Cyberterrorism
Cyberterrorism is the use of the Internet to conduct violent acts that result in, or threaten, the loss of life or significant bodily harm, in order to achieve political or ideological gains through threat or intimidation. Acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet by means of tools such as computer viruses, computer worms, phishing, malicious software, hardware methods, and programming scripts can all be forms of internet terrorism.[1] Cyberterrorism is a controversial term. Some authors opt for a very narrow definition, relating to deployment by known terrorist organizations of disruption attacks against information systems for the primary purpose of creating alarm, panic, or physical disruption. Other authors prefer a broader definition, which includes cybercrime. Participating in a cyberattack affects the terror threat perception, even if it isn't done with a violent approach.[2] By some definitions, it might be difficult to distinguish which instances of online activities are cyberterrorism or cybercrime.[3]
Cyberterrorism can be also defined as the intentional use of computers, networks, and public internet to cause destruction and harm for personal objectives. Experienced cyberterrorists, who are very skilled in terms of hacking can cause massive damage to government systems and might leave a country in fear of further attacks.[4] The objectives of such terrorists may be political or ideological since this can be considered a form of terror.[5]
There is much concern from government and media sources about potential damage that could be caused by cyberterrorism, and this has prompted efforts by government agencies such as the Federal Bureau of Investigation (FBI), National Security Agency (NSA), and the Central Intelligence Agency (CIA) to put an end to cyber attacks and cyberterrorism.[4]
There have been several major and minor instances of cyberterrorism. Al-Qaeda utilized the internet to communicate with supporters and even to recruit new members.[6] Estonia, a Baltic country which is constantly evolving in terms of technology, became a battleground for cyberterrorism in April 2007 after disputes regarding the relocation of a WWII soviet statue located in Estonia's capital Tallinn.[3]
Simple-Unstructured: the capability to conduct basic hacks against individual systems using tools created by someone else. The organization possesses little target-analysis, , or learning capability.
command-and-control
Advanced-Structured: the capability to conduct more sophisticated attacks against multiple systems or networks and possibly, to modify or create basic hacking-tools. The organization possesses an elementary target-analysis, command-and-control, and learning capability.
Complex-Coordinated: the capability for a coordinated attack capable of causing mass-disruption against integrated, heterogeneous defenses (including cryptography). Ability to create sophisticated hacking tools. Highly capable target-analysis, command-and-control, and organization learning-capability.
In 1996, a computer hacker allegedly associated with the White Supremacist movement temporarily disabled a Massachusetts ISP and damaged part of the ISP's record keeping system. The ISP had attempted to stop the hacker from sending out worldwide racist messages under the ISP's name. The hacker signed off with the threat: "you have yet to see true electronic terrorism. This is a promise."
In 1998, Spanish protesters bombarded the Institute for Global Communications (IGC) with thousands of bogus e-mail messages. E-mail was tied up and undeliverable to the ISP's users, and support lines were tied up with people who couldn't get their mail. The protestors also spammed IGC staff and member accounts, clogged their Web page with bogus credit card orders, and threatened to employ the same tactics against organizations using IGC services. They demanded that IGC stop hosting the Web site for the Euskal Herria Journal, a New York-based publication supporting Basque independence. Protestors said IGC supported terrorism because a section on the Web pages contained materials on the terrorist group , which claimed responsibility for assassinations of Spanish political and security officials, and attacks on military installations. IGC finally relented and pulled the site because of the "mail bombings".
ETA
In 1998, ethnic attempted to disrupt Sri Lankan embassies by sending large volumes of e-mail. The embassies received 800 e-mails a day over a two-week period. The messages read "We are the Internet Black Tigers and we're doing this to disrupt your communications." Intelligence authorities characterized it as the first known attack by terrorists against a country's computer systems.[74]
Tamil guerrillas
During the conflict in 1999, NATO computers were blasted with e-mail bombs and hit with denial-of-service attacks by hacktivists protesting the NATO bombings. In addition, businesses, public organizations and academic institutes received highly politicized virus-laden e-mails from a range of Eastern European countries, according to reports. Web defacements were also common. After the Chinese Embassy was accidentally bombed in Belgrade, Chinese hacktivists posted messages such as "We won't stop attacking until the war stops!" on U.S. government Web sites.
Kosovo
Since December 1997, the Electronic Disturbance Theater (EDT) has been conducting Web sit-ins against various sites in support of the Zapatistas. At a designated time, thousands of protestors point their browsers to a target site using software that floods the target with rapid and repeated download requests. EDT's software has also been used by animal rights groups against organizations said to abuse animals. Electrohippies, another group of hacktivists, conducted Web sit-ins against the WTO when they met in Seattle in late 1999. These sit-ins all require mass participation to have much effect, and thus are more suited to use by activists than by terrorists.[27]
Mexican
In 2000, a investigation revealed that the government was using software developed by computer companies affiliated with Aum Shinrikyo, the doomsday sect responsible for the sarin gas attack on the Tokyo subway system in 1995. "The government found 100 types of software programs used by at least 10 Japanese government agencies, including the Defense Ministry, and more than 80 major Japanese companies, including Nippon Telegraph and Telephone."[75] Following the discovery, the Japanese government suspended use of Aum-developed programs out of concern that Aum-related companies may have compromised security by breaching firewalls. gaining access to sensitive systems or information, allowing invasion by outsiders, planting viruses that could be set off later, or planting malicious code that could cripple computer systems and key data system.[76]
Japanese
In March 2013, The New York Times reported on a pattern of cyber attacks against U.S. financial institutions believed to be instigated by as well as incidents affecting South Korean financial institutions that originate with the North Korean government.[35]
Iran
In August 2013, media companies including The New York Times, and the Huffington Post lost control of some of their websites after hackers supporting the Syrian government breached the Australian Internet company that manages many major site addresses. The Syrian Electronic Army, a hacker group that has previously attacked media organisations that it considers hostile to the regime of Syrian president Bashar al-Assad, claimed credit for the Twitter and Huffington Post hacks in a series of Twitter messages. Electronic records showed that NYTimes.com, the only site with an hours-long outage, redirected visitors to a server controlled by the Syrian group before it went dark.[77]
Pakistani Cyber Army is the name taken by a group of who are known for their defacement of websites, particularly Indian, Chinese, and Israeli companies and governmental organizations, claiming to represent Pakistani nationalist and Islamic interests.[78] The group is thought to have been active since at least 2008,[79] and maintains an active presence on social media, especially Facebook. Its members have claimed responsibility for the hijacking of websites belonging to Acer,[80] BSNL,[81] India's CBI, Central Bank, and the State Government of Kerala.[82][83]
hackers
British hacker , sentenced to 2 years in youth detention, posed as CIA chief to access highly sensitive information.[84] He also "cyber-terrorized" high-profile U.S. intelligence officials such as then CIA chief John Brennan or Director of National Intelligence James Clapper.[85][86] The judge said Gamble engaged in "politically motivated cyber terrorism".[87]
Kane Gamble
In March 2021 hackers affiliated with Russia were reported to have targeted Lithuanian Officials and decision makers. The cyber-espionage group APT29 which is believed to have carried out the attacks utilized the country's own IT infrastructure against organizations involved in the development of a vaccine.[88]
COVID-19
On 7 May 2021, the Colonial Pipeline was hit with a cyberattack that disrupted oil distribution. The Colonial Pipeline is a pipeline that controls almost half (45%) of the oil that runs through the East Coast of the United States. This attack caused the company to turn off the pipeline, which it had never done before. Thus, many people panicked buying gasoline at gas stations, and the government thought this attack would quickly spread. Ultimately, the Colonial Pipeline paid nearly an amount of 5 million dollars worth of cryptocurrency. Even though the Colonial paid all the money, the system did not turn on as rapidly as it used to.[90] The hacker accused of this attack is a group called DarkSide. The money that the Colonial paid went to DarkSide, but there are other entities involved as well. For now, DarkSide has decided to discontinue its operations.[91]
[89]
On 30 May 2021, JBS was exposed to a cyberattack of ransomware which delayed the plant's meat production. JBS is the world's largest meat producer that provides meat-related products for people. This attack caused the shutdown of all nine beef factories in the United States and disrupted poultry and pork production. In addition, labor had to be cut due to the closings of the factories, and the cost of meat increased due to no meat being produced. Ultimately, JBS had to pay 11 million dollars worth of cryptocurrency to regain control.[93] A group called REvil was responsible for the attack. REvil is a group based in the country of Russia that is also one of the most productive ransomware organizations.[94]
[92]
In the summer of 2021, crimes committed in Cyprus,[96] Israel[97] and Lithuania[98] were classified by experts as Internet terrorism. Anonymous persons informed law enforcement authorities through the internet about mined business centers and office buildings. Main target was the gambling company Affise. According to Ambassador John R. Bolton,[99] these occurrences are vivid examples of Internet terrorism. Amb. Bolton believes that they are consequences of financial conflict stirred among the owners of Affise, PlayCash and "CyberEye-25" group. According to the expert, all three companies gain illicit income associated with criminal activities on the Internet.
[95]
In early December 2021 it was reported least nine U.S State Department had their phones hacked by an unknown attacker. All nine employees had Apple iPhones. The hack, which took place over several months, was done through the use of iMessages that had a software attached that when sent, without needing to be interacted with, installed spyware known as Pegasus. The software used was developed and sold by an Israel-based spyware development company named .[100]
NSO Group
In December 2021 at least five US defense and tech firms have been hacked by a group operating from China. The group took advantage of an exploit used in these organization's software to conduct their campaign which came to light in upcoming months. The target of these breaches were passwords as well as having the goal of intercepting private communications. As of right now the extent of the damage is unclear as the breaches are ongoing.
[101]
The cyberpunk manga, Ghost in the Shell (as well as its popular movie and TV adaptations) centers around an anti-cyberterrorism and cybercrime unit. In its mid-21st century Japan setting such attacks are made all the more threatening by an even more widespread use of technology including cybernetic enhancements to the human body allowing people themselves to be direct targets of cyberterrorist attacks.
Japanese
In the movie , John McClane (Bruce Willis) takes on a group of cyberterrorists intent on shutting down the entire computer network of the United States.
Live Free or Die Hard
The movie involves a super computer controlling everything electrical and networked to accomplish the goal.
Eagle Eye
The plots of Day 4 and Day 7 include plans to breach the nation's nuclear plant grid and then to seize control of the entire critical infrastructure protocol.
24
The Tom Clancy created series was about an FBI/Military team dedicated to combating cyberterrorists.
Netforce
Much of the plot of is centered around cyberterrorism.
Mega Man Battle Network
In the 2009 Japanese animated film , an artificial intelligence cyber-terrorist attempts to take control over the world's missiles in order to "win" against the main characters that attempted to keep it from manipulating the world's electronic devices.
Summer Wars
In the 2012 film , part of the James Bond franchise, main villain Raoul Silva (Javier Bardem) is an expert cyberterrorist who is responsible for various cyberterrorist incidents in the past.
Skyfall
Cyberterrorism plays a role in the 2012 video game , first when main antagonist Raul Menendez cripples the Chinese economy with a cyberattack and frames the United States for it, starting a new Cold War between the two powers. Later, another cyberattack with a computer worm leads to Menendez seizing control of the entire U.S drone fleet. Finally, one of the game's endings leads to another attack similar to the latter, this time crippling the U.S' electrical and water distribution grids. An alternate ending depicts the cyberattack failing after it is stopped by one of the game's characters pivotal to the storyline.
Call of Duty: Black Ops II
The plot of the 2014 video game is heavily influenced by cyber-terrorism. In which players take control of the game's protagonist, Aiden Pierce, an accused murder suspect, who hacks into a ctOS (Central Operating System), giving him complete control of Chicago's mainframe in order to hunt down his accusers.
Watch Dogs
In the television series , the main plot line follows groups of hackers who engage in cyber terrorism as well as other events.
Mr. Robot
Alexander, Yonah; Swetman, Michael S. (2001). Cyber Terrorism and Information Warfare: Threats and Responses. Transnational Publishers Inc., U.S. 978-1-57105-225-4.
ISBN
Bibi van Ginkel,
"The Internet as Hiding Place of Jihadi Extremists" (International Centre for Counter-Terrorism – The Hague, 2012)
Colarik, Andrew M. (2006). Cyber Terrorism: Political and Economic Implications. Idea Group, U.S. 978-1-59904-022-6.
ISBN
Hansen, James V.; Benjamin Lowry, Paul; Meservy, Rayman; McDonald, Dan (2007). "Genetic programming for prevention of cyberterrorism through dynamic and evolving intrusion detection". Decision Support Systems. 43 (4): 1362–1374. :10.1016/j.dss.2006.04.004. SSRN 877981.
doi
Verton, Dan (2003). Black Ice: The Invisible Threat of Cyber-terrorism. Osborne/McGraw-Hill, U.S. 978-0-07-222787-1.
ISBN
Weimann, Gabriel (2006). . United States Institute of Peace, U.S. ISBN 978-1-929223-71-8.
Terror on the Internet: The New Arena, the New Challenges
Blau, John (November 2004). . NetworkWorld. Archived from the original on 6 December 2004. Retrieved 20 March 2005.
"The battle against cyberterror"
Gross, Grant (November 2003). . ComputerWorld. Retrieved 17 March 2005.
"Cyberterrorist attack would be more sophisticated that past worms, expert says"
Poulsen, Kevin (August 2004). . SecurityFocus News. Retrieved 17 March 2005.
"South Pole 'cyberterrorist' hack wasn't the first"
Thevenet, Cédric (November 2005). (PDF) (in French). terrorisme.net.
"Cyberterrorisme, mythe ou réalité?"
U.S. Army Cyber Operations and Cyber Terrorism Handbook 1.02
Rayamajhi, Shreedeep (2009). .
"Research Paper -A Synopsis on Cyber Terrorism and Warfare"
Rolón, Darío N., (2013) , Latinamerican's new security thinking, Clacso.
Control, vigilancia y respuesta penal en el ciberespacio
Costigan, Sean (2012). . Ashgate. ISBN 978-1-4094-2754-4. Archived from the original on 2 April 2015. Retrieved 12 March 2015.
Cyberspaces and Global Affairs
Record, Jeffery: Bounding the Global War on Terrorism, Strategic Studies Institute, US Army War College, Leavenworth, 2003
Schmid, Alex and Jongmans, Albert et al.: Political Terrorism: A new guide to Action, Authors, Concepts, Data Bases, Theories and Literature, Transaction Books, New Brunswick, 1988
COE DAT Cyber Terrorism Couse IV 9 Mar
Hennessy, Joh L and others: Information Technology for Counterterrorism, National Academies Press,
Washington DC, 2003
Press, New York, 1999
– 17/10/03