Free Essay

Cyber Terrorism

In: Other Topics

Submitted By sunnytaank
Words 4466
Pages 18
12/31/13

Cyber Terroism

Cyber terrorism is a combination of two terms Cyber and terrorism. The word "Cyber" is derived from "cybernetic", a word from Greek "kybernetes", meaning "To steer" and the term "terrorism" comes from French terrorisme, from Latin word 'terror', "great fear", "dread", related to the Latin verb terrere, "to frighten". Cyber terrorism denotes unlawful attacks and threats of attack against computers, networks and information stored therein to intimidate or coerce a government or its people for propagating hidden political or unlawful social and religious agendas. These attacks result in violence against persons or property or cause public unrest. Few examples could be explosions, plane crashes and severe losses. Terrorists are known to use internet to prepare the schemes, raise funds and spread cyber terrorism. For instance, Razmi Yousef who was a key person behind World Trade Centre attack had details schemes to destroy United States airliners encrypted files in his laptop computer. We know that Cyber terrorism is the crime that has emerged in recent times, to use the medium of Internet to terrorize the minds of citizens. Admirably, the Laws through the implementation of the Information technology Act, 2000, is one of the efficient steps taken towards the creation of punishment of these kinds of crimes. There is need of innovative laws and global standards on preventive action. The Indian Information Technology Amendment Act 2008 lays down Section 66F as a specific provision dealing with the issue of cyber terrorism that covers denial of access, unauthorized access, introduction of computer contaminant leading to harm to persons, property, critical infrastructure, disruption of supplies, ‘sensitive data’ thefts, acts which are punishable with imprisonment which may extend to imprisonment for life. Definitions: Terrorism and Cyber Terrorism What is Terrorism? Terrorism can be defined as “The unlawful use or threatened use of force or violence by a person or an organized group against people or property with the intention of intimidating or coercing societies or governments, often for ideological or political reasons”- (Denning, 2000, pp. 54-55). What is Cyber terrorism? “The premeditated, politically motivated attack against information, computer systems, computer programs, and data which result in violence against noncombatant targets by sub national groups or clandestine agents.” -Mark M. Pollitt “[the] use of information technology and means by terrorist groups and agents.”-Serge Krasavin “Politically motivated hacking techniques used in an effort to cause grave harm, included but not limited to loss of life or serious economic damage.” -Larisa Paul Labeling a “cyber attack” as “cybercrime” or “cyber terrorism” is problematic because of the difficulty determining with certainty the identity, intent, or the political motivations of an attacker. “Cybercrime” can be very broad in scope, and may sometimes involve more factors than just a computer hack. “Cyber terrorism” is often equated with the use of malicious code. However, a “cyber terrorism” event may also sometimes depend on the presence of other factors beyond just a “cyber attack.” Pure Cyber Terrorism The concept of ‘pure’ cyber terrorism — that is, terrorism activities that are carried out entirely (or primarily) — in the virtual world is an interesting one. The Internet provides many different ways of anonymously meeting with ‘like minded’ individuals in a (comparatively) safe way. Furthermore, successful cyber terrorism event could require no more prerequisite than knowledge — something that is essentially free to the owner once acquired, and an asset that can be used over and over again. Thus, it would be possible that such an environment could facilitate the creation of entirely new terrorist groups — no duty would be required for actions, and members could organize themselves quickly and easily in the anonymity of cyberspace. This is very different from certain examples given above, where the computer can aid the task of the terrorist, but ‘real’ resources are still required to execute the plan. It is this pure cyber terrorism that most writers mean when they discuss the dangers posed by the cyber terrorist, and this compartmentalization poses a significant barrier to our ability to protect ourselves.

12/31/13

Cyber Terroism

One question that has not been adequately addressed in the literature is what this terrorism might look like. At this time, there is much confusion, based largely upon lack of agreement in definitions. However, using ‘traditional’ terrorism models should help make the situation more suited to analysis, and this is certainly a topic for future research. Characteristics of Cyber - Terrorism Generally speaking Cyber- terrorism has several distinct characteristics. These features help to better differentiate the time-line between a cyber- terror attack versus a cyber attack or activities of a hacker. Cyber- terrorism will or may display following codes. Attack is predefined and victims are specifically targeted. Attack has an objective to destroy or damage specific targets such as political, economic, energy, civil, and military infrastructure. Attack may even target specific opposing religions group’s information infrastructures to insight religious racket. The purpose of any attack is to create fear of the group’s intentions and further their own political agenda or goals or gain fellowship by succeeding in their attacks. Destroy enemy’s capabilities to further operate within their own arena. Persuade others to believe that the victim or victims are vulnerable and their stability negligent. Create increased loyalty and pride within the group based on their successes. Cyber Terrorists- Who are they? While thinking about the cyber terrorists, two questions can be easily created by an intellect. i) Are they existing terrorists groups, or ii) Are they newly created organizations? While there are some groups of “pure” cyber terrorists in operation in the world the main threat would seem to come from groups that have historically operated in the “real” world. In this era, terrorist organizations, which generally get no access to television or radio communication, can easily broadcast their messages to the entire world via the Internet.In fact, many of the largest terrorist groups either maintain their own website, or have sites dedicated to them. Aum Shinrikyo, the group who chest rated the gas bombing on Tokyo subways, operates its own site. HIZBULLAH, the Party of God, an anti- West and an Anti- Israeli terrorist organization, has been implicated in many noxious attacks which includes the bombing of United States military barracks in Beirut also having its own site. These sites allow terrorist organizations to reach ultimate target audience - The world wide population. From American point of view, the most dangerous terrorist group is Al- Queda which is the first enemy of the United States. According to the US officials data from computer seized in Afghanistan indicate that the group has scouted systems that control US energy facilities, water distribution, communication systems and other critical infrastructure. A study that covered the second half of the year 2002 showed that the most dangerous nation for originating malicious cyber attacks in the US with 35.4% of the cases down from 40% for the first half of the same years. South Korea came next with 12.8%, followed by China with 6.2%, then Germany with 6.1%, followed by France and UK with 4% and 2.2% respectively. According to the same study, Israel was the most active country in terms of number of cyber attacks related to the number of internet users. The Unix Security Guards (USG) a pro- Islamic group launched a lot digital attacks in May 2002. Another group called World’s Fantabulous Defacers (WFD) attacked many Indian sies. Also there is another pro- Pakistani Group called Anti Indian Crew (AIC) who launched cyber attacks against India. Also there are many Palestinian and Israeli groups fighting each other through the means of digital attacks. Cyber Terrorism – An Appealing choice

12/31/13

Cyber Terroism

There are quite a few reasons for cyber terrorism becoming an appealing and attractive option for the terrorists. They are It’s economical than any other traditional terrorist methods. They just need a personal computer and an online connection to create all kind of these chaoses. Cyber terrorism is anonymous to a very greater extent than normal terrorism. Here terrorists use some kind of nicknames or may log on to a website as an unspecified “guest user”. The multiplicity of targets. The cyber terrorist could aim the computers and computer networks of governments, individuals, public utilities and so forth. This kind of terrorism does not need any kind of physical training, psychological investment, and no risk of morality is faced by them etc Next, as the I LOVE YOU virus showed, cyber terrorism has the potential to affect directly a large number of people than traditional terrorist methods, thereby generating greater media, which is ultimately what terrorists want. Cyber Terrorism – Is the hazard authentic? The peril imposed by cyber terrorism has snatched the attention of the world mass media, the security population, and the Information Technology (IT) industry. Journalists, politicians, and experts in a variety of fields have popularizes a scenario in which sophisticated cyber terrorists electronically break into computers that control dams or air traffic systems, wreaking havoc and endangering not only millions of lives but national security itself. We know that the most critical infrastructure in Western Societies is networked through computers, so any kind of threat from cyber terrorist is highly alarming. Our dependence on IT is growing day to day and it has created vulnerability giving terrorist the chance to approach targets that would otherwise be utterly unassailable, such as national defense systems and air traffic control systems. So in short, the most technologically advanced country is most vulnerable to the cyber terrorist attacks. General John Gordon indicated that whether someone explodes a bomb that cause bodily harm to innocent people or hacked into a web-based IT system in a way that could, for instance take a power grid offline and result in blackout, the result is ostensibly the same. He also stated that the potential for terrorist cyber is real. Identifying Cyber Terrorism The definition of computer attack includes any actions directed against computer systems to disrupt equipment operations, change processing control, or corrupt stored data. Different attack methods target different weaknesses and involve different types of weapons. Several of these methods may be within the current capabilities of some terrorist groups. Three different methods of attack are identified, based on the effects of the weapons used. However, as technology evolves, distinctions between these methods may begin to blur. These methods are the following: A physical attack involves conventional weapons directed against a computer facility or its transmission lines; An electronic attack (EA) involves the use the power of electromagnetic energy as a weapon, more commonly as an electromagnetic pulse (EMP) to overload computer circuitry, but also in a less violent form, to insert a stream of malicious digital code directly into an enemy microwave radio transmission; Electronic attack methods employ the uses of computer viruses, logic bombs, Trojan horses, and (distributed) denial of service attacks to break software. A relatively new addition to the list is the use of “bot nets”. It is estimated that thousands of computers connected to the Internet are infected with remote controlled “bot” software. These computers, otherwise known as “zombies”, are activated only when needed and are used by the cyber terrorist to collectively attack a selected target server (Hacking Exposed). A computer network attack (CNA), usually involves malicious code used as a weapon to infect enemy computers to exploit a weakness in software, in the system configuration, or in the computer security practices of an organization or computer user. However, CNA may also occur when an attacker uses stolen information to enter restricted computer systems. The physical attacks are focused towards destroying hardware using electronic waves or pulses. These devices effectively “microwave” a circuit board causing temporary or even permanent damage. Leading technologies are listed and defined as:

12/31/13

Cyber Terroism

• T.E.D. (TRANSIENT ELECTROMAGNETIC DEVICE) (Schriner) (Radio Frequency Weapons and Proliferation) T.E.D.s is an inexpensive, yet powerful, method of delivering radio frequency (RF) interference into a circuit. T.E.D.s delivers a spiked-pulse of energy, as opposed to the traditional RF device which delivers a fluid sine-wave flow of energy. • R.F. WEAPON (RADIO FREQUENCY WEAPON) (Schriner) (Radio Frequency Weapons and Proliferation) Uses a flowing sine-wave pattern of energy to excite particles. This can be projected by using a parabolic reflection vector. An example might be to modify a microwave by putting a salad bowl around its wave emitter. The salad bowl would project and focus the energy along a particular line. • R.F. MUNITIONS (RADIO FREQUENCY MUNITIONS) (Cereijo) R.F. weapons are also packaged as R.F. Munitions, which use explosives to produce radio-frequency energy. In the hands of skilled Cuban scientists, these munitions come as hand grenades or mortar grounds. • ELECTROMAGNETIC PULSE (Definition) An electromagnetic pulse (EMP) is an intense burst of electromagnetic (EM) energy caused by an abrupt, rapid acceleration of charged particles, usually electrons. An EMP can contain energy components over a large part of the EM spectrum, from very-low-frequency (VLF) radio to ultraviolet (UV) wavelengths. An EMP is found in lightning strikes and high-altitude nuclear explosions, and destroys all electrical circuits within its range. • T.E.M.P.E.S.T. (TRANSIENT ELECTRO MAGNETIC PULSE EMULATION STANDARD) (The Complete, Unofficial TEMPEST Information Page) A U.S. government code word that identifies a classified set of standards for limiting electric or electromagnetic radiation emanations from electronic equipment. EM radiation emanations from computers and specifically monitors can be intercepted and used to recreate the images produced by a computer screen. Forms of Cyber Terrorism (I) Privacy violation: The law of privacy is the recognition of the individual's right to be let alone and to have his personal space inviolate. In recent times, however, this right has acquired a constitutional status, the violation of which attracts both civil as well as criminal consequences under the respective laws. The intensity and complexity of life have rendered necessary some retreat from the world. Man under the refining influence of culture, has become sensitive to publicity, so that solitude and privacy have become essential to the individual. Right to privacy is a part of the right to life and personal liberty enshrined under Article 21 of the Constitution of India. With the advent of information technology the traditional concept of right to privacy has taken new dimensions, which require a different legal outlook. To meet this challenge recourse of Information Technology Act, 2000 can be taken. The various provisions of the Act aptly protect the online privacy rights of the citizens. Certain acts have been categorized as offences and contraventions, which have tendency to intrude with the privacy rights of the citizens. (II) Secret information appropriation and data theft: The information technology can be misused for appropriating the valuable Government secrets and data of private individuals and the Government and its agencies. A computer network owned by the Government may contain valuable information concerning defence and other top secrets, which the Government will not wish to share otherwise. The same can be targeted by the terrorists to facilitate their activities, including destruction of property. It must be noted that the definition of property is not restricted to moveables or immovables alone. In R.K. Dalmia v Delhi Administration the Supreme Court held that the word "property" is used in the I.P.C in a much wider sense than the expression "movable property". There is no good reason to restrict the meaning of the word "property" to moveable property only, when it is used without any qualification. Whether the offence defined in a particular section of IPC can be committed in respect of any particular kind of property, will depend not on the interpretation of the word "property" but on the fact whether that particular kind of property can be subject to the acts covered by that section. (III) Demolition of e-governance base:

12/31/13

Cyber Terroism

The aim of e-governance is to make the interaction of the citizens with the government offices hassle free and to share information in a free and transparent manner. It further makes the right to information a meaningful reality. In a democracy, people govern themselves and they cannot govern themselves properly unless they are aware of social, political, economic and other issues confronting them. To enable them to make a proper judgment on those issues, they must have the benefit of a range of opinions on those issues. Right to receive and impart information is implicit in free speech. This, right to receive information is, however, not absolute but is subject to reasonable restrictions which may be imposed by the Government in public interest. (IV) Distributed denial of services attack: The cyber terrorists may also use the method of distributed denial of services (DDOS) to overburden the Government and its agencies electronic bases. This is made possible by first infecting several unprotected computers by way of virus attacks and then taking control of them. Once control is obtained, they can be manipulated from any locality by the terrorists. These infected computers are then made to send information or demand in such a large number that the server of the victim collapses. Further, due to this unnecessary Internet traffic the legitimate traffic is prohibited from reaching the Government or its agencies computers. This results in immense pecuniary and strategic loss to the government and its agencies. It must be noted that thousands of compromised computers can be used to simultaneously attack a single host, thus making its electronic existence invisible to the genuine and legitimate citizens and end users. The law in this regard is crystal clear. (V) Network damage and disruptions: The main aim of cyber terrorist activities is to cause networks damage and their disruptions. This activity may divert the attention of the security agencies for the time being thus giving the terrorists extra time and makes their task comparatively easier. This process may involve a combination of computer tampering, virus attacks, hacking, etc. Difficulty Identifying Attackers Anyone can easily obtain instructions for exploiting computer vulnerabilities via the Internet. However, to date, there is no published evidence linking a sustained or widespread attack using CNA with international terrorist groups. It remains difficult to determine the identity of the initiators of most cyber attacks, while at the same time security organizations continue to report that computer virus attacks are becoming more frequent, causing more economic losses, and affecting larger areas of the globe. For example, the Computer Emergency Response Team Coordination Center (CERT/CC) reports that their office received 137,529 computer security incidents in 2003, up from 82,094 in 2002. The unwillingness of commercial enterprises to report attacks, owing to potential liability concerns, complicates the challenge of identifying the source of the Cyber terrorism. Possible Effects of Cyber Terrorism While the number of random Internet cyber attacks has been increasing, the data collected to measure the trends for cyber attacks cannot be used to accurately determine if a terrorist group, or terrorist-sponsoring state, has initiated any of them. A recent private study found that during the latter half of 2002, the highest rates for global cyber attack activity were directed against critical infrastructure industry companies. A new report on industrial cyber security problems, produced by the British Columbia Institute of Technology, and the PA Consulting Group, using data from as far back as 1981, reported a 10-fold increase in the number of successful cyber attacks on infrastructure Supervisory Control and Data Acquisition systems since 2000. DOD officials have also observed that the number of attempted intrusions into military networks has gradually increased, from 40,076 incidents in 2001, to 43,086 in 2002, 54,488 in 2003, and 24,745 as of June 2004. Costs of Cyber Crime Attacks are becoming more destructive, widespread and more difficult to contain. Post 9/11, there seems to be a greater appreciation for how much information security means not only to each individual enterprise but also to the economy itself and to society as a whole. Following are some economic impact statistics: $17 billion dollars will be spent worldwide on security products and services

12/31/13

Cyber Terroism

$200 - $300 is spent by US companies for every host that needs patching In 2003, $221.2 billion dollars were lost worldwide due to identity theft (up from $73.8 billion in 2002) with $73.8 billion (up from $24.6 billion) of those losses in the United States. The Information Technology Act, 2000 So far as India is concerned in order to combat cyber terrorism through law, the Information Technology (Amendment) Act, 2008 has been enacted to include the same within the meaning of offences and therefore, is made punishable. Though, cyber terrorism has not been defined, but sec. 66(f) of the Information Technology (Amendment) Act, 2008 prescribes as to when cyber terrorism is said to have been committed. Sec. 66(f) of the said Act reads as to the following effect“Whoever:- (A) With the intent to threaten the unity, integrity, security or sovereignty of India or to strike terror in the people or any section of the people by— (i) By denying or cause the denial of access to any person authorized to access computer resource; or (ii) Attempting to penetrate or access a computer resource without authorization or exceeding authorized access; or (iii) Introducing or causing to introduce any computer contaminant; And by means of such conduct causes or is likely to cause death or injuries to persons or to damage to or destruction of property or disrupts or knowing that it is like to cause damage or disruption of supplies or services essential to the life of the community or adversely affect the critical information infrastructure specified under section 70, or (B) Knowingly or intentionally penetrates or accesses a computer resource without authorization or exceeding authorized access, and by means of such conduct obtains access to information, data or computer database that is restricted for reasons for the security of the state or foreign relations, or any restricted information, data or computer database, with reasons to believe that such information, data or computer database so obtained may be used to cause or likely to cause injury to the interests of the sovereignty and integrity of India, the security of the state, friendly relations with foreign states, public order, decency or morality, or in relation to contempt of court, defamation or incitement to an offence, or to the advantage of any foreign nation, group of individuals or otherwise, Commits the offence of cyber terrorism. (2) Whoever commits or conspires to commit cyber terrorism shall be punishable with imprisonment which may extend to imprisonment for life.” Cyber Terrorism threat to India The sensational episodes of online warfare are high against this nation. But still we witness that mostly we are not prepared to counter the cyber terror attack by China and Pakistan against our great India. Recently gaping holes in the Indian e-security environment were shown when a Swedish “ethical hacker” blogged details of e–mail accounts and passwords of several Indian government institutions, including the Defence Research and Development Organization, the National Defence Academy etc. he matter assumes significance particularly because China has been steadily strengthening its ability to wage electronic warfare alongside its rapid (and non-transparent) modernization of its military and armory. Hackers from Pakistan and terrorist organizations are increasing their attacks on Indian websites to provide a new dimension to the ongoing Indo- Pak conflict over Jammu and Kashmir. The terrorist organizations were resorting to the internet and information systems to extend their warfare into a completely new ground to give a new, lost-cost dimension, with maximum effect and reach. Hacker groups from Pakistan like Pakistan Hacker Club had intensified their attacks on Indian websites, especially over the last few years. Some incidents of cyber attack 1. Cyber attacks in Middle East With the Middle East Conflict as a very heated moment between bordering countries Pro- Palestinian and Pro- Israel Cyber Groups have been launching an offensive against websites and mail services used by the political sectors the opposing groups show support for. The attacks had been reported by the NIPC (National Infrastructure Protection

12/31/13

Cyber Terroism

Center) in October of 2000 to U.S officials. The attacks were a volley of e-mail floods. DoS attacks and Ping flooding of such sites as the Israel Foreign Ministry, Israeli Defense Forces, and in reverse, sites that belonged to groups such as Hamas and Hezbollah. 2. Cyber attacks between Pakistan and India As tensions between the neighboring regions of India and Pakistan over Kashmir grew over time, Pro- Pakistan cyberterrorists and recruited hackers began to target India’s Internet Community. Just prior to and after the September 11th attacks, it is believed that the sympathizers of Pakistan (which also included members of the Al Qaeda Organization) began their spread of propaganda and attacks against Indian Internet based communities. Groups such as G- Force and Doctor Nuker have defaced or disrupted service to several major entities in India such as the Zee TV Network, The India Institute of Science and the Bhabha Atomic Research Centre which all have political ties. The Group, Pakistani Hackerz Club also went as far as to target the United States Air Force Computing Environment and the Department of Energy’s website. Conclusion Now it’s high time to take action. It is a fact that counter terrorists are duty bound to save property and lives. We all are increasingly connected, dependent and vulnerable. With combination of knowledge, responsibility and expertise, a counter- cyber terrorism team can build an effective policy for preventing cyber terrorist incidents, managing threats and responding to Cyber- Terrorist acts. So now we agree the fact that the traditional concepts and methods of terrorism have taken new dimensions, which are more deadly and destructive in nature. The damage so produced would be almost irreversible and most catastrophic in nature. The law dealing with cyber terrorism is however not adequate to meet the precarious intentions of these cyber terrorists and requires a transformation in the light and context of the latest developments all over the world. The laws have to take care of the problems originating at the international level because the internet, through which these terrorist activities are carried out, recognizes no boundaries. Thus a cyber terrorist can collapse the economic structure of a country from a place with which a country may not have reciprocal arrangements, including an “extradition treaty”. The only safe guard which is available to us is to use the latest technology to counter these problems. Thus, we understand that a good combination of the latest security technology and a law dealing with cyber terrorism is the need of the hour.

7/7

Similar Documents

Free Essay

Cyber Security: Cyber Terrorism

...Introduction Cyber security refers to the practices and processes that are used in technologies such as networks, computers, information and programs from damages by unwarranted entities (Ahmad, Yunos & Sahib, 2012). There are different attacks towards technology which may distort information or be used to create tension in an organization. Information stored in computers has some level of privacy and this depends on the level of sensitivity that such information may have towards that organization. Business strategies, political discussions and government documents are some of the documents that require a higher degree of privacy. However, there are individuals who cause deliberate attacks on the information systems of organizations and governments in order to unlawfully access information or distort the meaning of such data. The intention of cyber attacks has led to the classification of these attacks into particular classes. For example, we have cyber bullying and cyber terrorism. Under cyber bullying, the attackers use technology to abuse and intimidate their targets. Cyber bullying has been common through the presence of the social media where an individual will use pseudo-accounts to publish half truths about others with a bid to embarrass them. On the other hand, cyber terrorism involves the use of technology to access vital government sites in order to cause harm and fear in the society through terrorism activities. Brunst (2010) indicates that cyber terrorist......

Words: 1810 - Pages: 8

Premium Essay

Cyber Terrorism

...CYBER TERRORISM Table Of Contents Section Page Abstract----------------------------------------------------------3 Introduction-----------------------------------------------------4 Premise----------------------------------------------------------5 Research Methodology----------------------------------------5 Research Results-----------------------------------------------6 Critical Analysis------------------------------------------------9 Conclusion-------------------------------------------------------30 Appendix---------------------------------------------------------31 Bibliography----------------------------------------------------56 Abstract FBI cyber security division computers are hacked into at the same time that known hackers capable of performing this have their computers hacked into and are blown up when they hit certain keys on their computer keyboards. Traffic lights and the transportation systems are then hacked into and total gridlock and chaos ensure. Wall Street is then affected and cyber money is thought to be dwindling away. This is known as a Fire Sale which has 3 steps. In the first step transportation is shut down then finance and finally, in the third step, utilities are affected. As expected, the media broadcast the government’s next move to everyone including the terrorists. As it turns out, the leader of the terrorists is a former DOD software programmer that had......

Words: 4562 - Pages: 19

Free Essay

Cyber Terrorism

...18 April 2014 Cyber Terrorism in the Age of Modern Technology In June of 1983 a movie produced by MGM called, “WarGames” (1-1983) set off one of the most intriguing films based in what was considered the beginning of the age of home based computers. WarGames despite the obvious age of the technology, gives us an inside look into its paranoid Cold War opening tensions to the staggering moral climax. Directed by John Badham, this cyber-espionage thriller might also be considered a blueprint in cyber terrorism today. In 1995 some 12 years later another movie directed by John Badham called, “The Net” (2-1995) would give us another look into the emerging age of cyber terrorism. A computer programmer stumbles across a disk containing confidential information, then has her not so secured computer hacked into by a company owned by Gregg Microsystems. In the turn of events to follow, she has all of her personal information, history and financial records deleted, then to her surprise, later finds out that her identity is replaced to reflect that she is known as a criminal. Technology in the next 30 years will become more advanced and with it comes a plague of security threats the world has never seen before. The nostalgia of 5½ inch Floppy Discs, Commodore 64s, Apple II and Atari 800 computers being connected to by way of voice synthesizers, 300 baud acoustic couplers, mass prefix dialers, will be everything needed for anyone to start their own cyber terrorism business. The...

Words: 1564 - Pages: 7

Premium Essay

Cyber Terrorism

... Name: Institution: Course: Date: Cyber Terrorism Cyber terrorism vs. Physical terrorism In cases where there are the occurrences of both physical terrorism and cyber terrorism, the people behind it carry out their attacks outside the bounds of conventional warfare. In other words, the terrorists carry out attacks in areas that are not ordinarily considered as battlefields as well as on people not normally considered as military personnel. For example, the attacks may entail an individual dressed as a civilian blowing himself up in a packed place or people dressed like civilians hijacking commercial airplanes and flying them to civilian targets like the World Trade Centre. Physical terrorism differs from cyber terrorism in the sense that the later primarily entails carrying out attacks against information found in computers while the former involves an attack against civilians. Those individuals, who dress up as civilians and blow up themselves in a crowded area like a bus constitutes physical terrorism since the attacks aims at destroying human life. Most likely, cyber terrorists use computers or other similar devices to carry out attacks on information found on computers. Cyber terrorism will have more impact than physical terrorism. The main aim of physical terrorism is to cause loss of life whereas cyber terrorism may entail hacking into a country’s critical infrastructure with the sole purpose of causing great harm such as significant damage on the economy or......

Words: 598 - Pages: 3

Free Essay

Cyber Terrorism: the American Response

...Cyber Terrorism: The American Response Mutale Chisanga School of Computer Science 03-60-305 Professor Kristina Verner March 6, 2016 Cyber terrorism: The American Response United States (U.S.) critical infrastructure faces a growing cyber terrorism threats due to advancements in the availability and sophistication of malicious software tools and the fact that new technologies raise new security issues that cannot always be addressed prior to adoption. The increasing automation of U.S. critical infrastructures provides more cyber access points for adversaries to exploit. Industrial control systems, which operate the physical processes of the U.S. pipelines, railroads, and other critical infrastructures, are at elevated risk of cyber exploitation. The growth of malicious techniques that could degrade, disrupt, or destroy critical infrastructure is a huge concern for the U.S. government. It is also likely the cyber threats will surpass the terrorism threat to U.S. in the years to come (MLI, 2012). Even though only advanced threat actors are currently capable of employing these high level malicious techniques, these capabilities will eventually be within reach of all threat actors. Discussion The potential economic consequences of cyber terrorism attacks are severe. The severity of cyber terrorism are not felt equally across the board. A small company may not be able to survive even one significant cyber-attack. On the other hand, large companies may take a long time...

Words: 1741 - Pages: 7

Free Essay

Hacktivism, Freedom of Speech or Cyber Terrorism

...Hacktivism, Freedom of Speech or Cyber Terrorism? Josh T. Diehl ITT-Tech Institute Abstract I will be doing my research paper on Hacktivism and looking into the subsector that is known as “Anonymous”. Hacktivism in itself is the use of computers and computer networks to promote political ends. To see this for what it truly can be, you must look at it with the understanding that it can be carried out under the same premise that proper (and skillful) use of technology can produce results similar to these of conventional acts of protest, activism, and civil disobedience. I plan on exploring whether it is freedom of speech or cyber terrorism, keeping an open mind when conducting my research will be the key to the integrity of this paper. I plan on researching online articles and post from credible sources. I will make set times while I am not at work to research and write this. Body First we need to look at what exactly is hacktivism and who practices it. Hacktivism in itself is defined as “The use of computers and computer networks to promote political ends, chiefly free speech, human rights, and information ethics. It is carried out under the premise that proper use of technology can produce results similar to those of conventional acts of protest, activism, and civil disobedience.” Certain groups such as Anonymous use this form (among others) as their way to speak out against what they see as injustice. We need to look closely, past the top layer of information, to...

Words: 2499 - Pages: 10

Free Essay

Academic Paper

...Cyber Terrorism Technological innovations bring with them various blessing as well as curses. Due to increased dependency on technology, the negative and exploitative use of technology results in chaos in the daily lives of millions of technologically driven people worldwide. This increased dependency has resulted in the creation of cyber terrorism, whose main purpose is to use technology and cyberspace to launch wide scale and damaging results for the internet users. These opportunities for cyber terrorism are created due to the fact that the reliance on technology and information has increased manifold and this technology and information can be easily manipulated and tampered to hurt and damage the companies’ and nations’ reputations etc. That why, cyber terrorism is considered to be a national offense because it is generally used to disrupt or influence the government and government owned companies regarding their political, social and policy making motives. Nature of Cyber Terrorism: Cyber terrorism, like conventional terrorism, is used to disrupt and induce fear in the daily lives of people and uses threats, serious assaults to induce fear. Cyber terrorism also works it the similar way, but uses internet and computers as its backbone. Nowadays, terrorist groups and individuals use internet to spread malicious rumours, spread daunting and formidable news and information and post scary images to threat the supremacy of the government and government affiliated individuals...

Words: 407 - Pages: 2

Premium Essay

Cyber Warfare

...Computers have modernized terrorism in the same way cyber terrorism revolutionized information warfare. There is no distinct definition of Cyber terrorism; however, its threat is as real as waging war but with weapons of automation. Terrorists have begun to exploit the availability of information with the malicious intent to sabotage; conversely, there are those who are not quite sure if information warfare - cyber terrorism is an actual threat. This research paper will briefly explore the history of cyber terrorism, the friend the internet has been to terrorist and how we can make the internet safer through vigilant tactics of prevention and deterrence. It will also expose the truth about cyber terrorism for the skeptic, reasons not to discount the threat, and why it is paramount their mind is changed. Information Warfare-Cyber Terrorism Did you know there were 18 cybercrime victims every second, 1058 every minute, approximately 64,000 per hour, and 1.5 million per day, that affected over 556 million people within the last year (Norton , 2012)? The internet has made it possible for terrorists to gather our public information and use it against us. As the internet matures so does the terrorist, finding ways to cripple and intimidate. The internet and terrorists have become a real hazard to the health of the cyber world. The government has implemented several organizations to help combat cyber terrorism but have not given it a clear concise definition. ......

Words: 3494 - Pages: 14

Free Essay

Cybercrime

...suffer from a cyber-attack or even worse a cyber-terrorism, leaving our country at risk especially for those who work in the government defense agencies and private corporations. In 2003, the conflict with Iraq created a round of speculations that the United States was going to experience cyber-attacks in revenge (Clarke). But, since 1995 there haven’t been any reports of cyber-attacks that would produce panic or damage to U.S. infrastructure or that affects our military operations. By any means this is not a result of idleness by terrorist groups. Between 1996 and the end of 2001 there was 1,813 international terrorist attacks performed. To mention a few that involved citizen targets, there is the Khobar Tower Bombing in June 1996, the Embassy Bombing in East Africa in August 1998, and the USS Cole attack in October 2000. Between 1996 and 2003, to compare between terrorist attacks around 1,813, computer security incidents around 217,394 and cyber-attacks on infrastructure which they were 0, reporters have noted that the cyber terror on infrastructure are an unlikely threat to the security of the United States. In 2005, Cyber-attacks cost were $48 billion to businesses and $680 million to consumers. While a physical attack involves weapons against a specific target, a cyber-attack includes codes that are used as weapons to infect enemies’ computer in order to manipulate the software, system configuration or the use of restricted computer system. Although cyber-attacks has......

Words: 2224 - Pages: 9

Premium Essay

A Case of Bureaucracy

...that this form of violence and terrorism, aptly called cyber terrorism, is no more a thing of the past and is very much possible in our technological and computer savvy world of today. The economic growths achieved by many countries due to such technological advancement in fields of computers such as networking. Networking has provided the world with the Internet that has bridged the distances of the world and made it into a global village. People can now use the Internet to share information with each other. Internet can also be used as a communication tool and people sitting in places half way across the globe can communicate with each other with a click of a button. At the same time, the Internet can also be a dangerous place. People share information through their computers and this means that their computers are online in a cyber world. This means that the person’s computer is open to threats and risks from anyone who knows how to get inside the computer. People can use the Internet to steal someone else’s credit card numbers, and a lot of other personal information. In this paper, we shall examine how people can use the Internet to spread a new form of terrorism, cyber-terrorism. A person sitting at home using his personal computer can longer feel safe, even in the security of his/her own home, as information security has become one of the prime concerns of everybody, including the government. It is believed that a threat of cyber-terrorism is a very real threat......

Words: 2734 - Pages: 11

Premium Essay

A Case of Bureaucracy

...that this form of violence and terrorism, aptly called cyber terrorism, is no more a thing of the past and is very much possible in our technological and computer savvy world of today. The economic growths achieved by many countries due to such technological advancement in fields of computers such as networking. Networking has provided the world with the Internet that has bridged the distances of the world and made it into a global village. People can now use the Internet to share information with each other. Internet can also be used as a communication tool and people sitting in places half way across the globe can communicate with each other with a click of a button. At the same time, the Internet can also be a dangerous place. People share information through their computers and this means that their computers are online in a cyber world. This means that the person’s computer is open to threats and risks from anyone who knows how to get inside the computer. People can use the Internet to steal someone else’s credit card numbers, and a lot of other personal information. In this paper, we shall examine how people can use the Internet to spread a new form of terrorism, cyber-terrorism. A person sitting at home using his personal computer can longer feel safe, even in the security of his/her own home, as information security has become one of the prime concerns of everybody, including the government. It is believed that a threat of cyber-terrorism is a very real threat and......

Words: 2737 - Pages: 11

Premium Essay

Cyber Threats

...Cyber Threats Roger Larew SEC 402 Informational Warfare February 16, 2011 Before we get into the major cyber terrorism threats that we all have to deal with I wanted to first define what cyber terrorism is. According to the U.S. Federal Bureau of Investigation, cyber terrorism is any premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets by sub-national groups or clandestine agents Unlike an annoying virus or computer attack that results in denial of service, a cyber terrorist attack could lead to physical violence or extreme financial harm. According to the U.S. Commission of Critical Infrastructure Protection, possible cyber terrorism targets include the banking industry, military installations, power plants, air traffic control centers, and water systems. Cyber terrorism is often referred to as electronic terrorism or information war. Based on recent reports and the information presented to congress, America has a long way to go before security threats are adequately addressed. Almost half of 2,131 U.S. companies polled had no formal security policies in place, and most relied primarily on user passwords and multiple logons for protection. Only 49% of U.S. companies had plans to raise user awareness of policies and procedures in the next 12 month. Unbelievably only half of 150 companies surveyed by InformationWeek Research one week after the terrorist...

Words: 641 - Pages: 3

Free Essay

Cyberterrorism

...Cyber terrorism Assignment #10 6/15/2012 TS 5999 Table of Contents Abstract………………………………………………………2 Introduction…………………………………………………..3 What is Cyberterrorism?....................................................3-4 History…………………………………………………………4 Examples of cyberterrorism…………………………………4-6 Level of cyber terror capability ……………………………..6 Figure 1……………………………………………………….7 Prevention of cyberterrorism……………………………….7-8 Conclusion ……………………………………………………..8 Reference ……………………………………………………...9-10 Abstract Cyberterrorism has increasing become one of the most significant threats nationally and internationally. Being that the internet makes it easier for terrorist to communicate, organize terrorist cells, share information, plan attacks; the internet also is used to cyber terrorist acts. Since the September 11th terror attacks on the US, American have remained on high alert for possibly another terror attack. The government has many action plans ready in the event that they get wind of another attack or an attack happens. Law enforcement has received training in terrorism prevention and detection techniques, granted terrorist are always looking for ways to improve their methods of attack. This paper will look at all the different aspects of cyberterrorism and review the different cases of cyberterrorism nationally and internationally. Introduction The use of computers and the internet have been an important part of our daily lives. Computers and the internet......

Words: 1895 - Pages: 8

Free Essay

History of Digital Crimes and Digital Terrorism and Their Common Current Forms

...History of Digital Crimes and Digital Terrorism and Their Common Current Forms Stephanie Fisk Strayer Universality CIS 170 Professor CIANCIOTTA Dec. 12th, 2013 Introduction Computer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Net crime refers to criminal exploitation of the internet. Dr. Debarati Halder and Dr. K. Jaishankar (2011) defines cybercrimes as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as internet chat rooms, emails, notice boards, groups, and mobile phone. Such crimes may threaten a nation’s security and financial health. Problems surrounding these types of crimes have become high profile, particularly those surrounding cracking, copyright infringement, child pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise. Internationally, both governmental and non-state actors engage in cybercrimes, including espionage, financial theft, and other cross-border crimes. Activity crossing international borders and involving the interests of at least one nation state is sometimes referred to as cyber warfare. The international legal system is......

Words: 2411 - Pages: 10

Free Essay

The Terrorist New-Battlefield

...Cyber: The Terrorist New-Battlefield Sparkle Grayson American Military University “American military superiority on the conventional battlefield pushes its adversaries toward unconventional alternatives.” - Carter, Ashton B., John Deutch, and Philip Zelikow Terrorism is not a new phenomenon. The use of terror tactics as a means of coercion, dates back to the 1st and 14th centuries AD. The first documented instance of terrorism that most resembled modern day terrorist tactics is attributed to the Zealots of Judea. This “terrorist” group showed many if not all the characteristics of modern day terrorists; being politically/religiously motivated, the organization of their group, and ultimately their goal, which was to strike fear into not only the current leaders or governing authority but into anyone who they felt agreed with the current state of politics. In short, though, their endeavor was ultimately unsuccessful, “the fact that they are remembered hundreds of years later, demonstrates the deep psychological impact they caused” (terrorism-research, 2013, n.p). Though terrorism is often associated with physical acts of violence, the ever increasing globalization of the world, and the increasing dependency on technology has given way to a new tactic that can be destructive to property, finances, and media. Cyber-terrorism is a new occurrence but is highly effective, and until recently the United States had no formal “cyber-protection” in the private......

Words: 1227 - Pages: 5