Cyber Terrorism Research Paper

PAGES
13
WORDS
4455
Cite

Cyber Terrorism The Internet that we know today and use in our everyday lives was founded in the early 1970s. But all through the Cold War, the apprehension of data theft led to the Internet becoming a decentralized system. But it was not until the late 1980s when the Internet, after years and years of research was made available to public. This was a big change because now anyone in the public could gain access of huge amount of data from anywhere in the world. The following list tells us how Internet can be used to spread evil, and assist terrorist organizations to apply more danger and fear to the world. According to Weimann (2004), the Internet has:

- easily approachable

- no single controller or regulator to control or censor information

- the makings for widespread spectators all round the globe

- the power for the user to remain anonymous

- quick access to information

- little installation and usage costs

the ability to combine multimedia (such as graphics, texts, video and audio) and gain access to multiple types of data (such as applications, books, movies and posters, etc.)

- affected the way we communicate and transfer information over mass media.

There is nothing different between the physical form of terrorism and cyber terrorism except that computer are used to carry out assaults. Hacking into FBI or CIA central to intimidate the American public could be perceived as cyber terrorism. Another instance could be gaining access to patients' medical records and alter them in a way that could be detrimental to the patient's health. According to a research in 2003, the forecasted e-commerce expected through the Internet was such that without it, the world economy would have suffered a loss of 6.5 billion in transactions (Coleman, 2003, p.2).

When we attempt to classify cyber terrorism, it can be done through two means, either internet-based or effects-based. Whenever the attack is done with the objective to harm and cause serious economic destruction, it is known as internet-based attack. On the other hand whenever the attacker is intends to produce fear, as it is done in an orthodox terrorist attack, it is said to be an effect-based attack. In line with the Army (P. II-1 and II-3, 2005), low levels of (1) secrecy, (2) integrity, (3) availability, along with (4) physical destruction are the four main aims of a cyber attack.

The growth rate of the usage of technologies like Internet as well as other telecommunication tools by the terrorists is increasing day by day. The reason behind this increase could be the substantial physical border security, which leaves no other option for the extremists to attack the United States, except using internet and other similar weapons. In doing so, the terrorists group is emphasizing on formulating bonds with criminal organizations along with heightening their IT skills, so that a cyber attack can be executed perfectly. The credit card frauds and collection of money are the two major tools which are used by the terrorist groups to generate funds which could be invested in the execution of a cyber attack (Pladna, 2007).

The alliance between the terrorists and cybercriminals might be increasing rapidly. This is true particularly in the areas of South Asia and Middle East, so that the smuggling of arms and drugs, and the global movement of money can be performed without any hurdle (Rollins & Wilson, 2005). The ultimate goal of the terrorists of these partnerships with cybercriminals could be the continuous improvement of their IT skills; moreover, the cooperative drug trading could also enable them access to extremely competent computer programmers (Pladna, 2007).

The presence of the terrorists and their allies along with their huge information technology workforce was also witnessed at the time of subway and bus bombings in England, in July 2005 (Pladna, 2007).

There may however be difficult and confusing situations whereby it is actually complicated to distinguish between a normal hacker who is a cyber criminal or an actual attack which may be a cyber terrorist. The major issue with the terrorist attacks is that they search for loop holes in order to plot for attacks in future. Whereas the cyber terrorists' main motive is to search for instances where they can earn money and gain something out of the situation. The FBI has been successful in recognizing cyber crimes and reported that the internet criminal activities are basically targeted towards compromising the email accounts or defacing and logging onto different websites (Pladna, 2007).

The overload of information has however caused these network attacks to come up as one of the major problems. It was stated by Lourdeau (2004) that the FBI suggested that...

...

According to the discovery of Muller (2007), in recent times, the Yearly Assessment of the threats reflect that that the terrorists have started making increasing usage of the internet as a medium of communication. Furthermore, their source of plotting out attacks, proselytize and hire as well as fully train the hackers so as to be a source of help in financial terms as well as in logistics in the entire criminal process. This is turning out to be a major source of concern for the FBI and needs to be monitored strictly.
According to IBM, in the year 2005, the statistics of threats to computer securities had almost doubled and had become a major concern for the government and its related agencies because this was becoming quite dangerous. Due to these increases, it has become quite an issue in order to clearly draw a line between a cyber criminal activity and an actual attack inflicted by a terrorist. Thus the United States along with other countries is working on devising laws to put a stop to such activities. However, by the current results it may be suggested that there might be growing trends in these attacks since they are gradually pacing up and are spreading out. This may prove to be too large for the government agencies to cater to if these statistics keep up and nothing is done about them (IBM, 2005).

Definitions

The word "terrorism" has no particular definition generally accepted all around the world up till now. Similarly, the word "Cyber terrorism" has no particular explanation generally accepted worldwide. Owing to the complications determining with confidence the intent, identity, or the political enthusiasms of the enemy, it is challenging to label a computer intrusion as "Cyber terrorism" (Rodriguez, 2006).

Cyber terrorism has been defined to be based on the impact of an intrusion, by few security specialists. Though it is not commenced with any political intention by criminals, built-in activities, where computers are embattled result to be disruptive and devastative enough to cause panic as compared to a usual act of terrorism (Rodriguez, 2006).

Cyber terrorism are defined, in this "effects" view, as computer attacks that are inadequate in extent yet, but may cause death, airplane crashes, injury, contamination of water, wide power outages or loss of confidence in some parts of the economy. Cyber terrorism can obtain the shape of a physical intrusion that demolish mechanical nodes used for vital communications, as stated by some on-lookers, which includes telecommunications, internet as well as the electric power grids, devoid of touching keyboards. Also a few federal spokespersons have declared the cyber security engraves transversely all features of critical communications protection. Furthermore, cyber operation cannot be divided from the physical features of businesses due to their inter-reliant function (Rodriguez, 2006).

At the end "Cyber terrorism" can be classified, by the above theory of effects and intents, as the usage of computer as targets, or weapons, by politically enthusiastic sub-national sets, international, or concealed agents who cause violence and destruction. Their intention to manipulate the viewers, or make government a reason to modify its strategies. This description, covering a number of ideas about cyber terrorism incorporates all three techniques for computer attacks; named as follows (Rodriguez, 2006):

1- Physical Attack

2- Electronic Attack (EA)

3- Computer Network Attack (CNA)

Methods employed in a Cyber Attack

The computer attacks when defined, take into account any activity headed against computer systems that disturbs the tasks carried out by them, alters their processing control, or harms the data stored in them. The attack methods, based on their type, vary in targeting weaknesses and have various armaments. A number of these techniques may be falling under the present capacity of a few terrorist organizations. Three different techniques of assault are named, depending upon the effects of the arms utilized. Nevertheless, the growth of technology may start to diminish the differences among them (Rollins and Wilson, 2007).

The methods are as follows:

A physical attack is the one having the use of orthodox weapons against a computer station or its communication lines.

An electronic attack (EA) comprises the exploiting the electromagnetic force as a weapon, generally signified as an electromagnetic pulse (EMP). On the one hand, it overwhelms the computer circuitry; and on the other, in a less damaging way,…

Sources Used in Documents:

References

Army, U. (2005). Cyber Operations and Cyber Terrorism. In U. Army, U.S. Army Training Doctrine Command, Handbook No. 1.02

Bridis, T. (2005, May 26). USA Today. Retrieved September 14, 2011, from "Silent Horizon" war games wrap up for The CIA:

http://www.usatoday.com/tech/news/techpolicy/2005-05-26-cia-wargames_x.htm

Coleman, K. (2003, October 10 ). Cyber Terrorism. Retrieved September 14, 2011, from Cyber Terrorism Article: http://www.directionsmag.com/article.php?article_id=432&trv=1
from ComputerWeekly.com: http://www.computerweekly.com/Articles/2007/10/09/227331/nato-locks-door-to-cyberterrorism.htm
Gordon, S. (2006). Cyberterrorism? Symantic Retrieved September 14, 2011, from http://eprints.mdx.ac.uk/7995/1/ford-phd.pdf
16 Cyber Terrorism targets of security attacks in first half of 2005. Retrieved September 14, 2011, from IBM News: http://www.ibm.com/news/ie/en/2005/08/ie_en_news_20050804.html
Kotler, S. (2007, October 12). 'Dark Web' Project Takes On Cyber-Terrorism. Retrieved September 14, 2011, from FOx News: http://www.foxnews.com/story/0,2933,300956,00.html
Lasker, J. (2005, April 18). U.S. Military's Elite Hacker Crew. Retrieved September 14, 2011, from Wired News: http://www.wired.com/politics/security/news/2005/04/67223
Mueller, R. (2007, January 11). FBI Director. (S. C. Senate, Interviewer) NSA. (2007, October). Center of Academic Excellence. Retrieved September 14, 2011, from National Security Agency: http://www.nsa.gov/ia/academia/caeiae.cfm
Press, T.A. (2007, September 26). U.S. video shows simulated hacker attack on power plant. Retrieved September 14, 2011, from Silconvalley.com: http://www.siliconvalley.com/sectors/ci_7010139
Rodriguez, C.A. (2006). Cyber terrorism -- a rising threat in the western hemisphere. United States Army National Guard. Retrieved September 14, 2011, from http://library.jid.org/en/mono45/Rodriguez,%20Carlos.pdf
http://www.usip.org/pubs/specialreports/sr116.html


Cite this Document:

"Cyber Terrorism" (2011, September 14) Retrieved April 18, 2024, from
https://www.paperdue.com/essay/cyber-terrorism-117332

"Cyber Terrorism" 14 September 2011. Web.18 April. 2024. <
https://www.paperdue.com/essay/cyber-terrorism-117332>

"Cyber Terrorism", 14 September 2011, Accessed.18 April. 2024,
https://www.paperdue.com/essay/cyber-terrorism-117332

Related Documents

The increasing skill of these terrorists in using cyberspace has led some officials to believe that they are on the point of using computers for increasing bloodshed. This new threat is not similar to hackers' earlier using computers for passing viruses and worms. This has now reached a level of being able to reach the meeting point of computers and physical structures controlled by computers. The belief of analysts

Cyberterrorism With the continued integration of technology, and especially internet-based technologies, into everyday life, the threat of cyberterrorism becomes more and more of a concern, as the potential for exponentially devastating effects increases alongside reliance on these emerging technologies. However, combating cyberterrorism is not as simple as one might think (or hope), because even the definition of the word itself remains under discussion. Nonetheless, after examining some of the more common

Cyber terrorism is the process of using disruptive, electronic activities to disrupt or destroy computers or computer networks with the aim of causing further damage or fear. Cyber terrorism is therefore a very great threat to information as it can lead to the leaking, damage or loss of very critical information by countries. In any case, cyber terrorism is facilitated through hacking and other activities aimed at affecting information across

Cyberterrorism What is Cyberterrorism? Cyberterrorism is characterized by the fusing of terrorism and technology; it has made it such that guarding against terrorism necessitates careful use of computers and technology, and constant awareness of one's software and security systems. According to Gordon and Ford (2002), cyberterrorism has greatly expanded the scope and procedures used for terrorism, and have made acts of terrorism more difficult to police. Because of the technological component, it

Cyber Terrorism Terrorism has become the most heatedly discussed and debated subject in social and political circles. In fact these days, this one issue has been dominating all other national and international problems. This is because on the one hand, we have just been witness to world's worst and probably the most sophisticated terrorist acts when airplanes were used as missiles to hit the two most powerful buildings in the United

Cyber Terrorism
PAGES 11 WORDS 3249

internet and the increased availability of personal computers around the world have increased the vulnerability of critical infrastructure systems. In recent years computers have been used by terrorist to distribute information about terrorist attacks. Now many experts fear that terrorist will use computers to carry out an attack on electricity grid or other systems that are crucial to the operation of a nation's infrastructure. The purpose of this discussion