Over the past two decades, there has been an exponential growth and use of information technology (ICT) and especially the Internet. Although the benefits associated with the use of ICT outweigh the disadvantages, some aspects of the latter can significantly impact the global community. Cyber terrorism is one aspect of disadvantages associated with the heightened use of ICT that technology-savvy terrorists can leverage to cause havoc across the globe. Before delving into cyber terrorism, it is pertinent to under the concept of cyberspace, which is the arena in which different cyber activities happen. Principally, cyberspace can be defined as a domain that spans the whole globe made up of interdependent ICT networks and their associated infrastructure ( Borghard & Lonergan, 2017 ). Some of these infrastructures include the Internet, computer systems, and embedded processors, among others. Today, governments invest in critical infrastructures that rely on information technology infrastructures and the Internet for their proper running. Due to the interconnectivity of various parts of these infrastructures, they become prone to terrorist attacks, which can be orchestrated through cyberspace. Based on this, governments must protect crucial infrastructure from cyber-terrorism that can lead to injuries, loss of life, or destruction of property.
Cyber Terrorism: A Definition
Over the last two decades, there have been several attempts to define cyber terrorism as the field of ICT, and especially cybersecurity has continued to evolve in complexity. According to (Weimann 2004), the debate on cyber terrorism was first conducted in the media, which was defined by drama and sensation. Further, the author notes that the first plausible attempt to define Dorothy Denning described it as the convergence of cyber and terrorism. From this definition, one acknowledges that cyber terrorism is the illegal attacks on information technology resources found within a sensitive installation such as a military installation. Another aspect of this definition is that the motivation behind cyber terrorism is to coerce a government or its citizens to conform to certain political, social objectives. Nevertheless, the definition by Denning provides that for an attack to qualify as cyber terrorism, it must be violent against people or property or evoke considerable fear among the citizens (Weimann, 2004). Some of the examples that can qualify as cyber terrorism attacks are those that result in death, bodily harm, or extensively and negatively impact the economy of a country. The USA is among the world leaders in infrastructural development, which places the country at the pole position for possible cyber terrorism attacks. The country’s healthcare, transport, manufacturing infrastructures, and other social amenities such as electricity and clean water plants all viable targets for cyber terrorism. Besides protected areas such as the White House, military facilities, the Pentagon, and other institutions holding security departments such as the Federal Bureau of Investigations face real threats from cyber terrorists.
Delegate your assignment to our experts and they will do the rest.
Possible Dangers of Cyber Terrorism that face the USA
As mentioned above, the U.S. has extensively invested in critical infrastructure to improve the livelihood of its citizens. These infrastructures heavily rely on information systems for their functionality, and as such, they can be targeted by cyber terrorists, thus negatively affecting the American people. For example, a water treatment plant in the U.S. uses technology to regulate water treatment products. Terrorists can use their technological know-how, such as hacking, to increase the amount of water treatment products which can affect the health of U.S. citizens. Besides, over 60 nuclear power plants in the country have over 90 nuclear reactors across the U.S. (American Geosciences Institute, 2019). Nuclear plants are highly sensitive installments that, when compromised, can affect a large part of the U.S. population. Hence, one recognizes the dangers associated with a slight incident of cyber-terrorism targeting the U.S.
Fundamentally, infrastructures across the country depend on digital control and supervisory control, and data acquisition systems (DC/SCADA) to facilitate their proper functioning. DC/SCADA are computer-aided communications networks that help manage different infrastructural installments across the U.S. (Goodman, 2007 ). DC/SCADA systems manage critical processes and other physical processes. Due to the current widespread use of the Internet, DC/SCADA systems are now Internet-enabled for the primary purposes of transmission of data and other control instructions, an advancement that replaces traditional dedicated networks. The use of open Internet is an enticement to terrorist organizations contracting highly trained cyber specialists ( Parlakkılıç, 2018 ). Principally, the field of cybersecurity is becoming sophisticated with the advancement of technology. Therefore, one acknowledges that some of these infrastructures were being designed at the time, there was little consideration to security. It is expected that they are riddled with vulnerabilities that can be exploited through hostile attacks or accidents. Also, some of these systems were intended to provide low-cost and widespread network coverage. Due to this, malicious people can find and exploit weaknesses in the said systems.
There are two categories of reasons why malicious people can leverage cyberspace to conduct cyber terrorism. First, these people would want to support their endeavors and infrastructure, not necessarily through an attack. According to (Goodman, 2007), there is evidence that terrorists have been leveraging this reason and are expected to continue doing so. In this category, cyber terrorists use cyberspace to communicate with each other on specific activities and targets spread across the USA. As such, these terrorists will use highly encrypted communications to notify each other of their activities, including other endeavors such as recruitment, "advertising," and conducting financial transactions. All these activities form the basis for executing destructive agendas which can destabilize the country (Goodman, 2007). For example, when cyber terrorists' cells in the U.S. identify that a certain critical installation has several exploitable vulnerabilities, they can notify or sell the information to other groups outside the country, such as those affiliated with ISIS.
The second reason pertains explicitly conducting attacks on parts of the country's cyberinfrastructure. As mentioned earlier, the US is a global leader in the consumption of information technology, including the Internet, and as such, it has integrated these advancements in most of its critical infrastructural installments. Cyber terrorists can conduct widespread distributed denial of service (DDOS) attacks to bring down sections of the country's information infrastructure (Goodman, 2007). For example, cyber terrorists can target major airports in the country and jumble up their communication systems, thus bringing confusion in air transport networks. Consequently, this can result in accidents involving airplanes. Also, it is important to note that cyberspace can be directly attacked by cutting communication lines or even corrupting databases containing critical information that the U.S. government relies on its day-to-day running. For this reason, one appreciates that cybercriminals will take advantage of any slight opportunity to hit the country for political reasons.
Related to this reason is the possible danger facing U.S. faces from cybercriminals whereby they directly attack cyberspace and use it as a platform to launch attacks directed at other targets. For this reason, cyber terrorists can compromise supervisory control systems resulting in disasters that can cause extensive confusion leading to loss of lives. Cyber terrorists will not use DDOS but will directly attack systems such as air control and process control from hazardous chemicals. What makes this reason significant is that cyber terrorists can work in cahoots with traditional terrorists with the aim of exacerbating the consequences (Goodman, 2007). For instance, traditional terrorists may be aiming to attack an airport and, as such the will procure the services of cybercriminals to aid them in bringing down the whole system of a given airport. In such an instance, cyber terrorists may also be mandated with interfering with the communication systems of emergency responders.
Consequences of Cyber Terrorism
One of the impacts of cyber terrorism regards imparting fear due to the associated insecurity. According to Gross et al. (2016) any form of terrorism does not only aim at inflicting physical pain at the targets but also psychological torture. In their study, the author used the State-Trait Anxiety Inventory (STAI) test to measure the score of stress and anxiety due to cyber terrorism. Traditional terrorisms such as mass shootings recorded a score of 4.0, which was the highest, closely followed by lethal and nonlethal cyber terrorism incidences, each with 3.6 and 3.4, respectively. One recognizes that if traditional terrorism such as bombings can have a score of 4.0 and cyber terrorism acts have lower scores means that indeed the subject matter should be a concern to the U.S. government. Gross et al. (2016) established that individuals are equally concerned by both lethal and non-lethal attacks, as evidenced by the level of stress associated with the two categories of cyber terrorism. Since the current U.S. society is highly informed, it is expected that they understand the repercussions of cyber terrorism. If an incidence of cyber terrorism can occur today, it is expected that people across the country will feel insecure and wary of possible future attacks.
Cyber-terrorism activities have the potential to negatively affect the healthcare infrastructure of a country. Today, the U.S. healthcare system is highly dependent on the Internet and other information communication technologies. The past instances of cybersecurity breaches within the U.S. medical sector are forerunners of more disastrous events to come. One area that is of grave concern is the eraser of medical data or even alteration of medical data. Also, cyber terrorists can target other national institutions that directly or indirectly influence the functioning of the U.S. sector (insert). Some of these include pharmaceutical industries and public service agencies such as water supply, electric power plants, emergency services, financial systems, and transportation sector, among others; when these are affected, then it is expected that the healthcare sector of the U.S. will be compromised.
The last significant impact of cyber terrorism regards its disastrous consequences on the U.S. economy. The US as a modern economy is a notable consumer of information technology and especially the Internet. As mentioned above, increased reliance on information technology systems results in increased vulnerabilities and thus risks. Moreover, organizations that form the critical infrastructure of the U.S. economy are at a heightened risk of cyber terrorism ( Hua & Bapna, 2013 ). Some of these organizations are those that deal with healthcare, energy, transportation, water supply, finance, and food supply, among others. It is important to note that cyber terrorists will not target the indicated national infrastructural installation for momentary gains but to create chaos that can destabilize the country's economy. As such, the U.S. government must ensure that it continuously studies the preference of cyber terrorists. Through this, it will be possible to determine the best investment to safeguard critical national resources from dilapidating terrorist attacks. Undeniably, if a cyber-terrorist attack aiming at the healthcare sector of the U.S. can be successful, it can cause untold monetary losses besides loss of human lives.
How to Prevent Cyber Terrorism
There are several strategies that that can be used to deal with cyber terrorism threats. Although these strategies can be used as a standalone solution, it is important that the government approach the issue of cyber terrorisms from a multifaceted perspective. First, it is important that the national government track and sue the perpetrators ( Rights, 2003 ). The U.S. government can liaise with other governments to extradite foreigners who are known perpetrators or financiers of cyber terrorism. As indicated earlier, the U.S. is a high-profile target for all forms of terrorism, and although pursuing and prosecuting perpetrators can be an expensive endeavor, it will help deter future planned attacks. For instance, if a large number of culprits are prosecuted, it will force the remaining ones to change their mindsets since they will need to think of the possible repercussions. Consequently, it will be possible to decrease the number of cyber-terrorism attacks that will happen in the long run.
The second strategy would be for organizations and agencies at risk of cyber terrorism to develop best practices for deterrence. When developing these strategies, government agencies must ensure that they test them before deploying and have plans in place to regularly assess their suitability. For example, it is pertinent that all best practices developed to cover all areas involved in cybersecurity and especially the associated terrorism aspect. As such, government agencies must ensure the best practices are based on internationally recognized standards such as ISO17799 and BS7799 ( Rights, 2003 ). Such standards provide comprehensive procedures that should be followed when securing an agency from information security threats. As cybersecurity needs continue to become sophisticated, it is advisable that individual organizations modify their best practices and security strategies to align with the changing security landscape. Closely related to having best practices in place is the deployment of critical security applications. Some of these applications include firewalls, antivirus software, intrusion detection systems, and other technological products ( Rights, 2003 ). The U.S. government, through the relevant security agencies and departments, must ensure all publicly and privately owned infrastructural installations have the required level of information system security.
The last strategy that can help prevent a cyber-terrorism incidence is being proactive and establishing business continuity and recovery plans. The government, the general public, and the private sector must have a preemptive posture when it comes to cyber terrorism. For this to happen, there is a need for all parties to always be updated on the latest information concerning cyber threats, vulnerabilities, and any probable incidence that can destabilize the country. Particularly when the government is aware of the different components of cyber terrorism that can directly affect the U.S., then it would be possible to implement robust security measures while also using best practices hence reducing the chances of cyber terrorism attacks. Related to this is the establishment of business continuity and disaster recovery plans by all organizations dealing with sensitive services or products. Such plans require constant testing and should involve two major activities after deployment: repair and restoration. The repair will entail fixing the problem for a given function to work normally, while the restoration plan will be activated with pre-specified provisions such as those involving hardware, software, and public utilities, among others.
Cyber Terrorism, Mobile Devices, and Social Media
Social media is one of the avenues that cyber terrorists use to recruit their adherents. According to Zerzri (2017), today, terrorist organizations do not rely on military force such as weapons, but they have become technologically savvy, including their recruitment methods. Further, the author notes that the Internet through social media is being used to recruit people into cyber-terrorism. Platforms such as Facebook, Instagram, and Twitter have become a recruitment avenue for cyber terrorists. Social media platforms are common meeting areas for people with different political ideologies and cultural backgrounds (Bieda & Halawi, 2015). Therefore it means due to the decentralization of social media platforms, it is easy for terrorists to recruit new members. Bieda and Halawi (2015) note that 90% of organized crime in cyberspace is enhanced through social media, which implies that the U.S. government must control social media platforms within the country’s jurisdiction.
Responsible Stewardship: Addressing Exploitable Weaknesses in Terrorist Organizations
The principle of responsible stewardship is important in combating cyber terrorism because it will give the government leeway to conduct fiduciary loyalty and other sound processes. This principle will require U.S. citizens to be committed to their country. Therefore it means that U.S. citizens must view their country as important. It is important that the U.S. government sensitizes its citizens to refrain from engaging in cyber-terrorism.
References
American Geosciences Institute. (2019). How Many Are Nuclear Power Plants There In the U.S.? American Geosciences Institute. https://www.americangeosciences.org/critical-issues/faq/what-status-us-nuclear-industry#:~:text=%22There%20are%2060%20commercially%20operating,as%20two%20separate%20nuclear%20plants ).
Borghard, E. D., & Lonergan, S. W. (2017). The logic of coercion in cyberspace. Security Studies , 26 (3), 452-481.
Goodman. S.E. (2007). Cyberterrorism and Security Measures. Science Engineering Medicine. https://www.nap.edu/read/11848/chapter/6
Gross, M. L., Canetti, D., & Vashdi, D. R. (2016). The psychological effects of cyber terrorism. Bulletin of the Atomic Scientists , 72 (5), 284-291.
Parlakkılıç, A. (2018). Cyber Terrorism Through Social Media: A Categorical Based Preventive Approach. International Journal of Information Security Science , 7 (4), 172-178.
Rights, R. F. (2003). Global Information Assurance Certification Paper.
Weimann, G. (2004). Cyberterrorism: How real is the threat? (Vol. 31). United States Institute of Peace.
Zerzri, M. (2017). The Threat of Cyber Terrorism and Recommend-da-options for Countermeasures. Cyber Terror. , 6.