Cyberterrorism is the use of the
Internet
The Internet (or internet) is the Global network, global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a internetworking, network of networks ...
to conduct violent acts that result in, or threaten, the loss of life or significant bodily harm, in order to achieve political or ideological gains through
threat
A threat is a communication of intent to inflict harm or loss on another person. Intimidation is a tactic used between conflicting parties to make the other timid or psychologically insecure for coercion or control. The act of intimidation f ...
or
intimidation
Intimidation is a behaviour and legal wrong which usually involves deterring or coercing an individual by threat of violence. It is in various jurisdictions a crime and a civil wrong (tort). Intimidation is similar to menacing, coercion, terro ...
. Emerging alongside the development of information technology, cyberterrorism involves acts of deliberate, large-scale disruption of
computer network
A computer network is a collection of communicating computers and other devices, such as printers and smart phones. In order to communicate, the computers and devices must be connected by wired media like copper cables, optical fibers, or b ...
s, especially of personal computers attached to the Internet by means of tools such as
computer viruses
A computer virus is a type of malware that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs. If this replication succeeds, the affected areas are then said to be "infected" wit ...
,
computer worm
A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. It often uses a computer network to spread itself, relying on security failures on the target computer to access it. It will ...
s,
phishing
Phishing is a form of social engineering and a scam where attackers deceive people into revealing sensitive information or installing malware such as viruses, worms, adware, or ransomware. Phishing attacks have become increasingly sophisticate ...
,
malicious software
Malware (a portmanteau of ''malicious software'')Tahir, R. (2018)A study on malware and malware detection techniques . ''International Journal of Education and Management Engineering'', ''8''(2), 20. is any software intentionally designed to caus ...
, hardware methods, and programming scripts can all be forms of internet terrorism. Some authors opt for a very narrow definition of cyberterrorism, relating to deployment by known terrorist organizations of disruption attacks against information systems for the primary purpose of creating alarm, panic, or physical disruption. Other authors prefer a broader definition, which includes
cybercrime
Cybercrime encompasses a wide range of criminal activities that are carried out using digital devices and/or Computer network, networks. It has been variously defined as "a crime committed on a computer network, especially the Internet"; Cyberc ...
. Participating in a
cyberattack
A cyberattack (or cyber attack) occurs when there is an unauthorized action against computer infrastructure that compromises the confidentiality, integrity, or availability of its content.
The rising dependence on increasingly complex and inte ...
affects the terror threat perception, even if it isn't done with a violent approach. By some definitions, it might be difficult to distinguish which instances of online activities are cyberterrorism or cybercrime.
Cyberterrorism can be also defined as the intentional use of computers, networks, and public internet to cause destruction and harm for personal objectives. Experienced cyberterrorists, who are very skilled in terms of
hacking can cause massive damage to government systems and might leave a country in fear of further attacks.
The objectives of such terrorists may be political or ideological since this can be considered a form of terror.
There is much
concern from government and media sources about potential damage that could be caused by cyberterrorism, and this has prompted efforts by government agencies such as the
Federal Bureau of Investigation
The Federal Bureau of Investigation (FBI) is the domestic Intelligence agency, intelligence and Security agency, security service of the United States and Federal law enforcement in the United States, its principal federal law enforcement ag ...
(FBI),
National Security Agency
The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
(NSA), and the
Central Intelligence Agency
The Central Intelligence Agency (CIA; ) is a civilian foreign intelligence service of the federal government of the United States tasked with advancing national security through collecting and analyzing intelligence from around the world and ...
(CIA) to put an end to
cyber attacks and cyberterrorism.
There have been several major and minor instances of cyberterrorism.
Al-Qaeda
, image = Flag of Jihad.svg
, caption = Jihadist flag, Flag used by various al-Qaeda factions
, founder = Osama bin Laden{{Assassinated, Killing of Osama bin Laden
, leaders = {{Plainlist,
* Osama bin Lad ...
utilized the internet to communicate with supporters and even to recruit new members.
Estonia
Estonia, officially the Republic of Estonia, is a country in Northern Europe. It is bordered to the north by the Gulf of Finland across from Finland, to the west by the Baltic Sea across from Sweden, to the south by Latvia, and to the east by Ru ...
, a Baltic country which is constantly evolving in terms of technology, became a battleground for cyberterrorism in
April 2007 after disputes regarding the relocation of a WWII soviet statue located in Estonia's capital Tallinn.
Overview
There is debate over the basic definition of the scope of cyberterrorism. These definitions can be narrow such as the use of Internet to attack other systems in the Internet that result to violence against persons or property.
They can also be broad, those that include any form of Internet usage by terrorists to conventional attacks on information technology infrastructures.
There is variation in qualification by motivation, targets, methods, and centrality of computer use in the act. U.S. government agencies also use varying definitions and that none of these have so far attempted to introduce a standard that is binding outside of their sphere of influence.
Depending on context, cyberterrorism may overlap considerably with
cybercrime
Cybercrime encompasses a wide range of criminal activities that are carried out using digital devices and/or Computer network, networks. It has been variously defined as "a crime committed on a computer network, especially the Internet"; Cyberc ...
,
cyberwar or ordinary
terrorism
Terrorism, in its broadest sense, is the use of violence against non-combatants to achieve political or ideological aims. The term is used in this regard primarily to refer to intentional violence during peacetime or in the context of war aga ...
.
Eugene Kaspersky, founder of
Kaspersky Lab
Kaspersky Lab (; ) is a Russian multinational cybersecurity and anti-virus provider headquartered in Moscow, Russia, and operated by a holding company in the United Kingdom. It was founded in 1997 by Eugene Kaspersky, Natalya Kaspersky a ...
, now feels that "cyberterrorism" is a more accurate term than "
cyberwar". He states that "with today's attacks, you are clueless about who did it or when they will strike again. It's not cyber-war, but cyberterrorism."
["Latest viruses could mean 'end of world as we know it,' says man who discovered Flame"](_blank)
''The Times of Israel'', 6 June 2012 He also equates large-scale cyber weapons, such as the
Flame Virus and NetTraveler Virus which his company discovered, to
biological weapons
Biological agents, also known as biological weapons or bioweapons, are pathogens used as weapons. In addition to these living or replicating pathogens, toxins and biotoxins are also included among the bio-agents. More than 1,200 different kin ...
, claiming that in an interconnected world, they have the potential to be equally destructive.
["Cyber espionage bug attacking Middle East, but Israel untouched — so far"](_blank)
''The Times of Israel'', 4 June 2013
If cyberterrorism is treated similarly to traditional
terrorism
Terrorism, in its broadest sense, is the use of violence against non-combatants to achieve political or ideological aims. The term is used in this regard primarily to refer to intentional violence during peacetime or in the context of war aga ...
, then it only includes attacks that threaten property or lives, and can be defined as the leveraging of a target's computers and information, particularly via the
Internet
The Internet (or internet) is the Global network, global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a internetworking, network of networks ...
, to cause physical, real-world harm or severe disruption of infrastructure.
Many academics and researchers who specialize in terrorism studies suggest that cyberterrorism does not exist and is really a matter of
hacking or
information warfare
Information warfare (IW) is the battlespace use and management of information and communication technology (ICT) in pursuit of a competitive advantage over an opponent. It is different from ''cyberwarfare'' that attacks computers, software, and ...
. They disagree with labeling it as terrorism because of the unlikelihood of the creation of fear, significant physical harm, or death in a population using electronic means, considering current attack and protective technologies.
If death or physical damage that could cause human harm is considered a necessary part of the cyberterrorism definition, then there have been few identifiable incidents of cyberterrorism, although there has been much policy research and public concern. Modern terrorism and political violence is not easily defined, however, and some scholars assert that it is now "unbounded" and not exclusively concerned with physical damage.
There is an old saying that death or loss of property are the side products of terrorism, the main purpose of such incidents is to ''create terror'' in peoples' minds and harm bystanders. If any incident in
cyberspace
Cyberspace is an interconnected digital environment. It is a type of virtual world popularized with the rise of the Internet. The term entered popular culture from science fiction and the arts but is now used by technology strategists, security ...
can ''create terror'', it may be rightly called cyberterrorism. For those affected by such acts, the fears of cyberterrorism are quite real.
As with cybercrime in general, the threshold of required knowledge and skills to perpetrate acts of cyberterrorism has been steadily diminishing thanks to freely available hacking suites and online courses. Additionally, the physical and virtual worlds are merging at an accelerated rate, making for many more targets of opportunity which is evidenced by such notable cyber attacks as
Stuxnet
Stuxnet is a Malware, malicious computer worm first uncovered on June 17, 2010, and thought to have been in development since at least 2005. Stuxnet targets supervisory control and data acquisition (SCADA) systems and is believed to be responsibl ...
, the Saudi petrochemical sabotage attempt in 2018 and others.
Defining cyberterrorism
Assigning a concrete definition to cyberterrorism can be hard, due to the difficulty of defining the term terrorism itself. Multiple organizations have created their own definitions, most of which are overly broad. There is also controversy concerning overuse of the term,
hyperbole
Hyperbole (; adj. hyperbolic ) is the use of exaggeration as a rhetorical device or figure of speech. In rhetoric, it is also sometimes known as auxesis (literally 'growth'). In poetry and oratory, it emphasizes, evokes strong feelings, and cre ...
in the media and by security vendors trying to sell "solutions".
One way of understanding cyberterrorism involves the idea that terrorists could cause massive loss of life, worldwide economic chaos and environmental damage by hacking into critical infrastructure systems. The nature of cyberterrorism covers conduct involving computer or Internet technology that:
# is motivated by a political, religious or ideological cause
# is intended to intimidate a government or a section of the public to varying degrees
# seriously interferes with infrastructure
The term "cyberterrorism" can be used in a variety of different ways, but there are limits to its use. An attack on an
Internet business can be labeled cyberterrorism, however when it is done for economic motivations rather than ideological it is typically regarded as
cybercrime
Cybercrime encompasses a wide range of criminal activities that are carried out using digital devices and/or Computer network, networks. It has been variously defined as "a crime committed on a computer network, especially the Internet"; Cyberc ...
.
Convention also limits the label "cyberterrorism" to actions by individuals, independent groups, or organizations. Any form of
cyberwarfare
Cyberwarfare is the use of cyberattack, cyber attacks against an enemy State (polity), state, causing comparable harm to actual warfare and/or disrupting vital computer systems. Some intended outcomes could be espionage, sabotage, propaganda, ...
conducted by governments and states would be regulated and punishable under international law.
[Gable, Kelly A. "Cyber-Apocalypse Now: Securing the Internet against Cyberterrorism and Using Universal Jurisdiction as a Deterrent". ''Vanderbilt Journal of Transnational Law'', Vol. 43, No. 1]
The Technolytics Institute defines cyberterrorism as
e premeditated use of disruptive activities, or the threat thereof, against computers and/or networks, with the intention to cause harm or further social, ideological, religious, political or similar objectives. Or to intimidate any person in furtherance of such objectives.
The term appears first in defense literature, surfacing (as "cyber-terrorism") in reports by the
U.S. Army War College
The United States Army War College (USAWC) is a United States Army, U.S. Army staff college in Carlisle Barracks, Pennsylvania, with a Carlisle, Pennsylvania, Carlisle postal address, on the 500-acre (2 km2) campus of the historic Carlisle B ...
as early as 1998.
The
National Conference of State Legislatures
The National Conference of State Legislatures (NCSL), established in 1975, is a "nonpartisan public officials' association composed of sitting state legislators" from the states, territories and commonwealths of the United States.
Background ...
, an organization of legislators created to help policymakers in the
United States
The United States of America (USA), also known as the United States (U.S.) or America, is a country primarily located in North America. It is a federal republic of 50 U.S. state, states and a federal capital district, Washington, D.C. The 48 ...
with issues such as economy and
homeland security
Homeland security is an American national security term for "the national effort to ensure a homeland that is safe, secure, and resilient against terrorism and other hazards where American interests, aspirations, and ways of life can thrive" to ...
defines cyberterrorism as:
e use of information technology by terrorist groups and individuals to further their agenda. This can include use of information technology to organize and execute attacks against networks, computer systems and telecommunications infrastructures, or for exchanging information or making threats electronically. Examples are hacking into computer systems, introducing viruses to vulnerable networks, web site defacing, Denial-of-service attack
In computing, a denial-of-service attack (DoS attack) is a cyberattack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host co ...
s, or terroristic threats made via electronic communication.
The American Federal Emergency Management agency defines cyberterrorism as:
e illegal threat and the attack against computers, networks, and information stored, where it is carried out to frighten and force the government or its people ti achieve political or social objectives.
NATO
The North Atlantic Treaty Organization (NATO ; , OTAN), also called the North Atlantic Alliance, is an intergovernmental organization, intergovernmental Transnationalism, transnational military alliance of 32 Member states of NATO, member s ...
defines cyberterrorism as "
cyberattack using or exploiting computer or communication networks to cause sufficient destruction or disruption to generate fear or to intimidate a society into an ideological goal".
The United States
National Infrastructure Protection Center defined cyberterrorism as:
A criminal act perpetrated by the use of computers and telecommunications capabilities resulting in violence, destruction, and/or disruption of services to create fear by causing confusion and uncertainty within a given population, with the goal of influencing a government or population to conform to a political, social, or ideological agenda.
The FBI, another United States agency, defines "cyber terrorism" as "premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets by subnational groups or clandestine agents".
These definitions tend to share the view of cyberterrorism as politically and/or ideologically inclined. One area of debate is the difference between cyberterrorism and
hacktivism. Hacktivism is "the marriage of hacking with political activism". Both actions are politically driven and involve using computers, however cyberterrorism is primarily used to cause harm. It becomes an issue because acts of violence on the computer can be labeled either cyberterrorism or hacktivism.
Types of cyberterror capability
In 1999 the Center for the Study of Terrorism and Irregular Warfare at the
Naval Postgraduate School
Naval Postgraduate School (NPS) is a Naval command with a graduate university mission, operated by the United States Navy and located in Monterey, California.
The NPS mission is to provide "defense-focused graduate education, including clas ...
in Monterey, California, defined three levels of cyberterror capability:
[
]
* Simple-Unstructured: the capability to conduct basic hacks against individual systems using tools created by someone else. The organization possesses little target-analysis,
command-and-control, or learning capability.
* Advanced-Structured: the capability to conduct more sophisticated attacks against multiple systems or networks and possibly, to modify or create basic hacking-tools. The organization possesses an elementary target-analysis, command-and-control, and learning capability.
* Complex-Coordinated: the capability for a coordinated attack capable of causing mass-disruption against integrated, heterogeneous defenses (including cryptography). Ability to create sophisticated hacking tools. Highly capable target-analysis, command-and-control, and organization learning-capability.
Concerns
Cyberterrorism is becoming more and more prominent on
social media
Social media are interactive technologies that facilitate the Content creation, creation, information exchange, sharing and news aggregator, aggregation of Content (media), content (such as ideas, interests, and other forms of expression) amongs ...
today. As the Internet becomes more pervasive, individuals or groups can use the anonymity afforded by
cyberspace
Cyberspace is an interconnected digital environment. It is a type of virtual world popularized with the rise of the Internet. The term entered popular culture from science fiction and the arts but is now used by technology strategists, security ...
to threaten other individuals, specific groups (with membership based, for example, on ethnicity or belief), communities and entire countries, without the inherent threat of identification, capture, injury, or death of the attacker that being physically present would bring.
Many groups such as
Anonymous
Anonymous may refer to:
* Anonymity, the state of an individual's identity, or personally identifiable information, being publicly unknown
** Anonymous work, a work of art or literature that has an unnamed or unknown creator or author
* Anonym ...
, use tools such as
denial-of-service attack
In computing, a denial-of-service attack (DoS attack) is a cyberattack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host co ...
s to attack and censor groups which oppose them, creating many concerns for freedom and respect for differences of thought.
Many believe that cyberterrorism is an extreme threat to countries' economies, and fear an attack could potentially lead to another Great Depression. Several
leader
Leadership, is defined as the ability of an individual, group, or organization to "", influence, or guide other individuals, teams, or organizations.
"Leadership" is a contested term. Specialist literature debates various viewpoints on the co ...
s agree that cyberterrorism has the highest percentage of threat over other possible attacks on U.S. territory. Although natural disasters are considered a top threat and have proven to be devastating to people and land, there is ultimately little that can be done to prevent such events from happening. Thus, the expectation is to focus more on preventative measures that will make Internet attacks impossible for execution.
As the Internet continues to expand, and computer systems continue to be assigned increased responsibility while becoming more complex and interdependent, sabotage or terrorism via the Internet may become a more serious threat and is possibly one of the top 10 events to "end the human race." People have much easier access to illegal involvement within cyberspace by the ability to access a part of the internet known as the
Dark Web
The dark web is the World Wide Web content that exists on darknets ( overlay networks) that use the Internet but require specific software, configurations, or authorization to access. Through the dark web, private computer networks can communica ...
. The
Internet of Things
Internet of things (IoT) describes devices with sensors, processing ability, software and other technologies that connect and exchange data with other devices and systems over the Internet or other communication networks. The IoT encompasse ...
promises to further merge the virtual and physical worlds, which some experts see as a powerful incentive for states to use terrorist proxies in furtherance of objectives.
Dependence on the Internet is rapidly increasing on a worldwide scale, creating a platform for international cyber-terror plots to be formulated and executed as a direct threat to national security.
For terrorists, cyber-based attacks have distinct advantages over physical attacks. They can be conducted remotely, anonymously, and relatively cheaply, and they do not require significant investment in weapons, explosives or personnel. The effects can be widespread and profound. Incidents of cyberterrorism are likely to increase. They can be expected to take place through denial-of-service attacks, malware, and other methods that are difficult to envision today. One example involves the deaths involving the Islamic State and the online social networks Twitter, Google, and Facebook – leading to legal action being taken against them, that ultimately resulted in them being sued.
In an article about cyber attacks by Iran and North Korea, ''
The New York Times
''The New York Times'' (''NYT'') is an American daily newspaper based in New York City. ''The New York Times'' covers domestic, national, and international news, and publishes opinion pieces, investigative reports, and reviews. As one of ...
'' observes:
The appeal of digital weapons is similar to that of nuclear capability: it is a way for an outgunned, outfinanced nation to even the playing field. "These countries are pursuing cyberweapons the same way they are pursuing nuclear weapons," said James A. Lewis, a computer security expert at the Center for Strategic and International Studies
The Center for Strategic and International Studies (CSIS) is an American think tank based in Washington, D.C. From its founding in 1962 until 1987, it was an affiliate of Georgetown University, initially named the Center for Strategic and Inte ...
in Washington. "It's primitive; it's not top of the line, but it's good enough and they are committed to getting it."[
]
In addition, Cyberterrorism has also been documented to arouse negative emotions. Recent studies have suggested that Cyberterrorism produces heightened levels of anger and stress, which do not differ drastically from the effects of conventional terrorism.
Researchers also noted that Cyberterrorism produced higher levels of stress than anger, and the responses are not dependent on the lethality of the attack.
History
Public interest in cyberterrorism began in the late 1990s, when the term was coined by Barry C. Collin. As 2000 approached, the fear and uncertainty about the
millennium bug
The term year 2000 problem, or simply Y2K, refers to potential computer errors related to the Time formatting and storage bugs, formatting and storage of calendar data for dates in and after the year 2000. Many Computer program, programs repr ...
heightened, as did the potential for attacks by cyber terrorists. Although the millennium bug was by no means a terrorist attack or plot against the world or the United States, it did act as a catalyst in sparking the fears of a possibly large-scale devastating cyber-attack. Commentators noted that many of the facts of such incidents seemed to change, often with exaggerated media reports.
The high-profile terrorist attacks in the United States on 11 September 2001, and the ensuing
War on Terror by the US led to further media coverage of the potential threats of cyberterrorism in the years following. Mainstream media coverage often discusses the possibility of a large attack making use of computer networks to sabotage critical infrastructures with the aim of putting human lives in jeopardy or causing disruption on a national scale either directly or by disruption of the national economy.
Authors such as
Winn Schwartau and
John Arquilla are reported to have had considerable financial success selling books which described what were purported to be plausible scenarios of mayhem caused by cyberterrorism. Many critics claim that these books were unrealistic in their assessments of whether the attacks described (such as nuclear meltdowns and chemical plant explosions) were possible. A common thread throughout what critics perceive as cyberterror-hype is that of non-
falsifiability
Falsifiability (or refutability) is a deductive standard of evaluation of scientific theories and hypotheses, introduced by the Philosophy of science, philosopher of science Karl Popper in his book ''The Logic of Scientific Discovery'' (1934). ...
; that is, when the predicted disasters fail to occur, it only goes to show how lucky we've been so far, rather than impugning the theory.
In 2016, for the first time ever, the Department of Justice charged Ardit Ferizi with cyberterrorism. He is accused of allegedly hacking into a military website and stealing the names, addresses, and other personal information of government and military personnel and selling it to ISIS.
On the other hand, it is also argued that, despite substantial studies on cyberterrorism, the body of literature is still unable to present a realistic estimate of the actual threat.
For instance, in the case of a cyberterrorist attack on a public infrastructure such as a power plant or air traffic control through hacking, there is uncertainty as to its success because data concerning such phenomena are limited.
Current threats
Cyberterrorism ranks among the highest potential security threats in the world. It has become more critical than the development of nuclear weapons or the current conflicts between nations. Due to the pervasiveness of the internet and the amount of responsibility assigned to this technology, digital weapons pose a threat to entire economic or social systems. Some of the most critical international security concerns include:
DDoS Attacks – Millions of Denial of Service attacks occur every year and the service disruption can cost hundreds of thousands of dollars each hour they are down. It is important to keep critical systems secured and redundant to remain online during these attacks.
Social Engineering – In 1997 an experiment conducted by the NSA concluded that thirty-five hackers were able to access critical pentagon computer systems and could easily edit accounts, reformat data and even shut down entire systems. Often they used phishing tactics such as calling offices and pretending to be technicians to gain passwords.
Third Party Software – The top retailers are connected with thousands of separate third-party recourses and at least 23% of those assets have at least one critical vulnerability. These companies need to manage and reevaluate their network security in order to keep personal data safe.
Future threats
As technology becomes more and more integrated into society, new vulnerabilities and security threats are opened up on these complex networks that we have set up. If an intruder was to gain access to these networks they have the potential to threaten entire communities or economic systems. There is no certainty for what events will take place in the future, which is why it is important that there are systems build to adapt to the changing environment.
The most apparent cyberterrorism threat in our near future will involve the state of remote work during the COVID-19 pandemic. Companies cannot expect that every home office is up to date and secure so they must adopt a zero-trust policy from home devices. This means that they must assume corporate resources and unsecured devices are sharing the same space and they must act accordingly.
The rise of cryptocurrency has also sparked some additional threats in the realm of security. Cyber Criminals are now hijacking home computers and company networks in order to mine certain cryptocurrencies such as bitcoin. This mining process requires an immense amount of computer processing power which can cripple a business’ network and lead to severe downtime if the issue is not resolved.
International attacks and response
Conventions
As of 2016 there have been eighteen conventions and major legal instruments that specifically deal with terrorist activities and cyber terrorism.
* 1963: Convention on Offences and Certain Other Acts Committed on Board Aircraft
* 1970: Convention for the Suppression of Unlawful Seizure of Aircraft
* 1971: Convention for the Suppression of Unlawful Acts Against the Safety of Civil Aviation
* 1973: Convention on the Prevention and Punishment of Crimes against Internationally Protected Persons
* 1979: International Convention against the Taking of Hostages
* 1980: Convention on the Physical Protection of Nuclear Material
* 1988: Protocol for the Suppression of Unlawful Acts of Violence at Airports Serving International Civil Aviation
* 1988: Protocol for the Suppression of Unlawful Acts against the Safety of Fixed Platforms Located on the Continental Shelf
* 1988: Convention for the Suppression of Unlawful Acts against the Safety of Maritime Navigation
* 1989: Supplementary to the Convention for the Suppression of Unlawful Acts against the Safety of Civil Aviation
* 1991: Convention on the Marking of Plastic Explosives for the Purpose of Detection
* 1997: International Convention for the Suppression of Terrorist Bombings
* 1999: International Convention for the Suppression of the Financing of Terrorism
* 2005: Protocol to the Convention for the Suppression of Unlawful Acts against the Safety of Maritime Navigation
* 2005: International Convention for the Suppression of Acts of Nuclear Terrorism
* 2010: Protocol Supplementary to the Convention for the Suppression of Unlawful Seizure of Aircraft
* 2010: Convention on the Suppression of Unlawful Acts Relating to International Civil Aviation
*2014: Protocol to Amend the Convention on Offences and Certain Acts Committed on Board Aircraft
Motivations for cyberattacks
There are many different motives for cyberattacks, with the majority being for financial reasons. However, there is increasing evidence that hackers are becoming more politically motivated. Cyberterrorists are aware that governments are reliant on the internet and have exploited this as a result. For example, Mohammad Bin Ahmad As-Sālim's piece "39 Ways to Serve and Participate in Jihad" discusses how an electronic jihad could disrupt the West through targeted hacks of American websites, and other resources seen as anti-Jihad, modernist, or secular in orientation (Denning, 2010; Leyden, 2007).
Many of the cyberattacks are not conducted for money, rather the cyberattacks are conducted due to different ideological beliefs and due to wanting to get personal revenge and outrage towards company or individual, the cybercriminal is attacking. An employee might want to get revenge on a company if they were mistreated or wrongfully terminated.
Other motivations for cybercriminals include:
* Political goals
* Competition between companies
* Cyberwarfare between two countries
* Money
Political goals motivate cyber-attackers because they are not happy with candidates and they might want certain candidates to win the election, therefore, they might alter the election voting to help their preferred candidate win.
Competition between two companies can also stir up a cyberattack, as one company can hire a hacker to conduct the attack on a company as they might want to test the rival company's security. This will also benefit a company because it will force their competitor's customers to think that the company is not secure due to them getting cyber attacked effortlessly and they don't want any of their personal credentials getting leaked.
Cyberwarfare is motivation for countries that are fighting each other. This is mainly used to weaken the opposing country by compromising its core systems and the countries data and other vulnerable information.
Money is motivating for cyber attacks for ransomware, phishing, and data theft as the cyber criminals can differently contact the victims and ask for money and in return the data stays safe.
International Institutions
The United Nations has several agencies that seek to address in cyberterrorism, including,
the United Nations Office of Counter-Terrorism,
the United Nations Office on Drugs and Crime,
the United Nations Office for Disarmament Affairs,
the United Nations Institute for Disarmament Research,
the United Nations Interregional Crime and Justice Research Institute, and the
International Telecommunication Union
The International Telecommunication Union (ITU)In the other common languages of the ITU:
*
* is a list of specialized agencies of the United Nations, specialized agency of the United Nations responsible for many matters related to information ...
. Both
EUROPOL
Europol, officially the European Union Agency for Law Enforcement Cooperation, is the law enforcement agency of the European Union (EU). Established in 1998, it is based in The Hague, Netherlands, and serves as the central hub for coordinating c ...
and
INTERPOL
The International Criminal Police Organization – INTERPOL (abbreviated as ICPO–INTERPOL), commonly known as Interpol ( , ; stylized in allcaps), is an international organization that facilitates worldwide police cooperation and crime cont ...
also notably specialize on the subject.
Both Europol and Interpol specialize in operations against cyberterrorism as they both collaborate on different operations together and host a yearly joint cybercrime conference. While they both fight against cybercrime, both institutions operate differently. Europol sets up and coordinates cross-border operations against cybercriminals in the EU, while Interpol helps law enforcement and coordinates operations against cyber criminals globally.
Estonia and NATO
The Baltic state of Estonia was the target of a massive
denial-of-service attack that ultimately rendered the country offline and shut out from services dependent on Internet connectivity in April 2007. The infrastructure of Estonia including everything from online banking and mobile phone networks to government services and access to health care information was disabled for a time. The tech-dependent state experienced severe turmoil and there was a great deal of concern over the nature and intent of the attack.
The cyber attack was a result of an Estonian-Russian dispute over the removal of a bronze statue depicting a World War II-era Soviet soldier from the center of the capital, Tallinn.
In the midst of the armed conflict with Russia, Georgia likewise was subject to sustained and coordinated attacks on its electronic infrastructure in August 2008. In both of these cases, circumstantial evidence point to coordinated Russian attacks, but attribution of the attacks is difficult; though both the countries blame Moscow for contributing to the cyber attacks, proof establishing legal culpability is lacking.
Estonia joined NATO in 2004, which prompted NATO to carefully monitor its member states' response to the attack. NATO also feared escalation and the possibility of cascading effects beyond Estonia's border to other NATO members. In 2008, directly as a result of the attacks, NATO opened a new center of excellence on cyberdefense to conduct research and training on cyber warfare in Tallinn.
The chaos resulting from the attacks in Estonia illustrated to the world the dependence countries had on information technology. This dependence then makes countries vulnerable to future cyber attacks and terrorism.
Quick information on the cyber attack on Estonia and its effects on the country.
* Online services of Estoninan banks and government services were taken down by uncontrollable high level of internet traffic
* Media outlets were also down and so broadcasters could not deliver the news of the cyber attacks
* Some of the services were under attack for 22 days, while other online services were taken down completely
* Riots and Looting went on for 48 hours in Tallinn, Estonia
* The cyber attack served as a wake up call to Estonia and for the entire world on the importance of cyber defence.
As cyberattacks continue to increase around the world, countries still look at the attacks on Estonia in the 2007 as an example of how countries can fight future cyberattacks and terrorism. As a result of the attacks, Estonia is now currently one of the top countries in cyber defence and online safety and its capital city of Tallinn is home to NATO's cyber defense hub. The government of Estonia continues to update there cyber defence protocols and national cybersecurity strategies. NATO's Cooperative Cyber Defence Centre in Tallinn also conducts research and training on cyber security to not just help Estonia but other countries that are in the alliance.
China
The Chinese Defense Ministry confirmed the existence of an online defense unit in May 2011. Composed of about thirty elite internet specialists, the so-called "Cyber Blue Team", or "Blue Army", is officially claimed to be engaged in cyber-defense operations, though there are fears the unit has been used to penetrate secure online systems of foreign governments. China's leaders have invested in its foundations of cyber defense and quantum computing and artificial intelligence. 39 Chinese soldiers were chosen to strengthen China's cyber defenses. The reason given by Spokesman for the Ministry of National Defense, Geng Yansheng was that their internet protection was currently weak. Geng claimed that the program was only temporary to help improve cyber defenses.
India
To counter the cyber terrorists, also called "white-collar jihadis", the police in
India
India, officially the Republic of India, is a country in South Asia. It is the List of countries and dependencies by area, seventh-largest country by area; the List of countries by population (United Nations), most populous country since ...
has registered private citizens as volunteers who patrol the internet and report the suspected cyber terrorists to the government. These volunteers are categorised in three categories, namely "Unlawful Content Flaggers", "Cyber Awareness Promoters" and "Cyber Experts". In August 2021, police arrested five suspected white-collar jihadis who were preparing a hit list of officers, journalists, social activists, lawyers and political functionaries to create fear among people. The white-collar jihadis are considered "worst kind of terrorists" as they remain anonymous and safe in other nations, but inflict "immeasurable" amount of damage and brainwashing.
[Jammu and Kashmir Police cracking down on ‘white-collar jihadis’]
The Tribune, 30 August 2021.
In India, the demand for cyber security professionals has increased over 100 per cent in 2021 and will rise 200 per cent by 2024.
Eighty two percent of companies in India had a ransomware attack in the year 2020. The cost it takes to recover from a ransomware attack in India has gone from $1.1 million in 2020 to $3.38 million in 2021. India is at the top of the list of 30 countries for ransomware attacks.
A cyber-attack took place on the electricity grid in Maharashtra that resulted in a power outage. This occurred in October 2020 and the authorities believe China was behind it.
Important information like dates of birth and full names were leaked for thousands of patients who were tested for COVID-19. This information was made accessible on Google and was leaked from government websites. The job portal IIMjobs was attacked and the information of 1.4 million people looking for jobs was leaked. The information leaked was quite extensive including the location of users and their names and phone numbers. The information for 500,000 Indian police personal was sold on a forum in February 2021. The information contained much personal information. The data was from a police exam taken in December 2019.
Korea
According to 2016 Deloitte Asia-Pacific Defense Outlook, South Korea's 'Cyber Risk Score' was 884 out of 1,000 and South Korea is found to be the most vulnerable country to cyber attacks in the Asia-Pacific region. Considering South Korea's high speed internet and cutting-edge technology, its cyber security infrastructure is relatively weak. The
2013 South Korea cyberattack significantly damaged the Korean economy. This attack wounded the systems of two banks and the computer networks of three TV broadcasters. The incident was a massive blow, and the attacker was never identified. It was theorized to be North Korea. The week before North Korea accused the United States and South Korea of shutting down their internet for two days. In 2017, a
ransomware
Ransomware is a type of malware that Encryption, encrypts the victim's personal data until a ransom is paid. Difficult-to-trace Digital currency, digital currencies such as paysafecard or Bitcoin and other cryptocurrency, cryptocurrencies are com ...
attack harassed private companies and users, who experienced personal information leakage. Additionally, there were North Korea's cyber attacks which risked national security of South Korea.
In response to this, South Korean government's countermeasure is to protect the
information security
Information security is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or reducing the probability of unauthorized or inappropriate access to data ...
centres the National Intelligence Agency. Currently, 'cyber security' is one of the major goals of NIS Korea. Since 2013, South Korea had established policies related to National cyber security and trying to prevent cyber crises via sophisticated investigation on potential threats. Meanwhile, scholars emphasize on improving the national consciousness towards cyber attacks as South Korea had already entered the so-called 'hyper connected society'.
North Korea's cyberwarfare is incredibly efficient and the best of state-sponsored hackers. Those who are chosen to be hackers are selected when they are young and trained specifically in cyberwarfare. Hackers are trained to steal money from ATMs but not enough to be reported. North Korea is great at zero-day exploits. The country will hack anyone they chose to. They steal secrets from companies and government agencies and steal money from financial systems to fund their hacking operations.
Pakistan
Pakistan
Pakistan, officially the Islamic Republic of Pakistan, is a country in South Asia. It is the List of countries and dependencies by population, fifth-most populous country, with a population of over 241.5 million, having the Islam by country# ...
i Government has also taken steps to curb the menace of cyberterrorism and extremist propaganda
National Counter Terrorism Authority (Nacta)is working on joint programs with different NGOs and other cyber security organizations in Pakistan to combat this problem. Surf Safe Pakistan is one such example. Now people in Pakistan can report extremist and terrorist related content online on Surf Safe Pakistan portal. The National Counter Terrorism Authority (NACTA) provides the Federal Government's leadership for the Surf Safe Campaign.
Ukraine
A series of
powerful cyber attacks began 27 June 2017, that swamped websites of Ukrainian organizations, including banks, ministries, newspapers and electricity firms.
USA
The
US Department of Defense
The United States Department of Defense (DoD, USDOD, or DOD) is an executive department of the U.S. federal government charged with coordinating and supervising the six U.S. armed services: the Army, Navy, Marines, Air Force, Space Force, ...
(DoD) charged the
United States Strategic Command
The United States Strategic Command (USSTRATCOM) is one of the eleven unified combatant commands in the United States Department of Defense. Headquartered at Offutt Air Force Base, Nebraska, USSTRATCOM is responsible for Strategic_nuclear_weap ...
with the duty of combating cyberterrorism. This is accomplished through the
Joint Task Force-Global Network Operations, which is the operational component supporting
USSTRATCOM in defense of the DoD's
Global Information Grid. This is done by integrating
GNO capabilities into the operations of all DoD computers, networks, and systems used by DoD combatant commands, services and agencies.
On 2 November 2006, the Secretary of the Air Force announced the creation of the Air Force's newest
MAJCOM, the
Air Force Cyber Command, which would be tasked to monitor and defend American interest in cyberspace. The plan was however replaced by the creation of
Twenty-Fourth Air Force which became active in August 2009 and would be a component of the planned
United States Cyber Command
United States Cyber Command (USCYBERCOM) is one of the eleven unified combatant commands of the United States Department of Defense (DoD). It unifies the direction of cyberspace operations, strengthens DoD cyberspace capabilities, and integra ...
.
On 22 December 2009, the White House named its head of
computer security
Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security. It consists of the protection of computer software, systems and computer network, n ...
as
Howard Schmidt to coordinate U.S Government, military and intelligence efforts to repel hackers. He left the position in May 2012. Michael Daniel was appointed to the position of White House Coordinator of Cyber Security the same week and continues in the position during the second term of the Obama administration.
Obama signed an executive order to enable the US to impose sanctions on either individuals or entities that are suspected to be participating in cyber related acts. These acts were assessed to be possible threats to US national security, financial issues or foreign policy issues. U.S. authorities indicted a man over 92 cyberterrorism hacks attacks on computers used by the Department of Defense. A Nebraska-based consortium apprehended four million hacking attempts in the course of eight weeks. In 2011 cyberterrorism attacks grew 20%.
In May 2021, President Joe Biden announced an executive order aiming to improve America's cybersecurity. It came about after an increase in cybersecurity attacks aimed at the country's public and private sector. The plan aims to improve the government's cyberdefense by working on its ability to identify, deter, protect against, detect, and respond to attacks. The plan has 10 sections written into the document that include, to name a few, improving sharing of threat information, modernizing the government's cybersecurity, and establishing a Cybersecurity Review Board.
Examples
An operation can be done by anyone anywhere in the world, for it can be performed thousands of miles away from a target. An attack can cause serious damage to a critical infrastructure which may result in casualties.
Some attacks are conducted in furtherance of political and social objectives, as the following examples illustrate:
* In 1996, a computer hacker allegedly associated with the White Supremacist movement temporarily disabled a Massachusetts ISP and damaged part of the ISP's record keeping system. The ISP had attempted to stop the hacker from sending out worldwide racist messages under the ISP's name. The hacker signed off with the threat: "you have yet to see true electronic terrorism. This is a promise."
* In 1998, Spanish protesters bombarded the Institute for Global Communications (IGC) with thousands of bogus e-mail messages. E-mail was tied up and undeliverable to the ISP's users, and support lines were tied up with people who couldn't get their mail. The protestors also spammed IGC staff and member accounts, clogged their Web page with bogus credit card orders, and threatened to employ the same tactics against organizations using IGC services. They demanded that IGC stop hosting the Web site for the Euskal Herria Journal, a New York-based publication supporting Basque independence. Protestors said IGC supported terrorism because a section on the Web pages contained materials on the terrorist group
ETA
Eta ( ; uppercase , lowercase ; ''ē̂ta'' or ''ita'' ) is the seventh letter of the Greek alphabet, representing the close front unrounded vowel, . Originally denoting the voiceless glottal fricative, , in most dialects of Ancient Greek, it ...
, which claimed responsibility for assassinations of Spanish political and security officials, and attacks on military installations. IGC finally relented and pulled the site because of the "mail bombings".
* In 1998, ethnic
Tamil guerrillas attempted to disrupt
Sri Lanka
Sri Lanka, officially the Democratic Socialist Republic of Sri Lanka, also known historically as Ceylon, is an island country in South Asia. It lies in the Indian Ocean, southwest of the Bay of Bengal, separated from the Indian subcontinent, ...
n embassies by sending large volumes of e-mail. The embassies received 800 e-mails a day over a two-week period. The messages read "We are the Internet Black Tigers and we're doing this to disrupt your communications." Intelligence authorities characterized it as the first known attack by terrorists against a country's computer systems.
* During the
Kosovo
Kosovo, officially the Republic of Kosovo, is a landlocked country in Southeast Europe with International recognition of Kosovo, partial diplomatic recognition. It is bordered by Albania to the southwest, Montenegro to the west, Serbia to the ...
conflict in 1999,
NATO
The North Atlantic Treaty Organization (NATO ; , OTAN), also called the North Atlantic Alliance, is an intergovernmental organization, intergovernmental Transnationalism, transnational military alliance of 32 Member states of NATO, member s ...
computers were blasted with e-mail bombs and hit with denial-of-service attacks by hacktivists protesting the NATO bombings. In addition, businesses, public organizations and academic institutes received highly politicized virus-laden e-mails from a range of Eastern European countries, according to reports. Web defacements were also common. After the Chinese Embassy was accidentally bombed in Belgrade,
Chinese hacktivists posted messages such as "We won't stop attacking until the war stops!" on U.S. government Web sites.
* Since December 1997, the Electronic Disturbance Theater (EDT) has been conducting Web sit-ins against various sites in support of the
Mexican Zapatistas. At a designated time, thousands of protestors point their browsers to a target site using software that floods the target with rapid and repeated download requests. EDT's software has also been used by animal rights groups against organizations said to abuse animals. Electrohippies, another group of hacktivists, conducted Web sit-ins against the WTO when they met in Seattle in late 1999. These sit-ins all require mass participation to have much effect, and thus are more suited to use by activists than by terrorists.
* In 2000, a
Japan
Japan is an island country in East Asia. Located in the Pacific Ocean off the northeast coast of the Asia, Asian mainland, it is bordered on the west by the Sea of Japan and extends from the Sea of Okhotsk in the north to the East China Sea ...
ese investigation revealed that the government was using software developed by computer companies affiliated with
Aum Shinrikyo
, better known by their former name , is a Japanese new religions, Japanese new religious movement and doomsday cult founded by Shoko Asahara in 1987. It carried out the deadly Tokyo subway sarin attack in 1995 and was found to have been respo ...
, the doomsday sect responsible for the sarin gas attack on the Tokyo subway system in 1995. "The government found 100 types of software programs used by at least 10 Japanese government agencies, including the Defense Ministry, and more than 80 major Japanese companies, including Nippon Telegraph and Telephone." Following the discovery, the Japanese government suspended use of Aum-developed programs out of concern that Aum-related companies may have compromised security by breaching firewalls. gaining access to sensitive systems or information, allowing invasion by outsiders, planting viruses that could be set off later, or planting malicious code that could cripple computer systems and key data system.
* In March 2013, ''The New York Times'' reported on a pattern of cyber attacks against U.S. financial institutions believed to be instigated by
Iran
Iran, officially the Islamic Republic of Iran (IRI) and also known as Persia, is a country in West Asia. It borders Iraq to the west, Turkey, Azerbaijan, and Armenia to the northwest, the Caspian Sea to the north, Turkmenistan to the nort ...
as well as incidents affecting South Korean financial institutions that originate with the North Korean government.
* In August 2013, media companies including ''The New York Times'',
Twitter
Twitter, officially known as X since 2023, is an American microblogging and social networking service. It is one of the world's largest social media platforms and one of the most-visited websites. Users can share short text messages, image ...
and the
Huffington Post
''HuffPost'' (''The Huffington Post'' until 2017, itself often abbreviated as ''HPo'') is an American progressive news website, with localized and international editions. The site offers news, satire, blogs, and original content, and covers ...
lost control of some of their websites after hackers supporting the
Syria
Syria, officially the Syrian Arab Republic, is a country in West Asia located in the Eastern Mediterranean and the Levant. It borders the Mediterranean Sea to the west, Turkey to Syria–Turkey border, the north, Iraq to Iraq–Syria border, t ...
n government breached the Australian Internet company that manages many major site addresses. The Syrian Electronic Army, a hacker group that has previously attacked media organisations that it considers hostile to the regime of Syrian president Bashar al-Assad, claimed credit for the Twitter and Huffington Post hacks in a series of Twitter messages. Electronic records showed that NYTimes.com, the only site with an hours-long outage, redirected visitors to a server controlled by the Syrian group before it went dark.
* Pakistani Cyber Army is the name taken by a group of
hackers who are known for their defacement of websites, particularly
India
India, officially the Republic of India, is a country in South Asia. It is the List of countries and dependencies by area, seventh-largest country by area; the List of countries by population (United Nations), most populous country since ...
n,
Chinese, and
Israel
Israel, officially the State of Israel, is a country in West Asia. It Borders of Israel, shares borders with Lebanon to the north, Syria to the north-east, Jordan to the east, Egypt to the south-west, and the Mediterranean Sea to the west. Isr ...
i companies and governmental organizations, claiming to represent
Pakistani nationalist and
Islam
Islam is an Abrahamic religions, Abrahamic monotheistic religion based on the Quran, and the teachings of Muhammad. Adherents of Islam are called Muslims, who are estimated to number Islam by country, 2 billion worldwide and are the world ...
ic interests. The group is thought to have been active since at least 2008, and maintains an active presence on social media, especially Facebook. Its members have claimed responsibility for the hijacking of websites belonging to
Acer,
BSNL, India's
CBI,
Central Bank
A central bank, reserve bank, national bank, or monetary authority is an institution that manages the monetary policy of a country or monetary union. In contrast to a commercial bank, a central bank possesses a monopoly on increasing the mo ...
, and the State Government of
Kerala
Kerala ( , ) is a States and union territories of India, state on the Malabar Coast of India. It was formed on 1 November 1956, following the passage of the States Reorganisation Act, by combining Malayalam-speaking regions of the erstwhile ...
.
*British hacker
Kane Gamble, sentenced to 2 years in youth detention, posed as
CIA chief to access highly sensitive information. He also "cyber-terrorized" high-profile
U.S. intelligence officials such as then CIA chief
John Brennan or Director of National Intelligence
James Clapper
James Robert Clapper Jr. (born March 14, 1941) is a retired lieutenant general in the United States Air Force and former Director of National Intelligence. Clapper has held several key positions within the United States Intelligence Community. ...
. The judge said Gamble engaged in "politically motivated cyber terrorism".
*In March 2021 hackers affiliated with Russia were reported to have targeted Lithuanian Officials and decision makers. The cyber-espionage group APT29 which is believed to have carried out the attacks utilized the country's own IT infrastructure against organizations involved in the development of a
COVID-19
Coronavirus disease 2019 (COVID-19) is a contagious disease caused by the coronavirus SARS-CoV-2. In January 2020, the disease spread worldwide, resulting in the COVID-19 pandemic.
The symptoms of COVID‑19 can vary but often include fever ...
vaccine.
*On 7 May 2021, the Colonial Pipeline was hit with a cyberattack that disrupted oil distribution. The Colonial Pipeline is a pipeline that controls almost half (45%) of the oil that runs through the East Coast of the United States. This attack caused the company to turn off the pipeline, which it had never done before. Thus, many people panicked buying gasoline at gas stations, and the government thought this attack would quickly spread. Ultimately, the Colonial Pipeline paid nearly an amount of 5 million dollars worth of cryptocurrency. Even though the Colonial paid all the money, the system did not turn on as rapidly as it used to. The hacker accused of this attack is a group called DarkSide. The money that the Colonial paid went to DarkSide, but there are other entities involved as well. For now, DarkSide has decided to discontinue its operations.
*On 30 May 2021, JBS was exposed to a cyberattack of ransomware which delayed the plant's meat production. JBS is the world's largest meat producer that provides meat-related products for people. This attack caused the shutdown of all nine beef factories in the United States and disrupted poultry and pork production. In addition, labor had to be cut due to the closings of the factories, and the cost of meat increased due to no meat being produced. Ultimately, JBS had to pay 11 million dollars worth of cryptocurrency to regain control. A group called REvil was responsible for the attack. REvil is a group based in the country of Russia that is also one of the most productive ransomware organizations.
* In the summer of 2021, crimes committed in Cyprus, Israel and Lithuania were classified by experts as Internet terrorism. Anonymous persons informed law enforcement authorities through the internet about mined business centers and office buildings. Main target was the gambling company Affise. According to Ambassador John R. Bolton, these occurrences are vivid examples of Internet terrorism. Amb. Bolton believes that they are consequences of financial conflict stirred among the owners of Affise, PlayCash and "CyberEye-25" group. According to the expert, all three companies gain illicit income associated with criminal activities on the Internet.
*In early December 2021 it was reported least nine U.S State Department had their phones hacked by an unknown attacker. All nine employees had Apple iPhones. The hack, which took place over several months, was done through the use of iMessages that had a software attached that when sent, without needing to be interacted with, installed spyware known as Pegasus. The software used was developed and sold by an Israel-based spyware development company named
NSO Group
NSO Group Technologies (NSO standing for Niv, Shalev and Omri, the names of the company's founders) is an Israeli cyber-intelligence firm primarily known for its proprietary spyware Pegasus, which is capable of remote zero-click surveillance ...
.
*In December 2021 at least five US defense and tech firms have been hacked by a group operating from China. The group took advantage of an exploit used in these organization's software to conduct their campaign which came to light in upcoming months. The target of these breaches were passwords as well as having the goal of intercepting private communications. As of right now the extent of the damage is unclear as the breaches are ongoing.
* As a response to the
2022 Russian invasion of Ukraine
On 24 February 2022, , starting the largest and deadliest war in Europe since World War II, in a major escalation of the Russo-Ukrainian War, conflict between the two countries which began in 2014. The fighting has caused hundreds of thou ...
,
Anonymous
Anonymous may refer to:
* Anonymity, the state of an individual's identity, or personally identifiable information, being publicly unknown
** Anonymous work, a work of art or literature that has an unnamed or unknown creator or author
* Anonym ...
performed many attacks against computer systems in
Russia
Russia, or the Russian Federation, is a country spanning Eastern Europe and North Asia. It is the list of countries and dependencies by area, largest country in the world, and extends across Time in Russia, eleven time zones, sharing Borders ...
. Most notably, Anonymous committed a cyberattack against
Roskomnadzor in March 2022.
Sabotage
Non-political acts of
sabotage
Sabotage is a deliberate action aimed at weakening a polity, government, effort, or organization through subversion, obstruction, demoralization (warfare), demoralization, destabilization, divide and rule, division, social disruption, disrupti ...
have caused financial and other damage. In 2000, disgruntled employee Vitek Boden caused the release of 800,000 litres of untreated sewage into waterways in
Maroochy Shire, Australia.
More recently, in May 2007
Estonia
Estonia, officially the Republic of Estonia, is a country in Northern Europe. It is bordered to the north by the Gulf of Finland across from Finland, to the west by the Baltic Sea across from Sweden, to the south by Latvia, and to the east by Ru ...
was subjected to a mass cyber-attack in the wake of the removal of a Russian World War II war memorial from downtown Tallinn. The attack was a distributed
denial-of-service attack
In computing, a denial-of-service attack (DoS attack) is a cyberattack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host co ...
in which selected sites were bombarded with traffic to force them offline; nearly all Estonian government ministry networks as well as two major Estonian bank networks were knocked offline; in addition, the political party website of Estonia's Prime Minister Andrus Ansip featured a counterfeit letter of apology from Ansip for removing the memorial statue. In January 2008 a man from Estonia was convicted for launching the attacks against the
Estonian Reform Party
The Estonian Reform Party () is a liberal political party in Estonia. The party has been led by Kristen Michal since 2024. It is colloquially known as the "Squirrel Party" () or as "the Squirrels" (), referencing its logo.
It was founded in ...
website and fined.
During the
Russo-Georgian War
The August 2008 Russo-Georgian War, also known as the Russian invasion of Georgia,Occasionally, the war is also referred to by other names, such as the Five-Day War and August War. was a war waged against Georgia by the Russian Federation and the ...
, on 5 August 2008, three days before Georgia launched its invasion of South Ossetia, the websites for
OSInform News Agency and
OSRadio were hacked. The OSinform website at osinform.ru kept its header and logo, but its content was replaced by a feed to the
Alania TV website content. Alania TV, a Georgian government-supported television station aimed at audiences in South Ossetia, denied any involvement in the hacking of the websites.
Dmitry Medoyev, at the time the South Ossetian
envoy
Envoy or Envoys may refer to:
Diplomacy
* Diplomacy, in general
* Envoy (title)
* Special envoy, a type of Diplomatic rank#Special envoy, diplomatic rank
Brands
*Airspeed Envoy, a 1930s British light transport aircraft
*Envoy (automobile), an au ...
to
Moscow
Moscow is the Capital city, capital and List of cities and towns in Russia by population, largest city of Russia, standing on the Moskva (river), Moskva River in Central Russia. It has a population estimated at over 13 million residents with ...
, claimed that Georgia was attempting to cover up information on events which occurred in the lead-up to the war.
One such cyber attack caused the
Parliament of Georgia
The Parliament of Georgia ( ka, საქართველოს პარლამენტი, tr) is the supreme national legislature of Georgia. It is a unicameral parliament, currently consisting of 150 members elected through fully pr ...
and
Georgian Ministry of Foreign Affairs websites to be replaced by images comparing Georgian president
Mikheil Saakashvili
Mikheil "Misha" Saakashvili (born 21 December 1967) is a Georgian and Ukrainian politician and jurist. He was the third president of Georgia for two consecutive terms from 25 January 2004 to 17 November 2013. He is the founder and former chair ...
to
Adolf Hitler
Adolf Hitler (20 April 1889 – 30 April 1945) was an Austrian-born German politician who was the dictator of Nazi Germany from 1933 until Death of Adolf Hitler, his suicide in 1945. Adolf Hitler's rise to power, He rose to power as the lea ...
.
Other attacks involved
denials of service to numerous Georgian and Azerbaijani websites,
such as when Russian hackers allegedly disabled the servers of the Azerbaijani Day.Az news agency.
[ Today.az (11 August 2008)]
Russian intelligence services undertook large scale attack against Day.Az server
/ref>
In June 2019, Russia
Russia, or the Russian Federation, is a country spanning Eastern Europe and North Asia. It is the list of countries and dependencies by area, largest country in the world, and extends across Time in Russia, eleven time zones, sharing Borders ...
has conceded that it is "possible" its electrical grid
An electrical grid (or electricity network) is an interconnected network for electricity delivery from producers to consumers. Electrical grids consist of power stations, electrical substations to step voltage up or down, electric power tran ...
is under cyber-attack by the United States
The United States of America (USA), also known as the United States (U.S.) or America, is a country primarily located in North America. It is a federal republic of 50 U.S. state, states and a federal capital district, Washington, D.C. The 48 ...
. The ''New York Times'' reported that American hackers from the United States Cyber Command
United States Cyber Command (USCYBERCOM) is one of the eleven unified combatant commands of the United States Department of Defense (DoD). It unifies the direction of cyberspace operations, strengthens DoD cyberspace capabilities, and integra ...
planted malware potentially capable of disrupting the Russian electrical grid.
Website defacement and denial of service
Even more recently, in October 2007, the website of Ukrainian president Viktor Yushchenko
Viktor Andriiovych Yushchenko (, ; born 23 February 1954) is a Ukrainian politician who was the third president of Ukraine from 23 January 2005 to 25 February 2010. He aimed to orient Ukraine towards Western world, the West, European Union, and N ...
was attacked by hackers. A radical Russian nationalist youth group, the Eurasian Youth Movement, claimed responsibility.
In 1999 hackers attacked NATO
The North Atlantic Treaty Organization (NATO ; , OTAN), also called the North Atlantic Alliance, is an intergovernmental organization, intergovernmental Transnationalism, transnational military alliance of 32 Member states of NATO, member s ...
computers. The computers flooded them with email and hit them with a denial-of-service attack
In computing, a denial-of-service attack (DoS attack) is a cyberattack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host co ...
. The hackers were protesting against the NATO bombings of the Chinese embassy in Belgrade. Businesses, public organizations and academic institutions were bombarded with highly politicized emails containing viruses from other European countries.
In December 2018, Twitter
Twitter, officially known as X since 2023, is an American microblogging and social networking service. It is one of the world's largest social media platforms and one of the most-visited websites. Users can share short text messages, image ...
warned of "unusual activity" from China
China, officially the People's Republic of China (PRC), is a country in East Asia. With population of China, a population exceeding 1.4 billion, it is the list of countries by population (United Nations), second-most populous country after ...
and Saudi Arabia
Saudi Arabia, officially the Kingdom of Saudi Arabia (KSA), is a country in West Asia. Located in the centre of the Middle East, it covers the bulk of the Arabian Peninsula and has a land area of about , making it the List of Asian countries ...
. A bug was detected in November that could have revealed the country code of users' phone numbers. Twitter said the bug could have had ties to "state-sponsored actors".
In May 2021 successive waves of DDOS attacks aimed at Belnet, Belgium's public sector ISP, took down multiple government sites in Belgium. 200 sites were affected leaving public offices, universities, and research centers unable to access the internet fully or partially.
In fiction
* The Japanese cyberpunk
Cyberpunk is a subgenre of science fiction in a dystopian futuristic setting said to focus on a combination of "low-life and high tech". It features futuristic technological and scientific achievements, such as artificial intelligence and cyberwa ...
manga
are comics or graphic novels originating from Japan. Most manga conform to a style developed in Japan in the late 19th century, and the form has a long history in earlier Japanese art. The term is used in Japan to refer to both comics ...
, ''Ghost in the Shell
''Ghost in the Shell'' is a Japanese cyberpunk media franchise based on the manga series of the same name written and illustrated by Masamune Shirow. The manga, first serialized between 1989 and 1991, is set in mid-21st century Japan and tel ...
'' (as well as its popular movie and TV adaptations) centers around an anti-cyberterrorism and cybercrime
Cybercrime encompasses a wide range of criminal activities that are carried out using digital devices and/or Computer network, networks. It has been variously defined as "a crime committed on a computer network, especially the Internet"; Cyberc ...
unit. In its mid-21st century Japan setting such attacks are made all the more threatening by an even more widespread use of technology including cybernetic enhancements to the human body allowing people themselves to be direct targets of cyberterrorist attacks.
* In the movie '' Live Free or Die Hard'', John McClane (Bruce Willis
Walter Bruce Willis (born March 19, 1955) is a retired American actor. He achieved fame with a leading role on the comedy-drama series ''Moonlighting (TV series), Moonlighting'' (1985–1989) and has appeared in over one hundred films, gaining ...
) takes on a group of cyberterrorists intent on shutting down the entire computer network of the United States.
* The movie '' Eagle Eye'' involves a super computer controlling everything electrical and networked to accomplish the goal.
* The plots of '' 24'' Day 4 and Day 7 include plans to breach the nation's nuclear plant grid and then to seize control of the entire critical infrastructure protocol.
* The Tom Clancy created series Netforce was about an FBI/Military team dedicated to combating cyberterrorists.
* Much of the plot of ''Mega Man Battle Network
is a Tactical role-playing game, tactical role-playing video game series created by Masahiro Yasuma and developed and published by Capcom as a spin-off of the ''Mega Man'' series. Released in 2001 for the Game Boy Advance, it takes place in an a ...
'' is centered around cyberterrorism.
* In the 2009 Japanese animated film '' Summer Wars'', an artificial intelligence cyber-terrorist attempts to take control over the world's missiles in order to "win" against the main characters that attempted to keep it from manipulating the world's electronic devices.
* In the 2012 film Skyfall
''Skyfall'' is a 2012 spy thriller film and the twenty-third in the ''James Bond'' series produced by Eon Productions. The film is the third to star Daniel Craig as fictional MI6 agent James Bond and features Javier Bardem as Raoul Silva, ...
, part of the James Bond
The ''James Bond'' franchise focuses on James Bond (literary character), the titular character, a fictional Secret Intelligence Service, British Secret Service agent created in 1953 by writer Ian Fleming, who featured him in twelve novels ...
franchise, main villain Raoul Silva ( Javier Bardem) is an expert cyberterrorist who is responsible for various cyberterrorist incidents in the past.
* Cyberterrorism plays a role in the 2012 video game '' Call of Duty: Black Ops II'', first when main antagonist Raul Menendez cripples the Chinese economy with a cyberattack and frames the United States for it, starting a new Cold War between the two powers. Later, another cyberattack with a computer worm leads to Menendez seizing control of the entire U.S drone fleet. Finally, one of the game's endings leads to another attack similar to the latter, this time crippling the U.S' electrical and water distribution grids. An alternate ending depicts the cyberattack failing after it is stopped by one of the game's characters pivotal to the storyline.
* The plot of the 2014 video game '' Watch Dogs'' is heavily influenced by cyber-terrorism. In which players take control of the game's protagonist, Aiden Pierce, an accused murder suspect, who hacks into a ctOS (Central Operating System), giving him complete control of Chicago
Chicago is the List of municipalities in Illinois, most populous city in the U.S. state of Illinois and in the Midwestern United States. With a population of 2,746,388, as of the 2020 United States census, 2020 census, it is the List of Unite ...
's mainframe in order to hunt down his accusers.
* In the television series ''Mr. Robot
''Mr. Robot'' is an American drama thriller television series created by Sam Esmail for USA Network. It stars Rami Malek as Elliot Alderson, a cybersecurity engineer and hacker with social anxiety disorder, clinical depression, and dissoci ...
'', the main plot line follows groups of hackers who engage in cyber terrorism as well as other events.
See also
* 2007 cyberattacks on Estonia
* 2008 cyberattacks during South Ossetia war
* Anonymous (group)
Anonymous is a decentralized international Activism, activist and Hacktivism, hacktivist collective and Social movement, movement primarily known for its various cyberattacks against several governments, government institutions and Governmen ...
* Computer crime
Cybercrime encompasses a wide range of criminal activities that are carried out using digital devices and/or networks. It has been variously defined as "a crime committed on a computer network, especially the Internet"; Cybercriminals may exp ...
* Cyberwarfare
Cyberwarfare is the use of cyberattack, cyber attacks against an enemy State (polity), state, causing comparable harm to actual warfare and/or disrupting vital computer systems. Some intended outcomes could be espionage, sabotage, propaganda, ...
* FBI Cyber Division
* List of cyber warfare forces
* Patriotic hacking
* United States Computer Emergency Readiness Team (US-CERT)
References
Further reading
*
*Bibi van Ginkel
"The Internet as Hiding Place of Jihadi Extremists" (International Centre for Counter-Terrorism – The Hague, 2012)
*
*
*
*
*
*
*
*
* U.S. Army Cyber Operations and Cyber Terrorism Handbook 1.02
*
*
* Rolón, Darío N., (2013
Control, vigilancia y respuesta penal en el ciberespacio
Latinamerican's new security thinking, Clacso.
*
* Record, Jeffery: Bounding the Global War on Terrorism, Strategic Studies Institute, US Army War College, Leavenworth, 2003
* Schmid, Alex and Jongmans, Albert et al.: Political Terrorism: A new guide to Action, Authors, Concepts, Data Bases, Theories and Literature, Transaction Books, New Brunswick, 1988
* COE DAT Cyber Terrorism Course IV 9 Mar
* Hennessy, Joh L and others: Information Technology for Counterterrorism, National Academies Press,
Washington DC, 2003
* Hoffman, Bruce: Inside Terrorism, Columbia University Press, New York, 2006
* Laqueur, Walter: The New Terrorism: Fanaticism and the Arms of Mass Destruction, Oxford University
Press, New York, 1999
* Sageman, Marc: Understanding Terror Networks, Penn, Philadelphia, 2004
* Wilkinson, Paul: Terrorism Versus Democracy, Routledge, London, 2006
External links
General
CRS Report for Congress – Computer Attack and Cyber Terrorism
– 17/10/03
ABC Australia interview with Professor Hsinchun Chen
Department of Defense Cyber Crime Center
Global response to cyberterrorism and cybercrime: A matrix for international cooperation and vulnerability assessment
News
Cyber Security Task Force Takes 'Whole Government' Approach
FBI
The Federal Bureau of Investigation (FBI) is the domestic Intelligence agency, intelligence and Security agency, security service of the United States and Federal law enforcement in the United States, its principal federal law enforcement ag ...
, 20 October 2014
BBC News – US warns of al-Qaeda cyber threat
– 01/12/06
BBC News – Cyber terrorism 'overhyped'
– 14/03/03
Calls for anti-cyber terrorism bill resurface in South Korea
– NK News
NK News is an American subscription-based news website that provides stories and analysis about North Korea. Established in 2011, it is headquartered in Seoul, South Korea with reporters in Washington, D.C., and London. Reporting is based on in ...
{{Terrorism topics
Cyberattacks
Cybercrime
Cyberwarfare
Terrorism by method