CyberTerrorism




Misguided – CyberCrimes and the Patriot Act

One of the most problematic aspects of recent advances in technology is figuring out how the internet and cyberspace fit into existing legal structures, and what new approaches must be developed to handle critical issues. The idea of what “cyber terrorism” means has changed in the 21st century. Normally, the process of adapting the law to changes in technology is a long and arduous process. However, due to the 9/11 attacks on America, change has been dramatic, rapid, and poorly considered. In the wake of the terrorist assault, the US government created and passed the "Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001", otherwise known by the shorthand as the Patriot Act. While intended to safeguard America from terrorist attacks, the broad range of the Act has proven problematic on multiple fronts, including its treatment of computer technology and cyberterrorism. While supporters of the Patriot Act claim that national security must be protected, the definition of cyberterrorism advanced in the act is far too broad, leading to a situation where unnecessarily harsh punishments can be handed out for non-terrorist infractions.

In the aftermath of 9/11, the government and the private sector worried that information digitally housed on computers could be vulnerable to security attacks. Another concern which arose in the post 9/11 world was how networks who housed confidential information could be compromised. If networks were to be compromised, potential criminals could gain access to vital information and manipulate its flow. National Defense Secrets could be garnered by accessing databases owned and operated by the CIA, FBI, Department of Defense, or even the offices of the Homeland Security itself! The response to these concerns was the inclusion of a section on cyberterrorism in the Patriot Act. The Patriot Act includes incredibly broad provisions for what can be defined as cyberterrorism, including “unauthorized access to protected computers,” and “the destruction of communication lines, stations, or systems.” As if these terms aren’t vague enough, section 814 expands the definition of a “protected computer" to cover even a "computer located outside the United States that is used in a manner that affects interstate or foreign commerce or communication of the United States” and says that people can be prosecuted for even attempting to access a “protected computer”. In an ideal world, only individuals who were attempting these crimes for actual terrorism would be prosecuted under these provisions, but in reality, there are no assurances that common criminals won’t be treated as if they were terrorists. Under the provisions of the act, a janitor trying to shut down a computer in an embassy in Botswana in order to save power could be prosecuted as if he were a hacker attempting to access FBI records. Because there is no clear definition of cyberterrorism, the government possesses an extraordinary amount of leeway with no official oversight, which enables them to pursue domestic criminals and penalize them as though they were international terrorists. Lawyer Tara Raghaven states “One of the deepest problems associated with the Act is that the government is allowed to spy on suspected computer trespassers without a court order, infringing on the civil liberties of suspected trespassers” (Ragheven).

Defining the term cyber terrorism has always been a challenge, even before the 9/11 attacks and the creation of the Patriot Act.  As Amy Zalman points out, “Cyberterrorism is not necessarily designed to cause a terrifying visual spectacle that can be exploited for propaganda purposes, as conventional terrorism is” (Zalman). Terrorist attacks in reality focus on creating fear through wanton death and destruction. Destruction on the internet doesn’t have nearly the same effect or the same immediately fatal consequences to innocent victims. While clearly it is possible to perform actions on the internet with a terrorist intent that further the goals of terrorists, it does require examining how terrorism online should be defined. Were Americans hackers who breached the Department of Defense terrorists if they were simply acting as digital pioneers like Edmund Hilary’s, conquering the ‘mountain’ simply because it was there? At what point does an action change from being a cybercrime to an act of cyberterrorism? Raghaven points out that “in fact, the Internet has been fairly unscathed by international terrorism” (Raghaven). Some theorists broadly define cyberterrorism as any actions taken by groups or individuals who want to expand control over cyberspace, but this definition seems far too broad, and doesn’t include attacks designed to access and steal confidential information. Intriguingly, because the term 'cyberterrorism' creates a subliminal linkage in listener's minds to groups such as Al Qaeda and other global terrorist groups, this makes it possible for the American government and private industry play off of these fears about Al Qaeda to build support for tighter controls on electronic information. In truth, only a small amount of cybercrime could actually be designated terrorism, so the term is actually serving as propaganda for other interests, which don’t act toward to the stated goal of the Patriot Act, to provide tools to intercept and obstruct terrorism.

         This is not to say that cyberterrorism isn’t a possibility. A number of security experts have concluded that while the threat of cyberterrorism does exist, it is routinely exaggerated by various individuals for political or financial gain. These experts note that not only does the United States exhibit a profound dependency on computer networks for its daily well-functioning, but this technological requirement holds true for most of the world as well. Experts point out that the interrelationship of computer systems means that attacking a single nation without harming the interests of others is much more difficult, especially for a nation as important to the global economy as America As Sandeep Bhardwaj, Research Officer for the Institute of Peace and Conflict Studies states “Using the internet for information dissemination, propaganda and recruitment is possibly the most dangerous aspect of cyber terrorism. Instead of thinking obtusely about how to inflict damage to the system through hacking, terrorists are using internet in its most obvious form as a tool of information dissemination” (Bhardwaj). But both supporters and opponents of the Patriot Act agree that it is important to safeguard critical infrastructure from vulnerability to attack.  Raghaven writes that “While bombing physical targets may attract unwanted attention and raise the risk of failure, cyberterrorist attacks can be orchestrated more accurately and easily, and due to the remote location of the preliminary step, the perpetrators are less detectable”(Raghaven). This stance provides support for the sweeping coverage of the Act. Opponents of the broad area covered by the Patriot act critically point out that creating and maintaining a state of anxiety over cyber vulnerability can be profitable for corporations which provide internet security.  As Gabriel Weimann pointed out in his article Cyberterrorism: How Real is the Threat, “an entire industry has emerged to grapple with the threat of cyberterrorism” which has resulted in immediate changes; “Private companies have hastily deployed security consultants and software designed to protect public and private targets” (Weimann). The federal government requested $4.5 billion for infrastructure security following 9/11 and the FBI now boasts more than one thousand “cyber investigators.” This illustrates just how big a business cyber security has become, and the powerful allure of profits that can be had so long as the fear of something horrible drives heavy spending in this sector.


At the time of the attacks, the Bush Administration offered to counter the threat of cyberterrorism by expanding the punishments for those committing cybercrimes, and pushing for Internet Service Providers to disclose information to the government for investigations. These provisions appeared in the US Patriot Act which was created in 2001 and was recently revised in 2005. According to a White House press release, the act also usefully "allows Internet providers, without fear of being sued, to give information to law enforcement when it would help law enforcement prevent a threat of death or serious injury”(White House). However, a September, 2007 ruling by Manhattan federal judge Victor Marrero on the constitutionality of National Security Letters (NSLs) challenged the Patriot Act provision. The Patriot Act allowed the government to issue NSLs requesting customer information without legal approval to a company, and also put 'gag orders' on companies over their ability to disclose their receipt of these letters. There was no legal requirement to provide proof supporting the suspicion of the terrorist activities. This example shows just how confusing and problematic handling cybercrimes in a post 9/11 world has become, and why a more clear definition is necessary to properly handle cyberterrorism.

In conclusion, it is clear that the Patriot Act poses a problem because it gives sweeping powers with little oversight in areas which don’t necessarily have anything to do with terrorism. Podgor notes that “It is common that congressional acts include provisions with no relevance to the main purpose and title of the act. What may be unique here are the speed at which the Patriot Act was passed and the purpose for the haste. One wonders whether it was necessary, in light of these extenuating circumstances, to include provisions with far-reaching effects beyond terrorism.” The scope of the Patriot Act is going to face continual court challenges because it crosses important lines of civil liberty under the guise of fighting terrorism. While this was initially accepted in the fearful climate created by the 9/11 attacks, as time passes and non-terrorists suffer, the Act’s legality will continually be battled in court. Civil liberty cannot survive if people are always willing to give up the protection of privacy simply because of an external fear. When terrorists strike America and freedoms are curtailed in the wake, then the goal of creating fear has truly been achieved.

                                        White House feels cyberterrorism poses a major threat.

No comments:

Post a Comment