Terrorists utilize the internet in four main ways: hacking, cybercrime, cyber terrorism, and cyber warfare. These crimes can have a tremendous impact. Examples of internet crimes by terrorists and their impacts include:
1) Disrupting websites by hackers in response to content they disagree with, such as Sony refusing demands to not release "The Interview" which depicted North Korea's leader, costing Sony tens of millions of dollars.
2) Hacking to access personal information for blackmail or theft, such as stealing credit card numbers.
3) Electromagnetic pulse attacks on computer servers, which can destroy electronics and collapse entire systems, with potentially devastating consequences.
4) Cyberattacks on critical infrastructure
(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service
Four Examples of Terrorist Internet Crimes and Their Impacts
1. PLEASE DESCRIBE FOUR EXAMPLES OF TERRORIST UTILIZING THE
INTERNET, AND EXPLAIN THE IMPACT IT HAS?
Cyberspace is an umbrella of various crimes that occur by terrorists using the internet. Those
crimes are categorized into four types: hacking, cybercrime, cyber terrorism, and cyber warfare.
Those are differentiated by the motivation of the terrorist and threat action used. Those crimes
could have a tremendous impact on the country. There are various examples of those crimes and
their impacts. For example, website disruption, hackers attacking computer servers, disruption of
critical infrastructure systems, and cyber espionage.
An example of these crimes is the disruption of websites. It occurs when terrorists disagree with a
website's content. The purpose of taking this action by them is to make the public uncomfortable
and get revenge on the website's controllers or the agency it controls them. A famous example is
when Sony company refused hackers' demand not to share "The Interview" movie, which depicts
North Korea's president, Kim Jong-un. The attack affected the economic company and caused the
unsuitability of workers there. Regarding economic impact, the company lost tens of dollars from
not releasing the movie. The unsuitability was when hackers found emails of unsuitable scenes
between executives and some actors. It was a significant loss for the company and forced the
government to interfere with those actions.
Hacking is one of the most common internet crimes that occur nowadays. It is an example of when
terrorists use the internet to find a breach to target a perpetrator's computer system, where they can
access personal information and steal them for different goals. For example, hacking passwords
has become vast recently. There are many techniques they apply to find the password. One of them
is guessing it using algorithms. From this action, they can gain some personal information which
they can use later on, to blackmail the person for the sake of money. Hackers could also find the
2. password of the victim's credit card. Therefore, they could steal money, collapse their credit rating,
or even make a purchase themselves.
Terrorists could cause a physical attack when they use the internet to attack a server that requires
a high-energy pulse. It causes the computer and other nearby electronics to be destroyed due to the
overload of energy. This attack is called an electromagnetic pulse (EMP). Although it rarely
occurs, the result of it is unbearable. For example, the software or memory could be disrupted, and
memory is emptied. The hardware per se could be damaged. Eventually, the entire system
collapsed. I could not imagine the consequences if this had happened to a Uranium factory.
Cyberinfrastructure is one of the most common attacks that the department of defense and
homeland security deals. It is one of the most malicious cyber-attacks as it can spread around the
entire computer chain, doubling its loss. Moreover, it deters an organization's computer operations.
For example, if this happened as a Stuxnet worm. It was planted inside USB, so when inserted in
the computer, the worm gets access to the computer and moves around other computers rapidly
and seamlessly. The intricate and most dangerous part is that the worm could also move around
all running windows.
All in all, the internet is substantial for all critical ministries and departments. It can be found
everywhere nowadays, and we rely on it daily. If a breach were found, it would have impactful
effects in all life's aspects, including and not restricted to economics, society, defense, Etc.
Therefore, it must maintain maximum security, and fast responses must be taken if any breaches
are found.
Word Count: 580 words
3. References:
What is hacking? And how to prevent it. (2022, July 1).
www.kaspersky.com. https://www.kaspersky.com/resource-
center/definitions/what-is-hacking