11.07.2015 Views

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

cyberterrorism 127used for propag<strong>and</strong>a <strong>and</strong> recruiting. (In 2007 a British courtsentenced three men, calling them “cyber-jihadis” <strong>and</strong> sayingthey had used a Web site to urge Muslims to attack non-Muslims.) In fact extremist groups <strong>of</strong> many kinds (includingneo-Nazis <strong>and</strong> other racial extremists) have long used Websites to attract young followers through propag<strong>and</strong>a, music,<strong>and</strong> even games.Other material posted by terrorist groups onlineincludes bomb-making plans, lists <strong>of</strong> potential targets (possiblyincluding maps or blueprints), <strong>and</strong> “tips” for penetratingdefenses or evading detection. (A project called DarkWeb at the University <strong>of</strong> Arizona searches for, compiles,<strong>and</strong> analyzes massive amounts <strong>of</strong> Web content generated byterrorist groups.)Attacks on Web SitesAttempts to jam or disrupt Web sites (such as denial <strong>of</strong>service attacks or DOS) have been made for a variety <strong>of</strong> reasons.At one end <strong>of</strong> the spectrum are individuals or smallgroups engaged in criminal activity (such as attemptedextortion) or expressing political protest (“hacktivists”). Atthe other end are alleged online <strong>of</strong>fensives by national governments(see Information warfare).Although there have been no major disruptions as <strong>of</strong>mid-2008, terrorists (or sympathizers) have already conductedcyberattacks. One site has even <strong>of</strong>fered a downloadable“electronic jihad” program that users can use to selectfrom a list <strong>of</strong> targets to launch an automated DOS. Whilesuch sites are usually taken down after a few months, it isrelatively easy to start another, especially because informationprovided for site registration is <strong>of</strong>ten not verified.Fighting CyberterrorismStrategies <strong>and</strong> tactics to combat cyberterrorism involve bothgeneral antiterrorist intelligence <strong>and</strong> other techniques aswell as those particularly adapted to the cyberspace arena(see counterterrorism <strong>and</strong> computers, computercrime <strong>and</strong> security, <strong>and</strong> computer forensics).The cyberterrorist threat also plays an important rolein the effort to better protect vital infrastructure. Althoughattacks on banking <strong>and</strong> other financial computer systemshave the potential to cause severe economic damage, muchattention has focused on computer-based attacks that havethe potential to directly injure or even kill people. Back in2000, an individual hacker in Australia took over a pumpingstation <strong>and</strong> dumped more than 264,000 gallons <strong>of</strong> raw sewageinto public l<strong>and</strong>s <strong>and</strong> waterways. Although no humanswere directly harmed, it is easy to see that such contaminationin the drinking water supply could be deadly.Regardless <strong>of</strong> the type <strong>of</strong> computer system, followingbest security practices can go a long way to “hardening”potential targets. Such practices include the use <strong>of</strong> robustfirewalls <strong>and</strong> antivirus programs, regular security updatesfor the operating system <strong>and</strong> s<strong>of</strong>tware, network monitoring<strong>and</strong> intrusion detection, sharing information about securitythreats, <strong>and</strong> training personnel to be aware <strong>of</strong> typicalattacker techniques, including deception (social engineering).There needs to be a comprehensive protection plan foreach facility that takes both physical <strong>and</strong> electronic securityinto accountAssessmentIn recent years cyberterrorism has been a much publicizedtopic. Some critics believe that the threat <strong>of</strong> cyberterrorismhas been overestimated—not because many computer systemsare not vulnerable, but because the most vulnerablephysical systems are generally not on the Internet <strong>and</strong> noteasily accessible. It has also been argued that terrorists generallyuse simpler, more direct weapons (e.g., bombs) <strong>and</strong>aim to produce physically spectacular or terrifying results.Most cyberattacks would not seem to meet those criteria.On the other h<strong>and</strong>, a cyberattack might be launched inconjunction with physical attacks, either as a distractionor to make it harder for authorities to respond to the mainattack.Properly assessing risks <strong>and</strong> allocating resources willalways be difficult, <strong>and</strong> will always be influenced by political<strong>and</strong> economic as well as technological factors.Further ReadingBlane, John V., ed. Cybercrime <strong>and</strong> Cyberterrorism: Current Issues.New York: Novinka Books, 2003.Brown, Lawrence V., ed. Cyberterrorism <strong>and</strong> <strong>Computer</strong> Attacks.New York: Novinka Books, 2006.Chen, Hsinchun. “How Terrorists Use the Internet” [interviewtranscript]. The <strong>Science</strong> Show, March 31, 2007. Availableonline. URL: http://www.abc.net.au/rn/scienceshow/stories/2007/1885902.htm#transcript. Accessed September 7, 2007.Colarik, Andrew M. Cyber Terrorism: Political <strong>and</strong> Economic Implications.Hershey, Penn.: Idea Group, 2006.“Cyber-Terrorism: Propag<strong>and</strong>a or Probability?” About.com. Availableonline. URL: http://antivirus.about.com/library/weekly/aa090502a.htm. Accessed September 7, 2007.Greenmeier, Larry. “Cyberterrorism: By Whatever Name, It’s onthe Increase.” InformationWeek, July 7, 2007. Available online.URL: http://www.informationweek.com/story/showArticle.jhtml?articleID=200900812. Accessed July 12, 2007.O’Day, Alan, ed. Cyberterrorism. Burlington, Vt.: Ashgate, 2004.Wagner, Breanne. “Electronic Jihad: Experts Downplay ImminentThreat <strong>of</strong> Cyberterrorism. National Defense 92 (July 1, 2007):p. 34 ff.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!