Friday, October 25, 2024

Creating liberating content

Legal services are subject...

The report includes a legal consideration regarding the different doctrinal and jurisprudential opinions...

The statute of limitations...

Approach to the problem Law 31/21014 of December 3, 2014, which amends the Capital...

The ‘yes is yes’...

It is clear to no one that the legal reform carried out by...

Suffrage. According to philosophical...

Adolfo Posada's book El Sufragio. Según las teorías filosóficas y las principales legislaciones,...
HomelegalCyberterrorism: what is...

Cyberterrorism: what is it and how to deal with it?

Currently, there is no single definition of what cyberterrorism is. Even so, it could be said that it consists of the use of technological means by terrorist groups to commit an intrusion, a failure or an attack on the computer systems or telecommunications networks of political, economic or social institutions.

The purposes of these actions are none other than to coerce a government or international organization, destabilize an economic structure or generate fear and social alarm. And they are usually motivated by political, social or religious interests.

What is cyberterrorism?

Apart from what we have already mentioned, cyberterrorism has other characteristic features, for example:

  • It requires only technological equipment and computer knowledge to perpetrate it.
  • It is carried out remotely. This means that threats and criminal actions can be carried out at any time and from anywhere in the world.
  • It is a more anonymous option for the cyberterrorist, since he/she is not physically exposed.
  • It has greater levels of reach and diffusion, not only because of the speed at which technology is advancing, but also because it has become an indispensable element of our daily lives. It is present everywhere.
  • It is more accessible. Nowadays, we have become accustomed to using new technologies when looking for any type of information. Well, just as a person can consult the press, a virtual library or other sources, he or she can also access the means and resources used by cyberterrorists to spread their messages, attract new followers and recruit them or obtain funding.

Cyberterrorism: Examples

Among the most common cyberterrorism techniques are:

  • Launching a computer attack.
  • Impersonating or stealing a digital identity.
  • Sending and/or installing spyware.
  • Introducing a Trojan virus to remotely control another user’s computer, obtain personal information, etc.
  • Kidnapping users’ private data and then demanding a ransom to obtain money that will later be used to pay for other criminal operations.

Actors in cybersecurity in Spain

Since the emergence of cyberterrorism, governments and organizations have worked together to improve prevention and surveillance capabilities, successfully deal with this type of criminal acts and, at the same time, ensure the security of citizens, companies and the financial sector.

In addition to the implementation of strategies and systems, another of the measures has been the modification of national and international legislation, adapting it in the field of computer security and cyber defense.

In the case of Spain, these changes have been reflected in: the National Cybersecurity Strategy; the National Security Scheme, the Royal Decree-Law 12/2018, of September 7, on the security of networks and information systems; or Law 36/2015, of September 28, on National Security; among other regulations.

And, also, the creation of agencies specialized in responding to cybercrime and cyberterrorism has been resorted to.

Some of the Spanish agents in charge of this are:

  • National Cryptologic Center (CCN)
  • National Institute of Cybersecurity (INCIBE)
  • National Center for the Protection of Infrastructures and Cybersecurity (CNPIC)
  • Department of Homeland Security (DSN)
  • Joint Cyberspace Command (MCCE)
  • Central Brigade of Technological Investigation (BCIT) of the National Police
  • Telematic Crimes Group (GDT) of the Civil Guard

Join the fight against cyberterrorism

IT threats are becoming increasingly complex to detect and resolve. The main reason why there is an increasing number of companies and organizations, both national and international, that demand highly qualified professional profiles in the direction, management, implementation and protection of environments and users against cyber attacks.

Continue reading

Understanding Cargo Ships: Types and Functions

Cargo ships, also referred to as freighters or cargo vessels, play a pivotal role in transporting large volumes of goods from one port to another around the globe. Their function is indispensable in the global supply chain, facilitating the...

Understanding the Implications of Challenging Foundation Board Resolutions

Introduction to Foundation Board Resolution Challenges In legal literature, there's a dearth of studies concerning the contestation of decisions made by foundation boards. Professor La Casa is taking the initiative to address this gap in our legal understanding. Below, I'll...

Cargo Ships: Types and Roles in Global Trade

Understanding Cargo Ships: Their Roles and Various Types Cargo ships, also referred to as freighters or cargo vessels, play a pivotal role in transporting large volumes of goods from one port to another across the globe. Their function is indispensable in...