10.07.2015 Views

Historical Dictionary of Terrorism Third Edition

Historical Dictionary of Terrorism Third Edition

Historical Dictionary of Terrorism Third Edition

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

270 • INFORMATION WARFAREINFORMATION WARFARE. Information-oriented warfare is associatedwith low- to high-intensity conflicts and may partly involvestrategic information warfare in which computer infrastructures forcommand, communications, control, and intelligence are directlyattacked, whether by physical targeting or by means <strong>of</strong> hackingor attacks by computer viruses. It is relatively cheap and easy forindividuals or groups to shut down computer systems and causeenormous financial losses through hacking and other attacks on informationsystems. In many well-publicized cases, such as the “I loveyou” virus that afflicted information systems throughout the world,the motives <strong>of</strong> the perpetrators were neither terroristic nor done forpurposes <strong>of</strong> fraud. Therefore, it is easy to imagine the harm that aterrorist group could inflict if it opted to use cyberattacks as a means<strong>of</strong> pressuring its targeted nation or group.Cyberwarfare may not involve attacks on computers so much asusing computer information systems to pursue conventional tactics.For instance, during the Chechen war the original Chechnyan leaderDzhukar Dudayev was killed by a Russian missile when his positionwas pinpointed by means <strong>of</strong> tracing the signal <strong>of</strong> his cell phone. Anotherexample is how U.S. counterterrorism efforts have focusedon identifying the bank accounts <strong>of</strong> terrorist groups and leaders andthen electronically “emptying” them or else transferring a large sumfrom the accounts <strong>of</strong> a leader to those <strong>of</strong> a trusted subordinate to createthe impression <strong>of</strong> embezzlement and to sow rancor and distrustbetween the key members <strong>of</strong> a terrorist cadre. During the 1990–1991Gulf War, the Iraqi air defense radars were cluttered with hundreds<strong>of</strong> false signals generated by chips covertly implanted in radarequipment sold to Iraq that were activated by U.S. military codes torender the air defense systems inoperative during any U.S. air attack.Another cyberwarfare tactic, known as a denial-<strong>of</strong>-service attack,is to swarm a website with thousands <strong>of</strong> e-mail messages with theintent <strong>of</strong> shutting the site down. During the course <strong>of</strong> the 1998–1999Kosovo conflict, <strong>of</strong>ficial U.S. government websites <strong>of</strong> the CentralIntelligence Agency (CIA), the Defense Department, and the StateDepartment were being bombarded with as many as 30,000 cyberattacksa day originating in Eastern Europe.The term cyberterrorism has been loosely applied to cover instances<strong>of</strong> computer-assisted embezzlement or cases <strong>of</strong> extortion in whichblackmailers have forced financial institutions to pay protection money

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!