Terrorism Vs Cyber Terrorism

Superior Essays
Contrasting Acts of Terrorism
The very mention of the words terrorism and terrorist incites a variety of negative emotions for most people. An individual’s dread of bodily harm or worries about the condition of the state creates a condition of extreme fear. (Levav) There are two very different aspects of terrorism affecting our world today. There are the physical acts of terroristic violence, and there is cyber terrorism. Whether it’s physical terrorism or cyber terrorism, the psychological affects on today’s society remain very similar; an underlying feeling of anxiety. However, there are differences in the execution of both types of terrorism, and there is a contrast in the way we combat them.

While modern physical terrorism and cyber terrorism
…show more content…
(Littleton) One month after the attacks of 9/11, a former national security cyber terrorism expert expressed concern about the launch of a cyber attack, which would cause confusion and panic. Most recently, the “SONY” attacks by North Korea and the hijacking of the web site ‘Ashley Madison’ by the group known as The Impact Team, was an attempt to not only destroy software or equipment, but was an act of cyber terrorism used to exploit sensitive information that could be detrimental to lives of politicians, business leaders, and thousands of others. (Ellyatt) “When a U.S. military plane crashed in Chinese territory in 2003 after computer hackers attacked American systems with viruses, the academic, Dr. Alan Ryan, warned that cyber terrorism was the way of the future and the nation’s security experts would have to focus their attention on the problem.” (Murrill) In response to the undeniable fact that cyber terrorism is a relevant and dangerous threat, President Barrack Obama bolstered cyber terrorism defense. Today a “cyber war” is taking place. Government agencies and corporations have tripled the hiring of cyber security experts, and the field is one of the fastest growing and in- demand areas of the global workforce. (UBLS) The U.S. military has created a specialized task force within U.S. Cyber Command, pulling personnel from all branches of …show more content…
Modern physical terrorism, while not as sophisticated as cyber terrorism, is a very real threat that is meant to disrupt normal society. The planning and execution of a terrorist attack has many facets and stages and therefore requires a very large amount of resources, at every phase of the planning, to combat the threat. Tens of thousands of U.S. service members are forward deployed on a daily bases to root out and destroy the terrorist threat. Thousands of intelligence assets and networks are embedded around the world. (CIA) They are feeding bits of information puzzle pieces back to a thousand other analysts trying to create a picture for decision makers with which to plan defense. The combined effort of many resources is a necessity to successfully mitigate the terrorist threats. After a failed joint mission to rescue hostages from the U.S. embassy in Iran in 1980, U.S. Special Operations Command was created in order to combine the specialties of all DOD branches primarily to combat terrorism. (SOCOM) This joint effort is in contrast to fighting Cyber terrorism in that the mobilization of personnel, equipment and mass information gathered and analyzed is a much broader, more personnel centric task. A huge force of personnel from all government and civilian agencies combine to combat some element of terrorism, unlike cyber terrorism that requires only a few

Related Documents

  • Improved Essays

    The Federal Bureau of Investigation (FBI), the Department of Homeland Security (DHS), and the Federal Emergency Management Administration (FEMA) are three key players in the efforts to counter or mitigate terrorism. The FBI’s mission for counterterrorism “is to detect, deter, prevent, and swiftly respond to terrorist actions that threaten the U.S. national interests at home or abroad, and to coordinate those efforts with local, state, federal, and foreign entities as appropriate” (FBI.gov). In the FBI’s efforts to protect the US, the biggest asset used is the Joint Terrorism Task Force (JTTF). The JTTF is comprised of investigators, linguists, Special Weapons and Tactics (SWAT) personnel, and other experts from law enforcement and intelligence communities. The JTTF allows for the FBI to have local cells based in 104 cities throughout the country.…

    • 1724 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    Black Ice Summary

    • 823 Words
    • 4 Pages

    In his 2003 book Black Ice, Dan Verton paints a frightening scenario in which terrorists launch a broad, coordinated attack using truck bombs to take out key telecom hubs and strategic hacks to disrupt response units' command and control. Using common hacking tools, the terrorists create chaos and successfully leverage the Internet as a force…

    • 823 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Criminals and Terrorist have similarities in the way they plan to commit crimes yet, there poses a distinct difference in the act of motivation. Criminals are usually motivated by greed; whereas, Terrorist are motivated by religious and political ideologies, which encompasses short and long-term goals (Clarke, R.V. & Newman, G. R., 2008). Some of the key components that are considered by Criminals and Terrorist include, the target of choice, the method and tools required to perform the act, and opportunity (Clarke, R.V. & Newman, G. R., 2008). Terrorism can come in many shapes, forms, and fashions; all of which are governed by the benefits of the act and the opportunity to attack. The degree and level of attack can pose damages that are far…

    • 775 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Another reason why there are so many definitions for this term is because people disagree on what should be considered as a terrorist act. This might be because some people have a vague idea of what terrorism is, but lack a concrete understanding of the term. For example, terrorism is often confused with guerilla warfare, ordinary crime, or assassination. For this reason, they classify every act of violence against non-combat groups to be a terrorist act. Though these are all related, the motives of the violence differentiate terrorism from other forms of violence.…

    • 659 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    War on Terror Greatest aspiration of humankind from ancient times up now is still yearning for a real peace and eternal. But in history, mankind has witnessed many times to the blue sky of the earth in an opaque by smoke of war. Currently, terrorism in many countries around the world are breaking the peaceful atmosphere of everyone. The word “terrorism” has become a word very familiar to people today. Associated with it is a tragic bloodshed, is dead, is ruined desolation, was haunting horrors which the survivors.…

    • 1169 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    On a regular basis, we hear about crimes. Crimes like bank robberies, stabbings and cars being stolen. But some crimes affect more people, are larger scale and are more extreme. These crimes are often labelled as Hate Crimes or Terrorism. Although Terrorism and Hate Crimes share many similarities, Terrorism generally has more extreme motivations, longer sentences and more extreme long-term and short-term…

    • 63 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    1 Amendment Rights Essay

    • 814 Words
    • 4 Pages

    This paper is destinated to understand the approach of 1st Amendment rights, and it's application related to the terrorism. I will first, try to uncover what is consider to be 'terroristic message', Secondly, I will try to figure out if there are different types of such a messages. Thirdly, I will search the way of transmission, for such a ' terroristic proposal', such as, but not limited to Internet, broadcast media( radio, TV), press.…

    • 814 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Domestic Terrorism Report

    • 1205 Words
    • 5 Pages

    Abstract This paper discussed the differences between domestic and international terrorism. It identified some of the factors that contribute to the increased threats in domestic terrorism. This paper revealed that differences of opinion by some administrators within the criminal justice system as to what a true terrorist act is defined as complicates the investigation of terrorist acts. Finally, this paper discussed how the role of the criminal justice system must be modified to better work to curtail terrorist acts.…

    • 1205 Words
    • 5 Pages
    Superior Essays
  • Great Essays

    Homeland Security Thesis

    • 670 Words
    • 3 Pages

    An introductory text for the 21st Century (11th ed.). Upper Saddle River, NY: Prentice Hall. Annotated Bibliography Bullock, J. A., Haddow, G. & Coppola, D. P. (2013). Introduction to Homeland Security (4th ed.). Waltham, MA: Butterworth-Heinemann.…

    • 670 Words
    • 3 Pages
    Great Essays
  • Superior Essays

    Cyber attackers have come from in the country and outside of the country, and these other countries need to know that we aren’t going to accept it. In the debate, Clinton said, “the United States has much greater capacity. And we are not going to sit idly by and permit state actors to go after our information, our private-sector information or our public-sector information.” (Washington Post)…

    • 1185 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Cybersecurity In America

    • 899 Words
    • 4 Pages

    Individuals question what kind of response a 200-year-old government can provide to modern-day threats. Some believe that even if Congress had the ability to adopt a utopian cybersecurity law, it would be short lived because of the endlessly evolving nature of cyberspace. Those who support private sector cybersecurity also arguing that breaches only happen because their networks are consistently being attacked. Furthermore, economic experts believe if the government enacts legislation, many of the cybersecurity professionals would leave America to seek employment in other countries (Clinton, 1).…

    • 899 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    There are many ways in which a criminal could use electronic means to incite fear and violence. It's far less expensive to purchase a computer than to access guns or bombs, making this approach appealing for many potential criminals worldwide. It can be anonymous and conducted at a great distance away from the target. Experts in cyber terrorism have pointed out that the potential harm posed by these threats may be exaggerated, but there is some disagreement. If it was to succeed, our outdated computer networks owned by the national government could be comprised.…

    • 482 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Terrorism is a huge international problem, killing thousands of people every year. In a report from the University of Maryland-based Global Terrorism Database--one of the world's most comprehensive sources of information about terrorism--32,658 people died in 2014 as the direct result of terrorism, an increase of eighty percent from 2013, when terrorists killed about 18,000 people (“4 Surprising Facts from the 2015 Global Terrorism Index”). There are different types of definitions for the word “terrorism.” Title 22 of the U.S. Code, Section 2656f(d) defines terrorism as “premeditated, politically motivated violence perpetrated against noncombatant targets by subnational groups or clandestine agents, usually intended to influence an audience.”…

    • 1201 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Iran Cyber War Essay

    • 1468 Words
    • 6 Pages

    With many people having the tools right at their fingertips, being a terrorist is easier than you think. Likewise, terrorists can be oceans apart, but be a threat right at our living rooms. Therefore, our old tactics will no longer be relevant in ensuring our safety and livelihood, we are no longer fighting a physical war. It’s a cyber war now. Since our government is trying to hide these cyber attacks from the public, we can’t help wonder why.…

    • 1468 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    Importance Of Cyber War

    • 1835 Words
    • 8 Pages

    THE US PRESIDENTIAL ELECTIONS AND A WORLDWIDE CYBER WAR Developments in technology and information systems have created a new world and provided numerous benefits. Individuals, states, and international bodies take advantage of such benefits; however they are under some risks as well. As Miller and Kuehl (2009) note, “The increasing dependence of modern technologically-advanced forces (especially American forces) on networks and systems create new kinds of exploitable vulnerabilities.” Countries have become more “dependent on a series of interconnected, increasingly vulnerable ‘critical infrastructures’ for their effective functioning.” These infrastructures have become new kinds of strategic targets (Miller & Kuehl, 2009).…

    • 1835 Words
    • 8 Pages
    Great Essays

Related Topics