The IT Law Wiki
(New page: {{stub}} A '''terrorist''' is an individual who seek to destroy, incapacitate, or exploit critical infrastructures to threaten national security, cause mass casualties, weaken th...)
 
Tag: Source edit
 
(16 intermediate revisions by the same user not shown)
Line 1: Line 1:
  +
== Definition ==
{{stub}}
 
   
  +
[[File:Terrorobj.png|thumb]]
   
A '''terrorist''' is an individual who seek to destroy, incapacitate, or exploit [[critical infrastructure]]s to threaten [[national security]], cause mass casualties, weaken the economy, and damage public morale and confidence. However, traditional terrorist adversaries of the United States are less developed in their [[computer network]] capabilities than other adversaries. Terrorists likely pose a limited [[cyberthreat]]. The CIA believes terrorists will stay focused on traditional attack methods, but it anticipates growing [[cyberthreat]]s as a more technically competent generation enters the ranks.
+
A '''terrorist''' is an individual who seek to destroy, incapacitate, or exploit [[critical infrastructure]]s to threaten [[national security]], cause mass casualties, weaken the economy, and damage public morale and confidence.
   
  +
== Use of technology ==
  +
  +
[[Technology]] has important implications for the terrorist [[threat]]. [[Infrastructure]] [[technologies]] provide attractive [[target]]s for terrorists who can apply a range of rudimentary and advanced attack techniques to [[disrupt]] or undermine confidence in a range of [[system]]s. Key elements of the national [[infrastructure]], such as transportation, [[telecommunications]], energy, banking, public health, and water supply are becoming increasingly dependent on [[computerized system]]s and linkages.
  +
  +
[[File:Terrortac.png|thumb|left]]
  +
  +
These systems provide [[target]]ing opportunities for adversaries who possess even limited [[technological]] capabilities, and who have the ability to identify [[critical infrastructure]] choke points. Terrorists can apply [[computer-generated]] [[attack]]s or more traditional means such as bombs or physical destruction to cause system-wide malfunctions. [[Interdependencies]] of [[system]]s, such as power and transportation, exacerbate this [[vulnerability]]. Significant [[disruption]] of [[power grid]]s can have a devastating impact on air traffic control, railway operations, port operations, and emergency services such as fire and/or rescue and police. [[Attack]]s such as power outages also impact a wide segment of the population, command significant media attention and consequently provide an effective means for the terrorist to reach a "captive" audience.
  +
  +
A range of commercially available [[technologies]] can dramatically enhance terrorist operational capability. These include [[communications]] equipment, [[encryption]] capabilities, [[surveillance]] equipment, weapons, a range of [[computer]] and [[information management]] [[technologies]], weapons components, and the [[Internet]]. The ability to acquire or adapt [[technologies]] can give terrorists an edge in choosing [[target]]s and conducting [[attack]]s as well as significantly expanding their range of [[attack]] options.
  +
  +
== Cyberattacks ==
  +
  +
Traditional terrorist [[adversaries]] of the United States are less developed in their [[computer network]] capabilities than other [[adversaries]]. Terrorists likely pose a limited [[cyber threat]]. The [[CIA]] believes terrorists will stay focused on traditional [[attack]] methods, but it anticipates growing [[cyber threat]]s as a more technically competent generation enters the ranks.
  +
  +
[[Hacking]] could be used by terrorist groups to harvest information for planning physical or [[cyber attack]]s. [[Audit log]]s from [[website]]s, [[infrastructure]] owners, and national laboratories have recorded extensive, systematic [[information gathering]] originating from countries that serve as home bases for terrorist groups. Terrorist groups also are using the [[Internet]] for [[covert]] communications, and sympathetic [[hacker]] groups have launched various “[[e-jihad]]s,” consisting primarily of [[web page]] defacements and [[DoS]] attacks.
  +
  +
Terrorist groups are known to have included not only engineers, computer scientists, and business people with backgrounds in [[computer]]s, [[network]]s, and [[computer]]-based [[system]]s but also people with [[access]] to [[hardware]] and [[software]] producers. Terrorist groups have even sold [[computer]] products, which could in principle include [[malicious software]]. One known terrorist group is notable because it assembles and sells [[computer system]]s. Although law enforcement has not uncovered information pointing to subversion of [[software]] products, the potential for such activity exists. The evidence indicates that terrorist groups now have or can acquire the necessary expertise for identifying targets and conducting [[cyberattack]]s with serious or catastrophic consequences.
  +
  +
== See also ==
  +
  +
<div style="column-count:3;-moz-column-count:3;">
  +
  +
* [[Combating Terrorism Technical Support Office]]
  +
* [[Domestic terrorism]]
  +
* [[International terrorism]]
  +
* [[International terrorist]]
  +
* [[Joint Terrorism Task Force]]
  +
* [[National Joint Terrorism Task Force]]
  +
* [[National Terrorism Advisory System]]
  +
* [[Regional Terrorism Threat Assessment Center]]
  +
* [[State Terrorism Threat Assessment Center]]
  +
* [[State Terrorism Threat Assessment System]]
  +
* [[Terrorism]]
  +
* [[Terrorism information]]
  +
* [[Terrorism Information Awareness]]
  +
* [[Terrorism Information and Prevention System]]
  +
* [[Terrorism-related information]]
  +
* [[Terrorism Information Sharing and the Nationwide Suspicious Activity Report Initiative: Background and Issues for Congress]]
  +
* [[Terrorist act]]
  +
* [[Terrorist activity]]
  +
* [[Terrorist attack]]
  +
* [[Terrorist Financial Tracking Program]]
  +
* [[Terrorist group]]
  +
* [[Terrorist Identities Datamart Environment]]
  +
* [[Terrorist organization]]
  +
* [[Terrorist Screening Center]]
  +
* [[Terrorists use of the Internet]]
  +
* [[U.S.-EU Cooperation Against Terrorism]]
 
[[Category:Security]]
 
[[Category:Security]]
 
[[Category:Computer crime]]
 
[[Category:Computer crime]]
  +
[[Category:Definition]]
  +
[[Category:Terrorism]]

Latest revision as of 05:35, 8 June 2021

Definition[]

Terrorobj.png

A terrorist is an individual who seek to destroy, incapacitate, or exploit critical infrastructures to threaten national security, cause mass casualties, weaken the economy, and damage public morale and confidence.

Use of technology[]

Technology has important implications for the terrorist threat. Infrastructure technologies provide attractive targets for terrorists who can apply a range of rudimentary and advanced attack techniques to disrupt or undermine confidence in a range of systems. Key elements of the national infrastructure, such as transportation, telecommunications, energy, banking, public health, and water supply are becoming increasingly dependent on computerized systems and linkages.

Terrortac.png

These systems provide targeting opportunities for adversaries who possess even limited technological capabilities, and who have the ability to identify critical infrastructure choke points. Terrorists can apply computer-generated attacks or more traditional means such as bombs or physical destruction to cause system-wide malfunctions. Interdependencies of systems, such as power and transportation, exacerbate this vulnerability. Significant disruption of power grids can have a devastating impact on air traffic control, railway operations, port operations, and emergency services such as fire and/or rescue and police. Attacks such as power outages also impact a wide segment of the population, command significant media attention and consequently provide an effective means for the terrorist to reach a "captive" audience.

A range of commercially available technologies can dramatically enhance terrorist operational capability. These include communications equipment, encryption capabilities, surveillance equipment, weapons, a range of computer and information management technologies, weapons components, and the Internet. The ability to acquire or adapt technologies can give terrorists an edge in choosing targets and conducting attacks as well as significantly expanding their range of attack options.

Cyberattacks[]

Traditional terrorist adversaries of the United States are less developed in their computer network capabilities than other adversaries. Terrorists likely pose a limited cyber threat. The CIA believes terrorists will stay focused on traditional attack methods, but it anticipates growing cyber threats as a more technically competent generation enters the ranks.

Hacking could be used by terrorist groups to harvest information for planning physical or cyber attacks. Audit logs from websites, infrastructure owners, and national laboratories have recorded extensive, systematic information gathering originating from countries that serve as home bases for terrorist groups. Terrorist groups also are using the Internet for covert communications, and sympathetic hacker groups have launched various “e-jihads,” consisting primarily of web page defacements and DoS attacks.

Terrorist groups are known to have included not only engineers, computer scientists, and business people with backgrounds in computers, networks, and computer-based systems but also people with access to hardware and software producers. Terrorist groups have even sold computer products, which could in principle include malicious software. One known terrorist group is notable because it assembles and sells computer systems. Although law enforcement has not uncovered information pointing to subversion of software products, the potential for such activity exists. The evidence indicates that terrorist groups now have or can acquire the necessary expertise for identifying targets and conducting cyberattacks with serious or catastrophic consequences.

See also[]