National and International Perspectives and Response to Existing and Emerging Trends

Module 15 examines topics such as terrorism and warfare in cyberspace, as well as national and international perspectives and responses to these cyber activities. The purpose of the module is to discuss these topics and consider what response the criminal justice system and other governmental agencies should adopt to deal with future issues in cybercrime and cyberterrorism.

Learning Objectives

After completing this module, you should be able to:

  • Identify the future trends and issues the criminal justice system will have to contend with regarding cybercrime
  • Identify with future trends and issues the criminal justice system will have to content with regarding cyberterrorism
  • Discuss emerging cyberthreat or digital threat trends
  • Describe the impact that cyber crimes and cyberterrorism are likely to have in the future
  • Assess the criminal justice system and other governmental agencies response to issues in cybercrime and cyberterrorism

Summary

Terrorism and warfare in cyberspace represent significant challenges in the modern era, where technology plays a central role in various aspects of daily life and national security. Cyber threats can manifest in different forms, including cyberterrorism, state-sponsored cyber-attacks, and cyber warfare. Here, we’ll discuss these concepts and explore national and international perspectives and responses to cyber activities.

Cyberterrorism involves the use of technology to conduct attacks that cause disruption, fear, and harm for ideological, political, or religious purposes. Critical infrastructure such as power grids, financial systems, and communication networks are common targets. Cyberterrorists may also engage in propaganda, recruitment, and psychological operations using online platforms.

Nations develop cybersecurity strategies to protect critical infrastructure. Legislation is enacted to define and combat cyberterrorism, often involving intelligence agencies and law enforcement. Countries collaborate on intelligence sharing and joint efforts to counter cyberterrorism. International agreements may be established to define norms and rules for cyberspace behavior.

State-sponsored cyber-attacks involve the use of cyber capabilities by one nation-state to target another for political, economic, or military purposes. Military systems, government agencies, defense contractors, and critical infrastructure may be targeted. Nations invest in cyber capabilities for defense and deterrence. Develop offensive capabilities as a means of strategic advantage. Escalation concerns arise as cyber-attacks may blur the line between traditional warfare and cyber warfare. Diplomacy and international law play a crucial role in managing state-sponsored cyber threats.

Cyber warfare involves the use of digital attacks to disrupt or destroy information systems with the aim of gaining a strategic advantage in a conflict. Nations establish cyber commands and doctrines to integrate cyber capabilities into military strategies. The absence of clear rules of engagement in cyberspace poses challenges. Efforts are made to establish international norms through agreements and treaties.

Our national response includes, but is not limited to, the development of robust cybersecurity frameworks and strategies. Investment in research and development of advanced technologies. Legislative measures to criminalize cyber-attacks.

Internationally, the lack of a unified effort produces challenges in and of itself. However, the formation of international alliances and partnerships for collective defense. In addition, the development of norms and rules of behavior in cyberspace. Moreover, the establishment of response mechanisms and mutual assistance in case of cyber incidents.

Terrorism and warfare in cyberspace demand a multi-faceted approach that combines technological advancements, legal frameworks, international cooperation, and diplomatic efforts to mitigate threats and ensure the security and stability of the global digital landscape. The evolving nature of cyber threats requires continuous adaptation and collaboration among nations to effectively address these challenges.

Key Terms/Concepts

Cyberstrategy
Deepfake
Infowarfare

Read, Review, Watch and Listen

  1. Read pages 4-6 of Defining Cyberterrorism: Capturing a Broad Range of Activities in Cyberspace (CTC, Aug. 2012, Vol. 5, 8)
  2. Read CYBER WAR Israel warns ‘largest EVER cyberattack’ hit country this week and spies say Iran is to blame (The U.S. Sun, Jaupi, J., March 2022)
  3. Read What could cyberterrorism look like? And is there such a thing?  (Sofia Escobar, Jan. 2019)
  4. Review Justin Sherman’s Cord-cutting, Russian style: Could the Kremlin sever global internet cables? (New Atlanticist, January 2022)
  5. Review Hackers drop deepfake of Zelenskyy ordering troops to surrender on Ukrainian news site (Daily Dot, Thalen, M., March 2022)
  6. Review Teen hacker claims ability to control 25 Teslas worldwide: Hacker took control of Teslas in 13 countries () [Automotive News Europe, January, 2022]
  7. Review Cyber Terrorism Is a Growing Threat & Governments Must Take Action  (DARKReading, Sigal, L., Feb. 2022)
  8. Review ‘The Godfather of A.I.’ Leaves Google and Warns of Danger Ahead (DNYUZ, May 2023)
  9. Watch Confronting Realities: A Vision for Cybersecurity Resilience  (U.S. DHS, June, 2021)
  10. Listen U.S. Cyberwarfare: Its Powerful Tools, Its Unseen Tactics  (NPR, Dec. 2016)

Activity 14 – Cyberterrorism: Fact or Fiction? (Last One!)

Cyberterrorism refers to the use of technology and computer networks to carry out terrorist activities. It involves the intentional use of computers, networks, and other digital devices to cause harm, disrupt or damage critical infrastructure, or intimidate individuals or governments for political or ideological purposes. Cyberterrorists may use various techniques such as hacking, spreading malware or viruses, stealing sensitive information, and launching denial-of-service attacks to cause widespread disruption, panic, or fear. The goal of cyberterrorism is to create chaos, cause harm, or achieve political or ideological goals by using technology as a weapon. It is considered a serious threat to national security and public safety, and requires a coordinated response from governments, law enforcement agencies, and cybersecurity experts.

Terrorists’ Use of the Internet and Cyber Terrorism: Problems, Perspectives, and Prescription respectively, provide us with an opportunity to consider the potential use of electronic devices to carry out terrorist activities. Despite compelling evidence that we have become increasing reliant on interconnected systems, there is debate whether the idea of cyber-terrorism is merely theoretical.

Purpose

The purpose of this activity is to produce thinking about the emerging threat of cyber terrorism and the role of public and private entities/agencies to institute protective measure and mechanisms.

Instructions

  1. Listen to The FBI’s Cyber Division Assistant Director Shawn Henry discusses the current trends and key aspects of cyber terrorism and cyber crime (https://www.fbi.gov/audio-repository/news-podcasts-inside-cyber-terrorism-and-cyber-crimes.mp3/view)
  2. View both videos (What is Cyber Terrorism? & Web Jihad) located below
  3. Read The Washington Post article Foreign hackers targeted U.S. Water plan in apparent malicious cyber attack, experts say
  4. Read Brussels International Center’s (BIS) New Terrorism and the Use of Electronic Jihad (March, 2021) [see attached file]
  5. Review the most recent incidents reported by the Center for Strategic & International Studies (CSIS)

 

Answer the following questions:

  • Identify some of the most suitable targets and describe the potential effect on the United States’ national security.
  • To what extent should the federal government facilitate protections for those identified targets? Explain.
  • To what extent should private industry facilitate protections for those identified targets? Explain.
  • Based on what you read, watched, and listened to for this assignment, do you believe that we are over-reacting to the threat of cyber terrorism? Explain and include examples.

Due by the stated date within the course LMS system.

 

What should I accomplish this week?

Check items off as you complete them!

□ Read, Review, Watch, and Listen (Module 15) – National and International Perspectives and Response to Existing and Emerging Trends

□ Complete Module 15 Quiz [Last one!]

□ Complete Activity 10 [Last one!]

□ Complete Exam 4 (Modules 13-15) by Friday, December 15 @ 11:59PM [see course BB site]

□ Explore Module 15 resources

Unless otherwise stated, everything listed on this checklist is due by the Sunday of the current week

Contact Dr. Ramirez-Thompson (thompson@cod.edu or via Remind) with any course-related questions.

 

definition

License

Icon for the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License

Computers and Criminal Justice Copyright © 2021 by Eric R. Ramirez-Thompson, PhD is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License, except where otherwise noted.

Share This Book