The IT Law Wiki
Line 5: Line 5:
 
A '''terrorist''' is an individual who seek to destroy, incapacitate, or exploit [[critical infrastructure]]s to threaten [[national security]], cause mass casualties, weaken the economy, and damage public morale and confidence.
 
A '''terrorist''' is an individual who seek to destroy, incapacitate, or exploit [[critical infrastructure]]s to threaten [[national security]], cause mass casualties, weaken the economy, and damage public morale and confidence.
   
== Cyberattacks ==
+
== Use of technology ==
   
  +
Technology has important implications for the terrorist [[threat]]. [[Infrastructure]] technologies provide attractive targets for terrorists who can apply a range of rudimentary and advanced attack techniques to disrupt or undermine confidence in a range of [[system]]s. Key elements of the national [[infrastructure]], such as transportation, [[telecommunications]], energy, banking, public health, and water supply are becoming increasingly dependent on [[computerized system]]s and linkages.
Traditional terrorist [[adversaries]] of the United States are less developed in their [[computer network]] capabilities than other [[adversaries]]. Terrorists likely pose a limited [[cyber threat]]. The [[CIA]] believes terrorists will stay focused on traditional [[attack]] methods, but it anticipates growing [[cyber threat]]s as a more technically competent generation enters the ranks.
 
   
 
[[File:Terrortac.png|thumb|left]]
 
[[File:Terrortac.png|thumb|left]]
  +
  +
=== Cyberattacks ===
  +
 
Traditional terrorist [[adversaries]] of the United States are less developed in their [[computer network]] capabilities than other [[adversaries]]. Terrorists likely pose a limited [[cyber threat]]. The [[CIA]] believes terrorists will stay focused on traditional [[attack]] methods, but it anticipates growing [[cyber threat]]s as a more technically competent generation enters the ranks.
   
 
[[Hacking]] could be used by terrorist groups to harvest information for planning physical or [[cyber attack]]s. [[Audit log]]s from [[website]]s, [[infrastructure]] owners, and national laboratories have recorded extensive, systematic [[information gathering]] originating from countries that serve as home bases for terrorist groups. Terrorist groups also are using the [[Internet]] for [[covert]] communications, and sympathetic [[hacker]] groups have launched various “[[e-jihad]]s,” consisting primarily of [[web page]] defacements and [[DoS]] attacks.
 
[[Hacking]] could be used by terrorist groups to harvest information for planning physical or [[cyber attack]]s. [[Audit log]]s from [[website]]s, [[infrastructure]] owners, and national laboratories have recorded extensive, systematic [[information gathering]] originating from countries that serve as home bases for terrorist groups. Terrorist groups also are using the [[Internet]] for [[covert]] communications, and sympathetic [[hacker]] groups have launched various “[[e-jihad]]s,” consisting primarily of [[web page]] defacements and [[DoS]] attacks.

Revision as of 18:05, 19 March 2011

Definition

Terrorobj.png

A terrorist is an individual who seek to destroy, incapacitate, or exploit critical infrastructures to threaten national security, cause mass casualties, weaken the economy, and damage public morale and confidence.

Use of technology

Technology has important implications for the terrorist threat. Infrastructure technologies provide attractive targets for terrorists who can apply a range of rudimentary and advanced attack techniques to disrupt or undermine confidence in a range of systems. Key elements of the national infrastructure, such as transportation, telecommunications, energy, banking, public health, and water supply are becoming increasingly dependent on computerized systems and linkages.

Terrortac.png

Cyberattacks

Traditional terrorist adversaries of the United States are less developed in their computer network capabilities than other adversaries. Terrorists likely pose a limited cyber threat. The CIA believes terrorists will stay focused on traditional attack methods, but it anticipates growing cyber threats as a more technically competent generation enters the ranks.

Hacking could be used by terrorist groups to harvest information for planning physical or cyber attacks. Audit logs from websites, infrastructure owners, and national laboratories have recorded extensive, systematic information gathering originating from countries that serve as home bases for terrorist groups. Terrorist groups also are using the Internet for covert communications, and sympathetic hacker groups have launched various “e-jihads,” consisting primarily of web page defacements and DoS attacks.

Terrorist groups are known to have included not only engineers, computer scientists, and business people with backgrounds in computers, networks, and computer-based systems but also people with access to hardware and software producers. Terrorist groups have even sold computer products, which could in principle include malicious software. One known terrorist group is notable because it assembles and sells computer systems. Although law enforcement has not uncovered information pointing to subversion of software products, the potential for such activity exists. The evidence indicates that terrorist groups now have or can acquire the necessary expertise for identifying targets and conducting cyberattacks with serious or catastrophic consequences.