The Pros And Cons Of Cyber Terrorism

Improved Essays
Cyber Terrorism is the same as physical terrorism, except that they use computers to make attacks. The Federal Bureau of Investigation (FBI) enforces federal laws, those created by Congress which apply to everyone nationwide. One area of law which they enforce is cyber terrorism, which involves crimes of terrorism that occur electronically. These crimes occur against individuals, businesses, organizations, and against the government itself. So much of our lives are accessible electronically now - from your social security number on a job application, to your bank account, to medical records and more. With the greater convenience of using technology, we trade off some degree of security since it's very difficult to stop every instance of cyber …show more content…
There are many ways in which a criminal could use electronic means to incite fear and violence. It's far less expensive to purchase a computer than to access guns or bombs, making this approach appealing for many potential criminals worldwide. It can be anonymous and conducted at a great distance away from the target.
Experts in cyber terrorism have pointed out that the potential harm posed by these threats may be exaggerated, but there is some disagreement. If it was to succeed, our outdated computer networks owned by the national government could be comprised. Bombs could be detonated or dismantled, private data could be leaked, and secret communications could be given to our enemies. The United States Institute for Peace argues that there is significant public fear of these crimes, brought about by increased media and governmental attention.
The FBI offered a few examples of successful operations against cyber terrorism. In 2014, Executive Assistant Director Robert Anderson, Jr. of the FBI testified about these cases before the Senate. First, he noted that the FBI successfully charged Chinese cyber terrorists with hacking into U.S. companies' networks to steal trade

Related Documents

  • Improved Essays

    The Federal Bureau of Investigation (FBI), the Department of Homeland Security (DHS), and the Federal Emergency Management Administration (FEMA) are three key players in the efforts to counter or mitigate terrorism. The FBI’s mission for counterterrorism “is to detect, deter, prevent, and swiftly respond to terrorist actions that threaten the U.S. national interests at home or abroad, and to coordinate those efforts with local, state, federal, and foreign entities as appropriate” (FBI.gov). In the FBI’s efforts to protect the US, the biggest asset used is the Joint Terrorism Task Force (JTTF). The JTTF is comprised of investigators, linguists, Special Weapons and Tactics (SWAT) personnel, and other experts from law enforcement and intelligence communities. The JTTF allows for the FBI to have local cells based in 104 cities throughout the country.…

    • 1724 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    "In this day of age, we have dedicated large portions of our lives to the internet and staying connected. This allows a wide variety of knowledge and entertainment to be brought into every home. However, the vast amount of resources available online can possibly be a bad thing. Countless organizations of crime and terrorism roam the online world with a sense of anonymity and the resources to mass spread their ideologies across the world. This has led to the creation of governmental organizations such as the National Security Agency (NSA) that hold the main goal of trying to prevent terrorist and crime organizations from carrying out evil and violent attacks on the people of the United States and the world.…

    • 523 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    The PATRIOT Act included new intelligence methods that are controversially viewed as breaching of civil liberties. The advancing front of civil liberties creates political limitations of intelligence. The increase of electronic communications has brought the private sector directly into the battle between homeland security and civil liberties. Homeland security intelligence is the invisible connections that fight the web of terrorism. Past centralized intelligence methods have been replace with a great number of resources spanning the line from Federal to local street level.…

    • 1584 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    In 2004, the director of the FBI reported that within two years of the law’s creation the act had proven to be “extraordinarily beneficial” in the war on terrorism and to how the FBI conducts business (“Testimony”, 2004). The greatest success seems to be the removal of barriers that prevented government agencies to share vital information. Government agencies are freely sharing information enabling them to disrupt terrorist operations in the early stages and participate in joint investigations which greatly increases the efficiency of those investigations (“Testimony”, 2004). Also, according to McNeill, Carafano, and Zuckerman (2011), thirty nine terror plots against the U.S have been foiled since 9/11 crediting support of the Patriot Act as a key factor. One of those plots involved 21 year old American citizen Antonio Martinez also known as Muhammad Hussain who planned to bomb a military recruiting center in Maryland.…

    • 1181 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    USA Patriot Act Analysis

    • 1281 Words
    • 6 Pages

    Prior to the enactment of the Patriot Act, law enforcement and intelligence agencies immensely lacked the ability to share information. The effectiveness, improvement and development among the intelligence operations was initiated when all aspects of government were synchronized, positively impacting the scope and quality of our national security, leading to endless possibilities. The USA Patriot Act of 2001, significantly changed the fundamental framework for the federal law enforcement, which was immediately passed following the aftermath of the September terrorism attacks. Expanding security level consequentially elevated a questionable defensive behavior in efforts to protect the nations civil liberties.…

    • 1281 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    According to the Zertag video the three classes of cyber-attacks are intellectual property theft, attacks that disrupt our way of life and attacks that threaten the military’s ability to defend itself. The effects of intellectual property theft are that it will degrade our economic competitiveness. The effect of attacks that disrupt our way of life is attacked that disrupt our infrastructure like 9/11. After 9/11 Americans were shaken and the government cracked down on airport security, immigration, and the war of terrorism. The effect of attacks that threaten the military's ability to defend itself is that it will leave us vulnerable to other attacks, other countries, and more deaths of…

    • 111 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    When suspicious people were assumed to be boarding planes, only their luggage was checked, as seen specifically with one of the hijackers in the 9/11 crisis(9/11 Commission Report, 1). The law enforcement and intelligence agencies were actually restricted by law in the amount of information they could share with each other in order to honor the ‘civil liberties’ of the citizens (Friedman, 15). The Patriot Act which was passed in order to ‘preserve the life and liberty of citizens’ had many features concerning how terrorists could now be handled by the government. Now, increased surveillance was allowed and encouraged, assumed terrorists no longer had the right to know they were being investigated, and court orders to obtain business records when concerning national security could be issued as well(Ball, 37). Search warrants can be immediately issued to law enforcement when terrorist-activity as assumed, and hackers can be monitored immediately once a victim reports it to the authorities.…

    • 1180 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Conspiracy Pros And Cons

    • 632 Words
    • 3 Pages

    After the terror attacks of September 9, 2001, the United States Congress rushed a bill through its system, called the “Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001” or the “U.S.A. P.A.T.R.I.O.T. Act,” and signed into effect by President George W. Bush. Its goal is “to deter and punish terrorist acts in the United States and around the World, to enhance law enforcement investigatory tools, and other purposes” (United States, Congress, House 1). Thereby, giving more legislative power to investigate “suspected” acts of terrorism. Its goal is not just to prevent the act of terror itself, but to investigate those individuals, who launder and finance acts of terrorism.…

    • 632 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    The SPI targets specific problems, the NSI is attempting to implement the SAR program, CAT gathers information specific to certain types of businesses and, the TVCI identifies violent crime data that may impact terrorism prevention. Sounds like a lot but it’s not, the future of terrorism will rely on technology. Radicalization is increasing along with the gap between the rich nations and the poor nations. The internet will continue to be one of the most important vehicles in recruiting terrorists and operation planning.…

    • 1166 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Consider Los Angeles 2000, Detroit 2006 and Chicago 2014- times in which the FBI prevented both foreign and domestic terrorist plots from occurring. After surveilling the suspects to gather necessary evidence and subsequently issuing warrants for their arrests, each of the men were convicted of terrorism-related charges. In these three cases, using various surveillance methods and collecting vital information on the individuals contributed to the government’s success in protecting the lives of citizens. Information is undoubtedly essential for the government to defend the country. Using it wisely to stop threats before they happen and/or place the terrorists in custody is the authorities’ primary goal.…

    • 1085 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    How does the agency ensure diversity in the recruiting process? The FBI has a serious commitment to ensure diversity and inclusiveness of all races, genders, and cultures. To ensure that the agency commitment is being fulfilled, the agency track the successes of their diversity initiatives (Hartmann,2002). The particular initiatives includes; providing EEO-related training, such as cultural diversity, to every employees.…

    • 1402 Words
    • 6 Pages
    Superior Essays
  • Great Essays

    Although some people say that the new agencies implemented after the 9/11 attacks have facilitate communication and integration between security measures and agencies to reshape the community to a better state, many still are not content with the aftermath. Opponents of the wiretapping and the intelligence team think that the system has been flawed all together. Many think that the money spent for the warrantless wiretapping is absurd. Robert Dreyfuss, journalist, contends that: “Even at the height of the Cold War…there was nothing like the post-911 behemoth in existence. A thousand smart intelligence analysts, a thousand smart FBI and law enforcement officers, and a few hundred Special Operations military folk are all that's needed to deal with the terrorism threat” (Intelligence Gathering).…

    • 1328 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Isis Informative Speech

    • 1988 Words
    • 8 Pages

    So many things are happening in the world today to where people don’t even know what’s going on. Isis is one of the many dangerous terrorists in the world today. Terrorists today does not care who they hurt as long as people gets hurt. All these bombings that's taking place today needs to come to a stop real fast. Innocent lives are being taking by stupid people.…

    • 1988 Words
    • 8 Pages
    Improved Essays
  • Superior Essays

    The Computer Fraud and Abuse Act (CFAA) of 1986 was created during the Reagan Administration as the first significant federal legislation designed to combat the growing threat against computer based crimes. In the 1980 's, Congress would only have the vaguest of notions how computer technology would evolve as a medium for communications and social-networking. Lawmakers, at the time, recognized the federal interest of the U.S. government was to protect computers under control of a federal entity, part of a financial institution or somehow involved in interstate or foreign commerce. The CFAA was therefore a crucial piece of legislation that protected U.S. interest in terms of national security and financial information.…

    • 1516 Words
    • 7 Pages
    Superior Essays
  • Superior Essays

    Cyber warfare is now commonplace throughout the world because just about any country can do it. This causes it to have many various effects throughout the world. “Cyberwarfare is Internet-based conflict involving politically motivated attacks on information and information systems.” (Rouse, 2010) Not much is actually known about the effects of cyber warfare because most cases either go undiscovered or are seen as warnings.…

    • 1814 Words
    • 8 Pages
    Superior Essays