25.07.2019 Views

International Cyber Terrorism

International Cyber Terrorism

International Cyber Terrorism

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

esponse that furthers the desired intent of the propagandist" (p. 7). The internet is a<br />

phenomenal means of communication. People can get their message across to a huge<br />

audience, and with this opens a window for evil. Terrorist organizations can use this<br />

medium to brainwash people. It has been suggested that restricted media coverage of<br />

terrorist attacks would in turn decrease the number of terrorist attacks that occur<br />

afterwards (Cowen 2006).<br />

Economic Disruption<br />

In 2017, the WannaCry and Petya (NotPetya) cyber attacks, masquerading as<br />

ransomware, caused large-scale disruptions in Ukraine as well as to the U.K.’s National<br />

Health Service, pharmaceutical giant Merck, Maersk shipping company and other<br />

organizations around the world. These attacks are also categorized as cybercrimes,<br />

specifically financial crime because they negatively affects a company or group.<br />

Military<br />

Motivations<br />

In the U.S., General Keith B. Alexander, first head of USCYBERCOM, told the Senate<br />

Armed Services Committee that computer network warfare is evolving so rapidly that<br />

there is a "mismatch between our technical capabilities to conduct operations and the<br />

governing laws and policies. <strong>Cyber</strong> Command is the newest global combatant and its<br />

sole mission is cyberspace, outside the traditional battlefields of land, sea, air and<br />

space." It will attempt to find and, when necessary, neutralize cyberattacks and to<br />

defend military computer networks.<br />

Alexander sketched out the broad battlefield envisioned for the computer warfare<br />

command, listing the kind of targets that his new headquarters could be ordered to<br />

attack, including "traditional battlefield prizes – command-and-control systems at military<br />

headquarters, air defense networks and weapons systems that require computers to<br />

operate."<br />

Page 45 of 174

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!