Combating threats in the cyber world

By Blerim Abedini- Center for Security Studies and Development-Macedonia (CSSD)

Unlimited access from anywhere for cyber-attacks. International engagement over cyber security. Sophisticated methods in the American society for preventing attacks.


The internet has influence in the process of the violent extremists. The internet is a network where individuals find supporters and are occurring contact with them. Cyber terrorism can be used within computers, networks, and public internet to cause destruction and harm for personal objectives. Objectives may be political or ideological targeted to government agencies or public areas. So we have to say that internet has influence in the process of the violent extremists.

The use of the Internet for terrorist purposes is a rapidly growing phenomenon. The United Nations Office on Drugs and Crime (UNODC) plays a key role in providing assistance.

Legal instruments against terrorism have to be in compliance with the law and international human rights standards. The General Assembly in 2011, in resolution 66/178, accepted UNODC work to continue to develop specialized knowledge in the area of counter-terrorism and the Internet use for terrorist purposes.

Terrorism through internet disregards national borders, as potential influence to victims and larger groups as institutions by pressure for inappropriate political change.



National economic and individual security is in threats by cyber-attacks because of continually open internet network. In these points the state critical infrastructure as information systems are at risk and economy is harmed by the theft. Monitoring for 24 hours by identifying cyber-attacks, getting assistance from international partners and setting secure entry is primary approach.

We may be in touch with Cyberspace every day. We met wireless signals around us as the local networks in our schools, trade markets, restaurants, cafes, etc.

On February 12, 2013, President Obama signed Executive Order 13636, “Improving Critical Infrastructure Cyber security.” The Executive Order is designed to increase the level of core capabilities for critical infrastructure to manage cyber risk. It does this by focusing on three key areas: (1) information sharing, (2) privacy, and (3) the adoption of cyber security practices.

Engagement with international partners about cyberspace is the key point because network crosses international boundary. So states which collaborate and agree over safe internet connections have to work more on this matter for increasing profits by internet connections as economic, bilateral, cultural, educational, social, etc. For an international approach to this case need creating norms for behaving through cyberspace, promotional tools with international range and investigations by collaborating with groups as global partners.

Cyber security insurance is designed to mitigate losses from a variety of cyber incidents, including data breaches, business interruption, and network damage.

Cyber actors and states exploit information and money with developing capabilities to disrupt, destroy, or threaten the delivery of services. A range of traditional crimes are now being perpetrated through cyberspace. Some crimes by cyberspace include production and distribution of child pornography, banking, intellectual property violations, and other which have human and economic consequences.

Cyberspace is difficult to secure due to the ability of cyber actors to operate from anywhere in the world. Of growing concern is the cyber threat to critical infrastructure, which is increasingly subject to sophisticated cyber intrusions that pose new risks. As information technology becomes integrated with physical infrastructure operations, there could be possible consequences those could cause harm or disrupt services in the economy and the daily lives of millions people mostly from developed states as U.S of America. U.S of America has more attention and responsibility to prevent cyber-attacks because of integrated information system which citizens are using in daily life.

American society has high risk of theft, fraud, and abuse. Also cyber-attacks on corporate security breaches, spear ‘phishing’, and social media are the responsibility of the Department of Homeland Security (DHS) that works with other federal agencies to conduct high-impact criminal investigations to disrupt and defeat cyber criminals, prioritize the recruitment and training of technical experts, develop standardized methods, and broadly share cyber response best practices and tools. Criminal investigators and network security experts with deep understanding of the technologies malicious actors are using and the specific vulnerabilities they are targeting work to effectively respond to and investigate cyber incidents.

DHS components such as the U.S. Secret Service and U.S. Immigration and Customs Enforcement (ICE) have special divisions dedicated to combating cyber-crime. The U.S. Secret Service maintains Electronic Crimes Task Forces, which focus on identifying and locating international cyber criminals connected to cyber intrusions, bank fraud, data breaches, and other computer-related crimes. The Secret Service’s Cyber Intelligence Section has directly contributed to the arrest of transnational cyber criminals responsible for the theft of hundreds of millions of credit card numbers and the loss of approximately $600 million to financial and retail institutions. The Secret Service also runs the National Computer Forensic Institute, which provides law enforcement officers, prosecutors, and judges with cyber training and information to combat cyber-crime.

The U.S. Immigration and Customs Enforcement (ICE) Homeland Security Investigations (HSI) Cyber Crimes Center (C3) delivers computer-based technical services to support domestic and international investigations into cross-border crime. C3 is made up of the Cyber Crimes Unit, the Child Exploitation Investigations Unit, and the Computer Forensics Unit. This offers cyber-crime support and training to federal, state, local, and international law enforcement agencies. C3 also operates a fully equipped computer forensics laboratory, which specializes in digital evidence recovery, and offers training in computer investigative and forensic skills.

The Law Enforcement Cyber Incident Reporting resource provides information for state, local, tribal, and territorial (SLTT) law enforcement on when, what and how to report a cyber-incident to a federal entity. The document also provides information on federally sponsored training opportunities and other useful resources available to SLTT law enforcement

Work Cited

-The United Nations Office on Drugs and Crime (UNODC). The use of the Internet for terrorist purposes. Retrieved on March 12 , 2016 from

-The Department of Homeland Security (DHS) of U.S. Retrieved on March 11, 2016  from


Note: Analyses and research articles are products of the Center for Security Studies and Development-Macedonia (CSSD)