CYBERTERRORISM AND GLOBAL SECURITY: THE CASE FOR COLLABORATIVE COUNTERMEASURES
Автор: David Lomidze
Организация: Caucasus University
Категория:
Ключевые слова: cyberterrorism, collaborative strategies, AI in security, cyber domain, ransomware, national security, counterterrorism
Аннотация. This research provides a deep and comprehensive exploration of terrorism and counterterrorism within cyberspace, elaborating on the growing transition from traditional terrorism (which is characterized by real-world violent actions) to cyberterrorism, where attacks are carried out digitally to mess with or break critical infrastructure and cause localized or widespread harm. Moreover, this paper argues that collaborative international strategies are more effective at countering cyberterrorism than isolated national approaches. It examines several cases to show the evolution of this kind of threat, which shocked the world and reshaped global counterterrorism strategies both in the physical and cyber domains. By diving into these incidents, the research will highlight the methods and strategies used by terrorist organizations to achieve their main goals, whether through physical violence or advanced cyberattacks. It underlines the diverse and various approaches used by cyber terrorists, which exploit vulnerabilities in digital systems to maximize impact. Moreover, the paper also explores the measures taken by nations to defend their national security. By analyzing different real-world cases, it examines how international collaboration, advanced technologies, and dedicated counterterrorism initiatives are implemented and used to mitigate these threats. Attention is also given to the role of artificial intelligence and global information-sharing platforms in detecting and preventing potential attacks. This research aims to provide a comprehensive understanding of the connection between terrorist activities and counterterrorism strategies, focusing on the need for innovative, new solutions to quickly adapt to evolving threats. Examining real-world examples and defensive measures gives valuable insights into securing the digital domain against emerging challenges and problems.
Библиография:
Federal Bureau of Investigation. 2024. "What We Investigate: Terrorism." Last modified November 29, 2024. https://www.fbi.gov/investigate/terrorism
Bloom, Mia. 2017. "Constructing Expertise: Terrorist Recruitment and 'Talent Spotting' in the PIRA, Al Qaeda, and ISIS." Studies in Conflict & Terrorism 40: 603–623
Akbanov, M., V. G. Vassilakis, and M. D. Logothetis. 2018. "WannaCry Ransomware: Analysis of Infection, Persistence, Recovery Prevention, and Propagation Mechanisms." Paper presented at IEICE Information and Communication Technology Forum (ICTF), Graz, Austria
Lee, Newton. 2015. Counterterrorism and Cybersecurity. Cham, Switzerland: Springer International Publishing
New York Magazine. 2010. “So Did Al Qaeda Put Out an English Magazine?” Accessed May 22, 2025. http://nymag.com/daily/intel/2010/07/so_did_al_qaeda_really_put_out.html
Gothamist. 2012. “Photos: Inside the NYPD's New 'Domain Awareness' Surveillance HQ.” Gothamist. Published August 8, 2012. https://gothamist.com/news/photos-inside-the-nypds-new-domain-awareness-surveillance-hq
Martin, Rachel. 2017. “WannaCry Ransomware: Microsoft Calls Out NSA for Stockpiling Vulnerabilities.” NPR, May 15, 2017. https://www.npr.org/sections/thetwo-way/2017/05/15/528439968/wannacry-ransomware-microsoft-calls-out-nsa-for-stockpiling-vulnerabilities
Haggard, Stephan, and Jon R. Lindsay. 2015. North Korea and the Sony Hack: Exporting Instability Through Cyberspace. East-West Center. http://www.jstor.com/stable/resrep06456
Bronk, Christopher, and Eneken Tikk–Ringas. 2013. Hack or Attack? Shamoon and the Evolution of Cyber Conflict. Working Paper. James A. Baker III Institute for Public Policy, Rice University. https://www.bakerinstitute.org/research/shamoon-and-cyber-conflict
Lee, Robert M., Michael J. Assante, and Tim Conway. 2016. Analysis of the Cyber Attack on the Ukrainian Power Grid. March 18, 2016. E-ISAC and SANS. https://ics.sans.org/media/E-ISAC_SANS_Ukraine_DUC_5.pdf
Меню