Terrorist Strategy: Cyber Terrorism | Best Assignment Help Online

Terrorist strategies are many and diverse. While the world experiences development in modernization, globalization, and technology which have helped states to prosper, the same advancements have opened loopholes for terrorist groups’ new strategies. Terrorist strategies tend to choose attack activities that will evade effective countermeasures from the targets and exploit vulnerabilities. The terrorist groups have the possibility of employing many different categories of terrorism strategies depending on the occasions and the perceived probability of success of the selected strategy. Some of the terrorist strategies are conventional and extensively used in many terrorist groups’ operations. These conventional strategies include hijackings, bombings, shootings, suicide attacks, and kidnappings. Other strategies are seen to be unconventional where they have been used on a few occasions, and governments and experts take them as serious potential threats. Some of these unconventional strategies include cyber terrorism, nuclear terrorism, bioterrorism, and agro-terrorism. Therefore, this essay will focus on cyber terrorism unconventional strategy perceived to be a serious potential threat by experts and governments. Among the things to be discussed regarding the strategy is its brief history in terrorism, how is it a terrorist strategy, and the terrorist using it. Also, when the strategy is effective, some of the flaws and infrastructures that support this method as part of the terrorist tactic.

  1. Brief History of Cyber Terrorism

According to Soesanto (2020), public interest in cyber-terrorism started in the late 1990s with a wave of high-profile terrorist incidents in the United States. Some of the first attacks are the 1993 bombing of the World Trade Center and the 1995 Oklahoma bombing. These first attacks compelled the United States Department of Defense in 1996 to conduct information warfare practice to examine cybersecurity on its systems. Following the 1998 simultaneous bombings on the United States embassies in Tanzania and Kenya and the significant increase of terrorist activities in the cyberspace was perceived as the possible forthcoming threats to the homeland. Cyber terrorism has attracted the attention of experts and scholars wherein 1999, there was a comprehensive study on cyber terror by the Naval Post Graduate School for the United States Defense Intelligence Agency. The 1999 study was witnessed by several definitions and statements that illustrated the contours of cyber-terrorism research. The authors noted that terrorist using information technology supporting their activities is not qualified to be cyber terrorism. They narrowed cyber terrorism definition as the unlawful disruption or destruction of digital property aiming to coerce or intimidate the societies or governments in pursuit of their objectives that are ideological, religious, and political (United Nations Office on Drugs and Crimes, 2019).

  1. Emergence of Cyber Terrorism as a Terrorism Strategy

Cyber terrorism was considered a terrorist strategy when it emerged in the late 1990s that terrorist groups launched multiple high-profile cyber-attacks taking advantage of the rapid growth in internet use. This strategy is a threat to the US and its national interest as it largely depends on computers and the internet. Terrorist groups combine forces such as psychological, economic, and political to promote the fears of cyber terrorism. Regarding psychological perspective, cyber terrorism does not have a direct threat to violence, but its psychological effect on worried societies can be as strong as the impact of the terrorist bombs (Gross, Canetti and Vashdi, 2017). Cyber terrorism strategy for terrorists has paused numerous fears worldwide as several changes have been witnessed for protection against cyber terrorism. The United Nations has constituted numerous agencies that pursue to address cyber-terrorism. Some of these agencies include the United Nations Office for Disarmament Affairs, the United Nations Office of Counter-Terrorism, the International Telecommunications Union, the United Nations Institute for Disarmament Research among others. For the United States, the Department of Defense gave the United States Strategic Command mandate to combat cyber terrorism. The mandate was accomplished through the integration of Global Information Grid capabilities into operations of Department of Defense networks, computers and systems used combatant commands agencies and services. Executive orders have been signed by various United States presidents imposing sanctions on entities and individuals suspected to be participating in the cybercriminal activities. In 2017, President Trump signed an executive order 13800 to reinforce the Cybersecurity of Federal Networks and Critical Infrastructure (The White House, 2018).

  • How Cyber Terrorism Strategy is Used to Advance Terrorists’ Objectives

Several terrorist groups are using cyber-terrorism strategy to accomplish their objectives, and the most common is the Islamic State and the Al Qaeda. According to Fishman (2019), in 2018, Facebook managed to remove fourteen million pieces of content relating to the Al Qaeda, Islamic State, and its affiliates. During Saddam Hussein’s reign, Iraq had a network known as “Iraq Net” that consisted of more than one hundred websites distributed across the world with the objective to launch denial-of-service attacks against United States companies (Fishman, 2019). Cyber terrorism strategy has become an appealing option for contemporary terrorists due to the following reasons. First and foremost, the strategy is cheaper as compared to other methods as all the terrorist need is a computer and online connection. There is no need to buy weapons like explosives and guns, but the terrorist creates multiple computer viruses and delivers through a wireless connection, cable, and telephone line. Cyber terrorism enables terrorists to hide identity as they use nicknames online making it difficult for security forces to track their real identity. With this strategy, the targets are vast, giving terrorists several options like targeting computer networks for the governments, private airlines, individuals, among others. The method is conducted remotely resulting in less psychological investment, physical training, and risk mortality giving the terrorist group an easy time to recruit followers (Stroobants, 2018).

  1. Effectiveness of Cyber Terrorism Strategy

Cyber terrorism method is effective when it can be used to accomplish some of the set objectives for the targets that the terrorist groups cannot use other methods. According to Tures (2018), the study findings shows that only a few terrorist groups can achieve their goals when carrying out the attacks. Such a claim can be determined depending on the kind of method used to carry out the attacks. This method is effective when the terrorist wants to carry out the attacks on the target without revealing their identity. As mentioned earlier, the use of a computer can allow someone to use a fake name, making it hard for the security agencies to track back to the source of the attacker. Cyber terrorism strategy can be effective when the terrorist does not want to spend more money on buying weapons than other methods used for the attack. Due to the method potential to affect a large number and variety of targets, it can serve the terrorist objective effectively than other strategies. For instance, the American healthcare firm Universal Health Systems was attacked by ransomware that caused affected hospitals to return to manual backups, reschedule surgeries and divert ambulances (Center for Strategic & International Studies, 2020). Thus, with the rapid development, the world is experiencing, particularly in technology, cyber terrorism strategy becomes more effective and relevant to terrorist groups as compared to other methods.

  1. Flaws of Cyber Terrorism Strategy

Terrorist methods have shortcomings, regardless of how the method is effective in accomplishing the objective. With states and international strategizing and formulating different measures that can deter the terrorist attacks, the terrorist also adjusts their methods to counter the measures implemented by targets. For the cyber terrorism method, it involves dealing with the most complex section in terrorism that requires several and immediate adjustments, or else the method will not fully accomplish the intended mission. Cyber terrorism activities are currently expensive to carry out as the countermeasures put in place by targets have ensured the cracks are sealed, and hackers have to go the extra mile to attack the systems (Shukla, 2020). Most of the cyber terrorism targets have also hired skilled hackers who can hack back the intruder and locate where the person. Other targets have advanced their technology with Real-Time Detection System that gathers and analyzes information from sensors that have been positioned at particular points on the internet and runs 24/7 (National Police Agency, 2020). Cyber terrorism method needs the most skilled person who can handle complex systems of the governments, institutions, organizations, and private. The terrorist might have a challenge getting that skilled person who can successfully facilitate their mission on the targets. Through behavioral countermeasures, public awareness campaigns can educate the public concerning various threats of cybercrime activities with methods to combat the threats. Businesses have trained their workers on the essential need to protect strong passwords at all costs so that attackers cannot have access. With such measures in place, cyber terrorism strategy becomes a risky method to carry out terrorist activities. Thus, relying on this method by a terrorist is minimized to avoid mission failures.

  1. Cyber Terrorism Infrastructure

Cyber terrorism method uses some of the critical infrastructures that governments, organizations, the public, and institutions that provide essential services (National Police Agency, 2020). In the United States, the President’s Commission on Critical Infrastructure Protection divided infrastructure that is vulnerable to cyber terrorism into five sectors which include banking and finance, information and communication, energy, vital human services, and physical distribution (Vigano, Loi and Yaghmaei, 2020). Communication infrastructures have greatly supported cyber terrorism activities worldwide with terrorist maximizing on using websites and social media platforms to spread their agenda. These infrastructures have been used to send messages, share images and videos, and coordinating with people. Terrorists need audiences for all kinds of reasons like directly engage the population they want to influence, attracting media attention, and identify the potential recruits (Fishman, 2019). In the transport sector, terrorist target to compromise depots such as rail stations, major road highways, and docks to disrupt the services and attract the attention of the government or the main target (Evan et al., 2017). Power and energy are other critical infrastructures that terrorists will not hesitate to use so that their objective is accomplished. Cyber-attacks against the national power grid of a country like the United States will have an adverse economic impact.  Terrorists can weaponize the plant computer systems to cause interference with plant furnace or chemical substances that will result in structural damage or major explosion (Evan et al., 2017). According to the Stoutland of Nuclear Threats Initiative (2018), the United States has accused Russia of conducting numerous cyberattacks aiming at the European and US nuclear power plants, water, and electric systems from 2015 through 2017. Lastly, healthcare infrastructure is critical and vulnerable to cyber terrorism with its development in smart medical services and assistive technologies. For instance, the case of a ransomware attack on the United States Healthcare system paralyzing most of the medical services for hospitals (Spence et al., 2018).

Conclusion

In conclusion, cyber terrorism is a serious threat to technology developments in the world, putting several key sectors under danger of destruction by the terrorist. Cyber terrorism is an essential concern that has attracted scholars and experts who are carrying out research to examine what it is and what it is not. For instance, various definitions have been formulated by several scholars and experts, but a universal definition is yet to be agreed upon. Due to advancements in different states, organizations, and institutions, cyber terrorism strategy is the likely method terrorist will rely on to pursue most of their attacks.

References

Center for Strategic & International Studies. (2020). Significant Cyber Incidents | Center for Strategic and International Studies. Retrieved 18 October 2020, from https://www.csis.org/programs/technology-policy-program/significant-cyber-incidents.

Evan, T., Leverett, E., Ruffle, J., Coburn, W., Bourdeau, J., Gunaratna, R., & Ralph, D. (2017). Cyber Terrorism: Assessment of the Threat to Insurance. Cambridge Risk Framework series; Centre for Risk Studies, University of Cambridge. Retrieved 18 October 2020, from https://www.jbs.cam.ac.uk/wp-content/uploads/2020/08/pool-re-cyber-terrorism.pdf.

Fishman, B. (2019). Crossroads: Counter-terrorism and the Internet – Texas National Security Review. Texas National Security Review. Retrieved 18 October 2020, from https://academic.oup.com/cybersecurity/article/3/1/49/2999135.

Gross, M., Canetti, D., & Vashdi, D. (2017). Cyberterrorism: its effects on psychological well-being, public confidence and political attitudes. Journal of Cybersecurity. Retrieved 18 October 2020, from https://academic.oup.com/cybersecurity/article/3/1/49/2999135.

National Police Agency. (2020). Police Info-Communications – Technological Countermeasures against Cyber Attacks. Retrieved 18 October 2020, from https://www.npa.go.jp/joutuu/010_e.htm.

Shukla, R. (2020). Rising Against Cyber Terrorism: Indian Perspective – HNLU Student Bar Journal. Sbj.hnlu.ac.in. Retrieved 18 October 2020, from http://sbj.hnlu.ac.in/rising-against-cyber-terrorism-indian-perspective/.

Soesanto, S. (2020). Cyber Terrorism. Why it exists, why it doesn’t, and why it will. Real Instituto Elcano. Retrieved 18 October 2020, from http://www.realinstitutoelcano.org/wps/portal/rielcano_en/contenido?WCM_GLOBAL_CONTEXT=/elcano/elcano_in/zonas_in/cybersecurity/ari47-2020-soesanto-cyber-terrorism-why-it-exists-why-it-doesnt-and-why-it-will.

Spence, N., Bhardwaj, N., David, P., & Coustasse, A. (2018). Ransomware in Healthcare Facilities: A Harbinger of the Future?. Perspectives.ahima.org. Retrieved 18 October 2020, from https://interbitdata.com/ransomware-in-healthcare-facilities-a-harbinger-of-the-future/

Stoutland, P. (2018). Cyberattacks on Nuclear Power Plants: How Worried Should We Be? | NTI. Nuclear Threat Initiative. Retrieved 18 October 2020, from https://www.nti.org/analysis/atomic-pulse/cyberattacks-nuclear-power-plants-how-worried-should-we-be/.

Stroobants, S. (2018). Cyberterrorism is the New Frontier. Visionofhumanity.org. Retrieved 18 October 2020, from https://www.visionofhumanity.org/cyberterrorism-new-frontier/

The White House. (2018). NATIONAL CYBER STRATEGY of the United Stat es of America. Retrieved 18 October 2020, from https://trumpwhitehouse.archives.gov/wp-content/uploads/2018/09/National-Cyber-Strategy.pdf

Tures, J. (2018). Only a few terrorist groups achieve their goals, study finds. The World from PRX. Retrieved 18 October 2020, from https://www.pri.org/stories/2018-12-20/only-few-terrorist-groups-achieve-their-goals-study-finds.

United Nations Office on Drugs and Crime. (2019). Cybercrime Module 14 Key Issues: Cyberterrorism. Retrieved 18 October 2020, from https://www.unodc.org/e4j/en/cybercrime/module-14/key-issues/cyberterrorism.html.

Vigano, E., Loi, M., & Yaghmaei, E. (202). Cybersecurity of Critical Infrastructure. The Ethics of Cybersecurity. Springer. Retrieved 18 October 2020, from https://link.springer.com/chapter/10.1007/978-3-030-29053-5_8#citeas.

Do My paper price
Pages (550 words)
Approximate price: -

Why Essay-writing.com

Quality Research Papers

If you’re looking for an Essay writing service to help turn all of your hard work into a product that readers can appreciate, then look no further than our essay writing website. With a team of writers who go the extra mile, and customer support representative’s around-the-clock eager to assist you, we are ready to ace any exam or provide any posterity with what they need.

Top Assignment Writers

Our essay writers are experienced professionals who have the knowledge to write an essay about any subject matter in an interesting way while maintaining academic integrity. Our professional essay writers work day and night to ensure that you receive quality essays on time without any delay or interruption. Looking to "pay someone to do my assignment"? With many years of experience behind us, our essay writing website is now led by professionals with extensive knowledge in various fields of study.

Zero Plagiarism

For any write my essay for me request, you will never need to worry about plagiarism or getting caught up in the stress of completing assignments when you use our professional services! Get started today by ordering your first paper from us and we'll give you 10% off!

24/7 Customer Support

We are available 24/7, 365 days a year to help you out with your academic needs! if you have any "do my paper" questions or technical concerns, simply chat with one of our essay writing customer service representatives via the Chat Window on the bottom right corner of this screen

Prompt Delivery and 100% Money Back Guarantee

These academic experts are distinct from most other essay writing websites because they have doctoral degrees and decades of professional experience in academia. And because they know how overwhelming college life can be, we waive all minimum deadlines so you can focus on studying without worrying about your assignment always hanging over your head.

Free Revisions

Our Academic writers are confident and highly capable to take on any challenge ranging from a simple high school essay, question and answer assignment help, PowerPoint Presentation, research paper, dissertation, among others . However, we do not allow customers who abuse the free revisions privilege.

Try it now!

Calculate the price of your order

Total price:
$0.00

How it works?

Follow these simple steps to get your paper done

Place your "pay for essay" order

Fill in the homework order form and provide all details of your assignment.

Proceed with the payment

Choose the payment system that suits your "do my homework" request

Receive the final file

Once your paper is ready, we will email it to you.

Our Services

When the world rushes and deadlines increase, it's hard to put your best foot forward. The Homework help website is here to help you with top quality essays on all topics, from history papers and engineering design descriptions to sociology case studies. For any write my essay for me request, you can count on a professional team of essay writers who are well experienced and researched in their field as they develop an original paper for you with 24/7 customer support.

Essays

Homework Help Service

The assignment help website is an excellent solution for all your problems regarding writing an outstanding admission essay. You don't need to worry about anything anymore because we will provide you with high-quality papers written by expert writers who know how to write professionally!

Admissions

Paper Formats and Types

From time management skills to APA format citations; from MLA formatting rules for research papers; from college application essays where the stakes are high--all these aspects of academic life become clearer as we write it all down on paper! Essay-Writing.com is a professional essay writing service that provides students with well-researched, high quality essays on any topic and at any level of study.

Reviews

Editing & Proofreading

Some of our clients prefer to write their essays themselves and have a third-party like Essay-writing.com proofread it for errors after they are done writing. We have a skilled team of editors and assignment helpers assignment helpers who examine your paper closely, looking out for any mistakes that may lessen the appeal or effectiveness of the essay as well as make amends in order to better improve its overall quality before you submit it anywhere else! For all your editing needs, turn to Essay-writing.com

Reviews

Revision Support

You work hard at your academics, and you should be rewarded, with a revision or modification for free on any order from a discursive essay , assignment to dissertation papers.

AllEscort