{"id":29384,"date":"2016-11-03T14:30:29","date_gmt":"2016-11-03T03:30:29","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=29384"},"modified":"2016-11-03T10:50:55","modified_gmt":"2016-11-02T23:50:55","slug":"cyber-terrorism-hyperbole-reality","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-terrorism-hyperbole-reality\/","title":{"rendered":"\u2018Cyber terrorism\u2019: hyperbole or reality?"},"content":{"rendered":"
<\/figure>\n

‘Cyber terrorism\u2019 is a catchy term, and appears to have resonated publicly because of the headline appeal<\/a> and the fear factor. To slap the word \u2018terrorism\u2019 on anything ratchets up the hyperbole and disproportionately escalates the sense of threat-related consequences. But is an \u2018e-bomb<\/a>\u2019 really terrorism or is it just hacking?<\/p>\n

It\u2019s certainly nothing new. Computer hacking has been happening since the early 1980s<\/a>\u2014since the widespread advent of computers. A teenager can hack an email account or a database but that doesn\u2019t make them a terrorist.<\/p>\n

Terrorists use whatever means available to generate fear. As a largely cyber-dependent society, it\u2019s only natural to assume that cyberspace will be used to achieve that aim in the future.<\/p>\n

It\u2019s apposite to explore the potential consequences of a terrorist action initiated within the cyber domain.<\/p>\n

At the recent ARPC\u2013OECD Global Terrorism Risk Insurance Conference in Canberra, Lloyds presented a case study, conducted in conjunction with Cambridge University, based on a catastrophic cyber-attack on the US power grid\u2014a highly vulnerable 40 year-old critical infrastructure system. An attack on infrastructure isn\u2019t nearly as visible as a bomb blast and may not result in instant fatalities, but modelling predicts the second- and third-order effects would be devastating. The Lloyds\u2013Cambridge study estimates a cyber-attack targeting the US power grid would result in a bill exceeding $US1 trillion in the most extreme case<\/a>.<\/p>\n

Such an attack is unlikely in the short-term but possible in the future. The 2016 Threat Report<\/a>\u00a0(PDF) recently released by the Australian Cyber Security Centre (ACSC) judges that we\u2019re still two or three years away from an attack that could be classed as \u2018cyber terrorism\u2019. Although it remains unclear how ACSC arrived at that time-frame, large-scale cyber-attacks against infrastructure are a realistic threat down the line.<\/p>\n

The main advantage of a cyber-attack is the absence of international borders. State and non-state actors can operate more covertly in the cyber domain and it can be a more favourable environment for an asymmetric actor. On the other hand, public attention is more important to terrorist organisations than technical complexity. Therefore, terrorists are less likely to expend precious resources on conducting a major attack in the non-physical domain.<\/p>\n

IS has proven highly adept at engaging with the cyber domain to inspire individuals, recruit foreign fighters and raise funds, but attacking a digital network is a whole different proposition.<\/p>\n

Although it could be assumed that global terrorist organisations have the intent to wage warfare via the cyber domain it seems they don\u2019t currently have the expertise or capability to do so. Hence why the cyber report predicts a two-to-three year timeframe.<\/p>\n

Lessons abound for Australian policy makers. When assessing future national security threats, it would be foolish to discount a large-scale cyber-attack with catastrophic consequences. It would be most dangerous if a cyber-attack targeting critical infrastructure or financial systems was conducted in conjunction with a physical attack using other capabilities. This combination of complex attacks would cause the government significant embarrassment, potentially paralyse strategic decision-making and result in a huge propaganda victory for the perpetrators.<\/p>\n

State actors are currently more likely to have the necessary intent, expertise and resources to conduct a cyber-attack of the magnitude alluded to in the ACSC report. We\u2019ve seen both China and Russia demonstrate such capability in recent times. But their preference has been for hacking rather than terrorism.<\/p>\n

In response to major cyber breaches on the Federal Parliament and Bureau of Meteorology, earlier this year Prime Minister Turnbull pledged $230 million<\/a> over four years to support the cyber security strategy<\/a>\u00a0(PDF). That\u2019s an appropriate and responsible investment for the future but it needs to be just the beginning.<\/p>\n

Some of Australia\u2019s critical infrastructure is exposed<\/a>, to include electricity, water and sewerage, as well as financial systems. We can\u2019t continue to bury our heads in the sand. Thorough risk assessments using a forward looking, systems-thinking approach are needed to secure our nation against future cyber contingencies.<\/p>\n

Information infrastructure needs to be further hardened and protected, and closer cyber security collaboration is required between government and the private sector.<\/p>\n

On balance, it seems pretty clear that we\u2019re not faced with a brand new threat under the banner of \u2018cyber terrorism\u2019. It\u2019s just terrorism executed via the cyber domain, the next phase of an evolving threat. So let\u2019s call it what it is, instead of walking a sensationalist road to nowhere.<\/p>\n","protected":false},"excerpt":{"rendered":"

‘Cyber terrorism\u2019 is a catchy term, and appears to have resonated publicly because of the headline appeal and the fear factor. To slap the word \u2018terrorism\u2019 on anything ratchets up the hyperbole and disproportionately escalates …<\/p>\n","protected":false},"author":549,"featured_media":29385,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[273,1395,391,895],"acf":[],"yoast_head":"\n\u2018Cyber terrorism\u2019: hyperbole or reality? | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-terrorism-hyperbole-reality\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u2018Cyber terrorism\u2019: hyperbole or reality? | The Strategist\" \/>\n<meta property=\"og:description\" content=\"‘Cyber terrorism\u2019 is a catchy term, and appears to have resonated publicly because of the headline appeal and the fear factor. To slap the word \u2018terrorism\u2019 on anything ratchets up the hyperbole and disproportionately escalates ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-terrorism-hyperbole-reality\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2016-11-03T03:30:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-11-02T23:50:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/11\/5936335464_b226b4e1ac_z.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"360\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ash Collingburn\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ash Collingburn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-terrorism-hyperbole-reality\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/11\/5936335464_b226b4e1ac_z.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/11\/5936335464_b226b4e1ac_z.jpg\",\"width\":640,\"height\":360},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-terrorism-hyperbole-reality\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-terrorism-hyperbole-reality\/\",\"name\":\"\u2018Cyber terrorism\u2019: hyperbole or reality? | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-terrorism-hyperbole-reality\/#primaryimage\"},\"datePublished\":\"2016-11-03T03:30:29+00:00\",\"dateModified\":\"2016-11-02T23:50:55+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/6a4d85e73234ef9c0a77a5e2a0a3370a\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-terrorism-hyperbole-reality\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-terrorism-hyperbole-reality\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-terrorism-hyperbole-reality\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u2018Cyber terrorism\u2019: hyperbole or reality?\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/6a4d85e73234ef9c0a77a5e2a0a3370a\",\"name\":\"Ash Collingburn\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/fca378264447dad4d3164f69e68bfdb8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/fca378264447dad4d3164f69e68bfdb8?s=96&d=mm&r=g\",\"caption\":\"Ash Collingburn\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/ash-collingburn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u2018Cyber terrorism\u2019: hyperbole or reality? | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-terrorism-hyperbole-reality\/","og_locale":"en_US","og_type":"article","og_title":"\u2018Cyber terrorism\u2019: hyperbole or reality? | The Strategist","og_description":"‘Cyber terrorism\u2019 is a catchy term, and appears to have resonated publicly because of the headline appeal and the fear factor. To slap the word \u2018terrorism\u2019 on anything ratchets up the hyperbole and disproportionately escalates ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-terrorism-hyperbole-reality\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2016-11-03T03:30:29+00:00","article_modified_time":"2016-11-02T23:50:55+00:00","og_image":[{"width":640,"height":360,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/11\/5936335464_b226b4e1ac_z.jpg","type":"image\/jpeg"}],"author":"Ash Collingburn","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Ash Collingburn","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-terrorism-hyperbole-reality\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/11\/5936335464_b226b4e1ac_z.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/11\/5936335464_b226b4e1ac_z.jpg","width":640,"height":360},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-terrorism-hyperbole-reality\/","url":"https:\/\/www.aspistrategist.ru\/cyber-terrorism-hyperbole-reality\/","name":"\u2018Cyber terrorism\u2019: hyperbole or reality? | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-terrorism-hyperbole-reality\/#primaryimage"},"datePublished":"2016-11-03T03:30:29+00:00","dateModified":"2016-11-02T23:50:55+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/6a4d85e73234ef9c0a77a5e2a0a3370a"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-terrorism-hyperbole-reality\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-terrorism-hyperbole-reality\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-terrorism-hyperbole-reality\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"\u2018Cyber terrorism\u2019: hyperbole or reality?"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/6a4d85e73234ef9c0a77a5e2a0a3370a","name":"Ash Collingburn","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/fca378264447dad4d3164f69e68bfdb8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fca378264447dad4d3164f69e68bfdb8?s=96&d=mm&r=g","caption":"Ash Collingburn"},"url":"https:\/\/www.aspistrategist.ru\/author\/ash-collingburn\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/29384"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/549"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=29384"}],"version-history":[{"count":1,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/29384\/revisions"}],"predecessor-version":[{"id":29386,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/29384\/revisions\/29386"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/29385"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=29384"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=29384"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=29384"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}