Verified Document

Cyber Warfare Term Paper

Cyber warfare continues to grow larger than imagination as the public becomes more aware of and involved in technology. This work in writing will identify a case study that presents a 'cell', 'klan', or 'state', which conducted or has the capacity to conduct cyber warfare. This work will describe the elements of: who, what, where, and why and means of conducting such cyber warfare and the organizational ideology behind the attack. Finally, this work will conclude with a review of how the attack could be prevented, either through training or certain tools. There is a group that calls themselves 'Anonymous' which has exposed the weaknesses in American cybersecurity and while the group Anonymous is not staging or conducting cyberwarfare, they have revealed through their hacking of the Internet that hacking down the American infrastructure would not be as far-fetched as once was believed. Anonymous has managed to conduct hacking operations on agencies including the CIA, police departments and other such websites. While this appears as terrorist in bent group in reality Derek Mead explains that it is instead a group bent on targeting "…the arrogant jerks of the world." (2012) Terrorist cells are hideously more dangerous and are instead of Anonymous which is a group of "fluid netcitizens" are instead on an honor bound mission to inflict holy war upon a peaceable nation. Terrorists are individuals bound by common creeds, religion, ethics, morality, and rationalizations and are driven by hatred and greed with no respect for human life and with not as much as a nod to the ideas of democracy and freedom. One such group is identified and described in the following section of this work in writing.

I. Who? Al Queda

Rollins and Wilson (2007) states that the use of the Internet and other telecommunications devices is expanding rapidly not only in regards to being reliant on thee for support of the activities of their organizations but in achieving the skills to enable operational goals. Examined in the report are "possible terrorist objectives and computer vulnerabilities that might lead to an attempted cyber-attack against the critical infrastructure of the U.S. homeland, and also discusses the emerging computer and other technical skills of terrorists and extremists." (p.1) It was reported May 16, 2012, that Al Qaeda "may be turning its destructive attention to cyber-warfare against the United States. In a chilling video al Queda operative calls for electronic jihad against the United States, and compares vulnerability in vital American computer networks to the flaws in aviation security before the 9/11 attack." (Threat Journal, 2012) The al Queda video is reported to call upon the "covert mujahidin to launch cyber attacks against the U.S. networks of both government and critical infrastructure, including the electric grid." (Threat Journal, 2012) The video is reported as having been obtained by the FBI in 2011 and released in May 2012 by the Senate Committee on Homeland Security and Governmental affairs." (Threat Journal, 2012) The report states that Homeland Security and Governmental Affairs Committee Chairman, Joe Lieberman, I -- Conn stated "This is the clearest evidence we've seen that al Qaeda and other terrorist groups want to attack the cyber systems of our critical infrastructure." (Threat Journal, 2012) Additionally stated in the report is that the national security community states "…the threat of cyber attack is real, and the gap between terrorist aspirations and capability is closing. The senior intelligence official at Cyber Command, Rear Adm. Samuel Cox, has said al Qaeda operatives are seeking the capability to stage cyber attacks against U.S. networks and terrorists could purchase the capabilities to do so from expert criminal hackers." (Threat Journal, 2012)

II. What? Defining Cyberterrorism

Cyberterrorism is defined by some as being an inappropriate label "because a widespread attack may simply produce annoyances, not terror, as would a bomb, or other chemical, radiological, or nuclear explosive (CBRN) weapon. However, other believe that the effects of widespread computer network attack would be unpredictable and might cause enough economic disruption, fear, and civilian deaths to qualify as terrorism." (Rollins and Wilson, 2007, p.3) Two definitions of cyberterrorism include those which are:

(1) Effects-based: Cyberterrorism exists when computer attacks result in effects that are disruptive enough to generate fear comparable to a traditional act of terrorism, even if done by criminals.

(2) Intent-based: Cyberterrorism exists when unlawful or politically motivated computer attacks are done to intimidate or coerce a government or people to further a political objective, or to cause grave harm or severe economic damage. (Rollins and Wilson, 2007, p.3)

II. How? The Objectives of a Cyberattack

The objectives of a cyberattack are reported to include those stated as follows:

(1) Loss of integrity,...

(Rollins and Wilson, 2007, p.4)
It is related in the work of Rollins and Wilson (2007) that Richard Clarke, former Administration Counter Terrorism Advisor and National Security Advisor states that if terrorists were to "…launch a widespread cyberattack against the United States, the economy would be the intended target for disruption, while death and destruction might be considered collateral damage. Many security experts also agree that a cyberattack would be most effective if it were used to amplify a conventional bombing or CBRN attack. Such a scenario might include attempting to disrupt 911 call centers simultaneous with the detonating of an explosives devices. This type of example is usually contrasted to a widespread, coordinated cyberattack, unaccompanied by a physical attack, that would technically be very difficult to orchestrate and unlikely be effective in furthering terrorists' goals." (p.5)

The interdependencies among infrastructure sectors means that a cyberattack affecting one sector could as well "have disruptive, unpredictable and perhaps devastating effects on other sectors, and possibly long-lasting effects to the economy." (Rollins and Wilson, 2007, p.5) It is asserted that Al Qaeda and other terrorist groups with which they associate are "…becoming more technically sophisticated, and years of publicity about computer security weaknesses has made them aware that the U.S. economy could be vulnerable to a coordinated cyberattack." (Rollins and Wilson, 2007)

One of the primary objectives for a terrorist attack in the form of a cyber attack would be that of publicity. It is stated specifically: "Extensive coverage has been given to the vulnerability of the U.S. information infrastructure and to the potential harm that could be caused by a cyberattack. This might lead terrorists to feel that even a marginally successful cyberattack directed at the United States may garner considerable publicity." (Rollins and Wilson, 2007, p.6) It has been suggested that if a cyberattack were to occur and to become know to the public in general, that the attack would be a success no matter what the level of success actually experienced due to the attack and could lead to "widespread withdrawal of funds and selling of equities." (Rollins and Wilson, 2007, p.6)

It is reported that a security expert demonstrated at the 2005 Black Hat computer security conference "an exploit of what many consider to be a significant Internet security flaw, by showing how the most commonly used Internet routers; the computer's device that forwards data to a desired destination, could quickly be hacked." (Rollins and Wilson, 2007, p.6) The vulnerability in this router could enable an attacker to "disrupt selected portions of the Internet, or even target specific groups of banks or power stations." (Rollins and Wilson, 2007, p.6)

A report released in 2005 by the President's Information Technology Committee (PITAC) reported that the United States information technology infrastructure, critical for "communication, commerce and control of the physical infrastructure is highly vulnerable to terrorist and criminal attacks." (Rollins and Wilson, 2007, p.7) The report additionally stated that the private sector's role is one that is very important in protection of national security in its deployment of sound security products, and through adoption of sound security practices. (Rollins and Wilson, 2007, paraphrased)

Rollins and Wilson report that in a recent survey of 136,000 PCs that were used in 251 commercial businesses in the United States found that a "major security software patch, known as SP2, was installed on only nine percent of the systems, despite the fact that Microsoft advertized the importance of installing the security patch one year ago. The remaining 91% of commercial businesses surveyed will continue to be exposed to major security threats until they deploy the software patch throughout their organizations. This may bring into question the extent to which the private sector will self-protect without greater incentive." (Rollins and Wilson, 2007, p.7)

Studies conducted by computer security firms state findings that the "highest rates for computer attack activities were directed against critical infrastructures such as "government, financial services, manufacturing and power." (Rollins and Wilson, 2007, p.8) Additionally reported it the results is that the United States "…is the most highly targeted nation for computer attacks…." (Rollins and Wilson, 2007, p.8) Computer systems in the United States were…

Sources used in this document:
Bibliography

Al Qaeda Video Calls for 'Electronic Jihad' on America (2012) The Threat Journal 23 May 2012. Retrieved from: http://threatjournal.com/archive/tj05242012.html

Paganini, Pierluigi (2012) Plan X: Developing U.S. Cyber Warfare Capabilities. Infosec Island. 4 Jun 2012. Retrieved from: http://www.infosecisland.com/blogview/21532-Plan-X-Developing-U.S.-Cyber-Warfare-Capabilities.html

Rollins, John and Wilson, Clay (2007) Terrorist Capabilities for Cyberattack: Overview and Policy Issues. CRS Report for Congress. 22 Man 2007. Retrieved from: http://www.fas.org/sgp/crs/terror/RL33123.pdf
Cite this Document:
Copy Bibliography Citation

Related Documents

Cyber Warfare Cyber Attacks
Words: 749 Length: 3 Document Type: Essay

Cyber warfare, a term defined by Clarke (2010) as an action of a nation-state to effectively penetrate another nation's computer resources or networks for the sole purpose of causing malicious damage or even disruption is a major cause of national and global security concerns (p.6).In this paper, we identify some cyber warfare tools (either Attack, Defense, Exploitation), and write a scenario to execute the tools. We also identify if the

Cyberwarfare Like Terrorism, Cyber-Warfare Changes
Words: 591 Length: 2 Document Type: Term Paper

Herein lies one of the political implications of cyber-warfare. Because cyber-warfare is trans-national, global efforts to prevent cyber crimes must be global in scope and cooperative in nature. Nations do have information warfare capabilities that can be harnessed preemptively as well as defensively (Knapp & Bolton 2006). However, to harness the capabilities of state-sponsored cyber warfare tools, the norms of neutrality need to be rewritten (Kelsey 2008). Finally, the social

Cyber Warfare Over the Ages
Words: 2213 Length: 7 Document Type: Essay

This piece of information revealed that the malware program had infected resulted in heavy damage for the Iranian nuclear enrichment facilities. The program became the very first of its kind as there had never been any cyber attacks that lead to a computer program resulting in physical damage to mechanical systems on a large scale basis as was the desired attacked of the program. Additionally, the malware program also

Cyber-Crime, Cyber-Terrorism, and Cyber-Warfare Since
Words: 2784 Length: 10 Document Type: Research Paper

Contemporary Cyber-warfare Cases Studies In 2011, the Center for Strategic and International Studies published Significant Cyber Incidents Since 2006 (Lewis, 2011) as part of its Cyber and Internet Policy, Technology and Public Policy Program. Among the incidents detailed in that report, referenced by their year of occurrence: 2007 After officials in former-Soviet Estonia removed a World War II memorial from its capital city of Tallinn in the Spring of 2007, a large-scale cyber-attack

Cyber Terrorism Cyber Crime Cyber Espionage and Cyber Warfare
Words: 1652 Length: 5 Document Type: Research Paper

Cyber-Crime, Cyber-Terrorism, Cyber-Espionage, and Cyber-Warfare Threats, Risks, and Vulnerabilities In the contemporary business and IT (information technology) environments, increasing number of business organizations are investing in the IT tools to enhance competitive market advantages. Integrating the IT tools in a business model has become a crucial strategy that organizations can employ to achieve a market success. While IT tools deliver several market benefits for businesses, nevertheless, businesses face enormous risks when integrating

Computer Systems Are Increasingly Being Used to
Words: 1916 Length: 6 Document Type: Essay

computer systems are increasingly being used to cause widespread damage, with nation-states or individuals sponsored by nation-states making use of malicious codes to compromise 'enemy' information systems. In essence, cyber warfare has got to do with the attack on the information networks, computers, or infrastructure of another entity by an international organization or nation-state. In the context of this discussion, cyber war will be taken as the utilization of

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now