Since cyberterrorism is such a new brand of crime, we as a society do tend to be somewhat complacent when it comes to cybersecurity. However, in the near future, we can only expect to hear more about both cyberterrorism threats and actual incidents.
“The threat will only grow with the passage of time,” said Levy. “And it’s up to everyone to begin treating it as it deserves to be treated: with respect.”
Currently, the most frightening potential attacks are those that come from all angles. Baumgartner envisions a scenario in which cyberterrorists simultaneously disrupt communications systems, infrastructure controls and financial markets. Such a wide-net strike would be difficult to pull off, but the resources may exist—for the right price.
“It somewhat depends on the attackers’ goals and capabilities,” he said, “but capabilities are for sale.”
In terms of actually inciting terror, most rightfully fear bombings and explosions more than anything else. But the damage caused by cyberterrorism attacks can induce a different brand of fear since they are orchestrated by a faceless evildoer.
“Tangibly, we can all relate: a power plant could be taken offline, a company’s finances could be wrecked and a region’s ability to communicate wiped out,” said Levy. “Intangibly, the psychological impact could be even greater and longer-lasting, as cyberterrorism strikes at the very heart of what makes us feel safe in a supposedly safe society.”
This can lead to a feeling of helplessness. “It allows enemies to easily bypass the traditional barriers of military and geography, and it allows them to get at the soft underbelly of day-to-day society,” said Levy. “Fear of these types of attacks, in many respects, is just as debilitating as the overt effects might be.”
While definitive, public accounts of large-scale acts of cyberterrorism can be difficult to come by, there have been some comparatively smaller-scale examples of cyberattacks in the recent past. The hacker group Anonymous, for example, has launched multiple attacks against authorities. Founded in 2003, this group of loosely associated hackers is extremely opposed to any type of internet surveillance and censorship.
“These attacks illustrate the broadly disruptive impact of a distributed, focused campaign to take down resources controlled by forces they deem the enemy,” said Levy. “Chicago’s police department, for example, was taken down earlier this year, and law enforcement agencies in Ontario had usernames and passwords published by hackers claiming to be affiliated with Anonymous.”
While groups with agendas similar to Anonymous will likely continue to carry out attacks regardless of the day’s political climate, social factors have driven other hacktivists to action. “The Occupy movement as well as the Arab Spring spawned an upsurge in this type of activity,” said Levy.
With respect to governmental organizations, Stuxnet, a malicious computer “worm” designed to interfere with the nuclear program in Iran, was accidentally discovered in 2010 when the virus left the digital perimeter of Iran’s Natanz plant and reached the wider internet. According to the New York Times, this malicious code was developed by both the United States and Israel. Since then, two new versions of this worm have been discovered.
In May 2012, another piece of malware, a virus called Flame, was uncovered. This virus infiltrated the computers of high-ranking officials in Iran with the goal of collecting information. Flame appeared to be approximately five years old when it is was found, and the Washington Post has reported that it was designed by the United States; publicly, U.S. officials have not stated that they were responsible for creating this particular virus.
During April and May of 2007, Estonia was the victim of violence, riots and cyberattacks after officials moved a memorial commemorating the Soviet liberation of Estonia from the Nazis during World War
BY PROTAS LEVINA BAPRM 42657
BY PROTAS LEVINA BAPRM 42657
No comments:
Post a Comment