Therefore, its protection must be a priority.
There is a lot of complexity in understanding risk management and its correlation to homeland security. Risk management is a way to approach the fact that securing the homeland is not certain and there are unknown variables in every aspect of life; risk management is a way to narrow down the focus based on quantifiable information determining probability against capability. Risk management plays and integral role in homeland security. Risk management is employed using a formula described in the NIPP for establishing a narrow scope to make the best decision about protecting infrastructure. The risk management formula lays down the foundation to make the most reasonable determination based on the potential consequences, vulnerability, and
National and International Security is a sum of the actions taken by countries and other organizations that can guarantee the safety and well being of their population. It is vital for a nation to pre-emptively discover what issues could affect their security, and take action to prevent any detrimental or harmful events from happening. With the development of technology and the transition into a more technologically savvy society, cyber security has become one of the most prevalent and important economic and national security issues that the United States will come to face.
To prevent tragedies like 9/11 from taking its toll on the United States, terrorism needs to be thought about still to this day. One quote that proves this point is, “In 2001, the federal commission warned that terrorists could get weapons that could cause mass destruction. Congress needs to work on the integrated governmental structures to better the nation's security” (Augustine). The nation's security can help with the destruction of weapons that are dangerous to the U.S. This can cause more attacks like 9/11 and create a larger threat to the population.
Unequivocally speaking, the threat of a cyber-attack has become one of the most critical domestic and national security challenges we face as a nation today. Infrastructures supporting government operations are ...