Cyberterrorism

From Citizendium
Revision as of 14:10, 1 April 2007 by imported>Andrew M. Colarik (Cyber Terrorism)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

Welcome to the Citizendium! We hope you will contribute much and well. You'll probably want to know how to get started as an author. Just look at the front page for other helpful "get started" links. Be sure to stay abreast of events via the Citizendium-L (broadcast) mailing list (do join!) and the blog. You can test out editing in the sandbox if you'd like. Again, welcome and have fun!

Cyber Terrorism

Introduction

It is commonly accepted that cyberspace was coined by William Gibson in his 1984 book entitled Neuromancer. From this work, cyberspace is referred to as a realm of electronic communications that allows community interaction as well as its information storage and retrieval. The use of cyberspace for terrorist means can therefore be considered Cyber Terrorism, or the convergence of cyber space and terrorism.

Formal/Published Definitions

The term Cyber Terrorism is actually represented in three forms of spelling throughout the known literature: Cyber Terrorism, Cyber-Terrorism, and Cyberterrorism. While any of these three spellings appears to be correct, each has their own tendency of usage. Cyber Terrorism is predominantly used extensively in government documents, Cyber-Terrorism tends to be a generalized usage in articles and reference works, and Cyberterrorism appears to have its origins in the early establishment of the term.

The following are published definitions of Cyber Terrorism:

“Cyberterrorism means premeditated, politically motivated attacks by sub national groups or clandestine agents, or individuals against information and computer systems, computer programs, and data that result in violence against non-combatant targets”. - Center for Strategic and International Studies (1998)

“cyberterrorism, refers to the convergence of cyberspace and terrorism. It covers politically motivated hacking operations intended to cause grave harm such as loss of life or severe economic damage”. - Denning (2001)

“a criminal act perpetrated by the use of computers and telecommunications capabilities, resulting in violence, destruction and/or disruption of services, where the intended purpose is to create fear by causing confusion and uncertainty within a given population, with the goal of influencing a government or population to conform to a particular political, social or ideological agenda.” - Lourdeau (2005)

“Cyber terrorism is a premeditated, politically motivated criminal act by sub-national groups or clandestine agents against information and computer systems, computer programs, and data that result in physical violence where the intended purpose is to create fear in non-combatant targets”. - Colarik (2006)

Please continue to add additional published definitions in chronological order.

Tactics & Uses

The use of cyberspace by terrorist groups tends to fall into four categories. These are:

I. The communication and coordination of terrorist activities.

This usage focuses around the utilization of communication technologies such as e-mail, newsgroups, Voice Over IP (VOIP) to coordinate activities between distributed cells and their respective leadership. It is also the usage of multimedia technologies such as websites and streaming video to disseminate terrorist activities and training materials.

II. The gathering of intelligence on potential targets.

With millions of databases and documents being stored electronically, the potential for tapping into such a wealth of data can not be underestimated. This usage relies on breaching information storage and retrieval systems for assessing potential targets in both the civilian and military domains.

III. A force multiplier for physical attacks by disabling emergency response systems.

The physical damage done by a terrorist attack can be magnified significantly by disrupting or disabling critical emergency response communication systems. This usage relies on attacking the critical communication infrastructure of ambulances, police and other coordinating organizations that must be mobilized in the event of a catastrophic attack by terrorists.

IV. Causing physical harm by electronically attacking control systems for dams, electrical systems, medical databases, and a host of other computer dependent infrastructures.

While this usage is focused around the disruption of supporting infrastructures such as power plants and dams, it also involves other infrastructure technologies that have people rely on for life saving services such as medical patient systems. A sustained power outage can spell death to those who rely on it for medical treatment; a dam opened remotely may flood an area causing severe damage and loss of life; and a blood type changed or an allergy removed prior to surgery could spell instant death if critical support systems are penetrated and attacked.

Methods

In nearly all cases, the methods employed by Cyber Terrorists are consistent with technologies employed by hackers, crackers and cyber criminals.

These include the following:

Viruses and Worms; Trojan Horses; Social Engineering; Physical Accesses; Eavesdropping and Interceptions; Session Hijacking; Firewall, Web Server, Router and Gateway Penetrations; Domain Name Server Attacks; and many other electronic attack forms.

Readings & Sources

Anti-Terrorism Coalition (ATC). Database of Terrorist Websites and eGroups at [1]

Bosch, O. (2002). Cyber Terrorism and Private Sector Efforts for Information Infrastructure Protection. Creating Trust in Critical Networks Workshop of the ITU Strategy and Policy Unit.

Center for Strategic and International Studies (1998). Cybercrime, Cyberterrorism, Cyberwarfare, Averting an Electronic Waterloo. CERT Coordination Center (2005). International Coordination for Cyber Crime and Terrorism in the 21st Century at [2]

Colarik, A. (2006). Cyber Terrorism: Political and Economic Implications. Idea Group Publishing.

David, M. & Sakurai, K. (2003). Combating Cyber Terrorism: Countering Cyber Terrorist Advantages of Surprise and Anonymity. Proceedings of the 17th International Conference on Advanced Information Networking and Applications.

Denning, D. (2001). Activism, Hacktivism, and Cyberterrorism: The Internet as a tool for Influencing Foreign Policy. Internet and International Systems: Information Technology and American Foreign Policy Decisionmaking Workshop.

Denning, D. (2000). Cyberterrorism, Testimony before the Special Oversight Panel on Terrorism Committee on Armed Services U.S. House of Representatives.

Denning, D. (2001). Chapter Eight, Activism, Hacktivism, and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy. Networks and Netwars: The Future of Terror, Crime, and Militancy at [3]

Denning, D. (2001). Cyberwarriors: Activists and terrorists turn to cyberspace. Harvard International Review. 23(2).

Flemming, P. & Stohl, M. (2000). Myths and Realities of Cyberterrorism. International Conference on Countering Terrorism Through Enhanced Cooperation at [4]

Gibson, W. (1984). Neuromancer. Berkley Publishing Group.

Institute for Security Technology Studies at Dartmouth College (2002). Cyber Security of the Electric Power Industry. Jachowicz, L. (2003). How to prevent and fight international and domestic Cyberterrorism and Cyberhooliganism at [5]

Janczewski, L. & Colarik, A. (2005). Managerial Guide for Handling Cyber-Terrorism and Information Warfare. Idea Group Publishing.

Janczewski, L. & Colarik, A. (2007). Cyber Warfare and Cyber Terrorism. Information Science Reference.

Lawson, S. (2005). Information Warfare: An Analysis of the Threat of Cyber Terrorism Towards the US Critical Infrastructure. SANS GSEC.

Lewis, J. (2002). Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats. Center for Strategic and International Studies.

Lourdeau, K. (2005). Testimony of Keith Lourdeau, Deputy Assistant Director, Cyber Division, FBI Before the Senate Judiciary Subcommittee on Terrorism, Technology, and Homeland Security, Cyber Terrorism at [6]

Nagpal, R. (2002). Cyber Terrorism in the Context of Globalization. Proceedings of the 2nd World Congress on Informatics and Law.

Nisbet, C. (2004). Cybercrime and cyber terrorism. Securing Electronic Business Processes – Highlights of the Information Security Solutions Conference 2003. Vieweg.

Pollitt, M. (2005). Cyberterrorism – Fact or Fancy? at [7]

Raghavan, T. (2003). In Fear of Cyberterrorism: An Analysis of the Congressional Response. Journal of Law, Technology & Policy. 1.

Rogerson, S. (2003, August). Cyber terrorism and the threat to democracy. IMIS Journal. 13(4).

Sofaer, A. & Goodman, S. (2000, August). A Proposal for an International Convention on Cyber Crime and Terrorism at [8]

Tan, K. (2003). Confronting Cyberterrorism with Cyber Deception. Master’s Thesis. Naval Postgraduate School.

Tyrer, H. (2002). Chapter 16: Cyber-terrorism. Science and Technology of Terrorism and Counterterrorism. Marcel Dekker, Inc. United States House of Representatives Committee on Science (2005). Hearing Charter: Cyber Terrorism – A View From The Gilmore Commission at [9]

United States Department of Energy (2005). 21 Steps to improve Cyber Security of SCADA Networks. President’s Critical Infrastructure Protection Board at [10]

Verton, D. (2003). Black Ice: The Invisible Threat of Cyber-Terrorism. McGraw-Hill.

Warren, M. & Furnell, S. (2005). Cyber-Terrorism – Political Evolution of the Computer Hacker at [11]

Yurcik, W. (1999). Adaptive Multi-Layer Network Survivability: A Unified Framework for Countering Cyber-Terrorism. Proceedings of the Workshop on Countering Cyber-Terrorism.