Tytuł artykułu
Autorzy
Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Języki publikacji
Abstrakty
There are numerous documents, books, and several publications with different approaches to describing what cyberterrorism is or attempting to unify its meaning since Barry Collin* first used this concept in 1980. Until now, this concept has been interpreted differently. If we ask someone who knows how to use a technological device that can connect to the internet network, what is cyberterrorism? They will give us the same description. Different groups of people use different vocabulary as there is no exact definition of what cyberterrorism is. Nevertheless, they express the same basic facts that are associated with their minds. This document will not attempt to define what cyberterrorism is, however, it will mention some concepts. We will focus on how terrorist groups will use cyberspace as a force multiplier to increase their capabilities. We will also cover terrorist information gathering techniques, how future attacks are prepared, how operations are planned, and how attacks are executed.
Odkąd w 1980 roku Barry Collin po raz pierwszy użył terminu „cyberterroryzm”, wielu badaczy podejmowało próby zdefiniowania tego pojęcia oraz ujednolicenia jego znaczenia. Dotychczas nie stworzono precyzyjnej definicji cyberterroryzmu. Jeśli zapytamy osoby korzystające z urządzenia połączonego z Internetem, co to jest cyberterroryzm, zapewne otrzymamy podobne odpowiedzi, chociaż różne grupy ludzi do opisu tego zjawiska użyją różnych słów. Zwrócą uwagę jednak na te same podstawowe elementy. W artykule nie podano precyzyjnej definicji cyberterroryzmu, lecz skupiono się na kilku związanych z nim konceptach: na wykorzystywaniu przez terrorystów cyberprzestrzeni do zwiększania możliwości oddziaływania na ludzi, na stosowanych przez terrorystów technikach zbierania informacji, a także na przygotowywaniu ataków i planowaniu operacji terrorystycznych oraz sposobach ich przeprowadzania.
Wydawca
Czasopismo
Rocznik
Tom
Strony
55--82
Opis fizyczny
Bibliogr. 38 poz., rys., tab., wykr.
Twórcy
autor
- National Assembly, Panama, Republic of Panama
Bibliografia
- 1. Appazov, A., Legal Aspects of Cybersecurity. Faculty of Law University of Copenhagen, 2014.
- 2. Ball, T., “Top 5 critical infrastructure cyberattacks.” Computer Business Review, July 18, 2017.
- 3. Brenner, S.W., Cyber Threats: The Emerging Fault Lines of the Nation State. New York, Oxford University Press, 2009.
- 4. Brunst, P.W., “Chapter 2. Terrorism and the Internet: New Threats Posed by Cyberterrorism and Terrorist Use of the Internet.” October 15, 2009.
- 5. Carr, J., Inside Cyber Warfare. O’Reilly Media, Inc., 2012.
- 6. Celeski, J., “A Way Forward for Special Operations Theory and Strategic Art.” Joint Special Operations University SOF-Power Workshop, MacDill Air Force Base, August 2011.
- 7. Clarke, R. A. and Knake, R.K., Cyber War: The Next Threat to National Security and What to do About it. New York, Ecco, 2010.
- 8. Denning, D. E., Testimony Before the Special Oversight Panel on Terrorism, Committee on Armed Services, U.S. House of Representatives. 105 Cong. Georgetown University, May 23, 2000.
- 9. Freeman, M., and Rothstein, H., Gangs and Guerrillas: Ideas from Counterinsurgency and Counterterrorism. Monterey, CA: Naval Postgraduate School, April 2014.
- 10. Hoffman, D. E., “CIA slipped bugs to Soviets.” Washington Post, February 27, 2004.
- 11. Kuehl, D. T., Cyberpower and National Security. National Defense University Press, Washington, D.C., 2009.
- 12. Lichty, P., Variant Analyses Interrogations of New Media Art and Culture. Amsterdam: Institute of Network Cultures, 2013.
- 13. Lonsdale, D. J., The Nature of War in the Information Age: Clausewitzian Future. London, Frank Cass, 2005.
- 14. McRaven, W. H., Spec Ops, Case Studies in Special Operations Warfare: Theory and Practice. New York: Random House, 1995.
- 15. Rattray, G. J., “An Environmental Approach to Understanding Cyberpower,” in Cyberpower and National Security, Franklin D. Kramer. Stuart H. Starr and Larry K. Wentz, eds. Dullas, VA, Potomac Books, 2009.
- 16. Sanchez, L. and Korunka. “Applying Irregular Warfare Principles to Cyber Warfare.” JFQ, 92, 2019.
- 17. Schreier, F., “On Cyberwarfare.” DCAF Horizon 2015 Working Paper, No. 7.
- 18. Siboni, G., Cyberspace and National Security. Institute for National Security Studies, June 2013.
- 19. de Silva, E., National Security and Counterintelligence in the Era of Cyber Espionage. University of Leicester, UK & Virginia Research Institute, USA.
- 20. Weimann, G., “The Psychology of Mass-Mediated Terrorism.” American Behavioral Scientist, Vol. 52, No. 1, September 2008.
- 21. Weimann, G., New Terrorism and New Media. Washington, DC, Commons Lab of the Woodrow Wilson International Center for Scholar, 2014.
- 22. Weimann, G., Terrorism in Cyberspace: The Next Generation. New York, NY: Columbia University Press/Washington, DC: Woodrow Wilson Center Press, 2015.
- 23. Weimann, G., Terror on the Internet: The New Arena, the New Challenges. Washington: United States Institute of Peace Press, 2006.
- 24. Wilson, C., “Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress.” Congressional Research Service Report for Congress, January 29, 2008.
- 25. Wilson, G., “The Mystic Diamond: Applying the Diamond Model of Counter Insurgency in the Philippines,” in Gangs and Guerrillas: Ideas from Counterinsurgency and Counterterrorism, ed.
- 26. Cyberspace Operations. Joint Publication 3-12 (R), Washington, DC: The Joint Staff, February 5, 2013.
- 27. Cyber War Also Rages in MidEast. The Associated Press, October 28, 2000.
- 28. Department of Homeland Security. “Terrorist Use of Social Networking Facebook Case Study.” Public Intelligence, December 5, 2010. http://publicintelligence.net/ufouoles-dhs-terrorist-use-of-social-networking-facebook-case-study. Retrieved February 10, 2014.
- 29. Department of Defense Dictionary of Military and Associated Terms. Joint Publication 1-02, November 8, 2010.
- 30. Deputy Chief of Staff for Intelligence, Asst. Deputy Chief of Staff for Intelligence - Threats, US Army Training and Doctrine Command. Cyber Operations and Cyber Terrorism. Handbook No. 1.02, Fort Leavenworth, KS, August 15, 2005.
- 31. “Examining the Cyber Capabilities of Islamic Terrorist Groups.” Institute for Security Technology Studies at Dartmouth College, Technical Analysis Group, March 2004.
- 32. “Terrorism and Insurgency Intelligence Centre.” Jane’s, June 21, 2015, database.
- 33. The White House, Office of the Press Secretary, Executive Order - Improving Critical Infrastructure Cybersecurity, February 12, 2013. https://www.whitehouse.gov/the-press-office/2013/02/12/executive-order-improving-critical-infrastructure-cybersecurity/.
- 34. The Jamestown Foundation. “Energy Security and the PKK Threat to the Baku-Tbilisi-Ceyhan Pipeline.” Terrorism Monitor, Vol. 6, Issue 18, September 22, 2008.
- 35. “The Use of The Internet for Terrorist Purposes.” United Nations Office on Drugs and Crime. New York, 2012.
- 36. “Yugoslavia: Serb Hackers Reportedly Disrupt US Military Computer.” Bosnian Serb News Agency SRNA, March 28, 1999.
- 37. http://www.businessdictionary.com/definition/narrowcasting.html/.
- 38. https://www.statista.com/statistics/264810/number-of-monthly-active-facebook-users-worldwide/.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-571033e3-52db-4b4c-a980-b6c6ade7ecad