Friday, March 24, 2023
Layman Litigation
  • Login
  • Home
  • Mass Tort
  • Intellectual Property
  • Personal Injury
  • Corporate
  • Other
    • Immigration
    • Employment
    • Civil Litigation
    • General Practice
    • Medical Malpractice
    • Social Security Disability
    • Tax
  • Publications
No Result
View All Result
Layman Litigation
  • Home
  • Mass Tort
  • Intellectual Property
  • Personal Injury
  • Corporate
  • Other
    • Immigration
    • Employment
    • Civil Litigation
    • General Practice
    • Medical Malpractice
    • Social Security Disability
    • Tax
  • Publications
No Result
View All Result
Layman Litigation
No Result
View All Result
Cyberterrorism

Cyberterrorism: A Modern Threat

by Syeda Fauzia
February 2, 2023
in Layman Litigation
Reading Time: 6 mins read
A A
0
Share on FacebookShare on Twitter

Cyberterrorism also called digital terrorism simply means, spreading terrorism using cyberspace. This could also include threats and illegal attacks against computers, networks, and storing information that is used to intimidate or force a government with intentions of social or political objectives. Cyberterrorism includes the spreading of computer viruses to vulnerable data networks, hacking of servers to obtain sensitive information to disrupt the communication link present in the network, and attacking financial institutions leading to financial losses.

Terrorist organizations use cyberspace for recruitment, command, and control, and for spreading their ideology and these organizations use the internet to set up training camps in cyberspace. The most recent Cyberterrorism was a response to the 2022 Russian invasion of Ukraine, Anonymous performed many attacks against computer systems in Russia. Most notably, Anonymous committed a cyberattack against Roskomnadzor in March 2022.

Background: “The term ‘Cyberterrorism’ was first coined by Banny C. Collin of the Institute for Security and Intelligence (ISI) in the late 1980s. But its usage was better understood during the 9/11 attack. Use of the Internet to carry out violent activities that result in or threaten the loss of life or substantial physical injury to accomplish political or ideological advantages through threat or intimidation. According to Federal Bureau of Investigation (FBI), new phenomenon recognized as a cyber terrorism is defined by follow: “previously planned, politically motivated attack against information, computer systems, computer programs and data that result with violence against targets that are not military (civilian) by the sub – national groups or secret agents”.”[1]

The Centre of the Study of Terrorism and Irregular Warfare at the Naval Postgraduate School of California defined three levels of cyberterror capabilities: “Simple-Unstructured: the capability to conduct basic hacks against individual systems using tools created by someone else. The organization possesses little target analysis, command-and-control, or learning capability.”[2]

Advanced-Structured: “The capability to conduct more sophisticated attacks against multiple systems or networks and possibly, to modify or create basic hacking tools. The organization possesses an elementary target analysis, command-and-control, and learning capability.”[3]

Complex-Coordinated: “The capability for a coordinated attack capable of causing mass disruption against integrated, heterogeneous defenses (including cryptography). Ability to create sophisticated hacking tools. Highly capable target-analysis, command-and-control, and organization learning-capability.”[4]

Laws:

The United State of America have opened up various gambit’s in providing laws that counter Cyberterrorism such as The Cybersecurity Information Sharing Act (CISA) which was passed in the Senate on October 27, 2015. This would also secure many American cyber networks and would also defend any forms of cyber-attacks. Let us discuss few more laws in this regard:

  1. Cybersecurity Enhancement Act of 2014: “Which was signed on December 18, 2014. It provides an ongoing, voluntary public-private partnership to improve cybersecurity and strengthen cybersecurity research and development, workforce development and education, and public awareness and preparedness.”[5]
  2. Federal Exchange Data Breach Notification Act of 2015: “This bill requires a health insurance exchange to notify each individual whose personal information is known to have been acquired or accessed as a result of a breach of security of any system maintained by the exchange as soon as possible but not later than 60 days after discovery of the breach.”[6]
  3. National Cybersecurity Protection Advancement Act of 2015: “This law amends the Homeland Security Act of 2002 to allow the Department of Homeland Security’s (DHS’s) national cyber security and communications integration center (NCCIC) to include tribal governments, information sharing, and analysis centers, and private entities among its non-federal representatives.”[7]
  4. ECPA: Electronic Communications Protection Act which provides protections for communications in storage and in transit. Under the Stored Communications Act (Title II of the ECPA), 18 U.S.C. Section 2702, it is a criminal violation of intentionally access without authorisation (Or exceed authorised access) a facility that provides an electronic communications service (ECS), which could include, among others, email service providers or even some employer provided email. Violations of the ECPA are subjected to penalties ranging from upto 10 years for repeat violations for an improper purpose. The ECPA also prohibits intentionally intercepting electronic communications in transit under the Wiretap Act (Title I Of the ECPA), 18 U.S.C. Section 2511, with some exceptions available for law enforcement, service providers and others (Including, potentially, employers). The Economic Espionage Act of 1996, 18 USC Section 1831-1839, the Defend Trades Secrets Act of 2016, 18 USC Section 1836-1139, and the Wire Fraud Statue, 18 USC Section 1343, are further sources of potential criminal and civil penalties against the theft of trade secrets and other valuable intellectual property.”[8]
  5. In “addition to federal statutes, numerous states have passed statutes prohibiting hacking and other cybercrimes, some of which are broader than the federal statutes. New York, for example, prohibits the knowing use of a computer with the intent to gain access to computer material (computer trespass), N.Y. Penal Law Section 156.10, with penalties of up to four years imprisonment. New York is merely an example; dozens of such state law exists. Determining which statute is applicable depends on several factors under conflict of law rules; including the location of the alleged act and the location of the impacted individuals.”[9]

Conclusion

As you can see, Cyberterrorism is a dangerous problem for humanity as technology evolves the vulnerability may increase, and to combat this, there should be a development in the IT security policies to protect the data which consists of limiting access to sensitive information and enforcing strict password and authentication procedures.

 

[1] Group 1_FEB 2022.pdf (nhrc.nic.in)

[2] Cyberterrorism - Wikipedia

[3] Ibid.

[4] Supra 1.

[5] A Glance At The United States Cyber Security Laws (appknox.com)

[6] Ibid.

[7] Supra 4.

[8] Cybersecurity Laws and Regulations Report 2023 USA (iclg.com)

[9] Ibid.
Tags: cyber crimescyber threatsCyberterrorism
Previous Post

EXTRADITION: WHAT IS IT?

Next Post

Capital Punishment: Cruelty or Justice?

Syeda Fauzia

Syeda Fauzia

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

  • Trending
  • Comments
  • Latest
Outlining Intellectual property right 

Outlining Intellectual property right 

March 11, 2022
USA CODES ON INFRINGEMENT OF INTELLECTUAL PROPERTY LAWS

USA CODES ON INFRINGEMENT OF INTELLECTUAL PROPERTY LAWS

December 20, 2022
social-media-law-usa

Stay Compliant with social media Laws in the USA

February 7, 2023
Protecting the Environment: An Overview of US Environmental Laws"

Protecting the Environment: An Overview of US Environmental Laws

February 7, 2023
Why Is India’s New IT Rules 2021 Causing Ruckus Among Social Media Giants?

Why Is India’s New IT Rules 2021 Causing Ruckus Among Social Media Giants?

2
Wage Theft ill effects and what it means to employees?

Wage Theft ill effects and what it means to employees?

1
Outlining Intellectual property right 

Outlining Intellectual property right 

1
USA CODES ON INFRINGEMENT OF INTELLECTUAL PROPERTY LAWS

USA CODES ON INFRINGEMENT OF INTELLECTUAL PROPERTY LAWS

1

All About International Criminal Law

March 17, 2023

Right To Die

March 16, 2023

MILITARY LAW IN THE USA

March 16, 2023

ALL ABOUT ENVIRONMENT PROTECTION REGULATIONS

March 14, 2023

Recent News

All About International Criminal Law

March 17, 2023

Right To Die

March 16, 2023

Categories

  • April 2022 Magazine
  • Civil Litigation
  • Corporate
  • Employment
  • February 2022 Magazine
  • General Practice
  • Immigration
  • Intellectual Property
  • January 2022 Magazine
  • Layman Litigation
  • Magazine
  • March 2022 Magazine
  • Mass Tort
  • Medical Malpractice
  • Personal Injury
  • Social Security Disability
  • Tax

Quick Links

  • Home
  • Mass Tort
  • Intellectual Property
  • Personal Injury
  • Corporate
  • Other
    • Immigration
    • Employment
    • Civil Litigation
    • General Practice
    • Medical Malpractice
    • Social Security Disability
    • Tax
  • Publications

Layman Litigation

© 2021-2022 Layman Litigation - The House For All Legal Info For the People, By the Law Lovers.
No Result
View All Result
  • Home
  • Mass Tort
  • Intellectual Property
  • Personal Injury
  • Corporate
  • Other
    • Immigration
    • Employment
    • Civil Litigation
    • General Practice
    • Medical Malpractice
    • Social Security Disability
    • Tax
  • Publications

© 2021 Layman Litigation - The House For All Legal Info For the People, By the Lawyers.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In