A New Front: Cyber Crime and Warfare in the Digital Age

This article, titled “Cybercrime, Cyberweapons, and Cyber Wars: Is There Too Much of It in the Air?” discusses how the capabilities of criminals and terrorists has evolved with the advent of increased online traffic. Criminals can produce and/or sell fake documents, malware, credit card and bank information, bulletproof web hosting, and hacking services such as DDoS attacks and bot spamming for a relatively low cost. And they still make a huge profit because the market for those things has expanded so greatly.

The use of malware and hacking techniques is not limited to the criminal underbelly of the internet. In fact, law enforcement and counter-terrorist forces have had to don the black hat in order to prevent so-called “cyber-terrorist” attacks. These attacks are easy to launch with very little skill in computer programming– in fact, according to the article, they can be waged with little more than the malware available on a petty cyber-criminal’s website. Even so, counter-cyber-terrorists seem to be one step behind their adversaries, and the effects of their efforts have been mostly negative for the general populace. Violations of privacy and freedom of information by intelligence agencies in its attempts to combat terrorism have become more and more popular in the news, especially following the Snowden leaks.

One thought on “A New Front: Cyber Crime and Warfare in the Digital Age

  1. I have to agree with your summary (the linked article is broken). The fact that terrorist can communicate in secret over vast distances effectively through technologies such as the internet and mobile cell network has greatly increased their success rate and ability to mobilize.
    I also think it’s a growing concern on the vulnerability of the physical utilities such as internet and electric to cyber warfare: The Cyber Emergency Response Team stated that of the 198 cyber incidents in 2012 on “critical infrastructure”, 41% was targeted at the energy sector, which could potentially shoot us into the dark ages of the Pony Express during a time of crisis if one of these attacks were successful.

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>