Verified Document

Information Warfare And Terrorism Term Paper

Warfare & Terrorism The proliferation of cyberattacks -- aptly referred to as cyberterrorism -- carried out by criminal miscreants with grudges, shadowy techies with political motives, and other anti-social individuals, represent the new digital wars that threatened personal and state security worldwide. This is not a problem that will go away any time soon, and cyber security officials it seems will always be one or two steps behind the offenders causing the digital carnage. The cyberattacks that are reviewed in this paper include: Russia's denial-of-service attacks on Estonia in 2007 and Georgia in 2008, and the cyberattacks against U.S. State Department computers in 2006. Denial of service refers to strategies that "…block access of legitimate users" through the "…relentless transmission of irrelevant information" -- called "flood attacks" -- which restrains computer servers (Richards, 2010).

Russia's cyberterrorism against Estonia -- 2007

An article in the International Affairs Review indicates that the victim in this 2007 cyberterrorism was clearly Estonia and the aggressors were obviously hackers in Russia. It involved a "…three-week wave of distributed denial-of-service attacks" and what it disrupted was the infrastructure of Estonia's information-based technologies (Richards, 2010, 5). The attacks began on April 26, 2007, at 10:00 P.M., focusing first on the Estonian prime minister's "Reform Party website" and soon after other government and political websites, including the official website for Estonia's parliament were part of the attack (Richards, 6). After a full week of denial-of-service attacks on these sites, they had been "knocked…completely offline," Richards explains on page 6.

In the second week of cyberterrorism against Estonia the Russians were able to knock news websites offline. And when officials realized the attacks were coming from outside Estonia, they blocked all incoming information from outside the country, which created an irony because these news organizations could not report the terrorism...

The worst of the attacks arrived May 10, 2007, when the Internet capabilities of the largest bank in Estonia, the Hansabank, were shut down. This was a major disruption in the Estonian economy because "…97% of all banking transactions occurred online" and moreover, the ATMs in Estonia were also shut down (Richards, 7).
How did the hackers launch this cyberterrorism? They used "…weblogs, web journals, and Russian-language chat rooms" to advise hackers as to what time to launch attacks and what Estonian sites were most vulnerable, Richards continues (7). The flood attacks (using botnets which are computers that have been stolen from unsuspecting personal users) contained from 1,000 packets per hour early in the event (April 26) up to 4 million "incoming packets of information per second at hundreds of targeted websites" by May 9 (Richards, 7).

What did Estonia do in response to prevent similar attacks? First NATO sent cyberterrorism "experts" to assess what happened, why it happened, and helped to patch the vulnerable spots that allowed the attacks to be conducted. Cyberterrorism response strategies have subsequently been produced, and according to a peer-reviewed article in the Baltic Security & Defense Review, Estonia has fine-tuned its preventative measures against cyberterrorism to the point that they are now "…heralded as a leader in technological security" (Ashmore, 2009). In fact within a year after those attacks, Estonia adopted a "…comprehensive national cyber security strategy" and has been recognized for the quality of its defenses against future attacks (Ashmore, 9).

Russia's cyberterrorism against Georgia

In the peer-reviewed journal Communications of the AMC, the Russian military invasion into Georgia in 2008 was accompanied by a cyber attack that Georgia was not ready to, or competent to deal with. According to Ross Stapleton-Gray and William Woodcock, unlike Estonia, Georgia did not have extensive international links, and George did not have IXPs…

Sources used in this document:
Works Cited

Ashmore, W.C. (2009). Impact of Alleged Russian Cyber Attacks. Baltic Security & Defense

Review, 11(1), 4-40.

Associated Press. (2006). Computer Hackers Attack State Department. The New York Times.

Retrieved January 19, 2014, from http://www.nytimes.com.
Computer Network. U.S. Department of State. Retrieved January 19, 2014, from http://2001-2009.state.gov.
at George Washington University. Retrieved January 18, 2014, from http://www.iar-gwu.org.
Attacks Against Georgia: Legal Lessons Identified. Cooperative Cyber Defence Centre of Excellence. Retrieved January 18, 2014, from http://www.eneken.- -- .
Cite this Document:
Copy Bibliography Citation

Related Documents

Computer Security Information Warfare Iw
Words: 5531 Length: 20 Document Type: Research Paper

His study includes the following; The U.S. government through the executive to provide appropriate leadership to steer the country in the domain of cyber security. The state to conduct immediate risk assessment aimed at neutralizing all the vulnerabilities. The creation of an effective national security strategy as well as the creation of an elaborate national military strategy. Molander (1996) uses a qualitative research approach and methodology .The method used is constructive. The constructive

Terrorism Shares Features in Common With Irregular
Words: 869 Length: 3 Document Type: Essay

Terrorism shares features in common with irregular warfare, insurgency, and crime. Like crime, terrorism violates the law and infringes on the rights of others. Like insurgency, terrorism "appeals as a weapon of the weak," (Arquilla, Ronfelt & Zanini 1999, p. 134). Similarly, Arquilla et al. (1999) note that terrorism "has appealed as a way to assert identity and command attention," (p. 134). Like irregular warfare, terrorism is asynchronous and asymmetrical,

Terrorism Tech Technological Innovation As
Words: 4295 Length: 15 Document Type: Thesis

The foolishness of this reversal of priorities would be clearly demonstrated in the contrast between the results of intelligence efforts on 9/11 and those just two years prior. After the resignation of Tenet, who submitted as his official reason for departure the desire to spend more time with his family, his spokesman noted that "no one in the U.S. government was more aggressive in calling attention to and dealing with

Information Technology Summary and Critique
Words: 975 Length: 3 Document Type: Term Paper

End Notes 1) Given the recent tardy but well-meaning responses by the federal, state and local officials in the Gulf Coast, it can be assumed that the nation remains relatively unprepared for a terrorist attack of September 11-proportions. The U.S. is struggling to negotiate a nuclear arms treaty with Iran and North Korea (the latter having recently agreed to forego additional nuclear weapons testing in exchange for light-water nuclear reactors, a

Terrorism Represents the Organized Use
Words: 1727 Length: 6 Document Type: Essay

They are bombarded with information concerning the crimes performed by a certain community and they come to believe that it is important for them to act the respective community regardless of the aftermath. Women terrorists practically act against the generally accepted belief that women are non-violent. The reality is that many women become terrorists and governments need to take this concept into consideration in order to be able to effectively

Terrorism How Have Worries Over WMD Terror
Words: 1172 Length: 4 Document Type: Essay

Terrorism How have worries over WMD terror attacks distorted a balanced approach to policy on terrorism? Intelligence failures led to the presumption that Iraq had weapons of mass destruction (Jervis).[footnoteRef:1] The presumption was rooted in a widespread policy playing upon mortal fears, rather than on reason. "Although administration officials exaggerated the danger that Saddam posed, they also revealed their true fears when they talked about the possibility that he could use WMD

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now