Cyber Terrorism Term Paper

Download this Term Paper in word format (.doc)

Note: Sample below may appear distorted but all corresponding word document files contain proper formatting

Excerpt from Term Paper:

internet and the increased availability of personal computers around the world have increased the vulnerability of critical infrastructure systems. In recent years computers have been used by terrorist to distribute information about terrorist attacks. Now many experts fear that terrorist will use computers to carry out an attack on electricity grid or other systems that are crucial to the operation of a nation's infrastructure. The purpose of this discussion is to investigate the ways in which cybercrimes occur and the how it applies to the criminal justice system approach to dealing with terrorism. Before we began the literature review let us provide an overview of the methodology used to identify and locate sources of information found in the literature review.

Methodology

The sources used in the following literature review are from Academic Journals, books, newspapers, government agencies and articles found on the internet. Many of the Journals used are published by well respected institutions of higher learning. These sources were chosen because they are creditable and provide solid insight into the world of cybercrime as it relates to the development and implementation of legislation.

Analysis/Discussion

According to an article entitled "Computer Crimes," the Department of Justice defines Cybercrime as "any violations of criminal law that involve knowledge of computer technology for their perpetration, investigation, or prosecution (Ditzion et al. pg. 285)." The authors go on to explain that this is a broad definition and that there also exist criminal behaviours that are technology specific (Ditzion et al.). In addition, the Department of Justice places cybercrime into three categories: a computer as an object of a crime, a computer as an instrument used in a crime, and a computer as the subject of a crime (Ditzion et al.). The last category includes such crimes as logic bombs, Trojan horses, viruses and worms (Ditzion et al.).

Indeed cybercrime has been detrimental to businesses and individual and cost billions of dollars each year (Ditzion et al.; Pasley; Arquilla & Ronfeldt). Additionally, in many cases it is difficult to catch the criminals that are the perpetrators of such crimes. This is the case because crimes conducted through the use of a computer are more difficult to trace and because an attack may affect a Canadian business but the person that actually carried out the crime may live in Germany. In some cases it is also difficult to prosecute cyber criminals because laws differ amongst jurisdictions. The authors contend that for this reason there has been a rise in the development of specialized legislation to combat cybercrime (Ditzion et al.).

In the past legislation has been created in an attempt to address the problem of cybercrime. An article found in the Yale Law Journal asserts that

"The first cases of computer crime were heralded as an unprecedented phenomenon that law was not equipped to handle. Scholars and policymakers have since proposed a number of deterrence strategies, from criminal sanctions to tort law and the architecture of the web itself, but none of these methods has proved successful at deterring criminal hacking (Wible Pg 1557)."

The journal article goes on to explain that the Computer Fraud and Abuse Act of 1984 passed by congress was designed to prevent unwarranted intrusions. Along with other issues this and problems associated with prosecution this particular law has not deterred cyber criminals (Wible). In addition, enforcement of such laws has proven difficult under 18 U.S.C. [section] 1030(b). Such laws also necessitate large investments of resources and time, and training for local law enforcement agents (Wible). The article also asserts that factors such as encryption technologies and digital anonymity give those that commit cybercrimes an advantage over law enforcement agencies and existing laws (Wible). In addition, the uncertainties about jurisdictional issues cases that are costly to investigate and that entail sophisticated tracking capabilities, state prosecution is nearly unattainable (Wible).

The journal explains that "Proponents of tort liability for computer crime argue that, as compared to the criminal law, civil actions give targets control over the litigation. (30) The possibility of obtaining damages gives targets, otherwise unwilling to admit electronic vulnerabilities to consumers, an incentive to report (Wible)." The authors explain that even though ISP liability has received the most attention there are four types of tort liability that could be implemented in relation to cyber crimes (Wible). These liabilities include ISP liability, hacker liability, security company liability and liability for victims who do not to take private precautions (Wible).

The authors contend that the criticism of such laws A is that "tort liability does not carry a strong symbolic message condemning illegal hacking. The various tort proposals are unlikely to succeed for specific reasons, too: hackers tend to be judgment proof, (33) holding ISPs liable may actually increase hacking, (34) holding security companies to a high standard of liability may make their products prohibitively expensive and may be less effective than providing incentives to good practice, (35) and making victims bear the cost evinces an overly optimistic faith in the ability of potential targets to safeguard their materials through technological solutions (Wible).

According to a book entitled Governing the Internet: The Emergence of an International Regime asserts that the global use of the internet has greatly impacted legal jurisdiction in civil and criminal matters. The impact has been so dramatic because

"materials on the Internet can be composed or uploaded anywhere in the world and sent and downloaded anywhere else, an almost infinite number of legal questions and cases can be imagined when trying to determine which nation's law applies in any particular case when laws are allegedly violated. Particularly in its early years, a number of people involved in the creation of the Internet or among its most enthusiastic users argued that the decentralized, heterogeneous, and diverse nature of Internet architecture would make it impossible for sovereign nation-states to either use existing law to govern Internet activity or enact enforceable new law. It has also frequently been argued that legal controls over the Internet by sovereign states are either undesirable or illegitimate (Franda & Rienner pg 146)."

The authors go on to state that in recent years law enforcement agencies in nation states have attempted to develop new laws that take into account the unique variables that become apparent when addressing cybercrime (Franda & Rienner). In addition, some existing laws have been modified to include cybercrimes (Franda & Rienner). There have even been attempts to establish cross border procedures, international arbitration programs and regional cooperative mechanisms (Franda & Rienner).

However the author asserts that the most practical and effective way to gain legal authority is to gradually adapt the current laws of nation states as new problems come to the forefront (Franda & Rienner). The authors report that in the United Sates both statutes and case law concerned with jurisdiction on the internet are increasing at the state and local levels (Franda & Rienner). These statutes and case laws exist even though the Supreme Court has not decided to rule on matters of jurisdiction on the internet (Franda & Rienner).

The authors explain further that threshold test used by many courts to decide jurisdiction is if a defendant has knowingly availed a forum's laws. On this kind of basis cases involving cybercrime could be placed in three categories. These categories include

1. Purposeful availment which occurs when "a defendant clearly does business over the Internet" with clients from a particular jurisdiction, usually by entering into contracts that require the "knowing and repeated transmission of computer files over the Internet [into that same jurisdiction] (Franda & Rienner). "

2. Interactive websites which to some extent is a less clear area for jurisdiction where a user is able to swap information with the host computer however no contract exist (Franda & Rienner).

3. Passive websites, where defendants have posted information on the internet that is available to users in foreign jurisdictions (Franda & Rienner).

As it relates to cyber terrorism there is a great deal that is still unknown because a major cyber attack caused by terrorists and designed to attack the government and the nation's infrastructure has not yet occurred. According to a report published by the Center for Strategic & International Studies Cyber-terrorism is defined as "the use of computer network tools to shut down critical national infrastructures (such as energy, transportation, government operations) or to coerce or intimidate a government or civilian population (Lewis pg 1)."

The author explains that the theory behind cyber terrorism is that as nations and critical infrastructure are more reliant on computer networks for their operation, new vulnerabilities are arise to create "a massive electronic Achilles' heel (Lewis)." The author contends that an antagonistic nation or terrorist group could take advantage of these vulnerabilities to infiltrate a weakly secured computer network and disable or even shut down critical functions (Lewis).

The report further explains that protecting the critical infrastructure of the nation is problematic because the factors involved vary greatly from those of physical security (Lewis). For instance, when securing such infrastructure…[continue]

Cite This Term Paper:

"Cyber Terrorism" (2005, September 25) Retrieved December 7, 2016, from http://www.paperdue.com/essay/cyber-terrorism-67934

"Cyber Terrorism" 25 September 2005. Web.7 December. 2016. <http://www.paperdue.com/essay/cyber-terrorism-67934>

"Cyber Terrorism", 25 September 2005, Accessed.7 December. 2016, http://www.paperdue.com/essay/cyber-terrorism-67934

Other Documents Pertaining To This Topic

  • Cyber Terrorism

    Cyber Terrorism The Internet that we know today and use in our everyday lives was founded in the early 1970s. But all through the Cold War, the apprehension of data theft led to the Internet becoming a decentralized system. But it was not until the late 1980s when the Internet, after years and years of research was made available to public. This was a big change because now anyone in the

  • Cyber Terrorism Is the Process of Using

    Cyber terrorism is the process of using disruptive, electronic activities to disrupt or destroy computers or computer networks with the aim of causing further damage or fear. Cyber terrorism is therefore a very great threat to information as it can lead to the leaking, damage or loss of very critical information by countries. In any case, cyber terrorism is facilitated through hacking and other activities aimed at affecting information across

  • Cyberterrorism What Is Cyberterrorism Cyberterrorism Is Characterized...

    Cyberterrorism What is Cyberterrorism? Cyberterrorism is characterized by the fusing of terrorism and technology; it has made it such that guarding against terrorism necessitates careful use of computers and technology, and constant awareness of one's software and security systems. According to Gordon and Ford (2002), cyberterrorism has greatly expanded the scope and procedures used for terrorism, and have made acts of terrorism more difficult to police. Because of the technological component, it

  • Cyber Terrorism & Information All

    The increasing skill of these terrorists in using cyberspace has led some officials to believe that they are on the point of using computers for increasing bloodshed. This new threat is not similar to hackers' earlier using computers for passing viruses and worms. This has now reached a level of being able to reach the meeting point of computers and physical structures controlled by computers. The belief of analysts

  • Cyberterrorism With the Continued Integration of Technology

    Cyberterrorism With the continued integration of technology, and especially internet-based technologies, into everyday life, the threat of cyberterrorism becomes more and more of a concern, as the potential for exponentially devastating effects increases alongside reliance on these emerging technologies. However, combating cyberterrorism is not as simple as one might think (or hope), because even the definition of the word itself remains under discussion. Nonetheless, after examining some of the more common

  • Cyber Terrorism and Communication in Terrorism

    Cyber Terrorism Terrorism has become the most heatedly discussed and debated subject in social and political circles. In fact these days, this one issue has been dominating all other national and international problems. This is because on the one hand, we have just been witness to world's worst and probably the most sophisticated terrorist acts when airplanes were used as missiles to hit the two most powerful buildings in the United

  • Cyber Terrorism Which Has Stemmed From

    As quickly as tools are created to prevent unauthorized access of information, ways are being created to work around these protections. Just as technology has become increasingly smarter, the danger of disruption to vital parts of the nation's security, infrastructure, and banking systems has rapidly increased. It is no longer a matter the threat of the annoyance of a simple computer virus to temporary disable a computer network. The potential


Read Full Term Paper
Copyright 2016 . All Rights Reserved