Cyber-Apocalypse Now: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
 
(2 intermediate revisions by the same user not shown)
Line 10: Line 10:
==Categorization==
==Categorization==


Issues: [[Public Critical Infrastructure]], [[Terrorists]], [[Private Critical Infrastructure]], [[International Law (including Laws of War)]], [[Security Components of Classic Cyberissues (e.g. IP)]]
Issues: [[International Law (including Laws of War)]]; [[Private Critical Infrastructure]]; [[Public Critical Infrastructure]]; [[Security Components of Classic Cyberissues (e.g. IP)]]; [[Terrorists]]


==Key Words==  
==Key Words==  


[http://cyber.law.harvard.edu/cybersecurity/Glossary_of_Core_Ideas#Cyber_Terrorism Cyber Terrorism]
[http://cyber.law.harvard.edu/cybersecurity/Glossary_of_Core_Ideas#Cyber_Terrorism Cyber Terrorism],
[http://cyber.law.harvard.edu/cybersecurity/Glossary_of_Core_Ideas#Laws_of_War Laws of War]
[http://cyber.law.harvard.edu/cybersecurity/Glossary_of_Core_Ideas#Laws_of_War Laws of War],
[http://cyber.law.harvard.edu/cybersecurity/Glossary_of_Core_Ideas#State_Affiliation State Affiliation]
[http://cyber.law.harvard.edu/cybersecurity/Glossary_of_Core_Ideas#State_Affiliation State Affiliation]


==Synopsis==
==Synopsis==


Cyberterrorism has become one of the most significant threats to the national and international security of the  
Cyberterrorism has become one of the most significant threats to the national and international security of the modern state, and cyberattacks are occurring with increased frequency. The Internet not only makes it easier for terrorists to communicate, organize terrorist cells, share information, plan attacks, and recruit others but also is increasingly being used to commit cyberterrorist acts. It is clear that the international community may only ignore cyberterrorism at its peril.  
modern state, and cyberattacks are occurring with increased frequency. The Internet not only makes it easier for  
terrorists to communicate, organize terrorist cells, share information, plan attacks, and recruit others but also is in-
creasingly being used to commit cyberterrorist acts. It is clear that the international community may only ignore  
cyberterrorism at its peril.
 
The primary security threat posed by the Internet is caused by an inherent weakness in the TCP/IP Protocol,
which is the technology underlying the structure of the Internet and other similar networks. This underlying struc-
ture enables cyberterrorists to hack into one system and use it as a springboard for jumping onto any other network
that is also based on the TCP/IP Protocol. Other threats to national and international security include direct at-
tacks on the Internet and the use of the Internet as a free source of hacking tools. These threats will not be eradic-
ated easily.  


In the absence of feasible prevention, deterrence of cyberterrorism may be the best alternative. Without, at a  
The primary security threat posed by the Internet is caused by an inherent weakness in the TCP/IP Protocol, which is the technology underlying the structure of the Internet and other similar networks. This underlying structure enables cyberterrorists to hack into one system and use it as a springboard for jumping onto any other network that is also based on the TCP/IP Protocol. Other threats to national and international security include direct attacks on the Internet and the use of the Internet as a free source of hacking tools. These threats will not be eradicated easily.  
minimum, a concerted effort at deterrence, cyberterrorism will continue to threaten national and international se-
curity. The most feasible way to deter cyberterrorists is tuniversal jurisdiction.  


In the absence of feasible prevention, deterrence of cyberterrorism may be the best alternative. Without, at a minimum, a concerted effort at deterrence, cyberterrorism will continue to threaten national and international security. The most feasible way to deter cyberterrorists is tuniversal jurisdiction.


==Additional Notes and Highlights==
==Additional Notes and Highlights==

Latest revision as of 09:54, 17 June 2010

Full Title of Reference

Cyber-Apocalypse Now - Securing the Internet Against Cyberterrorism and Using Universal Jurisdiction as a Deterrent

Full Citation

Kelly A. Gable, Cyber-Apocalypse Now - Securing the Internet Against Cyberterrorism and Using Universal Jurisdiction as a Deterrent, Vanderbilt Journal of Transnational Law, Vol. 43, No. 1 (2010). SSRN

BibTeX

Categorization

Issues: International Law (including Laws of War); Private Critical Infrastructure; Public Critical Infrastructure; Security Components of Classic Cyberissues (e.g. IP); Terrorists

Key Words

Cyber Terrorism, Laws of War, State Affiliation

Synopsis

Cyberterrorism has become one of the most significant threats to the national and international security of the modern state, and cyberattacks are occurring with increased frequency. The Internet not only makes it easier for terrorists to communicate, organize terrorist cells, share information, plan attacks, and recruit others but also is increasingly being used to commit cyberterrorist acts. It is clear that the international community may only ignore cyberterrorism at its peril.

The primary security threat posed by the Internet is caused by an inherent weakness in the TCP/IP Protocol, which is the technology underlying the structure of the Internet and other similar networks. This underlying structure enables cyberterrorists to hack into one system and use it as a springboard for jumping onto any other network that is also based on the TCP/IP Protocol. Other threats to national and international security include direct attacks on the Internet and the use of the Internet as a free source of hacking tools. These threats will not be eradicated easily.

In the absence of feasible prevention, deterrence of cyberterrorism may be the best alternative. Without, at a minimum, a concerted effort at deterrence, cyberterrorism will continue to threaten national and international security. The most feasible way to deter cyberterrorists is tuniversal jurisdiction.

Additional Notes and Highlights