Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Cyberterrorism and possible consequences
How cyber terrorism works
How cyber terrorism works
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Cyberterrorism and possible consequences
Cyberterrorism
Introduction
Cyberterrorism is the convergence of terrorism and cyberspace. It is generally
understood to mean unlawful attacks and threats of attack against computers,
networks, and the information stored therein. Possibly to intimidate, influence a
government or its people to further political or social gain. To qualify as
cyberterrorism, an attack should result in violence against persons or property, or
generate fear. Attacks that lead to death or bodily injury, explosions, plane
crashes, water contamination, or severe economic loss would be examples, serious
attacks against important infrastructures could be acts of cyberterrorism,
depending on their impact. This essay will illustrate and analyse the main issues
and ideas behind cyberterrorism. This will include information that has led to the
internet being used in a mailicous way, ethical issues, paradigms that
cyberterrorism follows, motivations and incidents that have occurred in the past.
One FBI spokespersons definition is-
'Cyber terrorism' means intentional use or threat of use, without legally
recognized authority, of violence, disruption, or interference against cyber
systems, when it is likely that such use would result in death or injury of a
person or persons, substantial damage to physical property, civil disorder, or
significant economic harm'.
Cyber attacks and effects
Cyberspace is constantly under assault. Cyber spies, thieves, saboteurs, and thrill
seekers break into computer systems, steal personal data and trade secrets,
vandalize Web sites, disrupt service, sabotage data and systems, launch computer
viruses and worms, conduct fraudulent transactions, and harass individuals and
companies. These attacks are facilitated with increasingly powerful and easy-to-use
software tools, which are readily available for free from thousands of Web sites on
the Internet. Many of the attacks are serious and costly. The ILOVEYOU virus for
example, was estimated to have infected tens of millions of users and cost billions
of dollars in damage.
In light of these serious threats from cyberspace, it is worth noting that the
discourse on cyberterrorism is something that – fortunately has not been
carried out in its most destructive capabilities. It is, therefore, d...
... middle of paper ...
...ital
world today. In addition to cyberattacks against digital data and systems, many
people are being terrorized on the Internet today with threats of physical violence. On
line stalking, death threats, and hate messages are abundant. These crimes are serious
and must be addressed. In so doing, governments around the world will be in a better
position to police and respond to cyberterrorism if and when the threat becomes
imminent.
Sources
Author Unknown. "Cyber Terrorism: Understanding Cyber Threats"
https://www.hamiltoncountyohio-tewg.org/cyber_terrorism/
Aldo Leon. "The New Age of Cyberterrorism"
http://www.sabianet.com/Res_The%20New%20Age%20of%20Cyberterrorism.pdf
Dorothy E. Denning. "Cyberterrorism" http://palmer.wellesley.edu/~ivolic/pdf/USEM/Cyberterror-Denning.pdf
Mohamed Chawki. "A Critical Look at the Regulation of Cybercrime"
http://www.crime-research.org/library/Critical.doc.
Robert Malý. "Virtual communities and cyber terrorism"
http://www.unob.cz/spi/2007/presentace/2007-May-03/06-Jirovsky_CyberTer.ppt.
Peter Reilly. "How Real is the Threat of Cyber Terrorism?" http://www2.lhric.org/security/desk/letter8.html
In the United States, local, state, and federal law enforcement agencies, including FBI, Department of Homeland Security, among others, have taken on roles to fight computer crimes and terrorism. The roles and responses of these law enforcement agencies concerning digital crime have created challenges that limit enforcement efforts against digital crime.
Although an act of cyberterrorism has yet to occur, officials and scholars continuously study the possibilities of such an attack. As our physical and virtual worlds continue to intertwine the risk of such an event rapidly increases. Everything from our transportation systems to pharmaceutical manufacturing are computer controlled. The closest the world has come to an act of cyberterrorism was in 2000. Known as the Maroochy Shire case in Queensland, Australia was committed by Vitek Boden. Boden was an engineer for Pacific Paradise, a sewage pumping in Australia. He was able to successful hack into a control system modifying the operations and dumping millions of litres of raw sewage into the local waterways. Boden’s motivation was the only reason the act was not classified as cyberterrorism was his motivation. It was personal rather than political or religious in nature (Sharp Parker, 2009). The only reason this wasn’t the first act of cyberterrorism was motivation. As companies invest in upgrading their technological capabilities, they too need to invest in security structure to protect their systems and the public from threats of terrorism. Our government must also decide how to address public safety in regards to cyberterrorism. On September 11th, 2001 America was reminded how vulnerable we are when it comes to acts of terrorism. The sheer complexity and varying design of attacks often makes it very difficult to create a catch-all defense in fighting terrorism. To improve the disruption of terrorist activities by government agencies in the United States many laws needed to be updated to include the latest areas of electronic communications.
the problem is much more pressing than it has in the past, and both the
Ecoterrorism is hard to define. It is used by the FBI and other government agencies to describe individuals or groups that use arson and sabotage against property, equipment, materials, or facilities that they feel are being used to destroy the environment. This is known as direct action and many such direct action tactics exist such as ecotage, eco-drama and monkeywrenching. Ecotage Acts of major economic sabotage that are designed to hurt the profits of businesses that radical environmentalists believe are profiting from environmentally harmful practices. Eco-drama (Staging non-violent, often illicit events that cause no property damage, but that are designed for the sake of gaining media attention for an environmental cause or to expose an environmental abuse. This type of action is often designed to spur a law enforcement response to maximize sympathetic media attention. Monkeywrenching was made popular by Edward Abbey's fictional work The Monkey Wrench Gang (1975). It generally refers to minor acts of vandalism or sabotage that are undertaken to frustrate the perpetrators of a perceived environmental harm (CITE).
Cyber activity has increased exponentially while security strategies lack behind. Defence funding identifies Australia’s defence priorities over the last decade highlighting counter-terrorism as the biggest security risk . The 2013 National Security Strategy continues to identify counter-terrorism as its main threat. Concern over cyber crime is apparent with the strategy, encouraging integrated policy development , yet the threat has no substantial counter strategy . In recent years the large-scale information breaches release and published online represent the vulnerability of systems including infrastructure. The case studies of Anonymous and Ransomeware raise the question of the Governments ability to counter cyb...
The morning of September 11, 2001, Americans experienced vulnerability and realized a new fear, the threat of a bioterrorist attack. In the days that followed the terrorist attacks letters tainted with anthrax began appearing in the U.S. mail. Five Americans were killed and 17 were sickened in what became the worst biological attacks in U.S. history (“Amerithrax or Anthrax Investigation”). Bioterrorism is defined as a criminal act against unsuspecting civilians and a threat to national security with the deliberate release of viruses, bacteria, or germs. An attack of bioterrorism is meant to cause illness or death by microorganisms that are found in nature, but they can be made more harmful because of an increased ability to cause and spread disease which resists medical treatment. These biological agents can spread from person to person or can be released into the food supply, water, or air. They can be hard to detect because they may not cause illness for hours or several days, thus giving terrorists an advantage allowing them to go escape undetected until symptoms arise and an attack is suspected. Biological weapons are appealing because they are often easy to obtain and inexpensive, and can be easily distributed. The main objective of bioterrorism is to cause panic and terror, not necessarily casualties. The social disruption they cause can be far worse than any actual damage.
important problem. This problem must be focused on and dealt with or the world is going
What concerns the government of the United States most is the security of the critical infrastructure from the cyber threats. The nation is depending heavily on the technology in most of its critical sectors to keep it up and running. Thus, this makes its more vulnerable to cyber-attacks from outsiders and insiders. Therefore, its protection must be a priority.
We have many global problems, but we are lacking global institutions powerful enough to effectively address such problems as global terrorism, human rights abuses, global warming, the ozone layer, pollution of the oceans and rivers, arms trade, child soldiers, war, the weaponization of space, and nuclear and other weapons of mass destruction. Finding a way to participate in solving these and other global problems is one of the great challenges of our time.
Terrorism and Technology It wasn’t until the morning of September 11th that America began to question just how safe we really are. As the world watched the devastation on the news, everyone was looking for comfort. However, often times when something as horrific as this happens, the ones you look to for comfort are looking back at you for comfort. Many people found what piece of mind they could, through technology, during this horrible time. The September 11 terrorist attacks have had both positive and negative impacts on the use of computers and technology.
...communication technology have led to more dependency to internet connectivity. As world is changing into a global village cyber space has turned up the busiest and easily accessible market. Terrorists used this technique because it is very low cost, easy to manage or control and less chance to be apprehended. Terrorist easily achieve their goals by using this field of terrorism. Many states faced the menace of cyber terrorism which leads towards the disruption of their infrastructure, loss of data system jeopardizing their internal security and many more. Some states have taken strong measures against these attacks like US whose Department of Defense worked to tackle these threats. It is necessary that on international level states must cooperate with each other and promote those organizations which are formed only to stop the threat of cyber terrorism.
need to be dealt with. These problems are not just intended for a certain group who are facing
In summary there are many problems that currently affect the response to cyber crime and cyber terrorism. We need to collectively address this problem more seriously, and begin training our security departments thoroughly, as well as establish diplomatic boundaries and international laws about cyber terrorism threats in an aid to keep terrorist groups at bay. Knowledge is power, and the more educated the American people are about cyber threats, the safer our great country will be.
The only counter measures taken so far that have been revealed is that the 300 Internet addresses were shut down in May 2010. The very recent public notification of this cyber-attack will continue to unfold and new implemented strategies to prevent a reoccurance remain to be seen. As a patriot of this great nation, what has been presented is of extreme, if not grave, concern. The challenges of cyberculture to our nation’s security have been revealed. To what extent our security has been breached is a matter of speculation but be informed that these breaches must be met with complete counter-active success - failure to do so is not an option. .
There are different groups, from law enforcement agencies to the U.S. Secret Service, that are attempting to combat the problem through cooperation and preemptive efforts. If these groups combined with the public to protect themselves and the country from criminals that commit cybercrime, the nation’s network and technology servers would be much safer for technology users. Clearly, cybercrime is a problem because it puts internet users at risk of being taken advantage of or harmed. The advantages of technology and the internet have led more criminals to use cyberspace to commit crimes. The threat of cybercrime is increasing as globalization continues to spread across the world.