Cyberterrorism
With the continued integration of technology, and especially internet-based technologies, into everyday life, the threat of cyberterrorism becomes more and more of a concern, as the potential for exponentially devastating effects increases alongside reliance on these emerging technologies. However, combating cyberterrorism is not as simple as one might think (or hope), because even the definition of the word itself remains under discussion. Nonetheless, after examining some of the more common definitions of cyberterrorism as well as the most obvious and evolving cyberterrorist threats, it becomes clear that much of the official preparation and response to cyberterrorism tends to focus on red herrings, missing the areas with the greatest potential for harm while focusing on far less likely doomsday scenarios. Realizing this fact ultimately offers some better ideas for stopping current and future cyberterrorists.
The first hurdle to understanding and combating cyberterrorism is the fact that there is no singularly agreed-upon definition of what it is. Most broadly:
While there is not a standardized definition of cyberterrorism, the general theme among the many proposed definitions is that cyberterrorism is a premeditated criminal act by subnational groups or clandestine agents, for political, religious, or social purposes, against an entity's computer, data, or information systems, to entice fear and results in physical violence (Sharp Parker, 2010, p. 159).
This represents a fairly common formulation of cyberterrorism that "combines the United States Department of State's definition of terrorism as politically motivated acts of violence against non-combatants with a definition of cyberspace as the computers, networks, programs and data which make up the information infrastructure" (Pollitt, 1998, p. 8). However, "cyberterror" is also frequently used to describe those acts which fulfill most of the descriptions above but which are not designed to entice fear or result in physical violence, further blurring the line between what is considered legitimate protest (also known as "hacktivism") and "terrorism" (Vegh, 2003, p. 821). For example, some groups contend that Denial-of-Service attacks, in which a website is overloaded with numerous simultaneous connections, is a legitimate form of protest, while other have gone so far as to label it terrorism (Anonymous, 2001, p. 272). The Naval Postgraduate school defines cyberterrorism "as the unlawful destruction or disruption of digital property to intimidate or coerce people," acknowledging terrorism's psychological aspect without including physical violence as a condition for cyberterrorism (Thomas, 2003, p. 112).
Thus, while using the definition of cyberterrorism which includes physical violence or destruction as a result means that there are no recorded instances of a cyberterrorist attack outside of the Stuxnet worm which affected the Iranian nuclear refinement program (likely a result of United States and Israeli cooperation), using the broader definition which does not include physical destruction as an identifying feature means that many more activities may be labeled cyberterrorism, and many different groups of people may subsequently be considered "terrorists." Adding to this relative confusion over the precise meaning of the word, a number of illegal activities may fall under the dual rubrics of cyberterrorism and cybercrime, with the only distinction being whether money or ideology was the most prominent motivating factor, with cybercrime sometimes financing physical terrorism (Baldwin, 2004, p. 128). Finally, cyberterrorism is occasionally used to describe the online activities of established terrorist groups, with a particular focus on the planning of attacks and dissemination of information, although the distinction between "cyberplanning" (itself a somewhat useless phrase) and cyberterrorism is noted (Thomas, 2003, 112).
Despite the variability in potential definitions, some key factors do stand out which allow one to chart the development of cyberterrorism as a concept (using a broader definition of the term) over the course of the last few years. Although the potential for cyberterrorism appeared once the first computers were connected to each other remotely, the threat of cyberterrorism did not enter the public consciousness until somewhat later, with the first inclinations that the fear of cyberterrorism was growing beyond...
Wireless Broadband Technology Overview of Wireless technology Presently it is quite evident to come across functioning of a sort of wireless technology in the form of mobile phone, a Palm pilot, a smart phone etc. With the inception of fast connectivity in the sphere of commerce it is customary and useful to operate from central locations communicating with the remote branches, conducting conferences in remote places, discussing with every body at every
Monograph One of the great challenges the military faces is remaining current and preparing the current and future generations of soldiers for inevitable shifts to the geopolitical environment, technological changes, and shifts in both domestic and foreign policies. The importance of preparing officers for the new realities of unpredictable environments and non-state actors cannot be underestimated.[footnoteRef:1] The roles and goals of the AMSP and SAMS have not changed. These educational programs
The fact that industrial control systems may be vulnerable to infiltration by other citizens, or international parties puts laws pertaining to intersection of systems transmission at the forefront of priorities for us all. At present, telecommunications interference of private citizens holds an up to a five-year prison sentence by U.S. federal law. How cyberterrorism is addressed, when the stakes are heightened, leaves a whole host of opportunities for citizens, and
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now