Cyberterrorism

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 12

Hello

Cyberterrorism and Terrorism


Terrorism is a multifaceted phenomenon: there are political,
legal, psychological, philosophical, historical, technological and
other aspects. It was not by chance that the international
community did not manage to work out a generally acceptable
legal definition of terrorism, although the essential content of
this phenomenon is clear to everyone. Illegal violence, as a rule,
with the use of weapons, and the desire to intimidate the general
population, and innocent victims are present, and in relation to
acts of terrorism that go beyond state borders, into cross-border
computer networks, information systems are an international
element.

Cyberterrorism is a complex of illegal actions that threaten state


security, the individual and society. May lead to damage to
material objects, distortion of information or other problems.
The main goal of cyber-terrorism is to obtain an advantage in
solving social, economic and political tasks. The world is
rapidly growing number of smart IoT-devices. However, they all
give rise to targeted attacks with a view to terror or blackmail.
Moreover, even now many factories and plants use such devices
in automated process control systems (APCS) that
cybercriminals can hack into for the purpose of terror of the
population: for example, by disabling the plant or even by an
NPP explosion. Of course, at the moment such attacks have not
been noticed, but who gives a guarantee that they will not be in
the future? In their actions, criminals are actively using all the
possibilities of modern technologies, including modern gadgets
and software products, electronic devices, advances in
microbiology and genetic engineering. Officially, cyberterrorism
is an act committed by one person or independent groups
consisting of several members. If representatives of
governmental or other state structures take part in the
performance of actions falling under this definition, this is
considered manifestations of cyber war. The impact of such
actions on economic and geopolitical processes is often
exaggerated by journalists in the media and screenwriters of
Hollywood blockbusters, which can lead to an incorrect
assessment of the situation. How are cyberattacks actually
carried out and what can be done to counter them?

Now we will try to figure it out.

Goals of cyberterrorism:

The actions of cyberterrorists are aimed at:


 Hacking computer systems and gaining access to personal
and banking information, military and government
confidential data;
 Disabling hardware and software, jamming, power failure;
 Data theft by hacking computer systems, virus attacks,
software bookmarks;
 Leak of secret information in open access;
 Spreading misinformation using captured media channels;

The main goal of cyber-terrorism is to obtain advantages in


solving political, social and economic issues. In order to achieve
the desired goal, cyber-terrorists use special software used to
hack the computer systems of companies and organizations,
conduct attacks against remote servers of companies and
organizations.

Types of Cyber Terrorism:

Simple - Unstructured

Using hacks against information systems, programs are usually


used by someone else (not by cyber-terrorists themselves). As a
rule, the easiest type of attack is, the losses from it are minimal
or insignificant.
Advanced - Structured

Ability to conduct more complex attacks against multiple


systems or networks and, possibly, changing or creating basic
hacking tools. The organization has a certain structure,
management and other functions of full-fledged organizations.
The participants of such groups also conduct training for new
hackers.

Complex - Coordinated

The ability for a coordinated attack that can cause a massive


violation of the country's security systems. The ability to create
sophisticated hacking tools. They have a strict structure, often
organizations that are capable of sensibly analyzing their
actions, developing some kind of attack plans and so on.

What distinguishes cyberterrorists from


ordinary terrorists?

Cyber-terrorists do not plant bombs, do not take hostages. They


threaten by computer means: by disabling a large computer
network of some company, by destroying the data of banks'
customers, even by disabling “smart” factories and power
plants, etc. for the purpose of obtaining a ransom. To achieve
the goals can be used various methods:
illegal access to state and military archives with secret
information, details of bank accounts and payment systems,
personal data;

control over infrastructure facilities to influence their


performance up to and including the decommissioning of
individual components and the complete shutdown of life
support systems;

stealing or destroying information, software or technical


resources by introducing various types of malware;

false threats of attacks that may destabilize the economic or


socio-political situation.

The methods of conducting these and similar operations are


constantly changing due to the development of information
security systems that are used in various computer networks.
The relationship between the level of development of
information infrastructure and the number of hacker attacks has
been revealed. The higher the level of globalization and the use
of automation systems of various processes in a given region,
the greater the likelihood of conducting cyber attacks of a
terrorist nature.
Equally under attack by network terrorists are states,
international organizations, large corporations and
relatively small companies, politicians and other well-
known personalities, as well as randomly chosen people.
The actions of cyberterrorists can be directed at civilian
and military facilities.

Some experts are inclined to believe that the energy and


telecommunications industries, air traffic control, financial
institutions, enterprises of the defense complex and other
facilities may be more susceptible to terrorist cyber
attacks. The targets of the attacks may be equipment,
software, network data transfer protocols, stored
information, information technology specialists and
support staff.

Terrorist groups are actively using the latest developments in the


field of information technology to maintain communication,
address organizational and financial issues, plan operations and
monitor their implementation. They can be financed or even
controlled by individual states.
All the major terrorist groups have their own websites, their
participants can be found on numerous forums and in chat rooms.
Social networks and other similar resources on the Internet are
actively used to promote and recruit new members by forbidden
groups. With the help of modern technology, any messages are
easily encrypted, the necessary schemes, photos, documents and
other materials are posted. By entering the corresponding query in
any search network, you can find a lot of pages describing the
manufacture of weapons and explosives from improvised means.

Many groups use the fact that the Internet does not have to be
under their real name, so hackers are known under pseudonyms.
At the same time, it is necessary to distinguish cyberterrorists
from other hackers who write and distribute viruses and other
malicious software for personal enrichment, are computer
fraudsters or hooligans. Terrorism of their actions are when they
have serious consequences: the destruction or death of people.
Many radical groups try to make their acts produce the greatest
possible response, and the maximum number of people around the
world have learned about them.
There is a direct relationship between the degree of development
of the information infrastructure, the computerization of the
country and the number of similar terrorist attacks. Currently, the
problem of cyber-terrorism is particularly relevant for countries
leading in the use of satellite communication systems and global
networks. According to experts, cyber-terrorism is a serious threat
to humanity, comparable in effectiveness to weapons of mass
destruction. Indeed, there is no state in the world that would be
fully protected from attacks by cyber-terrorists, as evidenced by
the large-scale operation Red October that has been successfully
conducted over the past five years. The main objectives of the
criminals were government and diplomatic departments and
scientific organizations of the most developed countries of the
world.

The threat of cyber-terrorism forces various states to cooperate in


the fight against it. This is done by international bodies and
organizations: the UN, the Council of Europe, the International
Organization of Experts, Interpol. The UN plays a central role in
coordinating efforts in this area, first of all, its main bodies: the
General Assembly (GA), the Security Council, as well as various
multilateral informal partnerships.
how to deal with cyberterrorism?
The main directions of the world community’s opposition to
cyber terrorism can be:

- development and strengthening of cooperation between states,


law enforcement agencies, special services, international
organizations in the field of ensuring information security
against possible threats of cyber-terrorism and transnational
computer crime;

- the creation of national units to combat cyberterrorism, the


formation of an international contact point for assistance in
responding to transnational computer incidents;

- establishing and expanding the exchange of information about


the threats of computer attacks, about signs, facts, methods and
means of using GIS for terrorist purposes;

- exchange of experience and best practices for monitoring


Internet information resources, searching and tracking the
content of terrorist sites, conducting forensic computer expertise
in this area;

- increasing the effectiveness of cooperation between bodies and


structures of states whose activities, in particular, are related to
countering terrorism, ensuring the security of information and
telecommunications networks, and ensuring internal information
security;

- bringing and explaining the policies of states and the world


community in the field of the global fight against terrorism, the
inadmissibility of double standards;

- taking preventive measures aimed at forming a negative


attitude towards the population to all possible manifestations of
terrorism, to using violence to achieve relevant goals;

- bringing to criminal responsibility of persons involved in


cyberterrorism.

Conclusion
In connection with the development of technology, the threat of
cyber-terrorism is gradually compared in importance with the
rest of its manifestations.

Indeed, cyberterrorism is one of the most important problems


nowadays, but one should not confuse such concepts as
cybercrime and cyber terrorism because they are completely
different because cybercriminals do it because of their greedy
motives, while cyber terrorists do it against the state and
government authorities.
And I think that to combat this phenomenon requires the
mobilization of the entire world community. The UN, the
Council of Europe, Interpol and other international
organizations are closely involved in this problem. In the face of
joint danger, even irreconcilable rivals unite, having substantial
contradictions on a number of key issues.

You might also like