As the driving force behind globalization and modern progress, the Internet has enabled us to communicate with others across the world almost instantly and provides a medium for cultural, informational, and ideological exchange. It provides a previously unimaginable level of interconnectedness that benefits business, government, and civilians alike. But for all the good that comes from the Internet, this “series of tubes,” as described by Senator Ted Stephens, can be used for more nefarious purposes. While the Internet affords people living in starkly different circumstances around the world access to the same information, it also acts as an equalizer between governments and non-state actors. This level of exposure and uncertainty creates a new security dilemma faced by all states.
As a neorealist, James Adams rightfully views the Internet as an anarchic system and declares, “Cyberspace has become a new international battlefield.” 1.) 2.) Is Cyber-Terrorism the New Normal? With recent news stories involving serious attacks on Sony and its PlayStation Network, Microsoft’s Xbox Live network, alongside other high profile attacks on the Tor project and North Korea’s Websites, has cyber-terrorism become a very real and dangerous reality for enterprises to battle alongside other threats?
Let’s start from the beginning. What is the difference between cyber-terrorism, vandalism, or even war? Looking back to the 90s and early 2000s, websites were commonly defaced just to satisfy an attacker’s ego. Just like graffiti, this is a great example of vandalism. A more recent example of this sort of attack was the recent defacement of the U.S. If you consider malware like Stuxnet discovered in June 2010 and nicknamed the “world’s first digital weapon” things change drastically.
What is Cyber-terrorism? Serge Krasavin Ph.D.
MBAv What is Cyber-terrorism? In the wake of the recent computer attacks, many have been quick to jump to conclusions that a new breed of terrorism is on the rise and our country must defend itself with all possible means. As a society we have a vast operational and legal experience and proved techniques to combat terrorism, but are we ready to fight terrorism in the new arena – cyber space? A strategic plan of a combat operation includes characterization of the enemy’s goals, operational techniques, resources, and agents. Prior to taking combative actions on the legislative and operational front, one has to precisely define the enemy. Sr119. Cyberterrorists to target critical infrastructure. E.J.
Hilbert, the heads Kroll's cyber unit for Europe, the Middle East and Africa, told CNBC that hundred, if not thousands attacks were already taking place—and that more attacks were coming. Read MoreTop 5 cybersecurity risks for 2015 "There are hundreds of attacks taking place against the U.K. and U.S. nuclear industry and financial system every day. There is this non-stop badgering of the system by hackers who are hoping that one day the system will crack," said Hilbert, a former FBI agent in the cybercrime and counterterrorism field.
He was emphatic that national governments were unprepared for a cyberattack on critical infrastructure. "These tests don't do what the bad guys are going to do, they don't go far enough. If an attack is so bad that all else has failed, governments can always choose to shut down their own infrastructure systems. With that in mind, Hilbert said "it might be better to fight the attack then shut down the system. " Obama Says Cyberterrorism Is Country's Biggest Threat, U.S. Government Assembles "Cyber Warriors" Cybersecurity has become a U.S. government priority in the past year, after a string of denial of service (DOS) attacks on government computers and hacking attempts of the CIA’s main computer, as well as on French, Israeli and British defense agencies.
But while many of these sophisticated cyberattacks have sought to inconvenience governmental agencies that have little impact on day-to-day public life, many in the government are increasingly worried about an attack on the energy sector. Just last week, the Internet security company Kaspersky Lab said it had uncovered the most sophisticated cyberthreat it had ever seen, called The Mask.
Experts there said that the operation was most likely from a Spanish-speaking country and will likely target natural gas and oil companies. Cyber Terrorism and IR Theory: Realism, Liberalism, and Constructivism in the New Security Threat.