Terrorism: The US Cyber Threat

Superior Essays
U.S. Cyber Threat

It is up to every single citizen in a nation to protect the way of life they love and have grown accustomed to. Threats upon this way of life are not only dealt with by the government officials appointed to monitor them. The responsibility of sustaining a healthy and safe nation falls upon the shoulders of every citizen within the borders, or simply citizens with any interests inside the borders. Some threats may be much easier to identify than others. Even with every citizen doing their part to help safeguard our nation, there are so many different type of security threats, spotting them will always be a challenge. This wide array of possibilities could range from a homegrown “vigilante” that feels that their local big business
…show more content…
Looking at a homegrown terrorist, their ways of enforcing their movement may be much more primitive. They may simply obtain a firearm and fire upon a public area to try and draw attention to their cause. Looking at the larger groups, they have much larger capabilities. They have the ability to organize large-scale attacks, able to inflict a lot of damage upon a larger group of people. Whether that damage is physical or even emotional, it can have a much larger influence than a more primitive approach can. One of the newest, but fastest evolving type of terroristic threat to the United States specifically is a type of cyber-attack. Already pointing out the wide scope of possible terroristic threats, this also pertains to the many ways cyber criminals can hurt the U.S. people. To quote a sadistic, but highly intelligent American literature artist in Marilyn Manson “In a sense, terrorism blossomed in the advent of television. Television promotes terrorism in religion and in politics.”. Of course, terrorism has been around for decades upon decades, but the newest technology along with the media tends to promote new and more radical …show more content…
This attack was not even carried out on U.S. soil, but still goes down as the biggest “breach of military networks” to date. What we now know as a program by the name of “agent.biz” is scripted to spread from one computer to every other computer in a certain network, just as the Shamoon virus was coded to do to Aramco. The agent.biz virus made its way into the American military networks by simple USB flash drive. It was never released how, but somehow the USB containing the virus was inserted into a computer on an American military base in the middle east. Once the virus made its way in it was able to get into the systems of U.S. Central Command. This is the entire strategic system on how the U.S. was going about the war in Iraq and Afghanistan. It is obvious to see the importance of the files the virus uncovered. The U.S. claims to have found the culprit of these specific attacks, but still refuses to reveal this information. Of course, much of the media has speculated that the Russian government was behind the attacks. This speculation is backed by the fact that the origin of the virus was from Russia. This is not reliable because that any type of virus like this, or even your home computer if you want, can have it’s origin scrambled. This makes it impossible to retrace the steps back to where the software truly

Related Documents

  • Improved Essays

    Cybersecurity is a rapidly changing field and is growing with intensity. Not a day goes by without hearing something in the news about cybersecurity. The United States government faces a dilemma. Their foes are getting stronger and more advance in their cyber attacks. While the United States is lagging behind in all aspects of cybersecurity.…

    • 580 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Answer. Yes, Target story does indeed follow the general “ATP kill chain” attack model as clearly elaborated upon in the case study. Attackers started by performing“Reconnaissance”over one of Target’s external heating and ventilation providers, Fazio Mechanical Servicesprobably after prior deep investigation to detectan easy loophole to infiltrate Target’s network for its malicious objectives. Also,Fazio relied onfree version of a security software called, “Malwarebytes Anti-Malware”, whose license explicitly prohibited corporate use; which is a fineexample of Overreliance on knowledge versus intelligence.…

    • 892 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    In the United States the government collects data from everyone either from their social medias accounts or their browsing history. These large corporations cooperate with the government in order to collect data and store it for them, in which the NSA looks for suspicious behavior that may involve terrorism. Although the USA PATRIOT Act, a sweeping law that allows the gov’t to collect data and wiretap subjects, was created after the 9/11 attacks, all citizens weren’t aware of it for many years. It wasn’t until Edwin Snowden, a former government contractor, revealed this information to the public. Many people were shocked and outraged by this news and found it violated their rights.…

    • 264 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    The Code Breaker Analysis

    • 1047 Words
    • 5 Pages

    They didn’t realize they were uploading the most powerful reconnaissance tool ever created’” (Petry 75). Making artificial fear just to take control over the whole world is just a dirty tactic to pull against companies and the population. By using artificial fear, they had the whole world in a panic and “protected” the world from a false threat that was created by them. The Y2K Circuit was their plan to stop the “threat” but behind the scenes it was used to keep track of every single company and person.…

    • 1047 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    In a the article Terrorism by Brenda Lutz and James Lutz, terrorism is defined as “the use of violence or threat of violence by an organized group to achieve an political objective.” This definition recognize that terrorism is perpetrated by an organized or subnational group, but Brenda and James forget to mention that terrorism is a “premeditated violence” against a non-combat group. In a nutshell, terrorism is intended to influence a targeted audience beyond civilian, like the government. Also, it is a form of coercive violence or psychological warfare that uses fear to intimidate others and force them to submit to one’s will.…

    • 659 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Essay On Homeland Security

    • 1030 Words
    • 5 Pages

    Homeland Security means only one thing, protect your country and the secret service is the first line of protection. “The Department of Homeland Security has a vital mission: to secure the nation from the many threats we face. Our duties are wide-ranging, but our goal is clear - keeping America safe.” The Department of Homeland Security is charged with the primary responsibilities of protecting the United States divided into 22 divisions that respond to terrorist attacks, man-made accidents, and natural disasters. Perhaps the most significant of these divisions is the The United States Secret Service (USSS) who primarily focus on financial crimes and protection.…

    • 1030 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    There have been many domestic terrorists and domestic terrorist groups over the years. Many of the recent domestic terrorists and homegrown violent extremists have been influenced by many international beliefs or ideals that came from international groups and did not originate in the United States. Many other domestic terror groups did not start their own set of belief systems from scratch but adopted a set of beliefs. Many leftist militant groups or left wing domestic terrorism groups adopted a socialist and Marxist set of beliefs that originated in Europe. The Weather Underground, while originating in U.S., was heavily influenced by the ideals of socialism and Marxism.…

    • 456 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    When it comes to defining terrorist there seem to be some ambiguity in the criteria of what is considered terrorism and what is not. Conversely, Crone and Harrow (2011) suggested the best definition of domestic terrorism is belonging and autonomy of the west. Accordingly, this criterion eliminates some terror acts directed towards the government while inclusive of others. Eugene (2004) argues regardless of the level of autonomy the groups possess the defining attribute of the group or individual is the overall aim or intent. Accordingly, Tom argues the best definition of domestic terrorism would be individual, groups, or organizations that live or have residence in this country and advocate and inflict acts of terrorism guided by their own political stance that is contrary to this country.…

    • 1492 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    On September 11, 2001, the United States came under attack from a foreign enemy. A series of suicide attacks, which involved the hijacking of four airlines, were carried out by the Islamic extremist group al-Qaeda. An attack of this magnitude had never been experienced and left the American public in shock. As the media and the public were in a scramble for answers it was evident that the United States was under another terrorist attack.…

    • 951 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Based on what I have read and seen, terrorism is a very tricky problem to deal with. I believe this is why there have only been two different terrorism policies in the present time being the Powell Doctrine first and the Bush Doctrine. My way of thinking towards preventing and countering terrorist groups in the world is right along the lines of the Bush Doctrine. This basically allows the United States government to use every tool in our power to act against possible threats. The Doctrine also says that America will act against threats before they form and start to cause problems.…

    • 278 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    The World has seen a number of terrorist attacks in its history, however terrorism acts have been increasing since the middle half of the 20th Century. Most recently terrorism acts have been committed by Muslim and Islamists extremist. The Federal Bureau of Investigation (FBI) of the United States defines terrorism as ““the unlawful use of force or violence against persons or property to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives.” . In the 21st century, the single largest terrorist attack was the September 11 2001 attacks (9/11) in the United States. Since the 9/11 attacks, a large number of attacks have been related to Muslim and Islamic extremist.…

    • 830 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Homeland Terrorism

    • 722 Words
    • 3 Pages

    Domestic and international terrorist groups threaten the very foundation of society with acts of violence on an all too frequent basis. We hear of atrocities committed on a daily basis at the international level. Here at home, in the United States of America, the acts of violence are not to frequent. However, terrorist acts are slowly creeping their way into the fabric of our society. The influx of illegal immigrants and refugees brings with them the hatred and violence toward our country.…

    • 722 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Military Spending Essay

    • 1056 Words
    • 5 Pages

    Military spending in the U.S has been a widely debated issue for years; should we spend more, or spend less? We are in the 21st century and the world is becoming a scarier place to live in. Our military needs to grow to keep citizens safe, restore peace, and protect allies. So why wouldn’t we increase military spending, what good would come of that except not spending as much, but at what cost? Our safety?…

    • 1056 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Evolution Of Terrorism

    • 767 Words
    • 4 Pages

    Terrorists differ from regular criminals because their goals and means are ultimately different. Influencing third parties by extreme measures is one of the…

    • 767 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    They used epidemiology to figure out where the disease might have been contacted from, who might be patient zero, the host , and that the virus might no longer in Boston but only in Cedar creek which helped them to allocate the proper resources to where it was needed. The military was trying to get a bio weapon instead of trying to find a cure at that immediate time, or they would have found one as they did for the first strain of the Motaba virus. This was to enable them to have a fighting chance in the event that virus is used for bioterrorism. Here, the military preferred immediate action which was when they introduced Operation Clean sweep; bombing Cedar creek. This movie clearly illustrates the struggle between wanting to save a tiny number of infected people, and the obligation to secure the general public from the virus.…

    • 613 Words
    • 3 Pages
    Improved Essays