25.07.2019 Views

International Cyber Terrorism

International Cyber Terrorism

International Cyber Terrorism

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

disregard for national borders will challenge legal systems and complicate a nation's<br />

ability to deter threats and respond to contingencies.<br />

In February 2010, the United States Joint Forces Command released a study which<br />

included a summary of the threats posed by the internet:<br />

With very little investment, and cloaked in a veil of anonymity, our adversaries will<br />

inevitably attempt to harm our national interests. <strong>Cyber</strong>space will become a main front in<br />

both irregular and traditional conflicts. Enemies in cyberspace will include both states and<br />

non-states and will range from the unsophisticated amateur to highly trained professional<br />

hackers. Through cyberspace, enemies will target industry, academia, government, as<br />

well as the military in the air, land, maritime, and space domains. In much the same way<br />

that airpower transformed the battlefield of World War II, cyberspace has fractured the<br />

physical barriers that shield a nation from attacks on its commerce and communication.<br />

Indeed, adversaries have already taken advantage of computer networks and the power<br />

of information technology not only to plan and execute savage acts of terrorism, but also<br />

to influence directly the perceptions and will of the U.S. Government and the American<br />

population.<br />

On 6 October 2011, it was announced that Creech AFB's drone and<br />

Predator fleet's command and control data stream had been key-logged, resisting all<br />

attempts to reverse the exploit, for the past two weeks. The Air Force issued a<br />

statement that the virus had "posed no threat to our operational mission".<br />

On 21 November 2011, it was widely reported in the U.S. media that a hacker had<br />

destroyed a water pump at the Curran-Gardner Township Public Water District in<br />

Illinois. However, it later turned out that this information was not only false, but had been<br />

inappropriately leaked from the Illinois Statewide <strong>Terrorism</strong> and Intelligence Center.<br />

According to the Foreign Policy magazine, NSA's Tailored Access Operations (TAO)<br />

unit "has successfully penetrated Chinese computer and telecommunications systems<br />

for almost 15 years, generating some of the best and most reliable intelligence<br />

information about what is going on inside the People's Republic of China."<br />

On 24 November 2014. The Sony Pictures Entertainment hack was a release of<br />

confidential data belonging to Sony Pictures Entertainment (SPE).<br />

In June 2015, the United States Office of Personnel Management (OPM) announced<br />

that it had been the target of a data breach targeting the records of as many as four<br />

million people. Later, FBI Director James Comey put the number at 18<br />

million. The Washington Post has reported that the attack originated in China, citing<br />

unnamed government officials.<br />

In 2016, Jeh Johnson the United States Secretary of Homeland Security and James<br />

Clapper the U.S. Director of National Intelligence issued a joint statement accusing<br />

Russia of interfering with the 2016 United States presidential election. The New York<br />

Times reported the Obama administration has formally accused Russia of stealing and<br />

disclosing Democratic National Committee emails. Under U.S. law (50 U.S.C.Title 50 –<br />

Page 60 of 174

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!