Page 152 - Cyber Terrorism and Extremism as Threat to Critical Infrastructure Protection
P. 152
SECTION II: CYBER TERRORISM AND SECURITY IMPLICATION FOR CRITICAL INFRASTRUCTURE PROTECTION
subtle as to improve governments’ intelligence-gathering capabilities and develop ability to
surreptitiously manipulate markets, and they will continue to expand the definition and rules
of engagement for cyberattacks.
The term “cyber attack” was first presented by author William Gibson in 1982, when he
wrote his book “Neuromance”. This book become very popular because it manages to
explain today’s virtual reality and network information activity to readers in a practical and
constructive way. William Gibson defined “cyberspace” in a very simple way as a constructed
virtual environment in which information or computer systems and networks have a dominant
or primary role (Wall, 2007: pp.221-223).
The term “cybercrime” further symbolizes the security threats that come from the internet,
actually through information and communication networks and systems. These security
threats from the virtual information environment represent a breach of computer security. As
we must legally define the term “security of computer” or “information systems”, then the
term “cybercrime” falls within the scope of criminal law. Cyber warfare, as a new model of
proxy war, represents the future of modern warfare.
“Proxy” means giving someone authority to do something for another. For example: Small
states uses proxy strategy to attack their stronger enemy, because they have comprehensive
support from bigger state. States use proxies to project power through cyberspace, some
capable of causing significant harm. In recent years, media outlets have published reports
about proxies using Information and Communications Technologies (ICTs) from Northeast
Asia to India, Pakistan, Middle East, and Eastern Europe (Maurer, 2016: pp 383-384).
The continual development of modern computer systems and networks means that they
represent a continual proxy strategy for conducting modern cyber attacks. The high level of
autonomy of computer systems and networks enables them to build an effective proxy warfare
strategy in which the performer of this information operations is always at an advantage over
the attacked side. On the other hand, implementing a proxy strategy of warfare over computer
networks is a much simpler method than using sophisticated weaponry to perform the most
advanced military operations. Vast classical armies are no longer an integral part of proxy
warfare, the continued development of information technology is a necessity for executing a
proxy strategy in cyber warfare, which as a mode of combat is increasingly a major segment
of modern conflict, such as hybrid and comprehensive or compound warfare.
Attacks on critical infrastructure most often include: public gatherings, hospitals, shopping
malls, infrastructures of strategic importance to national security, airports and other strategic
facilities of the state, and through the vulnerability of their information and communication
networks, the enemy can achieve a far more effective attack than by using large armed forces
in which casualties could be numerous. In cyber warfare, where there is no use of military
force, the attacker does not have casualties.
The Centre for Strategic and International Studies (CSIS) estimated that between May 2006
and June 2011 there were almost eighty “significant cyber incidents” that resulted in
”successful attacks on government agencies, defence and high tech companies or economic
crimes with losses of a few million dollars” (Hopkins, 2012).
152