Free Essay

Cyber Terror

In:

Submitted By bungweasel7
Words 1396
Pages 6
My Name
Teacher's Name
English IV
5 February 2013
Cyberterrorism: Digital Warfare According to a study by Maya Shwayder, a journalist for the International Business Times, in 2006, more than ten years after its introduction to the public, the World Wide Web was being used by 18% of the Earth’s population. Today, that number has risen to 35%, almost twice what it was seven years ago (Shwayder, par. 1). This number continues to rise as developing country’s begin to provide Internet access to more and more people. For the United States, the United Kingdom, and other highly-developed countries, the Internet is an extremely important part of everyday life. It is used for entertainment, communication, even commerce. Unfortunately , the Internet is a two-edged sword and also can be used to cause great despair and destruction, such as when it is used to steal personal information. There are people who seek to use the Internet in this way. These people have been termed “cyberterrorists,” who commit acts of “cyberterrorism,” which involves attacking and/or stealing from information systems. Today, these attacks are commonly aimed at smaller Web sites or sites that are based in foreign countries. However, attacks are becoming more frequent and are targeting larger Web sites. As stated by Kenneth Himma, an Internet Security specialist, “popular sites [such as Facebook and Google] likely will be victims of these terrorists, unless something is done to combat the issue (Himma 74).”
In the past decade, terrorists and terrorist organizations have added the Internet to their arsenal of terrorist methods. This has led to a new class of threat, which has been termed “cyber terrorism.” This can be seen as different from “traditional” terrorism since physical terror does not occur and efforts are instead focused upon attacking information systems and resources. When viewed from the perspective of skills and techniques, there is little to distinguish cyber terrorists from the general classification of hackers. Both groups require and use an arsenal of techniques in order to breach the security of target systems. From a motivational perspective, however, cyber terrorists are clearly different, operating with a specific political or ideological agenda to support their actions. This in turn may result in more focused and determined efforts to achieve their objectives and more considered selection of suitable targets for attack. However, the difference does not necessarily end there, and other factors should be considered. Firstly, the fact that cyber terrorists are part of an organized group could mean that they have funding available to support their activities. This in turn would mean that individual hackers could be hired to carry out attacks on behalf of a terrorist organization. In this situation, the hackers may not believe in the terrorist’s “cause,” but will undertake the work for payment.
As of today, there has not been any serious acts of cyber terrorism in the world, but computer networks have been attacked in recent conflicts in Middle East. As terrorists usually have a limited amount of funds, cyber attacks are more tempting since only one person is needed and it is not costly. Another advantage of cyber attacks is that it allows the terrorist to remain unknown, since they could be far away from the actual place where the terrorism is being carried out. As terrorists normally set up camp in a country with a weak government, the cyber terrorist could set up anywhere and remain anonymous. A combination of both physical terrorism and cyber terrorism is the most effective use of cyber terrorism. For example, disrupting emergency services in which the emergency was created by physical terrorism would be a very effective way to combine both. There are a lot of possibilities created for cyber terrorists because of the Internet. Government computer networks, financial networks, power plants, and so forth, are all possible targets as terrorists may see these as the best to corrupt or disarm in order to cause the most chaos. Controlling systems with software using secret “back doors,” theft of classified files, erasing data, rewriting Web pages, introducing viruses, and so on, are just a few examples of how terrorism can penetrate secure systems. Terrorist attacks made possible by the use of computer technology could also be plane control hijacking systems, or corrupting power grids from a remote destination. Terrorist groups often use new information technology and the Internet to formulate plans, raise money, spread propaganda, and communicate securely. For example, Ramzi Yousef, the terrorist who planned the September 11 attacks, stored detailed plans to destroy United States’ planes on encrypted files on his laptop computer. Terrorist organizations also use the Internet to target their audiences without using media such as radio, television, or the press. Web sites are presented as a way of highlighting “injustices” and seeking support for political prisoners who are oppresed or in jail. Normally, a Web site will not reveal any information about violent activities and will usually claim that they have been left with no choice but to turn to violence. They claim they are persecuted, their leader’s subject to assassination attempts and their supporters massacred. They use this tactic to give the impression that they are weak, and they portray themselves as the underdog. This is a very easy way of recruiting new supporters and members. Terrorists also often have information on how to build chemical and explosive weapons on their Web sites. This allows them to identify users who may be sympathetic to their cause, so it is a cost effective recruitment method. It also enables individuals who are acting on their own to engage in terrorist activity without actually being in the action.
Terrorists use cyber space to cause disruption. Terrorists fight against governments for their cause, and they use every means possible to get what they want. Cyber attacks come in two forms; one against data and one against control systems. Theft and corruption of data leads to services being sabotaged and this is the most common form of Internet and computer attack. Attacks which focus on control systems are used to disable or manipulate physical infrastructure. For example, electrical networks, railroads, or water supplies could be infiltrated to have wide negative impacts on nearby geographical areas. This is done by using the Internet to send data or by penetrating security systems. These weak spots in the system were highlighted by an incident in Australia in March 2000 where a disgruntled employee (who failed to secure full-time employment) used the Internet to release 1 million liters of raw sewage into the river and coastal waters in Queensland. Actually, it took him a total of 44 failed attempts to breach the system and his 45th attempt was successful. The first 44 were not detected (Himma 82). In 1998, a terrorist guerrilla organization flooded Sri Lankan embassies with 800 e-mails a day for a two-week period. The messages simply read “We are the Internet Black Tigers and we’re doing this to interrupt your communications.” Intelligence departments characterized it as the first known attack by terrorists against a country’s computer systems. Internet saboteurs defaced the Home Page of, and stole e-mail from, India’s Bhabha Atomic Research Center in the summer of 1998. The three anonymous saboteurs claimed in an Internet interview to have been protesting recent Indian nuclear blasts (Briere, 64). In July 1997, the leader of a Chinese hacker group claimed to have temporarily disabled a Chinese satellite and announced he was forming a new global hacker organization to protest and disrupt Western investment in China. In September 1998, on the evening before Sweden’s general election, saboteurs defaced the Web site of Sweden’s right-wing moderates political party and created links to the home pages of the left-wing party and a pornography site. That same month, other saboteurs rewrote the home page of a Mexican government Internet site to protest what they said were instances of government corruption and censorship. These examples of cyber crime are called low-level information warfare. Some countries such as the U.S. and Australia have recommended setting up a cyber space network operations center which will include Internet service providers and computer hardware and software developers. Their task is to develop secure technology, such as intelligence analysis software, which will be capable of sifting through and analyzing existing data, both public and private, in order to uncover suspicious activity.

Similar Documents

Premium Essay

Cyber Terror

...Cyber threats and attacks is a person/ persons who attempt unauthorized access to a control system device and/or network using a data communications pathway. (US-CERT, 2005) Over the past few years, we as a nation have seen a major increase in National Security threats in Cyberspeace. President Obama identified Cybersecurity as one of the most serious economic and national security challenges that we are currently facing. Federal government leaders admit to falling behind with the growing threat of attacks from hacker criminals. The government accountability office has identified weakness in security controls in almost all agencies for years but yet to have total control over the threats. One of the underlying causes of the weakness is that agencies fail to implement information security programs which include assessing and managing risks, developing and implementing security policies and procedures, and promoting security awareness. (Nextgov, 2009) In January 2008, President Bush introduced the Comprehensive National Cybersecurity initiative ( CNCI). The CNCI included a number of reinforcing methods that included 1.) Managing the Federal Enterprise Network as a single network enterprise with Trusted Internet Connections. This is headed by the Office of Management and Budget and the Department of Homeland Security, it covers the consolidation of the Federal Government’s external access points (including those to the Internet) 2.) Deploy an intrusion detection system of sensors...

Words: 538 - Pages: 3

Free Essay

Information Technology

...with people being able to share ideas thus enhancing diversity (Thomas, 123-145). However, social media has negative effects as well. It is not possible to determine if a relationship developed over social media is meaningful. Many casual relationships have been nurtured through social media and in due course, some have been a source of misery to many people. Social media has been used by predators to advance negative actions to vulnerable people such as kids. Most of them have become victims of cyber-bullying and made to undergo terror experiences under the watch of their parents and peers. The consequence of cyber-bullying may be tragic and disappointing to the victim. Although social media has its positive benefits to the society, the negative effects are more aching to the target and therefore there is need for action. This is achievable by enhancing parental and institutional rules to control cyberspace and limit the negative effects associated with social media such as cyber bullying....

Words: 331 - Pages: 2

Premium Essay

Cyber Security

...Cyber security is a critical and growing issue in the world today. President Obama said this issue is, "one of the most serious economic and national security threats our nation faces" (Cybersecurity). The United States is one of the most computer dependent societies and has the most computer dependent military and intelligence agencies. With more and, more of our country being ran by technology we are at a bigger risk of attack. A cyber attack could be the most devastating attack our country has ever faced. An attack on America’s cyber infrastructure could cripple the country and put us at an even greater risk of a normal attack. FBI Director said “Counterterrorism — stopping terrorist attacks — with the FBI is the present number one priority. But down the road, the cyber threat, which cuts across all FBI programs, will be the number one threat to the country” (Paganini). The message is clear the cyber security threat we are facing today is a dangerous and growing threat that has serious offensive potential and is often difficult to detect or prevent. An attack on a nation’s critical infrastructure can be devastating and when you add the fact that cyber attacks often do not make themselves know until it is to late could make for a devastating first strike prior to an invasion. Cyber security is defined as measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack. The term “cyber security threat” means...

Words: 2041 - Pages: 9

Free Essay

Cyber Security: Cyber Terrorism

...Introduction Cyber security refers to the practices and processes that are used in technologies such as networks, computers, information and programs from damages by unwarranted entities (Ahmad, Yunos & Sahib, 2012). There are different attacks towards technology which may distort information or be used to create tension in an organization. Information stored in computers has some level of privacy and this depends on the level of sensitivity that such information may have towards that organization. Business strategies, political discussions and government documents are some of the documents that require a higher degree of privacy. However, there are individuals who cause deliberate attacks on the information systems of organizations and governments in order to unlawfully access information or distort the meaning of such data. The intention of cyber attacks has led to the classification of these attacks into particular classes. For example, we have cyber bullying and cyber terrorism. Under cyber bullying, the attackers use technology to abuse and intimidate their targets. Cyber bullying has been common through the presence of the social media where an individual will use pseudo-accounts to publish half truths about others with a bid to embarrass them. On the other hand, cyber terrorism involves the use of technology to access vital government sites in order to cause harm and fear in the society through terrorism activities. Brunst (2010) indicates that cyber terrorist activities...

Words: 1810 - Pages: 8

Premium Essay

Cyber Warfare

...Computers have modernized terrorism in the same way cyber terrorism revolutionized information warfare. There is no distinct definition of Cyber terrorism; however, its threat is as real as waging war but with weapons of automation. Terrorists have begun to exploit the availability of information with the malicious intent to sabotage; conversely, there are those who are not quite sure if information warfare - cyber terrorism is an actual threat. This research paper will briefly explore the history of cyber terrorism, the friend the internet has been to terrorist and how we can make the internet safer through vigilant tactics of prevention and deterrence. It will also expose the truth about cyber terrorism for the skeptic, reasons not to discount the threat, and why it is paramount their mind is changed. Information Warfare-Cyber Terrorism Did you know there were 18 cybercrime victims every second, 1058 every minute, approximately 64,000 per hour, and 1.5 million per day, that affected over 556 million people within the last year (Norton , 2012)? The internet has made it possible for terrorists to gather our public information and use it against us. As the internet matures so does the terrorist, finding ways to cripple and intimidate. The internet and terrorists have become a real hazard to the health of the cyber world. The government has implemented several organizations to help combat cyber terrorism but have not given it a clear concise definition. Skeptics...

Words: 3494 - Pages: 14

Free Essay

Cyber Warfare

...An attack against a computer system or network is how PC Magazine defines a cyber-attack. A Cyber-attack can take many forms, for many reasons and can be executed on a small or large scale. Most cyber-attacks are criminal in nature. These cybercrimes are usually motivated by profit. Recent examples include the cyber-attacks on Visa/MasterCard and attacks on Google’s network by China. The cyber-attacks on Visa and MasterCard were part of “operation payback”, and were carried out by various loose nit groups that organized using social networking sites. “Operation payback” was retaliation against Visa and MasterCard for refusing to continue to do business with the website WikiLeaks. WikiLeaks posted leaked classified U.S. diplomatic communications on their website for the world to see. The United States felt this was a criminal act and pressured Visa and MasterCard to stop processing transactions for WikiLeaks. In response hackers launch “operation payback” which used distributed denial-of-service (DDoS) attacks to crash Visa and MasterCard Servers. Google recently exited the Chinese market. According to the New York Times, “Google linked its decision to sophisticated cyber-attacks on its computer systems that it suspected originated in China and that were aimed, at least in part, at the Gmail user accounts of Chinese human rights activists. The attacks were directed at some 34 companies or entities, most of them in Silicon Valley, California, according to people with knowledge of...

Words: 2021 - Pages: 9

Premium Essay

Teens and Social Media

...are naturally anxious to meet new people and possibly make new friends and contacts. Online social media provide the perfect setting to do exactly that. Teenagers are able to interact with people from all over the world. This serves to not only increase their general knowledge but it enables this generation to be more tolerant of cultures and beliefs that differ from their own. New technology including smart phones with video and photo capabilities, iPad and other tablets, and portable Wi-Fi docs have made the Internet infinitely more assessable (Wolak, Mitchell & Finkelhor, 2006). Although technology has been associated with many positive effects, cyber bullying, sexting and slut shaming among teens are detrimental practices that have been encouraged by the advancement of technology owing to the obscurity that the cyber space provides. The first practice that this paper will focus on is bullying among teenagers, a form of intimidation that can take different forms and has been in existence since time immemorial. While the internet provides opportunities for self-affirmation...

Words: 1560 - Pages: 7

Premium Essay

Contemporary Heroes

...1. An overview on cyberbullying in higher education. This article defines bullying as “repeated intimidation, over time, of a physical, verbal, and Psychological nature of a less powerful person by a more powerful person or group of persons”. To date, 18 states have laws to address cyberbullying, compared with 49 states, all except Montana, having laws to address bullying (Hinduja & Patchin, 2013). State laws primarily focus on cyberbullying that occurs on K-12 campuses, and each state requires school district to have policies against bullying. In a K-12 environment, cyberbullying that occurs off campus has been handed off to the parents. The expansion and use of communications technology, such as mobile and tablet devices, has allowed the bully to transform and follow his or her victim almost anywhere, at any time. Short story/example: White female student at Duke University. On May 2010, this female student developed a fake senior thesis as a PowerPoint presentation that described her sexual exploits with 13 male students at Duke University. In her fake thesis, she utilized each student’s real name and picture which, in some cases, showed the male student in his university athletic uniform. The female student emailed the fake thesis to three people she considered close friends, and the thesis was forwarded to others undoubtedly due to the salacious nature of the thesis (Seelye & Roberts, 2010). Eventually, the thesis ended up in the public domain on the blog...

Words: 388 - Pages: 2

Free Essay

Cyber Espionage - China and the United States

...Cyber Espionage Topics in Global Strategy Mike Dresser MGT 536 March 11, 2013 Cyber espionage is quickly becoming one of the most feared tactics around the world, but most recently, the computer spy game between China and the United States has been elevated to new levels. Just within the last few days, The New York Times broke a story pin pointing Coca Cola as one of the main targets of a Chinese sponsored cyber attack. Many believe this was largely due to discussions that Coca Cola had with China Huiyuan Juice Company regarding a potential acquisition. If it had gone through, this would have been the largest acquisition of a Chinese company by a foreign corporation. However, due to an elaborate Chinese cyber spy operation, they attempted to hack into Coke’s files to find information about Coca Cola’s negotiating strategy, and the deal was ultimately terminated because of deceptive practices. This is only the tip of the iceberg as cyber spy attacks are becoming more and more prevalent across the globe with no signs of slowing down. Mandiant, a cyber security company, also made front page news this past week when they published a full detailed report that traced a series of cyber attacks on a variety of U.S. companies, as well as many of our government agencies, such as the Department of Defense, NASA, and the Department of Commerce. Mandiant specifically identified a Shanghai based operation known...

Words: 774 - Pages: 4

Premium Essay

Cyber Bullying

...Difference Between Cyber Bullying Perpetration and Non-Physical Bullying: Relations to Race, Individual, and Family Predictors Abstract The research in this article is based upon finding a relationship between cyber-bullying perpetration with non-physical bullying. It also works on find the relatedness it has with race, home life, and other issues. They use children in grades 5th through 7th and use three time points, each six months apart. The article finds that cyber-bullying does have a significant overlap with non-physical bullying but when it is compared longitudinal there was less of an overlap. In today’s society, bullying has become a very big problem among adolescents. With all the new forms of communication with technology there has been a lot of cyber-bullying, specifically. It seems to be the new way to harass others and the fact that it is done through technology it makes it less obvious. The reason it is such a big problem though, is because the harassment some of the children endure have caused suicide. This article tries to find the relatedness it has with other factors of children’s lives. If some form of connection can be found then there can be a chance to find a way to stop the problem before it begins or to even see the signs of this type of bullying. For starters, what researchers have noticed is that cyber-bullying is something that is quite new to us today. Because of this it is a topic that is less understood by what the underlying...

Words: 2945 - Pages: 12

Free Essay

Cyber Bullying

...Cyber Bullying Table of Contents I. Cover page II. Table of Contents III. Report It only seems like yesterday that teachers would have to stand on the play ground during recess and monitor the bullies, who would try to take another child’s lunch money, or to take a note being passed around in the classroom that would read something like “I will see you on the play ground after school.” A way to help prevent your child from being one of the many bullying victims is to know what the risk factors are of your child becoming one of the bullying victims. When it comes to being a bullying victim, children, teens and adults are those who don't get along well with others, have few or no friends, is less popular than others, what color their skin is, or what kind of clothes they wear, because they wear glasses, and what kind of house they live in. Now here we are in the year 2011, dealing with an entirely different style of bullying, which we all know is called “CYBERBULLYING”. No longer are the days of having the teacher send the student to the principal’s office or a phone call home to mom and dad. Friends and family of victims are also taking part when cyber bullying occurs. They may find themselves in difficult situations where they are peer pressured into participating in the bullying, afraid that if they don't play along, or they could become a target. They may feel that they have no power to stop it or start feeling guilty for not having spoken out against the...

Words: 1506 - Pages: 7

Premium Essay

Corporate/Cyber Espionage

...Corporate/Cyber Espionage You’re the owner of ABC Candy Company and just about to debut your latest and greatest chocolate snack when your biggest rival over in Asia at XYZ Candies introduces its latest snack, that is almost a doppelganger to yours. Have you just been a victim to corporate cyber espionage or just extremely bad timing? In 2012 federal agencies alone reported 46,562 cyber security incidents compared to only 5,503 in 2006. In 6 years the number of incidents has multiplied over 8 times. (LUKAS, 2013) And what is the cost of this to companies in the U.S.? It is figured the price tag for this theft of information is at least 250 Billion dollars each year. This is significantly higher than what businesses pay each year, in federal corporate income taxes. (LUKAS, 2013) Meanwhile, McAfee provides an estimate encompassing global remediation costs to total a staggering $1 trillion per annum. (Paganini, 2013) Cyber corporate espionage attacks and threatens corporate America, government programs and individuals daily in new and unrelenting ways. But who is committing these attacks and why? How are individuals, groups, companies and even governments’ gaining access to supposed secure information? And how are you and corporate America going to detect and remove these threats from your daily lives? Let’s first start with just the basic definition of just what is corporate cyber espionage Cyber espionage is defined as the intentional use of computers or digital communications...

Words: 2686 - Pages: 11

Free Essay

The Technical Criminal

...Internet to the general public. This Internet for most can be a useful resource. From gathering research for an academic project to attending a board room meeting remotely, the Internet has proven to be key in many aspects of human life today. The Internet has also given way to a slue of new crimes and negative activity. Cyber stalking, Cyber bullying, exploitation, sex crimes, financial fraud and the use of viruses and malicious code are just a few things that have become prevalent on the information super highway. One of today’s largest concerns among parents is protecting their children from becoming victims of bullying. There was a time when you had to worry about the school bully running into while in the hallways of your school or out and about around your neighbor, but the situation surrounding bullying been given a technological advantage. Social media sites such, as Facebook.com, Twitter and Instagram have become the avenues for bullies to invade their victim’s homes and lives. In a recent cyber bullying case in Lakeland Florida, a 12-year-old Rebecca Sedgwick jumped to her death at a local cement plant. She had been the victim of at least 15 cyber bullies through many avenues. The torment for her started at her school and bled over to the Facebook.com. After she was taken out of school by her mother and closed her Facebook account she continued to receive harsh messages and...

Words: 1001 - Pages: 5

Premium Essay

Fire Investigator

...Cyber Bullying Stories: Tyler Tyler Clementi, 18, was a regular freshman who was passionate about playing the violin and was still new to his gay identity. Instead of enjoying college life at Rutgers University, his first semester proved to be a living hell, one he felt he had no way of escaping. Tyler had a roommate, Dharun Ravi, who had a hard time getting along with him and realized that Tyler liked to keep to himself most of the time. When Tyler informed his roommate that he would be hosting a male guest at their dorm room and asked for some privacy, Dharun went across the hall to his friend, Molly Wei and both of them streamed a video live from Tyler’s room using Dharun’s webcam, they say Tyler kissing another man and Dharun immediately began tweeting about it to friends and other Rutgers students and possibly, the entire world. On the same night, Tyler sent a request to the school’s administration asking for a single room citing the fact that his roommate had used a webcam to spy on him. The next day, Tyler made the same notification to Dharun that he would be receiving a male guest, this time Dharun tweeted that he would be live streaming the entire sexual tryst, and invited everyone to watch, but the viewing never occurred. The next day everyone woke up to the news that Tyler Clementi had jumped off a bridge into the Hudson river, his body was found hours later. His last communication with the world was a Facebook status declaring he was jumping off the bridge and...

Words: 526 - Pages: 3

Free Essay

Cyberbully

...are all social networking sites – and they’re all part of what is at present known as social media. In that respect, they’re various benefits of delivering social media in our fellowship. Such as, helping students with their educations, supporting the communities, improving relationships and establishing raw friends... Etc. But there are also negative consequences of social media, like posting everything about our personal lives, providing major distractions to people, and most importantly the increased use of social media has led to more suicides among today’s youth--a result of cyberbullying. Ever since the creation of social media had occurred there have been another type of bullying that’s in our everyday life. Today there is "Cyber Bullying," and although it is less physical than traditional forms of bullying, it can cause more devastating and long-lasting effects, As well, there are ways to help preclude this type of bullying and then that they would be less of a chance to induce these experiences in our spirit. Cyberbullying is another path to spread harm to other masses by employing the internet or other electronic communication devices to share embarrassing information about any other individual. The methods of cyberbullying are used in many forms, it can start by making up rumors about the victims, sending photos without their consent, making sexual remarks, and also most of the time threaten the victim’s life. The victims are likely to be aimed at females...

Words: 2084 - Pages: 9