A terms and parameters it is also worth noting that

Info icon This preview shows pages 3–5. Sign up to view the full content.

a. Terms and Parameters It is also worth noting that cyberterrorism from a domestic source is no less dangerous than cyberterrorism from abroad. While domestic cyberterrorism may be more amenable to surveillance, identification, and response, at least in legal terms, neither domestic nor foreign cyberterrorism is wholly preventable. Before we can consider appropriate governmental responses to international cyberterrorism, it is necessary to define some terms and parameters for analysis. Important terms are cyberspace, cybersecurity, cybercrime, and cyberterrorism. In this paper, by “ cyberspace ,” I mean simply the internet, a network of networks that uses TCP/IP (Transmission Control Protocol/Internet Protocol) to handle communications between computers. The main activities on cyberspace are web pages and e-mail. “ Cybersecurity ” is a broad term for security against disruption and misuse of internet facilities. “ Cybercrime ” includes a full range of traditional crime, effected using the internet, as well as “new” crimes involving criminalized disruption and misuse of the internet. “ Cyberterrorism ” is a type of cybercrime that is categorized as terrorism. 3 This paper can examine the issue of security against cyberterrorism without addressing the difficulties involved in distinguishing terrorists from freedom fighters. Thus, cybersecurity includes more than defense against cyberterrorism. Cybersecurity includes protection against all forms of cybercrime, including fraud, theft of information, theft of goods or services through cyber-manipulation, destruction in real- space through cyber-manipulation, cyber-vandalism, destruction or impairment of networks and other hacking. Given its link to cybercrime, cyberterrorism is, to begin with, an issue of surveillance, interdiction, and punishment, often through law enforcement, rather than military action. It is in this sense that the border between cybercrime and cyberterrorism may be unclear. Cyberterrorism has another important feature in common with other types of terrorism. One possible feature of terrorism is uncertainty about the author of the act of terrorism. This feature is often available in realspace terrorism, and it seems also available in cyberterrorism. Obviously, uncertainty regarding the author makes response, and deterrence, difficult. 3 On the difficulty of defining “cyberterrorism,” see Seymour E. Goodman, Toward a Treaty-Based International Regime on Cyber Crime and Terrorism , in C YBER S ECURITY : T URNING N ATIONAL S OLUTIONS INTO I NTERNATIONAL C OOPERATION 65, 66 (James A. Lewis, ed. 2003).
Image of page 3

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

Global Cyberterrorism, Jurisdiction, and International Organization 4 While the border between cybercrime and cyberterrorism may be unclear in some contexts, smaller scale cybercrime may be more satisfactorily addressed through conventional methods of detection, deterrence, law enforcement, and evolution of networks than cyberterrorism or cyberwarfare. Magnitude and the availability of ex post responses matter. The magnitude of the risk presented by cyberterrorism or cyberwarfare
Image of page 4
Image of page 5
This is the end of the preview. Sign up to access the rest of the document.
  • Spring '12
  • Kushal Kanwar
  • global cyberterrorism

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern