Cyber-Warfare and Cyber-Terrorism

 


According to the United States Institute of Peace, an independent, nonpartisan institution created by Congress to promote the prevention, management, and peaceful resolution of international conflicts, “Cyber fears have been exaggerated. Cyber attacks on critical components of the national infrastructure are not uncommon, but they have not been conducted by terrorists, and have not sought to inflict the kind of damage that would qualify as cyber terrorism.” It is irresponsible for the United States Institute of Peace to report this, because in December 2021 alone, there were a number of cyber attacks reported by foreign governments that show the potential damages of cyber-attacks. A few of these December 2021 attacks are outlined below:

  •       A cyber attack on the Belgium Ministry of Defense forced part of its computer network, including the ministry’s mail system, to shut down for several days. Hackers exploited the Log4j vulnerability to compromise the network.
  •         Hackers targeted multiple Southeast Asian governments over the past 9 months using custom malware linked to Chinese state-sponsored groups. Many of the nations targeted are currently engaged in disputes with China over territorial claims in the South China Sea.
  •         A breach of Prime Minster Modi’s Twitter allowed hackers to Tweet from the account that India officially adopted bitcoin as legal tender. The Tweet also included a scam link promising a bitcoin giveaway.
  •         A Bloomberg investigation publicly linked an intrusion into Australia’s telecommunications systems in 2012 to malicious code embedded in a software update from Huawei.
  •         Cyber security firms found government-linked hackers from China, Iran, and North Korea attempting to use the Log4j vulnerability to gain access to computer networks. Following the announcement of Log4j, researchers already found over 600,000 attempts to exploit the vulnerability.
  •         Chinese hackers breached four more U.S. defense and technology firms in December, in addition to one organization in November. The hackers obtained passwords to gain access to the organizations’ systems and looked to intercept sensitive communications.
  •         A Russian group took responsibility for a ransomware attack on Australian utility company CS energy. This announcement came after Australian media outlets blamed Chinese government hackers for the attack.

(Center for Strategic and International Studies, 2021)

Cyber terrorism is the combination of terrorist and cyberspace and includes the unlawful threats and attacks against computers, networks, and their internally stored information to intimidate or coerce a government and its people for social or political objectives (Weimann, n.d.). In order to qualify as cyber terrorism, the attack must result in violence against property or person, or do enough harm to generate fear. Threats of cyber warfare continue to grow as our enemies continue to get smarter and more innovative on this front. However, it is important to understand that, yes, while we have heard about countless cyber-attacks in the news, the larger scale attacks that wipe out our water or electrical supply, and transportation grids on a united, large scale is highly unlikely. According to the Center for Strategic and International Studies Assessment on the Risks of Cyber Terrorism, Cyber War, and Other Cyber Threats, cyber-attacks on this scale would be extremely difficult, due to these facts:

  •         In the US, there are 54,064 separate water systems, 3,769 of these systems server 81% of the US population, and the uneven spread of different network technologies make hacking the US water supply a huge undertaking, and unlikely target due to the complexity that an attack on this scale would take.
  •        An attack on the electrical grid would be complex due to the fact that it is a highly interconnected grid with over 3,000 public and private utilities that use different information technologies to operate their separate, unique grids. A team of hackers would need to find vulnerabilities in these multiple systems in order to significantly disrupt the overall power supply to the US.
  •         We are not yet to the point where computer networks remotely operate aircraft. Pilots are still in charge of operating the plane in any emergency. Also, the Federal Aviation Authority (FAA) does not solely depend on computer networks to direct air traffic, and the communication systems are not dependent on the internet. Because of this, a large scale attack on the US airspace would prove an extremely difficult task for hackers to pull off.

As of now, cyber-terrorists have been relying on smaller, more rapid cyber-attacks that prove to be an annoyance, end up costing a lot of money to recover from, and still cause a large path of destruction, but not thankfully we have not seen these attacks successfully focus on a single point of critical infrastructure, that impacts the US as a whole. One thing is for sure, cyber-terrorists are always thinking up new ways to attack us, and even though we may not see an immediate vulnerability, they are working on one at this very moment. It is important for all of us to stay up to date on existing and new vulnerabilities, and stay vigilant.

 

References

Center for Strategic and International Studies. (2021). Significant cyber incidents. Significant Cyber Incidents. Retrieved January 12, 2022, from https://www.csis.org/programs/strategic-technologies-program/significant-cyber-incidents

Lewis , J. A. (2022, January 12). Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats. Center for Strategic and International Studies. Retrieved January 12, 2022, from https://www.csis.org/

Weimann, G. (n.d.). United States Institute of Peace Special Report. Cyberterrorism How Real Is the Threat? Retrieved January 12, 2022, from https://www.usip.org/sites/default/files/sr119.pdf

Comments