As the world is changing more rapidly in terms of technology than ever before then it becomes relevant to discuss about terrorism but not just terrorism that gained popularity during the French Revolution but cyber-terrorism which is a relatively new term. In fact, cyber operations began to draw the attention of international legal community in the late 1990s and most significantly with the convention of the first major legal conference by the United States Naval War College in 1999. Cyber-terrorism by its definition is considered as “premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets by sub-national groups or clandestine agents” (SearchSecurity, 2015). The United States’ 2010 National Security Strategy have cited cyber threats as ‘’one of the most serious national security, public safety, and economic challenges we face as a nation’’. (COE, 2013) But has cyber-terrorism had any real danger on a nation?
In 2007, NATO started urgently examining the cyber aggression and its implications and the capability of Article V of the NATO charter regarding the non-kinetic realm was tested. Why? Because of a three-week wave of massive cyber-attacks that started on the 27th of April 2005 against a small Baltic country on the East coast of the Baltic Sea – Estonia. After a removal of a Soviet war memorial in central Tallinn and during the aggregations that followed, the websites of government ministries, political parties, major newspapers, banks and companies faced a massive cyber-attack. The attacks were carried out with military precision – it was only a matter of hours when after moving the memorial, a cyber war broke out and Estonian’s online existence was under attack from Russia and clearly was put into a serious test. Cyber-attacks are a new means of warfare and Estonia’s example clearly serves a warning sign especially because Estonian state and private companies rely heavily on the flawless functioning of internet connection.
Before 2007, the term ‘cyber’ did not have a clear meaning and attention that was paid to this field was poor or non-existant. Cyber-security could have been to building a house – you build a house, a fence, lock the door i order to to be sure everything is safe inside and then your house lights up on fire. That made Estonian government, after being the first country to fall victim to one country attacking another over the internet to rethink their cyber security as they firmly believed that the first inter-state cyber wars had had begun as it seriously interrupted commerce and day-to-day functions. After, when the cyber-terrorism stopped, the everyday life of people was disturbed for several days. According to John Negroponte, former deputy U.S. secretary of state, “Cyber terrorism is becoming an increasing concern as familiarity with these technologies grows and more and more actors get involved in information technology”. (FT, 18.05; TIME Magazine, 31.05). Read more about the cyber-attacks in Estonia: Hackers Take Down the Most Wired Country in Europe
Cyber-attacks have not been only against nation states but companies as well. ‘2014 was a bad year for cyber-security’ – ‘Apple, Target, Ebay and Sony become victims of cyber theft’ (Eandt.theiet.org, 2015). In Sony case, the leakage of the movies and disclosure of the sensitive employee information has caused a serious loss in the revenue and Sony’s both, current and potential customers are more likely to question purchasing Sony products. Those doubts can have drastic impact on Sony company in long-term (WIRED and Normal?, 2015).
Mr Francis Maude has said that the Internet is a wonderful thing; it has driven economic growth and prosperity and it improves people’s lives. We only have a problem with cyber-attacks because of something incredibly positive’’ (Diplomaatia.ee, 2015). Indeed, Internet is an incredibly wonderful thing and it has helped the human kind in many ways. But in ordet to not let the Internet become a serious weapon, different actions have been taken to protect countries and organisations against cyber-terrorism. For example the creation of NATO cooperative Cyber Defence Centre of Excellence (CCD COE) in Tallinn has a mission to ‘’to enhance capability, cooperation and information sharing among NATO, its member nations and partners in cyber defence by virtue of education, research and development, lessons learned and consultation’’ (CCDCOE, 2015). CyCon is another example of international Conference on Cyber Conflict which focuses on ‘’ ‘cyber power’ as one of the core elements of relations between different stakeholders and will discuss how the traditional concept of ‘power’ applies to cyberspace’’ (Ccdcoe.org, 2015). These are just two examples but there is more – INCYDER, ‘’The Tallinn Manual’’, Locked shields and a field for cyber-exercises. These examples are coming from Estonia but there many more worldwide. Cars that people use every day around the world, kill thousands of people every year; but it does not mean that people would not use them anymore – we are just trying to build them to be more safe.
Bibliography:
CCDCOE, (2015). CCDCOE. [online] Available at: https://ccdcoe.org/ [Accessed 19 Oct. 2015].
CCDCOE, (2014). INCYDER. [online] Available at: https://ccdcoe.org/incyder.html [Accessed 19 Oct. 2015].
COE, N. (2013). Tallinn Manual. [online] Issuu. Available at: http://issuu.com/nato_ccd_coe/docs/tallinnmanual?e=0/1803379#search [Accessed 18 Oct. 2015].
Eandt.theiet.org, (2015). Cyber-security: organisations vulnerable to new swathe of attacks in 2015 – E & T Magazine. [online] Available at: http://eandt.theiet.org/magazine/2015/01/special-report-cyber-security.cfm [Accessed 19 Oct. 2015].
Nato.int, (2015). NATO Topics – NATO and the Scourge of Terrorism. [online] Available at: http://www.nato.int/terrorism/five.htm [Accessed 18 Oct. 2015].
Nytimes.com, (2015). Inside Terrorism. [online] Available at: http://www.nytimes.com/books/first/h/hoffman-terrorism.html [Accessed 18 Oct. 2015].
SearchSecurity, (2015). What is cyberterrorism? – Definition from WhatIs.com. [online] Available at: http://searchsecurity.techtarget.com/definition/cyberterrorism [Accessed 18 Oct. 2015].
The Economist, (2007). A cyber-riot. [online] Available at: http://www.economist.com/node/9163598 [Accessed 18 Oct. 2015].
Click to access cyber_attacks.pdf