Skip to main content

Can all cyber crimes be termed as cyber terrorism?


The nature of the terrorist threat to society has changed significantly in the course of recent years. We have recently seen several smaller but no less severe acts of terrorism around regions of great casualties and terrifying images, and the nature of the threat will continue to change as new technologies and abilities emerge from terrorist organizations. Cyber terrorism is a prime example of a newly vulnerable border.

Cyber threats have increased in recent years, with high-profile attacks making headlines across the world. Nuclear installations and critical command-and-control systems are not immune to cyber attacks; one such attack could facilitate the theft of useful weapons. Additionally, nuclear weapons activity could be interfered with and controlled by them

The term "cyber terrorism" is coined by the computer whiz Barry C. Collin. According to the U.S. Federal Bureau of Investigation, “Cyber terrorism is any premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets by sub-national groups or clandestine agents.”

The main objective of cyber terrorists is to take down a nation's critical infrastructure through cyber attacks to push forward the causes they defend as terrorists. Various infrastructures, including telecommunications, power grids; transport networks, banking & financial institutions and water facilities are at the top of their wish list. Supply, fuel production and supply chains, military complexes, government operations and emergency services are also potential targets.

In today's business world, systems and data are critical assets that are dependent on, and tampering with these assets can significantly affect market capitalization, reputation, and sales. A cyber security breach can destabilize an organization overnight.

Cybercrime cannot always be considered cyber terrorism. While all cyber terrorism incidents are cyber crimes, not all cybercrimes can be considered acts of cyber terrorism. Those cybercrimes that are ideologically or politically motivated are considered as cyber terrorism.

FBI defines a cyber-terror attack as an act of cybercrime specifically designed to cause physical harm. As of yet, however, there is no consensus between governments regarding what qualifies as cyber terrorism.

Many other organizations and experts believe that less harmful attacks are also acts of cyber terrorism, as long as they are harmful and promote the attacker's political views. Cybercrime activities are intentionally carried out: The primary motivation for cyber terrorism attacks is to disrupt or harm the targets, even if the attack does not cause physical injury or extreme financial loss.

Many cyber security experts believe an incident should be classified as cyber terrorism if it results in physical harm or death, either directly or indirectly by disruption of critical infrastructure, while others believe that physical damage is not a requirement for classification as a terrorist attack.

In order to attack critical infrastructure, cyber terrorists take advantage of a wide range of sophisticated tools. Many terrorist groups are interested in breaking into these networks. These tools include DDOS (Distributed Denial of Service), phishing, vishing (VoIP phishing), buffer overflow, IP spoofing, etc. Of these tools, DDOS is the perpetrators' favorite tool. The complexity and geographical scope of cyber attacks have grown in recent years. Also, the number of attacks has risen significantly. This can be attributed to several factors.

Terrorist groups view these attacks as asymmetric warfare against powerful nations, which is low-cost and low-risk. In recent years, a massive increase in cyber attacks has been attributed to easy access to malware on the web, the increasing technical capabilities of terrorist groups, the anonymity of the Internet and the ever-expanding network of critical infrastructures in industrialized and developing countries.

The rise of highly skilled hackers, often supported by the nation-state, coincides with the development of more sophisticated tools that are likely to break into the wider area via a thriving black market.

It's important to conduct a comprehensive cyber security audit of our critical infrastructure. It will help us identify our vulnerabilities and thus connect them.  Cyber attacks can be thwarted by devising and implementing more stringent encryption standards and access control systems as well as by increasing our technological capabilities in order to thwart these attacks before they happen. We should also train users of critical infrastructure to adopt secure practices.

Nevertheless, we must not forget that a cyber-terrorist only needs to exploit one vulnerability to accomplish his mission, while we must deal with the full range of security risks.


By: Reethamshi Kolipaka

(BBA LLB, ICFAI College)


Stay connected with us: www.worldcybersecurities.com

To get latest updates on various cyber related events & other things, you can join our Whatsapp group/Telegram Channel





Comments

  1. The purpose of cyber terrorism falls into mass destruction, distraction and disruption. Developing precise and adequate laws is the essential step.

    ReplyDelete
  2. Incorporating effective Cybersecurity protocols and implementing Cybersecurity policies and legislations at the global level could address Cyberterrorism effectively.

    ReplyDelete
  3. Really informative and well researched article

    ReplyDelete

Post a Comment

Popular posts from this blog

UNESCO Guidelines on Generative AI in Schools

The advent of artificial intelligence has assumed prominence amongst all industries and various facets of people's personal lives. The integration of AI in education has been inevitable, given the significance and role of information, knowledge production and administration in the sector. This is especially so as its capabilities entail replicating higher-order thinking. Besides assisting in the education process, it also brings the element of real-life relevance, allowing education to be imparted against the backdrop of the evolving world due to the same AI. It tends to have implications on the subject matter that needs to be imparted, which tends to be something that constantly needs to answer the question of "Why and how is this particular subject matter relevant for learning?".  This induces policy-makers and educational institutions to rethink what they need to impart as knowledge, the area of matter, and the manner of thinking to be emphasised. This is because educa...

Dark Web: Safe or unsafe? Truth Revealed!

  The dark web is the part of the internet that is not visible to search engines. With the advancement in technology, digitization has resulted in different types of attacks. We can talk to anyone as long as we have an internet connection. The main concern is with privacy and anonymity in mind.  A team of computer scientists and mathematicians working for one branch of the US navy which is known as the Naval Research laboratory (NRL), developed a new technology known as Onion Routing. It allows anonymous communication where the source and destination cannot be determined by the third party. A network using the Onion Routing technique is classified as Darknet. The NRL released the Onion Routing Technique and it became The Onion Router, also known as TOR. Advantages of Dark Web  Humans are allowed to hold privacy and express their views freely. Privacy is considered to be critical for honest persons through the different criminals and stalkers.  The growing tendency of...

India's Cybersecurity Landscape: New Rules, Rising Threats, and Government Response

The recent interaction of the newly reappointed Union IT Minister with journalists has sparked significant interest within the IT Industry and among privacy enthusiasts. Ashwini Vaishnaw announced on June 15 that the MEITY will soon release the rules under the Digital Personal Data Protection (DPDP) Act, a development of immense significance for India's cybersecurity landscape. [1] 's Acts. It holds immense significance for the country, especially with the increasing number of internet users.  Of 2023 for public consultation. The rules hold immense significance for a country like India, with 751.5 million internet users at the commencement of 2024 [2] . With the continuous surge in internet usage across India, the volume of personal data shared online is also on the rise. This occurs either voluntarily, such as an individual providing personal information to a social media platform to access its services, or involuntarily, as a consequence of falling victim to a cybercrime inci...