Homeland Security

Topics: Government Accountability Office, Terrorism, Technology Pages: 2 (342 words) Published: August 13, 2013
Read the Congressional Research Service, Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress then answer the following questions: * What do you think of the potential for cyberterrorism? Do you see it as potentially a greater threat than homegrown terrorism or terrorist use of WMD? Where does cyberterrorism rank, and what should we do about it?

Cyberterrorism is often associated with the use of malicious code. Cyberterrorism can also be defined as, politically motivated hacking operations intended to cause grave harm such as loss of life or severe economic damage (Denning, 2001). I believe the potential of cyberterrorism is an understatement as technology advances every day. We live in a technological age where we can control equipment and computers from remote locations. The internet allows people to control computers around the world thus increasing the need for individuals with high technological skills. With the increasing development of automated attack tools there has been an overwhelming concern over vital infrastructures and even economies. Another reason that cyberterrorism is a major potential is that cybercriminals have made deals with drug dealers in an effort to get the funds needed to fund and develop new automated attack tools.

I believe cyberterrorism is a much greater threat than homegrown terrorist or terrorist choosing to use a WMD as cyberattacks can shut down an entire countries economic infastrure and not contaminate the land, property, and citizens. It is also easier to track someone with a WMD as it would to track a cybercrime as those in which cybercrimes are committed against are unwilling to report the crimes (Government Accountability Act, 2003). Reference

Dorothy Denning, “Activism, Hactivism, and Cyberterrorism: The Internet as a tool forInfluencing Foreign Policy,” in John Arquilla and David Ronfeldt, eds., Networks andNetwars, (Rand 2001), p. 241. Dorothy Denning, Is Cyber War...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • homeland security history Essay
  • Maintaining Safety and Security Essay
  • Homeland Security Essay
  • Essay on Homeland Security
  • Evolution of Homeland Security Essay
  • homeland security and border patrol Essay
  • The Roles of Homeland Security Essay
  • Department of Homeland Security Essay

Become a StudyMode Member

Sign Up - It's Free