Currently, there is no single definition of what cyberterrorism is. Even so, it could be said that it consists of the use of technological means by terrorist groups to commit an intrusion, a failure or an attack on the computer systems or telecommunications networks of political, economic or social institutions.
The purposes of these actions are none other than to coerce a government or international organization, destabilize an economic structure or generate fear and social alarm. And they are usually motivated by political, social or religious interests.
What is cyberterrorism?
Apart from what we have already mentioned, cyberterrorism has other characteristic features, for example:
- It requires only technological equipment and computer knowledge to perpetrate it.
- It is carried out remotely. This means that threats and criminal actions can be carried out at any time and from anywhere in the world.
- It is a more anonymous option for the cyberterrorist, since he/she is not physically exposed.
- It has greater levels of reach and diffusion, not only because of the speed at which technology is advancing, but also because it has become an indispensable element of our daily lives. It is present everywhere.
- It is more accessible. Nowadays, we have become accustomed to using new technologies when looking for any type of information. Well, just as a person can consult the press, a virtual library or other sources, he or she can also access the means and resources used by cyberterrorists to spread their messages, attract new followers and recruit them or obtain funding.
Cyberterrorism: Examples
Among the most common cyberterrorism techniques are:
- Launching a computer attack.
- Impersonating or stealing a digital identity.
- Sending and/or installing spyware.
- Introducing a Trojan virus to remotely control another user’s computer, obtain personal information, etc.
- Kidnapping users’ private data and then demanding a ransom to obtain money that will later be used to pay for other criminal operations.
Actors in cybersecurity in Spain
Since the emergence of cyberterrorism, governments and organizations have worked together to improve prevention and surveillance capabilities, successfully deal with this type of criminal acts and, at the same time, ensure the security of citizens, companies and the financial sector.
In addition to the implementation of strategies and systems, another of the measures has been the modification of national and international legislation, adapting it in the field of computer security and cyber defense.
In the case of Spain, these changes have been reflected in: the National Cybersecurity Strategy; the National Security Scheme, the Royal Decree-Law 12/2018, of September 7, on the security of networks and information systems; or Law 36/2015, of September 28, on National Security; among other regulations.
And, also, the creation of agencies specialized in responding to cybercrime and cyberterrorism has been resorted to.
Some of the Spanish agents in charge of this are:
- National Cryptologic Center (CCN)
- National Institute of Cybersecurity (INCIBE)
- National Center for the Protection of Infrastructures and Cybersecurity (CNPIC)
- Department of Homeland Security (DSN)
- Joint Cyberspace Command (MCCE)
- Central Brigade of Technological Investigation (BCIT) of the National Police
- Telematic Crimes Group (GDT) of the Civil Guard
Join the fight against cyberterrorism
IT threats are becoming increasingly complex to detect and resolve. The main reason why there is an increasing number of companies and organizations, both national and international, that demand highly qualified professional profiles in the direction, management, implementation and protection of environments and users against cyber attacks.