Cyber Terrorism: The Greatest Risk in the U.S.
Tremendous technological advancements have been made in the last few decades. Today, humans depend more on computer networks and information technology (IT) systems than on other means for information. From business to government, computer networks are relied upon to store, process, retrieve, and transfer critical information. Increased dependence on computer networks has, however, posed a major threat. Cyber terrorism is now arguably the biggest threat facing the U.S. (Harress, 2014; Thomas, 2016). Attacks against computer networks via computer viruses, worms, malware, and hacking have become increasingly common. The attacks are directed to information systems and infrastructures that support critical processes such as defense, transportation, banking, and energy production. This threatens the country's social, economic, and political stability. Nonetheless, there are often assertions that the risk of cyber terrorism is not as pervasive or substantial as often portrayed. Though there could be some truth in this argument, cyber terrorism has become the most significant national security issue for the U.S. This paper discusses why cyber terrorism is the greatest risk facing the U.S. The paper specifically focuses on what constitutes cyber terrorism, why the threat of cyber terrorism cannot be understated, and the way forward towards deterring cyber terrorism.
Defining Cyber Terrorism
Defining cyber terrorism can be difficult. As per U.S. law, a terrorist act has three aspects: the act is violent and potentially threatens human life; the act is unlawful in light of criminal law; and the act is fueled by ideological reasons (Chen, Jarvis & Macdonald, 2014). This definition, however, largely mirrors the conventional form of terrorism, where predominantly there are physical consequences such as the destruction of property and loss of human life. Today, terrorist acts can be executed without necessarily bombing buildings or killing people. This new form of terrorism is referred to as cyber terrorism. It generally refers to the deliberate and planned disruption of computer networks or IT systems mainly with the aim of causing and spreading fear (Pedersen, 2014). State-sponsored hackers, hired hackers, international cyber syndicates, as well as terrorists may execute the attacks. It is important to note that attacks on computer networks are not a recent happening. As early as the 1990s, when the internet revolution was evolving, defacing websites was a common phenomenon (Weimann, 2004). Nonetheless, such acts were largely driven by ego or economic gain. Today, however, hackers are increasingly driven by ideological reasons. They are more determined to cause fear as well destabilize the government and the economy. Instances of hackers stealing classified information from federal agencies and employees, or targeting information systems that support critical infrastructures and businesses have been on the rise. Such attacks are usually not motivated by egoistic tendencies -- they tend to be driven by a belief in the ideology of creating disorder, terror, and destabilization.
In essence, as the name suggests, cyber terrorism "is the convergence of cyberspace and terrorism" (Weimann, 2004, p. 4). It denotes malfide attacks on computer networks, and information systems aimed at intimidating or coercing the government or its subjects in advancement of ideological or political objectives. Though such attacks may not cause physical violence against property or persons, they can result in substantial harm, enough to cause panic.
The Threat of Cyber Terrorism: Real or Exaggerated?
Rise in Cyber terrorism has been termed as the...
They are assured to acquire attention of the media, provided right ascription of the support of the occurrence. Further, a good protection against these dangers is very hard and costly; it will continue to be as such. A lot of the know-how linked with the buildup of the CBRN weapons-particularly chemical and biological agents possess genuine use in civilians and are categorized as twofold use. The widespread reach of
Peer recognition too plays into many hackers motivation as they work towards being accepted and gaining status within the culture. and, lastly, some hackers are motivated by the thought that their efforts serve a public service (O'Neill, 2006). "Hackers built the Internet, they made the Unix operating system what it is, and they make the World Wide Web work" (Castelluccio, 2003). Forecast 4: Forecast 4 states, "Some computer hacker groups, notably those
Studies suggest that even "more "omniscient" technology is likely to be developed" in the near future (Lyon, 2002). Cookies were perhaps the first form of internet surveillance, developed in 1994 as a means for websites to track visitors logging in so they could provide more optimal service (Lyon, 2002). Now cookies have transformed the shape of communication and have further advanced the ability of criminals to survey individual user functions
Computer Security Over the last several years, cyber attacks have been continually rising. This is in response to emerging threats from nations such as China who are increasing their attacks on government and military installations. According to James Clapper (the Director of National Intelligence) these threats have become so severe that they are surpassing terrorism as the greatest challenge facing the nation. To fully understand what is occurring requires focusing on
In the first instance an attack of this nature usually serves a symbolic purpose from the terrorist's point-of-view in that he or she is seen to be attacking the bastion of global Western commerce. Secondly, many business concerns are more vulnerable to attack as they are usually not as heavily secured as military or energy installations. There is also the factor that American financial institutions are invariably identified with
His study includes the following; The U.S. government through the executive to provide appropriate leadership to steer the country in the domain of cyber security. The state to conduct immediate risk assessment aimed at neutralizing all the vulnerabilities. The creation of an effective national security strategy as well as the creation of an elaborate national military strategy. Molander (1996) uses a qualitative research approach and methodology .The method used is constructive. The constructive
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now