National and International Perspectives and Response to Existing and Emerging Trends

Module 15 examines topics such as terrorism and warfare in cyberspace, as well as national and international perspectives and responses to these cyber activities. The purpose of the module is to discuss these topics and consider what response the criminal justice system and other governmental agencies should adopt to deal with future issues in cybercrime and cyberterrorism.


Learning Objectives

After completing this module, you should be able to:

  • identify the future trends and issues the criminal justice system will have to contend with regarding cybercrime
  • identify with future trends and issues the criminal justice system will have to content with regarding cyberterrorism
  • discuss emerging cyberthreat or digital threat trends
  • describe the impact that cyber crimes and cyberterrorism are likely to have in the future
  • assess the criminal justice system and other governmental agencies response to issues in cybercrime and cyberterrorism

Summary

Terrorism and warfare in cyberspace represent significant challenges in the modern era, where technology plays a central role in various aspects of daily life and national security. Cyber threats can manifest in different forms, including cyberterrorism, state-sponsored cyber-attacks, and cyber warfare. Here, we’ll discuss these concepts and explore national and international perspectives and responses to cyber activities.

Cyberterrorism involves the use of technology to conduct attacks that cause disruption, fear, and harm for ideological, political, or religious purposes. Critical infrastructure such as power grids, financial systems, and communication networks are common targets. Cyberterrorists may also engage in propaganda, recruitment, and psychological operations using online platforms.

Nations develop cybersecurity strategies to protect critical infrastructure. Legislation is enacted to define and combat cyberterrorism, often involving intelligence agencies and law enforcement. Countries collaborate on intelligence sharing and joint efforts to counter cyberterrorism. International agreements may be established to define norms and rules for cyberspace behavior.

State-sponsored cyber-attacks involve the use of cyber capabilities by one nation-state to target another for political, economic, or military purposes. Military systems, government agencies, defense contractors, and critical infrastructure may be targeted. Nations invest in cyber capabilities for defense and deterrence. Develop offensive capabilities as a means of strategic advantage. Escalation concerns arise as cyber-attacks may blur the line between traditional warfare and cyber warfare. Diplomacy and international law play a crucial role in managing state-sponsored cyber threats.

Cyber warfare involves the use of digital attacks to disrupt or destroy information systems with the aim of gaining a strategic advantage in a conflict. Nations establish cyber commands and doctrines to integrate cyber capabilities into military strategies. The absence of clear rules of engagement in cyberspace poses challenges. Efforts are made to establish international norms through agreements and treaties.

Our national response includes, but is not limited to, the development of robust cybersecurity frameworks and strategies. Investment in research and development of advanced technologies. Legislative measures to criminalize cyber-attacks.

Internationally, the lack of a unified effort produces challenges in and of itself. However, the formation of international alliances and partnerships for collective defense. In addition, the development of norms and rules of behavior in cyberspace. Moreover, the establishment of response mechanisms and mutual assistance in case of cyber incidents.

Terrorism and warfare in cyberspace demand a multi-faceted approach that combines technological advancements, legal frameworks, international cooperation, and diplomatic efforts to mitigate threats and ensure the security and stability of the global digital landscape. The evolving nature of cyber threats requires continuous adaptation and collaboration among nations to effectively address these challenges.

Key Takeaways

Cyber threats take various forms such as cyberterrorism, state-sponsored cyber-attacks, and cyber warfare, impacting critical national and international interests and infrastructure. This involves using technology to conduct attacks for ideological, political, or religious reasons, targeting critical infrastructure like power grids, financial systems, and communication networks, alongside propagandist activities through online platforms.

Cyber threats are activities conducted by one nation against another to influence political, economic, or military situations, often targeting military systems, government agencies, and critical infrastructure, with significant investments in cyber capabilities for both defense and offensive strategic advantages.

Digital attacks are used to disrupt or destroy information systems to gain strategic advantages in conflicts, including establishing cyber commands and integrating cyber tactics into military strategies despite unclear rules of engagement in cyberspace.

Development of comprehensive cybersecurity frameworks and strategies, enactment of legislation to criminalize cyber activities, and investments in advanced technology research and development.

The formation of international alliances and partnerships is crucial, though hampered by a lack of unified efforts.

Development of international norms, establishment of response mechanisms, and mutual assistance in cyber incidents are pivotal.

Addressing cyber threats demands a combination of technological advancements, robust legal frameworks, international cooperation, and diplomatic efforts, requiring continuous adaptation and collaboration among nations to mitigate threats and secure the global digital landscape.

Key Terms/Concepts

Cyber Ccommands and Doctrines
Cyberstrategy
Cyberterrorism
Deepfake
Infowarfare
International cooperation and agreements
Legislative Measures
Propaganda and Psychological Operations
State-sponsored cyber-attacks

Read, Review, Watch and Listen

  1. Read pages 4-6 of Defining Cyberterrorism: Capturing a Broad Range of Activities in Cyberspace (CTC, Aug. 2012, Vol. 5, 8)
  2. Read CYBER WAR Israel warns ‘largest EVER cyberattack’ hit country this week and spies say Iran is to blame (The U.S. Sun, Jaupi, J., March 2022)
  3. Read What could cyberterrorism look like? And is there such a thing?  (Sofia Escobar, Jan. 2019)
  4. Review Justin Sherman’s Cord-cutting, Russian style: Could the Kremlin sever global internet cables? (New Atlanticist, January 2022)
  5. Review Hackers drop deepfake of Zelenskyy ordering troops to surrender on Ukrainian news site (Daily Dot, Thalen, M., March 2022)
  6. Review Teen hacker claims ability to control 25 Teslas worldwide: Hacker took control of Teslas in 13 countries (Bloomberg, Jan. 2022) [Automotive News Europe, January, 2022]
  7. Review Cyber Terrorism Is a Growing Threat & Governments Must Take Action  (DARKReading, Sigal, L., Feb. 2022)
  8. Review ‘The Godfather of A.I.’ Leaves Google and Warns of Danger Ahead (DNYUZ, May 2023)
  9. Watch Confronting Realities: A Vision for Cybersecurity Resilience  (U.S. DHS, June, 2021)
  10. Listen U.S. Cyberwarfare: Its Powerful Tools, Its Unseen Tactics  (NPR, Dec. 2016)

Activity

Note: This is a copy of the module’s activity that students find within Blackboard. For that reason, refer to the Activities page to submit your work for review.

Cyberterrorism: Fact or Fiction?

Cyberterrorism refers to the use of technology and computer networks to carry out terrorist activities. It involves the intentional use of computers, networks, and other digital devices to cause harm, disrupt or damage critical infrastructure, or intimidate individuals or governments for political or ideological purposes. Cyberterrorists may use various techniques such as hacking, spreading malware or viruses, stealing sensitive information, and launching denial-of-service attacks to cause widespread disruption, panic, or fear. The goal of cyberterrorism is to create chaos, cause harm, or achieve political or ideological goals by using technology as a weapon. It is considered a serious threat to national security and public safety, and requires a coordinated response from governments, law enforcement agencies, and cybersecurity experts.

Terrorists’ Use of the Internet and Cyber Terrorism: Problems, Perspectives, and Prescription respectively, provide us with an opportunity to consider the potential use of electronic devices to carry out terrorist activities. Despite compelling evidence that we have become increasing reliant on interconnected systems, there is debate whether the idea of cyber-terrorism is merely theoretical.

Purpose

The purpose of this activity is to produce thinking about the emerging threat of cyber terrorism and the role of public and private entities/agencies to institute protective measure and mechanisms.

Instructions

  1. Listen to The FBI’s Cyber Division Assistant Director Shawn Henry discusses the current trends and key aspects of cyber terrorism and cyber crime
  2. View both videos (What is Cyber Terrorism? & Web Jihad) located below
  3. Read The Washington Post article Foreign hackers targeted U.S. Water plan in apparent malicious cyber attack, experts say
  4. Read Brussels International Center’s (BIS) New Terrorism and the Use of Electronic Jihad (March, 2021) [see attached file]
  5. Review the most recent incidents reported by the Center for Strategic & International Studies (CSIS)

 

Answer the following questions:

  • Identify some of the most suitable targets and describe the potential effect on the United States’ national security.
  • To what extent should the federal government facilitate protections for those identified targets? Explain.
  • To what extent should private industry facilitate protections for those identified targets? Explain.
  • Based on what you read, watched, and listened to for this assignment, do you believe that we are over-reacting to the threat of cyber terrorism? Explain and include examples.

Refer to the course learning management system (LMS); that is Blackboard (BB), for the correct due date. In addition, submit your work via BB for grading.

Discussion Questions

  • Considering the various forms of cyber activities that involve ideological, political, or religious motivations, how should international law define cyberterrorism to encompass all its dimensions without overlapping significantly with related concepts like cybercrime?
  • How effective are current national cybersecurity strategies and legislations in protecting critical infrastructure from cyberterrorism? Are there specific examples where these measures have successfully prevented significant cyberterrorist attacks?
  • With nations developing cyber capabilities for both defensive and offensive purposes, how do these capabilities influence global power dynamics?
  • Given the challenges of establishing unified international norms and treaties for cyberspace, what are the major obstacles to forming effective international alliances and partnerships in cybersecurity?
  • As cyber threats continually evolve, what steps should nations take to ensure their cybersecurity frameworks and strategies remain effective?

Supplemental Resources

  1. Does Cyber-Terrorism exist?
  2. Japan’s Cyberterrorism Crisis Threatens Us All
  3. An Electronic Pearl Harbor? Not Likely
  4. A Hacker Tried to Poison a Florida City’s Water Supply, Officials Say: The attacker upped sodium hydroxide levels in the Oldsmar, Florida, water supply to extremely dangerous levels.
  5. US fuel pipeline hackers ‘didn’t mean to create problems’
  6. ‘Zero-Click’ Spyware Emerges as a Menacing Mobile Threat
  7. Is this the World Wide Web 2.0? Chicago scientists build ‘unhackable’ quantum internet in their university basement closet

Read, Review, Watch and Listen to all listed materials by the due date listed within the course LMS site.

Click HERE to report any needed updates, e.g., broken links.

 

definition

License

Icon for the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License

Computers and Criminal Justice Copyright © 2021 by Eric R. Ramirez-Thompson, PhD is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License, except where otherwise noted.

Share This Book