Page 101 - Cyber Terrorism and Extremism as Threat to Critical Infrastructure Protection
P. 101

METODI HADJI-JANEV:  HYPER THREATS TO CRITICAL INFRASTRUCTURES IN THE REGION OF SOUTH-EASTERN EUROPE:
                        A WAKE-UP CALL FOR SOUTH-EASTERN EUROPEAN LEADERSHIP

            launch an armed attack, in terms of the means to launch such an attack, and in terms of the
            priority to protect the potential target. This “hack” did not just challenge operational wisdom,
            but also created shockwaves inside the legal community.

            The threat from terrorists is already here and is evolving from external threats to an internal
            threat. It is well-established among the academic, pundit and intelligence community that
            SEE has emerged as a battleground for radical militant Islamism. Both anecdotal and em-
            pirical evidence confirm this thesis (Bodansky, 2001). The bomb attack on a police station
            in the central Bosnian town of Bugojno in June 2010 (BBC, 2010), the 2011 attack on the
            US Embassy in Bosnia (Alic, 2011), the 2012 attack and murder of 5 civilians in Macedonia
            (Dimitrioska, 2012), and the 2012 attack on Israeli tourists in Bulgaria (BBC, 2012), along
            with numerous reports of prevented attacks or arrests (e.g. in Bosnia, Serbia, Croatia, Kosovo,
            or Cyprus) (Hadji-Janev, 2012), confirm that the threat from these adversaries is real. Recent
            trends in the active support of radical Islamic groups in the Syrian resistance, however, have
            shown that the threat has changed from imported to home-grown. Furthermore, the growing
            amount of internet-based recruitment for these supports, along with the alleged on-line radi-
            calization prior to the aforementioned attacks and attacks around the globe connected with the
            region, raise serious concerns over terrorist use of cyberspace in the region of SEE.

            The threat vectors are evolving. The means to launch an attack and endanger CI and CII are
            rapidly changing. As an example, the history of using unmanned aerial vehicles (UAV) is
            astonishing. According to O’Donnell, the earliest recorded use of a UAV dates back to 1849,
            when the Austrians attacked the Italian city of Venice using unmanned balloons which were
            loaded with explosives (O’Donnell, 2019). Fast-forward to the aftermath of 9/11, and the CIA
            began flying armed drones over Afghanistan as part of the war against the Taliban. The first
            CIA drone-based kill operation took place in February 2002, when an unmanned Predator
            drone was used to target a suspect thought to be Osama bin Laden (Dormehl, 2018). Soon,
            however, these exclusive “gadgets” were commercially available and began to pose security
            implications. The region of SEE is not unfamiliar with the potential security implications of
            UAVs. The advancement and proliferation of public-use UAVs are much more complicated
            than that which SEE countries witnessed during the football incident between Serbia and Al-
            bania (Ames, 2014). Today UAV has become more readily available and more sophisticated,
            supporting new capabilities such as increased data collection and autonomous behaviour. Ac-
            cording to a RAND think-tank study, UAVs are reshaping the cybersecurity world in two key
            ways: “Firstly, UAS [referring to UAV as systems so using UAS instead of UAV – author]
            present a new kind of critical cybersecurity target. Critical law enforcement or data collection
            missions using UAS could be undermined by cyber attacks on these platforms. Secondly,
            UAS in the hands of adversaries could present novel avenues for cyber attacks, with the UAS
            themselves serving as “cyber weapons” intended to deliver malicious content or enable ki-
            netic impacts” (Best et al., 2020).

            The point of this analysis is to emphasize that the threat from UAVs is only one example of
            how threat vectors can vary and endanger CI and CII. Threats to CII do not exclusively come
            from cyberspace. The Stuxnet computer worm attack on an Iranian nuclear power plant will
            definitely rewrite the cyber terrorism playbook (Chery, 2010). In this context, David Geer
            offered statistical arguments clearly speaking of the increased physical danger risks of cyber
            terrorism (Geer, 2014). If the story about “Operation Orchard” by Erich Follath and Holger
            Stark, published in Spiegel, in 2009 is true, then it is clear why denying the terrorist threat



                                                                                    101
   96   97   98   99   100   101   102   103   104   105   106