National and International Perspectives and Response to Existing and Emerging Trends

Module 15 examines topics such as terrorism and warfare in cyberspace, as well as national and international perspectives and responses to these cyber activities. The purpose of the module is to discuss these topics and consider what response the criminal justice system and other governmental agencies should adopt to deal with future issues in cybercrime and cyberterrorism.


Learning Objectives

After completing this module, you should be able to

  • identify forms of cyber threats by recognizing the distinctions between cyberterrorism, state-sponsored cyber-attacks, and cyber warfare, and their implications for national security.
  • describe critical infrastructure commonly targeted by cyberterrorists, such as power grids, financial systems, and communication networks, and the methods used, including propaganda and psychological operations.
  • discuss how nations develop strategies, enact legislation, and collaborate with intelligence agencies and law enforcement to protect against cyber threats.
  • examine the political, economic, and military motivations behind state-sponsored cyber-attacks and their focus on military systems, government agencies, and critical infrastructure.
  • describe the use of digital attacks in conflicts to disrupt or destroy information systems, and how nations integrate cyber capabilities into military strategies while addressing challenges posed by the lack of clear rules of engagement.
  • explain the role of international agreements, norms, and alliances in establishing collective defense mechanisms and mutual assistance frameworks to counter cyber threats.
  • describe how legislative measures and technological advancements are employed to criminalize cyber-attacks and enhance national and global cybersecurity frameworks.
  • discuss the importance of combining legal frameworks, technological innovation, international cooperation, and diplomacy to mitigate cyber threats and ensure global digital security and stability.

Summary

Terrorism and warfare in cyberspace represent significant challenges in the modern era, where technology plays a central role in various aspects of daily life and national security. Cyber threats can manifest in different forms, including cyberterrorism, state-sponsored cyber-attacks, and cyber warfare. Here, we’ll discuss these concepts and explore national and international perspectives and responses to cyber activities.

Cyberterrorism involves the use of technology to conduct attacks that cause disruption, fear, and harm for ideological, political, or religious purposes. Critical infrastructure such as power grids, financial systems, and communication networks are common targets. Cyberterrorists may also engage in propaganda, recruitment, and psychological operations using online platforms.

Nations develop cybersecurity strategies to protect critical infrastructure. Legislation is enacted to define and combat cyberterrorism, often involving intelligence agencies and law enforcement. Countries collaborate on intelligence sharing and joint efforts to counter cyberterrorism. International agreements may be established to define norms and rules for cyberspace behavior.

State-sponsored cyber-attacks involve the use of cyber capabilities by one nation-state to target another for political, economic, or military purposes. Military systems, government agencies, defense contractors, and critical infrastructure may be targeted. Nations invest in cyber capabilities for defense and deterrence. Develop offensive capabilities as a means of strategic advantage. Escalation concerns arise as cyber-attacks may blur the line between traditional warfare and cyber warfare. Diplomacy and international law play a crucial role in managing state-sponsored cyber threats.

Cyber warfare involves the use of digital attacks to disrupt or destroy information systems with the aim of gaining a strategic advantage in a conflict. Nations establish cyber commands and doctrines to integrate cyber capabilities into military strategies. The absence of clear rules of engagement in cyberspace poses challenges. Efforts are made to establish international norms through agreements and treaties.

Our national response includes, but is not limited to, the development of robust cybersecurity frameworks and strategies. Investment in research and development of advanced technologies. Legislative measures to criminalize cyber-attacks.

Internationally, the lack of a unified effort produces challenges in and of itself. However, the formation of international alliances and partnerships for collective defense. In addition, the development of norms and rules of behavior in cyberspace. Moreover, the establishment of response mechanisms and mutual assistance in case of cyber incidents.

Terrorism and warfare in cyberspace demand a multi-faceted approach that combines technological advancements, legal frameworks, international cooperation, and diplomatic efforts to mitigate threats and ensure the security and stability of the global digital landscape. The evolving nature of cyber threats requires continuous adaptation and collaboration among nations to effectively address these challenges.

Key Takeaways

Click on the > to expand the related statement.

Key Terms/Concepts

Click on the following key term/concept to view the definition:

Collective Defense in Cyberspace
Critical Infrastructure
Cyber Commands and Doctrines
Cybersecurity Strategies
Cyberstrategy
Cyberterrorism
Cyber Warfare
Deepfake
Diplomatic Efforts
Infowarfare
International cooperation and agreements
Legislative Measures
Propaganda and Psychological Operations
Rules of Engagement in Cyberspace
State-sponsored cyber-attacks

Read, Review, Watch and Listen

  1. Read pages 4-6 of Defining Cyberterrorism: Capturing a Broad Range of Activities in Cyberspace (CTC, Aug. 2012, Vol. 5, 8)
  2. Read CYBER WAR Israel warns ‘largest EVER cyberattack’ hit country this week and spies say Iran is to blame (The U.S. Sun, Jaupi, J., March 2022)
  3. Read What could cyberterrorism look like? And is there such a thing?  (Sofia Escobar, Jan. 2019)
  4. Review Justin Sherman’s Cord-cutting, Russian style: Could the Kremlin sever global internet cables? (New Atlanticist, January 2022)
  5. Review Hackers drop deepfake of Zelenskyy ordering troops to surrender on Ukrainian news site (Daily Dot, Thalen, M., March 2022)
  6. Review Teen hacker claims ability to control 25 Teslas worldwide: Hacker took control of Teslas in 13 countries (Bloomberg, Jan. 2022) [Automotive News Europe, January, 2022]
  7. Review Cyber Terrorism Is a Growing Threat & Governments Must Take Action  (DARKReading, Sigal, L., Feb. 2022)
  8. Watch Confronting Realities: A Vision for Cybersecurity Resilience  (U.S. DHS, June, 2021)
  9. Listen U.S. Cyberwarfare: Its Powerful Tools, Its Unseen Tactics  (NPR, Dec. 2016)

Activity

STOP!!

Note: This is a copy of the module’s activity that students find within Blackboard. For that reason, refer to the Activities page to submit your work for review.

Cyberterrorism: Fact or Fiction?

Cyberterrorism refers to the use of technology and computer networks to carry out terrorist activities. It involves the intentional use of computers, networks, and other digital devices to cause harm, disrupt or damage critical infrastructure, or intimidate individuals or governments for political or ideological purposes. Cyberterrorists may use various techniques such as hacking, spreading malware or viruses, stealing sensitive information, and launching denial-of-service attacks to cause widespread disruption, panic, or fear. The goal of cyberterrorism is to create chaos, cause harm, or achieve political or ideological goals by using technology as a weapon. It is considered a serious threat to national security and public safety, and requires a coordinated response from governments, law enforcement agencies, and cybersecurity experts.

Terrorists’ Use of the Internet and Cyber Terrorism: Problems, Perspectives, and Prescription respectively, provide us with an opportunity to consider the potential use of electronic devices to carry out terrorist activities. Despite compelling evidence that we have become increasing reliant on interconnected systems, there is debate whether the idea of cyber-terrorism is merely theoretical.

Purpose

The purpose of this activity is to produce thinking about the emerging threat of cyber terrorism and the role of public and private entities/agencies to institute protective measure and mechanisms.

Instructions

  1. Read Does Cyber-Terrorism exist?
  2. View both videos (What is Cyber Terrorism? & Web Jihad) located below
  3. Read The Washington Post article Foreign hackers targeted U.S. Water plan in apparent malicious cyber attack, experts say
  4. Read Brussels International Center’s (BIS) New Terrorism and the Use of Electronic Jihad_1 (March, 2021)
  5. Review the most recent incidents reported by the Center for Strategic & International Studies (CSIS)

 

Answer the following questions:

  • Identify some of the most suitable targets and describe the potential effect on the United States’ national security.
  • To what extent should the federal government facilitate protections for those identified targets? Explain.
  • To what extent should private industry facilitate protections for those identified targets? Explain.
  • Based on what you read, watched, and listened to for this assignment, do you believe that we are over-reacting to the threat of cyber terrorism? Explain and include examples.

Key Terms/Concepts

Critical Infrastructure – Essential systems and assets that are vital to the security, economy, and public health of a nation. These include power grids, water supplies, transportation systems, financial networks, and communication networks, which are often targets of cyber threats.

Cyberterrorism – The use of technology and digital platforms to carry out attacks that cause disruption, fear, or harm for ideological, political, or religious purposes. Targets often include critical infrastructure and may also involve propaganda, recruitment, or psychological operations.

Cyber Warfare – The use of digital attacks by nation-states or other entities to disrupt, damage, or destroy information systems with the goal of gaining a strategic advantage during conflicts. It is often integrated into broader military strategies.

Infowarfare – Also known as information warfare, it involves the use and manipulation of information to gain a competitive advantage, influence public perception, or disrupt the operations of an adversary. This can include propaganda, disinformation, and cyber-psychological operations.

Rules of Engagement in Cyberspace – Guidelines or norms that define acceptable and lawful actions during cyber conflicts. These rules aim to clarify boundaries for cyber operations, but their development and enforcement remain challenging due to the evolving nature of cyber threats.

State-Sponsored Cyber-Attacks – Cyber operations carried out by a nation-state targeting another country or entity for political, economic, or military purposes. Common targets include military systems, government agencies, and critical infrastructure. These attacks are often part of a broader strategy involving espionage, sabotage, or deterrence.

Refer to the course learning management system (LMS); that is Blackboard (BB), for the correct due date. In addition, submit your work via BB for grading.

Discussion Questions

  • Considering the various forms of cyber activities that involve ideological, political, or religious motivations, how should international law define cyberterrorism to encompass all its dimensions without overlapping significantly with related concepts like cybercrime?
  • How effective are current national cybersecurity strategies and legislations in protecting critical infrastructure from cyberterrorism? Are there specific examples where these measures have successfully prevented significant cyberterrorist attacks?
  • With nations developing cyber capabilities for both defensive and offensive purposes, how do these capabilities influence global power dynamics?
  • Given the challenges of establishing unified international norms and treaties for cyberspace, what are the major obstacles to forming effective international alliances and partnerships in cybersecurity?
  • As cyber threats continually evolve, what steps should nations take to ensure their cybersecurity frameworks and strategies remain effective?

Supplemental Resources

  1. Japan’s Cyberterrorism Crisis Threatens Us All
  2. An Electronic Pearl Harbor? Not Likely
  3. A Hacker Tried to Poison a Florida City’s Water Supply, Officials Say: The attacker upped sodium hydroxide levels in the Oldsmar, Florida, water supply to extremely dangerous levels.
  4. US fuel pipeline hackers ‘didn’t mean to create problems’
  5. ‘Zero-Click’ Spyware Emerges as a Menacing Mobile Threat
  6. Is this the World Wide Web 2.0? Chicago scientists build ‘unhackable’ quantum internet in their university basement closet

Read, Review, Watch and Listen to all listed materials by the due date listed within the course LMS site.

Click HERE to report any needed updates, e.g., broken links.

 

definition

License

Icon for the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License

Computers and Criminal Justice Copyright © 2021 by Eric R. Ramirez-Thompson, PhD is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License, except where otherwise noted.

Share This Book