You cannot discuss cybercrime without having some discussion of cyberterrorism. Just a few years ago, the idea of cyberterrorism seemed completely hypothetical, perhaps even a bit sensationalist. Now, however, cyberterrorism is seen by many to surpass terrorism as a threat. There are definite reasons to take it seriously:
In 2008 and 2009, there were several reports of attacks that were traced back to North Korea or China. Given that both nations are totalitarian regimes with very strict control on their populace, it is difficult to believe that the governments of those countries were not at least aware of those attacks.
In December 2009, hackers broke into computer systems and stole secret defense plans of the United States and South Korea. The information stolen included a summary of plans for military operations by South Korean and U.S. troops in case of war with North Korea, though the attacks were traced back to a Chinese IP address.
In December 2010, a group calling itself the Pakistan Cyber Army hacked the website of India’s top investigating agency, the Central Bureau of Investigation (CBI).
In March 2013, a cadre of the United States’ top intelligence officials told Congress that cyberattacks led the numerous national security threats the United States faces. It is the first time since the September 11, 2001, terrorist attacks that anything other than an extremist physical threat has been the top concern in the Intelligence Community Worldwide Threat Assessment, which is presented annually to the Senate Select Committee on Intelligence. James Clapper, director of national intelligence, told the panel that cyber and financial threats were being added “to the list of weapons being used against us.” They help define a new “soft” kind of war.
These cases clearly illustrate that cyberterrorism and cyberespionage are real threats that need to be examined and dealt with.
A critical topic in cyberterrorism is the China Eagle Union. This group consists of several thousand Chinese hackers whose stated goal is to infiltrate Western computer systems. There are a number of web resources regarding this group:
Members and leaders of the group insist that not only does the Chinese government have no involvement in their activities, but that they are breaking Chinese law and are in constant danger of arrest and imprisonment. However, most analysts believe this group is working with the full knowledge and support of the Chinese government. Throughout the first quarter of 2013, accusations of cyberattacks were leveled by both the U.S. and Chinese governments.
Because cyberterrorism and cyberespionage use the same techniques as any other cyber-crime, the actual technical portions of the investigation are the same. If it is a virus or denial of service attack, you investigate it as you would any virus or denial of service attack. However, the difference lies in the jurisdiction for the crime itself. Issues of cyberterrorism and cyberespionage are referred to the Federal Bureau of Investigation.