WAYS OF CYBERTERRORISM
Abstract: Cyber attacks are now becoming more and more complex, more frequent and with increasing destructive effects. Regardless of the type or value of an organization, it affects information of public and private infrastructures. Moreover, private information may be struck by those who hold, even temporarily, various public or dignified functions in a state. In other words, it can hit the information profile of a target by affecting data about identity, about finance, can changing information from personal conversations and other private life activities.
In this context, the terrorism aims to execute actions, driven only once or in series, motivating as resistance to political, economic or social changes and producing global information effects. It is well known the development of terrorism is favored by the development of information technology. Through these, terrorist organizations seek to enhance the perception of terror, by capturing the attention of the global media and by transmitting apocalyptic messages. Last but not least, the social factor and the arms proliferation determine the adapt of objective aspect of terrorism, often the modeling of terrorist ideology based on issues of population discontent with the ease of acquisition of weapons, munitions and destructive materials through various forms of trade.
In this work we propose to determine the content of the concept of cyber terrorism, starting from the analysis of the main factors of public insecurity and social disorder that facilitate the development of modern forms of terrorism. In this order we propose to underline the base aspects to understand the ways of its application.
*** , Anders Breivik, autorul atacurilor din Norvegia, ar putea primi „impresionanta” pedeapsă de 30 de ani de închisoare!, at adresa http://www.ghimpele.ro
***, Cyber-attack: US and UK blame North Korea for WannaCry, at https://www.bbc.com
***, Decret nr. 212 din 31 octombrie 1974 pentru ratificarea Pactului internațional cu privire la drepturile economice, sociale și culturale și Pactului internațional cu privire la drepturile civile și politice, in B.Of. nr. 146/20 noi. 1974, at http://www.cdep.ro
***, Efectul Breivik: Circa o sută de norvegieni vor să devină „terorişti solitari”, at http://www.financiarul.ro
***, Facebook shares drop execs quit Christchurch live stream shooting stirs outrage, at https://www.dailymail.co.uk
***, G7 Ministers call for sharing of battlefield data on terrorists via INTERPOL, at https://www.interpol.int
***, Hacked: The Bangladesh Bank Heist, at https://www.aljazeera.com
***, Noul cod penal, at https://legeaz.net
***, Threat Lens 2018 Annual Forecast, at https://worldview.stratfor.com
Bălan, George, Noua concepţie internaţională de acţiune doctrinară şi practică în combaterea terorismului, at http://fs.legaladviser.ro
Bouchaud, Melodie, Belgium Condemned Over Unlawful Extradition of Terrorist to the US, at https://news.vice.com
Bumiller, Elisabeth , Thom Shanker, Panetta Warns of Dire Threat of Cyberattack on U.S., at https://www.nytimes.com
Fedotov, Yury, Taking action where we can to stop cybercrime, at https://www.unodc.org
Flynn, Matthew J., Is There a Cyber War?, Excelsior College, National Cybersecurity Institute Journal, Vol . 1 Issue 2, 2014, p. 5 7.
Jacobson, Michael, Terrorist Financing and the Internet, in Conflict & Terrorism Studies, at https://www.tandfonline.com
Jurj-Tudoran, Remus, Instigarea publică la săvârșirea unei infracțiuni de terorism și libertatea de exprimare în practica Curții Europene a Drepturilor Omului, at http://revistaprolege.ro
Quintero, Timothy L., The Connected Black Market: How the Dark Web Has Empowered LatAm Organized Crime, at https://www.insightcrime.org
Saiidi, Uptin, Inside Interpol’s Singapore cybercrime-fighting complex, at https://www.cnbc.com
Schmitt, Michael N. (general editor), Liis Vihul (managing editor), Tallinn Manual 2.0, On the International Law Applicable to Cyber Operations, Cambridge, University Press, 2017.
Soriano, Manuel R. Torres, Guerras por delegación en el ciberespacio -Proxy wars in cyberspace, at http://revista.ieee.es
Stevenson, Dru, Effect of the national security paradigm on criminal law, at https://law.stanford.edu
Tanasă, Remus, Benedict Anderson şi destinul „Comunităţilor imaginate”, at https://www.lapunkt.ro
Tung, Liam, Australia helps EU in latest crack down on money mules, at https://www.cso.com.au
Weimann, Gabriel, How modern terrorism uses the Internet, United States Institute of Peace, at https://www.usip.org
The published articles are subject to copyright law. All rights are reserved to the “Carol I” National Defense University, regardless of whether all or part of the material are considered, especially the rights to translation, reprinting, re-use of illustrations, quotations, broadcasting through the media, reproduction on microfilms or any other way and storage in data banks. Any replicas without the associated fees are authorized provided the source is acknowledged.