Read the Beforeitsnews.com story here. Advertise at Before It's News here.
Profile image
By Dr. Bob Uda, Ph.D., CM, CHSP, ILO (Reporter)
Contributor profile | More stories
Story Views
Now:
Last hour:
Last 24 hours:
Total:

Cybercrime, Cyberterrorism, & Cyberwarfare are upon Us

% of readers think this story is Fact. Add your two cents.


We might just as well get used to it.  Now with us include cybercrime, cyberterrorism, and cyberwarfare, and they will be around for a long time.  With the advent of the computer, networks, and the Internet, regular crime has transitioned into cybercrime, ordinary terrorism now includes cyberterrorism, and conventional warfare now incorporates cyberwarefare (Uda, 2009).  All of the following sections of this piece are included in Uda’s (2009) book titled Cybercrime, cyberterrorism, and cyberwarfare: Crime, terror, and war without conventional weapons.

Cybercrime, Cyberterrorism, and Cyberwarfare in Perspective

Cybercrime is with us on a daily basis (24 hours a day and 7 days a week).  Furthermore, it will continue on as long as we use computers, networks, phones, videos, webcams, emails, and the Internet.  However, the most deadly one of the three is cyberwarfare.  Cyberwarfare is not being conducted against us by individual, civilian hackers or by terrorist organizations but is being conducted by nation states in an organized, methodical manner.

The United States must be prepared to conduct cyberwarfare.  Indeed, we must be ready to conduct offensive cyberwarfare instead of just defensive cyberwarfare.  Additionally, we must be prepared for massive cyber retaliation should our entire nation be massively attacked by China, Russia, Korea, Iran, or any other nation that would do us harm.  Massive Retaliation was a national strategy that ended with the close of the Cold War and the demise of the Soviet Union.  However, it should be revived for cyberwarfare, or we may see the demise of the United States.  We must not allow that outcome to happen.

Domestic Efforts to Combat Cyberterrorism

It is only a matter of time before cyberterrorists perpetrate an attack on a city or county government.  All manmade and natural disasters are local events with local units being the first to respond and the last to leave.  However, the state government must be the driving force behind the efforts of defining what needs to be done, establishing a coordinated statewide strategy, and performing a comprehensive threat assessment.  Sharing information to protect systems is an important foundation for ensuring governmental continuity.  Partnering is a key mechanism in creating a closer working relationship among, national, state, and local governments.  If these things are done, we would have a much more effective effort in combating cyberterrorism at the state and local governmental levels.

Cyberterrorist threats are on the rise.  The U.S. government is not keeping close surveillance on the cyberterrorism threat.  Consequently, in the current threat environment, the private sector remains the first line of defense for its own facilities.  Furthermore, since the 9/11 attacks, nationwide enterprises have increased their investments in security to meet the demands of the new threat environment.  Hence, rather than governments and the military carrying the protection load, the burden of watching and preparing for a cyber attack on U.S. CIs rests on the private sector.  Therefore, private industry has taken a proactive approach to combat cyberterrorism, which is a good thing.

International Efforts to Combat Cyberterrorism

The United States is making combined international efforts to combat cyberterrorism.  This approach is an important and sure way to beat cybercriminals and cyberterrorists.  Other countries of the world use cyber protection measures that the United States could adopt.  If the United States will do these things that we are not currently doing or are not doing well, we should do them to be more effective in fighting the Global War on Terrorism (GWOT).  I believe that some of these measures could be effective applied here in the United States.  If the United States will add these protective measures to our present repertoire of tools, we will be even more effective in combating cyberterrorism.

U.S. Policy to Prevent a Cyber Attack

The Electronic Communications Privacy Act does not curtail cyber attackers.  Generally, companies, government agencies, and academia are inadequately prepared.  We pay too little attention to security.  We devote too few resources to it.  Management needs to make security a high priority.  CEOs and boards of directors need to pay attention to security and make sure resources are devoted to it.

Under the principle of nullum crimen sine lege, the legal system cannot prosecute a perpetrator unless the law prohibits his/her behavior (no matter how harmful it may be).  Hence, the Philippine government did not prosecute the perpetrator of the “I LOVE YOU” virus because no law existed that prohibited the release of malicious code.

It is important that companies preserve their computer-stored data for the required duration of time.  Due to the ease with which perpetrators can manipulate computer data, the court could likely reject the data as evidence if a trained computer forensics specialist does not perform the search/analysis.  It is important that Internet service providers (ISPs) help law enforcement to conduct joint investigations.  The stakes in the cat and mouse game is getting higher.  Spam and cybercrime are really about the money.  There are people making a lot of money out there.  To curtail cybercrimes, there must be a unified effort between government and the private sector.

Effectiveness of U.S. Infrastructure Programs

Technology makes life easier and more efficient for all of us.  However, computer crime threatens our commercial and personal safety.  Computer forensics has become an indispensable tool for law enforcement.  In the digital world, as in the physical world, the goals of law enforcement must balance with the goals of maintaining personal liberty and privacy.  American criminal investigators have wrestled with these same issues for over 200 years.  Currently, we lack a national framework for curricula and training development with no gold standard for professional certification.

Cybercrime is a major international challenge.  We need a collective security approach to protect the global critical infrastructure (CI).  The Convention on Cybercrime, which became effective in July 2004, is the first and only international treaty to deal with breaches of law over the Internet or other information networks.  Policymakers and the public today see the threat of a terrorist attack on information technology (IT), or cyberterrorism, as being one of the greatest dangers to the United States.  Cyber security is a community issue.  By keeping our eyes open and applying effective techniques, organizations will prevent attacks and recover quickly after an attack.  However, we still are not where we must be to possess effective infrastructure programs in the United States.

Critical Infrastructure Protection Program

Terrorists seek to undermine confidence in our public and private institutions and in our ability to manage the consequences of their attacks.  In response, the federal government must work collaboratively and in partnership with state and local governments, with the private sector, and with local citizens.  To the extent that government and private industry are believed to be doing everything within reason to protect the public from harm, the public’s confidence in its institutions will remain intact despite such attacks.  We can have the best national strategy for homeland security that the most brilliant minds in Washington can devise, and yet we will fail in our endeavor if local communities do not meet the immediate challenges of a terrorist disaster (Juster, 2002).

Local governments represent the front lines of protection and the face of public services to the American people.  Their core competencies must include knowledge of their communities, residents, landscapes, and existing critical services for maintaining public health, safety, and order.  Communities look to local leadership to assure safety, economic opportunities, and quality of life (QOL).  Public confidence, therefore, starts locally and is dependent upon how well communities plan and protect their citizens, respond to emergencies, and establish order out of chaos (Anonymous, 2003).  To this end, the City of North Miami Beach Police Department, the private sector, and concerned citizens have begun an important partnership and commitment to action (Anonymous, n.d.).

Recommendations on Cyber Threats and Warfare

One thing is for sure:success in future conflicts will depend less on bombs and bullets and more on bits and bytes (Coleman, 2007).  In the end, the cyber threat is revolutionary, officials said, because it has no battle lines, the intelligence is intangible, and attacks come without warning leaving no time to prepare defenses.  Education and training of computer users, not enforcement, are the most effective defense measures, officials said (Rogin, 2007).

If our enemies conduct a cyber war against us, we must be prepared to defend ourselves and also be capable of taking the offensive.  The best defense is a good offense.  Little is known about the precise nature of Washington’s offensive capabilities.  State- or group-sponsored attacks against our information systems using computer viruses and other techniques should be considered an act of war.  Tightly coupling business and industry into the cyber war defense strategy is arguably the most critical component.  It represents the one area that the government has the worst track record, which must be improved.  As a war-fighting domain, cyberspace favors the offense.  The first battle of the next war will be fought and won in the cyberspace arena.

Strategy to Combat Cyberterrorism

There is no uniform consensus on a universal definition of the word cyberterrorism. We would be hard pressed to develop a definition that every nation in the United Nations (UN) would agree upon.  So, we move forward anyway.

Frank Cilluffo, an analyst at the Center for Strategic and International Studies in Washington, DC, testified to the Senate Government Affairs Committee in October 2001.  He said, “Bits, bytes, bugs, and gas will never replace bullets and bombs as the terrorist weapon of choice,” However, “while [Osama] bin Laden may have his finger on the trigger, his grandson may have his finger on the mouse” (Verton, 2002).  Tomorrow’s terrorist may be able to do more damage with a keyboard than with a bomb (Weimann, 2007).

Developing effective law enforcement or national security policies to deal with cyber threats is a national priority.  However, the private sector must undertake most of the responsibility for fixing weaknesses in key Internet assets.  We must understand that it is impossible to eliminate all vulnerabilities.  Finally, terrorism is not only a criminal activity – it is a military assault on the entire population, and it must be dealt with accordingly.

 

References

Anonymous (n.d.). City of North Miami Beach, Florida, Critical Infrastructure Protection Program. The official website of the City of North Miami Beach, Florida. Retrieved from http://northmiamibeach.govoffice.com/index.asp?Type=B_BASIC&SEC=%7BF04CACB1-1126-4FF5-85C3-81ACF84754F9%7D.

Anonymous (2003, February). The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets. Washington, DC: The White House.

Coleman, K. (2007, November). Department of Cyber Defense: An organization whose time has come! The Technolytics Institute, 7 pp.

Juster, K. I. (2002, February 13). Homeland security and critical infrastructure assurance: The importance of community action. Remarks of the Undersecretary of Commerce for Export Administration at the conference on Critical Infrastructures: Working Together in a New World, Austin, Texas. Retrieved from http://www.bis.doc.gov/news/2002/communityactionimportantnhomelandsecurity.htm.

Rogin, J. (2007, February 13). Cyber officials: Chinese hackers attack ‘anything and everything.’ FCW.com. Retrieved from http://www.fcw.com/online/news/97658-1.html?type=pf.

Uda, R. T. (2009). Cybercrime, cyberterrorism, and cyberwarfare: Crime, terror, and war without conventional weapons. Bloomington, IN: Xlibris Corporation.

Verton, D. (2002, January 7). Critical infrastructure systems face threat of cyberattacks. Computerworld, 36(2), p. 8. Retrieved from http://www.computerworld.com/printthis/2002/0,4814,67135,00.html.

Weimann, G. (2004, December). Cyberterrorism: How real is the threat? United States Institute of Peace Special Report No. 119. Retrieved from http://www.usip.org/pubs/specialreports/sr119.html.

###



Before It’s News® is a community of individuals who report on what’s going on around them, from all around the world.

Anyone can join.
Anyone can contribute.
Anyone can become informed about their world.

"United We Stand" Click Here To Create Your Personal Citizen Journalist Account Today, Be Sure To Invite Your Friends.

Please Help Support BeforeitsNews by trying our Natural Health Products below!


Order by Phone at 888-809-8385 or online at https://mitocopper.com M - F 9am to 5pm EST

Order by Phone at 866-388-7003 or online at https://www.herbanomic.com M - F 9am to 5pm EST

Order by Phone at 866-388-7003 or online at https://www.herbanomics.com M - F 9am to 5pm EST


Humic & Fulvic Trace Minerals Complex - Nature's most important supplement! Vivid Dreams again!

HNEX HydroNano EXtracellular Water - Improve immune system health and reduce inflammation.

Ultimate Clinical Potency Curcumin - Natural pain relief, reduce inflammation and so much more.

MitoCopper - Bioavailable Copper destroys pathogens and gives you more energy. (See Blood Video)

Oxy Powder - Natural Colon Cleanser!  Cleans out toxic buildup with oxygen!

Nascent Iodine - Promotes detoxification, mental focus and thyroid health.

Smart Meter Cover -  Reduces Smart Meter radiation by 96%! (See Video).

Report abuse

    Comments

    Your Comments
    Question   Razz  Sad   Evil  Exclaim  Smile  Redface  Biggrin  Surprised  Eek   Confused   Cool  LOL   Mad   Twisted  Rolleyes   Wink  Idea  Arrow  Neutral  Cry   Mr. Green

    Total 2 comments
    • Anonymous

      CYBERTERRORISM? Like the ISRAELI developed STUXNET virus that would have precipitated a NUCLEAR MELTDOWN if it had not been stopped. THAT is TERRORISM. When is Israel going to live by the standards it demands of others?
      Israel is the only country that doesn’t have to be multicultural yet the Jewish controlled American congress and big business demands it of America – meanwhile our country is quickly starting to look very third world. Its time to stop this now – AIPAC owns the American congress. I’m speaking as a non-muslim American here. America needs a third viable political party that is going to represent the rights of middle class Americans. AIPAC secures 3 billion dollars of American taxpayers money to fund Israel’s war of genocide against the Palestinians. Christian American youth are dying in the middle east for Israel and don’t even know what they are fighting for – they think its for a terrorist threat to America. What idiots we are – wake up America and take your country back from both AIPAC and the government that has been bought by them. Israel is a tick on our back…lets take back our country.

      IF, Israel wanted peace, it would FLOOD Concentration Camp GAZA with food and healthy economic activity. Did America launch massive assaults and shoot Black American Women and Children dead in the streets or use Jet Fighters and launch Artillery and Missiles into CIVILIAN areas? NO! Israel does so because Israel wants Ethnic Cleansing, NOT peace. Where is Israel’s Recognition of the PALESTINIAN’S RIGHT to EXIST!? Israel demands the Palestinians “repudiate” this and that …Does Israel REPUDIATE the TORAH???? Israel was White RACIST, APARTHEID, South Africa’s ONLY ally, trading weapons, torture techniques, NUCLEAR TECHNOLOGY, with them. Today Israel continues Racist APARTHEID with it’s wall. Israel enforces laws that are straight out of Nazi Germany such as Palestinians must have different colored ID cards and license plates, JUST like the yellow stars the Jews WAIL about having to wear. Palestinians have to use separate roads, IDENTICAL to Black OR Whites Only drinking faucets.
      Israel and South Africa were virtually twinned as military allies for Pretoria helped supply Israel militarily in the immediacy of its 1973 setback and Israel came to support apartheid South Africa at the height of sanctions with weaponry and technology – from naval ships and the conversion of supersonic fighter planes to assistance in building six nuclear bombs and the creation of a thriving arms industry. Israel resembles apartheid South Africa at its zenith – even surpassing its brutality, house demolitions, removal of communities, targeted assassinations, massacres, imprisonment and torture of its opponents and the aggression against neighbouring states.
      Israel just PRETENDS to care about African Americans (but look how Israel treats Blacks at home), so they can STEAL the taxdollars that SHOULD have been repairing schools and infrastructure and providing police protection in the Cities. Year after year BILLIONS of African American Tax dollars buy more APARTHEID-suppression for the NATIVE PEOPLE of PALESTINE instead of improving life for the Black American People who earned those dollars.

      “It is unacceptable that nations made up of people who have only just come down from the trees should take themselves for world leaders . . . How can such primitive beings have an opinion of their own?” – Yitzhak Shamir, in reference to the black African nations who voted in support of the 1975 U.N. resolution, which denounced Zionism as a form of racism, in Yediot Ahronot, November 14, 1975.

      Thu, 26 Aug 2010 20:15 CDT © Jewish Middlesex
      Ethiopian Jewish student – not allowed to study at new school
      Several months ago, a religious school in the illegal Israeli settlement of Immanuel was criticized for segregating white Jewish students from non-white Jewish students in classes. Originally, the school was fined for this policy of racial segregation, because the school was state funded. Now, the Israeli education ministry has agreed with the white parents’ request to allow the school to continue with its racial discrimination under private funding.
      There is no law preventing racial discrimination by priyvate organizations, even schools, in Israel.
      The Israeli court has interpreted these laws to also apply to illegal West bank settlements, like Immanuel, which are located in areas that are supposed to be under Palestinian control. The Palestinian Authority does not allow racial discrimination, but due to the Israeli military occupation of the Palestinian Territories, it has no authority over the area in question. 74 white girls who have been studying in a building next to the school will now be allowed to study in whites-only classrooms that are privately funded, as their parents claim they do not want their girls to study in racially-mixed classrooms.
      ——————————————-
      Since Israel now demands a “LOYALTY OATH” of it’s citizens, the World should demand a LOYALTY OATH of all Jews within their borders, since they are NOTORIOUS for their DUAL-loyalties.

    • Dr. Bob Uda, Ph.D., CM, CHSP, ILO

      Anonymous, you sound anti-Semitic. Are you?

    MOST RECENT
    Load more ...

    SignUp

    Login

    Newsletter

    Email this story
    Email this story

    If you really want to ban this commenter, please write down the reason:

    If you really want to disable all recommended stories, click on OK button. After that, you will be redirect to your options page.