"Information systems are vulnerable and it is possible for terrorists to utilize the vulnerabilities of information systems to attack their adversaries" (Hua & Bapna 2013). Since the events of 9/11 the world has watched as terrorism has slowly began to escalate not only in severity but frequency however, until recently nations including the United States have been more focused on traditional methods of terrorism and paid little effort to the growing concern of cyberterrorism. Hua and Bapta (2013) define cyberterrorism as: ”Attacks implemented by cyber terrorists via information systems to (1) significantly interfere with the political, social or economic functioning of a critically important group or organization of a nation, or (2) induce physical violence and/or create panic. We define hackers as individuals who (1) wish to access/modify data, files, and resources without having the necessary authorization to do so, and/or (2) wish to block services to authorized users. Cyber terrorists are individuals or groups who utilize computing and networking technologies to terrorize. In this paper, we study the behaviors of two groups of hackers: cyber terrorists and common hackers" (Hua & Bapna 2013). While there are several competing if loosely defined definitions of cyberterrorism, Hua and Bapta have clearly broken down the core elements to illuminate the nuances between traditional terrorism and an ordinary hacker. As Hua and Bapta aptly state, "modern economies are heavily dependent upon Information Technology (IT) based information systems for survival" (Hua & Bapna 2013). Given our dependence on Information Systems, some effort of consideration must be given to securing them. There currently exists no international cooperative ... ... middle of paper ... ...tors responsible for securing these systems. Hopefully preventative measures can be deployed before a critical attack occurs. Works Cited Hardy, K. (2011). WWWMDs: Cyber-attacks against infrastructure in domestic anti-terror laws. Computer Law & Security Review, 27(2), 152-161. doi:10.1016/j.clsr.2011.01.008 Hua, J., & Bapna, S. (2013). The economic impact of cyber terrorism. Journal Of Strategic Information Systems, 22(2), 175-186. doi:10.1016/j.jsis.2012.10.004 Janairo, E. (2002). States fight against cyber-terrorism: cyber-attacks could intensify a terrorism attack and severely damage the nation's ability to fight crime. (terrorism). State Government News, (3), 30. Zetter, K. (2012, September 26). Maker of Smart-Grid Control Software Hacked. Wired.com. Retrieved November 23, 2013, from http://www.wired.com/threatlevel/2012/09/scada-vendor-telvent-hacked/
Future Crimes is a gripping book about the plethora of risks that encompass cybersecurity based crimes; Future Crimes delivers a staggering glimpse into the dark side of technological innovation and addresses the inadvertent consequences of our connected world. Future Crimes is written by one of the world’s leading authorities on global security, Marc Goodman. “Marc Goodman is a global strategist, author, and consultant focused on the disruptive impact of advancing technologies on security, business, and international affairs. Over the past twenty years, he has built his expertise in next generation security threats such as cybercrime, cyber-terrorism, and information warfare working with organizations such as Interpol, the United Nations,
Modern society relies more on computers and the Internet now than ever before as a means to exchange information. Computer infrastructures are continually evolving and developing which has lead to an increase of reliance on technology, and an increasing amount of personal data being shared between computers and over the Internet. For these reasons it imperative to keep these infrastructures safe from those who do not belong or mean to cause harm, commonly called hackers. Hackers are people who gain unauthorized access to someone else’s computer. Hacking is wrong when financial or personal gain is achieved (Jamil and Khan 2011), but there are three types of hackers. ‘White Hats’ are hackers who use their computer skills for ethical reasons, ‘Black Hats’ use their skills in unethical or illegal ways and ‘Gray Hats’, also known as vigilantes or hacktivisits (Hackers 2009), their skills to investigate criminal activity but perform it in an illegal manner.
Taylor R., Caeti T. and Fritsch E. (2010). Digital crime and digital terrorism. New York: Prentice Hall.
In the future, cyber crime will become the leading threat to the safety and security of the American people. Experts on cyber crime agree that cyber crime is an issue that needs to be focused on more in-depth because the wide-spread use of computers by the global economy has made the use of computers and internet vital to everyday life (Siegel, 2009; FBI, 2011). There are 3 major types of cyber crime which includes: cyber fraud, cyber vandalism, and cyber terrorism (Seigel, 2009; Thio, 2010). Cyber terrorism, the more dangerous of the 3, is defined as the use of digital equipment to bring down a country by tapping into its computer based programs and dismantling its infrastructure which includes but not limited to: banking networks, air traffic control systems, gas and oil production, transportation, and emergency services that all rely on computer networks to function (Thio, 2010). Director of National Intelligence, Dennis Blair and Thio (2010), both agree that it is America’s huge dependence on the cyber world for its critical life support functions that makes it severely vulnerable to succumbing to an unprecedented electronic attack. Just like a traditional attack, Cyber terrorism can lead to death or bodily injury, explosions, plane crashes, water contamination, or severe economic loss (Thio, 2010).
Till date, various hostile acts of cyber warfare have been observed between nations, terrorist and activist groups. With growth of access to computers and the Internet, civilians have become victims as well as perpetrators.
The constant threat of cyber terrorism is just one of many different strategic weapons a country can use to fight another country. As long as the World Wide Web is up and operating, the threat of viruses and others will forever be a serious issue to computer networks all over the world. The internet will become a battlefield for countries to see who can strike the fatal blow network wise that could potentially bring a country to its knees. Computer systems and networks are a vital part of communications used by not only the citizens of the United States, but also the federal government and military
Cyberterrorism is an act that is planned beforehand, which disturbs the natural functioning of electronic devices for political gain (Maggio, 2009). One important factor that determines whether an act is considered cyberterrorism is it has to hurt someone or something and cause enough damage to create fear (Maggio, 2009). Some examples of cyberterrorism are shutting down servers that control power grids hacking into a railroad track system to cause accidents. Hacktivists can sometimes be confused as cyberterrorists (Maggio, 2009). Generally, hacktivists do not cause as much damage as cyberterrorists but there are similarities (Maggio, 2009). Such as political motivations, and damaging property (Maggio, 2009).
The world is currently in an era of technology where any information is almost immediately available. This includes information in areas such as stock exchanges, weapons, banking information, corporate transactions, and governmental secrets. Every industry is becoming so tightly coupled with the internet that the concept of being disconnected is almost unthinkable. However, increased connectivity means increased risk. All of this information is not only available for people to learn from and use positively, it has considerable potential to be used to harm. Terrorists have the ability to use these resources to their advantage in gaining strategic information about their targets and use it in an attack. However, these potential threats do not only come from outside forces.
Stohl, M. (2007). Cyber terrorism: A clear and present danger, the sum of all fears, breaking
Thus far we have scratched the surface of the ever-perplexing problem of terrorism. As it has evolved those in the position of countering it have also gained some valuable experience. Even with this knowledge it is very difficult, bordering on impossible to prevent terrorist acts from occurring. In the recent past there has been an extra element added to this confusing and dangerous equation, the Internet and other computer capabilities. Cyber-terrorism is a realistic possibility but is it as detrimental as other forms of conventional terrorism such as a car bomb? I will argue that the implications of a cyber attack could be just as harmful.
As of today, many members of society have become very dependent on the use of technology. We rely on the Internet for banking, buying things, and staying in touch. Businesses rely on their networks for interacting with clients, processing transactions, reaching new markets. Transportation, financial, energy, and communications systems, as well as our government and military, rely heavily on computer networks to function. This is how you get your electricity, your Social Security check, and your veterans benefits. The use of computers and the networks related to them has developed problems concerning cyber security. Cyber security is an important issue to be considered if people want protection from malicious people and software coming from the internet. Cybercrime primarily are individuals who seek personal gain and most computer network threats come fro...
The nation has become dependent on technology, furthermore, cyberspace. It’s encompassed in everything we deliver in our daily lives, our phones, internet, communication, purchases, entertainment, flying airplane, launching missiles, operating nuclear plants, and implicitly, our protection. The more ever-growing technology empower Americans, the more they become prey to cyber threats. The United States Executive Office of the President stated, “The President identified cybersecurity as one of the top priorities of his administration in doing so, directed a 60-day review to assess polices.” (United States Executive Office of the President, 2009, p.2). Furthermore, critical infrastructure, our network, and internet alike are identified as national assets upon which the administration will orchestrate integrated cybersecurity policies without infringing upon and protecting privacy. While protecting our infrastructure, personal privacy, and civil liberties, we have to keep in mind the private sector owns and operates the majority of our critical and digital infrastructure.
Our nation's infrastructure is daily becoming much more of an abstract environment due to the use of organized cyber criminals hacking away at our super computer information systems. They are generating unpredictable challenges for law enforcement in discovering the unethical abuse on computer systems and a concentration on the young topic of cyber terrorism threatening our criminal justice system. Our law enforcement continues to invent newer methods to function and learn from this new social phenomenon and define cyber terrorism activity as motivation by the rapid growth of technology as a challenge, dominance, and as pleasure to obtain privileged information for illegal use to intentionally harm others and our information networks as well. Therefore, it is of relevance to explore the behavior of a computer hacker and a cracker; including the control, response, and the appropriate measures to combat this new crime wave, and how the academic community, courts, police, and the scientific government are approaching this radical form of crime.
The advantages of technology and the internet have led more criminals to use cyberspace to commit crimes. The threat of cybercrime is increasing as globalization continues to spread across the world. While the impact of globalization has led to amazing, new discoveries throughout the world, Internet connectivity has also made cybercrime easier. America and the rest of the world have become more reliant on technology and use it in more aspects of their lives, technology-users make themselves more vulnerable to cyber attacks. Globalization and the growing use of computers in the world have given people a motive to learn more about computing and become more knowledgeable as programmers. As these people learn more, there is a risk that they will use their new intelligence to commit cybercrimes.
A cyberextortionist is someone who demands payment to stop an attack on an organization’s technology infrastructure. For example, these criminals threaten to expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization’s network. A cyberterrorist is someone who uses the Internet or network to destroy or damage computers for political reasons. Cyberwarfare is an attack whose goal ranges from disabling a government’s computer network to crippling a country. Cyberterrorism and cyberwarfare usually require a team of highly skilled individuals, millions of dollars, and several years of planning (Zheng and Rutherford).