Академический Документы
Профессиональный Документы
Культура Документы
Cyberterrorism
Overview
Basic definition
There are some that say cyberterrorism does not exist and is really a
matter of hacking or information warfare. They disagree with labeling it
terrorism because of the unlikelihood of the creation of fear, significant
physical harm, or death in a population using electronic means,
considering current attack and protective technologies.
Background information
The high profile terrorist attacks in the United States on September 11,
2001 lead to further media coverage of the potential threats of
cyberterrorism in the years following. Mainstream media coverage
often discusses the possibility of a large attack making use of
computer networks to sabotage critical infrastructures with the aim of
putting human lives in jeopardy or causing disruption on a national
scale either directly or by disruption of the national economy.
Authors such as Winn Schwartau and John Arquilla are reported to have
had considerable financial success selling books which described what
were purported to be plausible scenarios of mayhem caused by
cyberterrorism. Many critics claim that these books were unrealistic in
their assessments of whether the attacks described (such as nuclear
meltdowns and chemical plant explosions) were possible. A common
thread throughout what critics perceive as cyberterror-hype is that of
non-falsifiability; that is, when the predicted disasters fail to occur, it
only goes to show how lucky we've been so far, rather than impugning
the theory.
Effects
Examples
Countering
On December 22, 2009, the White House named its head of Cyber
Security as Howard Schmidt. He will coordinate U.S Government,
military and intelligence efforts to repel hackers.
In fiction
• The Japanese cyberpunk manga, Ghost in the Shell (as well as its
popular movie and TV adaptations) centers around an anti-
cyberterrorism and cybercrime unit. In its mid-21st century Japan
setting such attacks are made all the more threatening by an
even more widespread use of technology including cybernetic
enhancements to the human body allowing people themselves to
be direct targets of cyberterrorist attacks.
• Cyberterrorism was featured in Dan Brown's Digital Fortress.
• Cyberterrorism was featured in Amy Eastlake's Private Lies.
• In the movie Live Free or Die Hard, John McClane (Bruce Willis)
takes on a group of cyberterrorists intent on shutting down the
entire computer network of the United States.
• The movie Eagle Eye involves a super computer controlling
everything electrical and networked to accomplish the goal.
• The plots of 24 Day 4 and now Day 7 include plans to breach the
nation's nuclear plant grid and then to seize control of the entire
critical infrastructure protocol.
• The Tom Clancy created series Netforce was about a FBI/Military
team dedicated to combating cyberterrorists.
• The whole point of Mega Man Battle Network is cyberterrorism.
Here are few key things to remember to pretect yourself from cyber-
terrorism:
what is Cyber-terrorism?
In the wake of the recent computer attacks, many have
been quick to jump to conclusions that a new breed of terrorism is on
the rise and our country must defend itself with all possible means. As
a society we have a vast operational and legal experience and proved
techniques to combat terrorism, but are we ready to fight terrorism in
the new arena – cyber space?
After April 2001 collision of US navy spy plane and Chinese fighter jet,
Chinese hackers launched Denial os Service (DoS) attacks against
American web sites.
A study that covered the second half of the year 2002 showed that the
most dangerous nation for originating malicious cyber attacks is the C.
Why do they use cyber attacks?
Cyber terrorist prefer using the cyber attack methods because of many
advantages for it.
It is Cheaper than traditional methods.
The action is very difficult to be tracked.
They can hide their personalities and location.
There are no physical barriers or check points to cross.
They can do it remotely from anywhere in the world.
They can use this method to attack a big number of targets.
They can affect a large number of people.
The Association of South East Asia Nations (ASEAN) has set plans for
sharing information on computer security. They are going to create a
regional cyber-crime unit by the year 2005.
The Central Government and the State Governments can play their
role effectively by making various rules and regulations dealing with
cyber terrorism and its facets from time to time. The Central
Government can, by notification in the Official Gazette and in the
Electronic Gazette, makes rules to carry out the provisions of the
Information Technology Act. Similarly, the State Government can, by
notification in Official Gazette, makes rules to carry out the provisions
of the Act. . If any Cyber Café Owner/Network Service Provider
failsologies. to maintain Log Register and records he shall be liable for
penalties as provided in the Act or any other Law, for the time being in
force. These provisions are sufficient to take care of illegal use of cyber
café for terrorist activities.
(3)Judicial response:
Conclusion:
The problem of cyber terrorism is multilateral having varied facets and
dimensions. Its solution requires rigorous application of energy and
resources. It must be noted that law is always seven steps behind the
technology. This is so because we have a tendency to make laws when
the problem reaches at its zenith. We do not appreciate the need of
the hour till the problem takes a precarious dimension. At that stage it
is always very difficult, if not impossible, to deal with that problem.
This is more so in case of offences and violations involving information
technology. One of the argument, which is always advanced to justify
this stand of non-enactment is that “the measures suggested are not
adequate to deal with the problem”. It must be appreciated that
“something is better then nothing”. The ultimate solution to any
problem is not to enact a plethora of statutes but their rigorous and
dedicated enforcement. The courts may apply the existing laws in a
progressive, updating and purposive manner. It must be appreciated
that it is not the “enactment” of a law but the desire, will and efforts to
accept and enforce it in its true letter and spirit, which can confer the
most strongest, secure and safest protection for any purpose. The
enforcement of these rights requires a “qualitative effort” and not a
“quantitative effort”. Thus, till a law dealing expressly with cyber
terrorism is enacted, we must not feel shy and hesitant to use the
existing provisions.