Cyber Crime and Cyber Terrorism



Download 5,67 Mb.
Pdf ko'rish
bet170/283
Sana19.05.2022
Hajmi5,67 Mb.
#604880
1   ...   166   167   168   169   170   171   172   173   ...   283
Bog'liq
Cyber crime and cyber terrorism investigators handbook by Babak

164
CHAPTER 12
Cybercrime classification and characteristics
Wall, D., 2007. Hunting Shooting, and Phishing: New Cybercrime Challenges for 
Cybercanadians in The 21st Century. The ECCLES Centre for American Studies. 
http://
bl.uk/ecclescentre,2009
.
Wall, D.S., 2005. The internet as a conduit for criminal activity. In: Pattavina, A. (Ed.), 
Information Technology and the Criminal Justice System. Sage Publications, USA, ISBN 
0-7619-3019-1.
Wilson, P., Kunz, M., 2004. Computer crime and computer fraud. Report to Montegmery 
County Criminal Justice Coordination Commission, 
http://www.mongomerycountymd.
gov
(accessed September 2007).
Yar, M., 2006. Cybercrime and Society. Sage Publication Ltd, London.


CHAPTER
165
13
Cyber terrorism: Case 
studies
Daniel Cohen
INTRODUCTION
If we examine one of the key concepts in cyberspace—namely, dealing with terrorist 
threats—we find the rationale underlying the concept (which emerged, among oth-
ers, after the formative events at the beginning of the twenty-first century, such as 
the Y2K bug and the September 11, 2001 terrorist attacks) in the world appears to 
be at the peak of a process belonging to the post-modern and post-technology era, 
an era with no defensible borders, in which countries are vulnerable to invasion via 
information, ideas, people, and materials—in short, an open world. In this world, the 
threat of terrorism takes a new form: a terrorist in a remote, faraway basement hav-
ing the potential ability to cause damage completely changing the balance of power 
by penetrating important security or economic systems in each and every country in 
the world and accessing sensitive information, or even by causing the destruction of 
vital systems. No one disputes non-state actors, like terrorist organizations are using 
cyberspace as a field enabling small individual players to have influence dispropor-
tionate to their size. This asymmetry creates various risks that did not attract attention 
or provoke action among the major powers in the past. The question is whether the 
activity of these players in cyberspace constitutes a threat with the potential to cause 
major and widespread damage, with the ability to operate cyber weapons with stra-
tegic significance—weapons that can inflict large scale or lasting damage of the sort 
causing critical systems to collapse and “brings countries to their knees.” And if so, 
why such damage has not yet occurred?
Can the reality of September 11, 2001—when a terrorist organization planned an 
attack for two years, including by taking pilot training courses, eventually using sim-
ple box-cutters to carry out a massive terrorist attack—repeat itself in cyberspace? 
Is a scenario in which a terrorist organization sends a group of terrorists as students 
to the relevant courses in computer science, arms them with technological means ac-
cessible to everyone, and uses them and the capabilities they have acquired to carry 
out a massive terrorist attack in cyberspace realistic or science fiction? In order to 
answer this question, we must examine the few case studies of cyber-attacks by terror 
organization and then consider what capabilities a non-state actor can acquire, and 
whether these capabilities are liable to constitute a real threat to national security.



Download 5,67 Mb.

Do'stlaringiz bilan baham:
1   ...   166   167   168   169   170   171   172   173   ...   283




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish