- citations in SCIndeks: [1]
- citations in CrossRef:[2]
- citations in Google Scholar:[
]
- visits in previous 30 days:14
- full-text downloads in 30 days:4
|
|
2016, vol. 58, iss. 2, pp. 206-222
|
Cyber terrorism and the use of the internet for terrorist purposes
Sajber terorizam i upotreba sajber prostora u terorističke svrhe
Abstract
Thousands of cyber attacks are executed on a daily basis, with larger or smaller intensity and with different consequences. Cyber attacks and cyber terrorism present the new threat for states and their security. Cyber attackers have already demonstrated capacities to endanger functioning of vital national infrastructure. The question is if the terrorists can do the same thing. Internet and computer systems have become powerful resource on which modern societies rely. Taking into account that infrastructure such are dams, electrical networks, financial sector and money transactions, civilian transport, military defense systems, depend on the computer systems, there is justified fear that cyber terrorists can provoke and disable functions of the attacked system and threaten people's lives by using cyber attacks. This kind of threat to the state cannot be ignored. Although these kinds of attacks have not occurred yet, there is a potential danger they may happen in the future. This paper also aims to point out the difference between cyber terrorism as the illegal act in the cyber space and the simple terrorist activities in cyber space by using the Internet and computers. Cyber terrorism is a global issue, therefore it requires a global solution.
Sažetak
Dnevno se izvrši na hiljade sajber napada, većeg ili manjeg intenziteta, sa različitim posledicama. Sajber napadi i sajber terorizam predstavljaju novu pretnju za državu i njenu bezbednosti. Sajber napadači su već demonstrirali svoje kapacitete da mogu da ugroze funkcionisanje sistema državnih nacionalnih infrastuktura i time dovedu u opasnost njihovu operativnost. Pitanje je da li to mogu da urade i teroristi. Internet i računarske mreže su moćan resurs na koji se savremeno društvo umnogome oslanja. Uzimajući u obzir da infrastrukture jedne države, poput brana, električnih mreža, finansijskih transakcija, transportnog saobraćaja, vojnih odbrambenih sistema, sve više oslanjaju svoj rad na računarske sisteme, postoji bojazan da bi sajber napad terorista ozbiljno poremetio funkcionisanje napadnutog sistema, doveo do oštećenja i ugrožavanje života. Ova pretnja po državu se ne sme zanemariti. Iako se do sada nije desio takav napad, postoji potencijalna opasnost da se u budućnosti ovakav scenario odigra. Rad takođe pokušava da podvuče razliku između sajber terorizma kao nelegalnog akta u sajber prostoru, od proste aktivnosti terorista za koju oni koriste internet i kompjutere. Sajber terorizam je globalni problem i stoga zahteva globalni odgovor.
|
|
|
References
|
|
Arthur, S. (2014) Chinese hackers suspected of interfering with US satellites. http://www.guardian.co.uk/technology/2011/oct/27/chinese-hacking-us-satellites-suspected, 5.9.2014
|
|
Caplan, N. (2013) Cyber war: The challenge to national security global security studies. Winter, Vol. 4, Issue 1, pp. 93-115
|
|
Center for Strategic and International Studies (1998) Cybercrime, cyberterrorism, cyberwarfare. Avertingand Electroinic Waterloo, https://cryptome.org/jya/cyber-trip.htm, 10.10.2015
|
|
Conway, M. (2005) The media and cyberterrorism: A study in the construction of reality. in: First International conference on Information Revolution and the changing face of International relations and security, 23-25. May 2005, Lucerne, Swiss, 12.9.2015, http://www.politicalavenue.com/PDF/MConwayTerrorism.pdf
|
|
Conway, M. (2006) Terrorist ‘use' of the Internet and fighting back. in: Conference Cyber safety: Safety and Security in a Networked World: Balancing Cyber-Rights and Responsibilities, Oxford Internet Institute (OII), Oxford University, UK, 8-10 September, 2006
|
|
Denning, D. (2001) Activism, hactivism, cyberterrorism, networks and netwars. RAND, https://www.rand.org/content/dam/rand/pubs/monographreports/MR1382/MR1382.ch8.pdf, 1.4.2015
|
|
Dobre, T., Meghean, K. (2015) Serious gaming: Instrument for addressing global threats. Bezbednost, Beograd, vol. 57, br. 2, str. 50-59
|
4
|
Gaćinović, R. (2012) Oblici savremenog terorizma. Nauka, bezbednost, policija, vol. 17, br. 1, str. 1-17
|
|
Gerce, M. (2010) Challenges in developing a legal response to terrorist use of the internet defence against terrorism. Review DATR, Vol. 3, No. 2, pp. 3, http://www.coedat.nato.int/publication/datr/volumes/datr6.pdf, 10.9.2015
|
|
Iklódy, G. (2010) The new strategic concept and the fight against terrorism: Challenges & opportunities defence against terrorism. Review DATR, 3(2), 3, http://www.coedat.nato.int/publication/datr/volume6/01The_New_Strategic_Concept_and_the_Fight_Against_Terrorism_Challenges&Opportunities.pdf, 1.9.2015
|
|
Imram, A. (2014) Debating the term cyber-terrorism: issues and problems. Internet Journal of criminology, dostupno 5., 2015; 10; http://www.internetjournalofcriminology.com/awan_debating_the_term_cyber-terrorism_ijc_jan_2014.pdf
|
|
Jonev, K., Hatidža, B. (2015) Sajber napad - izazov u izučavanju strategije i vojne strategije. in: Zbornik radova sa naučnog skupa Škole nacionalne odbrane, SORLOG, str. 167-176
|
5
|
Krivokapić, V. (2002) Terorizam kao oblik organizovanog kriminaliteta i mere suprotstavljanja. Bezbednost, Beograd, vol. 44, br. 5, str. 665-684
|
2
|
Lewis, J. (2002) Assessing the risks of cyber terrorism, cyber war and other cyber threats. Center for Strategic & International Studies, https://www.csis.org/analysis/assessing-risks-cyber-terrorism-cyber-war-and-other-cyber-threats, 13.5.2015
|
1
|
Mladenović, D.D., Jovanović, D.M., Drakulić, M.S. (2012) Tehnološki, vojni i društveni preduslovi primene sajber ratovanja. Vojnotehnički glasnik, vol. 60, br. 1, str. 70-98
|
|
Schjolberg, S. (2006) Terrorism in cyberspace-myth or reality?. in: NATO Advanced Research Workshop on Cyberterrorism, Sofia, Bulgaria, http://www.cybercrimelaw.net, 11.5.2014
|
22
|
Simeunović, D. (2009) Terorizam. Beograd: Pravni fakultet
|
|
Taliharm, A.M. (2010) Cyberterrorism in theory or in practice?. Defence Against Terorrism Review, 3(2), 59-74, http://www.coedat.nato.int/publication/datr/volume6/05Cyberterrorism_in_Theory_or_in_Practice.pdf, 1.9.2015
|
|
Tripathi, S. (2015) Cyber: Also a Domain of War and Terror. Strategic Analysis, 39(1): 1-8
|
|
Weimann, G. (2005) Cyberterrorism: The Sum of All Fears?. Studies in Conflict & Terrorism, 28(2): 129-149
|
|
|
|