Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
Cyberterrorism is a growing global concern. Since computers control the majority of the developed world’s infrastructure, it is easily penetrated by dedicated hackers. Cyber-attacks can create enormous damage at very little cost to terrorists. Cyberterrorism concerns activity that utilizes electronic communication networks to further unlawful and violent ends.
Conventional terrorism that the world is familiar with whether carried by individuals or groups intended to use human nature of fear to gain political or financial gains. Fear is always associated with a terror act and the same as with cyber terrorism, it's using human nature of fear to gain political or financial gains, but the mechanisms to conduct this fear is different, it is our current state of technology that we utilize in cyberspace. The literature review provided an inside look at how cyberspace is being utilized as a platform for launching terrorist attacks as well as combating those attacks and threats of attacks. The real-world examples of cyberterrorism activity reviewed illustrate the complexity, power, and fear that these incidents can cause. The attacks against governments or corporations, such as the attack on Iranian nuclear program, Sonny and the 2016 Democratic National Committee email leak show link between cyberterrorism and critical infrastructure. Type of infrastructure targeted and the suspected players involved posed implications as far as counterterrorism concern. Malicious codes written to target SCADA systems was sophisticated, unprecedent and posed an implication as far as the industrial control technology concern. This type of computer worm changed the theoretical hypothesis into reality, where computer technology may be used and directed to cause physical damage. Weaponizing computer technology using sophisticated malicious codes to target infrastructure and causing physical damage constitutes a cyberwarfare competition and demonstrate the ability may be used by adversary and cause physical damage.
2018
The idea that terrorists could cause massive loss of life, worldwide economic chaos and devastating environmental damage by hacking into critical infrastructure systems has captured the public imagination. Air traffic control systems, nuclear power stations, hospitals and stock markets are all vulnerable targets for cyber-terrorists wanting to wreak havoc and destruction. Counter-terrorism investigation in Europe have shown that the use of the Internet is an integral component in any terrorist plot. Terrorist groups are resorting to encryption and anonymising tools in order to keep their identities hidden while they communicate, plan attacks, purchase illegal materials and perform financial transactions. The possibility of an act of cyberterrorism against critical national infrastructure requires serious attention from legislators. There is no concrete legal definition of cyberterrorism internationally. A wide range of possible cyberattack scenarios exists - including acts of hacktivism against websites - and it is not clear which of these scenarios would fall within definitions of terrorism under domestic law. While terrorists continue to use the Internet mostly for communication, propaganda and information sharing purposes, their capabilities to launch cyberattacks remain limited.
Cyberterrorism is an extension of terrorism, and is a result of the resourcefulness of terrorists and their adaptability to ever-changing society and technology. It is further defined as: 7 "The premeditated, politically motivated attack against information, computer systems, computer programs, and data which result in violence against noncombatant targets by subnational groups or clandestine agents."
2019
Technological advancements provide different avenues for a terrorist to employ their attacks. Cyberterrorism is defined as the act of hacking and the malicious intent to disrupt and destroy computer networks of financial institutions and governmental systems such as nuclear power plants or governmental agencies (Iqbal, 2004). Cyber threats/crimes are the act of
FCA Publication, 2024
Cyberterrorism poses a significant and evolving threat in the digital age. Cyberterrorism has emerged as a grave concern in the contemporary world, with potential impacts on national security and global stability. This paper delves into the intricate realm of cyberterrorism, shedding light on its significance and consequences. By understanding the motivations and tactics employed by cyber terrorists, we can better comprehend the threats we face and develop strategies to safeguard against them. This review paper provides an in-depth analysis of cyberterrorism, including its historical background, motivations, tactics, and potential consequences. It explores the vulnerabilities of critical infrastructure, government systems, and financial institutions, prime targets for cyber terrorists. Additionally, the paper discusses the legal and ethical implications of countering cyberterrorism and provides insights into future trends and challenges. It concludes with recommendations for effective security measures to mitigate the risks associated with cyberterrorism.
Terrorism, one of the vilest crimes, faced by the human community has posed an immense challenge in the post Cold War period. It has existed since the emergence of human societies endangering innocent lives and jeopardizing human rights and fundamental freedoms. Though the conventional motives have remained the same, the traditional concepts and methods of terrorism have taken new dimensions that are more destructive 1 and deadly in nature. In the age of information technology the terrorists have acquired an expertise to produce the most deadly combination of weapons and technology, which are much more modern and scientific. This phenomenon where the cyber space is used to launch terror attacks is also known as cyber-terrorism. It has the potential to do indeterminable harm not only by paralyzing computer infrastructures but also comprehending the use of the cyberspace to support and organize traditional forms of terrorism, such as bombings and suicide attacks. It also poses a deadly threat on the national security of a state by offering a garb of anonymity to the perpetrators of terror. The increased dependency on information technology has dramatically increased the security risks. This new menace will be a severe challenge to global security unless there are appropriate security measures to help prevention. Hence, to understand cyber terrorism, and find out the ways in which the terrorist organizations are using the advantage of this new technology, a look at its background is necessary. This paper shall make an attempt to discuss the rising incidents of cyber terrorism across the globe, the meaning and concept of the term, the motives and methods behind an attack. It shall also discuss the regional and international mechanisms to prevent cyber terrorism, and recommend what more could be done.
As the addiction of internet is increasing at a highly increasing rate from our mobile phones to our streets, from our streets to our colleges, from our colleges to our work places, from our work places to our hospitals and from our hospital to everywhere, the risks caused by cyber terrorism has also increased. During the past few decades, the threats posed by cyber terrorism have increased to a deadly rate. It has raised a question mark to the Government's security policies and agendas. This caused Government agencies to revise their security policies. It has raised awareness of the other channels that terrorists might be adopting to accomplish their ambitions. These attacks are planned to cause severe economic damage to someone and even in some cases it harms someone's life. This research is designed for a clear understanding of a layman what cyber terrorism exactly is
SA Journal of Information Management, 2003
Information security may be the realm of specialists, but today it touches the lives and safety of millions in the developed world. In this column appears as attempt to sketch short profiles of the most pressing issues. Cyber-terrorism: reality or paranoia? The new millennium-if there ever was one in any scientific meaning of the term-has been ushered amid a media circus of a Y2K scare and predictions of total world paralysis. It did not realize, and we were all relieved for a while, short as it was, until something far more dark and sinister in the shape of two airplanes hit the World Trade Centre. The amount of vital data and information lost in that attack has brought home a new threat to haunt those responsible for information security: cyber-terrorism. Increasingly, the world depends on computers. The systems residing on them control power delivery, communications, aviation and financial services. They are used to store vital information, from medical records to business plans to criminal records. These computers are vulnerable to the effects of poor design and insufficient quality control, to accident, and perhaps most alarmingly, to deliberate attack. The modern thief can steal more with a computer than with a gun. Does it follow, then, that tomorrow's terrorist may be able to do more damage with a keyboard than with a bomb? New term, old game Terrorism is a much-used term with many definitions. The US Department of State defines it as 'premeditated, politically motivated violence perpetrated against non-combatant targets by sub-national groups or clandestine agents'. If we combine this definition with the term 'cyber', we end up with a working definition of cyber-terrorism: 'The premeditated, politically motivated attack against information, computer systems, computer programs and data which result in violence against non-combatant targets by sub-national groups or clandestine agents' (Politt 1998). For the term 'cyber-terrorism' to have any meaning, we must be able to differentiate it from other kinds of computer abuse such as computer crime, economic espionage or information warfare. Using this definition, a number of things that are often miss-associated with cyber-terrorism can be eliminated. For instance non-politically motivated computer crimes, like the 16-year-old hacker's 1994 crashes of 100 US defence systems, or the creation and release of the Nimda worm (or any other worm for that matter). These were not acts of cyber-terrorism, although both were serious incidents with the potential for great harm. They lacked the essential ingredients that would allow for the term 'terrorism'. Unlike a virus or computer attack that simply causes a prevention or delay of service, a cyber-terrorist attack leads to physical violence of some sort or extreme financial harm. Therefore, possible cyber-terrorism targets include the banking industry, military installations, power plants, air traffic control centers and water systems. Cyber-terrorists are not merely individuals seeking to cause harm or damage wherever they can. They are people or groups with political agendas.
Terrorism and Political Violence
This article reports on a recent survey designed to capture understandings of cyberterrorism across the global research community. Specifically, it explores competing views, and the importance thereof, amongst the 118 respondents on three definitional issues: First, the need for a specific definition of cyberterrorism for either policymakers or researchers; Second, the core characteristics or constituent parts of this concept; and, Third, the value of applying the term cyberterrorism to a range of actual or potential scenarios. The article concludes by arguing that while a majority of researchers believe a specific definition of cyberterrorism necessary for academics and policymakers, disagreements and debates around what this might look like have additional potential to encourage a rethinking of terrorism more widely.
The tremendous achievements and the development of the leading technology, sophisticaled computer systems opened new " cyberspace " that constantly destroys the old traditional forms of organization, behavior and belief. Cyber information led to cyber revolution and the emergence of the information society, which dominates the race for information and communication technologies, in parallel the global liberalization and free circulation of people, goods and ideas (Stern, Jessica, 1999). Today, thirty years after the introduction of the term, the concept of cybernetics, it inevitably became a primary component of many important terms: cyber society, cyber policy, cyber economy, cyber warefare, cyber terrorism, cyber crime, in which essentially the most precious crown represents cyber information. Cyber terrorism is an important cybersystem of cyber warefare, and is very difficult to detect and counter because it is almost impossible to determine the political affiliation or sponsors of its prepertators.
O Bezpeczeństwie i Obronności, 2024
The phenomenon of globalization, the development of technology, and the widespread use of the Internet have led to the creation of a digital space for information processing and exchange. Currently, it is used by various users, including public institutions, private companies, and individual users who have access to the network at home and on private electronic devices. Cyberspace protection has therefore become one of the main strategic goals in the security area of every states. Ensuring it depends mainly on the creation of effective mechanisms for preventing and combating threats on the Internet. The aim of this article is to present the issue of cyberterrorism as one of the main threats to the security of society and the state in cyberspace. With the development of the Internet, terrorists have new opportunities to act, regardless of where they are at any given time. Therefore, the article attempts to define the concept of cyberterrorism and the possible applications of this form of activity on the Internet. An important aspect has become the analysis of the benefits of using cyberspace for terrorist groups, including in terms of the radicalization of young people.
UGC sponsored National Seminar on Globalization …, 2002
Computer crime has hit mankind with unbelievable severity. In the past, hackers have taken down national defense systems, taken control of a huge dam, shut down large segments of America's power grid, silenced the command and control system of the US Pacific Command in Honolulu, disrupted troop deployments during the Gulf War etc.
2021
The article focuses on the destructive phenomenon of cyberterrorism as an atypical manifestation (form) of traditional terrorism, carried out in the light of the intense development and wide dissemination of information and communication technologies (ICT) in the modern world. Based on the analysis of conceptual approaches in the understanding of the phenomenon under consideration, the conclusion is based on that cyberterrorism is a relevant conceptual notion (term), which is perceived as a method of committing a terrorist act (truncated understanding), or as any terrorist crime committed with the use of information and communication technologies (broad). Based on a comparative legal analysis, the authors examine as characteristics of regulatory and legal counteraction to cyberterrorism in the international criminal law system. The study of the mechanism of the international convention to combat traditional terrorism allows us to test the hypothesis on the potential applicability of...
: CONTEMPORARY MACEDONIAN DEFENCE - INTERNATIONAL SCIENTIFIC DEFENCE, SECURITY AND PEACE JOURNAL, 2013
It is more than obvious that the way of conducting terrorism with the time is becoming more sophisticated. The cyber terrorism is real threat to fast technology development. Potential targets are systems which control the nation’s defenses and critical infrastructure. The terrorist of the future will win the wars without firing a shot - just by destroying infrastructure that significantly relies on information technology. The fast growth of the Internet users and Internet dependence dramatically increased the security risks, unless there are appropriate security measures to help prevention. To understand cyber terrorism it is important to look at its background, to see how the terrorist organizations or individuals are using the advantage of new technology and what kind of measures governments and international organizations are taking to help the fight against cyber terrorism.
Indian Police Journal, 2003
Cyber terrorism is an attractive option for a terrorist due to the inherent nature of computers. Various critical infrastructures using computerized systems could be highly vulnerable.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.