Policing Cyber Hate, Cyber Threats and Cyber Terrorism by Blakemore Brian;Awan Imran;
Author:Blakemore, Brian;Awan, Imran;
Language: eng
Format: epub
Publisher: Taylor & Francis Group
Published: 2012-08-15T00:00:00+00:00
Global Cyber Attacks
Cyber terrorism has become an international legislative issue which requires countries to pursue cyber terrorist acts via their own traditional modes of legal practice as well as using cyber crimes to prosecute those involved. However, as countries begin to understand the nature and threat of cyber terrorism they have also begun using a broad range of multifaceted agreements and protocols that allows member states to take the necessary measures to ensure anyone who illegally accesses information and interferes with computer data has committed an offence (EU Council Framework Decision on Attacks against Information Systems, Article 2 and Article 4). This form of partnership work has led to the Budapest Convention on Cybercrime (2001) which is a broad and comprehensive treaty that deals with ICT related crime and cyber crimes in general by making member states have national legislation in place that will help tackle the cyber threat. One of the key objectives of the convention is prosecuting those involved in cyber hate crimes (see Chapter 5), generic cyber threats that include wider terrorist use of the Internet (see Chapter 9 on national security strategies for more detail) (Council of Europe 2001).
Moreover the EU Council Framework Decision on Combating Terrorism under Article 1 states that all member states must work together where a cyber attack has taken place. A cyber attack in this context has to be one that seriously intimidates a population or seriously destabilises a constitution â the paradox being that there is still no universal definition of the term cyber terrorism (Wykes and Harcus 2010; see Chapter 2 for further discussion on the meaning of cyber terrorism).
In May 2007, Estonia came under siege for almost 3 weeks from hackers using sophisticated modes of technology. They were able to deface and cripple a number of governmental, financial and political websites. This attack is not the first of its kind as similar incidents of cyber attacks have taken place against different countries. However, such cyber attacks do highlight the vulnerability of countries to computer-based crime and is one the reasons for national agreements (discussed below). The attacks in this case were political in nature and came to the surface when a war memorial to the Red Army was removed from the capital by the government (Traynor 2007).
The extent of the damage caused in Estonia and the reverberations of the consequences for the international community meant there was a need for further international agreements that protect countries against similar cyber attacks. The hackers in this case redirected users of the government sites to powerful graphic and visual images of Soviet soldiers in war battle lines and also left quotations and speeches from Martin Lurthur King. The images and speeches also acted as a motivational tool for the demonstrators giving them hope, trust and confidence. Before this incident, the Estonian government had invested heavily in protecting itself from such cyber attacks. It had mechanisms which, it argued, could combat this threat. For example an Information Computer Technology infrastructure in place
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Anthropology | Archaeology |
Philosophy | Politics & Government |
Social Sciences | Sociology |
Women's Studies |
Cecilia; Or, Memoirs of an Heiress — Volume 1 by Fanny Burney(31837)
Cecilia; Or, Memoirs of an Heiress — Volume 3 by Fanny Burney(31288)
Cecilia; Or, Memoirs of an Heiress — Volume 2 by Fanny Burney(31238)
The Great Music City by Andrea Baker(30218)
We're Going to Need More Wine by Gabrielle Union(18453)
All the Missing Girls by Megan Miranda(14023)
Pimp by Iceberg Slim(13514)
Bombshells: Glamour Girls of a Lifetime by Sullivan Steve(13501)
Fifty Shades Freed by E L James(12760)
Talking to Strangers by Malcolm Gladwell(12590)
Norse Mythology by Gaiman Neil(12524)
For the Love of Europe by Rick Steves(9679)
Crazy Rich Asians by Kevin Kwan(8705)
Mindhunter: Inside the FBI's Elite Serial Crime Unit by John E. Douglas & Mark Olshaker(8448)
The Lost Art of Listening by Michael P. Nichols(6937)
Enlightenment Now: The Case for Reason, Science, Humanism, and Progress by Steven Pinker(6715)
Bad Blood by John Carreyrou(6112)
The Four Agreements by Don Miguel Ruiz(6034)
Weapons of Math Destruction by Cathy O'Neil(5583)
