Free Essay

The Terrorist New-Battlefield

In: Computers and Technology

Submitted By ROSESTLOUIS
Words 1227
Pages 5
Cyber: The Terrorist New-Battlefield
Sparkle Grayson
American Military University

“American military superiority on the conventional battlefield pushes its adversaries toward unconventional alternatives.” - Carter, Ashton B., John Deutch, and Philip Zelikow Terrorism is not a new phenomenon. The use of terror tactics as a means of coercion, dates back to the 1st and 14th centuries AD. The first documented instance of terrorism that most resembled modern day terrorist tactics is attributed to the Zealots of Judea. This “terrorist” group showed many if not all the characteristics of modern day terrorists; being politically/religiously motivated, the organization of their group, and ultimately their goal, which was to strike fear into not only the current leaders or governing authority but into anyone who they felt agreed with the current state of politics. In short, though, their endeavor was ultimately unsuccessful, “the fact that they are remembered hundreds of years later, demonstrates the deep psychological impact they caused” (terrorism-research, 2013, n.p).
Though terrorism is often associated with physical acts of violence, the ever increasing globalization of the world, and the increasing dependency on technology has given way to a new tactic that can be destructive to property, finances, and media. Cyber-terrorism is a new occurrence but is highly effective, and until recently the United States had no formal “cyber-protection” in the private sector.
The beginning of the cyber-defense initiative is debatable. However, there is one event in recent history that often been described as the beginning of cyber warfare. The US/Chinese Spy Plane incident was not an event that garnered much media attention. However, this singular event maintains its’ position of, historical ground marker. The event occurred on April 1, 2001.The event itself involved the collision of an American surveillance plane and a Chinese Fighter craft, and really hold no significance to cyber-defense. The events immediately following the collision played a large part in the integration of cyber security into the national security agenda. Following the collision of the American surveillance plane and the Chinese fighter craft, the US saw a huge influx in cyber-attacks. The tension between nations acted as the catalyst to numerous website defacements and Denial of Services attack on government agencies and some private industries. After approximately 1,200 U.S. sites, including those belonging to the White House, the U.S. Air Force and the Department of Energy, had been subjected to Distributed Denial of Service (DDoS) attacks or defaced with pro-Chinese images, the attack was stopped. Although the attacks ceased this served as an eye-opener to the need for government implementation of cyber-security for our critical infrastructure, public and private sector alike.
At the end of 2001, the Bush Administration began to formulate a national plan that included cyber security, and in 2003, President Bush signed the National Strategy to Secure Cyberspace. However, following the tasking of the Department of Homeland Security with the cyber mission, progress was slow, regulations were never created and thus never enforced. Eventually, the Comprehensive National Cyber-security Initiative was created and included in National Security Presidential Decision 54.
Today, the Department of Defense (DoD) has finally made the shift towards cyber-defense. On October 1, 2009, a general took charge of the new U.S. Cyber Command military organization with the mission to use information technology and the Internet as a weapon. This new U.S initiative is not unique. Russia, China, and North Korea each have similar commands. Since the creation of the internet and its’ implementation into government operations, DoD has always maintained defensive a defense against digital attacks of government networks. The Intelligence command sector of the military has been tasked with government network defense, protecting only dot-mil and dot-gov sites. However, cybercrime has very recently been subject to consideration as acts of war, which could escalate into cyber or physical war. The United States is particularly vulnerable to cyber-attacks as much of our infrastructure is digital. Electrical grids, banking systems, communication systems, mass transit and many other things are part of a networked system. People often assume that because some of these things are connected to the Internet, that they are safe from exploitation. This is certainly not the case. An example of the US’s vulnerability is the very recent “hack” of the United States Federal Reserve's Network.
On February third of 2013, hackers digitally breached the computer network that the Federal Reserve uses to communicate with bankers at times of emergency. The attack allegedly resulted in the compromise of 4,000 Federal Reserve employee and banker credentials. The culprits behind this particular attack were revealed as the activist group, Anonymous, a U.S based cyber organization, which maintains ties throughout the world. However, adversary nations have also shown intent and possess the capabilities to attack the U.S using sophisticated cyber techniques. During the 2008 presidential election, the Federal Bureau of Investigation, revealed that Chinese hackers had infiltrated secure campaign computer systems. Though the information accessed was unclassified, this act served as proof that US adversaries were more than capable of exploiting US networks, and that targets did not necessarily have to be government related.
Still much of, if not all of America’s critical infrastructure operates off of some form of digital network and is therefore vulnerable to exploitation. However, government officials recognize this vulnerability and continue to make strides to mitigate this issue. The Department of Homeland security has dedicated watch and warning centers specifically to Cyber security, and has world-class cyber professionals working to secure our nations digital assets. Resources like the National Cyber Security Division (NCSD), and the U.S. Computer Emergency Readiness Teams are all dedicated to new U.S. cyber-security defense mission. “The Department of Homeland Security and the Department of Defense (DOD) signed a landmark memorandum of agreement in 2010 to protect against threats to critical civilian and military computer systems and networks”(DHS,2013,np). DHS is now, not only responsible for the .gov and .mil domains, but is also providing private sector organizations with assistance and oversight to defend the .mil domain as well. In 2012, DHS monitoring equipment resulted in more than 5,000 alerts from critical infrastructure attack attempts. To mitigate the risk involving cybercrime, DHS and the Secret Services maintain the Electronic Crimes Task Forces. This division of the agency focuses singularly on the identifying and locating of cybercrimes, connected to bank fraud, data breaches and other like cyber related crimes. They were responsible for the capture of cyber criminals responsible for nearly $600 million dollars in damages to a number of financial and retail institutions. DHS’s cyber mission forces were also responsible for the prevention of nearly $1.5 billion dollars in losses through cybercrime investigations. The collaboration and cooperation of all levels of government and private entity organizations is vital to America’s defense against cyber exploitation. Though cyber-attacks are not physical attacks on the homeland, they are often more dangerous. If cyber-weapons are not controlled, they could become catalysts to actual kinetic war.

Bibliography

Clarke, Richard A. Cyber War, New York, NY; Harper Collins, 2010.

DHS, "Homeland Security." Cybersecurity Results. N.p., n.d. Web. 26 Oct. 2013. . (accessed October 24, 2013)

"Terrorism Research." Early History of Terrorism. N.p., n.d. Web. 26 Oct. 2013. . (accessed October 26, 2013)

Similar Documents

Free Essay

Enemy Combatant or Terrorist?: a Designation Makeover

...October2013 Enemy Combatant or Terrorist?: A Designation Makeover This current “War on Terror” is not a familiar feat for the United States of America. For the past 12 years The U.S has had to constantly adapt and develop new operating procedures. The difficulty of this war derives from it not being a conventional war. We are fighting an enemy (Al Qaeda, Taliban, etc.) that has taken guerilla warfare to a whole new level. This enemy has gone from crashing planes into the Twin Towers to placing I.E.D’s (improvised explosive devices) in the streets of Baghdad without any regard to the welfare of its own civilians. There is no doubt this is a complicated war, so complicated that our nation has even struggled with the finer designation of those we are combating. “Enemy combatants” and “Terrorists” are classes we are battling with every day yet still struggling to justly categorize them in legal terms. The vagueness on the definition of “Enemy Combatant” and “Terrorist” has led to voids and abuse of these terms. This in turn has produced an inconsistency on combat operations and legal categorizations. It is often said old men declare wars and young men fight them. This is even more the case in our present conflict with there being over ten significant court cases that have shaped our rules of engagement in fighting on the battlefield (Garrison 449). It can be strongly argued that the fights in the court room are becoming as important as the ones on the battlefield. The court room’s lack...

Words: 2655 - Pages: 11

Free Essay

Just War

...September 11, 2001 will be a day that none of us forget for as long as we live. It is a day that each of us will remember exactly what we were doing when we heard the news reports. Hijacked planes crashed into the Twin Towers of the World Trade Center, another one into the Pentagon and a forth plane crashed into a field in Pennsylvania, failing to reach its intended target because of heroic passengers. With nearly 3,000 civilians murdered, the United States began the “War on Terror” that targeted organizations designated as terrorist and those regimes accused of supporting them. The “War on Terror” took the fight to the mountains of Afghanistan and the deserts of Iraq. The Theory of Just War is an ethical look to help determine whether the use of armed forces is justified or unjustified. This Theory is guided by three sets of criteria: the right to go war (jus ad bellum), the rules of engagement of war (jus in bello) and justice after war (jus post bellum). While these wars have been surrounded with controversy and claims of being unjust, the “War on Terror” is a just war that does not exceed the moral boundaries set in the Just War Theory and today's society? The first criterion for a just war is the right to go to war. Is there a just cause? Will war be declared by a competent authority? Has all other options for peace been exhausted? What are the chances for success? Before the dust for the fallen towers settled and while eighty-six other countries mourned the...

Words: 3075 - Pages: 13

Free Essay

Is the War on Terror a Just War? Explain, with Reference to Both Jus Ad Bellum and Jus in Bello.

...In this essay I will argue that the ‘war on terror’ declared by the Bush administration and so assessed for the US; is not a just war. It fails in the central interrelated criteria of just cause and last resort for jus ad bellum, which I detail first through assessment of the Bush administration’s self-proclaimed just reasoning behind resorting to war against a concept, and the alternatives available to it, I will then detail its failure in the jus in bello criteria of discrimination and proportionality, reasoning through the case of drone warfare. Jus ad bellum I shall firstly focus on the crucial jus ad bellum principle of just cause, holding the only just cause for war to be self-defence . The USA and its allies suffered unjust, unprovoked terror attacks, notably to embassies and battleships, as well as ultimately the 9/11 disaster, and further possessed reputable evidence of other failed attacks. Thus this essay acknowledges that they were under-attack from a powerful and effective enemy, which could be reliably pinpointed as Al Qaeda. These attacks were focused on non-combatants in landmark locations; deliberate targeting for maximum terror spreading effect, which further represented an attack on western freedoms. Hence the assailant satisfied neither jus ad bellum, nor jus in bello, and without immediate and effective action there existed great potential for further unjust attacks. This was the Bush administration’s argument for sufficient reason to declare war in self-defence...

Words: 2219 - Pages: 9

Premium Essay

Explotiable Weakness Terrorism

...Exploitable Weaknesses in Terrorist Organizations CRM 363,professor Ryan Burchnell The Role of the Intelligence Community in the Exploitation of Weaknesses in Terrorist Organizations Ways to help prevent terrorism Cherie Sterling 6/8/2012   Abstract This paper will let you in on what is going on in the intelligence community today and what they are doing to stop the war on terror with all the different agencies and what theories they are using to help fight this battle/war. The role of the intelligence community/agency plays a huge part in the exploitation of weakness among terrorist organizations. In this paper we will see how there are many different theories on how the intelligence community can help stop terrorism or at least calm it down. Also to see how the different intelligence agency work together to help stop the war on terror. We all know that terrorism will probably never completely end, but if we are willing to understand and take charge of the problem at hand maybe, we come to some sort of resolution amongst all the countries. Intelligence agency has been working behind the scenes for many years without any public knowledge on fighting the war on terror. Intelligence agency is behind the scenes type of people they are not out on the battlefield fighting the war so to speak. The intelligence agency is a very tight knit community that works very close with one another they talk with each...

Words: 2560 - Pages: 11

Premium Essay

Unmanned Technologies: Drawbacks of This Policy

...Joel Perez Professor Stoil Organizing War December 12, 2014 What have been the chief motivations behind the development and deployment of unmanned technologies and what are the chief drawbacks in this policy? With the advancements in robotics, unmanned battlefield technology seems to be the military’s newest obsession. This policy of unmanned vehicles came to the attention of the American public with heavy drone use under President Barack Obama’s administration but unmanned technology has been around for decades. The only difference is that now the military is pouring more money into research and development of these types of technologies. The current five-year budget is set at $23,883.2 billion or about $4.8 billion per year on unmanned air, ground and maritime systems (Lewis). The Department of Defense defines unmanned aircraft as “an aircraft or balloon that does not carry a human operator and is capable of flight under remote control or autonomous programming.” Around the world, militaries are continuing to use drones because they believe the advantages outweigh the disadvantages. According to Lieutenant Colonel David B. Glade, unmanned technologies “will be able to conduct military operations in a more efficient and less risky fashion than was the case when aircraft[s] were piloted by humans” (Glade, 1). More importantly, he states, “it is possible that the United States will be able to build military systems […] which can conduct military operations without human...

Words: 3400 - Pages: 14

Premium Essay

U.S. Involvement in the War on Terror

...considered a war, but not in the traditional sense. When one thinks of war they think of enemies, a battlefield, weapons, and death. However, the war on terror is slightly different. The lines that define enemies and allies are blurred, there is no battlefield, and the weapons come in all shapes and sizes. Nonetheless, there has still been death. Starting on September 11, 2001, the War on Terror has been waged for many years and has included many groups of people. On September 11, 2001, hijacked planes crashed in to the World Trade Center in New York City. Known as the Twin Towers, the World Trade Center is symbolic of the United State’s “economic power and military might” (Rahman). Immediately following the attacks, President Bush named Osama Bin Laden at fault and declared the War Against Terrorism. United States Congress had allocated billions of dollars and authorized President Bush to take any measures necessary (Moore). This war, however, is different from a typical war. President Bush told people to “go about their daily lives” unlike during World War II where 90% of Americans helped the war effort in some way. The war on terror is a war “without boundaries…directed against multiple enemies, not just one adversary” (Raz). The United States government has defined the war on terrorism against those who are declared “terrorists” or anyone accused of “harboring terrorists” (Rahman). Once declared, the war on terror has led to many policies, actions, and governmental...

Words: 2054 - Pages: 9

Free Essay

Military Technology

...the future, people may understand why these massive developments in the military are important and they will be proud when they have a strong military. Introduction Allen West, a member of the U.S. House of Representatives, said that “We must never forget why we have, and why we need our military. Our armed forces exist solely to ensure our nation is safe, so that each and every one of us can sleep soundly at night, knowing we have 'guardians at the gate.'”. Through methods of weaponization armies have been changed but the objective remains to protect the land and be strong to fight in warfare. Before a thousand years, armies fought with each other in the battlefield and the distance between fighters was about 100 yards. At that time, they used to arm themselves with knifes, swords, spears, and shields to protect themselves. When the Greeks, Romans, and Chinese used the catapult in siege warfare, it was an invaluable weapon...

Words: 2318 - Pages: 10

Premium Essay

Terrorism and Media

...mutually beneficial relationship between terrorist organizations and the media. As some remarkable terrorist attacks in history indicate, whether it is in the United States (US), Europe, or the Middle East, it is by and large the case that the architects of terrorism exploit the media for the benefit of their operational efficiency, information gathering, recruitment, fund raising, and propaganda schemes (Nacos 2006). In the words of Nacos (2002), whether it is the relatively inconsequential arson by an amateurish environmental group or mass destruction by a network of terrorists, the perpetrators’ media-related goals are the same: attention, recognition, and perhaps even a degree of respectability and legitimacy in their various publics (Nacos 2002). Media, in return, receives the attention of the public that is vital for its existence and benefits from record sales and huge audiences. To put it briefly, just as terrorism has to be communicated to have effect, the media has to cover the incidents in such a way to benefit from the public’s eagerness to obtain information about terrorist attacks. It is, therefore, fair to argue that there is a mutually beneficial relationship between terrorism and today’s media. Indeed, the goals of terrorists are not solely confined to winning the attention of the masses. In addition to that, through the media, they aim to publicize their political causes, inform both friends and foes about the motives for terrorist deeds, and explain their rationale...

Words: 790 - Pages: 4

Free Essay

Threatend Cyber Space.Docx

...Terrorist groups are increasingly using new information technology and the Internet to formulate plans, raise funds, spread propaganda, and engage in secure communications. Cyberterrorist- meaning the use of cyber tools to shut down critical national infrastructures(such as energy, transportation, or government operations) for the purpose of coercing or Intimidating a government or civilian population is clearly an emerging threat. (Dale Watson 2-6-2002) Cyberterrorism or digital terrorism cannot be concretely defined and has spurred significant debate over exactly what is means. Todays' battlefields have no national borders. Quickly describing terrorism is not easy work. However, cyber terrorism is specifically a premeditated publically or ideologically motivated attack or threat of attack against information, computer systems, programs, and data that can result in violence against civilian targets. Attacks are fast, easy and relatively inexpensive. The attack is a commission of a crime with the use of a computer and a network. Growth in the use of computers has caused computers to be a large part of illegal activities. The categories that we fall as a victim are Crimes committed using a computer as a target, as a tool, as incidental to computer use, or associated with the prevalence of computers. In most cases, caught cyber criminals have usually committed several types of crimes. The tools used required no extra training or financial aid. Many businesses that connect...

Words: 646 - Pages: 3

Premium Essay

Pros And Cons Of Negotiating With Terrorists

...Vayda Instructor Combating vs. Negotiating With Terrorist   For as long as we know it, the War on Terror has an everlasting battle. This constant fight utilizes the use of all federal power and authority to capture or kill terrorists and to continuously keep them from having control of any country. It is evident that the most efficient way to handle this is to cut off or eliminate their allies who provide funding and other things they need to survive. However, others feel that being able to negotiate with certain terrorist groups is the best way of preventing attacks. Either way you look at it, America is at war with a global terrorist movement fueled by a drastic creed of hatred, tyranny, and executions. The first thing to consideration is the opinionated aspect and state firmly if negotiations with terrorists will lead to a satisfactory political compromise between them and their possible victims. I, for one, am for it....

Words: 932 - Pages: 4

Premium Essay

Al Qaeda and the Taliban

...Because of the removal of key Al Qaeda leadership from the battlefield in Afghansitand, Pakistan and elsewhere, the group has become more decentralized. (http://www.thedailybeast.com/articles/2009/10/16/the-taliban-al-qaeda-connection.html) Some have claimed that this has made Al Qaeda more dangerous and more difficult to track. This may be true, but at the same time they are also less capable of planning and executing as complex of operations as 9/11 since they are now more scattered and a significant amount of their key leaders have been killed or captured. They have however become more difficult to track as they move into new territories such as Yemen where there is less intelligence on their activities. In the future it is possible and even likely that the US could conduct peace talks or reach a compromise with the Taliban granted they made an agreement to not to indirectly sponsor terrorist attacks by hosting groups such as Al Qaeda within their borders. Similar peace talks would be nearly impossible with Al Qaeda because of their stated goal of a global Islamic state. Conclusion Will the recent killing of bin Laden change the future relationship between al Qaeda and the Taliban? It is likely that it will change, although not diminish. The al Qaeda and Taliban relationship was largely based off of the personal relationships of Haquani and bin Laden. So into the future they will likely continue to work with each other due to their long common history and some shared...

Words: 341 - Pages: 2

Free Essay

Terrorism

...counterterrorism. The dangers of such an approach are examined along with emerging threats. Table of Contents * Abstract * Introduction * Define * Role of the Media * Psychology * Modern Terrorism * The Response * Counterview – The Dangers * Looking Ahead – The Next Potential Threats * Another Approach * Conclusion INTRODUCTION “Terrorism has become part of our daily news diet. Hardly a day goes by without news of an assassination, political kidnapping, hijacking or bombing somewhere in the world. As such, incidents of terrorism have increased in the past decade, the phenomenon of terrorism has become one of increasing concern to governments....” Introduction. With the recent high profile terrorist attacks in Sydney and Paris and the ongoing terrorist incidents in Nigeria, Iraq and Afghanistan, terrorism has been described as the biggest threat to 21st Century security. However the opening quote was from a RAND paper written in 1980. Terrorism is not a modern phenomenon. Historic Precedence. Terror as a tactic is not new. Some scholars date such actions to the Thugs; Assassins and Zealots. But it...

Words: 7041 - Pages: 29

Premium Essay

Drone Strikes

...Arafat Hassan Professor Kathryn McFarland Philosophy 1332 Apr 13, 2016 Are drones strikes really necessary? Drones or unmanned aerial vehicles (UAVs) are remotely-controlled aircraft which may be armed with missiles and bombs for attacks. There are two types of drones. One human-navigated (Remotely piloted aircraft) such as predators and reaper and the other is self-navigating (autonomous aircraft). The United States of America mostly use human-navigated drones to carry its attacks. The most interesting thing about this type is that the operators are sitting in a room miles and miles away from the battlefield controlling the drones like they are playing a video game. The operators are usually gathering intel for hours and only allowed to...

Words: 840 - Pages: 4

Free Essay

Strategic Analysis

...720th Special Tactics Strategic Analysis The 720 Special Tactics Group Strategic Analysis Strategic Planning OM 5040 Table of Contents Abstract 3 Introduction 4 Background 4 History 7 Organization 11 Mission statement 13 Mission 13 Mission Task 13 Vision statement analysis 15 Strategic management Application 17 Value Chain 18 Primary Activities 18 Support Activities 19 Translating...

Words: 4997 - Pages: 20

Premium Essay

Abramovic Artwork Research Paper

...about people who appropriated someone else’s idea and change it their own way. That is a form of remediation by changing its past media to new media. However, the way I define remediation is recreating or remediate something to make it better or worse. Remediation defines as representation of one medium in another by defining characteristics of new digital media. Remediation dated back during the Renaissance period when it emphasis on the innovation...

Words: 1361 - Pages: 6