Misty Royall
Cyberterrorism
1. Lead Section
2. Definition of Cyberterrorism
2.1. Defining cyberterrorism can be difficult because it is hard to define terrorism itself (54). NATOs defines cyberterrorism as, “ a cyberattack using or exploiting computer or communication networks to cause sufficient destruction or disruption to generate fear or to intimidate a society into an ideological goal” (52). The National Infrastructure Protection Center defines it as, “A criminal act perpetrated by the use of computers and telecommunications capabilities resulting in violence, destruction, and/or disruption of services to create fear by causing confusion and certainty within a given population conform to a political, social, or ideological agent.” (52). Lastly, the FBI defines it as, “premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets by subnational groups or clandestine agents” (52).
2.2. Across these definitions, they all share the view that cyberterrorism is politically and/or ideologically inclined. One area of debate is the difference between cyberterrorism and hacktivism. Hacktivism is,” the marriage of hacking with political activism” (53). Both items are politically driven, and involve using computers while cyberterrorism is primarily used to cause harm. It becomes an issue because acts of violence on the computer can be labeled either cyberterrorism or hacktivism and within the knowledge of the differences they can be mislabeled.
3. Types of cyberterrorism capability
3.1.1. Concerns
3.1.2. Effects-including how cyberterrorism can affect governments and individuals.
4. History
5. Motives
6. International response
6.1. U.S. military/protections against cyberterrorism
6.1.1. The US has started a cyber-war, “a concept that refers to information oriented military warfare” (54). The cyber war is focused on stopping any major attack before it comes. It is a way to monitor security threats that occurs online and via technology.
6.2. Estonia and NATO
6.2.1. Update the NATO section, because they have made some changes.
6.3. China
6.3.1. add more this section is very small an does not give much insight
6.4. Pakistan
6.4.1. add more this section is very small an does not give much insight
7. Examples
7.1. Sabotage
7.2. Website defacement and denial of service
8. In fiction
9 See also
10 References
11 Further reading
11.1. www.terror.net: How Modern Terrorism Uses the Internet, by Gabriel Weimann (Special Report 116, February 2004)
11.2 Terrorism in the Horn of Africa (Special Report 113, January 2004)
11.3 Global Terrorism after the Iraq War (Special Report 111, October 2003)
11.4 The Diplomacy of Counterterrorism: Lessons Learned, Ignored, and Disputed (Special Report 80, January 2002)
. 11.5 For terrorism and counterterrorism links, visit www.usip.org/library/topics/terrorism.htm
12 External links
13 Punishment
13.2 A major within punishing cyber terrorism is, “the fact that cyber terrorist attacks are conducted in multiple states, the procedure of prosecution is difficult; therefore, the attacked country will invoke international law to seek justice for damage caused. Although nations must come up with self-regulatory legal mechanisms to combat against the misuse of new technologies, such mechanisms need to be”(55). Cyber terrorism is an international crime and the response against such crime must be international. These crimes come under universal jurisdiction in two ways: “firstly, the heinous nature and scale of the offence, which encompasses grave breaches of humanitarian law; or secondly, because of the inadequacy of legislation by the nations involved, these crimes are committed in territories that are not subject to the authority of any states”(55). Customary international law includes opinion juris and state practice. Terrorism has been considered in a number of treaties (state practice), and numerous treaties have recognized various types of terrorism (55). It is accepted that cyber terrorism is generally a form of terrorism. These two elements of customary law opinion juris and state practice are suitable for application against terrorism and subject terrorism to universal jurisdiction. Crimes against humanity, such as genocide and piracy, are resolved by exercising universal jurisdiction. According to the principle universal jurisdiction, these crimes are subject to universal jurisdiction since as they are committed by a state, or representative of state, they may go unpunished. Until an international ruling is decided it will remain hard to punish terrorism.
13.3 Conferences
13.3.1 However, there are 17 specific conventions (including its complimentary) and major legal instruments which deal with terrorist activities and which may be applicable to cyber terrorism. These are:
13.3.2 1963 Convention on Offences and Certain Other Acts
13.3.3 Committed on Board Aircraft, 1970 Convention for the Suppression of Unlawful Seizure of
13.3.4 Aircraft, 2010 Protocol Supplementary to the Convention for the
13.3.5 Suppression of Unlawful Seizure of Aircraft, 1971 Convention for the Suppression of Unlawful Acts
13.3.6 Against the Safety of Civil Aviation, 1973 Convention on the Prevention and Punishment of
13.3.7 Crimes against Internationally Protected Persons, 1979 International Convention against the Taking of
13.3.8 Hostages, 1980 Convention on the Physical Protection of Nuclear
13.3.9 Material, 1988 Protocol for the Suppression of Unlawful Acts of
13.3.10 Violence at Airports Serving International Civil Aviation,
13.3.11 1989 Supplementary to the Convention for the Suppression
13.3.12 of Unlawful Acts against the Safety of Civil Aviation,1988 Convention for the Suppression of Unlawful Acts against the Safety of Maritime Navigation,2005 Protocol to the Convention for the Suppression of Unlawful Acts against the Safety of Maritime Navigation,1988 Protocol for the Suppression of Unlawful Acts against the Safety of Fixed Platforms Located on the Continental Shelf, the 1991 Convention on the Marking of Plastic Explosives for the Purpose of Detection,1997 International Convention for the Suppression of Terrorist Bombings, 1999 International Convention for the Suppression of the Financing of Terrorism,2005 International Convention for the Suppression of Acts of Nuclear Terrorism, and2010 Convention on the Suppression of Unlawful Acts Relating to International Civil Aviation.
13.3.13 For the time being, the only international UN body that specializes in dealing with cyber-attacks is the International Telecommunications Union (ITU), which has been attempting to set up a focus group to establish a minimum reference point against which network operators can access their security.
14 General
15 News
16 In fiction
17 See also
18 References
54 T.M. Chen et al. (eds.), Cyberterrorism: Understanding, Assessment, and Response, 207
DOI 10.1007/978-1-4939-0962-9, © Springer Science+Business Media New York 2014
53 Conway, Maura. "What is Cyberterrorism and How Real is the Threat?" Cyber Behavior (2008): 217-45. Web.
52 Center of Excellence Defence Against Terrorism. Responses to Cyber Terrorism. N.p.: n.p., 2008. Print.
18 Further reading
19 External links
20 General
21 News