Cyber Crime and Cyber Terrorism + Cyber War and Cyber Strategy Flashcards
(40 cards)
What is cyber crime?
Any illegal activity involving a computer or network, either as a tool or target (e.g., hacking, fraud). Motivated by profit or ideology. Example: Phishing scams.
What are the three main penalties under the UK Computer Misuse Act 1990?
1) Unauthorized access (6 months + £5k fine), 2) Data modification (5 years), 3) Aiding cybercrime (10 years).
What’s the projected global cost of cybercrime by 2027?
$23.82 trillion — equivalent to the world’s 3rd largest economy.
What’s the difference between effects-based and intent-based cyberterrorism?
Effects-based: Causes fear like traditional terrorism (e.g., fake nuclear plant meltdown). Intent-based: Politically motivated coercion (e.g., hacking govt sites for ideological demands).
What percentage of cyber attacks targeted the US in 2005 compared to other nations?
10x more than the next most-targeted country — due to its critical infrastructure and geopolitical role.
Name 3 ways terrorists use the internet.
1) Recruitment (e.g., ISIS on Telegram), 2) Training (bomb-making guides), 3) Encrypted communication (avoiding surveillance).
What is Thomas Rid’s argument against cyber warfare?
“Cyber war will not take place” — lacks lethality; better classified as espionage/sabotage. Example: Russian election interference
Why is cyberspace called the “fifth domain” of warfare?
Considered as critical as land, sea, air, and space. Example: US Cyber Command integrates cyber ops with military strategy.
What’s the key challenge of deterrence in cyberspace?
Attribution problems — hackers mask identities, making retaliation difficult. Example: NotPetya attack blamed on Russia but denied.
What was Stuxnet, and why was it significant?
A US/Israel-created malware that destroyed Iran’s nuclear centrifuges — first confirmed cyber weapon causing physical damage.
Name 3 types of cyber crime listed in Figure 2.1’s global police data.
1) Illegal data interference, 2) Computer-related fraud, 3) Child pornography distribution.
What is the “cyber crime-terrorism nexus”?
Criminal networks providing tools/services to terrorists (e.g., dark web hackers selling malware to extremists).
What’s the PRISM surveillance program?
NSA mass data collection from tech companies (Google, Facebook) — revealed by Snowden in 2013.
What is ransomware? Give a real-world example.
Malware encrypting data until payment. Example: 2021 Colonial Pipeline attack caused fuel shortages.
What is a zero-day exploit?
An unknown software vulnerability exploited before a patch exists. Example: NSA stockpiling zero-days for attacks.
What’s the key criticism of cyber utopianism?
Overestimates internet’s democratic power — authoritarians adapt (e.g., China’s Great Firewall).
What is hacktivism?
Politically motivated hacking (e.g., Anonymous leaking govt documents). Blurs crime/protest lines.
What is the “militarization of cyberspace”?
States integrating cyber capabilities into military doctrine. Example: Over 60 nations now have cyber armies.
What’s the UK’s National Cyber Force (NCF)?
Offensive cyber unit merging defense/intelligence — criticized for ethical gray zones in operations.
What is a supply chain attack?
Compromising software/hardware before it reaches users. Example: 2020 SolarWinds hack spread via updates.
What is the “attribution problem” in cyber attacks?
Difficulty proving perpetrators due to spoofing/proxies. Example: Russian GRU hid behind fake identities in NotPetya.
What is a DDoS attack?
Overwhelming a target with traffic to crash services. Example: 2016 Dyn attack disrupted Twitter/Netflix.
What is the dark web’s role in cyber crime?
Hosts illegal markets (e.g., drugs, malware) but also protects whistleblowers. Example: Silk Road.
What is social engineering?
Manipulating people into revealing secrets (e.g., phishing emails). Exploits psychology, not tech flaws.