Preview

Cyberterrorism: Definition, Potential, and Minimization of Its Dangers

Powerful Essays
Open Document
Open Document
2101 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cyberterrorism: Definition, Potential, and Minimization of Its Dangers
CYBERTERRORISM - Fact or Fancy?

Mark M. Pollitt

FBI Laboratory

935 Pennsylvania Ave. NW

Washington, D. C. 20535

Abstract:

This paper discusses the definition of cyberterrorism, its potential, and suggests an approach to the minimization of its’ dangers. The definition of cyberterrorism used in this paper is combines the United States Department of State’s definition of terrorism as politically motivated acts of violence against non-combatants with a definition of cyberspace as the computers, networks, programs and data which make up the information infrastructure. The conclusion is that by limiting the physical capabilities of the information infrastructure, we can limit it potential for physical destruction.

Keywords:

Terrorism, cyberspace, cyberterrorism, information infrastructure, computer security.

Disclaimer:

This paper was submitted by the author in connection with academic studies at George Washington University. It does not represent the policy, opinions, or conclusions of the United States Government or of the Federal Bureau of Investigation. The opinions expressed herein are wholly that of the author.

CYBERTERRORISM - Fact or Fancy?

by Mark M. Pollitt

Introduction

“We are at risk. Increasingly, America depends on computers. They control power delivery, communications, aviation, and financial services. They are used to store vital information, from medical records to business plans to criminal records. Although we trust them, they are vulnerable - to the effects of poor design and insufficient quality control, to accident, and perhaps most alarmingly, to deliberate attack. The modern thief can steal more with a computer than with a gun. Tomorrow’s terrorist may be able to do more damage with a keyboard than with a bomb.”(1)

Thus began the opening chapter of one of the foundation books in the computer security field. This book, commissioned by the National Academy of sciences, was the product of twenty-one

You May Also Find These Documents Helpful

  • Better Essays

    Cmgt400 Week3

    • 1493 Words
    • 6 Pages

    References: 1. (2010). Principles of Computer Security: CompTIA Security+ and Beyond (2nd ed.). : McGraw-Hill.…

    • 1493 Words
    • 6 Pages
    Better Essays
  • Best Essays

    INTL 440 Syllabus LDD Jan 14

    • 2263 Words
    • 11 Pages

    This course provides an overview of cyber warfare and the potential impact of its use by military, terrorist, and criminal organizations. By studying the operation of computer networks, the student will gain an appreciation of how they have both benefited society and made portions of its infrastructure more vulnerable. An overview of cyber weaponry will be presented, and various offensive and defensive strategies will be examined via case studies.…

    • 2263 Words
    • 11 Pages
    Best Essays
  • Good Essays

    There have been recent technological advances that have brought with them significant benefits to society, but there has always been a negative aspect to it. The internet is a new technological innovation that has changed a lot of people’s lives. The internet also has its dangers to the people who use it. All computer systems are globally inter-connected, and therefore are vulnerable to forms of attack. People have feared of attacks since September 11, 2001 when the New York World Trade Center was attacked where the media said this not only opened us to physical attacks, but also virtual attacks. If we were to be virtually attacked the attackers would most likely go for our critical infrastructure’s such as energy, finance, transportation, and other essential services. These potential dangers are taken very seriously, and the United States has procedures to stop them from happening.…

    • 940 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Cmgt400 Week 3

    • 1752 Words
    • 8 Pages

    References: Conklin, A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of Computer Security: Comp TIA Security + and Beyond (third ed.). Boston, MA: McGraw-Hill Company.…

    • 1752 Words
    • 8 Pages
    Better Essays
  • Good Essays

    “People ask me all the time, 'What keeps you up at night?' And I say, 'Spicy Mexican food, weapons of mass destruction, and cyber-attacks.” - Dutch Ruppersberger. In other words cyber-attacks and war fare has the potential to have the save destruction as WMDs. We need to pay attention towards cyber warfare because it is the way of the future. Fight has gone from bow and arrows to drone airplanes and now cyberspace. Cyber warfare is simple and inexpensive; all a terrorist needs is a computer and a connection. That is why terrorists are leaning towards cyber-attacks. Cyber terrorism has a huge impact on many lives across the globe. In order to end cyber warfare countries must find why they are being attacked and how they are being attacked. The primary reason for cyber warfare is the lack of sophisticated army encrypted security on public and…

    • 519 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Mit Week 5

    • 1020 Words
    • 3 Pages

    The Stuxnet digital assault on the Iranian Nuclear facilities at Natanz is seen by a lot of people as the first genuine digital weapon. This makes Stuxnet's super vitality as an issue unparalleled in present day digital world and particularly worth a debate. Lessons gained from the Stuxnet digital assault empower brainpower and the internet experts, as digital chiefs, to better work inside the area. Programmers around the world appear to be constantly programming security programs, for which states pay billions of dollars. Though the vulnerability of intrusion has leapt into the world cyberspace with Stuxnet and has left nothing secured.…

    • 1020 Words
    • 3 Pages
    Better Essays
  • Good Essays

    Every day millions of people are at risk by cyberterrorism. Cyberterrorism is known for the merging of cyberspace and terrorism. This is where people illegally hack into computers and networks to simply still people’s information, such as; their identity (Weimann, 2004, p.1). These hacks or attacks result in violence of the society. Cyberterrorism simply cause harm that causes fear in society. People struggling with cyberterrorism has not only become an extremely debated issue, but also has become a pleasing one. It has become a pleasing one because of an entire business wanting to take action in dealing with the threat of the cyberterrorism. With that one business taking action has caused many other businesses wanting to also take action to…

    • 1017 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Cyber Warfare

    • 896 Words
    • 4 Pages

    “Cyber warfare is a term used to describe the use of the Internet to wage war in the virtual world, often with real effects in the physical world,” (McGuigan). In the past recent years, cyber warfare has become a pertinent issue among the major nations on the planet; this issue has forced militaries, all over the world, to incorporate a new branch that is devoted to both conducting and protecting against cyber warfare. Cyber warfare is also used to define attacks amongst corporations, form radical organizations, and/or attacks by hackers, who are perceived as being warlike in their intent. Most situations pertaining to cyber warfare are attacks from one “sovereign state,” to another virtually in cyberspace (McGuigan).…

    • 896 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Clearly, Internet usage in today’s world is no longer viewed as a nonessential luxury. Usage and content has exponentially risen to a level of unprecedented proportion that requires its own area of precautions and supervision. The distal range of context that Cyberspace commands is the basis for a host of security issues and challenges that anyone that utilizes the Internet is made aware of daily. There is a growing awareness in today’s globalized world of the imminent dangers that may befell anyone that isn’t careful of their Internet usage. Cybercrimes such as theft, fraud and identify theft, to name a few, pose as ominous threats to the security of any individual or enterprise that engages the Internet at any given time. Not only are these threats that individuals are subjected to, but also threats that the US government has been…

    • 2700 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    Cyber Defense

    • 459 Words
    • 2 Pages

    I love working with computers. All my friends and family knows I like to spend a lot of time working with computers, which allows for a good challenge. The problem is it’s hard with work and kids to find time to play around on the computers. First of all getting time to spend time on the computer is a real challenge. I work 40-50 hours a week at the Fenton Post Office. It is a 30 min drive one way and when I finally arrive home, I am greeted by my wife and kids. Cyber defense as a wonderful field to go into because of the challenges of finding the criminals, It allows me to provide a better living for my family, and the ability to work shorter days and be able to spend time with my family, I will also be able to work from home which will help me to get some of the chores done so my wife doesn’t have to do them by herself. It will also allow me to work indoors since I have spent the last 20 years working outdoors.…

    • 459 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Network Security

    • 1344 Words
    • 6 Pages

    Rain Ottis is a scientist at the Cooperative Cyber Defence Centre of Excellence (CCDCOE) in…

    • 1344 Words
    • 6 Pages
    Satisfactory Essays
  • Best Essays

    cyber espionage

    • 3973 Words
    • 16 Pages

    With the upbringing in the field of computer networks now spanning the globe, law and law enforcement agencies must address the international dimensions of crimes in cyberspace. Criminals in an electronic world can ignore international boundaries, since they can send information and execute commands via worldwide networks. Requiring no physical presence and facilitated by the presence of the Internet, electronic crimes are readily suited for international commission. The digital world has brought about a new type of clear and present danger: cyber war. Since information technology and the internet have developed to such an extent that they have become a major element of national power, cyber war has become the drumbeat of the day as nation-states are arming themselves for the cyber battle space. Many states are not only conducting cyber espionage, cyber reconnaissance and probing mission There is no specific area of the globe subject to the majority of cyber espionage attacks. Typically, they center on the most technologically advanced countries: the US, Japan and Russia, mostly. But a good number of operations have also been detected in problematic regions like the Middle East as well.…

    • 3973 Words
    • 16 Pages
    Best Essays
  • Good Essays

    In the world today, computers are used in every field. Be it a major space exploration or a small chore like cleaning our room. The use of computers has made our lives easier but at the same time a computer failure can make our lives miserable too. We trust computers more than we trust anything else these days. We use computers to communicate, share personal information, buy goods online, etc. We also trust computers with our safety. Starting from house alarm systems and other safety devices we have now moved on to using computers to Test Car Crashes.…

    • 979 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    High Tech Surveillance

    • 3994 Words
    • 16 Pages

    Introduction The Internet and other communication technologies build cyber-bridges across (and between) nations, cultures, communities and businesses. Verbal and visual images of world events such as the 11th September, 2001 bombings in the US (which for many is seen as a watershed and after which life may never be quite the same again), the tidal wave of Severe Acute Respiratory Syndrome (SARS) and the more recent Madrid bombing in March 2004 were communicated across the world in a matter of minutes. Likewise, it has a darker side when terrorists and other miscreants determined on undesirable or coercive behaviour are also known to have capitalised on technology’s connectivity. In the workplace, there is an increasing, almost obsessive, fear of industrial espionage and employee betrayal. Against this backdrop of rising environmental uncertainty and turbulence, Demb and Neubauer’s (1992)…

    • 3994 Words
    • 16 Pages
    Powerful Essays
  • Powerful Essays

    Haha

    • 9263 Words
    • 38 Pages

    Cyber warfare is increasingly becoming an important part of the concept of asymmetric warfare and attacks on national/international computer systems. It is fast gaining popularity as a means of damaging an enemy’s financial and social structures. Terrorists have discovered that the path to the fear and chaos that they crave most may be more easily achieved by a wide scale attack on infrastructure/economic targets, thus causing a general breakdown in society. Discuss the cyber aspect of asymmetric warfare and how to combat it. Focus on Pakistan in particular keeping in mind what protective infrastructure should be set in place for the future.…

    • 9263 Words
    • 38 Pages
    Powerful Essays