Law 897: Cyberterrorism

November 22, 2010 Class Assignment by Darin See

All of the footnotes in this assignment contain references to material that need not be read, or sources for optional reading and viewing.


What is Cyberterrorism?

It is often said that the person who "defines the issue wins the debate" -- and definitions of cyberterrorism enjoy considerable variance.1 So what is the debate about? And why isn't the definition of cyberterrorism just an economical way of saying "terrorism that happens on the internet"? Please consider the following definitions:

Please adopt a definition (or define cyberterrorism yourself), and be able to explain why your favored definition makes the most sense. Would the following scenarios qualify as cyberterrorism under your definition? Should they?

What are the Tools and what are the Vulnerabilities?

This is a picture, taken from a video of a generator that has been destroyed as part of a controlled cybersecurity test. A great amount of white smoke or steam can be seen emanating from the center of the generator.  The generator itself appears to be the size of a small bus.

Power generator being destroyed in cybersecurity test.
Image by U.S. Department of Homeland Security.
(Originally appears at NOC Designs)


Some of the scariest cyberterrorism scenarios involve skilled hackers who would take over critical infrastructures like power stations by compromising the SCADA ("Supervisory Control and Data Acquisition") software that controls them. Hacking, however, isn't necessarily required. Viruses are also capable of shutting down critical services -- even those that run on private networks, unconnected to the internet.6 Services that are connected to the internet are vulnerable to collapse via denial of service attacks. The two million computers in the U.S. that are controlled by one strain or another of botnet software7 are capable of delivering distributed denial of service attacks on an unprecedented scale.8

Is the Threat of Cyberterrorism Exaggerated?14

One thing that most commentators agree on is that the United States has yet to be victimized by an act of cyberterrorism.15 So what is there to be worried about? Joshua Green, an editor of The Washington Monthly, suggests that "[t]here are many ways terrorists can kill you--computers aren't one of them."16 Please consider the links below, and adopt a point of view as to whether or not the threat of cyberterrorism has been exaggerated.

So, what is the Solution?

This image is a political cartoon. It asks the question: what will the warrior-guardian of the future look like? A drawing of an enormous, muscular soldier, laden with all manner of technology and weaponry, stands tall over a drawing of a tiny computer nerd, sitting with his feet on his desk and a laptop on his lap. On his desk, a sign reads: Cyber Security. The computer nerd, answering the cartoon's question, says: Yo! Dude. Back here.

Cartoon by Kevin Kallagher.
(www.kaltoons.com)


In a line from his Memoirs of the life and writings of Benjamin Franklin that has been paraphrased many times in the last decade, Mr. Franklin states that "[t]hey who can give up essential liberty to obtain a little temporary safety, deserve neither liberty nor safety."17 How would you balance liberty and safety, or liberty and security, in order to address cyberterrorism? Do any of the solutions address cyberterrorism as you've defined it? Is there no problem at all?



Back to Law 897 Syllabus

  1. Mohammad Iqbal, Defining Cyberterrorism, 22 J. Marshall J. Computer & Info. L. 397 [back]
  2. Cyberterrorism - Fact or Fancy?, Mark M. Pollitt, FBI Laboratory. [back]
  3. Bruce Schneier's blog post on Cyberwar includes suggested definitions for cyberwar, cyberterrorim, cybercrime, and cybervandalism. [back]
  4. James A. Lewis, Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats, Center for Strategic and International Studies. [back]
  5. For this and other cyberterrorism scenarios, see Barry Collin, The Future of Cyberterrorism, Crime and Justice International. The plausibility of Mr. Collin's example is also quoted in Dorothy Denning's Activism, Hackivism, and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy at 44. [back]
  6. Kevin Poulsen, Slammer worm crashed Ohio nuke plant network, Security Focus. [back]
  7. Two million US PCs recruited to botnet, BBC News. Wikipedia's "botnet" entry provides a thorough look at what botnets are, how they work, and how they can turn a profit for their owners (by renting the services of the botnet to a spammer... or others). [back]
  8. Scott Berinato, Attack of the Bots, Wired Magazine. [back]
  9. For more, see Frank Dickman's Hacking the Industrial Network in Industry Week. [back]
  10. For example, Bruce Schneier's blog posting, The Risks of Cyberterrorism. [back]
  11. If you're interested, you can read Mr. Boden's appeal before the Supreme Court of Queensland, Australia. [back]
  12. Military and Cyber-Defense: Reactions to the Threat; DoD News Briefing, Thursday, April 16, 1998; Issues in Terrorism and Homeland Security: Selections from CQ; U.S. Electrical Grid Compromised? [back]
  13. You can learn more about Stuxnet at Bruce Schnier's blog which contains an unedited copy of an article he wrote for Forbes magazine on the topic. [back]
  14. This title borrows from a debate entitled "The Cyber War Threat has been Grossly Exaggerated?" The debate has much to add to a conversation about cyberterrorism, and includes an all-star panel: Marc Rotenberg, Bruce Schneier, Mike McConnell, and Jonathan Zittrain. You can see or hear the debate at Intelligence Squared US. [back]
  15. For example, Susan W. Brenner, Marc D. Goodman, In Defense of Cyberterrorism: An Argument for Anticipating Cyber-Attacks, U. Ill. J.L. Tech. & Pol'y, Spring 2002, 44. [back]
  16. Joshua Green, The Myth of Cyberterrorism, The Washington Monthly. [back]
  17. Memoirs of the life and writings of Benjamin Franklin [back]
  18. Kieren McCarthy, US government rescinds 'leave internet alone' policy, The Register. [back]
  19. S.773 Cybersecurity Act of 2009 [back]
  20. See page 8 of the Clean Slate Project's whitepaper for more. [back]