Free Essay

Cyber Terrorism: the American Response

In:

Submitted By chisangm
Words 1741
Pages 7
Cyber Terrorism: The American Response
Mutale Chisanga
School of Computer Science
03-60-305
Professor Kristina Verner
March 6, 2016

Cyber terrorism: The American Response
United States (U.S.) critical infrastructure faces a growing cyber terrorism threats due to advancements in the availability and sophistication of malicious software tools and the fact that new technologies raise new security issues that cannot always be addressed prior to adoption. The increasing automation of U.S. critical infrastructures provides more cyber access points for adversaries to exploit. Industrial control systems, which operate the physical processes of the U.S. pipelines, railroads, and other critical infrastructures, are at elevated risk of cyber exploitation.
The growth of malicious techniques that could degrade, disrupt, or destroy critical infrastructure is a huge concern for the U.S. government. It is also likely the cyber threats will surpass the terrorism threat to U.S. in the years to come (MLI, 2012). Even though only advanced threat actors are currently capable of employing these high level malicious techniques, these capabilities will eventually be within reach of all threat actors.
Discussion
The potential economic consequences of cyber terrorism attacks are severe. The severity of cyber terrorism are not felt equally across the board. A small company may not be able to survive even one significant cyber-attack. On the other hand, large companies may take a long time before they notice that they have been a victim of cyber terrorism. Often, businesses are unable to recoup their losses, and it may be impossible to estimate their damage. Many companies prefer not to disclose that their systems have been compromised, so they absorb the loss, making it impossible to accurately calculate damages. As a result of the inability to define and calculate losses, the best that the U.S government and private sector can offer are estimates. Over the past five years, estimates of the costs of cyber-crime to the U.S. economy have ranged from millions to hundreds of billions (Federal Bureau of Investigation, 2011). A 2010 study conducted by the Ponemon Institute estimated that the median annual cost of cyber-crime to an individual victim organization ranges from $1 million to $52 million (Federal Bureau of Investigation, 2015).
An example of an advanced threat actor happened on November 24, 2014, when a group of hackers released confidential data belonging to Sony Corporation. The data included information about unreleased movies, personal information about Sony employees such as salaries, Social Security numbers, home addresses, increasing the chances of identity fraud. This cyber terrorist attack was the catalyst for two important responses from the U.S. government. Firstly, on April 1st, 2015 President Obama announced The Cybersecurity Executive Order. It allows the U.S. government to hit back at hackers for the first time. The order will seek to identify and punish individuals behind attacks in the form of sanctions. Secondly, on April 22, 2015 the House of Representatives passed the Protecting Cyber Networks Act. The bill is designed to allow the private sector and government to share threat data in an effort to prevent cyberattacks. Participation will be voluntary, and those that do will be granted some form of immunity for sharing threat information. Data will be anonymized and housed in a portal most likely administered by the Department of Homeland Security. A similar bill the Cybersecurity Information Sharing Act is also making its way through the Senate. Critics of the legislation warn that the bills proposed are too broad, and could pave the way for government abuse. “When it comes to protecting our civil rights and civil liberties, we don’t usually give the government a blank check, and that’s what these bills have done in a lot of ways,” explains Matt Wood, Policy Director for Free Press. He continues to describe how the government’s excessive response doesn’t match the threat, and that these laws could be used simply for corporations to capitalize off the elimination of privacy at the risk of impeding Net Neutrality. “It could be a competitive threat, it doesn’t have to be something you and I define as a cyber security threat, just a threat to their current bottom line or business,” Wood states. Unfortunately, the U.S. government does show signs of trying to control the internet and its people’s rights to privacy in its responses to cyber terrorism threats. The U.S. government can scrutinize all Internet traffic that travels across certain major fiber optic backbones. While the U.S. government claimed to filter out data which stays within the U.S., this is clearly not true. Under “upstream” surveillance, any of your communications could be intercepted by the U.S. government if the data happened to pass through a foreign server, even if the recipient is in the U.S(feelthebern.org, 2016).
The U.S. government also created a Cyber Division to combat cyber terrorism, increased its cyber threat priority and also allocated enough resources so as to recruit more of the best people for the job. Great progress has been made since the Cyber Division was first created. It was considered a success when a cyber terrorism attack on the U.S. government networks was recognized (Federal Bureau of Investigation, 2013). This ability was soon enhanced to determine and track the threat actor or perpetrators. Since a lot the perpetrators of cyber terrorism are often overseas, the U.S. government partners with law enforcement in several key countries to extradite subjects from their countries to stand trial in the United States. In 2010, the U.S. government arrested a record 202 individuals for criminal intrusions, up from 159 in 2009(Federal Bureau of Investigation, 2014). Perpetrators such as the developers of a particularly insidious computer malware known as Blackshades have also been arrested. This software was sold and distributed to thousands of people in more than 100 countries and has been used to infect more than half-a-million computers worldwide. The U.S. government also help disrupt the GameOver Zeus botnet, one of the most sophisticated botnet that the U.S. government and its allies had ever attempted to disrupt. GameOver Zeus is believed to be responsible for the theft of millions of dollars from businesses and consumers in the U.S. and around the world. This effort to disrupt it involved notable cooperation with the private sector and international law enforcement. The Blackshades and GameOver Zeus arrests are part of an initiative launched by the Cyber Division to disrupt and dismantle the most significant botnets threatening the economy and national security of the United States. This includes law enforcement action against those responsible for the creation and use of the illegal botnets, mitigation of the botnet itself, assistance to victims, public service announcements, and long-term efforts to improve awareness of the botnet threat through community outreach. Botnets are said to cause more than $100 billion in losses globally, with approximately more than a hundred million computers infected each year (Federal Bureau of Investigation, 2014).
The U.S government also works with the Canadian government to combat cyber terrorism. Both the American and Canadian governments have developed strategies to limit, if not prevent, the damage cyberattacks by nation-states and non-state actors can inflict on the economic vitality, trade position, critical infrastructure, and security of the two North American neighbours. The Canadian and American strategies generally focus on three categories of threats: other states attempting to steal Canadian and American secrets; organized crime using cyberspace to make illegal profits; and terrorists using the Internet to recruit members and raise funds (Fraser Institute, 2015). Canada benefits from cooperation with the United States in combatting cyber terrorism because the nature of the evolving threat and the nature and cost of countering this capacity is increasingly more difficult for a state to address on its own. The problem is when government intervention increases, there is a promise of greater security, but that security comes with economic costs and potential limits on liberty and privacy. Unlike the U.S. government, the Canadian government has been criticised for its comparatively modest spending on cyber defence(Fraser Institute, 2015). The Canadian government needs to change its approach in how it deals with its critical infrastructure. More resources have to be allocated to protection strategies and the right tools to assess and prevent potential threats of cyber terrorism attacks.
Conclusion
The U.S. government has been showing great concern towards the rise in cyber terrorist attacks in the last several years. Some recent cyber terrorist attacks have been a catalyst for some important responses from the U.S. government including the Cybersecurity Executive Order and the Protecting Cyber Networks Act which of course did receive some criticism because of signs that they could infringe on civil rights and civil liberties the people. Both the American and Canadian governments have developed strategies to limit, if not prevent, the damage cyberattacks. The U.S. government allocates a lot of resources to combat cyber terrorism so Canada also benefits from cooperation because the nature of the evolving threat and the nature and cost of countering this capacity is increasingly more difficult for a state to address on its own. Unfortunately, the Canadian government does not spend enough on cyber defence so their technology is not as sophisticated as other allied developed countries.

References
Federal Bureau of Investigation. (2011). Cyber Security: Responding to the Threat of Cyber Crime and Terrorism. Retrieved from https://www.fbi.gov/news/testimony/cybersecurity-responding-to-the-threat-of-cyber-crime-and-terrorism
Federal Bureau of Investigation. (2013). Cyber Security: Preparing for and Responding to the Enduring Threat. Retrieved from https://www.fbi.gov/news/testimony/cyber-security-preparing-for-and-responding-to-the-enduring-threat
Federal Bureau of Investigation. (2014). Cyber Security: Terrorism, and Beyond: Addressing Evolving Threats to the Homeland. Retrieved from https://www.fbi.gov/news/testimony/cyber-security-terrorism-and-beyond-addressing-evolving-threats-to-the-homeland
MLI. (2012). MLI PAPER: CANADA LACKS NATIONAL STRATEGY TO RESPOND TO TERRORISTS, NATURAL DISASTERS AND CYBER-ATTACKS. Retrieved from http://www.macdonaldlaurier.ca/mli-paper-canada-lacks-national-strategy-to-respond-to-terrorists-natural-disasters-and-cyber-attacks/
Fraser Institute. (2015). Cybersecurity challenges for Canada and the U.S. Retrieved from https://www.fraserinstitute.org/sites/default/files/cybersecurity-challenges-for-canada-and-the-united-states.pdf feelthebern.org. (2016). Bernie Sanders on Cybersecurity. Retrieved from http://feelthebern.org/bernie-sanders-on-cybersecurity/

Similar Documents

Premium Essay

Cyber Terrorism

...CYBER TERRORISM Table Of Contents Section Page Abstract----------------------------------------------------------3 Introduction-----------------------------------------------------4 Premise----------------------------------------------------------5 Research Methodology----------------------------------------5 Research Results-----------------------------------------------6 Critical Analysis------------------------------------------------9 Conclusion-------------------------------------------------------30 Appendix---------------------------------------------------------31 Bibliography----------------------------------------------------56 Abstract FBI cyber security division computers are hacked into at the same time that known hackers capable of performing this have their computers hacked into and are blown up when they hit certain keys on their computer keyboards. Traffic lights and the transportation systems are then hacked into and total gridlock and chaos ensure. Wall Street is then affected and cyber money is thought to be dwindling away. This is known as a Fire Sale which has 3 steps. In the first step transportation is shut down then finance and finally, in the third step, utilities are affected. As expected, the media broadcast the government’s next move to everyone including the terrorists. As it turns out, the leader of the terrorists is a former DOD software programmer that had warned...

Words: 4562 - Pages: 19

Free Essay

History of Digital Crimes and Digital Terrorism and Their Common Current Forms

...History of Digital Crimes and Digital Terrorism and Their Common Current Forms Stephanie Fisk Strayer Universality CIS 170 Professor CIANCIOTTA Dec. 12th, 2013 Introduction Computer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Net crime refers to criminal exploitation of the internet. Dr. Debarati Halder and Dr. K. Jaishankar (2011) defines cybercrimes as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as internet chat rooms, emails, notice boards, groups, and mobile phone. Such crimes may threaten a nation’s security and financial health. Problems surrounding these types of crimes have become high profile, particularly those surrounding cracking, copyright infringement, child pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise. Internationally, both governmental and non-state actors engage in cybercrimes, including espionage, financial theft, and other cross-border crimes. Activity crossing international borders and involving the interests of at least one nation state is sometimes referred to as cyber warfare. The international legal system is attempting...

Words: 2411 - Pages: 10

Free Essay

Private Security

...“homeland security” truly came into a whole new focus. Prior to this tragic incident, the abundance of security vulnerabilities that existed in our country were not as well known or as well publicized. Furthermore, it was just assumed and expected that the public sector was quite capable of handling our domestic security needs. This could not have been farther from the truth. The concept of “homeland security” is a both a broad and highly complex term that encompasses virtually every facet of the American infrastructure on land, in air, at sea, and even underground. Just taking into account the vast amounts of land that the United States encompasses is a difficult task within itself. The Office of Homeland Security (which was the predecessor to the Department of Homeland Security) attempted to simplify the concept of homeland security by describing it as a “concerted national effort to prevent terrorist attacks within the United States, reduce America’s vulnerability to terrorism, and minimize the damage and recover from any attacks that do occur.” Moreover, a number of federal agencies such as the Department of Homeland Security, Department of Defense, and the Congressional Budget Office just to name a few, have recognized the important role that private security firms will play in bringing the total concept of “homeland security” to fruition. Thanks in large part to federal studies and reports, the rapid inclusion and implementation of the private security sectors within...

Words: 1945 - Pages: 8

Free Essay

Cyber Warfare

...An attack against a computer system or network is how PC Magazine defines a cyber-attack. A Cyber-attack can take many forms, for many reasons and can be executed on a small or large scale. Most cyber-attacks are criminal in nature. These cybercrimes are usually motivated by profit. Recent examples include the cyber-attacks on Visa/MasterCard and attacks on Google’s network by China. The cyber-attacks on Visa and MasterCard were part of “operation payback”, and were carried out by various loose nit groups that organized using social networking sites. “Operation payback” was retaliation against Visa and MasterCard for refusing to continue to do business with the website WikiLeaks. WikiLeaks posted leaked classified U.S. diplomatic communications on their website for the world to see. The United States felt this was a criminal act and pressured Visa and MasterCard to stop processing transactions for WikiLeaks. In response hackers launch “operation payback” which used distributed denial-of-service (DDoS) attacks to crash Visa and MasterCard Servers. Google recently exited the Chinese market. According to the New York Times, “Google linked its decision to sophisticated cyber-attacks on its computer systems that it suspected originated in China and that were aimed, at least in part, at the Gmail user accounts of Chinese human rights activists. The attacks were directed at some 34 companies or entities, most of them in Silicon Valley, California, according to people with knowledge of...

Words: 2021 - Pages: 9

Premium Essay

Evaluation of the Global Impact of the Estonia Cyber Event

...IA1 – EVALUATION OF THE GLOBAL IMPACT OF THE ESTONIA CYBER EVENT Sherquita Tucker CSEC655 Section 9041 Table of Contents 1. Introduction 3 2. Background and Global Impact 4 3. Vulnerabilities in Cybersecurity Policy and Practices 5 4. Advantages of Reducing Vulnerabilities for Future Attacks 8 5. Disadvantages of Reducing Vulnerabilities for Future Attacks 8 6. Advantages of Improving Security Practices or Policies 9 7. Disadvantages of Improving Security Practices or Policies 10 8. Summary and Conclusion 12 References 14 IA1 – Evaluation of the Global Impact of the Estonia Cyber Event 1. Introduction What if suddenly the safety systems of nuclear power plants unexpectedly malfunctioned, or suddenly floods of water was released atop a neighboring community due to a malfunctioning of the control systems of a major dam, or air traffic control systems of major airports was to suddenly render inoperable, or business transactions of stock exchanges or major banks stopped or vanished ? Even worse, what if it all occurred instantaneously? Would this be an idea behind a new movie thriller, or the realism of cyber war in the twenty-first century? The notation of the using computing and networking systems as an alternative method to the traditional terrorist attacks has always been a major concern. In the early 1990s, since the public debut of the Internet, not all consumers have used cyberspace with peaceful intent. This is particularly...

Words: 3346 - Pages: 14

Premium Essay

A Case of Bureaucracy

...that this form of violence and terrorism, aptly called cyber terrorism, is no more a thing of the past and is very much possible in our technological and computer savvy world of today. The economic growths achieved by many countries due to such technological advancement in fields of computers such as networking. Networking has provided the world with the Internet that has bridged the distances of the world and made it into a global village. People can now use the Internet to share information with each other. Internet can also be used as a communication tool and people sitting in places half way across the globe can communicate with each other with a click of a button. At the same time, the Internet can also be a dangerous place. People share information through their computers and this means that their computers are online in a cyber world. This means that the person’s computer is open to threats and risks from anyone who knows how to get inside the computer. People can use the Internet to steal someone else’s credit card numbers, and a lot of other personal information. In this paper, we shall examine how people can use the Internet to spread a new form of terrorism, cyber-terrorism. A person sitting at home using his personal computer can longer feel safe, even in the security of his/her own home, as information security has become one of the prime concerns of everybody, including the government. It is believed that a threat of cyber-terrorism is a very real threat and the...

Words: 2734 - Pages: 11

Free Essay

Change Managment

...Cyber Terrorism Mahesh kanneboina Wilmington University Abstract The Internet is the global connection of interconnected computer networks where information can be shared among users around the world. But these days the Internet is not secure as the fundamental mechanics of the Internet are well known to many people and leading to long-standing security issues caused by the bad people who could build a “cyber nuke” to take down the network. This paper discusses about the cyber terrorism where a hacker or terrorist attacks the confidential websites of the nation and gets the important information for their activities. This cyber terrorism came into light after the 9/11 attack on WTC and from then the media focused its attention on Cyber security that has reflected public policy concerns worldwide about this topic. Security of Internet and BGP The Internet is where every network is able to reach every other network. According to industry analysts, there are 794 million people online world-wide and it is expected to be more in the coming years. This represents a lot of data interchange. But many small businesses, and even large organizations, do not know how to protect their sensitive data, thus making it easy for criminals. Online Security is a growing concern for governments around the world. Border Gateway Protocol (BGP) is the protocol which makes core routing decisions on the Internet, but unfortunately, BGP is not secure because some network administrator...

Words: 2007 - Pages: 9

Premium Essay

A Case of Bureaucracy

...that this form of violence and terrorism, aptly called cyber terrorism, is no more a thing of the past and is very much possible in our technological and computer savvy world of today. The economic growths achieved by many countries due to such technological advancement in fields of computers such as networking. Networking has provided the world with the Internet that has bridged the distances of the world and made it into a global village. People can now use the Internet to share information with each other. Internet can also be used as a communication tool and people sitting in places half way across the globe can communicate with each other with a click of a button. At the same time, the Internet can also be a dangerous place. People share information through their computers and this means that their computers are online in a cyber world. This means that the person’s computer is open to threats and risks from anyone who knows how to get inside the computer. People can use the Internet to steal someone else’s credit card numbers, and a lot of other personal information. In this paper, we shall examine how people can use the Internet to spread a new form of terrorism, cyber-terrorism. A person sitting at home using his personal computer can longer feel safe, even in the security of his/her own home, as information security has become one of the prime concerns of everybody, including the government. It is believed that a threat of cyber-terrorism is a very real threat and the...

Words: 2737 - Pages: 11

Premium Essay

Homeland

...biological weapons, and cyber viruses and identify existing countermeasures in the State of Florida. Being a highly susceptible region for illegal immigration coming across the border, Florida has a close watch for terroristic threats. The following pages will review the threats and measures taken in the State of Florida. Domestic Terrorism Domestic terrorism can be defined as a threatened use, or unlawful use, of violence or force by an individual or group that is operating without any foreign direction within the country and as an act that is violent and dangerous to human life and also against the jurisdiction of the country (Terrorism, 2005). Explosives, weapons, and chemicals are common means of violence in terrorist attacks. As the appendix lists, there are several types of terroristic attacks that must be watched for such as bombings, sniper attacks, biological weapons, and cyber viruses and counter action and safety measures must be planned. Victims can are defined as society. This includes civilians, government workers, the military, first responders, or any stakeholder within the region being terrorized. While reasons for attacks can vary, political motivations along with religious differences and social ideas are the main culprits. When terrorists are planning attacks they may obtain materials such as weapons, vehicles, and security keys, or map out routes, observe particular places and people, time traffic lights and response times, and even receive...

Words: 2135 - Pages: 9

Premium Essay

Crime

...wikipedia.org/wiki/Counter-terrorism Counter-terrorism (also spelled counterterrorism) is the practices, tactics, techniques, and strategies that governments, militaries, police departments and corporations adopt to prevent or in response to terrorist threats and/or acts, both real and imputed. The tactic of terrorism is available to insurgents and governments. Not all insurgents use terror as a tactic, and some choose not to use it because other tactics work better for them in a particular context. Individuals, such as Timothy McVeigh, may also engage in terrorist acts such as the Oklahoma City bombing. If the terrorism is part of a broader insurgency, counter-terrorism may also form a part of a counter-insurgency doctrine, but political, economic, and other measures may focus more on the insurgency than the specific acts of terror. Foreign internal defense (FID) is a term used by several countries[citation needed] for programs either to suppress insurgency, or reduce the conditions under which insurgency could develop. Counter-terrorism includes both the detection of potential acts and the response to related events. Anti-terrorism versus counter-terrorism Further information: Detentions following the September 11, 2001 Terrorist Attack The concept of anti-terrorism emerges from a thorough examining of the concept of terrorism as well as an attempt to understand and articulate what constitutes terrorism in Western terms. In military contexts, terrorism is a tactic, not an ideology...

Words: 6044 - Pages: 25

Premium Essay

Assignment 2 Critical Infrastructure Protection

...prepared to respond.   DHS primary responsibilities are combatting terrorism, securing boarders, enforcing immigration laws, safeguarding cyberspace, and responding to natural disasters. Coordination with the federal response teams and partnerships with local, state, and private sectors, enhance the DHS response tactics in a national emergency. Department of Homeland Security Mission, Operations, and Responsibilities The Department of Homeland Security’s mission is to keep America safe, protected, and resilient from various elements that threaten the country.  As identified by (dhs.gov, 2013) DHS has three key concepts that strategies are based upon security, resilience, and customs and exchange.  The process that defines homeland security missions and incorporates the key concepts is the Quadrennial Homeland Security Review (QHSR). DHS missions are spread across the enterprise and do not only cover DHS.  The delegated missions define in detail how to prevent, protect, respond, recover, secure, ensure resilience, and facilitate customs and exchange as noted by (dhs.gov, 2013).     Department of Homeland Security operations encompass five core objectives.  The objectives covered under DHS are prevention of terrorism and enhancing security; secure and manage our boarders; enforce and administer immigration laws; safeguard and secure cyberspace; ensure resilience to disasters stated in (dhs.gov, 2013).  Protecting Americans from terrorist threats is the highest priority for DHS through...

Words: 1685 - Pages: 7

Premium Essay

Homeland Security Research Paper

...order to secure our nation from the many threats we face daily (dhs.gov. n.d.). However, in order to do these things, the employees for the department have to ensure that their jobs are done to a standard which includes everyone working together to achieve the mission of the department which is to prevent terrorism and enhance security, secure and manage our borders, enforce and administer our immigration laws, safeguard and secure cyberspace, and ensure resilience to disasters (dhs.gov. n.d.). These are the five-homeland security primary or core missions as well as placing focus towards maturing and strengthening the homeland security enterprise (dhs.gov. n.d.). However, without the three key concepts which are security, resilience and customs and exchange these forms that are the foundation of the department strategy could not make the previous five-homeland security core or mission works. These five core missions are important to the department because they ensure the safety of the American people. Thus, without the five homeland security missions we would not feel safe as we travel...

Words: 1242 - Pages: 5

Free Essay

Cyber Terrorism

...12/31/13 Cyber Terroism Cyber terrorism is a combination of two terms Cyber and terrorism. The word "Cyber" is derived from "cybernetic", a word from Greek "kybernetes", meaning "To steer" and the term "terrorism" comes from French terrorisme, from Latin word 'terror', "great fear", "dread", related to the Latin verb terrere, "to frighten". Cyber terrorism denotes unlawful attacks and threats of attack against computers, networks and information stored therein to intimidate or coerce a government or its people for propagating hidden political or unlawful social and religious agendas. These attacks result in violence against persons or property or cause public unrest. Few examples could be explosions, plane crashes and severe losses. Terrorists are known to use internet to prepare the schemes, raise funds and spread cyber terrorism. For instance, Razmi Yousef who was a key person behind World Trade Centre attack had details schemes to destroy United States airliners encrypted files in his laptop computer. We know that Cyber terrorism is the crime that has emerged in recent times, to use the medium of Internet to terrorize the minds of citizens. Admirably, the Laws through the implementation of the Information technology Act, 2000, is one of the efficient steps taken towards the creation of punishment of these kinds of crimes. There is need of innovative laws and global standards on preventive action. The Indian Information Technology Amendment Act 2008 lays down Section 66F...

Words: 4466 - Pages: 18

Free Essay

Computer Crime

...disrupts or destroys existing computer systems. A virus spreads rapidly around the world destroying computer files and costing companies and individuals millions in downtime or when the computers networks are shutdown. Most viruses are released by hackers as pranks. A hacker is someone who gains unauthorized access to a specific system. Sometimes hackers may target law enforcement or military computers and read or copy sensitive information. Some are concerned that terrorists will unleash viruses to cripple computer systems that control vital transportation networks. By using the computer as the instrument of a crime means that some other criminal objective is gained. Just like in the real world where a criminal can steal and rob, even in the cyber world criminals resort to stealing and robbing. In this case, they can steal a person’s bank details and money, misuse the credit card to make numerous purchases online, run a scam to get naïve people to part with their hard earned money, use malicious software to gain access to an organization’s website or disrupt the systems of...

Words: 846 - Pages: 4

Free Essay

Business Forecasting

...vs the U.S. culture, and its impact on the business world. f. Importance of individuals to understand the cultures, customs and traditions of the region in order to function properly. IV. Strengths and Weaknesses g. Strengths of having a business in this region. h. Possible threats in this region i. Cyber-terror threats and the advancement in technology’s affect on security. V. Reducing the risk j. Ways to reduce the regional risk. k. Possibility of unionization, and labor protection VI. Conclusion VII. Bibliography Business Forecasting for Coastal Regions: Post-Tsunami I. Introduction In early March of 2011, thousands of individuals were killed by a 9.0 magnitude earthquake and subsequent tsunami in many coastal regions, but mainly Japan. Coastal regions are unique when it comes to business in the fact that not only do they have many dangers in the way of cyber-terrorism, corporate theft, and local tradition but they also have many environmental dangers that other parts of the world are not in danger of. Despite the dangers of opening a corporation in a coastal region numerous American companies have locations in Japan; some of these corporations are Costco and Wal-Mart. According to an article by CNBC after the...

Words: 3697 - Pages: 15