Skip to main content icon/video/no-internet

The term cyberterrorism refers to the convergence of terrorism and cyberspace—the politically motivated sabotage of information systems. Since the 1990s, incidents of hacking, cybercrime, and highly destructive computer viruses have been widespread, but many believe that true cyberterrorism remains more of a threat, albeit a possibly imminent one, than a reality.

Barry Collin, of the Institute for Security and Intelligence in California, coined the term cyber-terrorism in the 1980s. In a 1997 paper, Collin described possible cyberterror scenarios. In one, a cyberterrorist hacks into the computer system of a cereal manufacturer and raises the level of iron in each box, causing innumerable children to get sick and die. In another scenario, cyberterrorists destabilize an entire country by attacking financial institutions and stock exchanges en masse.

Collin's third scenario, in which a cyberterrorist hacks into an air traffic control system, came close to reality when, in 1997, a teenager gained access to a phone switch at a small Massachusetts airport and accidentally cut all communication for the control tower for several hours. Alarming as it was, the incident was seen more as hacking gone awry than cyber-terror because the teenager lacked political motivation. To date, this has often been the case—hackers with the tools to disable key government or corporate computer systems lack the political motivation to do so; terrorists motivated to crumble information systems to cause chaos lack the requisite computer skills.

Still, many point to destructive viruses and worms, denial-of-service attacks, as the seedlings for larger events. In 1999, the Melissa virus, an e-mail virus named after a Florida stripper, affected more than a million computers and caused at least $80 million in damages. (Melissa's creator, David Smith, pleaded guilty and was sentenced to 20 months in prison in May 2002.) In May 2000, the lovebug virus (aka the ILOVEYOU virus) affected even the CIA and British Parliament and caused more than $10 billion in damages worldwide. The Nimda virus, discovered in 2001, has caused damages estimated at $500 million and has hobbled entire businesses for days at a time.

Though viruses still constitute a threat, a more recent form of cyberattack has been the denial-of-service attack. In February 2000, Yahoo!, CNN, eBay and other e-commerce sites were flooded by e-mail messages from attacking computers, which slowed service and blocked other users from the sites, causing an estimated $1 billion in losses.

Other incidents, worldwide, have combined these hacking techniques with political messages. In what is believed to be the first cyberattack by terrorists against a country's computer systems, in 1998, an offshoot of the Liberation Tigers of Tamil Eelam swamped the Sri Lankan embassies with thousands of e-mails that read, “We are the Internet Black Tigers and we're doing this to disrupt your communications.” In India, a group of international hackers against nuclear proliferation, called Milw0rm, hacked into the Bhabha Atomic Research Center and posted the message, “If a nuclear war does start, you will be the first to scream” transposed over a photo of an atomic mushroom cloud. Similar attacks have been perpetrated against North Atlantic Treaty Organization (NATO) sites during the conflict in Kosovo, to protest the World Trade Organization, and, particularly after the United States accidentally bombed the Chinese embassy in Belgrade, against U.S. government sites.

While denial-of-service attacks, e-mail bombs, Web site sit-ins, Web page takeovers, and viruses—sometimes referred to, collectively, as “hacktivism”—have not claimed lives or caused much more than nuisance and/or financial loss, many believe that these tactics could be used to complicate and magnify real-world attacks. Jeffrey A. Hunker, former senior director for protection of critical infrastructure for the National Security Council, stated that cyberattacks could act as a “force multiplier” for a bombing or attack either by posting false information on the Internet to create panic or by sabotaging financial, emergency, or communication networks. In 1997, the Clinton administration's Commission on Critical Infrastructure Protection concluded that electronic money transfers, the power grid, 911 services, and military command sites were also vulnerable to cyberattack. The study stated, “Our dependence on the information and communications infrastructure has created new cyber-vulnerabilities, which we are only starting to understand.”

...

  • Loading...
locked icon

Sign in to access this content

Get a 30 day FREE TRIAL

  • Watch videos from a variety of sources bringing classroom topics to life
  • Read modern, diverse business cases
  • Explore hundreds of books and reference titles

Sage Recommends

We found other relevant content for you on other Sage platforms.

Loading