07-05-2012, 11:43 AM
Botnets, Cybercrime, and Cyberterrorism
cyber.pdf (Size: 260.06 KB / Downloads: 39)
Introduction
The U.S. military is supported partly by civilian high technology services and
products, most often in the form of communications systems and computer software.4
In future conflicts that involve cyberwarfare between nations, the distinction between
U.S. military and civilian targets may be blurred and civilian computer systems may
increasingly be seen as viable targets vulnerable to attack by adversaries.5
Computer networking technology has also blurred the boundaries between
cyberwarfare, cybercrime, and cyberterrorism. Officials in government and industry
now say that cybercrime and cyberattack services available for hire from criminal
organizations are a growing threat to national security as well as to the U.S.
economy.6 New and sophisticated cybercrime tools could operate to allow a nation
state or terrorist group to remain unidentified while they direct cyberattacks through
the Internet.
Three Basic Methods for Disrupting Computer Systems
There are several effective methods for disrupting computer systems. This
report focuses on the method known as cyberattack, or computer network attack
(CNA), which uses malicious computer code to disrupt computer processing, or steal
data. A brief description of three different methods are shown here. However, as
technology changes, future distinctions between these methods may begin to blur.
Cyberattack, Cybercrime, and Cyberterrorism
Labeling a “cyberattack” as “cybercrime” or “cyberterrorism” is problematic
because of the difficulty determining with certainty the identity, intent, or the
political motivations of an attacker.12 “Cybercrime” can be very broad in scope, and
may sometimes involve more factors than just a computer hack. “Cyberterrorism”
is often equated with the use of malicious code. However, a “cyberterrorism” event
may also sometimes depend on the presence of other factors beyond just a
“cyberattack.”
Definitions for Cyberterrorism
Various definitions exist for the term “cyberterrorism”, just as various
definitions exist for the term “terrorism.”13 Security expert Dorothy Denning defines
cyberterrorism as “... politically motivated hacking operations intended to cause
grave harm such as loss of life or severe economic damage.”14 The Federal
Emergency Management Agency (FEMA) defines cyberterrorism as “unlawful
attacks and threats of attack against computers, networks, and the information stored
therein when done to intimidate or coerce a government or its people in furtherance
of political or social objectives.”15