Definition of Cyber Terrorism
Definition of Cyber Terrorism
The Federal Bureau of Investigation (FBI) enforces federal laws, those created by Congress which apply to everyone nationwide. One area of law which they enforce is cyber terrorism, which involves crimes of terrorism that occur electronically. These crimes occur against individuals, businesses, organizations, and against the government itself.
So much of our lives are accessible electronically now - from your social security number on a job application, to your bank account, to medical records and more. With the greater convenience of using technology, we trade off some degree of security since it's very difficult to stop every instance of cyber terrorism. Consider for a moment, how much of your own private information could a hacker potentially find online about your life? Who or what protects you against theft or other crimes related to your personal data?
Examples of Cyber Terrorism
Terrorism can occur over the public internet, over private computer servers, or even through secured government networks. There are many ways in which a criminal could use electronic means to incite fear and violence. It's far less expensive to purchase a computer than to access guns or bombs, making this approach appealing for many potential criminals worldwide. It can be anonymous and conducted at a great distance away from the target. For just a few examples, consider these situations:
- Foreign governments may use hackers to spy on U.S. intelligence communications in order to learn about where our troops are located or otherwise gain a tactical advantage at war.
- Domestic terrorists may break into the private servers of a corporation in order to learn trade secrets, steal banking information, or perhaps the private data of their employees.
- Global terror networks may disrupt a major website in order to create a public nuisance or inconvenience, or even more seriously, try to stop traffic to a website publishing content with which they disagree.
- International terrorists could try to access and disable the signal which flies drones or otherwise controls military technology.
Comments
Post a Comment