Articles Tagged with cyber terrorism

markus-spiske-153537-200x300Cyber terrorism is a serious crime. Obviously, this falls on the higher end of the offenses that are committed on the internet. Chicago, like many states, is trying to update its laws in order to deal with these threats in an effective way, bearing in mind the fact that the technology is constantly changing. Likewise, there are employee training requirements for companies. The law firms that defend and participate in prosecutions are also coming to terms with the intricacies of the laws as well as the various regulations that have been put in place to regulate the activity that takes place on the internet.

One of the issues that has come to the fore is the possibility that in the pursuit of cyber legality, there is a danger of infringing on the privacy of Chicago citizens. The state and legislature are always willing to have more control over the activities of residents. However, that level of control might have serious implications in terms of protecting civil liberties and the integrity of the American Constitution. The International Association of Privacy Professionals (IAPP) has been at the forefront of advocacy work in this respect so as to moderate some of the excesses that are proposed in prospective legislation.

The Quagmire of Data Collection

jack-young-143113-300x200Making terrorist threats is a serious crime that can lead to significant terms of custody. This is particularly true in this age of international terrorism, which has the capability of harming thousands of people. The global definitions hold sway. Interestingly, the law is rarely used in Chicago, not least because the controls put in place make it difficult for people who are that way inclined to hurt the rest of the population. There are instances in which the law has been used to suppress free speech and protest. For example; there was some public outcry when people who had been protesting against NATO were prosecuted. Other defense attorneys have argued that the law may be written in such a vague way that it opens the way for eventual abuse.

This is a law of which the public at large is critical. Terrorism causes terror and that is the beginning point of the prosecution. This criterion is also being modified in order to reflect the realities of a crime that is still in its development stages. For example, a threat made in jest whilst on a plane is bound to cause significant stress nonetheless. Therefore, the prosecutor will be given leeway to prosecute based on the reasonable expectations and anticipations of the people that are on the airplane. Indeed, it would be advisable not to make any threats at all because they could fall under other criminal laws.

Credibility of the Threat

markus-spiske-153537-200x300Terrorism is the current concern of the cyber security community. The key legal principles are laid out at a national level. However, there are many other forms of cybercrime which are largely downgraded yet quite capable of harming people. This is not just a problem for Chicago, but for the entire world at large. As is often the case in these instances, the argument is about establishing the right parameters for upgrading a simple cybercrime into cyberterrorism or cyberwar. For example, internet trolling is rarely capable of meeting the standards of terrorism, yet it is also a serious crime that is often prosecuted by the authorities. Others have decided to define cyberterrorism as any form of cyber crime that involves nations or entire communities.

Some of the worst offenders under this law are not pariah states but individuals who have used their expertise in order to hack into government agency databases before strategically leaking the resultant data in order to cause maximum embarrassment to the government. Although WikiLeaks and Snowden might argue that they do not meet this criteria, the reality is that the US government considers their actions to be a threat to the state. Therefore, the prosecution process and the indicative sentencing might be a lot harsher than would be the case for other types of cybercrime. We might then argue that it is the state that determines the fine line between cybercrime and cyberterrorism.  

Investigating and Classifying the Crime

Contact Information