fbpx
Wikipedia

Cyberterrorism

Cyberterrorism is the use of the Internet to conduct violent acts that result in, or threaten, the loss of life or significant bodily harm, in order to achieve political or ideological gains through threat or intimidation. Acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet by means of tools such as computer viruses, computer worms, phishing, malicious software, hardware methods, programming scripts can all be forms of internet terrorism.[1] Cyberterrorism is a controversial term.[citation needed] Some authors opt for a very narrow definition, relating to deployment by known terrorist organizations of disruption attacks against information systems for the primary purpose of creating alarm, panic, or physical disruption. Other authors prefer a broader definition, which includes cybercrime. Participating in a cyberattack affects the terror threat perception, even if it isn't done with a violent approach.[2] By some definitions, it might be difficult to distinguish which instances of online activities are cyberterrorism or cybercrime.[3]

Cyberterrorism can be also defined as the intentional use of computers, networks, and public internet to cause destruction and harm for personal objectives. Experienced cyberterrorists, who are very skilled in terms of hacking can cause massive damage to government systems and might leave a country in fear of further attacks.[4] The objectives of such terrorists may be political or ideological since this can be considered a form of terror.[5]

There is much concern from government and media sources about potential damage that could be caused by cyberterrorism, and this has prompted efforts by government agencies such as the Federal Bureau of Investigation (FBI) and the Central Intelligence Agency (CIA) to put an end to cyber attacks and cyberterrorism.[4]

There have been several major and minor instances of cyberterrorism. Al-Qaeda utilized the internet to communicate with supporters and even to recruit new members.[6] Estonia, a Baltic country which is constantly evolving in terms of technology, became a battleground for cyberterrorism in April 2007 after disputes regarding the relocation of a WWII soviet statue located in Estonia's capital Tallinn.[3]

Overview Edit

There is debate over the basic definition of the scope of cyberterrorism. These definitions can be narrow such as the use of Internet to attack other systems in the Internet that result to violence against persons or property.[7] They can also be broad, those that include any form of Internet usage by terrorists to conventional attacks on information technology infrastructures.[7] There is variation in qualification by motivation, targets, methods, and centrality of computer use in the act. U.S. government agencies also use varying definitions and that none of these have so far attempted to introduce a standard that is binding outside of their sphere of influence.[8]

Depending on context, cyberterrorism may overlap considerably with cybercrime, cyberwar or ordinary terrorism.[9] Eugene Kaspersky, founder of Kaspersky Lab, now feels that "cyberterrorism" is a more accurate term than "cyberwar". He states that "with today's attacks, you are clueless about who did it or when they will strike again. It's not cyber-war, but cyberterrorism."[10] He also equates large-scale cyber weapons, such as the Flame Virus and NetTraveler Virus which his company discovered, to biological weapons, claiming that in an interconnected world, they have the potential to be equally destructive.[10][11]

If cyberterrorism is treated similarly to traditional terrorism, then it only includes attacks that threaten property or lives, and can be defined as the leveraging of a target's computers and information, particularly via the Internet, to cause physical, real-world harm or severe disruption of infrastructure.

Many academics and researchers who specialize in terrorism studies suggest that cyberterrorism does not exist and is really a matter of hacking or information warfare.[12] They disagree with labeling it as terrorism because of the unlikelihood of the creation of fear, significant physical harm, or death in a population using electronic means, considering current attack and protective technologies.

If death or physical damage that could cause human harm is considered a necessary part of the cyberterrorism definition, then there have been few identifiable incidents of cyberterrorism, although there has been much policy research and public concern. Modern terrorism and political violence is not easily defined, however, and some scholars assert that it is now "unbounded" and not exclusively concerned with physical damage.[13]

There is an old saying that death or loss of property are the side products of terrorism, the main purpose of such incidents is to create terror in peoples' minds and harm bystanders. If any incident in cyberspace can create terror, it may be rightly called cyberterrorism. For those affected by such acts, the fears of cyberterrorism are quite real.[14]

As with cybercrime in general, the threshold of required knowledge and skills to perpetrate acts of cyberterrorism has been steadily diminishing thanks to freely available hacking suites and online courses.[15] Additionally, the physical and virtual worlds are merging at an accelerated rate, making for many more targets of opportunity which is evidenced by such notable cyber attacks as Stuxnet, the Saudi petrochemical sabotage attempt in 2018 and others.[16]

Defining cyberterrorism Edit

Assigning a concrete definition to cyberterrorism can be hard, due to the difficulty of defining the term terrorism itself. Multiple organizations have created their own definitions, most of which are overly[quantify] broad. There is also controversy concerning overuse of the term, hyperbole in the media and by security vendors trying to sell "solutions".[17]

One way of understanding cyberterrorism involves the idea that terrorists could cause massive loss of life, worldwide economic chaos and environmental damage by hacking into critical infrastructure systems.[18] The nature of cyberterrorism covers conduct involving computer or Internet technology that:[19]

  1. is motivated by a political, religious or ideological cause
  2. is intended to intimidate a government or a section of the public to varying degrees
  3. seriously interferes with infrastructure

The term "cyberterrorism" can be used in a variety of different ways, but there are limits to its use. An attack on an Internet business can be labeled[by whom?] cyberterrorism, however when it is done for economic motivations rather than ideological it is typically regarded as cybercrime.[19] Convention also limits the label "cyberterrorism" to actions by individuals, independent groups, or organizations. Any form of cyberwarfare conducted by governments and states would be regulated and punishable under international law.[19]

The Technolytics Institute defines cyberterrorism as

[t]he premeditated use of disruptive activities, or the threat thereof, against computers and/or networks, with the intention to cause harm or further social, ideological, religious, political or similar objectives. Or to intimidate any person in furtherance of such objectives.[20]

The term appears first in defense literature, surfacing (as "cyber-terrorism") in reports by the U.S. Army War College as early as 1998.[21]

The National Conference of State Legislatures, an organization of legislators created to help policymakers in the United States with issues such as economy and homeland security defines cyberterrorism as:

[T]he use of information technology by terrorist groups and individuals to further their agenda. This can include use of information technology to organize and execute attacks against networks, computer systems and telecommunications infrastructures, or for exchanging information or making threats electronically. Examples are hacking into computer systems, introducing viruses to vulnerable networks, web site defacing, Denial-of-service attacks, or terroristic threats made via electronic communication.[22]

NATO defines cyberterrorism as "[a] cyberattack using or exploiting computer or communication networks to cause sufficient destruction or disruption to generate fear or to intimidate a society into an ideological goal".[23]

The United States National Infrastructure Protection Center defined cyberterrorism as:

A criminal act perpetrated by the use of computers and telecommunications capabilities resulting in violence, destruction, and/or disruption of services to create fear by causing confusion and uncertainty within a given population, with the goal of influencing a government or population to conform to a political, social, or ideological agenda.[24]

The FBI, another United States agency, defines "cyber terrorism" as "premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets by subnational groups or clandestine agents".[25]

These definitions tend to share the view of cyberterrorism as politically and/or ideologically inclined. One area of debate is the difference between cyberterrorism and hacktivism. Hacktivism is "the marriage of hacking with political activism".[26] Both actions are politically driven and involve using computers, however cyberterrorism is primarily used to cause harm. It becomes an issue because acts of violence on the computer can be labeled[by whom?] either[citation needed] cyberterrorism or hacktivism.

Types of cyberterror capability Edit

In 1999 the Center for the Study of Terrorism and Irregular Warfare at the Naval Postgraduate School in Monterey, California, defined three levels of cyberterror capability:[27]

  • Simple-Unstructured: the capability to conduct basic hacks against individual systems using tools created by someone else. The organization possesses little target-analysis, command-and-control, or learning capability.
  • Advanced-Structured: the capability to conduct more sophisticated attacks against multiple systems or networks and possibly, to modify or create basic hacking-tools. The organization possesses an elementary target-analysis, command-and-control, and learning capability.
  • Complex-Coordinated: the capability for a coordinated attack capable of causing mass-disruption against integrated, heterogeneous defenses (including cryptography). Ability to create sophisticated hacking tools. Highly capable target-analysis, command-and-control, and organization learning-capability.

Concerns Edit

Cyberterrorism is becoming more and more prominent on social media today.[28][need quotation to verify] As the Internet becomes more pervasive, individuals or groups can use the anonymity afforded by cyberspace to threaten other individuals, specific groups (with membership based, for example, on ethnicity or belief), communities and entire countries, without the inherent threat of identification, capture, injury, or death of the attacker that being physically present would bring. Many[quantify] groups such as Anonymous, use tools such as denial-of-service attacks to attack and censor groups which oppose them, creating many concerns for freedom and respect for differences of thought.

Many believe that cyberterrorism is an extreme threat to countries' economies,[citation needed] and fear an attack could potentially lead to another Great Depression.[citation needed] Several leaders agree that cyberterrorism has the highest percentage of threat over other possible attacks on U.S. territory. Although natural disasters are considered[by whom?] a top threat and have proven to be devastating to people and land, there is ultimately little that can be done to prevent such events from happening. Thus, the expectation is to focus more on preventative measures that will make Internet attacks impossible for execution.[citation needed]

As the Internet continues to expand, and computer systems continue to be assigned increased responsibility while becoming more complex and interdependent, sabotage or terrorism via the Internet may become a more serious threat and is possibly one of the top 10 events to "end the human race."[29][better source needed] People have much easier access to illegal involvement within cyberspace by the ability to access a part of the internet known as the Dark Web.[30](registration required) The Internet of Things promises to further merge the virtual and physical worlds, which some[quantify] experts[which?] see as a powerful incentive for states to use terrorist proxies in furtherance of objectives.[31]

Dependence on the Internet is rapidly increasing on a worldwide scale, creating a platform for international cyber-terror plots to be formulated and executed as a direct threat to national security.[19][need quotation to verify] For terrorists, cyber-based attacks have distinct advantages over physical attacks. They can be conducted remotely, anonymously, and relatively cheaply, and they do not require significant investment in weapons, explosives or personnel.[32] The effects can be widespread and profound. Incidents of cyberterrorism are likely to increase. They can be expected to take place through denial-of-service attacks, malware, and other methods that are difficult to envision today.[33][need quotation to verify] One example involves the deaths involving the Islamic State and the online social networks Twitter, Google, and Facebook – leading to legal action being taken against them, that ultimately resulted in them being sued.[34][need quotation to verify]

In an article about cyber attacks by Iran and North Korea, The New York Times observes:

The appeal of digital weapons is similar to that of nuclear capability: it is a way for an outgunned, outfinanced nation to even the playing field. "These countries are pursuing cyberweapons the same way they are pursuing nuclear weapons," said James A. Lewis, a computer security expert at the Center for Strategic and International Studies in Washington. "It's primitive; it's not top of the line, but it's good enough and they are committed to getting it."[35]

In addition, Cyberterrorism has also been documented to arouse negative emotions. Recent studies have suggested that Cyberterrorism produces heightened levels of anger and stress, which do not differ drastically from the effects of conventional terrorism.[36] Researchers also noted that Cyberterrorism produced higher levels of stress than anger, and the responses are not dependent on the lethality of the attack.[36]

History Edit

Public interest in cyberterrorism began in the late 1990s, when the term was coined by Barry C. Collin.[37] As 2000 approached, the fear and uncertainty about the millennium bug heightened, as did the potential for attacks by cyber terrorists. Although the millennium bug was by no means a terrorist attack or plot against the world or the United States, it did act as a catalyst in sparking the fears of a possibly large-scale devastating cyber-attack. Commentators noted that many of the facts of such incidents seemed to change, often with exaggerated media reports.

The high-profile terrorist attacks in the United States on 11 September 2001, and the ensuing War on Terror by the US led to further media coverage of the potential threats of cyberterrorism in the years following. Mainstream media coverage often discusses the possibility of a large attack making use of computer networks to sabotage critical infrastructures with the aim of putting human lives in jeopardy or causing disruption on a national scale either directly or by disruption of the national economy.[38]

Authors such as Winn Schwartau and John Arquilla are reported to have had considerable financial success selling books which described what were purported to be plausible scenarios of mayhem caused by cyberterrorism. Many critics claim that these books were unrealistic in their assessments of whether the attacks described (such as nuclear meltdowns and chemical plant explosions) were possible. A common thread throughout what critics perceive as cyberterror-hype is that of non-falsifiability; that is, when the predicted disasters fail to occur, it only goes to show how lucky we've been so far, rather than impugning the theory.

In 2016, for the first time ever, the Department of Justice charged Ardit Ferizi with cyberterrorism. He is accused of allegedly hacking into a military website and stealing the names, addresses, and other personal information of government and military personnel and selling it to ISIS.[39]

On the other hand, it is also argued that, despite substantial studies on cyberterrorism, the body of literature is still unable to present a realistic estimate of the actual threat.[40] For instance, in the case of a cyberterrorist attack on a public infrastructure such as a power plant or air traffic control through hacking, there is uncertainty as to its success because data concerning such phenomena are limited.[40]

Current threats Edit

Cyberterrorism ranks among the highest potential security threats in the world. It has become more critical than the development of nuclear weapons or the current conflicts between nations. Due to the pervasiveness of the internet and the amount of responsibility assigned to this technology, digital weapons pose a threat to entire economic or social systems. Some of the most critical international security concerns include:

DDoS Attacks – Millions of Denial of Service attacks occur every year and the service disruption can cost hundreds of thousands of dollars each hour they are down. It is important to keep critical systems secured and redundant to remain online during these attacks.

Social Engineering – In 1997 an experiment conducted by the NSA concluded that thirty five-hackers were able to access critical pentagon computer systems and could easily edit accounts, reformat data and even shut down entire systems. Often they used phishing tactics such as calling offices and pretending to be technicians to gain passwords.

Third Party Software – The top retailers are connected with thousands of separate third-party recourses and at least 23% of those assets have at least one critical vulnerability. These companies need to manage and reevaluate their network security in order to keep personal data safe.

Future threats Edit

As technology becomes more and more integrated into society, new vulnerabilities and security threats are opened up on these complex networks that we have set up. If an intruder was to gain access to these networks they have the potential to threaten entire communities or economic systems. There is no certainty for what events will take place in the future, which is why it is important that there are systems build to adapt to the changing environment.

The most apparent cyberterrorism threat in our near future will involve the state of remote work during the COVID-19 pandemic. Companies cannot expect that every home office is up to date and secure so they must adopt a zero-trust policy from home devices. This means that they must assume corporate resources and unsecured devices are sharing the same space and they must act accordingly.

The rise of cryptocurrency has also sparked some additional threats in the realm of security. Cyber Criminals are now hijacking home computers and company networks in order to mine certain cryptocurrencies such as bitcoin. This mining process requires an immense amount of computer processing power which can cripple a business’ network and lead to severe downtime if the issue is not resolved.

International attacks and response Edit

Conventions Edit

As of 2016 there have been eighteen conventions and major legal instruments that specifically deal with terrorist activities and cyber terrorism.

  • 1963: Convention on Offences and Certain Other Acts Committed on Board Aircraft
  • 1970: Convention for the Suppression of Unlawful Seizure of Aircraft
  • 1971: Convention for the Suppression of Unlawful Acts Against the Safety of Civil Aviation
  • 1973: Convention on the Prevention and Punishment of Crimes against Internationally Protected Persons
  • 1979: International Convention against the Taking of Hostages
  • 1980: Convention on the Physical Protection of Nuclear Material
  • 1988: Protocol for the Suppression of Unlawful Acts of Violence at Airports Serving International Civil Aviation
  • 1988: Protocol for the Suppression of Unlawful Acts against the Safety of Fixed Platforms Located on the Continental Shelf
  • 1988: Convention for the Suppression of Unlawful Acts against the Safety of Maritime Navigation
  • 1989: Supplementary to the Convention for the Suppression of Unlawful Acts against the Safety of Civil Aviation
  • 1991: Convention on the Marking of Plastic Explosives for the Purpose of Detection
  • 1997: International Convention for the Suppression of Terrorist Bombings
  • 1999: International Convention for the Suppression of the Financing of Terrorism
  • 2005: Protocol to the Convention for the Suppression of Unlawful Acts against the Safety of Maritime Navigation
  • 2005: International Convention for the Suppression of Acts of Nuclear Terrorism
  • 2010: Protocol Supplementary to the Convention for the Suppression of Unlawful Seizure of Aircraft
  • 2010: Convention on the Suppression of Unlawful Acts Relating to International Civil Aviation
  • 2014: Protocol to Amend the Convention on Offences and Certain Acts Committed on Board Aircraft[41]

Motivations for cyberattacks Edit

There are many different motives for cyberattacks, with the majority being for financial reasons. However, there is increasing evidence that hackers are becoming more politically motivated. Cyberterrorists are aware that governments are reliant on the internet and have exploited this as a result. For example, Mohammad Bin Ahmad As-Sālim's piece "39 Ways to Serve and Participate in Jihad" discusses how an electronic jihad could disrupt the West through targeted hacks of American websites, and other resources seen as anti-Jihad, modernist, or secular in orientation (Denning, 2010; Leyden, 2007).[42]

Many of the cyberattacks are not conducted for money, rather the cyberattacks are conducted due to different ideological beliefs and due to wanting to get personal revenge and outrage towards company or individual, the cybercriminal is attacking.[43] An employee might want to get revenge on a company if they were mistreated or wrongfully terminated.[citation needed]

Other motivations for cybercriminals include:

  • Political goals
  • Competition between companies
  • Cyberwarfare between two countries
  • Money

Political goals motivate cyber-attackers because they are not happy with candidates and they might want certain candidates to win the election, therefore, they might alter the election voting to help their preferred candidate win.

Competition between two companies can also stir up a cyberattack, as one company can hire a hacker to conduct the attack on a company as they might want to test the rival company's security. This will also benefit a company because it will force their competitor's customers to think that the company is not secure due to them getting cyber attacked effortlessly and they don't want any of their personal credentials getting leaked.

Cyberwarfare is motivation for countries that are fighting each other. This is mainly used to weaken the opposing country by compromising its core systems and the countries data and other vulnerable information.

Money is motivating for cyber attacks for ransomware, phishing, and data theft as the cyber criminals can differently contact the victims and ask for money and in return the data stays safe.[44]

International Institutions Edit

The United Nations has several agencies that seek to address in cyberterrorism, including, the United Nations Office of Counter-Terrorism, the United Nations Office on Drugs and Crime, the United Nations Office for Disarmament Affairs, the United Nations Institute for Disarmament Research, the United Nations Interregional Crime and Justice Research Institute, and the International Telecommunication Union. Both EUROPOL and INTERPOL also notably specialize on the subject.

Both Europol and Interpol specialize in operations against cyberterrorism as they both collaborate on different operations together and host a yearly joint cybercrime conference. While they both fight against cybercrime, both institutions operate differently. Europol sets up and coordinates cross-border operations against cybercriminals in the EU, while Interpol helps law enforcement and coordinates operations against cyber criminals globally.[45]

Estonia and NATO Edit

The Baltic state of Estonia was the target of a massive denial-of-service attack that ultimately rendered the country offline and shut out from services dependent on Internet connectivity in April 2007. The infrastructure of Estonia including everything from online banking and mobile phone networks to government services and access to health care information was disabled for a time. The tech-dependent state experienced severe turmoil and there was a great deal of concern over the nature and intent of the attack.

The cyber attack was a result of an Estonian-Russian dispute over the removal of a bronze statue depicting a World War II-era Soviet soldier from the center of the capital, Tallinn.[3] In the midst of the armed conflict with Russia, Georgia likewise was subject to sustained and coordinated attacks on its electronic infrastructure in August 2008. In both of these cases, circumstantial evidence point to coordinated Russian attacks, but attribution of the attacks is difficult; though both the countries blame Moscow for contributing to the cyber attacks, proof establishing legal culpability is lacking.

Estonia joined NATO in 2004, which prompted NATO to carefully monitor its member states' response to the attack. NATO also feared escalation and the possibility of cascading effects beyond Estonia's border to other NATO members. In 2008, directly as a result of the attacks, NATO opened a new center of excellence on cyberdefense to conduct research and training on cyber warfare in Tallinn.[46]

The chaos resulting from the attacks in Estonia illustrated to the world the dependence countries had on information technology. This dependence then makes countries vulnerable to future cyber attacks and terrorism.[3]

Quick information on the cyber attack on Estonia and its effects on the country.[47]

  • Online services of Estoninan banks and government services were taken down by uncontrollable high level of internet traffic
  • Media outlets were also down and so broadcasters could not deliver the news of the cyber attacks
  • Some of the services were under attack for 22 days, while other online services were taken down completely
  • Riots and Looting went on for 48 hours in Tallinn, Estonia
  • The cyber attack served as a wake up call to Estonia and for the entire world on the importance of cyber defence.

As cyberattacks continue to increase around the world, countries still look at the attacks on Estonia in the 2007 as an example of how countries can fight future cyberattacks and terrorism. As a result of the attacks, Estonia is now currently one of the top countries in cyber defence and online safety and its capital city of Tallinn is home to NATO's cyber defense hub. The government of Estonia continues to update there cyber defence protocols and national cybersecurity strategies. NATO's Coopeative Cyber Defence Centre in Tallinn also conducts research and training on cyber security to not just help Estonia but other countries that are in the alliance.[48]

China Edit

The Chinese Defense Ministry confirmed the existence of an online defense unit in May 2011. Composed of about thirty elite internet specialists, the so-called "Cyber Blue Team", or "Blue Army", is officially claimed to be engaged in cyber-defense operations, though there are fears the unit has been used to penetrate secure online systems of foreign governments.[49][50] China's leaders have invested in its foundations of cyber defense and quantum computing and artificial intelligence. 39 Chinese soldiers were chosen  to strengthen China's cyber defenses. The reason given by Spokesman for the Ministry of National Defense, Geng Yansheng was that their internet protection was currently weak. Geng claimed that the program was only temporary to help improve cyber defenses.[51]

India Edit

To counter the cyber terrorists, also called "white-collar jihadis", the police in India has registered private citizens as volunteers who patrol the internet and report the suspected cyber terrorists to the government. These volunteers are categorised in three categories, namely "Unlawful Content Flaggers", "Cyber Awareness Promoters" and "Cyber Experts". In August 2021, police arrested five suspected white-collar jihadis who were preparing a hit list of officers, journalists, social activists, lawyers and political functionaries to create fear among people. The white-collar jihadis are considered "worst kind of terrorists" as they remain anonymous and safe in other nations, but inflict "immeasurable" amount of damage and brainwashing.[52]

In India, the demand for cyber security professionals has increased over 100 per cent in 2021 and will rise 200 per cent by 2024.[53]

Eighty two percent of companies in India had a ransomware attack in the year 2020. The cost it takes to recover from a ransomware attack in India has gone from $1.1 million in 2020 to $3.38 million in 2021.[54] India is at the top of the list of 30 countries for ransomware attacks.

A cyber-attack took place on the electricity grid in Maharashtra that resulted in a power outage. This occurred in October 2020 and the authorities believe China was behind it.[55]

Important information like dates of birth and full names were leaked for thousands of patients who were tested for COVID-19. This information was made accessible on Google and was leaked from government websites. The job portal IIMjobs was attacked and the information of 1.4 million people looking for jobs was leaked. The information leaked was quite extensive including the location of users and their names and phone numbers. The information for 500,000 Indian police personal was sold on a forum in February 2021. The information contained much personal information. The data was from a police exam taken in December 2019.[56]

Korea Edit

According to 2016 Deloitte Asia-Pacific Defense Outlook,[57] South Korea's 'Cyber Risk Score' was 884 out of 1,000 and South Korea is found to be the most vulnerable country to cyber attacks in the Asia-Pacific region. Considering South Korea's high speed internet and cutting-edge technology, its cyber security infrastructure is relatively weak.[58] The 2013 South Korea cyberattack significantly damaged the Korean economy. This attack wounded the systems of two banks and the computer networks of three TV broadcasters. The incident was a massive blow, and the attacker was never identified. It was theorized to be North Korea. The week before North Korea accused the United States and South Korea of shutting down their internet for two days.[59] In 2017, a ransomware attack harassed private companies and users, who experienced personal information leakage. Additionally, there were North Korea's cyber attacks which risked national security of South Korea.[60]

In response to this, South Korean government's countermeasure is to protect the information security centres the National Intelligence Agency. Currently, 'cyber security' is one of the major goals of NIS Korea.[61] Since 2013, South Korea had established policies related to National cyber security and trying to prevent cyber crises via sophisticated investigation on potential threats. Meanwhile, scholars emphasize on improving the national consciousness towards cyber attacks as South Korea had already entered the so-called 'hyper connected society'.

North Korea's cyberwarfare is incredibly efficient and the best of state-sponsored hackers. Those who are chosen to be hackers are selected when they are young and trained specifically in cyberwarfare. Hackers are trained to steal money from ATMs but not enough to be reported. North Korea is great at zero-day exploits. The country will hack anyone they chose to. They steal secrets from companies and government agencies and steal money from financial systems to fund their hacking operations.[62]

Pakistan Edit

Pakistani Government has also taken steps to curb the menace of cyberterrorism and extremist propaganda. National Counter Terrorism Authority (Nacta) is working on joint programs with different NGOs and other cyber security organizations in Pakistan to combat this problem. Surf Safe Pakistan[63] is one such example. Now people in Pakistan can report extremist and terrorist related content online on Surf Safe Pakistan portal. The National Counter Terrorism Authority (NACTA) provides the Federal Government's leadership for the Surf Safe Campaign.

Ukraine Edit

A series of powerful cyber attacks began 27 June 2017, that swamped websites of Ukrainian organizations, including banks, ministries, newspapers and electricity firms.

USA Edit

The US Department of Defense (DoD) charged the United States Strategic Command with the duty of combating cyberterrorism. This is accomplished through the Joint Task Force-Global Network Operations, which is the operational component supporting USSTRATCOM in defense of the DoD's Global Information Grid. This is done by integrating GNO capabilities into the operations of all DoD computers, networks, and systems used by DoD combatant commands, services and agencies.

On 2 November 2006, the Secretary of the Air Force announced the creation of the Air Force's newest MAJCOM, the Air Force Cyber Command, which would be tasked to monitor and defend American interest in cyberspace. The plan was however replaced by the creation of Twenty-Fourth Air Force which became active in August 2009 and would be a component of the planned United States Cyber Command.[64]

On 22 December 2009, the White House named its head of computer security as Howard Schmidt to coordinate U.S Government, military and intelligence efforts to repel hackers. He left the position in May 2012.[65] Michael Daniel was appointed to the position of White House Coordinator of Cyber Security the same week[66] and continues in the position during the second term of the Obama administration.[67]

Obama signed an executive order to enable the US to impose sanctions on either individuals or entities that are suspected to be participating in cyber related acts. These acts were assessed to be possible threats to US national security, financial issues or foreign policy issues.[68] U.S. authorities indicted a man over 92 cyberterrorism hacks attacks on computers used by the Department of Defense.[69] A Nebraska-based consortium apprehended four million hacking attempts in the course of eight weeks.[70] In 2011 cyberterrorism attacks grew 20%.[71]

In May 2021, President Joe Biden announced an executive order aiming to improve America's cybersecurity. It came about after an increase in cybersecurity attacks aimed at the country's public and private sector. The plan aims to improve the government's cyberdefense by working on its ability to identify, deter, protect against, detect, and respond to attacks. The plan has 10 sections written into the document that include, to name a few, improving sharing of threat information, modernizing the government's cybersecurity, and establishing a Cybersecurity Review Board.[72]

Examples Edit

An operation can be done by anyone anywhere in the world, for it can be performed thousands of miles away from a target. An attack can cause serious damage to a critical infrastructure which may result in casualties.[73]

Some attacks are conducted in furtherance of political and social objectives, as the following examples illustrate:

  • In 1996, a computer hacker allegedly associated with the White Supremacist movement temporarily disabled a Massachusetts ISP and damaged part of the ISP's record keeping system. The ISP had attempted to stop the hacker from sending out worldwide racist messages under the ISP's name. The hacker signed off with the threat: "you have yet to see true electronic terrorism. This is a promise."
  • In 1998, Spanish protesters bombarded the Institute for Global Communications (IGC) with thousands of bogus e-mail messages. E-mail was tied up and undeliverable to the ISP's users, and support lines were tied up with people who couldn't get their mail. The protestors also spammed IGC staff and member accounts, clogged their Web page with bogus credit card orders, and threatened to employ the same tactics against organizations using IGC services. They demanded that IGC stop hosting the Web site for the Euskal Herria Journal, a New York-based publication supporting Basque independence. Protestors said IGC supported terrorism because a section on the Web pages contained materials on the terrorist group ETA, which claimed responsibility for assassinations of Spanish political and security officials, and attacks on military installations. IGC finally relented and pulled the site because of the "mail bombings".
  • In 1998, ethnic Tamil guerrillas attempted to disrupt Sri Lankan embassies by sending large volumes of e-mail. The embassies received 800 e-mails a day over a two-week period. The messages read "We are the Internet Black Tigers and we're doing this to disrupt your communications." Intelligence authorities characterized it as the first known attack by terrorists against a country's computer systems.[74]
  • During the Kosovo conflict in 1999, NATO computers were blasted with e-mail bombs and hit with denial-of-service attacks by hacktivists protesting the NATO bombings. In addition, businesses, public organizations and academic institutes received highly politicized virus-laden e-mails from a range of Eastern European countries, according to reports. Web defacements were also common. After the Chinese Embassy was accidentally bombed in Belgrade[citation needed], Chinese hacktivists posted messages such as "We won't stop attacking until the war stops!" on U.S. government Web sites.
  • Since December 1997, the Electronic Disturbance Theater (EDT) has been conducting Web sit-ins against various sites in support of the Mexican Zapatistas. At a designated time, thousands of protestors point their browsers to a target site using software that floods the target with rapid and repeated download requests. EDT's software has also been used by animal rights groups against organizations said to abuse animals. Electrohippies, another group of hacktivists, conducted Web sit-ins against the WTO when they met in Seattle in late 1999. These sit-ins all require mass participation to have much effect, and thus are more suited to use by activists than by terrorists.[27]
  • In 2000, a Japanese investigation revealed that the government was using software developed by computer companies affiliated with Aum Shinrikyo, the doomsday sect responsible for the sarin gas attack on the Tokyo subway system in 1995. "The government found 100 types of software programs used by at least 10 Japanese government agencies, including the Defense Ministry, and more than 80 major Japanese companies, including Nippon Telegraph and Telephone."[75] Following the discovery, the Japanese government suspended use of Aum-developed programs out of concern that Aum-related companies may have compromised security by breaching firewalls. gaining access to sensitive systems or information, allowing invasion by outsiders, planting viruses that could be set off later, or planting malicious code that could cripple computer systems and key data system.[76]
  • In March 2013, The New York Times reported on a pattern of cyber attacks against U.S. financial institutions believed to be instigated by Iran as well as incidents affecting South Korean financial institutions that originate with the North Korean government.[35]
  • In August 2013, media companies including The New York Times, Twitter and the Huffington Post lost control of some of their websites after hackers supporting the Syrian government breached the Australian Internet company that manages many major site addresses. The Syrian Electronic Army, a hacker group that has previously attacked media organisations that it considers hostile to the regime of Syrian president Bashar al-Assad, claimed credit for the Twitter and Huffington Post hacks in a series of Twitter messages. Electronic records showed that NYTimes.com, the only site with an hours-long outage, redirected visitors to a server controlled by the Syrian group before it went dark.[77]
  • Pakistani Cyber Army is the name taken by a group of hackers who are known for their defacement of websites, particularly Indian, Chinese, and Israeli companies and governmental organizations, claiming to represent Pakistani nationalist and Islamic interests.[78] The group is thought to have been active since at least 2008,[79] and maintains an active presence on social media, especially Facebook. Its members have claimed responsibility for the hijacking of websites belonging to Acer,[80] BSNL,[81] India's CBI, Central Bank, and the State Government of Kerala.[82][83]
  • British hacker Kane Gamble, sentenced to 2 years in youth detention, posed as CIA chief to access highly sensitive information.[84] He also "cyber-terrorized" high-profile U.S. intelligence officials such as then CIA chief John Brennan or Director of National Intelligence James Clapper.[85][86] The judge said Gamble engaged in "politically motivated cyber terrorism".[87]
  • In March 2021 hackers affiliated with Russia were reported to have targeted Lithuanian Officials and decision makers. The cyber-espionage group APT29 which is believed to have carried out the attacks utilized the country's own IT infrastructure against organizations involved in the development of a COVID-19 vaccine.[88]
  • On 7 May 2021, the Colonial Pipeline was hit with a cyberattack that disrupted oil distribution. The Colonial Pipeline is a pipeline that controls almost half (45%) of the oil that runs through the East Coast of the United States. This attack caused the company to turn off the pipeline, which it had never done before. Thus, many people panicked buying gasoline at gas stations, and the government thought this attack would quickly spread.[89] Ultimately, the Colonial Pipeline paid nearly an amount of 5 million dollars worth of cryptocurrency. Even though the Colonial paid all the money, the system did not turn on as rapidly as it used to.[90] The hacker accused of this attack is a group called DarkSide. The money that the Colonial paid went to DarkSide, but there are other entities involved as well. For now, DarkSide has decided to discontinue its operations.[91]
  • On 30 May 2021, JBS was exposed to a cyberattack of ransomware which delayed the plant's meat production. JBS is the world's largest meat producer that provides meat-related products for people. This attack caused the shutdown of all nine beef factories in the United States and disrupted poultry and pork production. In addition, labor had to be cut due to the closings of the factories, and the cost of meat increased due to no meat being produced.[92] Ultimately, JBS had to pay 11 million dollars worth of cryptocurrency to regain control.[93] A group called REvil was responsible for the attack. REvil is a group based in the country of Russia that is also one of the most productive ransomware organizations.[94]
  • In the summer of 2021, crimes committed in Cyprus,[95][96] Israel[97] and Lithuania[98] were classified by experts as Internet terrorism. Anonymous persons informed law enforcement authorities through the internet about mined business centers and office buildings. Main target was the gambling company Affise. According to Ambassador John R. Bolton,[99] these occurrences are vivid examples of Internet terrorism. Amb. Bolton believes that they are consequences of financial conflict stirred among the owners of Affise, PlayCash and "CyberEye-25" group. According to the expert, all three companies gain illicit income associated with criminal activities on the Internet.
  • In early December 2021 it was reported least nine U.S State Department had their phones hacked by an unknown attacker. All nine employees had Apple Iphones. The hack, which took place over several months, was done through the use of iMessages that had a software attached that when sent, without needing to be interacted with, installed spyware known as Pegasus. The software used was developed and sold by an Israel-based spyware development company named NSO Group.[100]
  • In December 2021 at least five US defense and tech firms have been hacked by a group operating from China. The group took advantage of an exploit used in these organization's software to conduct their campaign which came to light in upcoming months. The target of these breaches were passwords as well as having the goal of intercepting private communications. As of right now the extent of the damage is unclear as the breaches are ongoing.[101]

Sabotage Edit

Non-political acts of sabotage have caused financial and other damage. In 2000, disgruntled employee Vitek Boden caused the release of 800,000 litres of untreated sewage into waterways in Maroochy Shire, Australia.[103][104]

More recently, in May 2007 Estonia was subjected to a mass cyber-attack in the wake of the removal of a Russian World War II war memorial from downtown Tallinn. The attack was a distributed denial-of-service attack in which selected sites were bombarded with traffic to force them offline; nearly all Estonian government ministry networks as well as two major Estonian bank networks were knocked offline; in addition, the political party website of Estonia's Prime Minister Andrus Ansip featured a counterfeit letter of apology from Ansip for removing the memorial statue.[citation needed] In January 2008 a man from Estonia was convicted for launching the attacks against the Estonian Reform Party website and fined.[105][106]

During the Russia-Georgia War, on 5 August 2008, three days before Georgia launched its invasion of South Ossetia, the websites for OSInform News Agency and OSRadio were hacked. The OSinform website at osinform.ru kept its header and logo, but its content was replaced by a feed to the Alania TV website content. Alania TV, a Georgian government-supported television station aimed at audiences in South Ossetia, denied any involvement in the hacking of the websites. Dmitry Medoyev, at the time the South Ossetian envoy to Moscow, claimed that Georgia was attempting to cover up information on events which occurred in the lead-up to the war.[107] One such cyber attack caused the Parliament of Georgia and Georgian Ministry of Foreign Affairs websites to be replaced by images comparing Georgian president Mikheil Saakashvili to Adolf Hitler.[108] Other attacks involved denials of service to numerous Georgian and Azerbaijani websites,[109] such as when Russian hackers allegedly disabled the servers of the Azerbaijani Day.Az news agency.[110]

In June 2019, Russia has conceded that it is "possible" its electrical grid is under cyber-attack by the United States.[111] The New York Times reported that American hackers from the United States Cyber Command planted malware potentially capable of disrupting the Russian electrical grid.[112]

Website defacement and denial of service Edit

Even more recently, in October 2007, the website of Ukrainian president Viktor Yushchenko was attacked by hackers. A radical Russian nationalist youth group, the Eurasian Youth Movement, claimed responsibility.[113][114]

In 1999 hackers attacked NATO computers. The computers flooded them with email and hit them with a denial-of-service attack. The hackers were protesting against the NATO bombings of the Chinese embassy in Belgrade. Businesses, public organizations and academic institutions were bombarded with highly politicized emails containing viruses from other European countries.[115]

In December 2018, Twitter warned of "unusual activity" from China and Saudi Arabia. A bug was detected in November that could have revealed the country code of users' phone numbers. Twitter said the bug could have had ties to "state-sponsored actors".[116][117]

In May 2021 successive waves of DDOS attacks aimed at Belnet, Belgium's public sector ISP, took down multiple government sites in Belgium. 200 sites were affected leaving public offices, universities, and research centers unable to access the internet fully or partially.[118]

In fiction Edit

  • The Japanese cyberpunk manga, Ghost in the Shell (as well as its popular movie and TV adaptations) centers around an anti-cyberterrorism and cybercrime unit. In its mid-21st century Japan setting such attacks are made all the more threatening by an even more widespread use of technology including cybernetic enhancements to the human body allowing people themselves to be direct targets of cyberterrorist attacks.
  • In the movie Live Free or Die Hard, John McClane (Bruce Willis) takes on a group of cyberterrorists intent on shutting down the entire computer network of the United States.
  • The movie Eagle Eye involves a super computer controlling everything electrical and networked to accomplish the goal.
  • The plots of 24 Day 4 and Day 7 include plans to breach the nation's nuclear plant grid and then to seize control of the entire critical infrastructure protocol.
  • The Tom Clancy created series Netforce was about an FBI/Military team dedicated to combating cyberterrorists.
  • Much of the plot of Mega Man Battle Network is centered around cyberterrorism.
  • In the 2009 Japanese animated film Summer Wars, an artificial intelligence cyber-terrorist attempts to take control over the world's missiles in order to "win" against the main characters that attempted to keep it from manipulating the world's electronic devices.
  • In the 2012 film Skyfall, part of the James Bond franchise, main villain Raoul Silva (Javier Bardem) is an expert cyberterrorist who is responsible for various cyberterrorist incidents in the past.
  • Cyberterrorism plays a role in the 2012 video game Call of Duty: Black Ops II, first when main antagonist Raul Menendez cripples the Chinese economy with a cyberattack and frames the United States for it, starting a new Cold War between the two powers. Later, another cyberattack with a computer worm leads to Menendez seizing control of the entire U.S drone fleet. Finally, one of the game's endings leads to another attack similar to the latter, this time crippling the U.S' electrical and water distribution grids. An alternate ending depicts the cyberattack failing after it is stopped by one of the game's characters pivotal to the storyline.
  • The plot of the 2014 video game Watch Dogs is heavily influenced by cyber-terrorism. In which players take control of the game's protagonist, Aiden Pierce, an accused murder suspect,[citation needed] who hacks into a ctOS (Central Operating System), giving him complete control of Chicago's mainframe in order to hunt down his accusers.
  • The video game Metal Slug 4 focuses on Marco and Fio, joined by newcomers Nadia and Trevor, to battle a terrorist organization known as Amadeus that is threatening the world with a computer virus.
  • The visual novel Baldr Force has the main character Tooru Souma joining a military organization to fight cyberterrorism to avenge the death of his friend.
  • The Japanese manga and live action Bloody Monday is highly influenced by hacking and cracking. The main character Takagi Fujimaru is a Super Elite hacker which use his hacking knowledge to fight against his enemies.
  • In the television series Mr. Robot, the main plot line follows groups of hackers who engage in cyber terrorism as well as other events.

See also Edit

References Edit

  1. ^ "Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress". www.everycrsreport.com. Retrieved 5 September 2021.
  2. ^ Canetti, Daphna; Gross, Michael; Waismel-Manor, Israel; Levanon, Asaf; Cohen, Hagit (1 February 2017). "How Cyberattacks Terrorize: Cortisol and Personal Insecurity Jump in the Wake of Cyberattacks". Cyberpsychology, Behavior, and Social Networking. 20 (2): 72–77. doi:10.1089/cyber.2016.0338. PMID 28121462.
  3. ^ a b c d Hower, Sara; Uradnik, Kathleen (2011). Cyberterrorism (1st ed.). Santa Barbara, CA: Greenwood. pp. 140–149. ISBN 9780313343131.
  4. ^ a b Laqueur, Walter; C., Smith; Spector, Michael (2002). Cyberterrorism. Facts on File. pp. 52–53. ISBN 9781438110196.
  5. ^ "India Quarterly : a Journal of International Affairs". 42–43. Indian Council of World Affairs. 1986: 122. The difficulty of defining terrorism has led to the cliche that one man's terrorist is another man's freedom fighter {{cite journal}}: Cite journal requires |journal= (help)
  6. ^ Worth, Robert (25 June 2016). "Terror on the Internet: The New Arena, The New Challenges". New York Times Book Review: 21. Retrieved 5 December 2016.
  7. ^ a b Centre of Excellence Defence Against Terrorism (2008). Responses to Cyber Terrorism. Amsterdam: IOS Press. p. 34. ISBN 9781586038366.
  8. ^ Bidgoli, Hossein (2004). The Internet Encyclopedia, Vol. 1. Hoboken, NJ: John Wiley & Sons. p. 354. ISBN 978-0471222026.
  9. ^ . Archived from the original on 12 November 2009. Retrieved 5 November 2009.. Harvard Law Record. Victoria Baranetsky. 5 November 2009.
  10. ^ a b "Latest viruses could mean 'end of world as we know it,' says man who discovered Flame", The Times of Israel, 6 June 2012
  11. ^ "Cyber espionage bug attacking Middle East, but Israel untouched — so far", The Times of Israel, 4 June 2013
  12. ^ Iqbal, Mohammad. "Defining Cyberterrorism". The John Marshall Journal of Information Technology & Privacy Law. 22 (2): 397–408.
  13. ^ Ruggiero, Vincenzo (1 March 2006). Understanding Political Violence: A Criminological Approach. McGraw Hill. ISBN 9780335217519. Retrieved 13 August 2018.
  14. ^ Gross, Michael (2016). "The psychological effects of cyber terrorism". The Bulletin of the Atomic Scientists. National Institutes of Health. 72 (5): 284–291. Bibcode:2016BuAtS..72e.284G. doi:10.1080/00963402.2016.1216502. PMC 5370589. PMID 28366962.
  15. ^ . National Crime Agency. Archived from the original on 13 August 2018. Retrieved 13 August 2018.
  16. ^ Rudawski, Anna. "The Future of Cyber Threats: When Attacks Cause Physical Harm". New York Law Journal. Retrieved 13 August 2018.
  17. ^ Anderson, Kent (13 October 2010). "Virtual Hostage: Cyber terrorism and politically motivated computer crime". The Prague Post. Retrieved 14 October 2010.
  18. ^ Hardy, Keiran; Williams, George (11 August 2014). Chen, Thomas M.; Jarvis, Lee; Macdonald, Stuart (eds.). Cyberterrorism: Understanding, Assessment, and Response. Springer. pp. 1–23. doi:10.1007/978-1-4939-0962-9_1.
  19. ^ a b c d Gable, Kelly A. "Cyber-Apocalypse Now: Securing the Internet against Cyberterrorism and Using Universal Jurisdiction as a Deterrent". Vanderbilt Journal of Transnational Law, Vol. 43, No. 1
  20. ^ INTELLIGENCE, ARMY TRAINING AND DOCTRINE COMMAND FORTLEAVENWORTH KS DEPUTY CHIEF OF STAFF FOR (15 August 2005). . Archived from the original on 23 August 2011. Retrieved 4 May 2010. {{cite journal}}: Cite journal requires |journal= (help)
  21. ^ White, Kenneth C. (1998). Cyber-terrorism: Modern mayhem. U.S. Army War College. Retrieved 13 March 2015.
  22. ^ National Conference of State Legislatures.
  23. ^ Centre of Excellence Defence Against Terrorism, ed. (2008). Responses to Cyber Terrorism. NATO science for peace and security series. Sub-series E: Human and societal dynamics, ISSN 1874-6276. Vol. 34. Amsterdam: IOS Press. p. 119. ISBN 9781586038366. Retrieved 22 July 2018. The current NATO Definition of cyber terrorism is: 'A cyberattack using or exploiting computer or communication networks to cause sufficient destruction or disruption to generate fear or to intimidate a society into an ideological goal.'
  24. ^ Centre of Excellence Defence Against Terrorism, ed. (2008). Responses to Cyber Terrorism. NATO science for peace and security series. Sub-series E: Human and societal dynamics, ISSN 1874-6276. Vol. 34. Amsterdam: IOS Press. p. 119. ISBN 9781586038366. Retrieved 22 July 2018. The National Infrastructure Protection Center, now part of the US Department of Homeland Security, states as their understanding of cyber terrorism: 'A criminal act perpetrated by the use of computers and telecommunications capabilities resulting in violence, destruction, and/or disruption of services to create fear by causing confusion and uncertainty within a given population, with the goal of influencing a government or population to conform to a political, social, or ideological agenda.'
  25. ^ Centre of Excellence Defence Against Terrorism, ed. (2008). Responses to Cyber Terrorism. NATO science for peace and security series. Sub-series E: Human and societal dynamics, ISSN 1874-6276. Vol. 34. Amsterdam: IOS Press. p. 119. ISBN 9781586038366. Retrieved 22 July 2018. The Federal Bureau of Investigations [sic] has the following definition of cyber terrorism: Any 'premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets by subnational groups or clandestine agents.'
  26. ^ Conway, Maura (2008). "What is Cyberterrorism and How Real is the Threat?". Cyber Behavior: 217–245.
  27. ^ a b Dorothy E. Denning (23 May 2000). . cs.georgetown.edu. Archived from the original on 10 March 2014. Retrieved 19 June 2016.
  28. ^ Warf, Barney (August 2016). "Relational Geographies of Cyberterrorism and Cyberwar". Space & Polity. 20 (2): 143–157. doi:10.1080/13562576.2015.1112113. S2CID 146837558.
  29. ^ . Yahoo News. 27 October 2010. Archived from the original on 30 October 2010. Retrieved 1 November 2010.
  30. ^ Vilić, Vida (December 2017). "Dark Web, Cyber Terrorism and Cyber Warfare: Dark Side of the Cyberspace". Balkan Social Science Review. 10: 7–24 – via EBSCOhost.
  31. ^ Compare: Costigan, Sean (25 January 2015). "Cyber terrorism must be jointly tackled". Sunday Guardian. Retrieved 12 March 2015. States are actively engaged in weaponising code and are all too willing to hide behind the challenges of attribution — many will be apt to share code with proxies in furtherance of their objectives, just as states continue to support terrorism in the 'physical' realm. [...] Reduced technical complexity, lowered costs and most importantly, the continued push to connect the virtual and the physical — think of the growth of the Internet of Things or Machine-to-Machine connectivity — is making for new, enticing physical targets worldwide.
  32. ^ Sultan, Oz (2019). "Tackling Disinformation, Online Terrorism, and Cyber Risks into the 2020s". The Cyber Defense Review. 4 (1): 43–60. ISSN 2474-2120. JSTOR 26623066.
  33. ^ Joel Brenner and Jon R. Lindsay, "Debating the Chinese Cyber Threat", International Security, Vol. 40, No. 1, Summer 2015, pp. 191–195.
  34. ^ Softness, Nicole (Winter 2016). "Terrorist Communications: Are Facebook, Twitter, and Google Responsible for the Islamic State's Actions?". Journal of International Affairs. 70: 201–215 – via EBSCOhost.
  35. ^ a b Perlroth, Nicole; Sanger, David E. (28 March 2013). "Corporate Cyberattacks, Possibly State-Backed, Now Seek to Destroy Data". The New York Times.
  36. ^ a b "Cyberpsychology, Behavior, and Social Networking :". Cyberpsychology, Behavior, and Social Networking. Retrieved 21 September 2023.
  37. ^ [1], William L. Tafoya, Ph.D., "Cyber Terror", FBI Law Enforcement Bulletin (FBI.gov), November 2011
  38. ^ "White House shifts Y2K focus to states, CNN (February 23, 1999)". CNN. 23 February 1999. Retrieved 25 September 2011.
  39. ^ Blake, Andrew. "Ardit Ferizi, hacker who aided Islamic State, sentenced for helping terror group with 'kill list'". The Washington Times. Retrieved 1 March 2017.
  40. ^ a b C, Reich, Pauline (2012). Law, Policy, and Technology: Cyberterrorism, Information Warfare, and Internet Immobilization: Cyberterrorism, Information Warfare, and Internet Immobilization. Hershey, PA: Information Science Reference. p. 354. ISBN 9781615208319.{{cite book}}: CS1 maint: multiple names: authors list (link)
  41. ^ "International Legal Instruments | Office of Counter-Terrorism". www.un.org. Retrieved 7 December 2021.
  42. ^ Holt, Thomas J.; Freilich, Joshua D.; Chermak, Steven M. (2017). "Exploring the Subculture of Ideologically Motivated Cyber-Attackers". Journal of Contemporary Criminal Justice. 33 (3): 212–233. doi:10.1177/1043986217699100. S2CID 152277480.
  43. ^ "Know Your Enemy: Understanding the Motivation Behind Cyberattacks". Security Intelligence. 31 March 2016. Retrieved 26 October 2021.
  44. ^ "What Motivates Cyber Criminals? - SEGMENTECH". SEGMENTECH Cyber-Security Solutions. 24 March 2021. Retrieved 27 October 2021.
  45. ^ "Europol… INTERPOL… what's the difference?". Europol. Retrieved 6 December 2021.
  46. ^ Maryann Cusimano Love. (2011). Beyond Sovereignty: Issues for a Global Agenda. Wadsworth, Cengage Learning.
  47. ^ "How a cyber attack transformed Estonia". BBC News. 27 April 2017. Retrieved 6 December 2021.
  48. ^ Ivana Kottasová. "How Russian threats turned this country into the go-to expert on cyber defense". CNN. Retrieved 6 December 2021.
  49. ^ Yu, Eileen (27 May 2011). "China dispatches online army". ZDNet Asia. Retrieved 3 June 2011. Geng Yansheng, spokesperson for China's Defense Ministry, was quoted to say that the PLA set up the cyberwar unit, or 'cyber blue team', to support its military training and upgrade the army's Internet security defense.
  50. ^ "China Confirms Existence of Elite Cyber-Warfare Outfit the 'Blue Army'". Fox News. 26 May 2011. Retrieved 3 June 2011. China set up a specialized online 'Blue Army' unit that it claims will protect the People's Liberation Army from outside attacks, prompting fears that the crack team was being used to infiltrate foreign governments' systems.
  51. ^ Austin, Greg. "How Good Are China's Cyber Defenses?". thediplomat.com. Retrieved 30 November 2021.
  52. ^ Jammu and Kashmir Police cracking down on ‘white-collar jihadis’, The Tribune, 30 August 2021.
  53. ^ Tejaswi, Mini (13 May 2021). "India will require 70K cyber experts this year alone: Xpheno". @businessline. Retrieved 30 November 2021.
  54. ^ IANS (1 June 2021). "At Rs 24.5 crore, ransomware data recovery cost triples in India". Business Standard India. Retrieved 30 November 2021.
  55. ^ "Cyber Security for Critical Infrastructure: Challenges and Solutions". Kratikal Blogs. 7 April 2021. Retrieved 30 November 2021.
  56. ^ "The Current State of Cyber Security in India". Kratikal Blogs. 28 October 2021. Retrieved 30 November 2021.
  57. ^ "한국, 아태지역 국가 중 사이버 테러 취약성 1위 – Deloitte Korea – Press Release". 딜로이트.
  58. ^ Arashi, Rieko (2016). "Deloitte Asia Pacific Defense Outlook 2016: Defense in Four Domains" (PDF). Deloitte Asia Pacific Defense Outlook. Deloitte Touche Tohmatsu Limited: 18–19.
  59. ^ "South Korea on alert for cyber-attacks after major network goes down". the Guardian. 20 March 2013. Retrieved 30 November 2021.
  60. ^ A Study of countermeasure and strategy analysis on North Korean cyber terror, 신충근 and 이상진
  61. ^ "National Intelligence Service".
  62. ^ "StackPath". www.securityinfowatch.com. Retrieved 30 November 2021.
  63. ^ "Surfsafe® Pakistan | Report Extremist Online-Content".
  64. ^ Bruce M. DeBlois, et al., "Space Weapons: Crossing the U.S. Rubicon," International Security, Vol. 29, No. 2, Fall 2004, pp. 50–84.
  65. ^ Chabrow, Eric. Obama Cybersecurity Coordinator Resigns. GovInfoSecurity.com, 17 May 2012. Accessed: 11 February 2014.
  66. ^ White House Names New Cybersecurity Chief. BreakingGov.com 17 May 2012. Accessed: 11 February 2014.
  67. ^ McDonald, Ryan.White House Security Chief Warns. Baltimore Biz Journal. 29 January 2014. Access date: 11 February 2014.
  68. ^ "FACT SHEET: Executive Order Blocking the Property of Certain Persons Engaging in Significant Malicious Cyber-Enabled Activities". whitehouse.gov. 1 April 2015. Retrieved 1 March 2017.
  69. ^ Marshall, Patrick (26 September 2003). "Cybersecurity". CQ Researcher. pp. 797–820.
  70. ^ Begos, Kevin (11 November 2016). "Protecting the power grid". CQ Researcher.
  71. ^ Flamini, Roland (15 February 2013). "Improving cybersecurity". CQ Researcher.
  72. ^ "Executive Order on Improving the Nation's Cybersecurity". The White House. 12 May 2021. Retrieved 6 December 2021.
  73. ^ Ayers, Cynthia (September 2009). "The Worst is Yet To Come". Futurist: 49.
  74. ^ Denning, Dorothy (Autumn 2000). . Global Dialogue. 2 (4). Archived from the original on 27 June 2013. Retrieved 20 August 2014.
  75. ^ Maryann Cusimano Love, Public-Private Partnerships and Global Problems: Y2K and Cybercrime. Paper Presented at the International Studies Association, Hong Kong, July 2001.
  76. ^ Calvin Sims, "Japan Software Suppliers Linked to Sect", The New York Times (2 March 2000): A6.
  77. ^ "New York Times, Twitter hacked by Syrian group". 28 August 2013.
  78. ^ "Pakistan Cyber Army (PCA) – Hacking Indian Websites, Promoting Pakistani Interests In Cyber Space And Nurturing Pakistani Hackers | The Cyber & Jihad Lab". cjlab.memri.org. Retrieved 28 May 2016.
  79. ^ "Debugging the Pakistan Cyber Army: From Pakbugs to Bitterbugs – ThreatConnect | Enterprise Threat Intelligence Platform". ThreatConnect | Enterprise Threat Intelligence Platform. 6 October 2014. Retrieved 28 May 2016.
  80. ^ India; Censorship; China; Japan; Apple; Reg man says '拜拜' to Honkers, ponders Asia's future role in tech world; month, Acer founder Shih to step down for second time next; themselves, Script fools n00b hackers into hacking. "Pakistan Cyber Army declares war on Chinese, Bangladeshi sites". The Register. Retrieved 28 May 2016.
  81. ^ Saxena, Anupam (28 July 2011). "BSNL Website Hacked By Pakistan Cyber Army: Report". MediaNama. Retrieved 28 May 2016.
  82. ^ "Hacked by 'Pakistan cyber army', CBI website still not restored". NDTV.com. Retrieved 28 May 2016.
  83. ^ "'Indian websites are more vulnerable to cyber attacks from Pakistan-based hackers on major events' | Latest Tech News, Video & Photo Reviews at BGR India". www.bgr.in. 12 February 2016. Retrieved 28 May 2016.
  84. ^ "British 15-year-old gained access to intelligence operations in Afghanistan and Iran by pretending to be head of CIA, court hears". The Daily Telegraph. 19 January 2018.
  85. ^ "British teenager who 'cyber-terrorised' US intelligence officials gets two years detention". The Independent. 21 April 2018.
  86. ^ "British teen Kane Gamble accessed accounts of top US intelligence and security officials". Deutsche Welle. 21 January 2018.
  87. ^ UK teen Kane Gamble gets two years for hacking CIA ex-chief John Brennan". Deutsche Welle. 20 April 2018.
  88. ^ "Report: Russian hackers exploit Lithuanian infrastructure". AP NEWS. 20 April 2021. Retrieved 26 October 2021.
  89. ^ Sanger, David E.; Perlroth, Nicole (14 May 2021). "Pipeline Attack Yields Urgent Lessons About U.S. Cybersecurity". The New York Times. ISSN 0362-4331. Retrieved 30 November 2021.
  90. ^ Perlroth, Nicole (13 May 2021). "Colonial Pipeline paid 75 Bitcoin, or roughly $5 million, to hackers". The New York Times. ISSN 0362-4331. Retrieved 30 November 2021.
  91. ^ Schwirtz, Michael; Perlroth, Nicole (14 May 2021). "DarkSide, Blamed for Gas Pipeline Attack, Says It Is Shutting Down". The New York Times. ISSN 0362-4331. Retrieved 30 November 2021.
  92. ^ Creswell, Julie; Perlroth, Nicole; Scheiber, Noam (1 June 2021). "Ransomware Disrupts Meat Plants in Latest Attack on Critical U.S. Business". The New York Times. ISSN 0362-4331. Retrieved 30 November 2021.
  93. ^ Robbins, Rebecca (10 June 2021). "Meat processor JBS paid $11 million in ransom to hackers". The New York Times. ISSN 0362-4331. Retrieved 30 November 2021.
  94. ^ Perlroth, Nicole; Scheiber, Noam; Creswell, Julie (2 June 2021). "Russian Cybercriminal Group Was Behind Meat Plant Attack, F.B.I. Says". The New York Times. ISSN 0362-4331. Retrieved 30 November 2021.
  95. ^ Agapiou, Gina. "Limassol building evacuated after bomb threat | Cyprus Mail". cyprus-mail.com/. Retrieved 21 August 2021.
  96. ^ "Building in Limassol evacuated after warning about bomb". Building in Limassol evacuated after warning about bomb. Retrieved 21 August 2021.
  97. ^ "The building with a planted bomb in Tel Aviv". Jewish Review. 18 July 2021.
  98. ^ "После угрозы взрыва большого здания в Вильнюсе введен план "Щит"". DELFI.
  99. ^ "Israel has become a target of Internet terrorists again". The Journal of International Security Affairs. 3 August 2021. Retrieved 21 August 2021.
  100. ^ Bing, Christopher; Menn, Joseph (4 December 2021). "U.S. State Department phones hacked with Israeli company spyware - sources". Reuters. Retrieved 5 December 2021.
  101. ^ Sean Lyngaas. "Suspected Chinese hackers breach more US defense and tech firms". CNN. Retrieved 5 December 2021.
  102. ^ "Anonymous hacks Russian federal agency, releases 360,000 documents". The Jerusalem Post | JPost.com. Retrieved 6 April 2022.
  103. ^ "Malicious Control System Cyber Security Attack Case Study–Maroochy Water Services, Australia" (PDF). csrc.nist.gov. 30 November 2016.
  104. ^ "Hacker jailed for reverse sewage". The Register. 31 October 2001.
  105. ^ "Estonia fines man for 'cyber war'". BBC. 25 January 2008. Retrieved 23 February 2008.
  106. ^ Leyden, John (24 January 2008). "Estonia fines man for DDoS attacks". The Register. Retrieved 22 February 2008.
  107. ^ "S.Ossetian News Sites Hacked". Civil Georgia. Tbilisi. 5 August 2008. Retrieved 26 January 2009.
  108. ^ Wentworth, Travis (12 August 2008). "You've Got Malice: Russian nationalists waged a cyber war against Georgia. Fighting back is virtually impossible". Newsweek. Retrieved 26 January 2009.
  109. ^ Markoff, John (13 August 2008). "Before the Gunfire, Cyberattacks". The New York Times. Retrieved 26 January 2009.
  110. ^ Today.az (11 August 2008). Russian intelligence services undertook large scale attack against Day.Az server
  111. ^ "US and Russia clash over power grid 'hack attacks". BBC News. 18 June 2019.
  112. ^ "How Not To Prevent a Cyberwar With Russia". Wired. 18 June 2019.
  113. ^ "Russian Nationalists Claim Responsibility For Attack On Yushchenko's Web Site". news.kievukraine.info.
  114. ^ . International Herald Tribune. 30 October 2007. Archived from the original on 19 February 2008.
  115. ^ "Hackers attack U.S. government Web sites in protest of Chinese embassy bombing". CNN. Retrieved 30 April 2010. (See also Chinese embassy bombing)
  116. ^ "Twitter warns of 'unusual activity' from China and Saudi Arabia". BBC News. 17 December 2018. Retrieved 17 December 2018.
  117. ^ "An issue related to one of our support forms". Twitter. Retrieved 17 December 2018.
  118. ^ "DDoS attack knocks Belgian government websites offline". WeLiveSecurity. 5 May 2021. Retrieved 26 October 2021.

Further reading Edit

  • Alexander, Yonah; Swetman, Michael S. (2001). Cyber Terrorism and Information Warfare: Threats and Responses. Transnational Publishers Inc., U.S. ISBN 978-1-57105-225-4.
  • Bibi van Ginkel,
  • Colarik, Andrew M. (2006). Cyber Terrorism: Political and Economic Implications. Idea Group, U.S. ISBN 978-1-59904-022-6.
  • Hansen, James V.; Benjamin Lowry, Paul; Meservy, Rayman; McDonald, Dan (2007). "Genetic programming for prevention of cyberterrorism through dynamic and evolving intrusion detection". Decision Support Systems. 43 (4): 1362–1374. doi:10.1016/j.dss.2006.04.004. SSRN 877981.
  • Verton, Dan (2003). Black Ice: The Invisible Threat of Cyber-terrorism. Osborne/McGraw-Hill, U.S. ISBN 978-0-07-222787-1.
  • Weimann, Gabriel (2006). Terror on the Internet: The New Arena, the New Challenges. United States Institute of Peace, U.S. ISBN 978-1-929223-71-8.
  • Blau, John (November 2004). "The battle against cyberterror". NetworkWorld. Retrieved 20 March 2005.
  • Gross, Grant (November 2003). "Cyberterrorist attack would be more sophisticated that past worms, expert says". ComputerWorld. Retrieved 17 March 2005.
  • Poulsen, Kevin (August 2004). "South Pole 'cyberterrorist' hack wasn't the first". SecurityFocus News. Retrieved 17 March 2005.
  • Thevenet, Cédric (November 2005). "Cyberterrorisme, mythe ou réalité?" (PDF) (in French). terrorisme.net.
  • U.S. Army Cyber Operations and Cyber Terrorism Handbook 1.02
  • Rayamajhi, Shreedeep (2009). "Research Paper -A Synopsis on Cyber Terrorism and Warfare".
  • Jacqueline Ching (2010). Cyberterrorism. Rosen Pub Group. ISBN 978-1-4358-8532-5.
  • Rolón, Darío N., (2013) Control, vigilancia y respuesta penal en el ciberespacio, Latinamerican's new security thinking, Clacso.
  • Costigan, Sean (2012). . Ashgate. ISBN 978-1-4094-2754-4. Archived from the original on 2 April 2015. Retrieved 12 March 2015.
  • Record, Jeffery: Bounding the Global War on Terrorism, Strategic Studies Institute, US Army War College, Leavenworth, 2003
  • Schmid, Alex and Jongmans, Albert et al.: Political Terrorism: A new guide to Action, Authors, Concepts, Data Bases, Theories and Literature, Transaction Books, New Brunswick, 1988
  • COE DAT Cyber Terrorism Couse IV 9 Mar
  • Hennessy, Joh L and others: Information Technology for Counterterrorism, National Academies Press,

Washington DC, 2003

  • Hoffman, Bruce: Inside Terrorism, Columbia University Press, New York, 2006
  • Laqueur, Walter: The New Terrorism: Fanaticism and the Arms of Mass Destruction, Oxford University

Press, New York, 1999

  • Sageman, Marc: Understanding Terror Networks, Penn, Philadelphia, 2004
  • Wilkinson, Paul: Terrorism Versus Democracy, Routledge, London, 2006

External links Edit

General Edit

  • CRS Report for Congress – Computer Attack and Cyber Terrorism – 17/10/03
  • How terrorists use the Internet ABC Australia interview with Professor Hsinchun Chen
  • Department of Defense Cyber Crime Center
  • Global response to cyberterrorism and cybercrime: A matrix for international cooperation and vulnerability assessment

News Edit

  • FBI, 20 October 2014
  • BBC News – US warns of al-Qaeda cyber threat – 01/12/06
  • BBC News – Cyber terrorism 'overhyped' – 14/03/03
  • Calls for anti-cyber terrorism bill resurface in South Korea – NK News

cyberterrorism, internet, conduct, violent, acts, that, result, threaten, loss, life, significant, bodily, harm, order, achieve, political, ideological, gains, through, threat, intimidation, acts, deliberate, large, scale, disruption, computer, networks, espec. Cyberterrorism is the use of the Internet to conduct violent acts that result in or threaten the loss of life or significant bodily harm in order to achieve political or ideological gains through threat or intimidation Acts of deliberate large scale disruption of computer networks especially of personal computers attached to the Internet by means of tools such as computer viruses computer worms phishing malicious software hardware methods programming scripts can all be forms of internet terrorism 1 Cyberterrorism is a controversial term citation needed Some authors opt for a very narrow definition relating to deployment by known terrorist organizations of disruption attacks against information systems for the primary purpose of creating alarm panic or physical disruption Other authors prefer a broader definition which includes cybercrime Participating in a cyberattack affects the terror threat perception even if it isn t done with a violent approach 2 By some definitions it might be difficult to distinguish which instances of online activities are cyberterrorism or cybercrime 3 Cyberterrorism can be also defined as the intentional use of computers networks and public internet to cause destruction and harm for personal objectives Experienced cyberterrorists who are very skilled in terms of hacking can cause massive damage to government systems and might leave a country in fear of further attacks 4 The objectives of such terrorists may be political or ideological since this can be considered a form of terror 5 There is much concern from government and media sources about potential damage that could be caused by cyberterrorism and this has prompted efforts by government agencies such as the Federal Bureau of Investigation FBI and the Central Intelligence Agency CIA to put an end to cyber attacks and cyberterrorism 4 There have been several major and minor instances of cyberterrorism Al Qaeda utilized the internet to communicate with supporters and even to recruit new members 6 Estonia a Baltic country which is constantly evolving in terms of technology became a battleground for cyberterrorism in April 2007 after disputes regarding the relocation of a WWII soviet statue located in Estonia s capital Tallinn 3 Contents 1 Overview 1 1 Defining cyberterrorism 1 2 Types of cyberterror capability 1 3 Concerns 1 4 History 1 5 Current threats 1 6 Future threats 2 International attacks and response 2 1 Conventions 2 2 Motivations for cyberattacks 2 3 International Institutions 2 4 Estonia and NATO 2 5 China 2 6 India 2 7 Korea 2 8 Pakistan 2 9 Ukraine 2 10 USA 3 Examples 3 1 Sabotage 3 2 Website defacement and denial of service 4 In fiction 5 See also 6 References 7 Further reading 8 External links 8 1 General 8 2 NewsOverview EditMain article Definitions of terrorism There is debate over the basic definition of the scope of cyberterrorism These definitions can be narrow such as the use of Internet to attack other systems in the Internet that result to violence against persons or property 7 They can also be broad those that include any form of Internet usage by terrorists to conventional attacks on information technology infrastructures 7 There is variation in qualification by motivation targets methods and centrality of computer use in the act U S government agencies also use varying definitions and that none of these have so far attempted to introduce a standard that is binding outside of their sphere of influence 8 Depending on context cyberterrorism may overlap considerably with cybercrime cyberwar or ordinary terrorism 9 Eugene Kaspersky founder of Kaspersky Lab now feels that cyberterrorism is a more accurate term than cyberwar He states that with today s attacks you are clueless about who did it or when they will strike again It s not cyber war but cyberterrorism 10 He also equates large scale cyber weapons such as the Flame Virus and NetTraveler Virus which his company discovered to biological weapons claiming that in an interconnected world they have the potential to be equally destructive 10 11 If cyberterrorism is treated similarly to traditional terrorism then it only includes attacks that threaten property or lives and can be defined as the leveraging of a target s computers and information particularly via the Internet to cause physical real world harm or severe disruption of infrastructure Many academics and researchers who specialize in terrorism studies suggest that cyberterrorism does not exist and is really a matter of hacking or information warfare 12 They disagree with labeling it as terrorism because of the unlikelihood of the creation of fear significant physical harm or death in a population using electronic means considering current attack and protective technologies If death or physical damage that could cause human harm is considered a necessary part of the cyberterrorism definition then there have been few identifiable incidents of cyberterrorism although there has been much policy research and public concern Modern terrorism and political violence is not easily defined however and some scholars assert that it is now unbounded and not exclusively concerned with physical damage 13 There is an old saying that death or loss of property are the side products of terrorism the main purpose of such incidents is to create terror in peoples minds and harm bystanders If any incident in cyberspace can create terror it may be rightly called cyberterrorism For those affected by such acts the fears of cyberterrorism are quite real 14 As with cybercrime in general the threshold of required knowledge and skills to perpetrate acts of cyberterrorism has been steadily diminishing thanks to freely available hacking suites and online courses 15 Additionally the physical and virtual worlds are merging at an accelerated rate making for many more targets of opportunity which is evidenced by such notable cyber attacks as Stuxnet the Saudi petrochemical sabotage attempt in 2018 and others 16 Defining cyberterrorism Edit Assigning a concrete definition to cyberterrorism can be hard due to the difficulty of defining the term terrorism itself Multiple organizations have created their own definitions most of which are overly quantify broad There is also controversy concerning overuse of the term hyperbole in the media and by security vendors trying to sell solutions 17 One way of understanding cyberterrorism involves the idea that terrorists could cause massive loss of life worldwide economic chaos and environmental damage by hacking into critical infrastructure systems 18 The nature of cyberterrorism covers conduct involving computer or Internet technology that 19 is motivated by a political religious or ideological cause is intended to intimidate a government or a section of the public to varying degrees seriously interferes with infrastructureThe term cyberterrorism can be used in a variety of different ways but there are limits to its use An attack on an Internet business can be labeled by whom cyberterrorism however when it is done for economic motivations rather than ideological it is typically regarded as cybercrime 19 Convention also limits the label cyberterrorism to actions by individuals independent groups or organizations Any form of cyberwarfare conducted by governments and states would be regulated and punishable under international law 19 The Technolytics Institute defines cyberterrorism as t he premeditated use of disruptive activities or the threat thereof against computers and or networks with the intention to cause harm or further social ideological religious political or similar objectives Or to intimidate any person in furtherance of such objectives 20 The term appears first in defense literature surfacing as cyber terrorism in reports by the U S Army War College as early as 1998 21 The National Conference of State Legislatures an organization of legislators created to help policymakers in the United States with issues such as economy and homeland security defines cyberterrorism as T he use of information technology by terrorist groups and individuals to further their agenda This can include use of information technology to organize and execute attacks against networks computer systems and telecommunications infrastructures or for exchanging information or making threats electronically Examples are hacking into computer systems introducing viruses to vulnerable networks web site defacing Denial of service attacks or terroristic threats made via electronic communication 22 NATO defines cyberterrorism as a cyberattack using or exploiting computer or communication networks to cause sufficient destruction or disruption to generate fear or to intimidate a society into an ideological goal 23 The United States National Infrastructure Protection Center defined cyberterrorism as A criminal act perpetrated by the use of computers and telecommunications capabilities resulting in violence destruction and or disruption of services to create fear by causing confusion and uncertainty within a given population with the goal of influencing a government or population to conform to a political social or ideological agenda 24 The FBI another United States agency defines cyber terrorism as premeditated politically motivated attack against information computer systems computer programs and data which results in violence against non combatant targets by subnational groups or clandestine agents 25 These definitions tend to share the view of cyberterrorism as politically and or ideologically inclined One area of debate is the difference between cyberterrorism and hacktivism Hacktivism is the marriage of hacking with political activism 26 Both actions are politically driven and involve using computers however cyberterrorism is primarily used to cause harm It becomes an issue because acts of violence on the computer can be labeled by whom either citation needed cyberterrorism or hacktivism Types of cyberterror capability Edit In 1999 the Center for the Study of Terrorism and Irregular Warfare at the Naval Postgraduate School in Monterey California defined three levels of cyberterror capability 27 Simple Unstructured the capability to conduct basic hacks against individual systems using tools created by someone else The organization possesses little target analysis command and control or learning capability Advanced Structured the capability to conduct more sophisticated attacks against multiple systems or networks and possibly to modify or create basic hacking tools The organization possesses an elementary target analysis command and control and learning capability Complex Coordinated the capability for a coordinated attack capable of causing mass disruption against integrated heterogeneous defenses including cryptography Ability to create sophisticated hacking tools Highly capable target analysis command and control and organization learning capability Concerns Edit Cyberterrorism is becoming more and more prominent on social media today 28 need quotation to verify As the Internet becomes more pervasive individuals or groups can use the anonymity afforded by cyberspace to threaten other individuals specific groups with membership based for example on ethnicity or belief communities and entire countries without the inherent threat of identification capture injury or death of the attacker that being physically present would bring Many quantify groups such as Anonymous use tools such as denial of service attacks to attack and censor groups which oppose them creating many concerns for freedom and respect for differences of thought Many believe that cyberterrorism is an extreme threat to countries economies citation needed and fear an attack could potentially lead to another Great Depression citation needed Several leaders agree that cyberterrorism has the highest percentage of threat over other possible attacks on U S territory Although natural disasters are considered by whom a top threat and have proven to be devastating to people and land there is ultimately little that can be done to prevent such events from happening Thus the expectation is to focus more on preventative measures that will make Internet attacks impossible for execution citation needed As the Internet continues to expand and computer systems continue to be assigned increased responsibility while becoming more complex and interdependent sabotage or terrorism via the Internet may become a more serious threat and is possibly one of the top 10 events to end the human race 29 better source needed People have much easier access to illegal involvement within cyberspace by the ability to access a part of the internet known as the Dark Web 30 registration required The Internet of Things promises to further merge the virtual and physical worlds which some quantify experts which see as a powerful incentive for states to use terrorist proxies in furtherance of objectives 31 Dependence on the Internet is rapidly increasing on a worldwide scale creating a platform for international cyber terror plots to be formulated and executed as a direct threat to national security 19 need quotation to verify For terrorists cyber based attacks have distinct advantages over physical attacks They can be conducted remotely anonymously and relatively cheaply and they do not require significant investment in weapons explosives or personnel 32 The effects can be widespread and profound Incidents of cyberterrorism are likely to increase They can be expected to take place through denial of service attacks malware and other methods that are difficult to envision today 33 need quotation to verify One example involves the deaths involving the Islamic State and the online social networks Twitter Google and Facebook leading to legal action being taken against them that ultimately resulted in them being sued 34 need quotation to verify In an article about cyber attacks by Iran and North Korea The New York Times observes The appeal of digital weapons is similar to that of nuclear capability it is a way for an outgunned outfinanced nation to even the playing field These countries are pursuing cyberweapons the same way they are pursuing nuclear weapons said James A Lewis a computer security expert at the Center for Strategic and International Studies in Washington It s primitive it s not top of the line but it s good enough and they are committed to getting it 35 In addition Cyberterrorism has also been documented to arouse negative emotions Recent studies have suggested that Cyberterrorism produces heightened levels of anger and stress which do not differ drastically from the effects of conventional terrorism 36 Researchers also noted that Cyberterrorism produced higher levels of stress than anger and the responses are not dependent on the lethality of the attack 36 History Edit Public interest in cyberterrorism began in the late 1990s when the term was coined by Barry C Collin 37 As 2000 approached the fear and uncertainty about the millennium bug heightened as did the potential for attacks by cyber terrorists Although the millennium bug was by no means a terrorist attack or plot against the world or the United States it did act as a catalyst in sparking the fears of a possibly large scale devastating cyber attack Commentators noted that many of the facts of such incidents seemed to change often with exaggerated media reports The high profile terrorist attacks in the United States on 11 September 2001 and the ensuing War on Terror by the US led to further media coverage of the potential threats of cyberterrorism in the years following Mainstream media coverage often discusses the possibility of a large attack making use of computer networks to sabotage critical infrastructures with the aim of putting human lives in jeopardy or causing disruption on a national scale either directly or by disruption of the national economy 38 Authors such as Winn Schwartau and John Arquilla are reported to have had considerable financial success selling books which described what were purported to be plausible scenarios of mayhem caused by cyberterrorism Many critics claim that these books were unrealistic in their assessments of whether the attacks described such as nuclear meltdowns and chemical plant explosions were possible A common thread throughout what critics perceive as cyberterror hype is that of non falsifiability that is when the predicted disasters fail to occur it only goes to show how lucky we ve been so far rather than impugning the theory In 2016 for the first time ever the Department of Justice charged Ardit Ferizi with cyberterrorism He is accused of allegedly hacking into a military website and stealing the names addresses and other personal information of government and military personnel and selling it to ISIS 39 On the other hand it is also argued that despite substantial studies on cyberterrorism the body of literature is still unable to present a realistic estimate of the actual threat 40 For instance in the case of a cyberterrorist attack on a public infrastructure such as a power plant or air traffic control through hacking there is uncertainty as to its success because data concerning such phenomena are limited 40 Current threats Edit Cyberterrorism ranks among the highest potential security threats in the world It has become more critical than the development of nuclear weapons or the current conflicts between nations Due to the pervasiveness of the internet and the amount of responsibility assigned to this technology digital weapons pose a threat to entire economic or social systems Some of the most critical international security concerns include DDoS Attacks Millions of Denial of Service attacks occur every year and the service disruption can cost hundreds of thousands of dollars each hour they are down It is important to keep critical systems secured and redundant to remain online during these attacks Social Engineering In 1997 an experiment conducted by the NSA concluded that thirty five hackers were able to access critical pentagon computer systems and could easily edit accounts reformat data and even shut down entire systems Often they used phishing tactics such as calling offices and pretending to be technicians to gain passwords Third Party Software The top retailers are connected with thousands of separate third party recourses and at least 23 of those assets have at least one critical vulnerability These companies need to manage and reevaluate their network security in order to keep personal data safe Future threats Edit As technology becomes more and more integrated into society new vulnerabilities and security threats are opened up on these complex networks that we have set up If an intruder was to gain access to these networks they have the potential to threaten entire communities or economic systems There is no certainty for what events will take place in the future which is why it is important that there are systems build to adapt to the changing environment The most apparent cyberterrorism threat in our near future will involve the state of remote work during the COVID 19 pandemic Companies cannot expect that every home office is up to date and secure so they must adopt a zero trust policy from home devices This means that they must assume corporate resources and unsecured devices are sharing the same space and they must act accordingly The rise of cryptocurrency has also sparked some additional threats in the realm of security Cyber Criminals are now hijacking home computers and company networks in order to mine certain cryptocurrencies such as bitcoin This mining process requires an immense amount of computer processing power which can cripple a business network and lead to severe downtime if the issue is not resolved International attacks and response EditConventions Edit As of 2016 there have been eighteen conventions and major legal instruments that specifically deal with terrorist activities and cyber terrorism 1963 Convention on Offences and Certain Other Acts Committed on Board Aircraft 1970 Convention for the Suppression of Unlawful Seizure of Aircraft 1971 Convention for the Suppression of Unlawful Acts Against the Safety of Civil Aviation 1973 Convention on the Prevention and Punishment of Crimes against Internationally Protected Persons 1979 International Convention against the Taking of Hostages 1980 Convention on the Physical Protection of Nuclear Material 1988 Protocol for the Suppression of Unlawful Acts of Violence at Airports Serving International Civil Aviation 1988 Protocol for the Suppression of Unlawful Acts against the Safety of Fixed Platforms Located on the Continental Shelf 1988 Convention for the Suppression of Unlawful Acts against the Safety of Maritime Navigation 1989 Supplementary to the Convention for the Suppression of Unlawful Acts against the Safety of Civil Aviation 1991 Convention on the Marking of Plastic Explosives for the Purpose of Detection 1997 International Convention for the Suppression of Terrorist Bombings 1999 International Convention for the Suppression of the Financing of Terrorism 2005 Protocol to the Convention for the Suppression of Unlawful Acts against the Safety of Maritime Navigation 2005 International Convention for the Suppression of Acts of Nuclear Terrorism 2010 Protocol Supplementary to the Convention for the Suppression of Unlawful Seizure of Aircraft 2010 Convention on the Suppression of Unlawful Acts Relating to International Civil Aviation 2014 Protocol to Amend the Convention on Offences and Certain Acts Committed on Board Aircraft 41 Motivations for cyberattacks Edit There are many different motives for cyberattacks with the majority being for financial reasons However there is increasing evidence that hackers are becoming more politically motivated Cyberterrorists are aware that governments are reliant on the internet and have exploited this as a result For example Mohammad Bin Ahmad As Salim s piece 39 Ways to Serve and Participate in Jihad discusses how an electronic jihad could disrupt the West through targeted hacks of American websites and other resources seen as anti Jihad modernist or secular in orientation Denning 2010 Leyden 2007 42 Many of the cyberattacks are not conducted for money rather the cyberattacks are conducted due to different ideological beliefs and due to wanting to get personal revenge and outrage towards company or individual the cybercriminal is attacking 43 An employee might want to get revenge on a company if they were mistreated or wrongfully terminated citation needed Other motivations for cybercriminals include Political goals Competition between companies Cyberwarfare between two countries MoneyPolitical goals motivate cyber attackers because they are not happy with candidates and they might want certain candidates to win the election therefore they might alter the election voting to help their preferred candidate win Competition between two companies can also stir up a cyberattack as one company can hire a hacker to conduct the attack on a company as they might want to test the rival company s security This will also benefit a company because it will force their competitor s customers to think that the company is not secure due to them getting cyber attacked effortlessly and they don t want any of their personal credentials getting leaked Cyberwarfare is motivation for countries that are fighting each other This is mainly used to weaken the opposing country by compromising its core systems and the countries data and other vulnerable information Money is motivating for cyber attacks for ransomware phishing and data theft as the cyber criminals can differently contact the victims and ask for money and in return the data stays safe 44 International Institutions Edit The United Nations has several agencies that seek to address in cyberterrorism including the United Nations Office of Counter Terrorism the United Nations Office on Drugs and Crime the United Nations Office for Disarmament Affairs the United Nations Institute for Disarmament Research the United Nations Interregional Crime and Justice Research Institute and the International Telecommunication Union Both EUROPOL and INTERPOL also notably specialize on the subject Both Europol and Interpol specialize in operations against cyberterrorism as they both collaborate on different operations together and host a yearly joint cybercrime conference While they both fight against cybercrime both institutions operate differently Europol sets up and coordinates cross border operations against cybercriminals in the EU while Interpol helps law enforcement and coordinates operations against cyber criminals globally 45 Estonia and NATO Edit Main article 2007 cyberattacks on Estonia The Baltic state of Estonia was the target of a massive denial of service attack that ultimately rendered the country offline and shut out from services dependent on Internet connectivity in April 2007 The infrastructure of Estonia including everything from online banking and mobile phone networks to government services and access to health care information was disabled for a time The tech dependent state experienced severe turmoil and there was a great deal of concern over the nature and intent of the attack The cyber attack was a result of an Estonian Russian dispute over the removal of a bronze statue depicting a World War II era Soviet soldier from the center of the capital Tallinn 3 In the midst of the armed conflict with Russia Georgia likewise was subject to sustained and coordinated attacks on its electronic infrastructure in August 2008 In both of these cases circumstantial evidence point to coordinated Russian attacks but attribution of the attacks is difficult though both the countries blame Moscow for contributing to the cyber attacks proof establishing legal culpability is lacking Estonia joined NATO in 2004 which prompted NATO to carefully monitor its member states response to the attack NATO also feared escalation and the possibility of cascading effects beyond Estonia s border to other NATO members In 2008 directly as a result of the attacks NATO opened a new center of excellence on cyberdefense to conduct research and training on cyber warfare in Tallinn 46 The chaos resulting from the attacks in Estonia illustrated to the world the dependence countries had on information technology This dependence then makes countries vulnerable to future cyber attacks and terrorism 3 Quick information on the cyber attack on Estonia and its effects on the country 47 Online services of Estoninan banks and government services were taken down by uncontrollable high level of internet traffic Media outlets were also down and so broadcasters could not deliver the news of the cyber attacks Some of the services were under attack for 22 days while other online services were taken down completely Riots and Looting went on for 48 hours in Tallinn Estonia The cyber attack served as a wake up call to Estonia and for the entire world on the importance of cyber defence As cyberattacks continue to increase around the world countries still look at the attacks on Estonia in the 2007 as an example of how countries can fight future cyberattacks and terrorism As a result of the attacks Estonia is now currently one of the top countries in cyber defence and online safety and its capital city of Tallinn is home to NATO s cyber defense hub The government of Estonia continues to update there cyber defence protocols and national cybersecurity strategies NATO s Coopeative Cyber Defence Centre in Tallinn also conducts research and training on cyber security to not just help Estonia but other countries that are in the alliance 48 China Edit The Chinese Defense Ministry confirmed the existence of an online defense unit in May 2011 Composed of about thirty elite internet specialists the so called Cyber Blue Team or Blue Army is officially claimed to be engaged in cyber defense operations though there are fears the unit has been used to penetrate secure online systems of foreign governments 49 50 China s leaders have invested in its foundations of cyber defense and quantum computing and artificial intelligence 39 Chinese soldiers were chosen to strengthen China s cyber defenses The reason given by Spokesman for the Ministry of National Defense Geng Yansheng was that their internet protection was currently weak Geng claimed that the program was only temporary to help improve cyber defenses 51 India Edit To counter the cyber terrorists also called white collar jihadis the police in India has registered private citizens as volunteers who patrol the internet and report the suspected cyber terrorists to the government These volunteers are categorised in three categories namely Unlawful Content Flaggers Cyber Awareness Promoters and Cyber Experts In August 2021 police arrested five suspected white collar jihadis who were preparing a hit list of officers journalists social activists lawyers and political functionaries to create fear among people The white collar jihadis are considered worst kind of terrorists as they remain anonymous and safe in other nations but inflict immeasurable amount of damage and brainwashing 52 In India the demand for cyber security professionals has increased over 100 per cent in 2021 and will rise 200 per cent by 2024 53 Eighty two percent of companies in India had a ransomware attack in the year 2020 The cost it takes to recover from a ransomware attack in India has gone from 1 1 million in 2020 to 3 38 million in 2021 54 India is at the top of the list of 30 countries for ransomware attacks A cyber attack took place on the electricity grid in Maharashtra that resulted in a power outage This occurred in October 2020 and the authorities believe China was behind it 55 Important information like dates of birth and full names were leaked for thousands of patients who were tested for COVID 19 This information was made accessible on Google and was leaked from government websites The job portal IIMjobs was attacked and the information of 1 4 million people looking for jobs was leaked The information leaked was quite extensive including the location of users and their names and phone numbers The information for 500 000 Indian police personal was sold on a forum in February 2021 The information contained much personal information The data was from a police exam taken in December 2019 56 Korea Edit According to 2016 Deloitte Asia Pacific Defense Outlook 57 South Korea s Cyber Risk Score was 884 out of 1 000 and South Korea is found to be the most vulnerable country to cyber attacks in the Asia Pacific region Considering South Korea s high speed internet and cutting edge technology its cyber security infrastructure is relatively weak 58 The 2013 South Korea cyberattack significantly damaged the Korean economy This attack wounded the systems of two banks and the computer networks of three TV broadcasters The incident was a massive blow and the attacker was never identified It was theorized to be North Korea The week before North Korea accused the United States and South Korea of shutting down their internet for two days 59 In 2017 a ransomware attack harassed private companies and users who experienced personal information leakage Additionally there were North Korea s cyber attacks which risked national security of South Korea 60 In response to this South Korean government s countermeasure is to protect the information security centres the National Intelligence Agency Currently cyber security is one of the major goals of NIS Korea 61 Since 2013 South Korea had established policies related to National cyber security and trying to prevent cyber crises via sophisticated investigation on potential threats Meanwhile scholars emphasize on improving the national consciousness towards cyber attacks as South Korea had already entered the so called hyper connected society North Korea s cyberwarfare is incredibly efficient and the best of state sponsored hackers Those who are chosen to be hackers are selected when they are young and trained specifically in cyberwarfare Hackers are trained to steal money from ATMs but not enough to be reported North Korea is great at zero day exploits The country will hack anyone they chose to They steal secrets from companies and government agencies and steal money from financial systems to fund their hacking operations 62 Pakistan Edit Pakistani Government has also taken steps to curb the menace of cyberterrorism and extremist propaganda National Counter Terrorism Authority Nacta is working on joint programs with different NGOs and other cyber security organizations in Pakistan to combat this problem Surf Safe Pakistan 63 is one such example Now people in Pakistan can report extremist and terrorist related content online on Surf Safe Pakistan portal The National Counter Terrorism Authority NACTA provides the Federal Government s leadership for the Surf Safe Campaign Ukraine Edit A series of powerful cyber attacks began 27 June 2017 that swamped websites of Ukrainian organizations including banks ministries newspapers and electricity firms USA Edit The US Department of Defense DoD charged the United States Strategic Command with the duty of combating cyberterrorism This is accomplished through the Joint Task Force Global Network Operations which is the operational component supporting USSTRATCOM in defense of the DoD s Global Information Grid This is done by integrating GNO capabilities into the operations of all DoD computers networks and systems used by DoD combatant commands services and agencies On 2 November 2006 the Secretary of the Air Force announced the creation of the Air Force s newest MAJCOM the Air Force Cyber Command which would be tasked to monitor and defend American interest in cyberspace The plan was however replaced by the creation of Twenty Fourth Air Force which became active in August 2009 and would be a component of the planned United States Cyber Command 64 On 22 December 2009 the White House named its head of computer security as Howard Schmidt to coordinate U S Government military and intelligence efforts to repel hackers He left the position in May 2012 65 Michael Daniel was appointed to the position of White House Coordinator of Cyber Security the same week 66 and continues in the position during the second term of the Obama administration 67 Obama signed an executive order to enable the US to impose sanctions on either individuals or entities that are suspected to be participating in cyber related acts These acts were assessed to be possible threats to US national security financial issues or foreign policy issues 68 U S authorities indicted a man over 92 cyberterrorism hacks attacks on computers used by the Department of Defense 69 A Nebraska based consortium apprehended four million hacking attempts in the course of eight weeks 70 In 2011 cyberterrorism attacks grew 20 71 In May 2021 President Joe Biden announced an executive order aiming to improve America s cybersecurity It came about after an increase in cybersecurity attacks aimed at the country s public and private sector The plan aims to improve the government s cyberdefense by working on its ability to identify deter protect against detect and respond to attacks The plan has 10 sections written into the document that include to name a few improving sharing of threat information modernizing the government s cybersecurity and establishing a Cybersecurity Review Board 72 Examples EditAn operation can be done by anyone anywhere in the world for it can be performed thousands of miles away from a target An attack can cause serious damage to a critical infrastructure which may result in casualties 73 Some attacks are conducted in furtherance of political and social objectives as the following examples illustrate In 1996 a computer hacker allegedly associated with the White Supremacist movement temporarily disabled a Massachusetts ISP and damaged part of the ISP s record keeping system The ISP had attempted to stop the hacker from sending out worldwide racist messages under the ISP s name The hacker signed off with the threat you have yet to see true electronic terrorism This is a promise In 1998 Spanish protesters bombarded the Institute for Global Communications IGC with thousands of bogus e mail messages E mail was tied up and undeliverable to the ISP s users and support lines were tied up with people who couldn t get their mail The protestors also spammed IGC staff and member accounts clogged their Web page with bogus credit card orders and threatened to employ the same tactics against organizations using IGC services They demanded that IGC stop hosting the Web site for the Euskal Herria Journal a New York based publication supporting Basque independence Protestors said IGC supported terrorism because a section on the Web pages contained materials on the terrorist group ETA which claimed responsibility for assassinations of Spanish political and security officials and attacks on military installations IGC finally relented and pulled the site because of the mail bombings In 1998 ethnic Tamil guerrillas attempted to disrupt Sri Lankan embassies by sending large volumes of e mail The embassies received 800 e mails a day over a two week period The messages read We are the Internet Black Tigers and we re doing this to disrupt your communications Intelligence authorities characterized it as the first known attack by terrorists against a country s computer systems 74 During the Kosovo conflict in 1999 NATO computers were blasted with e mail bombs and hit with denial of service attacks by hacktivists protesting the NATO bombings In addition businesses public organizations and academic institutes received highly politicized virus laden e mails from a range of Eastern European countries according to reports Web defacements were also common After the Chinese Embassy was accidentally bombed in Belgrade citation needed Chinese hacktivists posted messages such as We won t stop attacking until the war stops on U S government Web sites Since December 1997 the Electronic Disturbance Theater EDT has been conducting Web sit ins against various sites in support of the Mexican Zapatistas At a designated time thousands of protestors point their browsers to a target site using software that floods the target with rapid and repeated download requests EDT s software has also been used by animal rights groups against organizations said to abuse animals Electrohippies another group of hacktivists conducted Web sit ins against the WTO when they met in Seattle in late 1999 These sit ins all require mass participation to have much effect and thus are more suited to use by activists than by terrorists 27 In 2000 a Japanese investigation revealed that the government was using software developed by computer companies affiliated with Aum Shinrikyo the doomsday sect responsible for the sarin gas attack on the Tokyo subway system in 1995 The government found 100 types of software programs used by at least 10 Japanese government agencies including the Defense Ministry and more than 80 major Japanese companies including Nippon Telegraph and Telephone 75 Following the discovery the Japanese government suspended use of Aum developed programs out of concern that Aum related companies may have compromised security by breaching firewalls gaining access to sensitive systems or information allowing invasion by outsiders planting viruses that could be set off later or planting malicious code that could cripple computer systems and key data system 76 In March 2013 The New York Times reported on a pattern of cyber attacks against U S financial institutions believed to be instigated by Iran as well as incidents affecting South Korean financial institutions that originate with the North Korean government 35 In August 2013 media companies including The New York Times Twitter and the Huffington Post lost control of some of their websites after hackers supporting the Syrian government breached the Australian Internet company that manages many major site addresses The Syrian Electronic Army a hacker group that has previously attacked media organisations that it considers hostile to the regime of Syrian president Bashar al Assad claimed credit for the Twitter and Huffington Post hacks in a series of Twitter messages Electronic records showed that NYTimes com the only site with an hours long outage redirected visitors to a server controlled by the Syrian group before it went dark 77 Pakistani Cyber Army is the name taken by a group of hackers who are known for their defacement of websites particularly Indian Chinese and Israeli companies and governmental organizations claiming to represent Pakistani nationalist and Islamic interests 78 The group is thought to have been active since at least 2008 79 and maintains an active presence on social media especially Facebook Its members have claimed responsibility for the hijacking of websites belonging to Acer 80 BSNL 81 India s CBI Central Bank and the State Government of Kerala 82 83 British hacker Kane Gamble sentenced to 2 years in youth detention posed as CIA chief to access highly sensitive information 84 He also cyber terrorized high profile U S intelligence officials such as then CIA chief John Brennan or Director of National Intelligence James Clapper 85 86 The judge said Gamble engaged in politically motivated cyber terrorism 87 In March 2021 hackers affiliated with Russia were reported to have targeted Lithuanian Officials and decision makers The cyber espionage group APT29 which is believed to have carried out the attacks utilized the country s own IT infrastructure against organizations involved in the development of a COVID 19 vaccine 88 On 7 May 2021 the Colonial Pipeline was hit with a cyberattack that disrupted oil distribution The Colonial Pipeline is a pipeline that controls almost half 45 of the oil that runs through the East Coast of the United States This attack caused the company to turn off the pipeline which it had never done before Thus many people panicked buying gasoline at gas stations and the government thought this attack would quickly spread 89 Ultimately the Colonial Pipeline paid nearly an amount of 5 million dollars worth of cryptocurrency Even though the Colonial paid all the money the system did not turn on as rapidly as it used to 90 The hacker accused of this attack is a group called DarkSide The money that the Colonial paid went to DarkSide but there are other entities involved as well For now DarkSide has decided to discontinue its operations 91 On 30 May 2021 JBS was exposed to a cyberattack of ransomware which delayed the plant s meat production JBS is the world s largest meat producer that provides meat related products for people This attack caused the shutdown of all nine beef factories in the United States and disrupted poultry and pork production In addition labor had to be cut due to the closings of the factories and the cost of meat increased due to no meat being produced 92 Ultimately JBS had to pay 11 million dollars worth of cryptocurrency to regain control 93 A group called REvil was responsible for the attack REvil is a group based in the country of Russia that is also one of the most productive ransomware organizations 94 In the summer of 2021 crimes committed in Cyprus 95 96 Israel 97 and Lithuania 98 were classified by experts as Internet terrorism Anonymous persons informed law enforcement authorities through the internet about mined business centers and office buildings Main target was the gambling company Affise According to Ambassador John R Bolton 99 these occurrences are vivid examples of Internet terrorism Amb Bolton believes that they are consequences of financial conflict stirred among the owners of Affise PlayCash and CyberEye 25 group According to the expert all three companies gain illicit income associated with criminal activities on the Internet In early December 2021 it was reported least nine U S State Department had their phones hacked by an unknown attacker All nine employees had Apple Iphones The hack which took place over several months was done through the use of iMessages that had a software attached that when sent without needing to be interacted with installed spyware known as Pegasus The software used was developed and sold by an Israel based spyware development company named NSO Group 100 In December 2021 at least five US defense and tech firms have been hacked by a group operating from China The group took advantage of an exploit used in these organization s software to conduct their campaign which came to light in upcoming months The target of these breaches were passwords as well as having the goal of intercepting private communications As of right now the extent of the damage is unclear as the breaches are ongoing 101 As a response to the 2022 Russian invasion of Ukraine Anonymous performed many attacks against computer systems in Russia Most notably Anonymous committed a cyberattack against Roskomnadzor in March 2022 102 Sabotage Edit Non political acts of sabotage have caused financial and other damage In 2000 disgruntled employee Vitek Boden caused the release of 800 000 litres of untreated sewage into waterways in Maroochy Shire Australia 103 104 More recently in May 2007 Estonia was subjected to a mass cyber attack in the wake of the removal of a Russian World War II war memorial from downtown Tallinn The attack was a distributed denial of service attack in which selected sites were bombarded with traffic to force them offline nearly all Estonian government ministry networks as well as two major Estonian bank networks were knocked offline in addition the political party website of Estonia s Prime Minister Andrus Ansip featured a counterfeit letter of apology from Ansip for removing the memorial statue citation needed In January 2008 a man from Estonia was convicted for launching the attacks against the Estonian Reform Party website and fined 105 106 During the Russia Georgia War on 5 August 2008 three days before Georgia launched its invasion of South Ossetia the websites for OSInform News Agency and OSRadio were hacked The OSinform website at osinform ru kept its header and logo but its content was replaced by a feed to the Alania TV website content Alania TV a Georgian government supported television station aimed at audiences in South Ossetia denied any involvement in the hacking of the websites Dmitry Medoyev at the time the South Ossetian envoy to Moscow claimed that Georgia was attempting to cover up information on events which occurred in the lead up to the war 107 One such cyber attack caused the Parliament of Georgia and Georgian Ministry of Foreign Affairs websites to be replaced by images comparing Georgian president Mikheil Saakashvili to Adolf Hitler 108 Other attacks involved denials of service to numerous Georgian and Azerbaijani websites 109 such as when Russian hackers allegedly disabled the servers of the Azerbaijani Day Az news agency 110 In June 2019 Russia has conceded that it is possible its electrical grid is under cyber attack by the United States 111 The New York Times reported that American hackers from the United States Cyber Command planted malware potentially capable of disrupting the Russian electrical grid 112 Website defacement and denial of service Edit Even more recently in October 2007 the website of Ukrainian president Viktor Yushchenko was attacked by hackers A radical Russian nationalist youth group the Eurasian Youth Movement claimed responsibility 113 114 In 1999 hackers attacked NATO computers The computers flooded them with email and hit them with a denial of service attack The hackers were protesting against the NATO bombings of the Chinese embassy in Belgrade Businesses public organizations and academic institutions were bombarded with highly politicized emails containing viruses from other European countries 115 In December 2018 Twitter warned of unusual activity from China and Saudi Arabia A bug was detected in November that could have revealed the country code of users phone numbers Twitter said the bug could have had ties to state sponsored actors 116 117 In May 2021 successive waves of DDOS attacks aimed at Belnet Belgium s public sector ISP took down multiple government sites in Belgium 200 sites were affected leaving public offices universities and research centers unable to access the internet fully or partially 118 In fiction EditThis article appears to contain trivial minor or unrelated references to popular culture Please reorganize this content to explain the subject s impact on popular culture providing citations to reliable secondary sources rather than simply listing appearances Unsourced material may be challenged and removed May 2022 The Japanese cyberpunk manga Ghost in the Shell as well as its popular movie and TV adaptations centers around an anti cyberterrorism and cybercrime unit In its mid 21st century Japan setting such attacks are made all the more threatening by an even more widespread use of technology including cybernetic enhancements to the human body allowing people themselves to be direct targets of cyberterrorist attacks In the movie Live Free or Die Hard John McClane Bruce Willis takes on a group of cyberterrorists intent on shutting down the entire computer network of the United States The movie Eagle Eye involves a super computer controlling everything electrical and networked to accomplish the goal The plots of 24 Day 4 and Day 7 include plans to breach the nation s nuclear plant grid and then to seize control of the entire critical infrastructure protocol The Tom Clancy created series Netforce was about an FBI Military team dedicated to combating cyberterrorists Much of the plot of Mega Man Battle Network is centered around cyberterrorism In the 2009 Japanese animated film Summer Wars an artificial intelligence cyber terrorist attempts to take control over the world s missiles in order to win against the main characters that attempted to keep it from manipulating the world s electronic devices In the 2012 film Skyfall part of the James Bond franchise main villain Raoul Silva Javier Bardem is an expert cyberterrorist who is responsible for various cyberterrorist incidents in the past Cyberterrorism plays a role in the 2012 video game Call of Duty Black Ops II first when main antagonist Raul Menendez cripples the Chinese economy with a cyberattack and frames the United States for it starting a new Cold War between the two powers Later another cyberattack with a computer worm leads to Menendez seizing control of the entire U S drone fleet Finally one of the game s endings leads to another attack similar to the latter this time crippling the U S electrical and water distribution grids An alternate ending depicts the cyberattack failing after it is stopped by one of the game s characters pivotal to the storyline The plot of the 2014 video game Watch Dogs is heavily influenced by cyber terrorism In which players take control of the game s protagonist Aiden Pierce an accused murder suspect citation needed who hacks into a ctOS Central Operating System giving him complete control of Chicago s mainframe in order to hunt down his accusers The video game Metal Slug 4 focuses on Marco and Fio joined by newcomers Nadia and Trevor to battle a terrorist organization known as Amadeus that is threatening the world with a computer virus The visual novel Baldr Force has the main character Tooru Souma joining a military organization to fight cyberterrorism to avenge the death of his friend The Japanese manga and live action Bloody Monday is highly influenced by hacking and cracking The main character Takagi Fujimaru is a Super Elite hacker which use his hacking knowledge to fight against his enemies In the television series Mr Robot the main plot line follows groups of hackers who engage in cyber terrorism as well as other events See also Edit2007 cyberattacks on Estonia 2008 cyberattacks during South Ossetia war Anonymous group Computer crime Cyberwarfare FBI Cyber Division List of cyber warfare forces Patriotic hacking United States Computer Emergency Readiness Team US CERT References Edit Botnets Cybercrime and Cyberterrorism Vulnerabilities and Policy Issues for Congress www everycrsreport com Retrieved 5 September 2021 Canetti Daphna Gross Michael Waismel Manor Israel Levanon Asaf Cohen Hagit 1 February 2017 How Cyberattacks Terrorize Cortisol and Personal Insecurity Jump in the Wake of Cyberattacks Cyberpsychology Behavior and Social Networking 20 2 72 77 doi 10 1089 cyber 2016 0338 PMID 28121462 a b c d Hower Sara Uradnik Kathleen 2011 Cyberterrorism 1st ed Santa Barbara CA Greenwood pp 140 149 ISBN 9780313343131 a b Laqueur Walter C Smith Spector Michael 2002 Cyberterrorism Facts on File pp 52 53 ISBN 9781438110196 India Quarterly a Journal of International Affairs 42 43 Indian Council of World Affairs 1986 122 The difficulty of defining terrorism has led to the cliche that one man s terrorist is another man s freedom fighter a href Template Cite journal html title Template Cite journal cite journal a Cite journal requires journal help Worth Robert 25 June 2016 Terror on the Internet The New Arena The New Challenges New York Times Book Review 21 Retrieved 5 December 2016 a b Centre of Excellence Defence Against Terrorism 2008 Responses to Cyber Terrorism Amsterdam IOS Press p 34 ISBN 9781586038366 Bidgoli Hossein 2004 The Internet Encyclopedia Vol 1 Hoboken NJ John Wiley amp Sons p 354 ISBN 978 0471222026 What is cyberterrorism Even experts can t agree Archived from the original on 12 November 2009 Retrieved 5 November 2009 Harvard Law Record Victoria Baranetsky 5 November 2009 a b Latest viruses could mean end of world as we know it says man who discovered Flame The Times of Israel 6 June 2012 Cyber espionage bug attacking Middle East but Israel untouched so far The Times of Israel 4 June 2013 Iqbal Mohammad Defining Cyberterrorism The John Marshall Journal of Information Technology amp Privacy Law 22 2 397 408 Ruggiero Vincenzo 1 March 2006 Understanding Political Violence A Criminological Approach McGraw Hill ISBN 9780335217519 Retrieved 13 August 2018 Gross Michael 2016 The psychological effects of cyber terrorism The Bulletin of the Atomic Scientists National Institutes of Health 72 5 284 291 Bibcode 2016BuAtS 72e 284G doi 10 1080 00963402 2016 1216502 PMC 5370589 PMID 28366962 National Crime Agency Intelligence Assessment Pathways into Cybercrime National Crime Agency Archived from the original on 13 August 2018 Retrieved 13 August 2018 Rudawski Anna The Future of Cyber Threats When Attacks Cause Physical Harm New York Law Journal Retrieved 13 August 2018 Anderson Kent 13 October 2010 Virtual Hostage Cyber terrorism and politically motivated computer crime The Prague Post Retrieved 14 October 2010 Hardy Keiran Williams George 11 August 2014 Chen Thomas M Jarvis Lee Macdonald Stuart eds Cyberterrorism Understanding Assessment and Response Springer pp 1 23 doi 10 1007 978 1 4939 0962 9 1 a b c d Gable Kelly A Cyber Apocalypse Now Securing the Internet against Cyberterrorism and Using Universal Jurisdiction as a Deterrent Vanderbilt Journal of Transnational Law Vol 43 No 1 INTELLIGENCE ARMY TRAINING AND DOCTRINE COMMAND FORTLEAVENWORTH KS DEPUTY CHIEF OF STAFF FOR 15 August 2005 Cyber Operations and Cyber Terrorism Handbook Number 1 02 Archived from the original on 23 August 2011 Retrieved 4 May 2010 a href Template Cite journal html title Template Cite journal cite journal a Cite journal requires journal help White Kenneth C 1998 Cyber terrorism Modern mayhem U S Army War College Retrieved 13 March 2015 Cyberterrorism National Conference of State Legislatures Centre of Excellence Defence Against Terrorism ed 2008 Responses to Cyber Terrorism NATO science for peace and security series Sub series E Human and societal dynamics ISSN 1874 6276 Vol 34 Amsterdam IOS Press p 119 ISBN 9781586038366 Retrieved 22 July 2018 The current NATO Definition of cyber terrorism is A cyberattack using or exploiting computer or communication networks to cause sufficient destruction or disruption to generate fear or to intimidate a society into an ideological goal Centre of Excellence Defence Against Terrorism ed 2008 Responses to Cyber Terrorism NATO science for peace and security series Sub series E Human and societal dynamics ISSN 1874 6276 Vol 34 Amsterdam IOS Press p 119 ISBN 9781586038366 Retrieved 22 July 2018 The National Infrastructure Protection Center now part of the US Department of Homeland Security states as their understanding of cyber terrorism A criminal act perpetrated by the use of computers and telecommunications capabilities resulting in violence destruction and or disruption of services to create fear by causing confusion and uncertainty within a given population with the goal of influencing a government or population to conform to a political social or ideological agenda Centre of Excellence Defence Against Terrorism ed 2008 Responses to Cyber Terrorism NATO science for peace and security series Sub series E Human and societal dynamics ISSN 1874 6276 Vol 34 Amsterdam IOS Press p 119 ISBN 9781586038366 Retrieved 22 July 2018 The Federal Bureau of Investigations sic has the following definition of cyber terrorism Any premeditated politically motivated attack against information computer systems computer programs and data which results in violence against non combatant targets by subnational groups or clandestine agents Conway Maura 2008 What is Cyberterrorism and How Real is the Threat Cyber Behavior 217 245 a b Dorothy E Denning 23 May 2000 Cyberterrorism cs georgetown edu Archived from the original on 10 March 2014 Retrieved 19 June 2016 Warf Barney August 2016 Relational Geographies of Cyberterrorism and Cyberwar Space amp Polity 20 2 143 157 doi 10 1080 13562576 2015 1112113 S2CID 146837558 Top 10 events that may end the human race Yahoo News 27 October 2010 Archived from the original on 30 October 2010 Retrieved 1 November 2010 Vilic Vida December 2017 Dark Web Cyber Terrorism and Cyber Warfare Dark Side of the Cyberspace Balkan Social Science Review 10 7 24 via EBSCOhost Compare Costigan Sean 25 January 2015 Cyber terrorism must be jointly tackled Sunday Guardian Retrieved 12 March 2015 States are actively engaged in weaponising code and are all too willing to hide behind the challenges of attribution many will be apt to share code with proxies in furtherance of their objectives just as states continue to support terrorism in the physical realm Reduced technical complexity lowered costs and most importantly the continued push to connect the virtual and the physical think of the growth of the Internet of Things or Machine to Machine connectivity is making for new enticing physical targets worldwide Sultan Oz 2019 Tackling Disinformation Online Terrorism and Cyber Risks into the 2020s The Cyber Defense Review 4 1 43 60 ISSN 2474 2120 JSTOR 26623066 Joel Brenner and Jon R Lindsay Debating the Chinese Cyber Threat International Security Vol 40 No 1 Summer 2015 pp 191 195 Softness Nicole Winter 2016 Terrorist Communications Are Facebook Twitter and Google Responsible for the Islamic State s Actions Journal of International Affairs 70 201 215 via EBSCOhost a b Perlroth Nicole Sanger David E 28 March 2013 Corporate Cyberattacks Possibly State Backed Now Seek to Destroy Data The New York Times a b Cyberpsychology Behavior and Social Networking Cyberpsychology Behavior and Social Networking Retrieved 21 September 2023 1 William L Tafoya Ph D Cyber Terror FBI Law Enforcement Bulletin FBI gov November 2011 White House shifts Y2K focus to states CNN February 23 1999 CNN 23 February 1999 Retrieved 25 September 2011 Blake Andrew Ardit Ferizi hacker who aided Islamic State sentenced for helping terror group with kill list The Washington Times Retrieved 1 March 2017 a b C Reich Pauline 2012 Law Policy and Technology Cyberterrorism Information Warfare and Internet Immobilization Cyberterrorism Information Warfare and Internet Immobilization Hershey PA Information Science Reference p 354 ISBN 9781615208319 a href Template Cite book html title Template Cite book cite book a CS1 maint multiple names authors list link International Legal Instruments Office of Counter Terrorism www un org Retrieved 7 December 2021 Holt Thomas J Freilich Joshua D Chermak Steven M 2017 Exploring the Subculture of Ideologically Motivated Cyber Attackers Journal of Contemporary Criminal Justice 33 3 212 233 doi 10 1177 1043986217699100 S2CID 152277480 Know Your Enemy Understanding the Motivation Behind Cyberattacks Security Intelligence 31 March 2016 Retrieved 26 October 2021 What Motivates Cyber Criminals SEGMENTECH SEGMENTECH Cyber Security Solutions 24 March 2021 Retrieved 27 October 2021 Europol INTERPOL what s the difference Europol Retrieved 6 December 2021 Maryann Cusimano Love 2011 Beyond Sovereignty Issues for a Global Agenda Wadsworth Cengage Learning How a cyber attack transformed Estonia BBC News 27 April 2017 Retrieved 6 December 2021 Ivana Kottasova How Russian threats turned this country into the go to expert on cyber defense CNN Retrieved 6 December 2021 Yu Eileen 27 May 2011 China dispatches online army ZDNet Asia Retrieved 3 June 2011 Geng Yansheng spokesperson for China s Defense Ministry was quoted to say that the PLA set up the cyberwar unit or cyber blue team to support its military training and upgrade the army s Internet security defense China Confirms Existence of Elite Cyber Warfare Outfit the Blue Army Fox News 26 May 2011 Retrieved 3 June 2011 China set up a specialized online Blue Army unit that it claims will protect the People s Liberation Army from outside attacks prompting fears that the crack team was being used to infiltrate foreign governments systems Austin Greg How Good Are China s Cyber Defenses thediplomat com Retrieved 30 November 2021 Jammu and Kashmir Police cracking down on white collar jihadis The Tribune 30 August 2021 Tejaswi Mini 13 May 2021 India will require 70K cyber experts this year alone Xpheno businessline Retrieved 30 November 2021 IANS 1 June 2021 At Rs 24 5 crore ransomware data recovery cost triples in India Business Standard India Retrieved 30 November 2021 Cyber Security for Critical Infrastructure Challenges and Solutions Kratikal Blogs 7 April 2021 Retrieved 30 November 2021 The Current State of Cyber Security in India Kratikal Blogs 28 October 2021 Retrieved 30 November 2021 한국 아태지역 국가 중 사이버 테러 취약성 1위 Deloitte Korea Press Release 딜로이트 Arashi Rieko 2016 Deloitte Asia Pacific Defense Outlook 2016 Defense in Four Domains PDF Deloitte Asia Pacific Defense Outlook Deloitte Touche Tohmatsu Limited 18 19 South Korea on alert for cyber attacks after major network goes down the Guardian 20 March 2013 Retrieved 30 November 2021 A Study of countermeasure and strategy analysis on North Korean cyber terror 신충근 and 이상진 National Intelligence Service StackPath www securityinfowatch com Retrieved 30 November 2021 Surfsafe Pakistan Report Extremist Online Content Bruce M DeBlois et al Space Weapons Crossing the U S Rubicon International Security Vol 29 No 2 Fall 2004 pp 50 84 Chabrow Eric Obama Cybersecurity Coordinator Resigns GovInfoSecurity com 17 May 2012 Accessed 11 February 2014 White House Names New Cybersecurity Chief BreakingGov com 17 May 2012 Accessed 11 February 2014 McDonald Ryan White House Security Chief Warns Baltimore Biz Journal 29 January 2014 Access date 11 February 2014 FACT SHEET Executive Order Blocking the Property of Certain Persons Engaging in Significant Malicious Cyber Enabled Activities whitehouse gov 1 April 2015 Retrieved 1 March 2017 Marshall Patrick 26 September 2003 Cybersecurity CQ Researcher pp 797 820 Begos Kevin 11 November 2016 Protecting the power grid CQ Researcher Flamini Roland 15 February 2013 Improving cybersecurity CQ Researcher Executive Order on Improving the Nation s Cybersecurity The White House 12 May 2021 Retrieved 6 December 2021 Ayers Cynthia September 2009 The Worst is Yet To Come Futurist 49 Denning Dorothy Autumn 2000 Cyberterrorism The Logic Bomb versus the Truck Bomb Global Dialogue 2 4 Archived from the original on 27 June 2013 Retrieved 20 August 2014 Maryann Cusimano Love Public Private Partnerships and Global Problems Y2K and Cybercrime Paper Presented at the International Studies Association Hong Kong July 2001 Calvin Sims Japan Software Suppliers Linked to Sect The New York Times 2 March 2000 A6 New York Times Twitter hacked by Syrian group 28 August 2013 Pakistan Cyber Army PCA Hacking Indian Websites Promoting Pakistani Interests In Cyber Space And Nurturing Pakistani Hackers The Cyber amp Jihad Lab cjlab memri org Retrieved 28 May 2016 Debugging the Pakistan Cyber Army From Pakbugs to Bitterbugs ThreatConnect Enterprise Threat Intelligence Platform ThreatConnect Enterprise Threat Intelligence Platform 6 October 2014 Retrieved 28 May 2016 India Censorship China Japan Apple Reg man says 拜拜 to Honkers ponders Asia s future role in tech world month Acer founder Shih to step down for second time next themselves Script fools n00b hackers into hacking Pakistan Cyber Army declares war on Chinese Bangladeshi sites The Register Retrieved 28 May 2016 Saxena Anupam 28 July 2011 BSNL Website Hacked By Pakistan Cyber Army Report MediaNama Retrieved 28 May 2016 Hacked by Pakistan cyber army CBI website still not restored NDTV com Retrieved 28 May 2016 Indian websites are more vulnerable to cyber attacks from Pakistan based hackers on major events Latest Tech News Video amp Photo Reviews at BGR India www bgr in 12 February 2016 Retrieved 28 May 2016 British 15 year old gained access to intelligence operations in Afghanistan and Iran by pretending to be head of CIA court hears The Daily Telegraph 19 January 2018 British teenager who cyber terrorised US intelligence officials gets two years detention The Independent 21 April 2018 British teen Kane Gamble accessed accounts of top US intelligence and security officials Deutsche Welle 21 January 2018 UK teen Kane Gamble gets two years for hacking CIA ex chief John Brennan Deutsche Welle 20 April 2018 Report Russian hackers exploit Lithuanian infrastructure AP NEWS 20 April 2021 Retrieved 26 October 2021 Sanger David E Perlroth Nicole 14 May 2021 Pipeline Attack Yields Urgent Lessons About U S Cybersecurity The New York Times ISSN 0362 4331 Retrieved 30 November 2021 Perlroth Nicole 13 May 2021 Colonial Pipeline paid 75 Bitcoin or roughly 5 million to hackers The New York Times ISSN 0362 4331 Retrieved 30 November 2021 Schwirtz Michael Perlroth Nicole 14 May 2021 DarkSide Blamed for Gas Pipeline Attack Says It Is Shutting Down The New York Times ISSN 0362 4331 Retrieved 30 November 2021 Creswell Julie Perlroth Nicole Scheiber Noam 1 June 2021 Ransomware Disrupts Meat Plants in Latest Attack on Critical U S Business The New York Times ISSN 0362 4331 Retrieved 30 November 2021 Robbins Rebecca 10 June 2021 Meat processor JBS paid 11 million in ransom to hackers The New York Times ISSN 0362 4331 Retrieved 30 November 2021 Perlroth Nicole Scheiber Noam Creswell Julie 2 June 2021 Russian Cybercriminal Group Was Behind Meat Plant Attack F B I Says The New York Times ISSN 0362 4331 Retrieved 30 November 2021 Agapiou Gina Limassol building evacuated after bomb threat Cyprus Mail cyprus mail com Retrieved 21 August 2021 Building in Limassol evacuated after warning about bomb Building in Limassol evacuated after warning about bomb Retrieved 21 August 2021 The building with a planted bomb in Tel Aviv Jewish Review 18 July 2021 Posle ugrozy vzryva bolshogo zdaniya v Vilnyuse vveden plan Shit DELFI Israel has become a target of Internet terrorists again The Journal of International Security Affairs 3 August 2021 Retrieved 21 August 2021 Bing Christopher Menn Joseph 4 December 2021 U S State Department phones hacked with Israeli company spyware sources Reuters Retrieved 5 December 2021 Sean Lyngaas Suspected Chinese hackers breach more US defense and tech firms CNN Retrieved 5 December 2021 Anonymous hacks Russian federal agency releases 360 000 documents The Jerusalem Post JPost com Retrieved 6 April 2022 Malicious Control System Cyber Security Attack Case Study Maroochy Water Services Australia PDF csrc nist gov 30 November 2016 Hacker jailed for reverse sewage The Register 31 October 2001 Estonia fines man for cyber war BBC 25 January 2008 Retrieved 23 February 2008 Leyden John 24 January 2008 Estonia fines man for DDoS attacks The Register Retrieved 22 February 2008 S Ossetian News Sites Hacked Civil Georgia Tbilisi 5 August 2008 Retrieved 26 January 2009 Wentworth Travis 12 August 2008 You ve Got Malice Russian nationalists waged a cyber war against Georgia Fighting back is virtually impossible Newsweek Retrieved 26 January 2009 Markoff John 13 August 2008 Before the Gunfire Cyberattacks The New York Times Retrieved 26 January 2009 Today az 11 August 2008 Russian intelligence services undertook large scale attack against Day Az server US and Russia clash over power grid hack attacks BBC News 18 June 2019 How Not To Prevent a Cyberwar With Russia Wired 18 June 2019 Russian Nationalists Claim Responsibility For Attack On Yushchenko s Web Site news kievukraine info Russian nationalists claim responsibility for attack on Yushchenko s Web site International Herald Tribune 30 October 2007 Archived from the original on 19 February 2008 Hackers attack U S government Web sites in protest of Chinese embassy bombing CNN Retrieved 30 April 2010 See also Chinese embassy bombing Twitter warns of unusual activity from China and Saudi Arabia BBC News 17 December 2018 Retrieved 17 December 2018 An issue related to one of our support forms Twitter Retrieved 17 December 2018 DDoS attack knocks Belgian government websites offline WeLiveSecurity 5 May 2021 Retrieved 26 October 2021 Further reading EditAlexander Yonah Swetman Michael S 2001 Cyber Terrorism and Information Warfare Threats and Responses Transnational Publishers Inc U S ISBN 978 1 57105 225 4 Bibi van Ginkel The Internet as Hiding Place of Jihadi Extremists International Centre for Counter Terrorism The Hague 2012 Colarik Andrew M 2006 Cyber Terrorism Political and Economic Implications Idea Group U S ISBN 978 1 59904 022 6 Hansen James V Benjamin Lowry Paul Meservy Rayman McDonald Dan 2007 Genetic programming for prevention of cyberterrorism through dynamic and evolving intrusion detection Decision Support Systems 43 4 1362 1374 doi 10 1016 j dss 2006 04 004 SSRN 877981 Verton Dan 2003 Black Ice The Invisible Threat of Cyber terrorism Osborne McGraw Hill U S ISBN 978 0 07 222787 1 Weimann Gabriel 2006 Terror on the Internet The New Arena the New Challenges United States Institute of Peace U S ISBN 978 1 929223 71 8 Blau John November 2004 The battle against cyberterror NetworkWorld Retrieved 20 March 2005 Gross Grant November 2003 Cyberterrorist attack would be more sophisticated that past worms expert says ComputerWorld Retrieved 17 March 2005 Poulsen Kevin August 2004 South Pole cyberterrorist hack wasn t the first SecurityFocus News Retrieved 17 March 2005 Thevenet Cedric November 2005 Cyberterrorisme mythe ou realite PDF in French terrorisme net U S Army Cyber Operations and Cyber Terrorism Handbook 1 02 Rayamajhi Shreedeep 2009 Research Paper A Synopsis on Cyber Terrorism and Warfare Jacqueline Ching 2010 Cyberterrorism Rosen Pub Group ISBN 978 1 4358 8532 5 Rolon Dario N 2013 Control vigilancia y respuesta penal en el ciberespacio Latinamerican s new security thinking Clacso Costigan Sean 2012 Cyberspaces and Global Affairs Ashgate ISBN 978 1 4094 2754 4 Archived from the original on 2 April 2015 Retrieved 12 March 2015 Record Jeffery Bounding the Global War on Terrorism Strategic Studies Institute US Army War College Leavenworth 2003 Schmid Alex and Jongmans Albert et al Political Terrorism A new guide to Action Authors Concepts Data Bases Theories and Literature Transaction Books New Brunswick 1988 COE DAT Cyber Terrorism Couse IV 9 Mar Hennessy Joh L and others Information Technology for Counterterrorism National Academies Press Washington DC 2003 Hoffman Bruce Inside Terrorism Columbia University Press New York 2006 Laqueur Walter The New Terrorism Fanaticism and the Arms of Mass Destruction Oxford UniversityPress New York 1999 Sageman Marc Understanding Terror Networks Penn Philadelphia 2004 Wilkinson Paul Terrorism Versus Democracy Routledge London 2006External links EditGeneral Edit CRS Report for Congress Computer Attack and Cyber Terrorism 17 10 03 How terrorists use the Internet ABC Australia interview with Professor Hsinchun Chen Department of Defense Cyber Crime Center Global response to cyberterrorism and cybercrime A matrix for international cooperation and vulnerability assessmentNews Edit Cyber Security Task Force Takes Whole Government Approach FBI 20 October 2014 BBC News US warns of al Qaeda cyber threat 01 12 06 BBC News Cyber terrorism overhyped 14 03 03 Calls for anti cyber terrorism bill resurface in South Korea NK News Retrieved from https en wikipedia org w index php title Cyberterrorism amp oldid 1176469751, wikipedia, wiki, book, books, library,

article

, read, download, free, free download, mp3, video, mp4, 3gp, jpg, jpeg, gif, png, picture, music, song, movie, book, game, games.