Cyber Terrorism

In: Business and Management

Submitted By wesco99
Words 4562
Pages 19

Section Page
Research Methodology----------------------------------------5
Research Results-----------------------------------------------6
Critical Analysis------------------------------------------------9

Abstract FBI cyber security division computers are hacked into at the same time that known hackers capable of performing this have their computers hacked into and are blown up when they hit certain keys on their computer keyboards.
Traffic lights and the transportation systems are then hacked into and total gridlock and chaos ensure. Wall Street is then affected and cyber money is thought to be dwindling away. This is known as a Fire Sale which has 3 steps. In the first step transportation is shut down then finance and finally, in the third step, utilities are affected. As expected, the media broadcast the government’s next move to everyone including the terrorists. As it turns out, the leader of the terrorists is a former DOD software programmer that had warned the government after 9/11 that our networks were vulnerable and that this kind of thing would happen, but he was laughed to scorn.
This scenario has a happy ending thanks to detective John McLain of Die Hard fame but could very well happen and end up with a not so nice outcome in real life.

The situation described above is from a popular movie but mirrors real life all too…...

Similar Documents


...Week 5 Case Analysis SEC/460 December 4, 2011 Terrorism either international or domestic is an act to gain attention for a cause and to get a point across at the expense of innocent people. The Federal Bureau of Investigation (2011) proclaims that “Throughout its more than 100-year history, the Federal Bureau of Investigation (FBI) has protected the American people from threats to our way of life. As some of our greatest threats—gangsters, public corruption, hate crimes, cyber attacks, white-collar fraud, and terrorism—have evolved, the FBI has changed to meet them head-on” (FBI, 2011, p. 1). Terrorism of the past has occurred in third world countries and not until recently have the terrorist come home to roost right here in America. Terrorism has become an international and domestic problem that has taken the lives of innocent people, destroyed property, and assets and an alarming rate. The media is a tool the terrorist use to publicize, their intentions, motivations, and philosophy whether it be religious, political, or ideological. This assignment requires the assessment and case analysis of a domestic or international terrorist event. The event for the purposes of this paper is a bomb explosion outside the courthouse in the city of New Delhi, India. The Associated Press (2011) reported the event as “A bomb apparently hidden in a briefcase exploded Wednesday as people lined up outside a top court in New Delhi, killing 10 people and wounding scores more in......

Words: 1161 - Pages: 5


...Law 10 – May – 2010 Terrorism Is No Longer A Threat To The U.S. Since the 9/11 terrorist attacks, many experts claimed that it only proves the vulnerability of the United States to big and devastating terrorists attacks. This means that even the United States is considered as the most powerful country in the world not only in terms of economic sustainability but also in military and intelligence capabilities, terrorists still can able to do terrorism acts to the country (Scheppler, 2005). Despite of this factor, it leads to the conclusion during those times that terrorism becomes a big threat to the peace and order, and security of the people of the United States. Generally, the even wanted to show that terrorism is a big threat that needs to be addressed by every country in the world. Today, due to the different efforts and actions made by the United States government since the 9/11 terrorist attacks, it was been claimed that terrorism is no longer a threat for the country. The different laws, programs, and the way the laws were implemented was claimed an effective effort to proactively avoid and eliminate the risk to once again attacked by any terrorists groups. This study will discussed and give points about the different efforts made the United States government in order to eliminate any threat of terrorists attacks in the country. Different points will be discussed and how it contributes to the conclusion that terrorism is no longer a threat to the country. ...

Words: 1753 - Pages: 8


...To whom it may concern, Throughout history, the world has witnessed acts of terrorism solely for the purpose to bring change upon society or government. These acts of violence, which are typically against people or property, can attribute to the death of many innocent civilians. Terrorism is a term that has various applications due to the fact that it all comes down to perspective. One countries definition of terrorism may be vastly different than another countries, which has provoked debate between nations about what terrorism truly is. In order to threaten others, terrorists commonly utilize methods such as cyber attacks, explosions, and nuclear threats to create fear amongst a group of people. It is vital to be careful with what is done on the Internet because the repercussion for not utilizing the Internet carefully paves the way to cyber dangers. Additionally, explosive devices are typically used due to the fact that the information on how to create an explosive is very easy to find. Furthermore, nuclear threats have slowly diminished throughout the years, but nations are still at risk because there is always a possibility that a terrorist can obtain a nuclear weapon. On September 25, 1972, Palestinian terrorists hopped the fence with weapons in track bags. Also, they stole a key, which would allow them to access the apartments used by the Israeli teams. They ended up kidnapping nine Israelis to hold hostage, and later on the Palestinians announced that Israel must......

Words: 334 - Pages: 2

Cyber Terrorism

...18 April 2014 Cyber Terrorism in the Age of Modern Technology In June of 1983 a movie produced by MGM called, “WarGames” (1-1983) set off one of the most intriguing films based in what was considered the beginning of the age of home based computers. WarGames despite the obvious age of the technology, gives us an inside look into its paranoid Cold War opening tensions to the staggering moral climax. Directed by John Badham, this cyber-espionage thriller might also be considered a blueprint in cyber terrorism today. In 1995 some 12 years later another movie directed by John Badham called, “The Net” (2-1995) would give us another look into the emerging age of cyber terrorism. A computer programmer stumbles across a disk containing confidential information, then has her not so secured computer hacked into by a company owned by Gregg Microsystems. In the turn of events to follow, she has all of her personal information, history and financial records deleted, then to her surprise, later finds out that her identity is replaced to reflect that she is known as a criminal. Technology in the next 30 years will become more advanced and with it comes a plague of security threats the world has never seen before. The nostalgia of 5½ inch Floppy Discs, Commodore 64s, Apple II and Atari 800 computers being connected to by way of voice synthesizers, 300 baud acoustic couplers, mass prefix dialers, will be everything needed for anyone to start their own cyber terrorism business. The...

Words: 1564 - Pages: 7

It and Terrorism

... |WRO 0278759 |09819033996 | |VINIT D. PATIL |WRO 0313142 |09819689616 | BATCH TIMING: 05.00 PM TO 09.00 PM BATCH COMMENCEMENT DATE: 6TH JULY 2009 CENTRE: RVG HOSTEL, ANDHERI (W) INDEX |Sr. No. |PARTICULARS |PAGE NO. | |1. |Internet And Terrorism |5 | |2. |Modern Terrorism And Internet |7 | |3. |Issues of E – Terrorism in India |8 | |4. |The Mumbai Attacks |10 | |5. |Terrorist Codes |12 | |6. |Terrorist Groups |14 | |7. |Detections by American Agencies ...

Words: 11580 - Pages: 47

Cyber Terrorism

...12/31/13 Cyber Terroism Cyber terrorism is a combination of two terms Cyber and terrorism. The word "Cyber" is derived from "cybernetic", a word from Greek "kybernetes", meaning "To steer" and the term "terrorism" comes from French terrorisme, from Latin word 'terror', "great fear", "dread", related to the Latin verb terrere, "to frighten". Cyber terrorism denotes unlawful attacks and threats of attack against computers, networks and information stored therein to intimidate or coerce a government or its people for propagating hidden political or unlawful social and religious agendas. These attacks result in violence against persons or property or cause public unrest. Few examples could be explosions, plane crashes and severe losses. Terrorists are known to use internet to prepare the schemes, raise funds and spread cyber terrorism. For instance, Razmi Yousef who was a key person behind World Trade Centre attack had details schemes to destroy United States airliners encrypted files in his laptop computer. We know that Cyber terrorism is the crime that has emerged in recent times, to use the medium of Internet to terrorize the minds of citizens. Admirably, the Laws through the implementation of the Information technology Act, 2000, is one of the efficient steps taken towards the creation of punishment of these kinds of crimes. There is need of innovative laws and global standards on preventive action. The Indian Information Technology Amendment Act 2008 lays down Section......

Words: 4466 - Pages: 18

Hacktivism, Freedom of Speech or Cyber Terrorism

...Hacktivism, Freedom of Speech or Cyber Terrorism? Josh T. Diehl ITT-Tech Institute Abstract I will be doing my research paper on Hacktivism and looking into the subsector that is known as “Anonymous”. Hacktivism in itself is the use of computers and computer networks to promote political ends. To see this for what it truly can be, you must look at it with the understanding that it can be carried out under the same premise that proper (and skillful) use of technology can produce results similar to these of conventional acts of protest, activism, and civil disobedience. I plan on exploring whether it is freedom of speech or cyber terrorism, keeping an open mind when conducting my research will be the key to the integrity of this paper. I plan on researching online articles and post from credible sources. I will make set times while I am not at work to research and write this. Body First we need to look at what exactly is hacktivism and who practices it. Hacktivism in itself is defined as “The use of computers and computer networks to promote political ends, chiefly free speech, human rights, and information ethics. It is carried out under the premise that proper use of technology can produce results similar to those of conventional acts of protest, activism, and civil disobedience.” Certain groups such as Anonymous use this form (among others) as their way to speak out against what they see as injustice. We need to look closely, past the top layer of information, to...

Words: 2499 - Pages: 10

Cyber Terrorism

... Name: Institution: Course: Date: Cyber Terrorism Cyber terrorism vs. Physical terrorism In cases where there are the occurrences of both physical terrorism and cyber terrorism, the people behind it carry out their attacks outside the bounds of conventional warfare. In other words, the terrorists carry out attacks in areas that are not ordinarily considered as battlefields as well as on people not normally considered as military personnel. For example, the attacks may entail an individual dressed as a civilian blowing himself up in a packed place or people dressed like civilians hijacking commercial airplanes and flying them to civilian targets like the World Trade Centre. Physical terrorism differs from cyber terrorism in the sense that the later primarily entails carrying out attacks against information found in computers while the former involves an attack against civilians. Those individuals, who dress up as civilians and blow up themselves in a crowded area like a bus constitutes physical terrorism since the attacks aims at destroying human life. Most likely, cyber terrorists use computers or other similar devices to carry out attacks on information found on computers. Cyber terrorism will have more impact than physical terrorism. The main aim of physical terrorism is to cause loss of life whereas cyber terrorism may entail hacking into a country’s critical infrastructure with the sole purpose of causing great harm such as significant damage on the economy or......

Words: 598 - Pages: 3

Cjs 200 Week 4 Checkpoint Terrorism and Cyber Crime

...CJS 200 week 4 checkpoint Terrorism and Cyber Crime Get Tutorial by Clicking on the link below or Copy Paste Link in Your Browser For More Courses and Exams use this form ( ) Feel Free to Search your Class through Our Product Categories or From Our Search Bar ( ) Terrorism and Cyber Crime The Fourth Amendment is the right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized. The USA Patriot Act makes it easier for law enforcement agents to conduct searches mainly because of the 9/11 attack. The USA PATRIOT Act also provides federal agents with “roving surveillance authority,” allowing them to continue monitoring a terrorist suspect on the strength of an original warrant even if the suspect moves into another jurisdiction. TO Download Complete Tutorial Hit Purchase Button CJS 200 week 4 checkpoint Terrorism and Cyber Crime Get Tutorial by Clicking on the link below or Copy Paste Link in Your Browser For More Courses and Exams use this form (......

Words: 3840 - Pages: 16

Cyber Security: Cyber Terrorism

...Introduction Cyber security refers to the practices and processes that are used in technologies such as networks, computers, information and programs from damages by unwarranted entities (Ahmad, Yunos & Sahib, 2012). There are different attacks towards technology which may distort information or be used to create tension in an organization. Information stored in computers has some level of privacy and this depends on the level of sensitivity that such information may have towards that organization. Business strategies, political discussions and government documents are some of the documents that require a higher degree of privacy. However, there are individuals who cause deliberate attacks on the information systems of organizations and governments in order to unlawfully access information or distort the meaning of such data. The intention of cyber attacks has led to the classification of these attacks into particular classes. For example, we have cyber bullying and cyber terrorism. Under cyber bullying, the attackers use technology to abuse and intimidate their targets. Cyber bullying has been common through the presence of the social media where an individual will use pseudo-accounts to publish half truths about others with a bid to embarrass them. On the other hand, cyber terrorism involves the use of technology to access vital government sites in order to cause harm and fear in the society through terrorism activities. Brunst (2010) indicates that cyber terrorist......

Words: 1810 - Pages: 8


... CYBER WARFARE Student’s Name Institution of Affiliation CYBER WARFARE Cyber warfare is also commonly referred to as the cyber attack. It involves both the attacks and the counter cyber warfare. By definition, it is an intentional breaching of a person’s or community computer system with an intended to fraud money or steal knowledge from the system. Therefore, it involves manipulation of the computer systems, disabling or to wipe out the aggregate information contained in the system of equipment. It has thus been a stern challenge in the economic and national and the world security. As thus, it has become a primary concern for all business people protecting their ideas not to be leaked, in the military due to the protection of national security and also by the government which has to keep it a secret of all what is happening within it. The issue of the cyber attacks has not been one event but something that has occurred over time as a result of inventions and innovations by the governments and security agencies. It was triggered by the need to safeguard one's interests and at the same time keep secrets that if they leak the competitors or the enemies can use them against you. One of the periods that can be credited to giving birth to the period of developments that led to cyber attacks is 1918 all the way to 1939 whereby there was increased military revolution. One of these......

Words: 1263 - Pages: 6

Cyber Terrorism: the American Response

...Cyber Terrorism: The American Response Mutale Chisanga School of Computer Science 03-60-305 Professor Kristina Verner March 6, 2016 Cyber terrorism: The American Response United States (U.S.) critical infrastructure faces a growing cyber terrorism threats due to advancements in the availability and sophistication of malicious software tools and the fact that new technologies raise new security issues that cannot always be addressed prior to adoption. The increasing automation of U.S. critical infrastructures provides more cyber access points for adversaries to exploit. Industrial control systems, which operate the physical processes of the U.S. pipelines, railroads, and other critical infrastructures, are at elevated risk of cyber exploitation. The growth of malicious techniques that could degrade, disrupt, or destroy critical infrastructure is a huge concern for the U.S. government. It is also likely the cyber threats will surpass the terrorism threat to U.S. in the years to come (MLI, 2012). Even though only advanced threat actors are currently capable of employing these high level malicious techniques, these capabilities will eventually be within reach of all threat actors. Discussion The potential economic consequences of cyber terrorism attacks are severe. The severity of cyber terrorism are not felt equally across the board. A small company may not be able to survive even one significant cyber-attack. On the other hand, large companies may take a long time...

Words: 1741 - Pages: 7


...Terrorism Terrorism: A general definition Terrorism is the deliberate and organized use of violence against the state. The single important objective behind the act of terrorism is to create fear and spread insecurity among citizens of the state. By striking the unarmed and hapless citizens, terrorists aim to disrupt governance. Such attacks show the government in poor light. i.e. as one that cannot guarantee security of life and property, one of the most basic function of the state. In Angels & Demons, Dan Brown writes: “terrorism is not an expression of rage. Terrorism is the political weapon. Remove a government’s façade of infallibility, and you remove its people’s faith”. Types of Terrorism There are three types of terrorism. They are (a) State Sponsored Terrorism. (b) State Terrorism. (c) Organizational Terrorism. (a) State Sponsored Terrorism is always directed against another state, often by proxy, with the aim to destabilize it. A good example to drive home this idea is Pakistan sponsored terrorism against India. (b) State Terrorism is directed against a State’s own citizen. The reason could be numerous, chief among is the tussle between majority and minority group (both demographic and religious). A case in point is the 1994 Rawanda Genocide where majority ethnic Hutu tribe militia butchered nearly 8 lakhs Tutsis in 100 days of carnage. (c) Organizational Terrorism is used by groups to realize divergent aims including political, social, and......

Words: 570 - Pages: 3


...To understand Terrorism there needs to be a set definition of the word Terrorism within this paper. Terrorism is defined by the United States Law as “premeditated, politically motivated violence perpetrated against noncombatant targets by subnational groups or clandestine agents” (Zalman, Amy PH.D.). The word Terrorist can be defined several different ways. One definition of Terrorist is “a person, usually a member of a group, who uses or advocated terrorism” while another is” a person who terrorizes or frightens others” (Zalman, Amy PH.D.). These definitions make the common citizen think that anyone can be a Terrorist and be involved in terrorism. The history of terrorism can be traced all of the way back to the 1950s and probably back even further. In the 1950s formed in numerous parts of the world and fought the governments of other countries. An example of this is the forming of the Irish Republican Army (IRA) in Ireland to fight, as the Irish saw it, the evil empire of Great Britain. In the 1960’s Palestine entered Israel and blew up the Israeli National Carrier water canal. In the 1960s International terrorism begins by the Palestine hijacking of an El Al Flight in 1968. This opened up the door for other terrorists groups to commit hijackings and terrorists were considered to be willing to commit symbolic acts of violence by certain organized groups with either political and or religious grievances. In the 1970s Palestine attacked a school bus and...

Words: 1586 - Pages: 7


...TERRORISM Prof Nerove SEC 300 May 28, 2012 On the next couple of pages, I will be discussing terrorism as a threat to people and infrastructure. My discussion will include how individuals in private and public security can attribute to the prevention of terrorism within the U.S. terrorism is a threat that does not recognize borders and may affect states and peoples irrespective of their geographical location. Individuals and groups who believe that they can advance their political aims by using terror pose a serious threat to the democratic values of our societies and to the rights and freedoms of our citizens, especially by indiscriminately targeting innocent people. Acts of terrorism are criminal and unjustifiable, and must be treated as such under all circumstances (Hoffman, 1988). Terrorism as a threat to people and infrastructure is considered to be very critical. Much of the United States critical infrastructure is potentially vulnerable to cyber attack. Industrial control computer systems involved in this infrastructure are specific points of vulnerability, as cyber security for these systems has not been perceived as a high priority. Industries potent ally affected by a cyber attack on industrial control systems include the electrical, telephone, water, chemical and energy sectors (Naumann, 2008). Terrorism is considered to be one of the oldest forms of human conflict. Although, the FBI and the U.S customs service have made terrorism their top priority,......

Words: 662 - Pages: 3