Definition of Cyberterrorism
Cyberterrorism is the use of new technologies by networked organizations for terrorism engagement. It is the convergence of terrorism and cyberspace and focuses on the physical destruction of data software and hardware or physical damage to equipment or personnel (US Army Training and Doctrine Command, 2005). It is often premeditated and political and results in violence against non-combat targets (Pollitt, 1998). The intent is to intimidate and influence government policy, assassination, mass destruction, disruption of essential services, or kidnapping. Cyberterrorism is more appealing for terrorists because it is cheaper to execute, is more anonymous, and can have an enormous variety of targets.
Tools Used by Cyberterrorists
Traffic for Virtual Blockade
One tool terrorists use is generating too much traffic on essential services, which disrupts normal operations. Another name for this tool is swamping; it occurs when there is a lot of traffic on one website. Terrorists can win publicity using this tool because many will know that specific government services are ineffective. For example, they can bombard a website with thousands of email requests and clog the system.
Computer Break-ins and Web Hacking
Terrorists can use hacking to access stored information such as financial and medical reports, government plans, or other content critical to the government. The hacking can be done remotely by interfering with the system, especially with advancements like the Internet of Things. Alternatively, hackers can enter an office and physically access the information they want. The objective is often to use the data they have illegally assessed to threaten, coerce, or blackmail the targeted persons.
Viruses and Worms
The tool comprises malicious codes against targeted computers that can propagate over a network. For example, the terrorist attack on September 11, 2001, profoundly damaged the United States and gave them a glimpse of the lingering danger should groups such as Al Qaida get hold of cyberspace (Brenner & Goodman, 2002). The Nimda virus was launched on the World Trade Center (WTC) and caused multiple vector attacks by spreading to emails, files, and networks.
Stuxnet is another virus created by Israeli and United States intelligence collaboration to derail the Iranian program of nuclear weapon development (Fruhlinger, 2022). The Stuxnet attacks all layers of the targeted infrastructure, including Windows, software, and programmable logic controllers (PLCs) (Fruhlinger, 2022). The Iranian information security team later discovered the virus after causing effects beyond the original target.
Technology and Public Policy as Solutions to the Problem
Policy and technological solutions are both warranted in the fight against cyber terrorism. For example, given the widespread impact of the attacks, it may be useful to have an insurance policy to cover the cost of system operations. The defense forces are responsible for protecting the people, making it vital to have a policy for mandatory soldier training on cyber security. An example of a policy solution is the Presidential Policy Directive 2.0, which has secret and public information on the procedures following a national security breach.
There are several technological solutions to the problem of cyber terrorism, including antivirus and malware protection. Advanced endpoint protection solution provides automatic multi-layer protection to the computer system. Artificial intelligence combined with machine learning helps automate the detection of unusual activities in cyberspace and prevent such attacks in the future. The machine learning for securities is programmed to look for any anomaly and raise the alarm. Replacing passwords and security questions with biometrics enhances safety by minimizing instances of unauthorized access. Moreover, security information and 3event management (SIEM) is a possible technological solution to cyberterrorism as it uses behavioral analytics to check for any threats within its operating environment.
Cogent International Law as a Solution to the Problem
International laws cannot solve cyberterrorism but may help establish principles and conduct procedures after an attack. For instance, if foreign terrorists launch an attack on Cyberspace belonging to the United States, then to uphold justice, there should be laws on how they can be prosecuted in the international court. The other possible solution is for the international community to agree to provide sovereignty to the countries that have been attacked so that they can make their laws and communicate with other countries.
Personal Opinion
The best way to safeguard against terror attacks is by combining technological solutions and policy approaches. There are three primary categories for dealing with terrorists: prevention, managing incidences, and dealing with the consequences (Henschke et al., 2021). To prevent an attack, computers and their networks should be protected with antiviruses, AI, machine learning, SIEM, and any other malware detection strategy. In addition, there should be a policy for long jail terms that deter cyber terrorists from launching attacks.
Incident management requires more technological intervention to resolve the damage. For example, after the Nimda virus at WTC, the solution was to stop the programming of the malware and restore normal functions. Effective communication with all users helps to create an alarm that cyberspace is under attack, enabling them to stop using their computers (Henschke et al., 2021). Compartmentalization and containment of the virus are important to enhance thoroughness in the operations.
Once all the systems are restored, the consequence management should focus on policy changes. For example, it would help to identify the attackers and bring them to justice. If the attack affected different nations, as with the Stuxnet virus, there should be a strategy for justice within the international criminal justice systems. The offenders should be tried and sentenced in the international court. Moreover, it is vital to have an insurance policy that can help deal with cyberterrorism’s aftermath.
References
Brenner, S. W., & Goodman, M. D. (2002). In defense of cyberterrorism: An argument for anticipating cyber-attacks. University of Illinois Journal of Law, Technology & Policy, 1.
Fruhlinger, J. (2022). Stuxnet explained: The first known cyberweapon. CSO Online. Web.
Henschke, A., Reed, A., Robbins, S., & Miller, S. (2021). Counter-terrorism, ethics and technology: Emerging challenges at the frontiers of counter-terrorism. Springer Nature.
Pollitt, M. M. (1998). Cyberterrorism — fact or fancy?Computer Fraud & Security, 8-10. Web.
US Army Training and Doctrine Command (2005). Cyber operations and cyber terrorism. National Security Archive.