The present and future of computer based espionage and terrorism.
I. Introduction
Computer based espionage and terrorism
Computer based espionage is a form of spying through the use of computer devices and internet. It involves organizations, governments, or individuals obtaining confidential information without legal permission from the information holder. It is mainly done or kept secret because of the fact that it may be illegal thus punishable using the law. However sometimes computer based espionage may be considered legal as being part of intelligence operation. In such cases the organization or individual conducting the intelligence, does it using ethical means and mainly utilizes public sources of information. Governments are the ones mostly involved with computer based espionage as a form of intelligences operation. They do this primarily to gather information about their potential enemies.
Computer based terrorism is conducting terrorist activities through the internet. It involves causing online threats through deliberate disruption of vast computer networks belonging to governments and organizations. The terrorists use computer viruses to cause the disruption of networks; however, sometimes they would hack into a government website to pose threatening messages.
History of computer based espionage and terrorism
The concept of espionage has been in existence for centuries. During the cold war, this phenomenon heightened and the two main governments involved, the US and the Soviet Union found themselves involved in espionage as a means of gathering intelligent information about the enemy. The two governments conducted their secret intelligent services through the use of computer devices that would gather vital information about their enemies.
Apart from the cold war spying incidences involving the US, the Soviet Union and China, there have been recent cases of computer based espionage. In 1995 alone, confidential files kept in the department of defense were of interest to hackers. The hackers made several futile attempts to gain access into the department’s computer system to retrieve the files. It is said that more than half a million attempts were made and quite a good number became successful. On the same note, in 1998, a vital software program was stolen from the department of defense computer system. This software could control the satellite system belonging to the US military.
With regards to cyber terrorism, public interest about the concept started in the early 90s with the growth of the internet. However no major threatening activities were done until the entry of the new millennium when there was a global threat of an internet bug that would be spread throughout the world online. The threat of the bug however, did not lead to any substantial damage. But it created the awareness for need of internet security against possible cyber threat. Ever since, cyber terrorism has been a topic highly commented or covered in the media especially after the September 11 attacks in the US in 2001.
Several incidences of cyber terrorism have occurred since the phenomenon became a matter of public interest. Based on the definition of the term cyber terrorism some incidences could be classified as computer based terrorism. In 2007, the Estonia government was faced with a huge cyber attack where several government websites were forced to shut down after being bombarded with heavy online traffic. This attack was in response to the Estonian government removal of Russian WW2 memorial from its capital. To prove the gravity of the matter, the website belonging to the political party of the then prime minister was posted with a fake apology letter to the Russian government for the removal of the memorial.
Overview of the paper
This paper seeks to discuss the present and future of computer based terrorism and espionage. Based on the brief introduction, there is a slight difference between the two terms. Therefore each of the terms shall be looked at separately to determine the circumstances in which they occur. There is also a way in which the two phenomena have been evolving and changing. This paper highlights on this aspect and tries to infer on future development of cyber terrorism and computer based espionage. In order to make this inference, information will be drawn from the trends in technological development and international relations between powerful nations as well as warring nations.
II. Body
A. Cyber Espionage
Cyber espionage as earlier mentioned is common with governments seeking to understand their potential enemies and organizations seeking to understand their potential competitors. Different agencies within governments can also be involved in espionage. This however is mainly relevant to agencies that deal with intelligence and security such as the police department. For instance it is commonly known that the police force in the developed countries rely majorly on surveillance cameras to monitor activities happening in specific areas of interest. In the business world, firms use computer based surveillance as a security measure to monitor all activities taking place within their premises . They have also been using electronic surveillance as a means of collecting information about their target and competitors.
The benefits of engaging in computer based espionage have been greater than the disadvantages that accompany the concept . With the improvement of technology, cyber espionage has taken a new twist. There are more sophisticated ways in which participants of spying use to carry out their activities. This is unlike in the historical days when governments could send spies to their enemies to collect vital information about them . However, in the present world, there is a wide range of gadgets that can be used to conduct spying activities in secret. This includes hidden cameras, computer surveillance, cell phone tapping and bugging devices .
The Chinese government has in the recent past been involved in intelligence operations in the US . It has been making attempts to acquire information about the US military technology. Their nuclear espionage has enabled them to achieve something. The manner in which the government of China has been conducting its espionage operations is such that it avoids prosecutions by working within the constraints of the US laws . For instances, China has been closely monitoring public sources with unclassified information in order to get relevant information about the US nuclear powerhouse . Apart from using ethical and legal means of gaining the information, China has also been involved in unethical espionage practices. This is according to reports by a select committee in the US House of Representatives.
Apart from seeking information about the US military, China has also had a lot of interest on US companies. According to research, more than 80 percent of US corporations have been victims of cyber attacks . The main interest here has been to steal important and confidential information about a company’s operations. This alleged hacking does not only involve the Chinese government but also other interested parties in the business operations of large US corporations .
Most of the cases of cyber espionage have never had documented proof of the perpetrators. They only consist of complaints by the victims. These examples include the German chancellery, Google Aurora, email attacks in the Pentagon, Ghost net and Titan Rain. These examples have involved China directly. A recent report by InfoSecIsland learnt that anonymous Indian hackers gained access to servers belonging to the Indian government and retrieved confidential information. It found out that the government of India plans to partner with mobile phone manufacturers to install application that would enable it have access to personal information of users. It also found out that the Indian government is in possession of secretive information of the US-China joint commission on economy and security among other US government agencies.
There are also other past examples of incidences in which governments have been directly involved in unethical practices of cyber espionage. In the year 2001, the computer systems belonging to the white house, HHS, and the central intelligence agency (CIA) were hacked into by Chinese hackers. Another incidence is when the Israeli introduced a virus into Iraqi’s nuclear enrichment program disrupting and sabotaging the program for quite some time. Iraq and Israel are known to be enemies for a long time .
On the counter action against espionage, there has been increased awareness and sensitization to of cyber security. The potential damage that a country or an organization can witnessed as a result of being a victim to cyber espionage raises concerns of internet and computer security. The FBI has been quoted saying that computers hackers are within the networks. Sometimes they are not detected or noticed within the corporate or government networks. The sole intention of computer hackers is to seek, steal and destroy military weapons, military strategies, intellectual property, intelligence, trade secrets and technology.
B. Cyber terrorism
Cyber terrorism is surrounded with a lot of controversies on whether there is any potential for terrorist activities being conducted over the internet. However, based on the earlier definition provided, there is potential for threat through the internet. Cyber terrorism is therefore conducted by terrorist groups. Terrorism in the world today is directly associated to Islam extremists groups. The main strategy with terrorists is to cause threat and fear in large scale. It is therefore possible to achieve this goal through hacking and defacing of websites belonging to organizations and governments.
Cyber terrorism can take more than one form. The main used is the spread of computer viruses through the internet. This form poses greater risks to governments and corporations because of the potential damage. A virus spread throughout an entire computer network belonging to an organization may lead to loss of important data as well as loss of finances in millions of dollars. Another form in which cyber terrorist can take is through hacking and posting threatening information of an attack or a warning. This is the most commonly used so far. Many of the cases of cyber terrorism have involved hacking into websites and posting threatening information to cause panic and fear in the public. Cyber terrorism can also involve stealing of money from people through cyber theft. These funds are then used to sponsor terrorist activities. Cyber theft is common in the present world. Many people have fallen victim of conning through the internet. Terrorist groups can be directly involved in cyber theft in order to collect money to fund their activities.
Terrorists use cyber terrorism because of the potential magnitude of threat and fear that can be imposed through this means. According to NATO, the main intention of cyber terrorist is to destabilize global peace and security. There a number of reasons why terrorists would opt for cyber terrorism. First of all, cyber terrorism is cheap compared to other forms earlier used. The traditional terrorist methods required purchase of expensive resources to attack the enemy . The second reason is identity. Present terrorists do want to reveal their identity. Through cyber terrorism, it is possible for terrorist to conceal identity after an attack. Tracking a hacker of a website is a difficult task .
NATO has been a victim to cyber terrorism. The organization has experienced attacks on their computer systems and websites since 1999 . After the September 11 terrorists attack in the US, the number of cyber attacks witnessed by NATO and other similar organization has been on the increases . In 1999, NATO computers were hacked into by protestors. The group was protesting against NATO’s operations in Kosovo . The computers were packed with emails of denial of service .
The potential damage that can be cause through Cyber terrorism has raised attention on the need to secure the internet and computers containing highly classified databases. Several police departments in the US such as NYPD have improved their internet and computer security systems as counter reaction from the potential risks of cyber terrorism. Anti terrorism police officers dealing directly with cyber terrorists have partnered with similar organization in other countries. For instance, the US anti terrorism officers has joined hands with the Israeli Mossad and Scotland Yard in the UK . Many experts believe that unless proper security measures are put into place to prevent further attempts of attacks by terrorists, the world is still yet to experience terror attack of even greater magnitude through the internet. It is easier for terrorists to carry out such an attack because of the reduced cost. The terrorists do not need to worry about physical boundaries, boarder and airport security.
Recent interceptions into growing cyber attacks by terrorist have been taken into the US congress. The congress has shown concerns about the need to prevent a likely occurrence of attack through the internet. Possible measures that the US government is likely to take include charging the department of homeland security with responsibility of creating security rules and punishing defaulters of the rules. However, such a measure limits organization from trying new ways of cyber space security. It hinders future innovation in internet and computer system security
C. Future of cyber espionage and cyber terrorism
With the improvement of technology, cyber espionage has taken a new twist. There are more sophisticated ways in which participants of spying use to carry out their activities. This is unlike in the historical days when governments could send spies to their enemies to collect vital information about them. However, in the present world, there is a wide range of gadgets that can be used to conduct spying activities in secret. These gadgets have changed the methods of espionage. The change has so far been evolving around computing. For instance, a bugging device is the size of bug and can be used to listen to conversations in a room. The devise can be secretly attached to a hidden place where the target enemy cannot figure out.
Cyber terrorism has in the recent past joined forces with organized crime organizations to carry out their activities. As earlier mentioned, terrorist would engage in cyber crime to get funding for their activities. This has created a wide range of types of cyber attacks each with its own level of risks involved.
Computer based terrorism and espionage has been evolving over the years, thus creating the need to change counter reaction measures. Governments have been forced to corporate and join forces in tackling terrorism and espionage activities in the cyber space. This measure is expected to occur within governments with the same political and economical ideologies. For instance, the partnership between the US police department and Scotland Yard is expected to continue. International organizations will also be expected to be directly involved in curbing terrorist activities. Improved security measure that are expected into the future include authentication and authorization, system protection, data protection, risk analysis, cryptography, biometrics, secure e-commerce protocols, computer forensic, and wireless network security. These are the main areas where future improvement will be focused on to ensure proper security against the new twists that cyber terrorism and espionage has been taking.
III. Summary and conclusion
Cyber terrorism and espionage has been discussed in this paper with the perspective of its history, structure, development and evolution. Both cyber terrorism and cyber espionage emerged with the growth of computing and internet. Espionage is mainly done by governments seeking sensitive information about their potential enemies and organizations seeking confidential information about their competitors. Cyber terrorism is done by terrorist to try and cause panic, threat and damage of property in large scale. It is conducted either through collaboration with cyber criminal organization or through hacking, defacement, and spreading of computer viruses to network systems belonging to governments and government agencies. Since computer based terrorism and espionage have been evolving with time, there has been increased attention on the improved ways of increase cyber security.
References
Alexander, V., Swetman, Y., & Michael, S. (2002). yber Terrorism and Information
Warfare: Threats and Responses. USA: Transnational Publishers Inc.
Britto, J. (2012, 2 6). FBI Hacked While Congress Ponders Cybersecurity Legislation.
Retrieved 2 19, 2012, from Time Techland: http://techland.time.com/2012/02/06/fbi-hacked-while-congress-ponders-cybersecurity-legislation/
Everly, G. S. (2000). America Under Attack: The ‘10 Commandments’ of Responding to
Mass Terrorist Attacks. International Journal of Emergency Mental Health , 3(3), pp 133–135.
Lerner, K. L., & Lerner, B. W. (2000). Encyclopedia of Espionage, Intelligence and
Security. USA.
O'Hara, M. (2012, 1 12). Terrorists Are Jumping on the Cyber Crime Bandwagon.
Retrieved 2 19, 2012, from Law enforcement today: http://lawenforcementtoday.com/tag/computer-based-terrorism/
Phillips, M. (2006). Londonistan: How Britain is Creating a Terror State Within.
Encounter books.
Stiennon, R. (2012, 1 11). First documented case of cyber espionage? Retrieved 2 19,
2012, from Forbes: http://www.forbes.com/sites/richardstiennon/2012/01/11/first-documented-case-of-cyber-espionage/
Subotic, B. (2008, 2 7). Computer-Based Counter Espionage Devices. Retrieved 2 19,
2012, from Social text: https://www.socialtext.net/ism4300/computer_based_counter_espionage_devices\
Verton, D. (2003). Black Ice: The Invisible Threat of Cyber-terrorism. US:
Osborne/McGraw-Hill.
Yungher, N. (2007). Terrorism: The bottom line. New Jersy: Pearson/Prentice Hall
Publishers.
Zandt, C. V. (2011, 6 3). Chinese Computer Espionage: An Act of War against
America? Retrieved 2 19, 2012, from Live secure: http://www.livesecure.org/chinese-computer-espionage-an-act-of-war-against-america/