International Cyber Terrorism
International Cyber Terrorism
International Cyber Terrorism
- No tags were found...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
architecture", explaining, "You guys made the cyber world look like the north German<br />
plain."<br />
In January 2012, Mike McConnell, the former director of national intelligence at<br />
the National Security Agency under president George W. Bush told the Reuters news<br />
agency that the U.S. has already launched attacks on computer networks in other<br />
countries. McConnell did not name the country that the U.S. attacked but according to<br />
other sources it may have been Iran. In June 2012 the New York Times reported that<br />
president Obama had ordered the cyber attack on Iranian nuclear enrichment facilities.<br />
In August<br />
2010, the<br />
U.S. for the<br />
first time<br />
warned<br />
publicly<br />
about the<br />
Chinese<br />
military's<br />
use of<br />
civilian<br />
computer<br />
experts in<br />
clandestine<br />
cyber<br />
attacks<br />
aimed at<br />
American companies and government agencies. The Pentagon also pointed to an<br />
alleged China-based computer spying network dubbed GhostNet that was revealed in a<br />
research report last year. The Pentagon stated:<br />
The People's Liberation Army is using "information warfare units" to develop viruses to<br />
attack enemy computer systems and networks, and those units include civilian<br />
computer professionals. Commander Bob Mehal, will monitor the PLA's buildup of its<br />
cyberwarfare capabilities and will continue to develop capabilities to counter any<br />
potential threat.<br />
The United States Department of Defense sees the use of computers and the Internet<br />
to conduct warfare in cyberspace as a threat to national security. The United States<br />
Joint Forces Command describes some of its attributes:<br />
<strong>Cyber</strong>space technology is emerging as an "instrument of power" in societies, and is<br />
becoming more available to a country's opponents, who may use it to attack, degrade,<br />
and disrupt communications and the flow of information. With low barriers to entry,<br />
coupled with the anonymous nature of activities in cyberspace, the list of potential<br />
adversaries is broad. Furthermore, the globe-spanning range of cyberspace and its<br />
Page 59 of 174