Summary of cyber crime
Many people argue that the current threat of cyber terrorism has been highly exaggerated. The U.S defence and intelligence computer system have claimed that there has been no instance of cyber terrorism recorded. However, why would the U.S defence intelligence ever admit attacks and portray vulnerability to enemy terrorists? The vast majority of cyber terrorist attacks actually come from ‘hackers’ with virtually no political goals or desire to cause internal harm such as an extremist terrorist.
So why has this become such a moral panic?
The media seem to fail to explain the difference between an actual cyber terrorist attack and a simply computer ‘hacker’. An example of this occurred within The Sun newsagent on Wednesday, June 22nd, 2011 the headlines wrote ‘Hack the Lad Essex geek, 19, arrested for being global cyber villain (Weimann, G.2004)
Nevertheless, many other experts argue that due to the increasing advancements in information technology in general, we have to accept that cyber terrorism is only going to increase and become even more popular in the future. Cyber terrorism can occur at relatively low costs and the simplicity of attacks can generalise too many criminal organisations, not to mention that the number of highly skilled professionals in the computer field is increasing through the generations.
To finish I would defiantly consider cyber terrorism to be a highly significant problem , considering cyber terrorists are experts within their field while keeping anonymity central to their operations, how can we reduce the problem if we don’t know who the people responsible are? I consider many cyber terrorists are being naively mistaken for hackers. Cyber terrorist are targeting critical infrastructure, such as financial, military and governmental sectors, while using the internet as a propaganda tool to introduce other cyber terrorists to their organisation (Awan, I.2014).
Awan, I. (2014). Debating the term cyber terrorism: issues and probelms. Cyber Terrorism. 1 (1), p14.
Weimann, G. (2004). Cyber Terrorism: How real is the threat. Cyber Terrorism. 2 (4), p133.