The Pros And Cons Of Cyber Terrorism

Improved Essays
Terrorism is the most popular headline in Media in the present situation. From past few decades’ world’s leading countries have been attacked by terrorist groups. Cyber terrorism is an act of terrorism used by many terrorist groups in order to steal highly classified from opponent countries or disrupt countries operations like nuclear generation, gas supplies etc. Cyber Terrorism is also known to be a way leading countries could show their dominance on other enemy countries. Cyber terrorism became a global threat right from its initial stages. One of the first attacks of cyber terrorism was in the early 1980s during the phase of the cold war, where CIA implemented a backdoor virus which is commonly referred as “Logic Bomb” in the Siberian pipelines. …show more content…
Till then USA government did not have any idea that terrorist can destroy their economy drastically by simply hijacking the plane. After 9/11 attack, many government agencies like FBI, CIA have been involved with the ISAC and other internet organizations in order to save their data and transfer them to a safer location. Since then, USA removed all the information available on their government websites which could help the terrorists to plan attack similar to 9/11. They protected their database from public access and recovered the primary data. While the US from recovering from the financial losses from the 9/11 attack exactly after a week it was attacked by a virus referred as “Nimda” which is considered to be the widest spread virus worm among the internet. As soon as it was released into the internet, it created havoc in the internet community especially in the USA by knocking out the databases of a major section of companies, corrupted data. This lead to the shutdown of many financials units and caused several billions in damage. The US was not successfully able to link the attack to Al Qaeda who planned 9/11. But they were rumors that it was intentionally released that the warm was released after a week of 9/11 to increase the percentages of damages caused to the US during the recovery stage. Since after the continuous …show more content…
One direction of the cyber terrorism is to use the latest technology and methods to reveal the bad things done by the government and reveal the real facts to the general public. These groups of cyber-terrorist are commonly referred as hacktivist. The other direction is to use latest technology and methods to plan attacks on different countries to cause damage to countries economy and human life. Even though both are considered to be illegal by law, people have always supported the group of hacktivist who actually the government dark secret to the public. Recently in the media sector, Panama papers are creating sensational new. Panama papers are confidential documents of many leaders, politicians, celebrities who are actually involved in tax evasion and causing huge losses to the countries. These set of 11.5 million documents are released by unknown anonyms hacktivist group and handed them over to an International consortium of a investigative journalist to analyze them (Panama Papers). The Journalist have analyzed the papers and stated that all the documents are considered to be legit. This leak contains documents dated older than 4 decades and show how the tax evasion is taking part in the countries. This is the most popular leak till date regarding tax evasion to contain all the legitimate documents and proofs to investigate they are involved. This Might be an example how hacktivist uses the

Related Documents

  • Great Essays

    Only in the past few decades has it been effective enough to be used by militaries and criminal groups to reach their goals. NATO claims that the first cyber attack occurred in 1988 and destroyed computer systems by inserting a virtual worm into the systems causing them to slow down so much that they became unusable (Review). The person responsible for this attack now works as a professor at the Massachusetts Institute of Technology which shows the intellectual ability required to attempt a cyber attack when it was first proved effective. For the next two decades cyber warfare slowly became more dangerous but was not thought of as a major threat until 2006 when NASA discovered they were at risk of being hacked. They were forced to delay shuttle launch plans in order to secure their systems and prevent them from being tampered with (Review).…

    • 1774 Words
    • 8 Pages
    Great Essays
  • Superior Essays

    Whether that damage is physical or even emotional, it can have a much larger influence than a more primitive approach can. One of the newest, but fastest evolving type of terroristic threat to the United States specifically is a type of cyber-attack. Already pointing out the wide scope of possible terroristic threats, this also pertains to the many ways cyber criminals can hurt the U.S. people. To quote a sadistic, but highly intelligent American literature artist in Marilyn Manson “In a sense, terrorism blossomed in the advent of television. Television promotes terrorism in religion and in politics.”.…

    • 1910 Words
    • 8 Pages
    Superior Essays
  • Improved Essays

    Using cyber terrorism is a serious crime and should be stopped. The CIA group keeps track of this happening daily to stop people from hacking others email addresses or passwords. (csciwww.etsu.edu) More types of terrorism are: state sponsored, anti state, international, and domestic. They all involve with finding out information secretly by using terrorists groups. But terrorists focus on one part of a country at a time.…

    • 1184 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Because of the trauma Osama Bin Laden did to the U.S. the President put out a bounty for Osama. The Bombing at 9/11 increased the anger of the U.S. people. Today Al Qaeda no longer had a leader to tell them where to attack next. Everyday that passed and the CIA or FBI couldn 't find Osama scared them because they knew the inevitable was going to happen. After the bombing on the twin towers we lost 3,000 people, if we don 't stop Al Qaeda than there might be another bombing but on a larger scale.…

    • 1247 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    One group known as Anonymous is one of the most infamous groups In the United States. They have attacked government computers for the sake of making a point. Hackers have begun to dabble in organized crime. This makes them dangerous because they are willing to help other terrorist groups so long as it is for the right…

    • 1267 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Cyber Attacks

    • 1079 Words
    • 5 Pages

    Cyber Attacks on Financial Institutions Over the past few years the global financial sectors have become victims to an overwhelming increase in cyber security criminal attacks on financial institutions around the world. Hackers are the single most dangerous enemy facing financial institutions today because of their malicious intent to obtain financial gains or harm the reputation of companies. Last year hackers took aim at JPMorgan Chase and a number of other banks, stealing customer and other data in an operation, which sparked concerns at the highest levels of government (Cybersecurity Responding, 2015). We live in a digital world where most transactions and consumer purchases are done online, which put consumers and financial companies…

    • 1079 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Cost Of Cyber Crime

    • 811 Words
    • 4 Pages

    According to former US Secretary of Defense (SECDEF) Leon E. Panetta, “a cyber attack perpetrated by nation states or violent extremist groups could be as destructive as the terrorist attack on 9/11.” He further elaborated on the danger our cyber based society faces in an October 2012 meeting with business leaders, highlighting high profile cyber attacks that affected Saudi Arabia and Qatar’s energy sector. In this attack conducted by unknown actors “30 thousand computers integral to Saudi Arabia and Qatar’s energy sector were rendered useless”, and he warned that America 's critical infrastructure and corporations are in danger just as much if not more so than any other country in the world. In order to better understand the danger in which…

    • 811 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    (Littleton) One month after the attacks of 9/11, a former national security cyber terrorism expert expressed concern about the launch of a cyber attack, which would cause confusion and panic. Most recently, the “SONY” attacks by North Korea and the hijacking of the web site ‘Ashley Madison’ by the group known as The Impact Team, was an attempt to not only destroy software or equipment, but was an act of cyber terrorism used to exploit sensitive information that could be detrimental to lives of politicians, business leaders, and thousands of others. (Ellyatt) “When a U.S. military plane crashed in Chinese territory in 2003 after computer hackers attacked American systems with viruses, the academic, Dr. Alan Ryan, warned that cyber terrorism was the way of the future and the nation’s security experts would have to focus their attention on the problem.” (Murrill) In response to the undeniable fact that cyber terrorism is a relevant and dangerous threat, President Barrack Obama bolstered cyber terrorism defense. Today a “cyber war” is taking place. Government agencies and corporations have tripled the hiring of cyber security experts, and the field is one of the fastest growing and in- demand areas of the global workforce.…

    • 1292 Words
    • 5 Pages
    Superior Essays
  • Superior Essays

    Homeland Security Threats

    • 1252 Words
    • 6 Pages

    Some hackers are harmless, however some are prepared to wreak havoc on America. As our country becomes more and more dependent on technology and computers in everyday life, technology also becomes an important tool for potential terrorist organizations. These organizations can cause critical damage to information systems used by our government. Cyber terrorism is a relatively new word that refers to terrorist organizations or individuals who seek to damage and destroy technological infrastructures such as the Internet (Furnell & Warren, 1998, 1). According to Mark M. Pollit, “the modern thief can steal more with a computer than with a gun” (Pollit, 2007, 65).…

    • 1252 Words
    • 6 Pages
    Superior Essays
  • Superior Essays

    According to the new article The Guardian, during the month of September 2014“Fingerprint images were stolen in one of the worst government data breaches is now believed to be 5.6 million, not 1.1 million as first thought, the Office of Personal Management”. Many consequences can occur from these fingerprints since we have spies all over the world. China can do hundreds of things with the fingerprints they can get into the United States system and hack important information. President Obama is using fear to figure out who hack the system. Fear of finding out who hack the systems was having huge consequences because the person has personal data.…

    • 2020 Words
    • 9 Pages
    Superior Essays