Monday 9 November 2015

Threat Level: Exploring the 'Actual' Threat of Cyber Terrorism

Source: The Independent
Political and economic forces have successfully exposed the threat of cyber terrorism to be almost as severe as the physical threat of terrorism. Companies make a large effort to portray the threat of people being hacked in order to keep society afraid and therefore they are more likely to consume the 'solution' products (e.g. anti virus software programs). But when it comes to cyber terrorism, has the government incorporated this tactic to exaggerate the threat, or is it justified?

Unquestionably, there is an alarming fear from ISIS and with technology advancing by the year, one can assume that the two would collide and terrorist organisation would use cyberspace to attack. The definition has been expanded and now includes a higher range of hackers that are considered 'cyber terrorists'. It is important to address statistics on actual cyber terrorists, who fit neatly into the original definition. Scholars (Uradnik, 2011: 143) have pointed out that there have been no instances of terrorist cyber attacks on U.S public facilities (including nuclear power plants, transportation etc.). Though cyber attacks are all too common, they are often amateur hackers (potentially with a political agenda) but do not belong to terrorist groups or organisations. In fact, 90% of the cyber attacks online are led by what scholars refer to as 'cyber joyriders' (see graph below - enter picture).

Source: JFJ
In the UK, cyber attacks exist but attacks that have interfered with public surroundings are not statistically backed up to match the 'fear'. In August this year, an article was published an article explaining the innovative ways in which British terrorists were using to recruit new members. Omar Hussain joined ISIS and is writing a blog in order to promote and entice westerners to join ISIS as well (The Mirror, 2015). The new wave of cyber space enables terrorists all over the globe to connect with others who live thousands of miles away, relating back to Wall's (2007) terminology discussion. Terrorism would still exist without the internet, but it would definitely limit their ability and ways of connecting with people from other countries.

Recently, journalists have been focused on portraying cyber terrorism as a threat. Earlier this year, The Guardian (2015) published an article identifying the potential capability ISIS may have to unleash cyber attacks in Britain.

Junaid Hussain, a teenage boy, was put on trial in 2012 after 'hacking into Tony Blair's personal address book and taking down an anti-terror hotline'. Now is considered to have joined ISIS, despite his lawyer assuring the court his acts were simply a 'childish prank' and not terrorist exploits. The questions that can be raised from this article is, have ISIS recruited members that have the capability to hack into government information? And therefore are they able to plot against the British and US government to inflict major devastation in both an online and physical manner?

Source: Daily Mail
In 2002, US troops analysed al Qaeda laptops and discovered their advanced technological set up, alarming officials as to their capability. Information that was found mostly related that of water systems, power plants, European stadiums etc. However, no evidence pointed towards any actual plans of cyber attacks in the US or UK, instead it was being used as information to execute physical attacks or to aid communication (Green, 2002). To contrast, after the hacking on Tony Blair, ISIS militants have been reported to be bragging about their ability to cause devastation to the western world's infrastructure - "your security information is in our hands" (The Independent, 2015). It is possible to conclude that although the threat and advancements of cyber attacks are greater, there is no hard evidence to suggest it is currently being designed. Amateur hackers only appear to be successfully carrying out attacks through cyberspace, but not necessarily for politically motivated reasons intended to cause destruction. That does not necessarily mean the threat is not an important matter for government to focus on, legitimate terrorists or not, certain government documents are best kept out of the public domain and hacking into certain files could cause greater issues for the UK and the US against terrorist organisation, such as ISIS or al Qaeda.

Word count: 689

References:
The Independent . (2015). Pro-Isis 'hackers' threaten to carry out cyber attacks against Europe, US and Australia in propaganda video. Available: http://www.independent.co.uk/news/world/middle-east/pro-isis-hackers-threaten-to-carry-out-cyber-attacks-against-europe-us-and-australia-in-propaganda-10245161.html. Last accessed 28 September 2015.

Green, J (2002). The Myth of Cyberterrorism. USA: Washington Monthly. 8–13.

The Guardian. (2015). Could Isis’s ‘cyber caliphate’ unleash a deadly attack on key targets?. Available: http://www.theguardian.com/world/2015/apr/12/isis-cyber-caliphate-hacking-technology-arms-race. Last accessed 28 September 2015.

The Mirror. (2015). 'Join ISIS, get a fridge': Bizarre promise from British 'supermarket jihadi' who recruits for terror group. Available: http://www.mirror.co.uk/news/world-news/join-isis-fridge-bizarre-promise-6226404. Last accessed 28 September 2015.


Uradnik, K (2011). Battleground: Government and Politics, Volume 1. USA: ABC-CLIO, LLC. 143.







Monday 2 November 2015

Government Responses: Security Prevention in the UK and US

Source: The Telegraph
After 9/11, American and British governments enhanced security to prevent further attacks. Though, before this attack security was still posed as an issue with the growing advancements in cyber space. In fact in 2000, Microsoft fell victim to a computer attack which gained access to the company's internal network. Rapidly, this sparked fear of further cyber attacks because if cyber criminals were able to attack Microsoft, the Centre for Strategic and International Studies considered anyone a potential victim open to an attack (Raghavan, 2003: 298). In the years since, this fear did not prove to be mistaken, criminals have managed to cause disruption amongst governments and companies across the globe.

In 2010, the UK government put in place a strategic defence and security review, which dedicated £650 million to a four-year National Cyber Security Programme (NCSP), in respond to cyber threats (2014: 24). Greater spending is being placed to fight cyber terrorism as the issue continues to rise with the population becoming more accustomed to the internet, therefore the same can be said for those threatening the UK. Furthermore, a government report was published in 2011 regarding the 'UK Cyber Security Strategy', the aim of the report was to express the concerns of cyber attacks and terrorism that pose a threat to the UK. The report states the likelihood of further attacks if 'terrorists believe that our national infrastructure may be vulnerable' (2011: 14).

Source: Homeland Security
In 2011, David Cameron also met various large companies from different sectors in the UK economy, where they discussed the cyber threat and how to respond effectively. The government shortly after that built a new approach which involved a joint 'hub' with the public and private sectors. This was designed to identify government and private threat information and then distribute it to 'nodes' in key business sectors, which is then used to provide a framework for identifying the best solution to potential threats (GOV, 2011).

In 2013, it was reported that Scotland Yard expanded its specialist E-Crime unit after multiple MPs warned that cybercrime is now a Tier One threat to the country, along with international terrorism. Terrorists were considered to be increasingly targeting computer systems and the government regarded this as a threat to British security. Scotland Yard first set up their crime team in the early 1980s, over the last few decades it has expanded to meet the latest issues concerning cybercrime. In 2008, the Home Office created a modernised unit in order to focus specifically on investigating more serious attacks and threats that face the UK (The Telegraph, 2013). Since then it has only increased along with the government fear they could be targeted in an attack from terrorist organisation across the globe, however these policies and security advancements are also used to prevent hackers in general (the difference between the two is often misunderstood). Any threat to government security in the form of hacking or cyber terrorism is important to prevent to limit the national security threat that could result if certain information were to be leaked.

According to the Home Office policy paper 2010 - 2015, the UK have collaborated with the US in regards to cyber security and cyber defence matters in order address and manage these threats. The MI5 and GCHQ (UK) are working with the National Security Agency and the FBI (US), who are instituting a joint cyber cell to enable more information regarding these threats to be shared more quickly amongst the agencies in each country (Home Office, 2015).

The UK  have taken necessarily steps to ensure the safety of the country within the realm of cyberspace because without it we can expect to be hit, not just by cyber terrorists, but by anyone. It appears that making our networks and information as secure as possible is a vital step in securing out nation security.

Word count: 638

References:
GOV. (2011). Protecting and promoting the UK in a digital world. Available: https://www.gov.uk/government/news/protecting-and-promoting-the-uk-in-a-digital-world--3. Last accessed 1 November 2015.

Home Office. (2015). 2010 to 2015 government policy: cyber security.Available: https://www.gov.uk/government/publications/2010-to-2015-government-policy-cyber-security/2010-to-2015-government-policy-cyber-security. Last accessed 27 September 2015.

Raghavan, T. (2003). IN FEAR OF CYBERTERRORISM: AN ANALYSIS OF THE CONGRESSIONAL RESPONSE . Journal of Law, Technology and Policy. 2 (1), 297-300.


The Telegraph. (2013). Scotland Yard cyber crime unit to dramatically expand. Available: http://www.telegraph.co.uk/news/uknews/crime/10437237/Scotland-Yard-cyber-crime-unit-to-dramatically-expand.html. Last accessed 27 September 2015.