DHKP-C: An Analysis Of The Revolutionary People's Liberation Front

Improved Essays
(U) This is an analysis of how the Revolutionary People's Liberation Front (DHKP-C) can conduct cyber attacks on the United States or US interests. DHKP-C has the ability to conduct cyber terrorism on US interests. In 1978 the group was created with Marxist-Leninist ideologies. DHKP-C is a terrorist organization located in Turkey. This organization has ran a violent campaign for more than thirty years. DHKP-C has adopted some tactics used by Al-qaeda to get more attention from the populace. The organization also opposes US ideologies and has often targeted US personnel.
(U) Cyber terrorism is used by terrorist organizations using cyberspace to disrupt a specific target. The main motive for cyber terrorism is to effect operational capabilities of a nation’s major infrastructures. Cyber attacks can degrade a nation’s confidence and instill fear in the citizens. Conventional terrorism is becoming difficult to conduct. Many organizations are switching their tactics and using cyber-terrorism. Terrorist groups can instill fear easier from behind a computer screen.
(U) Nations struggle to upgrade their cyber security to match the advancements in cyber attacks, “Since 2008, when Turkey saw its first major cyber attack aimed at the Baku-Tbilisi-Ceyhan pipeline, the country has faced many subsequent cyber attacks, leading to the increase
…show more content…
The group can target multiple objectives that are key to the economy and infrastructure, such as pipelines, water facilities, and nuclear power plants. There will be mass damage to the government and the everyday life of the citizens if a cyber attack is successful. DHKP-C has shown numerous times that they are willing to attack US assets, “The DHKP-C has carried out a number of attacks in Turkey, including on U.S. diplomatic missions and Turkish security forces.” This leads to the US to assess that the group can and will use their cyber capabilities to attack US

Related Documents

  • Improved Essays

    Black Ice Summary

    • 823 Words
    • 4 Pages

    In his 2003 book Black Ice, Dan Verton paints a frightening scenario in which terrorists launch a broad, coordinated attack using truck bombs to take out key telecom hubs and strategic hacks to disrupt response units' command and control. Using common hacking tools, the terrorists create chaos and successfully leverage the Internet as a force…

    • 823 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The typical standard of terrorism changed on September 11, 2001. Terrorism is now an ever-present threat in the world in which we live, eat and breathe. Over decades’ terrorism has been a constant change. “The 1993 bombing of the World Trade Center, where six people were killed, raised our national consciousness to our vulnerability to acts of terrorism.” (Ezell, 2007, p. ).…

    • 129 Words
    • 1 Pages
    Improved Essays
  • Decent Essays

    Briefly describe Cold War terrorist-networking theory. Compare and contrast this understanding of terrorist networks with the growth of the Qaeda-like networks. The United States and the Soviet Union there was a cold war rivalry both where superpowers showed a persistent arrogant international behavior toward one another. The Chinese and Soviet Union financed and arm the wars of the national liberation against the United States.…

    • 883 Words
    • 4 Pages
    Decent Essays
  • Improved Essays

    According to the Zertag video the three classes of cyber-attacks are intellectual property theft, attacks that disrupt our way of life and attacks that threaten the military’s ability to defend itself. The effects of intellectual property theft are that it will degrade our economic competitiveness. The effect of attacks that disrupt our way of life is attacked that disrupt our infrastructure like 9/11. After 9/11 Americans were shaken and the government cracked down on airport security, immigration, and the war of terrorism. The effect of attacks that threaten the military's ability to defend itself is that it will leave us vulnerable to other attacks, other countries, and more deaths of…

    • 111 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    Essay On Homeland Security

    • 1030 Words
    • 5 Pages

    After the 2001 attacks The Department of Homeland Security had to completely remodel its system and focus on terrorism as the main threat. “Terrorists today can strike at any place, at any time, and with virtually any weapon. This is a permanent condition and these new threats require our country to design a new homeland security structure.” Our country suffered from this event and it has been the focus of Homeland Security to make sure nothing like that ever happens again. The USSS has taken effective measures in expanding its investigation in computer networks and monitoring internet activity.…

    • 1030 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Behind the Scenes of the War On Terror While every American in their right mind knows what the war on terror is, many don’t know what goes on with the many different terrorist organizations and where they came from or why they were made. This paper is to address the controversy of state sponsored terrorism and evaluate the effect this has had on the world through what it is used for To begin it should be acknowledged as to what precisely state sponsored terrorism consists of. State sponsored terrorism consists of the government support of non-state actors engaged in terrorism. In other words the government pays terrorist organizations to interact in acts of terrorism that are a direct result of the country’s wishes (Government). This tactic is used to deal…

    • 794 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    There are two types of terrorist groups that can cause major problems for the United States. One group is known as domestic and the other transnational. In this paper I will describe the two groups and explain how different their methods are when it comes to terrorism. The difference between domestic terrorism and transnational terrorism is that domestic terrorism is homegrown which means the target, venue, and perpetrators are from the same country.…

    • 567 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Although most people today view terrorism as a type of warfare that developed relatively recently based on this generation’s experiences with the World Trade Center bombing in 1993 and the federal building bombing two years later, modern terrorism has its roots in events that took place hundreds of years ago. Beginning with the Enlightenment in the eighteenth century, ordinary citizens began to demand social changes that would lead to the state’s protection of all people, not just the nobility. The increased demand for democracy produced tension between the ruling class and the governed, which led in some cases to violence. The American Revolution began in 1775 and ended in 1783.…

    • 673 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Definition Of Terrorism

    • 1226 Words
    • 5 Pages

    Terrorism is psychological warfare that is used for different reasons over the world but the intent is the same across the board. The intent of any terrorist organization is strike fear in the town, cities, or country that they are attacking. Terrorism can be used in a lone wolf attack on a specific target or a broad attack that is meant to cause as much devastation as possible. The operational intent of a terrorist organization is to use fear and the threat of violence to keep the public scared. The timing, location, and method of attacks are coordinate from the start to garner the most media attention.…

    • 1226 Words
    • 5 Pages
    Superior Essays
  • Superior Essays

    Introduction Cybersecurity should have always been important to anyone using technological devices. Now it is not only important but rather essential to maintain quality performance of technology. The cyber world will never be completely free of cyber attacks, cyber espionage or cyber threats same as how the physical world will never be completely free of crime. However we must seek to limit the amount of cyber security violations as well as the severity of any violations. This can only be done by full compliance and partnership between the government and the people.…

    • 2171 Words
    • 9 Pages
    Superior Essays
  • Decent Essays

    What is Cyber Terrorism? (Consumer View) When you say terrorism many people think of bombing and physical actions taken towards other people. You usually don?t think of the internet. Cyber terrorism is one of the largest points of attack in America, simply because people don?t think of their computer as a device that can physically harm them. But computers are the main way of taking care of sensitive documents that the government thinks are important to national security.…

    • 330 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Iran Cyber War Essay

    • 1468 Words
    • 6 Pages

    A majority of Americans express disappointment with our current direction in politics, just look at the current presidential election. We have two main candidates that appear ill-suited for the job, but they remain legit candidate all the way to election day. Before the campaign became the headlines, the status of the Iran deal was on the news. We planned to sign a deal with Iran on nuclear limits and methods of regulation. However, the deal was to remove sanctions on Iran for nuclear weapons, Iran refused to sign the deal.…

    • 1468 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Attack Scenario • Goals: 1. Shadow brokers sought to gain monetary compensation by extorting governments and individuals 2. Sought to bring attention to the abuse of power it perceived the United States National Security Agency (NSA) was developing for spying on other nations. 3. Obtain notoriety on a global scale • Resources required: • Skills and/or training- 1.…

    • 749 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    (U) Cyberattack Capabilities of the Palestine Liberation Front PV2 Stevens, Dakota C. Class 18-502 1 February, 2018 Classified By: PV2 Stevens, Dakota C. Derived From: Multiple Sources Declassify On: N/A (U) The Palestine Liberation Front (PLF) “is a small-armed splinter group allied to the Palestinian Liberation Organization (PLO), founded in 1961 by Ahmed Jibril.” The group mainly operates in Europe, Israel, Lebanon, and other areas within the Middle East. Estimates place their membership “between 50 and 500” .…

    • 564 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Shane Harris in his book @War: The Rise of the Internet-Military Complex (2015) explains that the government is partnering with large technology companies in order to carry out espionage and digital attacks that have real world consequences. Harris supports his claims by describing the operations and programs the US engaged in alongside private technology companies based on public knowledge and on interviews conducted with top US officials. The author’s purpose is to inform the audience about the potential dangers of cyberwar and how the government is deeply involved in cyberspace, both defensively and offensively, so that the reader understands the potent risks we face in a digital world and can decide whether or not the government’s involvement…

    • 2196 Words
    • 9 Pages
    Great Essays