Cyber-terrorism
Encyclopedia
Cyberterrorism is the use of Internet
Internet
The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite to serve billions of users worldwide...

 based attacks in terrorist
Terrorism
Terrorism is the systematic use of terror, especially as a means of coercion. In the international community, however, terrorism has no universally agreed, legally binding, criminal law definition...

 activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses.

Cyberterrorism is a controversial term. Some authors choose a very narrow definition, relating to deployments, by known terrorist organizations, of disruption attacks against information systems for the primary purpose of creating alarm and panic. By this narrow definition, it is difficult to identify any instances of cyberterrorism.

There is much concern from government and media sources about potential damages that could be caused by cyberterrorism, and this has prompted official responses from government agencies.

Several minor incidents of cyberterrorism have been documented.

Definition

There is debate over the basic definition of the scope of cyberterrorism. There is variation in qualification by motivation, targets, methods, and centrality of computer use in the act. Depending on context, cyberterrorism may overlap considerably with cybercrime
CyberCrime
CyberCrime was an innovative, weekly America television program on TechTV that focused on the dangers facing computer users. Filmed in San Francisco, California, the show was hosted by Alex Wellen and Jennifer London...

 or ordinary terrorism
Terrorism
Terrorism is the systematic use of terror, especially as a means of coercion. In the international community, however, terrorism has no universally agreed, legally binding, criminal law definition...

.

Narrow definition

If cyberterrorism is treated similarly to traditional terrorism
Terrorism
Terrorism is the systematic use of terror, especially as a means of coercion. In the international community, however, terrorism has no universally agreed, legally binding, criminal law definition...

, then it only includes attacks that threaten property or lives, and can be defined as the leveraging of a target's computers and information, particularly via the Internet
Internet
The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite to serve billions of users worldwide...

, to cause physical, real-world harm or severe disruption of infrastructure.

There are some who say that cyberterrorism does not exist and is really a matter of hacking
Hacker (computer security)
In computer security and everyday language, a hacker is someone who breaks into computers and computer networks. Hackers may be motivated by a multitude of reasons, including profit, protest, or because of the challenge...

 or information warfare
Information warfare
The term Information Warfare is primarily an American concept involving the use and management of information technology in pursuit of a competitive advantage over an opponent...

. They disagree with labeling it terrorism because of the unlikelihood of the creation of fear, significant physical harm, or death in a population using electronic means, considering current attack and protective technologies.

If a strict definition is assumed, then there have been no or almost no identifiable incidents of cyberterrorism, although there has been much public concern.

Broad definition

Cyberterrorism is defined by the Technolytics Institute as "The premeditated use of disruptive activities, or the threat thereof, against computers and/or networks, with the intention to cause harm or further social, ideological, religious, political or similar objectives. Or to intimidate any person in furtherance of such objectives." The term was coined by Barry C. Collin.

The National Conference of State Legislatures
National Conference of State Legislatures
The National Conference of State Legislatures is a bipartisan non-governmental organization established in 1975 to serve the members and staff of state legislatures of the United States...

, an organization of legislators created to help policymakers issues such as economy and homeland security defines cyberterrorism as:


[T]he use of information technology by terrorist groups and individuals to further their agenda. This can include use of information technology to organize and execute attacks against networks, computer systems and telecommunications infrastructures, or for exchanging information or making threats electronically. Examples are hacking into computer systems, introducing viruses to vulnerable networks, web site defacing, Denial-of-service attack
Denial-of-service attack
A denial-of-service attack or distributed denial-of-service attack is an attempt to make a computer resource unavailable to its intended users...

s, or terroristic threats made via electronic communication.


For the use of the Internet by terrorist groups for organization, see Internet and terrorism
Internet and terrorism
The presence of terrorist groups on the internet is a relatively new phenomenon, the growth of which has exploded in the past decade. Accurate estimates on the number of active terrorist group’s websites vary due to difficulties measuring but, there is a general consensus that in 1996 there was...

.

Cyberterrorism can also include attacks on Internet business, but when this is done for economic motivations rather than ideological, it is typically regarded as cybercrime
CyberCrime
CyberCrime was an innovative, weekly America television program on TechTV that focused on the dangers facing computer users. Filmed in San Francisco, California, the show was hosted by Alex Wellen and Jennifer London...

.

As shown above, there are multiple definitions of cyber terrorism and most are overly broad. There is controversy concerning overuse of the term and hyperbole in the media and by security vendors trying to sell "solutions".

Concerns

As the Internet becomes more pervasive in all areas of human endeavor, individuals or groups can use the anonymity afforded by cyberspace
Cyberspace
Cyberspace is the electronic medium of computer networks, in which online communication takes place.The term "cyberspace" was first used by the cyberpunk science fiction author William Gibson, though the concept was described somewhat earlier, for example in the Vernor Vinge short story "True...

 to threaten citizens, specific groups (i.e. with membership based on ethnicity or belief), communities and entire countries, without the inherent threat of capture, injury, or death to the attacker that being physically present would bring.

As the Internet continues to expand, and computer systems continue to be assigned more responsibility while becoming more and more complex and interdependent, sabotage or terrorism via cyberspace may become a more serious threat and is possibly one of the top 10 events to "end the human race".

History

Public interest in cyberterrorism began in the late 1980s. As 2000 approached, the fear and uncertainty about the millennium bug
Year 2000 problem
The Year 2000 problem was a problem for both digital and non-digital documentation and data storage situations which resulted from the practice of abbreviating a four-digit year to two digits.In computer programs, the practice of representing the year with two...

 heightened and interest in potential cyberterrorist attacks also increased. However, although the millennium bug was by no means a terrorist attack or plot against the world or the United States, it did act as a catalyst in sparking the fears of a possibly large-scale devastating cyber-attack. Commentators noted that many of the facts of such incidents seemed to change, often with exaggerated media reports.

The high profile terrorist attacks in the United States
United States
The United States of America is a federal constitutional republic comprising fifty states and a federal district...

 on September 11, 2001 and the ensuing War on Terror
War on Terror
The War on Terror is a term commonly applied to an international military campaign led by the United States and the United Kingdom with the support of other North Atlantic Treaty Organisation as well as non-NATO countries...

 by the US led to further media coverage of the potential threats of cyberterrorism in the years following. Mainstream media coverage often discusses the possibility of a large attack making use of computer networks to sabotage critical infrastructures with the aim of putting human lives in jeopardy or causing disruption on a national scale either directly or by disruption of the national economy.

Authors such as Winn Schwartau
Winn Schwartau
Winn Schwartau is an expert on security, privacy, infowar, cyber-terrorism and related topics. He is known not only for his trademark mustache and appearances at Defcon but also his provocative and original ideas that make audiences think, wonder and understand highly technical security subjects...

 and John Arquilla
John Arquilla
John Arquilla received a PhD in International Relations from Stanford in 1991. He worked at RAND for several years, before joining the faculty of the US Naval Postgraduate School in 1993....

 are reported to have had considerable financial success selling books which described what were purported to be plausible scenarios of mayhem caused by cyberterrorism. Many critics claim that these books were unrealistic in their assessments of whether the attacks described (such as nuclear meltdowns and chemical plant explosions) were possible. A common thread throughout what critics perceive as cyberterror-hype is that of non-falsifiability
Falsifiability
Falsifiability or refutability of an assertion, hypothesis or theory is the logical possibility that it can be contradicted by an observation or the outcome of a physical experiment...

; that is, when the predicted disasters fail to occur, it only goes to show how lucky we've been so far, rather than impugning the theory.

U.S. military

The US Department of Defense (DoD) charged the United States Strategic Command
United States Strategic Command
United States Strategic Command is one of nine Unified Combatant Commands of the United States Department of Defense . The Command, including components, employs more than 2,700 people, representing all four services, including DoD civilians and contractors, who oversee the command's operationally...

 with the duty of combating cyberterrorism. This is accomplished through the Joint Task Force-Global Network Operations
Joint Task Force-Global Network Operations
Joint Task Force-Global Network Operations was a subordinate command of United States Strategic Command whose mission is to: direct the operation and defense of the Global Information Grid across strategic, operational, and tactical boundaries in support of the US Department of Defense's full...

, which is the operational component supporting USSTRATCOM in defense of the DoD's Global Information Grid
Global Information Grid
The Global Information Grid is an all-encompassing communications project of the United States Department of Defense.It is defined as a "globally interconnected, end-to-end set of information capabilities for collecting, processing, storing, disseminating, and managing information on demand to...

. This is done by integrating GNO
Joint Task Force-Global Network Operations
Joint Task Force-Global Network Operations was a subordinate command of United States Strategic Command whose mission is to: direct the operation and defense of the Global Information Grid across strategic, operational, and tactical boundaries in support of the US Department of Defense's full...

 capabilities into the operations of all DoD computers, networks, and systems used by DoD combatant commands, services and agencies.

On November 2, 2006, the Secretary of the Air Force announced the creation of the Air Force's newest MAJCOM, the Air Force Cyber Command
Air Force Cyber Command (Provisional)
Air Force Cyber Command was a proposed United States Air Force Major Command that existed only in provisional status...

, which would be tasked to monitor and defend American interest in cyberspace. The plan was however replaced by the creation of Twenty-Fourth Air Force which became active in August 2009 and would be a component of the planned United States Cyber Command
United States Cyber Command
United States Cyber Command is an armed forces sub-unified command subordinate to United States Strategic Command. The command is located in Fort Meade, Maryland and led by General Keith B. Alexander. USCYBERCOM centralizes command of cyberspace operations, organizes existing cyber resources and...

.

On December 22, 2009, the White House named its head of Cyber Security as Howard Schmidt
Howard Schmidt
Howard A. Schmidt is the Cyber-Security Coordinator of the Obama Administration, operating in the Executive Office of the President of the United States.One of Schmidt's leading policy objectives is the development of "National Strategy for...

. He will coordinate U.S Government, military and intelligence efforts to repel hackers.

Israel

In May 2011 Israeli Prime Minister Benjamin Netanyahu
Benjamin Netanyahu
Benjamin "Bibi" Netanyahu is the current Prime Minister of Israel. He serves also as the Chairman of the Likud Party, as a Knesset member, as the Health Minister of Israel, as the Pensioner Affairs Minister of Israel and as the Economic Strategy Minister of Israel.Netanyahu is the first and, to...

 announced the establishment of the National Internet Defense Taskforce, charged with developing tools to secure vital Israeli online infrastructure. "The main responsibility of the taskforce will be to expand the state's ability to defend vital infrastructure networks against cybernetic terrorist attacks perpetrated by foreign countries and terrorist elements," said a statement from the Prime Minister's Office.

China

The Chinese Defense Ministry confirmed the existence of an online defense unit in May 2011. Composed of about thirty elite internet specialists, the so-called "Cyber Blue Team," or "Blue Army," is officially claimed to be engaged in cyber-defense operations, though there are fears the unit has been used to penetrate secure online systems of foreign governments.

Pakistan

Pakistan's recently established cyber wing, NR3C is one of the world most advanced cyber armies. Other elite groups include Pakistan Cyber Army (PCA)and Anti-India Crew(AIC). Continued cyber war against Hindustan has led to development of infrastructure that has the power of stop and inflict attacks on other countries.

Sabotage

Mostly non-political acts of sabotage have caused financial and other damage, as in a case where a disgruntled employee caused the release of untreated sewage into water in Maroochy Shire, Australia.

More recently, in May 2007 Estonia
Estonia
Estonia , officially the Republic of Estonia , is a state in the Baltic region of Northern Europe. It is bordered to the north by the Gulf of Finland, to the west by the Baltic Sea, to the south by Latvia , and to the east by Lake Peipsi and the Russian Federation . Across the Baltic Sea lies...

 was subjected to a mass cyber-attack in the wake of the removal of a Russian World War II war memorial from downtown Tallinn. The attack was a distributed denial-of-service attack
Denial-of-service attack
A denial-of-service attack or distributed denial-of-service attack is an attempt to make a computer resource unavailable to its intended users...

 in which selected sites were bombarded with traffic to force them offline; nearly all Estonian government ministry networks as well as two major Estonian bank networks were knocked offline; in addition, the political party website of Estonia's current Prime Minister Andrus Ansip featured a counterfeit letter of apology from Ansip for removing the memorial statue. Despite speculation that the attack had been coordinated by the Russian government, Estonia's defense minister admitted he had no conclusive evidence linking cyber attacks to Russian authorities. Russia called accusations of its involvement "unfounded," and neither NATO nor European Commission
European Commission
The European Commission is the executive body of the European Union. The body is responsible for proposing legislation, implementing decisions, upholding the Union's treaties and the general day-to-day running of the Union....

 experts were able to find any conclusive proof of official Russian government participation. In January 2008 a man from Estonia was convicted for launching the attacks against the Estonian Reform Party
Estonian Reform Party
The Estonian Reform Party is a centre-right, free market liberal party in Estonia. It is led by Estonian Prime Minister Andrus Ansip, and has 33 members in the 101-member Riigikogu, making it the largest party in the legislature...

 website and fined.

Website defacement and denial of service

Even more recently, in October 2007, the website of Ukrainian president Viktor Yushchenko
Viktor Yushchenko
Viktor Andriyovych Yushchenko is a former President of Ukraine. He took office on January 23, 2005, following a period of popular unrest known as the Orange Revolution...

 was attacked by hackers. A radical Russian nationalist youth group, the Eurasian Youth Movement, claimed responsibility.

In 1999 hackers attacked NATO computers. The computers flooded them with email and hit them with a denial of service (DoS). The hackers were protesting against the NATO bombings in Kosovo. Businesses, public organizations and academic institutions were bombarded with highly politicized emails containing viruses from other European countries.

In fiction

  • The Japanese cyberpunk
    Cyberpunk
    Cyberpunk is a postmodern and science fiction genre noted for its focus on "high tech and low life." The name is a portmanteau of cybernetics and punk, and was originally coined by Bruce Bethke as the title of his short story "Cyberpunk," published in 1983...

     manga
    Manga
    Manga is the Japanese word for "comics" and consists of comics and print cartoons . In the West, the term "manga" has been appropriated to refer specifically to comics created in Japan, or by Japanese authors, in the Japanese language and conforming to the style developed in Japan in the late 19th...

    , Ghost in the Shell
    Ghost in the Shell
    is a Japanese multimedia franchise composed of manga, animated films, anime series, video games and novels. It focuses on the activities of the counter-terrorist organization Public Security Section 9 in a futuristic, cyberpunk Japan ....

     (as well as its popular movie and TV adaptations) centers around an anti-cyberterrorism and cybercrime
    CyberCrime
    CyberCrime was an innovative, weekly America television program on TechTV that focused on the dangers facing computer users. Filmed in San Francisco, California, the show was hosted by Alex Wellen and Jennifer London...

     unit. In its mid-21st century Japan setting such attacks are made all the more threatening by an even more widespread use of technology including cybernetic enhancements to the human body allowing people themselves to be direct targets of cyberterrorist attacks.
  • Dan Brown
    Dan Brown
    Dan Brown is an American author of thriller fiction, best known for the 2003 bestselling novel, The Da Vinci Code. Brown's novels, which are treasure hunts set in a 24-hour time period, feature the recurring themes of cryptography, keys, symbols, codes, and conspiracy theories...

    's Digital Fortress
    Digital Fortress
    Digital Fortress is a techno-thriller novel written by American author Dan Brown and published in 1998 by St. Martin's Press. The book explores the theme of government surveillance of electronically stored information on the private lives of citizens, and the possible civil liberties and ethical...

    .
  • Amy Eastlake's Private Lies
    Private Lies
    Private Lies is a 2001 film starring John Corbett that was made for German television....

    .
  • In the movie Live Free or Die Hard
    Live Free or Die Hard
    Live Free or Die Hard , is a 2007 American action film, and the fourth installment in the Die Hard series. The film was directed by Len Wiseman and stars Bruce Willis as John McClane. The name was adapted from the state motto of New Hampshire, "Live Free or Die"...

    , John McClane
    John McClane
    John McClane is a fictional character and the protagonist of the Die Hard film series, portrayed by Bruce Willis.-Development and description:...

     (Bruce Willis
    Bruce Willis
    Walter Bruce Willis , better known as Bruce Willis, is an American actor, producer, and musician. His career began in television in the 1980s and has continued both in television and film since, including comedic, dramatic, and action roles...

    ) takes on a group of cyberterrorists intent on shutting down the entire computer network of the United States.
  • The movie Eagle Eye
    Eagle Eye
    Eagle Eye is a 2008 thriller film directed by D. J. Caruso and starring Shia LaBeouf and Michelle Monaghan. The two portray a young man and a single mother who are brought together and coerced by an anonymous caller into carrying out a plan by a possible terrorist organization...

     involves a super computer controlling everything electrical and networked to accomplish the goal.
  • The plots of 24
    24 (TV series)
    24 is an American television series produced for the Fox Network and syndicated worldwide, starring Kiefer Sutherland as Counter Terrorist Unit agent Jack Bauer. Each 24-episode season covers 24 hours in the life of Bauer, using the real time method of narration...

     Day 4 and Day 7 include plans to breach the nation's nuclear plant grid and then to seize control of the entire critical infrastructure protocol.
  • The Tom Clancy created series Netforce was about a FBI/Military team dedicated to combating cyberterrorists.
  • Much of the plot of Mega Man Battle Network
    Mega Man Battle Network
    The Mega Man Battle Network series is one of Capcom's Mega Man series and debuted in 2001 on the Game Boy Advance. It is a spin-off series based on the original Mega Man. In Japan, as of the release of Rockman EXE Transmission in 2003, the series has been known as Rockman EXE; prior to this it was...

     is centered around cyberterrorism.
  • In the 2009 Japanese animated film Summer Wars
    Summer Wars
    is a 2009 Japanese animated science fiction romance film directed by Mamoru Hosoda, animated by Madhouse and distributed by Warner Bros. Pictures. The film's voice cast includes Ryunosuke Kamiki, Nanami Sakuraba, Mitsuki Tanimura, Sumiko Fuji and Ayumu Saitō...

    , an artificial intelligence cyber-terrorist attempts to take control over the world's missiles in order to "win" against the main characters that attempted to keep it from manipulating the world's electronic devices.

See also

  • Cyberwarfare
  • Cyberbullying
  • Cyber Operations
    Cyber Operations
    Cyber Operations is a classification of military operations that use of Computer Network Attack , Computer Network Defense ,Computer Network Exploitation against an enemy to achieve military objectives.- History :...

  • Cyberstalking
    Cyberstalking
    Cyberstalking is the use of the Internet or other electronic means to stalk or harass an individual, a group of individuals, or an organization. It may include false accusations, monitoring, making threats, identity theft, damage to data or equipment, the solicitation of minors for sex, or...

  • Internet and terrorism
    Internet and terrorism
    The presence of terrorist groups on the internet is a relatively new phenomenon, the growth of which has exploded in the past decade. Accurate estimates on the number of active terrorist group’s websites vary due to difficulties measuring but, there is a general consensus that in 1996 there was...

  • US-CERT (United States Computer Emergency Readiness Team)
  • Patriot hacking
    Patriot hacking
    Patriot hacking is a term for computer hacking or system cracking in which citizens or supporters of a country, traditionally industrialized Western countries but increasingly developing countries, attempts to perpetrate attacks on, or block attacks by, perceived enemies of the state...

  • 2007 cyberattacks on Estonia
    2007 cyberattacks on Estonia
    Cyberattacks on Estonia refers to a series of cyber attacks that began April 27, 2007 and swamped websites of Estonian organizations, including Estonian parliament, banks, ministries, newspapers and broadcasters, amid the country's row with Russia about the relocation of the Bronze Soldier of...

  • Cyberattacks during the 2008 South Ossetia war
    Cyberattacks during the 2008 South Ossetia war
    During the 2008 South Ossetia war a series of cyberattacks swamped and disabled websites of numerous South Ossetian, Russian, Georgian, and Azerbaijani organisations.- Details :...



Further reading

  • Blau, John (Nov 2004) "The battle against cyberterror" NetworkWorld. Retrieved Mar 20, 2005 from the World Wide Web: http://www.nwfusion.com/supp/2004/cybercrime/112904terror.html
  • Gross, Grant (Nov 2003) "Cyberterrorist attack would be more sophisticated that past worms, expert says" ComputerWorld. Retrieved Mar 17, 2005 from the World Wide Web: http://www.computerworld.com/securitytopics/security/story/0,10801,86857,00.html
  • Poulsen, Kevin (Aug 2004) "South Pole 'cyberterrorist' hack wasn't the first" SecurityFocus News. Retrieved Mar 17, 2005 from the World Wide Web: http://www.securityfocus.com/news/9356.
  • Thevenet, Cédric (Nov 2005) "Cyberterrorisme, mythe ou réalité?". From the World Wide Web : http://www.terrorisme.net/pdf/2006_Thevenet.pdf
  • U.S. Army Cyber Operations and Cyber Terrorism Handbook 1.02

General


RedShield Association- Cyber Defense
  • Cyber Infrastructure Protection - Strategic Studies Institute

http://www.strategicstudiesinstitute.army.mil/pubs/display.cfm?pubID=1067

News

The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK