Skip to main content
Contribution to Book
From Cyber Terrorism to State Actors’ Covert Cyber Operations
Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies (2013)
  • Jan Kallberg, University of Texas at Dallas
  • Bhavani Thuraisingham, University of Texas at Dallas
Abstract

Historically, since the Internet started to become a common feature in our lives, hackers have been seen as a major threat. This view has repeatedly been entrenched and distributed by media coverage and commentaries through the years. Instead the first twenty year of the Internet was acceptably secure, due to the limited abilities of the attackers, compared to the threat generated from a militarized Internet with state actors conducting cyber operations. In reality, the Internet have a reversed trajectory for its security where it has become more unsafe over time and moved from a threat to the individual to a national security threat. The entry of state actors creates as a contested cyberspace where intelligence, economic espionage, information operations, and psychological operations radically changed the fundamentals for Internet security. The state actor seeks to exploit weaknesses in the targeted national infrastructure, industrial base’s connection to the global networked grid, and take advantage of the fact that our populations heavily rely on the Internet. The aggressive state actor has an advantage in cyberspace due to the weaknesses in attribution, which works as a standing invite to conduct proxy wars, utilizing criminal networks or aligned political groups, to carry out the attacks with little risk for detection. This requires a modified view on cyberspace role in national security.

Keywords
  • cyber defense,
  • cyber terrorism,
  • state actor,
  • war,
  • nation state,
  • cyber deterrence,
  • cyber,
  • cyberwar
Publication Date
Spring March 12, 2013
Editor
Babak Akhgar; Simeon Yates
Publisher
Butterworth-Heinemann (Elsevier)
ISBN
978-0124071919
Citation Information
Jan Kallberg and Bhavani Thuraisingham. "From Cyber Terrorism to State Actors’ Covert Cyber Operations" 1Oxford UKStrategic Intelligence Management: National Security Imperatives and Information and Communications Technologies Vol. 1 (2013)
Available at: http://works.bepress.com/jan_kallberg/12/