Internet Hacking and Cyber Terrorism

In the recent past, concerns related to cyber terrorism and internet hacking have skyrocketed due to advancement in technology. These acts are often done in an attempt to expose, destroy, alter, or gain unauthorized access to the use of an asset or property. The current society is dependent on technology, which has the ability of introducing vulnerabilities that can be exploited by individuals with essential skills. Hackers and cyber-terrorists have the potential to introduce threats in a system and responsible for damaging information systems (Icaza, 2018). These activities often result in the loss of resources, finances, and damage of organizational reputation. Cyber-terrorists have taken advantage of technological infrastructures to further their cause. The use of internet in malicious acts has caused the spread of terrorism in various parts of the world.

Real-Life Examples of Internet Hacking

Cases reported in cyber-terrorism have increased exponentially. Research shows that most cyber terrorists achieve their objectives through organized groups that consist of hackers and financiers, among other facilitators. Internet has been applied by terrorists through an array of activities, such as denial of service attacks, web-site defacing, and terroristic threats through electronic communication.

Denial-of-Service Attack in Estonia

Modern societies are vulnerable to cyber-attacks and hacking attempts by terrorists and people of interests. Herzog (2011) explains how Estonia received contingency plans that created an instability and disturbance in the country through distributed denial-of-service (DDoS) cyber-attacks. He explains how the state of Estonia suffered the massive denial-of-service attack that shut down services that were dependent on the country’s internet connectivity after it was rendered offline in 2007 (Icaza, 2018). The disrupted infrastructure ranged from mobile phone networks and online banking services to access to healthcare information and government services. The attack was facilitated by a dispute that existed between Estonia and Russia. Although the two countries had a long history of strife, the attack was facilitated by the removal of a Bronze Soldier – the statue that depicted the Soviet liberation of Estonia from the Nazis – from the Park situated in central Tallinn to a different location in Tallinn Military Cemetery, a decision that sparked rioting in the region. After years of lobbying following their effort to join NATO in 2004, Estonia benefited from contingency plans to protect the country from invasion by Russia. The government has also implemented house-to-house plans of defense against the aggression of the Russians. The attack reminded the world of the threat of cyber-terrorism and reliance on information technology, which can be disrupted through technological attacks.

Ransomware in South Korea

The vulnerability of South Korea to cyber-attacks has increased tremendously in the recent past. The country has exceptional cutting edge technology and high speed internet although its cyber security infrastructure is weak. Hackers damaged the country’s economy after a ransomware harassed both users and private companies, who experienced the loss of personal information. Records show that one company was extorted approximately $1 million from one company in South Korea and demanded approximately $300 from every victim. A report by Naveen (2019) explains that a Korea-based web hosting company was bit by Erebus ransomware that drowned approximately 153 Linux based servers and more than 3500 websites.

In a bid to mitigate similar attacks in future, South Korean government implemented countermeasures to protect the country’s information security centres. The country’s National Intelligence Agency is now concerned with the goal of cyber security to improve the confidentiality and safety of user information. At the British National Health Service, the attack froze computers, emergency rooms, and brought medical treatment to a stop. Government offices in Spain, Russia, and Asian universities were disrupted including global companies such as Renault and Nissan.

Research shows that the ransomware used to infect computers in South Korea originated from North Korea. The virus inflicted global damage and disabled the British National Health Service’s hospital network. The attack affected more than 150nations by locking digital documents, files, and databases after which ransom was released.

The WannaCry ransomware that was used exploited vulnerabilities in operating systems of old versions of Microsoft Windows. This created the need for organizations to patch their computers with security fixes that have the ability to block the attacks. The American government promised to exert maximum pressure to curb North Korea’s strategy and ability to attack and disrupt economy through cyber hackers.

Real-Life Examples of Cyber-Terrorism

Businesses in the United States have increased their response mechanisms on the premise of terrorist attacks. Cyber-terrorism is considered among the main risks of companies for companies in America. According to Naveen (2019), cyber terrorism that involves a cyber-attack is different from that defined under cyber-insurance. However, records show that the rate of cyber-terrorism in the recent past due to the challenge of identifying challenges and the concern that some of the hackers don’t measure up to the present tactics of terrorism.

ISIS CyberCaliphate

Extremist organizations have started to embrace the act of cyberterrorism in their attacks. In 2015, the ISIS’ CyberCaliphate group hacked the U.S. Central Command’s Youtube and Twitter where it posted different threats and pro-ISIS messages (Hellen, 2015). The post stated, “In the name of Allah, the Most Gracious, the Most Merciful, the CyberCaliphate continues its CyberJihad… American soldiers, we are coming, watch your back,” The NewYork Times explained that the attack in Central Command was similar to that had happened in the hacking of Sony Pictures.

Al-Qaeda, has also attempted to recruit individuals through the use of strong hacking and computer skills. Acccording to Byman (2016), Al Qaeda which is listed AS A Foreign terrorist Organization, made it to the list  of terrorirst in 1999 as a result of heinous activities, militant ways, and brutality.  Although this group is known for its physical attacks than cyber presence, the group has turned to the use of social media in a bid to spread its Jihad message. The group has hinted possible attacks on the country’s economy including financial institutions, stock market, and Wall Street. It is also targeting utilities including natural gas, sewage, and transportation.

            Al Qaeda uses the internet in a bid to further their agenda through a written magazine called Inspire that is run by the group in Arabian Peninsula (AQAP). This online magazine provides information to commentate and jihadist movement on the kill list. Recording their experiences and videoing the executions after which they get released to video games play a significant role in fighting against the Westerners, Jews, and the U.S. military (Byman, 2016). This is also an effective method of showing people their significance and relevance and normalizing their behavior. However, the group’s application of cyber-terrorism is limited due to limited tools and skills. Nevertheless, reports show that the group’s online alliances attacked a web server that was operated by the National Oceanic and Atmosphere Administration (NOAA) in 2001. The company has groups that execute cyber-terrorism through web defacement, DDoS attacks, breach of data, hacker sites, and rudimentary capabilities. Other cyber-terrorism attempts by the group have failed including a DoS attack on the Vatican website following controversial comments of Pope Benedict.      

            Successful attempts were made by through the groups partnership with Tunisian Cyber Army whereby it penetrated prominent websites, most of which belonged to the American government agencies and multinational corporations. The groups’ activities are often intended to spread propaganda and rumors to increase the number of people who believe in their actions.

Propaganda/Publicity

In the past, terrorists and resistance groups experienced difficulties in relaying political messages to the public. However, the introduction of the internet has made it easy for cyber-terrorists to achieve their purpose. One organization known for this behavior is the Zapatista movement, which is confined to a limited area in Chiapas. However, the employment of internet has made it possible for this group to extend its political outreach through various computer networks. The group has woven an electronic fabric of struggle that carries their revolution in Mexico and around the world. The group’s activities were restrained to the jungles of Chiapas through limited press coverage and military repression. However, these efforts failed due to the application of electronic mail by independent journalists who conducted interviews on the groups (Icaza, 2018). Reports by foreign observers and Mexicans circulated all over the world and caused the Zapatistas to break from the attempted isolation. Every time the Mexicans responded in support of their action, the group kindled a pro-democracy uprising against the corrupt political and economic system.

Although the group’s efforts were disabled by the Mexican government, their movement brought a ray of energy and hope among the people of Mexico (Byman, 2016). However, of importance is that the popularity in this group was facilitated by the use of computer communication, mass media coverage, and the use of electronic networks, among other familiar tactics. Internet was used to spread the group’s activities in different parts of the country, an aspect that helped them to garner the aspired influence in the country.

In 2015, a hacker from Kosovo was charged for accessing individual personal identification information from various federal members and service groups, which he released to the ISIS. He was prosecuted by the criminal justice for charges of terrorism. Records show that the Syrian Electronic Army has been involved in the vandalism of various websites and media outlets in France, UK and the U.S. in support of the Syrian government (Burton, 2015). In 1999, many NATO computers got attacked with emails and DoS attacks by hackers who were protesting against the bombings by NATO. During this time, many public organizations received emails that were laden with virus.

Effects of Cyber-terrorism and Internet Hacking to the Society

Cyber-terrorism often inflicts emotional, cognitive, and financial effects on the society. According to 2019, stress causes emotional effects while the perception of threats is cognitive. Although cyber-attacks are likely to evoke emotional imbalance, terrorism that is accompanied by the loss of life and injuries causes serious societal imbalance, which often results in financial losses. The instance, ramsomware in South Korea caused significant losses in the targeted companies and individuals, an aspect that had indirect effects on the economy. The effects of cyber-terrorism often facilitate injury or mass death of the target population. The fact that Islam activists use internet to raise funds and recruit members, the effects of which could have chilling effects on the society’s growth and emotional balance.

Actions to stop Cyber-terrorism and Internet Hacking

The United States should continue to familiarize itself with the idea of cyberwarfare and cyberterrorism tactics in order to mitigate the risks to avoid such atttaks. According to Associated Press Staff (2017), institutions should make real investments in order to enhance the security of the critical technological infrastructure, which includes military systems and government systems, among other private sector systems. According to Burton (2015), institutions should disconnect internet from infrastructure that has the ability to be turned into a weapon regardless of the safeguards implemented to protect it. It is also essential to implement structures that ensure that maximum protection in a manner that protects the infrastructure from all forms of attack. Institutions in various parts of the world have implemented joint programs with cyber-security organizations in a bid to combat the issue of cyber-terrorism.

Individuals and institutions should exercise basic precautions to protect the systems from cybercrimes. It is important to employ the use of full-service suite of internet security and provide real time protection to malware including ransomware and virus to protect private and financial information. Other strategies include the use of strong passwords and keeping the software updated. Social media setting should be managed to strengthen the network while staying updated with security breaches. It is also essential to use various products and technologies such as intrusion detection, cryptography, and firewalls. Procedures such as recovery and reconstitution should be improved and secured to protect the IT assets that are owned or operated by individuals or organizations. Passive defense mechanisms such as stopping an attack that is in progress are also essential mechanisms to prevent internet hacking and cyber terrorism. The defender must plug ensure that they locate and plug a vulnerability hole in due time.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Sources

Associated Press Staff (2017). North Korea is blamed for global ransomware attack. Associated Press. Retrieved from https://www.csmonitor.com/World/2017/1219/North-Korea-is-blamed-for-global-ransomware-attack

Burton, J. (2015). NATO’s cyber defence: Strategic challenges and institutional adaptation. Defence Studies15(4), 297-319. https://doi.org/10.1080/14702436.2015.1108108

Byman, D. L. (2016, July 28). Comparing Al Qaeda and ISIS: Different goals, different targets. Retrieved July 16, 2018, from https://www.brookings.edu/testimonies/comparing-al-qaeda-and-isis-different-goals-different-targets/

Hellen, C., (2015). ISIS is cited in hacking of central command’s Twitter and Youtube accounts. New York Times. Retrieved from https://www.nytimes.com/2015/01/13/us/isis-is-cited-in-hacking-of-central-commands-twitter-feed.html

Herzog, S. (2011). Revisiting the Estonian cyber attacks: Digital threats and multinational responses. Journal of Strategic Security4(2), 49-60.nic fabric of struggle (pp. 81-103). http://dx.doi.org/10.5038/1944-0472.4.2.3

Icaza, R. (2018). Social struggles and the coloniality of gender. In Routledge Handbook of Postcolonial Politics (pp. 58-71). Routledge.

Naveen, G., (2019). South Korean Web Hosting Company hit by Erebus Ransomware. Cybersecurity Insiders. Retrieved from https://www.cybersecurity-insiders.com/south-korean-web-hosting-company-hit-by-erebus-ransomware/


Comments

Popular posts from this blog

My First Encounter with AI

A mythological Perspective on Artificial Intelligence