Cyber Terrorism
Thus far we have scratched the surface of the ever-perplexing problem of terrorism. As it has evolved those in the position of countering it have also gained some valuable experience. Even with this knowledge it is very difficult, bordering on impossible to prevent terrorist acts from occurring. In the recent past there has been an extra element added to this confusing and dangerous equation, the Internet and other computer capabilities. Cyber-terrorism is a realistic possibility but is it as detrimental as other forms of conventional terrorism such as a car bomb? I will argue that the implications of a cyber attack could be just as harmful.
Traditionally terrorist acts target a specific locale and are executed
…show more content…
On the contrary, the only tools needed for cyber-terror are the proper knowledge and a powerful computer.
One of the key elements of terrorism is the creation of mass fear. This takes little effort with the use of computers. So many people are already intimidated by the efficacies of computers that the simplest cyber act could infuse a massive scare. Take for example the spreading of a virus. As soon as the word is out that a virus has been detected people take all possible actions to ensure that their files and data are protected. Taking this action to a higher level, if someone were to put a virus through a bank mainframe or something even bigger than that, then the general public would be afraid to make transactions over the computer and would return to doing business in person. The concern related to cyber-terrorism is warranted although we have been lucky thus far not to have experienced firsthand anything devastating.
In summary, cyber-terrorism opens opportunities for terrorists by expanding the arena and through the mass dependency on computers. So what leads me to believe that a cyber- terrorist attack could be just as harmful as conventional terrorism? There are a few reasons which lead me to this conclusion.
First of all, other forms of terrorism have been seen often enough to determine to some extent what to expect. Granted there are no guaranteed results of a conventional attack there are
As the internet usage has increased, it also has become an element for radicalization, therefore, develop a national cybercrime unit model to analyze potential terrorist attacks, addressing virtual space and technology.
What is it? Catfishing is someone who pretends to be someone else online. They use fake identities and try to make the other individual feel that they are exactly what they say they are. Catfishing is very common on social media like Instagram, Tinder, Facebook, and Twitter.
Cyber-terrorism is the convergence of terrorism and cyberspace. It is generally understood to mean unlawful attacks and threats of attack against computers, networks, and the information stored therein when done to intimidate or coerce a government or its people in furtherance of political or social objectives.
The United States government needs to focus less on physical warfare and more on cyber warfare.
Due to rapid expansions in both transportation and communication technology, terrorism has become an international threat and is now a serious global risk. Beck (2002: 9) states that the ‘risk of terrorism exponentially multiply with technological advancement. With the technologies of the future-genetic engineering, nanotechnology and robotics, we are opening a new Pandoras box’. This suggests that as more sophisticated technology is introduced new terror risks proliferate at an exceedingly fast pace. For Cronin (2002), international terrorism is not only a reaction to globalisation; globalisation is also a facilitator of international terrorism; suggesting that globalisation is a vital component in the structure and mechanisms of international terrorism. With advances in technology and particularly transportation, terrorist activity is no longer restricted to particular geographical jurisdictions.
About four years, three months, and fourteen days. Or one thousand, five hundred, sixty seven days. That is how long World War I was. One of the largest wars in the world had to have a big reason for why it started. Have you ever wondered how the war started? The answer is militarism, the belief of building up strong armed forces. Countries all over Europe were fighting for power in different areas in order to continue to be the leading army in the war. Different armies wanted the best soldiers and to be the best, they wanted to out do other countries. Multiple plans and attacks were made by nations in order to have more control over the world. Also, certain countries wanted control over the seas. Finally different plans and attacks were created to weaken other armies while growing some too. I believe militarism is the main cause of World
Imagine if you were an employee of a large credit card corporation such as Visa or MasterCard. You can make up to $90,000 a year but all of a sudden your bank account was $0.00 along with all your coworkers, bosses and the company stock dropped to zero. There would be panic, chaos and disorder due to everyone losing their money. The culprit of such a chaotic situation was a result of a cyber-attack by a hacker. The cyber attacker hacked into the system and caused the databases to transfer all of the money into some bank accounts elsewhere. This is just one example of cyber terrorism and all the damage it is can do to people lives. Businesses corporations are usually not targets of terrorism, but government databases usually are targeted. Cyber terrorist often try to hack into government databases and steal information that would be valuable to America but dangerous in the hands of terrorist. Through cyber-attacks information for nuclear weapons, shut down codes or other government secrets can be gained by a number of terrorist organizations. “ cyber-attacks on our nation private sector and government networks have increased dramatically in the past decade” ( www.fbi.gov) This increase in attacks means that there is a higher chance that terrorist can shut major power grids and leave millions without power or disrupt the stock market to cause mass panic in the
Abstract: Everyday security is provided by the states and federal government. These tasks get more difficult as new technology introduces itself. Cybersecurity is one of the most popular security sectors in today’s world. There is not only cyberbullying going on in the world. Terrorism can be planned and sent from person to person over the internet. People’s identities are being stole to help carry out these terrorist acts and this is just the being of it. The United States created the Department of Homeland Security as a result of the 9/11 attacks. This was an effort to prevent future terrorist attacks on our nation. Along with that department, laws have been enacted, such as the USA PATRIOT Act. This law was introduced and passed to provide Federal, State, and local law enforcement agencies with better resources to fight and stand up against terrorism. The way to successfully providing security against domestic and international terrorists is to understand the mentality of a terrorist. Critical assessments, more efficient alert systems, and physical security standards must improve in order to solidify our current security posture if the United States wants to deter future terrorist attacks against its culture and economy.
Hypothesis: The United State’s foreign policy will make a shift in the coming years to focus more intently on suppressing individual groups that use terrorism as a political strategy, rather than focusing on specific and identifiable States as in the past. The organizations mentioned before will be using the Internet to coordinate attacks, as well as attempt to hack US Government systems to their advantage. As a result, cyber security and antiterrorism stand to be the biggest future challenges for American foreign policy.
Guns, knives, and conventional explosives have so far remained the weapons of choice for most terrorists; however, recently terrorist have gone to the tactics of using vehicles as well, since such weapons can cause many casualties and are relatively easy to acquire and use. But some terrorist groups now show interest in acquiring the capability to use chemical, biological, radiological, or nuclear (CBRN) materials [Federal Emergency Management Agency, (July 2002)]. It is difficult to predict the likelihood of a CBRN attack, but most experts agree that today's terrorists are seeking the ability to use such agents in order to cause mass casualties [Federal Emergency Management Agency, (July 2002)]. Cyber-attacks are often considered in the same context with CBRN. Respectable experts have published sobering scenarios about the potential impact of a successful cyber-attack on the United States. Already, hackers and criminals have exploited some of our vulnerabilities [National Research Council. (2007)]. Terrorists are making extensive use of the new information technologies, and a conventional terrorist attack along with a coordinated cyber-attack could exponentially compound the damage [National Research Council. (2007)]. This changing nature of the terrorist threat raises the stakes in getting American counterterrorist policies and practices
Technology in the twenty-first century changed terrorism quite a bit. The evolution of the internet introduced cyberterrorism to us. Cyberterrorism can be defined as the intentional use of computer, networks, and public internet to cause destruction and harm for personal objectives.
Most nations today fear terror attacks that include bombing use of reinforcements like machines guns and other firearms. This is because terror attacks most of the times leave many people dead and others disabled while others are left without families. However, there is another attack today in many nations that can be destructive like a terror attack and this is the cyber-attack and threats. Cyber-attacks can be responsible for large mass destructions by making all systems connected to cyber networks fail to work (Rhodes 20). An example is the Morris worm that affected the world cyber infrastructures and caused them to slow down to a position of being impractical. Therefore, as a result of these cyber-attacks resources are being established and designed to help counter the attacks.
Since 2010 there have been over 13 major cyber attacks in the US, the FBI categorizes the severity of the attack based on what could possibly be at stake such as information on US citizens or hijacking of critical information . Cyber attacks are classified as crimes committed with the aid of a computer. Cyber crimes are considered felonies, however most people who commit the crimes can usually not be found. Recently there has been an uprising in cyber crimes, in the year 2017 alone 9 minor incidents have occured (minor attacks can consist of malware and internet “trolling” which is a form of cyberbullying) and 4 major crimes have been committed. Most crimes consist of identity theft, robbery, and hijacking private information. Recently programmers have been able to build security systems that can detect a threat almost immediately. With a growing expansion of technology protecting information gets harder day by day. Cyber security is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access.
According to Furnell and Warren (1999), Evidence suggests that technology is growingly seen as a potential tool for terrorist organizations and the widespread use of information technology by terrorist groups and organizations has led to the birth of a new class of menace termed “Cyberterrorism”. Cyberterrorism could be used in many diverse ways. Sometimes, a country’s pivotal infrastructures could be shut down and harmed using computer network and tools. There have been impediments in trying to give a clear and concise definition to the term “cyberterrorism”. But Denning (2007) which supersedes Denning (2000) gives an unambiguous definition to cyberterrorism:
The death penalty possesses a highly complicated legal process. This process has a high cost in the pre-trial and trial phase which makes the death penalty economically unstable method of punishment. Therefore, the death penalty should only be reserved for the rarest of the rare cases.