Terrorism: The US Cyber Threat

Better Essays
U.S. Cyber Threat

It is up to every single citizen in a nation to protect the way of life they love and have grown accustomed to. Threats upon this way of life are not only dealt with by the government officials appointed to monitor them. The responsibility of sustaining a healthy and safe nation falls upon the shoulders of every citizen within the borders, or simply citizens with any interests inside the borders. Some threats may be much easier to identify than others. Even with every citizen doing their part to help safeguard our nation, there are so many different type of security threats, spotting them will always be a challenge. This wide array of possibilities could range from a homegrown “vigilante” that feels that their local big business
…show more content…
Looking at a homegrown terrorist, their ways of enforcing their movement may be much more primitive. They may simply obtain a firearm and fire upon a public area to try and draw attention to their cause. Looking at the larger groups, they have much larger capabilities. They have the ability to organize large-scale attacks, able to inflict a lot of damage upon a larger group of people. Whether that damage is physical or even emotional, it can have a much larger influence than a more primitive approach can. One of the newest, but fastest evolving type of terroristic threat to the United States specifically is a type of cyber-attack. Already pointing out the wide scope of possible terroristic threats, this also pertains to the many ways cyber criminals can hurt the U.S. people. To quote a sadistic, but highly intelligent American literature artist in Marilyn Manson “In a sense, terrorism blossomed in the advent of television. Television promotes terrorism in religion and in politics.”. Of course, terrorism has been around for decades upon decades, but the newest technology along with the media tends to promote new and more radical …show more content…
This attack was not even carried out on U.S. soil, but still goes down as the biggest “breach of military networks” to date. What we now know as a program by the name of “agent.biz” is scripted to spread from one computer to every other computer in a certain network, just as the Shamoon virus was coded to do to Aramco. The agent.biz virus made its way into the American military networks by simple USB flash drive. It was never released how, but somehow the USB containing the virus was inserted into a computer on an American military base in the middle east. Once the virus made its way in it was able to get into the systems of U.S. Central Command. This is the entire strategic system on how the U.S. was going about the war in Iraq and Afghanistan. It is obvious to see the importance of the files the virus uncovered. The U.S. claims to have found the culprit of these specific attacks, but still refuses to reveal this information. Of course, much of the media has speculated that the Russian government was behind the attacks. This speculation is backed by the fact that the origin of the virus was from Russia. This is not reliable because that any type of virus like this, or even your home computer if you want, can have it’s origin scrambled. This makes it impossible to retrace the steps back to where the software truly

Related Documents

  • Decent Essays

    There are a lot of terrorist attacks you don’t read about in the paper, the reason for that is because they were either stopped or contained to protect the American people, for example in September 2009, federal agents arrested Naji-bullah Zazi and four others for purchasing chemical explosive materials to try and bomb the New York subway system (Fox 19 Now). One of the most recent and most tragic events was the Boston Bombing back in April 2013. The Patriot Act was not able to prevent the attack to happen, but it allowed the NSA to identify the Tsarnaev brothers and uncovered a follow up attack that was going to happen in Fall 2013 by going through cell phone pictures and email records. Fortunately, with the fatality of one brother and the arrest of the other one they were unable to go on with their plans (History.com Staff). Along with Al-Qaeda, there are many other terrorist groups around the world that would want to harm America, one of the most dangerous is ISIS.…

    • 1272 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    Terrorism is the most popular headline in Media in the present situation. From past few decades’ world’s leading countries have been attacked by terrorist groups. Cyber terrorism is an act of terrorism used by many terrorist groups in order to steal highly classified from opponent countries or disrupt countries operations like nuclear generation, gas supplies etc. Cyber Terrorism is also known to be a way leading countries could show their dominance on other enemy countries. Cyber terrorism became a global threat right from its initial stages.…

    • 1484 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    the article talks and demand a study to find out the main reason behind horrific terrorism attacks (9/11). This article is more persuasive than the former, because it provides some evidence and information to support the thesis. For example, "Why Al-qa 'idah needed to do this as no wise human brothers including Muslims and hurts anyone without any reason". (Afghan paper calls on USA to define what terrorism is, 2007, paragraph 3). there has to be a super power behind, who is funding terrorist and paying them under the table to commence such acts against entire world, "to achieve its strategic objectives ".…

    • 1272 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    Before the presidential election, there were many rumors going around that Russia was tampering with the election, more specifically the primaries. If these rumors are true then cyber warfare has affected the very foundation of the American Democracy. Although primaries are technically not officially a part of the government, they do play a major part in the deciding of the next President of the United States of America. The New York Times stated on October 7th, “The U.S. government for the first time on Friday formally accused Russia of a campaign of cyber attacks against Democratic Party organizations ahead of the Nov. 8 presidential election” (Reuters). This was after Newsweek stated back in August, “Officials and cyber security experts say recent breaches at the Democratic National Committee and elsewhere in the Democratic Party were likely carried out by people within the Russian government” (Rinaldi).…

    • 1774 Words
    • 8 Pages
    Decent Essays
  • Decent Essays

    President Obama in Homeland Security Presidential Directive 7 says, “terrorists seek to destroy, incapacitate, or exploit critical infrastructure and key resources across the United States to threaten national security, cause mass casualties, weaken our economy, and damage public morale and confidence” (POTUS, 2015). So how do we protect these assets? When you think about how big this country is and all the infrastructure that is spread about, it is hard to have a 100% plan to protect it all from all hazards. This is where a risk assessment is done and the government decides on which are more dangerous to the public, more accessible, and more desirable to attack. You will notice, major dams and nuclear power sites will have…

    • 1967 Words
    • 8 Pages
    Decent Essays
  • Decent Essays

    The terrorist networks of al-Qaeda are little more complex and deliberate with their tactics. The growth of network of al-Qaeda is actually scary with the damage that 9/11 has done in a short period of time. 4. Discuss the feasibility of obtaining weapons of mass destruction by terrorists. Which weapons are more easily obtained?…

    • 883 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    Edward snowden is a computer professional that is famously known for leaking information on the U.S. National Security Agency in 2013. Snowden said in an interview that “ The NSA has built an infrastructure that allows it to intercept almost everything that is uses telecommunications.”(www.cfr.org). This infrastructure collects data all around the United States. This is private information that is being collected without our consent or a warrant being present. The Obama Administration defended the surveillance program saying “ it 's legal, limited and effective with preventing terrorist acts” (www.cfr.org).…

    • 1280 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    The lives of millions of people and their calls are all being monitored by machines that cannot tell the different between a terrorist and an average person. These machines are used to listen for keywords with algorithms that no one knows outside of the buildings that hold the surveillance centers. Even if you know that you are being monitored by the government and if you so happen to request the information about yourself they hold, it is simply impossible to do. Not only will these governments not admit to what they are doing but if they ever do they will not admit that this is wrong. This has been seen before many Americans in the form of the Patriot Act, which was forced upon the American people a terrorist attack.…

    • 2164 Words
    • 9 Pages
    Decent Essays
  • Decent Essays

    There are questions to be asked about the assassination, but there is also a right way to ask them, and asserting that everything the government tells the public is a lie, and that vast conspiracies are behind many major events in United States history, via a mainstream Hollywood movie is not the way to ask those questions. Questions should not come in the form of…

    • 1323 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    He did alert our enemies about some of our security systems but he also showed to the public what is happening were we can not see. The United States government has called him a traitor and working with Russians but what he really did was help the public decide its own fate. Snowden has enabled the public to decided if they are willing to lay down and be spied on, and not let the NSA decided if we are spied on. The witch hunt against Snowden should not continue what should happen is a fair trial to see that what Snowden was good by exposing…

    • 1115 Words
    • 5 Pages
    Decent Essays