book

Cybercrime and Cyber Terrorism

21 Pages 2084 Words 1557 Views

Since the early 1990s, the internet has grown technologically faster and with more capabilities than any other type of technology in the world; this has left the United State with a sense of fear with this type of network being a risk to our national security. While most of us find the internet to be a great tool of information, and unlimited capabilities, it can devastate us personally and financially. The internet can increase the risk of theft, fraud and even the possibility to suffer from a cyber-attack or even worse a cyber-terrorism, leaving our country at risk especially for those who work in the government defense agencies and private corporations. In 2003, the conflict with Iraq created a round of speculations that the United States was going to experience cyber-attacks in revenge (Clarke). But, since 1995 there haven’t been any reports of cyber-attacks that would produce panic or damage to U.S. infrastructure or that affects our military operations. By any means this is not a result of idleness by terrorist groups. Between 1996 and the end of 2001 there was 1,813 international terrorist attacks performed. To mention a few that involved citizen targets, there is the Khobar Tower Bombing in June 1996, the Embassy Bombing in East Africa in August 1998, and the USS Cole attack in October 2000. Between 1996 and 2003, to compare between terrorist attacks around 1,813, computer security incidents around 217,394 and cyber-attacks on infrastructure which they were 0, reporters have noted that the cyber terror on infrastructure are an unlikely threat to the security of the United States. In 2005, Cyber-attacks cost were $48 billion to businesses and $680 million to consumers. While a physical attack involves weapons against a specific target, a cyber-attack includes codes that are used as weapons to infect enemies’ computer in order to manipulate the software, system configuration or the use of restricted computer system. Although cyber-attacks has taken place against critical infrastructure, industry, and companies, the gathered data cannot be used to determine if a terrorist group has initiated these attacks. One of the concept that is creating a big concern in our infrastructure is the term cyber terrorism. Cyber terrorism can be define as the use of a computer as a weapon or as a target by any group who threaten to cause violence and fear with the purpose of influence to an audience or produce a government to change its policies (Wilson). Like terrorism, cyber terrorism is used to intimidate the government in order to change their opinions about social objectives. In order to be consider cyber terrorism, attacks perform against a person of property should cause enough harm, such as attacks that lead to death, explosions, and economic loss. There are many reasons why a terrorist would want to conduct cyber terrorism. First, cybercrime is a cheaper method that consist on the use of a computer and an online connections, without the necessity to buy weapons or any type of explosive. Second, the cyber terrorism remains anonymous, which means the terrorist can use any unidentified user and police force will not be able to identify the terrorist real identity. Third, there is a tremendous amount of people that can be targeted as long as weaknesses are shown. These include but not limited to computers and networks of airlines, government agencies, public utilities, certain individuals who have high level clearance, etc. Fourth, cyber terrorism does not required physical training, the risk of death or any regular activity performed by terrorist. Fifth, cyber terrorism has the probability to affect people directly, in a way that it will generate media coverage, which as we already know is what terrorist wants. However, cyber-attacks are more usual in our daily basis than cyber terrorism. As a matter of fact there are no records of cy

Read Full Essay