Page 152 - Cyber Terrorism and Extremism as Threat to Critical Infrastructure Protection
P. 152

SECTION II:  CYBER TERRORISM AND SECURITY IMPLICATION FOR CRITICAL INFRASTRUCTURE PROTECTION

        subtle as to improve governments’ intelligence-gathering capabilities and develop ability to
        surreptitiously manipulate markets, and they will continue to expand the definition and rules
        of engagement for cyberattacks.

        The term “cyber attack” was first presented by author William Gibson in 1982, when he
        wrote his book “Neuromance”.  This book become  very popular because  it manages  to
        explain today’s virtual reality and network information activity to readers in a practical and
        constructive way. William Gibson defined “cyberspace” in a very simple way as a constructed
        virtual environment in which information or computer systems and networks have a dominant
        or primary role (Wall, 2007: pp.221-223).

        The term “cybercrime” further symbolizes the security threats that come from the internet,
        actually  through information  and communication  networks and systems.  These security
        threats from the virtual information environment represent a breach of computer security. As
        we must legally define the term “security of computer” or “information systems”, then the

        term “cybercrime” falls within the scope of criminal law. Cyber  warfare, as a new model of
        proxy war, represents the future of modern warfare.

        “Proxy” means giving someone authority to do something for another.  For example: Small
        states uses proxy strategy to attack their stronger enemy, because they have comprehensive
        support from bigger state. States use proxies to project  power through cyberspace,  some
        capable of causing significant harm. In recent years, media outlets have published reports
        about proxies using Information and Communications Technologies (ICTs) from Northeast
        Asia to India, Pakistan, Middle East, and Eastern Europe (Maurer, 2016: pp 383-384).

        The continual development  of modern computer systems and networks means that they
        represent a continual proxy strategy for conducting modern cyber attacks. The high level of
        autonomy of computer systems and networks enables them to build an effective proxy warfare
        strategy in which the performer of this information operations is always at an advantage over
        the attacked side. On the other hand, implementing a proxy strategy of warfare over computer
        networks is a much simpler method than using sophisticated weaponry to perform the most
        advanced military operations. Vast classical armies are no longer an integral part of proxy
        warfare, the continued development of information technology is a necessity for executing a
        proxy strategy in cyber warfare, which as a mode of combat is increasingly a major segment
        of modern conflict, such as hybrid and comprehensive or compound warfare.

        Attacks on critical infrastructure most often include: public gatherings, hospitals, shopping
        malls, infrastructures of strategic importance to national security, airports and other strategic
        facilities of the state, and through the vulnerability of their information and communication
        networks, the enemy can achieve a far more effective attack than by using large armed forces
        in which casualties could be numerous. In cyber warfare, where there is no use of military
        force, the attacker does not have casualties.

        The Centre for Strategic and International Studies (CSIS) estimated that between May 2006
        and June 2011 there were almost eighty “significant cyber incidents” that resulted in

        ”successful attacks on government agencies, defence and high tech companies or economic
        crimes with losses of a few million dollars” (Hopkins, 2012).



       152
   147   148   149   150   151   152   153   154   155   156   157