Professional Documents
Culture Documents
Cyberterro rism
Ov erv iew
Basic definition
There are some that say cyberterrorism does not exist and is really a
matter of hacking or information warfare. They disagree with labeling it
terrorism because of the unlikelihood of the creation of fear, significant
physical harm, or death in a population using electronic means,
considering current attack and protective technologies.
Background information
The high profile terrorist attacks in the United States on September 11,
2001 lead to further media coverage of the potential threats of
cyberterrorism in the years following. Mainstream media coverage often
discusses the possibility of a large attack making use of computer
networks to sabotage critical infrastructures with the aim of putting
human lives in jeopardy or causing disruption on a national scale either
directly or by disruption of the national economy.
Authors such as Winn Schwartau and John Arquilla are reported to have
had considerable financial success selling books which described what
were purported to be plausible scenarios of mayhem caused by
cyberterrorism. Many critics claim that these books were unrealistic in
their assessments of whether the attacks described (such as nuclear
meltdowns and chemical plant explosions) were possible. A common
thread throughout what critics perceive as cyberterror-hype is that of
non-falsifiability; that is, when the predicted disasters fail to occur, it
only goes to show how lucky we've been so far, rather than impugning
the theory.
Effects
Examples
Countering
On December 22, 2009, the White House named its head of Cyber
Security as Howard Schmidt. He will coordinate U.S Government,
military and intelligence efforts to repel hackers.
In fic tion
· The Japanese cyberpunk manga, Ghost in the Shell (as well as its
popular movie and TV adaptations) centers around an anti-
cyberterrorism and cybercrime unit. In its mid-21st century Japan
setting such attacks are made all the more threatening by an even
more widespread use of technology including cybernetic
enhancements to the human body allowing people themselves to
be direct targets of cyberterrorist attacks.
· Cyberterrorism was featured in Dan Brown's Digital Fortress.
· Cyberterrorism was featured in Amy Eastlake's Private Lies.
· In the movie Live Free or Die Hard, John McClane (Bruce Willis)
takes on a group of cyberterrorists intent on shutting down the
entire computer network of the United States.
· The movie Eagle Eye involves a super computer controlling
everything electrical and networked to accomplish the goal.
· The plots of 24 Day 4 and now Day 7 include plans to breach the
nation's nuclear plant grid and then to seize control of the entire
critical infrastructure protocol.
· The Tom Clancy created series Netforce was about a FBI/Military
team dedicated to combating cyberterrorists.
· The whole point of Mega Man Battle Network is cyberterrorism.
Here are few key things to remember to pretect yourself from cyber-
terrorism:
what is Cyber-terrorism?
In the wake of the recent computer attacks, many have been quick to
jump to conclusions that a new breed of terrorism is on the rise and our
country must defend itself with all possible means. As a society we have
a vast operational and legal experience and proved techniques to combat
terrorism, but are we ready to fight terrorism in the new arena – cyber
space?
After April 2001 collision of US navy spy plane and Chinese fighter jet,
Chinese hackers launched Denial os Service (DoS) attacks against
American web sites.
A study that covered the second half of the year 2002 showed that the
most dangerous nation for originating malicious cyber attacks is the C.
Why do they use cyber att acks?
Cyber terrorist prefer using the cyber attack methods because of many
advantages for it.
It is Cheaper than traditional methods.
The action is very difficult to be tracked.
They can hide their personalities and location.
There are no physical barriers or check points to cross.
They can do it remotely from anywhere in the world.
They can use this method to attack a big number of targets.
They can affect a large number of people.
Cyber terrorists can destroy the economy of the country by attacking the
critical infrastructure in the big towns such as electric power and water
supply, still the blackout of the North Western states in the US in Aug.
15, 2003 is unknown whether it was a terrorist act or not, or by
attacking the banks and financial institutions and play with their
computer systems.
Cyber terrorists can endanger the security of the nation by targeting the
sensitive and secret information (by stealing, disclosing, or destroying).
•One of the worst incidents of cyber terrorists at work was when crackers
in Romania illegally gained access to the computers controlling the life
support systems at an Antarctic research station, endangering the 58
scientists involved. More recently, in May 2007 Estonia was subjected to
a mass cyber-attack by hackers inside the Russian Federation which
some evidence suggests was coordinated by the Russian government,
though Russian officials deny any knowledge of this. This attack was
apparently in response to the removal of a Russian World War II war
memorial from downtown Estonia.
The Association of South East Asia Nations (ASEAN) has set plans for
sharing information on computer security. They are going to create a
regional cyber-crime unit by the year 2005.
The Central Government and the State Governments can play their role
effectively by making various rules and regulations dealing with cyber
terrorism and its facets from time to time. The Central Government can,
by notification in the Official Gazette and in the Electronic Gazette,
makes rules to carry out the provisions of the Information Technology
Act. Similarly, the State Government can, by notification in Official
Gazette, makes rules to carry out the provisions of the Act. . If any
Cyber Café Owner/Network Service Provider failsologies. to maintain Log
Register and records he shall be liable for penalties as provided in the Act
or any other Law, for the time being in force. These provisions are
sufficient to take care of illegal use of cyber café for terrorist activities.
(3)Judicial response:
The judiciary can play its role by adopting a stringent approach towards
the menace of cyber terrorism. It must, however, first tackle the
jurisdiction problem because before invoking its judicial powers the
courts are required to satisfy themselves that they possess the requisite
jurisdiction to deal with the situation. Since the Internet "is a cooperative
venture not owned by a single entity or government, there are no
centralized rules or laws governing its use. The absence of geographical
boundaries may give rise to a situation where the act legal in one country
where it is done may violate the laws of another country. This process
further made complicated due to the absence of a uniform and
harmonised law governing the jurisdictional aspects of disputes arising
by the use of Internet. It must be noted that, generally, the scholars
point towards the following "theories" under which a country may claim
prescriptive jurisdiction:
The menace of cyber terrorism is not the sole responsibility of State and
its instrumentalities. The citizens as well as the netizens are equally
under a solemn obligation to fight against the cyber terrorism. In fact,
they are the most important and effective cyber terrorism eradication and
elimination mechanism. The only requirement is to encourage them to
come forward for the support of fighting against cyber terrorism. The
government can give suitable incentives to them in the form of monetary
awards. It must, howe ver, be noted that their anonymity and security
must be ensured before seeking their help. The courts are also
empowered to maintain their anonymity if they provide any information
and evidence to fight against cyber terrorism.
Concl usi o n:
The problem of cyber terrorism is multilateral having varied facets and
dimensions. Its solution requires rigorous application of energy and
resources. It must be noted that law is always seven steps behind the
technology. This is so because we have a tendency to make laws when
the problem reaches at its zenith. We do not appreciate the need of the
hour till the problem takes a precarious dimension. At that stage it is
always very difficult, if not impossible, to deal with that problem. This is
more so in case of offences and violations involving information
technology. One of the argument, which is always advanced to justify
this stand of non-enactment is that “the measures suggested are not
adequate to deal with the problem”. It must be appreciated that
“something is better then nothing”. The ultimate solution to any problem
is not to enact a plethora of statutes but their rigorous and dedicated
enforcement. The courts may apply the existing laws in a progressive,
updating and purposive manner. It must be appreciated that it is not the
“enactment” of a law but the desire, will and efforts to accept and enforce
it in its true letter and spirit, which can confer the most strongest, secure
and safest protection for any purpose. The enforcement of these rights
requires a “qualitative effort” and not a “quantitative effort”. Thus, till a
law dealing expressly with cyber terrorism is enacted, we must not feel
shy and hesitant to use the existing provisions.