{"id":12432,"date":"2023-09-04T11:00:45","date_gmt":"2023-09-04T15:00:45","guid":{"rendered":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/?p=12432"},"modified":"2023-09-04T01:02:43","modified_gmt":"2023-09-04T05:02:43","slug":"cyberattacks-terrorism-for-a-new-age","status":"publish","type":"post","link":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/2023\/09\/04\/cyberattacks-terrorism-for-a-new-age\/","title":{"rendered":"Cyberattacks: Terrorism for a New Age"},"content":{"rendered":"<p><b>Ashley Skladany<br \/>\n<\/b><b><i>Staff Writer<br \/>\n<\/i><\/b><\/p>\n<p><span style=\"font-weight: 400\">In May of 2021, U.S. citizens were left in disarray as gasoline supplies to the Eastern part of the country were cut by 45 percent, forcing cars to line up for blocks to fill their tanks. The direct cause was cited as a \u201ccyberattack\u201d on the Colonial Pipeline, which carried gas and other fuels from Texas to the East Coast, according to<\/span><a href=\"https:\/\/online.maryville.edu\/blog\/cyber-terrorism\/\"> <span style=\"font-weight: 400\">Maryville University<\/span><\/a><span style=\"font-weight: 400\">. In June of the same year, meat suppliers faced their own unique cyberattack on factories owned by JBS, a company that supplies more than one-fifth of the beef consumed in the United States. These two instances did not only financially impact gasoline and meat suppliers, but extended their reach to affect millions of individuals. Yet, the frequency of these kinds of damaging attacks is only increasing. According to a <\/span><a href=\"https:\/\/sgp.fas.org\/crs\/natsec\/R43955.pdf\"><span style=\"font-weight: 400\">Congressional Research Service report<\/span><\/a><span style=\"font-weight: 400\">, researchers discovered that for victims across 24 countries, cybercrime incurs an annual cost of $388 billion.<br \/>\n<\/span><span style=\"font-weight: 400\">By 2030, insurance firm <\/span><a href=\"https:\/\/www.marshmclennan.com\/insights\/publications\/2018\/nov\/global-cyber-terrorism-incidents-on-the-rise.html\"><span style=\"font-weight: 400\">Marsh McLennan<\/span><\/a><span style=\"font-weight: 400\"> predicts 30 billion technological devices will be in use. For cyber terrorists, this creates a wider range of vulnerable governmental and organizational assets susceptible to attack and exploitation. In order to protect individuals, governments must try to decipher a way to successfully tackle this billionaire-dollar enterprise. However, the unique nature of the digital sphere allows for covert operations and swift information warfare to be easily weaponized by terrorists, which creates unprecedented and difficult challenges for governments to understand, starkly setting cyberterrorism apart from traditional acts of terrorism.<br \/>\n<\/span><span style=\"font-weight: 400\">Cyberterrorism is a relatively new frontier. Conversations surrounding the topic did not begin until the late-1990s. In the United States, the bombing of the World Trade Center in 1993 as well as the Oklahoma bombing in 1995 are typically cited as the first high-profile attacks that consequently propelled the U.S. Department of Defense to conduct its first warfare exercise to measure the cybersecurity of its systems. It was not until the 9\/11 attacks, however, that serious legislative measures, such as the Patriot Act of 2001 and the Terrorism Risk Insurance Act of 2002, were introduced in attempts to tackle cyber terrorism. But as of today, the laws passed have yielded limited success.<br \/>\n<\/span><span style=\"font-weight: 400\">The <\/span><a href=\"https:\/\/www.nytimes.com\/2021\/06\/04\/us\/politics\/ransomware-cyberattacks-sept-11-fbi.html\"><span style=\"font-weight: 400\">New York Times<\/span><\/a><span style=\"font-weight: 400\"> writes that the FBI considers \u201cransomware as grave a danger to U.S. interests as terrorism in the aftermath of the attacks of September 11, 2001.\u201d In other words, proper solutions need to be enacted against this ever-evolving threat. Nevertheless, understanding what exactly \u201ccyber terrorism\u201d entails can be difficult.<\/span><a href=\"https:\/\/dataconomy.com\/2022\/06\/17\/what-is-cyberterrorism\/\"> <span style=\"font-weight: 400\">Dataconomy<\/span><\/a><span style=\"font-weight: 400\">, a popular technology news site, describes cyber terrorism as \u201cthe use of computer networks or systems to intentionally cause damage, disrupt operations, and\/or intimidate individuals,\u201d a definition that commonly aligns with other sources. This includes disrupting the internet\u2019s technological foundation, government computer networks, or critical civilian systems, such as financial networks or mass media. The actors, ranging from nonstate, state, and private, \u201cmay have a variety of goals,\u201d Dataconomy shares, attempting to create chaos or intimidation for financial, political, or social gains. The Congressional Research Service, however, highlights that the digital realm is ever-expanding. The complexity of the cyber sphere and its nature means that there is no clear and concise definition when it comes to outlining cyber terrorism. Because distinctive boundaries are lacking, so is a proper, widely understood, and accepted definition. Thus, grappling with cyberattacks can be a complex phenomenon for both companies and governments.<br \/>\n<\/span><span style=\"font-weight: 400\">The 2017 WannaCry and NotPetya incidents mark two of the most significant global cyber-terrorist attacks that exemplify the alarming rate at which the methods and consequences of cyberterrorism can escalate. <\/span><a href=\"https:\/\/www.theguardian.com\/technology\/2017\/dec\/30\/wannacry-petya-notpetya-ransomware\"><span style=\"font-weight: 400\">The Guardian<\/span><\/a><span style=\"font-weight: 400\"> explains that these attacks in the UK shut down computers in over 80 National Health Service facilities, resulting in thousands of canceled appointments and overwhelmed hospital systems. The attack was born from two newer innovations: encryption and Bitcoin. Bitcoin has offered a new outlet for terrorists, suddenly allowing ransomware creators to take payment without the hassle of the conventional banking system. Encrypted files have resulted in the creation of ransomware, a software that holds people\u2019s information hostage until they pay a requested sum.<br \/>\n<\/span><span style=\"font-weight: 400\">WannaCry was the first ransomware attack that the world watched disrupt society on such a massive scale, with its impacts affecting organizations in over 150 countries and leading to losses of more than $300 million, Marsh McLennan reports. The attack had severe implications and life-threatening consequences, hindering the ability of the NHS to provide proper care for its patients in the UK. However, the head of the National Audit Office (NAO), Amyas Morse, said that WannaCry \u201cwas a relatively unsophisticated attack and could have been prevented by the NHS following basic IT security best practice.\u201d This raises a paramount concern regarding how exactly the attack managed to take out a significant portion of the NHS in just a matter of days. Fixes for the vulnerabilities that were exploited had already been released in March, the NAO report states. However, these fixes were not implemented, leading to a careless mistake that had disastrous ramifications. The outcome of the WannaCry incident exemplifies the necessity for enhanced and mandated digital awareness training within organizations.<br \/>\n<\/span><span style=\"font-weight: 400\">Only a month later, another attack dubbed NotPetya occurred, which built on the lessons of WannaCry by using the same weaknesses to spread within the corporate network. The ransomware was distributed to victims via a hacked version of a major accounting program used in Ukraine. The program had extensive internal networks, enabling the threat to travel far outside of Ukraine\u2019s borders and cause chaos. However, the attacks were not suspected to be monetarily motivated as WannaCry was. The Guardian explains that the ransomware was improperly coded, meaning that even if users did pay up, their data could never be retrieved. The evident lack of concern regarding the collection of money by the ransomware authors establishes that profit was not the goal of this attack. The <\/span><a href=\"https:\/\/ccdcoe.org\/news\/2017\/notpetya-and-wannacry-call-for-a-joint-response-from-international-community\/\"><span style=\"font-weight: 400\">NATO Cooperative Cyber Defense Centre of Excellence<\/span><\/a><span style=\"font-weight: 400\"> agrees that \u201cmalware analysis supports the theory that the main purpose of the malware was to be destructive because the key used for encrypting the hard disk was discarded.\u201d<br \/>\n<\/span><span style=\"font-weight: 400\">The realization that NotPetya was most likely conducted for the purpose of destruction heeds further concerns surrounding the ransomware\u2019s target of a Ukrainian accounting program. The Guardian emphasizes that \u201c[t]he country has long been at the forefront of cyberwarfare, constantly trading digital blows with its neighbor Russia even while the two countries trade actual blows over Crimea.\u201d Taking into account the nature of the NotPetya ransomware, it is very possible that the global outbreak was a demonstration of power, \u201cprobably launched by a state actor or non-state actor with support or approval from a state.\u201d<\/span><a href=\"https:\/\/www.ncsc.gov.uk\/news\/russian-military-almost-certainly-responsible-destructive-2017-cyber-attack#:~:text=An%252520assessment%252520by%252520the%252520National,the%252520'NotPetya'%252520cyber%252520attack.\"> <span style=\"font-weight: 400\">The National Cyber Security Centre<\/span><\/a><span style=\"font-weight: 400\"> of the United Kingdom asserts that \u201cthe Russian military was almost certainly responsible for the \u2018NotPetya\u2019 cyber attack.\u201d Though not conclusively verified, it is a reasonable analysis, as it would not be the first time in which Russia engaged in state-backed cyber-attacks categorized as cyber terrorism. For example, in 1996, Russia led a two-year campaign classified as an advanced persistent threat (APT). Through the theft of massive amounts of classified information from numerous government agencies, U.S. national security and strategies were left vulnerable and exposed.<br \/>\n<\/span><span style=\"font-weight: 400\">The Russia-Ukraine war offers greater insight and analysis into the way cyberspace is being utilized for state-backed cyberterrorism, as well as defense. According to the<\/span><a href=\"https:\/\/www.swp-berlin.org\/10.18449\/2023C23\/\"> <span style=\"font-weight: 400\">German Institute for International and Security Affairs (SWP)<\/span><\/a><span style=\"font-weight: 400\">, \u201cIn August 2022, the Computer Emergency Response Team of Ukraine reported over 1,123 cyberattacks in the first half of the war.\u201d At the beginning of the war, more specifically, \u201cMoscow launched what may have been the world\u2019s largest ever salvo of destructive cyber-attacks against dozens of Ukrainian networks,\u201d<\/span><a href=\"https:\/\/carnegieendowment.org\/programs\/technology\/cyberconflictintherussiaukrainewar\/\"> <span style=\"font-weight: 400\">The Carnegie Endowment<\/span><\/a><span style=\"font-weight: 400\"> writes. Russia&#8217;s attack resulted in the disruption of the Viasat satellite communications network, occurring just before tanks crossed the border. With technology becoming ever more necessary for military communications, the result ultimately caused serious delays and the hindrance of Ukraine\u2019s initial defense of Kyiv.<br \/>\n<\/span><span style=\"font-weight: 400\">Despite this being true, there appears to be a general consensus that Russian cyber operations during the war have not been as impactful or eventful as originally expected. \u201cRussia\u2019s main cyber activity in Ukraine has probably been intelligence collection,\u201d Nick Beecroft, Carnegie Endowment Scholar, shares. \u201cRussian hackers have most likely sought to gather [high-value] data\u201d that can later be leveraged effectively. Information collection can give rise to substantial threats, which could intensify the conflict considerably. For instance, acquiring real-time geolocation data has the potential to enable actions like the assassination of Ukrainian President Volodymyr Zelenskyy, or the precise and timely targeting of Ukrainian troops, Carnegie Endowment Scholar, Jon Bateman, emphasizes. The usage of Russian hackers as a part of the war effort is the result of Russia\u2019s support of state-backed cyber terrorism.<\/span><a href=\"https:\/\/www.baesystems.com\/en\/digital\/feature\/the-nation-state-actor\"> <span style=\"font-weight: 400\">BAE Systems<\/span><\/a><span style=\"font-weight: 400\">, an international aerospace security company, describes such hackers as being given a \u201clicense to hack.\u201d In other words, they may have permission to conduct destructive digital attacks, without fear of legality, with both support and resources from the government.<br \/>\n<\/span><span style=\"font-weight: 400\">These individuals or groups of hackers are employed with the intent to compromise and destabilize the enemy\u2019s digital infrastructure under the aims of the government. This is done through various methods of digital terrorism, most commonly those including ransomware, DDoS attacks, or data breaches. Though such actions can also technically be classified as cyber warfare, both cyber terrorism and warfare are united through their common destructive goals. Moreover, cyber-terrorism tactics, such as hiring hackers, are employed as tools as a part of a state\u2019s war efforts in the digital sphere, meaning that cyberterrorism can be seen as a key yet distinctive component of cyber warfare.<br \/>\n<\/span><span style=\"font-weight: 400\">The heightened attention surrounding the Russia-Ukraine conflict has enabled Ukraine to protect itself against Russian cyber-attacks, thereby mitigating the impacts. Beecroft cites that Ukraine has been able to \u201cdeploy cyber defenses at a scale and depth never seen before.\u201d The cause, he continues, is \u201can alliance of competing companies and governments with varying agendas collaborating and learning together to thwart Russian cyber attacks, driven by a shared sense of outrage at the invasion.\u201d The war has demonstrated that cyber defenses can indeed, be successful, granted there is a united front. Researchers at<\/span><a href=\"https:\/\/www.talkingaboutterrorism.com\/post\/cyberterrorism-in-the-west-now\"> <span style=\"font-weight: 400\">Talking About Terrorism<\/span><\/a><span style=\"font-weight: 400\"> outlined policies needed to tackle cyberterrorism, labeling \u201cthe cooperation among states\u201d as \u201ccritical.\u201d The researchers further argued that there is an overall lack of consensus aimed at creating a proper, coordinated deterrence strategy. As a result, efforts to successfully tackle cyber-terrorism suffer without united accountability from both state and non-state actors.<\/span><br \/>\n<a href=\"https:\/\/www.forbes.com\/sites\/jodywestby\/2020\/12\/20\/russia-has-carried-out-20-years-of-cyber-attacks-that-call-for-international-response\/?sh=290eeb1f6605\"><span style=\"font-weight: 400\">Forbes<\/span><\/a><span style=\"font-weight: 400\"> defends this point, explaining there is a need for \u201call countries to utilize the internet for economic, political, and demographic benefit while refraining from activities that could cause unnecessary suffering and destruction,\u201d a concept termed as geo-cyber stability. The unparalleled surge of cyber support from the world&#8217;s most capable companies and governments has unveiled the critical role of the private sector and other government entities in effectively defending digital networks at a national scale. The heightened protection of Ukraine\u2019s networks emphasizes how cooperation is critical when defending society from cyber threats. Simply put, a united front of geo-stability employed by states and backed by other important non-state actors as successfully displayed in Ukraine is a must when considering future legislation to tackle cyber terrorism.<br \/>\n<\/span><span style=\"font-weight: 400\">Cyber-terrorism only continues to pose itself as a dangerous threat as more sophisticated technologies continue to develop. Many countries\u2019 national security will remain at risk unless governments around the world can work together to implement greater stability and protection against threats in the digital realm. The lack of an international, digital legal framework is holding the global community back. Without it, there can be no geo-cyber stability and not even a clear consensus as to what cyber terrorism may properly entail.\u00a0<\/span><\/p>\n<p><em>Image courtesy of Pedro Szekely, <a href=\"https:\/\/www.flickr.com\/photos\/pedrosz\/51899805969\">Flickr<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By 2030, insurance firm Marsh McLennan predicts 30 billion technological devices will be in use. For cyber terrorists, this creates a wider range of vulnerable governmental and organizational assets susceptible to attack and exploitation. <\/p>\n","protected":false},"author":5400,"featured_media":12433,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[2557],"tags":[448,622,1923,2559],"class_list":["post-12432","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-summer-2023-edition","tag-terrorism","tag-privacy","tag-technology","tag-cyberattacks"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyberattacks: Terrorism for a New Age - The Diplomatic Envoy<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/2023\/09\/04\/cyberattacks-terrorism-for-a-new-age\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyberattacks: Terrorism for a New Age - The Diplomatic Envoy\" \/>\n<meta property=\"og:description\" content=\"By 2030, insurance firm Marsh McLennan predicts 30 billion technological devices will be in use. For cyber terrorists, this creates a wider range of vulnerable governmental and organizational assets susceptible to attack and exploitation.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/2023\/09\/04\/cyberattacks-terrorism-for-a-new-age\/\" \/>\n<meta property=\"og:site_name\" content=\"The Diplomatic Envoy\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-04T15:00:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/files\/2023\/09\/51899805969_15e4cd98c5_w.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ashley Skladany\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ashley Skladany\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/2023\\\/09\\\/04\\\/cyberattacks-terrorism-for-a-new-age\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/2023\\\/09\\\/04\\\/cyberattacks-terrorism-for-a-new-age\\\/\"},\"author\":{\"name\":\"Ashley Skladany\",\"@id\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/#\\\/schema\\\/person\\\/39f6fb1a9ab26c0f2130313bcbe4cacf\"},\"headline\":\"Cyberattacks: Terrorism for a New Age\",\"datePublished\":\"2023-09-04T15:00:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/2023\\\/09\\\/04\\\/cyberattacks-terrorism-for-a-new-age\\\/\"},\"wordCount\":1962,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/2023\\\/09\\\/04\\\/cyberattacks-terrorism-for-a-new-age\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/files\\\/2023\\\/09\\\/51899805969_15e4cd98c5_w.jpg\",\"keywords\":[\"Terrorism\",\"Privacy\",\"technology\",\"Cyberattacks\"],\"articleSection\":[\"Summer 2023 Edition\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/2023\\\/09\\\/04\\\/cyberattacks-terrorism-for-a-new-age\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/2023\\\/09\\\/04\\\/cyberattacks-terrorism-for-a-new-age\\\/\",\"url\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/2023\\\/09\\\/04\\\/cyberattacks-terrorism-for-a-new-age\\\/\",\"name\":\"Cyberattacks: Terrorism for a New Age - The Diplomatic Envoy\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/2023\\\/09\\\/04\\\/cyberattacks-terrorism-for-a-new-age\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/2023\\\/09\\\/04\\\/cyberattacks-terrorism-for-a-new-age\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/files\\\/2023\\\/09\\\/51899805969_15e4cd98c5_w.jpg\",\"datePublished\":\"2023-09-04T15:00:45+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/#\\\/schema\\\/person\\\/39f6fb1a9ab26c0f2130313bcbe4cacf\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/2023\\\/09\\\/04\\\/cyberattacks-terrorism-for-a-new-age\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/2023\\\/09\\\/04\\\/cyberattacks-terrorism-for-a-new-age\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/2023\\\/09\\\/04\\\/cyberattacks-terrorism-for-a-new-age\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/files\\\/2023\\\/09\\\/51899805969_15e4cd98c5_w.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/files\\\/2023\\\/09\\\/51899805969_15e4cd98c5_w.jpg\",\"width\":400,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/2023\\\/09\\\/04\\\/cyberattacks-terrorism-for-a-new-age\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyberattacks: Terrorism for a New Age\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/#website\",\"url\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/\",\"name\":\"The Diplomatic Envoy\",\"description\":\"Words Beyond Borders\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/#\\\/schema\\\/person\\\/39f6fb1a9ab26c0f2130313bcbe4cacf\",\"name\":\"Ashley Skladany\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0f012fd7d6631f062fa8f5533be01b572dc798c083655bf560a676b172700c5d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0f012fd7d6631f062fa8f5533be01b572dc798c083655bf560a676b172700c5d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0f012fd7d6631f062fa8f5533be01b572dc798c083655bf560a676b172700c5d?s=96&d=mm&r=g\",\"caption\":\"Ashley Skladany\"},\"url\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/author\\\/skladaas\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyberattacks: Terrorism for a New Age - The Diplomatic Envoy","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/2023\/09\/04\/cyberattacks-terrorism-for-a-new-age\/","og_locale":"en_US","og_type":"article","og_title":"Cyberattacks: Terrorism for a New Age - The Diplomatic Envoy","og_description":"By 2030, insurance firm Marsh McLennan predicts 30 billion technological devices will be in use. For cyber terrorists, this creates a wider range of vulnerable governmental and organizational assets susceptible to attack and exploitation.","og_url":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/2023\/09\/04\/cyberattacks-terrorism-for-a-new-age\/","og_site_name":"The Diplomatic Envoy","article_published_time":"2023-09-04T15:00:45+00:00","og_image":[{"width":400,"height":300,"url":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/files\/2023\/09\/51899805969_15e4cd98c5_w.jpg","type":"image\/jpeg"}],"author":"Ashley Skladany","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Ashley Skladany","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/2023\/09\/04\/cyberattacks-terrorism-for-a-new-age\/#article","isPartOf":{"@id":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/2023\/09\/04\/cyberattacks-terrorism-for-a-new-age\/"},"author":{"name":"Ashley Skladany","@id":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/#\/schema\/person\/39f6fb1a9ab26c0f2130313bcbe4cacf"},"headline":"Cyberattacks: Terrorism for a New Age","datePublished":"2023-09-04T15:00:45+00:00","mainEntityOfPage":{"@id":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/2023\/09\/04\/cyberattacks-terrorism-for-a-new-age\/"},"wordCount":1962,"commentCount":0,"image":{"@id":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/2023\/09\/04\/cyberattacks-terrorism-for-a-new-age\/#primaryimage"},"thumbnailUrl":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/files\/2023\/09\/51899805969_15e4cd98c5_w.jpg","keywords":["Terrorism","Privacy","technology","Cyberattacks"],"articleSection":["Summer 2023 Edition"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blogs.shu.edu\/thediplomaticenvoy\/2023\/09\/04\/cyberattacks-terrorism-for-a-new-age\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/2023\/09\/04\/cyberattacks-terrorism-for-a-new-age\/","url":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/2023\/09\/04\/cyberattacks-terrorism-for-a-new-age\/","name":"Cyberattacks: Terrorism for a New Age - The Diplomatic Envoy","isPartOf":{"@id":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/2023\/09\/04\/cyberattacks-terrorism-for-a-new-age\/#primaryimage"},"image":{"@id":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/2023\/09\/04\/cyberattacks-terrorism-for-a-new-age\/#primaryimage"},"thumbnailUrl":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/files\/2023\/09\/51899805969_15e4cd98c5_w.jpg","datePublished":"2023-09-04T15:00:45+00:00","author":{"@id":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/#\/schema\/person\/39f6fb1a9ab26c0f2130313bcbe4cacf"},"breadcrumb":{"@id":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/2023\/09\/04\/cyberattacks-terrorism-for-a-new-age\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blogs.shu.edu\/thediplomaticenvoy\/2023\/09\/04\/cyberattacks-terrorism-for-a-new-age\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/2023\/09\/04\/cyberattacks-terrorism-for-a-new-age\/#primaryimage","url":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/files\/2023\/09\/51899805969_15e4cd98c5_w.jpg","contentUrl":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/files\/2023\/09\/51899805969_15e4cd98c5_w.jpg","width":400,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/2023\/09\/04\/cyberattacks-terrorism-for-a-new-age\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/"},{"@type":"ListItem","position":2,"name":"Cyberattacks: Terrorism for a New Age"}]},{"@type":"WebSite","@id":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/#website","url":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/","name":"The Diplomatic Envoy","description":"Words Beyond Borders","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/#\/schema\/person\/39f6fb1a9ab26c0f2130313bcbe4cacf","name":"Ashley Skladany","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/0f012fd7d6631f062fa8f5533be01b572dc798c083655bf560a676b172700c5d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0f012fd7d6631f062fa8f5533be01b572dc798c083655bf560a676b172700c5d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0f012fd7d6631f062fa8f5533be01b572dc798c083655bf560a676b172700c5d?s=96&d=mm&r=g","caption":"Ashley Skladany"},"url":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/author\/skladaas\/"}]}},"_links":{"self":[{"href":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/wp-json\/wp\/v2\/posts\/12432","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/wp-json\/wp\/v2\/users\/5400"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/wp-json\/wp\/v2\/comments?post=12432"}],"version-history":[{"count":1,"href":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/wp-json\/wp\/v2\/posts\/12432\/revisions"}],"predecessor-version":[{"id":12434,"href":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/wp-json\/wp\/v2\/posts\/12432\/revisions\/12434"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/wp-json\/wp\/v2\/media\/12433"}],"wp:attachment":[{"href":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/wp-json\/wp\/v2\/media?parent=12432"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/wp-json\/wp\/v2\/categories?post=12432"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/wp-json\/wp\/v2\/tags?post=12432"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}