Skip to main content

Cyberterrorism: Latest Threat to National Computer Security? Threat Is Real, but Often Exaggerated

By Amy Zalman, Ph.D.

The immediate aftermath of 9/11 produced several interrelated fears about the role that the Internet and networked computers might play in a terrorist attack. First, the government and the private sector worried that information housed on computers might be vulnerable. Those who seek to threaten American national security could do so if they obtained weapons system information or substantial financial information from banks.

A second, related concern, was that the networks over which this information is transmitted could be compromised. Their compromise would of course give the criminally-minded among us access to information, as well as the opportunity to influence or manipulate its flow.

Defining cyberterrorism has been a challenge. Cyberterrorism is not necessarily designed to cause a terrifying visual spectacle that can be exploited for propaganda purposes, as conventional terrorism is. Defining cyberterrorism as broadly as possible serves those who want to expand control over cyberspace. Even though only a small amount of cybercrime could actually be designated terrorism, the term 'cyberterrorism' creates a subliminal linkage in listener's minds to groups such as Al Qaeda and other global jihadists. The government and private industry can in turn use fears about Al Qaeda to create support for tighter controls on electronic information.

Cyberterrorism, Is it a Threat?

A number of experts conclude that while the threat of cyberterrorism does exist, it is routinely exaggerated by various actors for political, or financial gain). As they note, the United States (and indeed, much of the rest of the world) is profoundly dependent on computer networks for its daily well functioning. It is important to safeguard critical infrastructure from vulnerability to attack.
At the same time, maintaining a state of anxiety over that vulnerability can be profitable. As Gabriel Weimann pointed out in Cyberterrorism: How Real is the Threat? " …an entire industry has emerged to grapple with the threat of cyberterrorism … private companies have hastily deployed security consultants and software designed to protect public and private targets … the federal government requested $4.5 billion for infrastructure security [following 9/11], and the FBI now boasts more than one thousand "cyber investigators."

U.S. National Computer Security Efforts


The Patriot Act Addresses cyberterrorism: The Bush Administration has offered to counter the threat of cyberterrorism by expanding the punishments for those committing cybercrimes, and pushing for Internet Service Providers to disclose information to the government for investigations. Both of these provisions appear in the US Patriot Act (the 2001 Act was updated in 2005). According to a White House press release, the act also usefully "allows Internet providers, without fear of being sued, to give information to law enforcement when it would help law enforcement prevent a threat of death or serious injury." However, a September, 2007 ruling by Manhattan federal judge Victor Marrero on the constitutionality of National Security Letters (NSLs) Challenges the Patriot Act provision.

The Patriot Act allowed the government to issue NSLs requesting customer information without legal approval to a company, and also put 'gag orders' on companies over their ability to disclose their receipt of these letters. Following an ACLU lawsuit brought on behalf of an Internet company (which remains anonymous), Judge Marrero ruled the gag order violates the first amendment right to free speech, and the lack of judicial oversight violates the fourth amendment prohibition of "unreasonable search and seizure."

New offices address cyberterrorism: The Department of Homeland Security houses a National Cyber Security Division which aims to build a national cyberspace response system, and to put into use a cyber-risk management program to protect critical infrastructure.

Additionally, the Air Force has established a provisional Cyber Command, which will coordinate with air and space operations to conduct wars in cyberspace.

Source:  http://terrorism.about.com/od/issuestrends/a/Cyberterrorism.htm

Comments

Popular posts from this blog

Terrorism in Africa

According to state.gov, ISIS was defeated a few years ago. However, the organization's presence and existence remain conspicuous in Africa. Ongoing conflicts in Somalia, Ethiopia, Mozambique, Nigeria, and Burkina Faso demonstrate that ISIS has shifted its focus away from Iraq and Syria. Although ISIS lacks a clear hierarchy like Al-Qaeda, its followers and supporters wholeheartedly believe in its strong ideology. In 2014, the United States led the formation of a broad international coalition known as 'The Global Coalition to Defeat ISIS' to combat the organization during the height of the Syrian and Iraqi conflict. The primary objectives of this 83-member coalition are to degrade and defeat ISIS, which poses a threat to international peace and security. ISIS has brought thousands of foreign fighters from around the world to combat zones like Syria and Iraq, and it has used technology to promote its violent extremist ideology and instigate terrorist attacks. For example, t

Sedition Act 1948 should have been repealed a long time ago. But why?

THE Sedition Act 1948 is a legislative measure that was enacted in Malaysia during the colonial era, designed to curb any form of speech or expression that was deemed to be seditious in nature with the aim of maintaining public order and security. The Sedition Act has been subject to much debate and criticism, with some arguing that it is a violation of freedom of speech and expression. Despite this, the Act remains in force in Malaysia to this day, albeit with some amendments made over the years. Although I concur with the abolition of this Act, it is imperative that a comparable new legislation be enacted to address the escalating prevalence of racially and religiously bigoted remarks that have been unsettling our distinctive multicultural and multi-religious society as of late. An instance that exemplifies the prudent decision-making of the governing body is the substitution of the Internal Security Act of 1960 with the Security Offences (Special Measures) Act 2012 (SOSMA). This rep

THE HISTORY OF TERRORISM: MORE THAN 200 YEARS OF DEVELOPMENT

The history of terrorism dates back at least 1500 years when Jewish resistance groups (66 - 72 A.D.) known as Zealots killed Roman soldiers and destroyed Roman property. The term assassin comes from a Shi'ite Muslim sect (Nizari Isma'ilis - also known as hashashins "hashish-eaters") fighting Sunni Muslims (1090 - 1275) and during Medieval Christendom resisting occupation during the Crusades (1095-1291). The hashashins were known to spread terror in the form of murder, including women and children. The brotherhood of Assassins committed terror so as to gain paradise and seventy-two virgins if killed and to receive unlimited hashish while on earth. The modern development of terrorism began during the French Revolution's Reign of Terror (1793 - 1794). During this period the term terrorism was first coined. Through the past two hundred years, terrorism has been used to achieve political ends and has developed as a tool for liberation, oppression, and i