25.07.2019 Views

International Cyber Terrorism

International Cyber Terrorism

International Cyber Terrorism

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

architecture", explaining, "You guys made the cyber world look like the north German<br />

plain."<br />

In January 2012, Mike McConnell, the former director of national intelligence at<br />

the National Security Agency under president George W. Bush told the Reuters news<br />

agency that the U.S. has already launched attacks on computer networks in other<br />

countries. McConnell did not name the country that the U.S. attacked but according to<br />

other sources it may have been Iran. In June 2012 the New York Times reported that<br />

president Obama had ordered the cyber attack on Iranian nuclear enrichment facilities.<br />

In August<br />

2010, the<br />

U.S. for the<br />

first time<br />

warned<br />

publicly<br />

about the<br />

Chinese<br />

military's<br />

use of<br />

civilian<br />

computer<br />

experts in<br />

clandestine<br />

cyber<br />

attacks<br />

aimed at<br />

American companies and government agencies. The Pentagon also pointed to an<br />

alleged China-based computer spying network dubbed GhostNet that was revealed in a<br />

research report last year. The Pentagon stated:<br />

The People's Liberation Army is using "information warfare units" to develop viruses to<br />

attack enemy computer systems and networks, and those units include civilian<br />

computer professionals. Commander Bob Mehal, will monitor the PLA's buildup of its<br />

cyberwarfare capabilities and will continue to develop capabilities to counter any<br />

potential threat.<br />

The United States Department of Defense sees the use of computers and the Internet<br />

to conduct warfare in cyberspace as a threat to national security. The United States<br />

Joint Forces Command describes some of its attributes:<br />

<strong>Cyber</strong>space technology is emerging as an "instrument of power" in societies, and is<br />

becoming more available to a country's opponents, who may use it to attack, degrade,<br />

and disrupt communications and the flow of information. With low barriers to entry,<br />

coupled with the anonymous nature of activities in cyberspace, the list of potential<br />

adversaries is broad. Furthermore, the globe-spanning range of cyberspace and its<br />

Page 59 of 174

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!