25.07.2019 Views

International Cyber Terrorism

International Cyber Terrorism

International Cyber Terrorism

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

War and National Defense, Chapter 15 – National Security, Subchapter III<br />

Accountability for Intelligence Activities ) there must be a formal Presidential<br />

finding prior to authorizing a covert attack. U.S. vice president Joe Biden said on the<br />

American news interview program Meet The Press that the United States will<br />

respond. The New York Times noted that Biden's comment "seems to suggest that Mr.<br />

Obama is prepared to order — or has already ordered — some kind of covert<br />

action". On December 29 the United States imposed the most extensive sanctions<br />

against Russia since the Cold War, expelling 35 Russian diplomats from the United<br />

States.<br />

The United States has used cyberattacks for tactical advantage in Afghanistan.<br />

In 2014 Barack Obama ordered an intensification of cyberwarfare against North Korea's<br />

missile program for sabotaging test launches in their opening seconds. In 2016<br />

President Barack Obama authorized the planting of cyber weapons in Russian<br />

infrastructure in the final weeks of his presidency in response to Moscow's alleged<br />

interference in the 2016 presidential election.<br />

In March 2017, WikiLeaks has published more than 8,000 documents on the CIA. The<br />

confidential documents, codenamed Vault 7 and dated from 2013–2016, include details<br />

on CIA's software capabilities, such as the ability to compromise cars, smart TVs, web<br />

browsers (including Google Chrome, Microsoft Edge, Mozilla Firefox, and Opera<br />

Software ASA), and the operating systems of<br />

Page 61 of 174

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!