{"id":110413,"date":"2024-12-31T10:00:09","date_gmt":"2024-12-31T10:00:09","guid":{"rendered":"https:\/\/uitac.com\/inthenewsblog\/?p=110413"},"modified":"2025-10-09T17:06:16","modified_gmt":"2025-10-09T17:06:16","slug":"cyber-attacks-and-cyberterrorism","status":"publish","type":"post","link":"https:\/\/uitac.com\/inthenewsblog\/cyber-attacks-and-cyberterrorism\/","title":{"rendered":"Cybercrimes"},"content":{"rendered":"<p><span data-contrast=\"none\">Historically, our collective image and understanding of war has been shaped by the photos and videos broadcast across various media platforms. Whether it be television coverage of the fighting in Vietnam or archival photos of the invasion of Normandy, war is understood to be a bloody and deadly affair. While the wars in the Ukraine, Sudan, and Gaza are stark reminders of how desperate frontline combat can be, war in the 21st century is often virtual. Instead of AR-15-style rifles and roadside bombs, computers and the internet are increasingly becoming the weapon of choice in the form of cyber-attacks and cyberterrorism.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\"><img fetchpriority=\"high\" decoding=\"async\" class=\"alignleft wp-image-110416 size-full\" src=\"http:\/\/uitac.com\/inthenewsblog\/wp-content\/uploads\/sites\/8\/2024\/10\/Screenshot-from-2024-10-29-11-24-45.png\" alt=\"A computer keyboard with a green key that says \u201cterrorism\u201d in white letters.\" width=\"296\" height=\"195\" \/>By all accounts, <\/span><a href=\"https:\/\/leb.fbi.gov\/articles\/featured-articles\/cyber-terror\"><span data-contrast=\"none\">the word \u201ccyberterrorism\u201d was initially used by security expert Barry Collins<\/span><\/a><span data-contrast=\"none\"> in the 1980s. Interestingly though, the <\/span><a href=\"https:\/\/arcticwolf.com\/resources\/blog\/decade-of-cybercrime\/#:~:text=Technically%2C%20the%20first%20cyber%20attack,accessing%20the%20French%20telegraph%20system.\"><span data-contrast=\"none\">first example of a cyber attack took place in France in 1834<\/span><\/a><span data-contrast=\"none\">. This incident involved attackers using the telegraph system to steal information about the French financial market. Needless to say, the nefarious actions associated with cyberterrorism have gotten significantly more sophisticated. Modern-day cyberwarfare involves the use of computers to incite fear in a population. These types of attacks have been perpetrated against countries and corporations alike, and are generally politically or financially motivated. Examples include the <\/span><a href=\"https:\/\/arcticwolf.com\/resources\/blog\/decade-of-cybercrime\/#:~:text=Technically%2C%20the%20first%20cyber%20attack,accessing%20the%20French%20telegraph%20system.\"><span data-contrast=\"none\">2010 Stuxnet worm that was used against the nuclear power plants in Iran, and the 2022 attack against the ride-sharing company Uber<\/span><\/a><span data-contrast=\"none\">, which resulted in hackers having near total control of all of Uber&#8217;s virtual systems. Estimates are that the cost of <\/span><a href=\"https:\/\/www.reinsurancene.ws\/economic-impact-of-cybercrime-on-business-predicted-to-reach-10-5-trillion-by-2025-cybersecurity-ventures\/#:~:text=The%20report%20highlighted%20key%20areas,to%20research%20by%20Cybersecurity%20Ventures.\"><span data-contrast=\"none\">cyber attacks will reach over $10 trillion globally by 2025<\/span><\/a><span data-contrast=\"none\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">The fears associated with cybercrime exist politically, economically, and psychologically all at the same time. This is because this behavior not only occurs outside the bounds of agreed-upon behavior, it is also unpredictable and can happen anytime, disrupting lives and livelihoods. While we assume that rogue actors with an axe to grind, like the \u201chacktivist\u201d group Anonymous, are the primary perpetrators, increasingly, nation states are using technology to target corporations and other nations. <\/span><a href=\"https:\/\/us.norton.com\/blog\/emerging-threats\/hacker-groups\"><span data-contrast=\"none\">North Korea sponsored Lazarus Group\u2019s attack<\/span><\/a><span data-contrast=\"none\"> against Sony in 2014 over the movie <\/span><i><span data-contrast=\"none\">The Interview<\/span><\/i><span data-contrast=\"none\">, damaging Sony to the tune of $15 million. The Russian government\u2019s hacking group known as \u201cSandworm,\u201d has been identified as the source of ongoing <\/span><a href=\"https:\/\/www.reuters.com\/technology\/cybersecurity\/russian-spies-behind-cyberattack-ukrainian-power-grid-2022-researchers-2023-11-09\/#:~:text=LONDON%2C%20Nov%209%20(Reuters),in%20a%20report%20on%20Thursday.\"><span data-contrast=\"none\">attacks against Ukrainian power plants<\/span><\/a><span data-contrast=\"none\">. Even the National Security Agency (NSA), a wing of the U.S. government, uses cyber through its <\/span><a href=\"https:\/\/us.norton.com\/blog\/emerging-threats\/hacker-groups\"><span data-contrast=\"none\">\u201cTailored Access Operation&#8221;<\/span><\/a><span data-contrast=\"none\"> program to attack its enemies both stated and otherwise.\u202f<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\"><img decoding=\"async\" class=\"wp-image-110417 alignleft\" src=\"http:\/\/uitac.com\/inthenewsblog\/wp-content\/uploads\/sites\/8\/2024\/10\/Screenshot-from-2024-10-29-11-25-24-300x166.png\" alt=\"A hooded computer hacker sitting in front of multiple computer screens.\" width=\"361\" height=\"200\" srcset=\"https:\/\/uitac.com\/inthenewsblog\/wp-content\/uploads\/sites\/8\/2024\/10\/Screenshot-from-2024-10-29-11-25-24-300x166.png 300w, https:\/\/uitac.com\/inthenewsblog\/wp-content\/uploads\/sites\/8\/2024\/10\/Screenshot-from-2024-10-29-11-25-24-768x426.png 768w, https:\/\/uitac.com\/inthenewsblog\/wp-content\/uploads\/sites\/8\/2024\/10\/Screenshot-from-2024-10-29-11-25-24.png 902w\" sizes=\"(max-width: 361px) 100vw, 361px\" \/><\/span><\/p>\n<p><span data-contrast=\"none\">Attacks in the U.S. have not been limited to corporations like Uber, Sony, or Target, which in 2014 had the credit card information of <\/span><a href=\"https:\/\/coverlink.com\/cyber-liability-insurance\/target-data-breach\/\"><span data-contrast=\"none\">40 million customers hacked<\/span><\/a><span data-contrast=\"none\">, resulting in over $200 million in damages. A 2022 \u201c<\/span><a href=\"https:\/\/www.cisa.gov\/news-events\/cybersecurity-advisories\/aa22-110a#:~:text=Recent%20Russian%20state%2Dsponsored%20cyber,government%20and%20critical%20infrastructure%20organizations%20.\"><span data-contrast=\"none\">Cyber Security Advisory<\/span><\/a><span data-contrast=\"none\">\u201d issued by governments in the U.S., U.K., Canada, Australia, and New Zealand warned that Russia was aggressively working to disrupt the infrastructure of these countries. In the U.S., this included attacks against power plants, water treatment facilities, healthcare facilities, and financial institutions. The impact of these attacks cost the state of <\/span><a href=\"https:\/\/statescoop.com\/new-york-775-million-cyberattacks-critical-infrastructure\/\"><span data-contrast=\"none\">New York alone over $775 million<\/span><\/a><span data-contrast=\"none\">. One only has to remember the nightmare of the <\/span><a href=\"https:\/\/abc7ny.com\/2003-blackout-nyc-20-years-power-outage\/13646160\/\"><span data-contrast=\"none\">2003 blackout <\/span><\/a><span data-contrast=\"none\">when the Northeast power grid in the U.S. shut down or the <\/span><a href=\"https:\/\/energy.utexas.edu\/research\/ercot-blackout-2021\"><span data-contrast=\"none\">Texas power grid failure during the deep freeze of 2021<\/span><\/a><span data-contrast=\"none\"> that resulted in 57 deaths, to imagine the terrifying scenarios that could emerge if cyberterrorism were to knock the whole country offline.\u202f<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">While technology has greatly improved the quality of modern life (and nobody wants to go back to using the telegraph) it has also resulted in unforeseen vulnerability. While the combat associated with land battles won\u2019t ever go away, the battlefield of the future will increasingly be virtual. The questions we are left with are twofold. First, when will it happen? Keeping millions of citizens in a country safe from cyberterrorism is a massive undertaking in which the \u201cgood guys\u201d have to be right all the time, and the \u201cbad guys\u201d only have to get it right once. Second, and most importantly, can we do anything to protect ourselves, or is it already a lost cause? Only with time will we know the answers, but unfortunately, if the terrorists are successful, we might not be able to share that knowledge.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<hr \/>\n<p><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\"><b><i>Thompson is a co-owner of <\/i><\/b><a href=\"https:\/\/uitac.com\/\"><b><i>UITAC Publishing<\/i><\/b><\/a><b><i>. UITAC\u2019s mission is to provide high-quality, affordable, and socially responsible online course materials.<\/i><\/b>\u00a0 <\/span><\/p>\n<p><span data-contrast=\"none\">Images used in this blog: <\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<ol>\n<li>\u201c<a href=\"https:\/\/www.picpedia.org\/keyboard\/t\/terrorism.html\">Terrorism<\/a>\u201d by <a href=\"https:\/\/alphastockimages.com\/\">Nick Youngson<\/a> is licensed under <a href=\"http:\/\/creativecommons.org\/licenses\/by-sa\/3.0\/\">CC BY-SA 3.0<\/a>. This image has not been altered.<\/li>\n<li>\u201c<a href=\"https:\/\/wallpapersden.com\/anonymous-hacker-working-wallpaper\/\">Anonymous Hacker Working Wallpaper<\/a>\u201d from <a href=\"https:\/\/wallpapersden.com\/\">com<\/a> is licensed under the <a href=\"https:\/\/creativecommons.org\/licenses\/by-sa\/4.0\/deed.en\">CC BY-SA 4.0<\/a>. This image has not been altered.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Historically, our collective image and understanding of war has been shaped by the photos and videos broadcast across various media platforms. Whether it be television coverage of the fighting in Vietnam or archival photos of the invasion of Normandy, war is understood to be a bloody and deadly affair. While the wars in the Ukraine, [&hellip;]<\/p>\n","protected":false},"author":30,"featured_media":110416,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[55,186,71,80,53,182],"tags":[],"class_list":["post-110413","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-culture","category-deviance-and-crime","category-groups-and-organizations","category-social-change-and-movements","category-sociological-perspective","category-terrorism-and-fear"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybercrimes - In The NEWS Blog<\/title>\n<meta name=\"description\" content=\"Explore the history, impact, and future cyber warfare or cyber terrorism as it\u2019s becoming more frequent and sophisticated.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/uitac.com\/inthenewsblog\/cyber-attacks-and-cyberterrorism\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybercrimes - In The NEWS Blog\" \/>\n<meta property=\"og:description\" content=\"Explore the history, impact, and future cyber warfare or cyber terrorism as it\u2019s becoming more frequent and sophisticated.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/uitac.com\/inthenewsblog\/cyber-attacks-and-cyberterrorism\/\" \/>\n<meta property=\"og:site_name\" content=\"In The NEWS Blog\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-31T10:00:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-09T17:06:16+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/uitac.com\/inthenewsblog\/wp-content\/uploads\/sites\/8\/2024\/10\/Screenshot-from-2024-10-29-11-24-45.png\" \/>\n\t<meta property=\"og:image:width\" content=\"296\" \/>\n\t<meta property=\"og:image:height\" content=\"195\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Angela Thompson, Ph.D\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@uitacpublishing\" \/>\n<meta name=\"twitter:site\" content=\"@uitacpublishing\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Angela Thompson, Ph.D\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/uitac.com\\\/inthenewsblog\\\/cyber-attacks-and-cyberterrorism\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/uitac.com\\\/inthenewsblog\\\/cyber-attacks-and-cyberterrorism\\\/\"},\"author\":{\"name\":\"Angela Thompson, Ph.D\",\"@id\":\"https:\\\/\\\/uitac.com\\\/inthenewsblog\\\/#\\\/schema\\\/person\\\/57e6677d37133017c879133bcd14b7c7\"},\"headline\":\"Cybercrimes\",\"datePublished\":\"2024-12-31T10:00:09+00:00\",\"dateModified\":\"2025-10-09T17:06:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/uitac.com\\\/inthenewsblog\\\/cyber-attacks-and-cyberterrorism\\\/\"},\"wordCount\":742,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/uitac.com\\\/inthenewsblog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/uitac.com\\\/inthenewsblog\\\/cyber-attacks-and-cyberterrorism\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/uitac.com\\\/inthenewsblog\\\/wp-content\\\/uploads\\\/sites\\\/8\\\/2024\\\/10\\\/Screenshot-from-2024-10-29-11-24-45.png\",\"articleSection\":[\"Culture\",\"Deviance and Crime\",\"Groups and Organizations\",\"Social Change and Movements\",\"Sociological Perspective\",\"War and Terrorism\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/uitac.com\\\/inthenewsblog\\\/cyber-attacks-and-cyberterrorism\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/uitac.com\\\/inthenewsblog\\\/cyber-attacks-and-cyberterrorism\\\/\",\"url\":\"https:\\\/\\\/uitac.com\\\/inthenewsblog\\\/cyber-attacks-and-cyberterrorism\\\/\",\"name\":\"Cybercrimes - In The NEWS Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/uitac.com\\\/inthenewsblog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/uitac.com\\\/inthenewsblog\\\/cyber-attacks-and-cyberterrorism\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/uitac.com\\\/inthenewsblog\\\/cyber-attacks-and-cyberterrorism\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/uitac.com\\\/inthenewsblog\\\/wp-content\\\/uploads\\\/sites\\\/8\\\/2024\\\/10\\\/Screenshot-from-2024-10-29-11-24-45.png\",\"datePublished\":\"2024-12-31T10:00:09+00:00\",\"dateModified\":\"2025-10-09T17:06:16+00:00\",\"description\":\"Explore the history, impact, and future cyber warfare or cyber terrorism as it\u2019s becoming more frequent and sophisticated.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/uitac.com\\\/inthenewsblog\\\/cyber-attacks-and-cyberterrorism\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/uitac.com\\\/inthenewsblog\\\/cyber-attacks-and-cyberterrorism\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/uitac.com\\\/inthenewsblog\\\/cyber-attacks-and-cyberterrorism\\\/#primaryimage\",\"url\":\"https:\\\/\\\/uitac.com\\\/inthenewsblog\\\/wp-content\\\/uploads\\\/sites\\\/8\\\/2024\\\/10\\\/Screenshot-from-2024-10-29-11-24-45.png\",\"contentUrl\":\"https:\\\/\\\/uitac.com\\\/inthenewsblog\\\/wp-content\\\/uploads\\\/sites\\\/8\\\/2024\\\/10\\\/Screenshot-from-2024-10-29-11-24-45.png\",\"width\":296,\"height\":195,\"caption\":\"A computer keyboard with a green key that says \u201cterrorism\u201d in white letters.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/uitac.com\\\/inthenewsblog\\\/cyber-attacks-and-cyberterrorism\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/uitac.com\\\/inthenewsblog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybercrimes\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/uitac.com\\\/inthenewsblog\\\/#website\",\"url\":\"https:\\\/\\\/uitac.com\\\/inthenewsblog\\\/\",\"name\":\"In The NEWS Blog\",\"description\":\"UITAC Blog\",\"publisher\":{\"@id\":\"https:\\\/\\\/uitac.com\\\/inthenewsblog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/uitac.com\\\/inthenewsblog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/uitac.com\\\/inthenewsblog\\\/#organization\",\"name\":\"In The NEWS Blog\",\"url\":\"https:\\\/\\\/uitac.com\\\/inthenewsblog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/uitac.com\\\/inthenewsblog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/uitac.com\\\/inthenewsblog\\\/wp-content\\\/uploads\\\/sites\\\/8\\\/2021\\\/01\\\/inthenewsblog-1.svg\",\"contentUrl\":\"https:\\\/\\\/uitac.com\\\/inthenewsblog\\\/wp-content\\\/uploads\\\/sites\\\/8\\\/2021\\\/01\\\/inthenewsblog-1.svg\",\"width\":1136,\"height\":394,\"caption\":\"In The NEWS Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/uitac.com\\\/inthenewsblog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/uitacpublishing\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/uitac-publishing\\\/\",\"https:\\\/\\\/www.youtube.com\\\/@UITACScholar\",\"https:\\\/\\\/www.pinterest.com\\\/UITACPublishing\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/uitac.com\\\/inthenewsblog\\\/#\\\/schema\\\/person\\\/57e6677d37133017c879133bcd14b7c7\",\"name\":\"Angela Thompson, Ph.D\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b14155c7fd3643e40dbcd78b9fa432d7364d5ac83fab3acdb84d11a3b28d3cfa?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b14155c7fd3643e40dbcd78b9fa432d7364d5ac83fab3acdb84d11a3b28d3cfa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b14155c7fd3643e40dbcd78b9fa432d7364d5ac83fab3acdb84d11a3b28d3cfa?s=96&d=mm&r=g\",\"caption\":\"Angela Thompson, Ph.D\"},\"url\":\"https:\\\/\\\/uitac.com\\\/inthenewsblog\\\/author\\\/angela\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybercrimes - In The NEWS Blog","description":"Explore the history, impact, and future cyber warfare or cyber terrorism as it\u2019s becoming more frequent and sophisticated.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/uitac.com\/inthenewsblog\/cyber-attacks-and-cyberterrorism\/","og_locale":"en_US","og_type":"article","og_title":"Cybercrimes - In The NEWS Blog","og_description":"Explore the history, impact, and future cyber warfare or cyber terrorism as it\u2019s becoming more frequent and sophisticated.","og_url":"https:\/\/uitac.com\/inthenewsblog\/cyber-attacks-and-cyberterrorism\/","og_site_name":"In The NEWS Blog","article_published_time":"2024-12-31T10:00:09+00:00","article_modified_time":"2025-10-09T17:06:16+00:00","og_image":[{"width":296,"height":195,"url":"http:\/\/uitac.com\/inthenewsblog\/wp-content\/uploads\/sites\/8\/2024\/10\/Screenshot-from-2024-10-29-11-24-45.png","type":"image\/png"}],"author":"Angela Thompson, Ph.D","twitter_card":"summary_large_image","twitter_creator":"@uitacpublishing","twitter_site":"@uitacpublishing","twitter_misc":{"Written by":"Angela Thompson, Ph.D","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/uitac.com\/inthenewsblog\/cyber-attacks-and-cyberterrorism\/#article","isPartOf":{"@id":"https:\/\/uitac.com\/inthenewsblog\/cyber-attacks-and-cyberterrorism\/"},"author":{"name":"Angela Thompson, Ph.D","@id":"https:\/\/uitac.com\/inthenewsblog\/#\/schema\/person\/57e6677d37133017c879133bcd14b7c7"},"headline":"Cybercrimes","datePublished":"2024-12-31T10:00:09+00:00","dateModified":"2025-10-09T17:06:16+00:00","mainEntityOfPage":{"@id":"https:\/\/uitac.com\/inthenewsblog\/cyber-attacks-and-cyberterrorism\/"},"wordCount":742,"commentCount":0,"publisher":{"@id":"https:\/\/uitac.com\/inthenewsblog\/#organization"},"image":{"@id":"https:\/\/uitac.com\/inthenewsblog\/cyber-attacks-and-cyberterrorism\/#primaryimage"},"thumbnailUrl":"https:\/\/uitac.com\/inthenewsblog\/wp-content\/uploads\/sites\/8\/2024\/10\/Screenshot-from-2024-10-29-11-24-45.png","articleSection":["Culture","Deviance and Crime","Groups and Organizations","Social Change and Movements","Sociological Perspective","War and Terrorism"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/uitac.com\/inthenewsblog\/cyber-attacks-and-cyberterrorism\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/uitac.com\/inthenewsblog\/cyber-attacks-and-cyberterrorism\/","url":"https:\/\/uitac.com\/inthenewsblog\/cyber-attacks-and-cyberterrorism\/","name":"Cybercrimes - In The NEWS Blog","isPartOf":{"@id":"https:\/\/uitac.com\/inthenewsblog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/uitac.com\/inthenewsblog\/cyber-attacks-and-cyberterrorism\/#primaryimage"},"image":{"@id":"https:\/\/uitac.com\/inthenewsblog\/cyber-attacks-and-cyberterrorism\/#primaryimage"},"thumbnailUrl":"https:\/\/uitac.com\/inthenewsblog\/wp-content\/uploads\/sites\/8\/2024\/10\/Screenshot-from-2024-10-29-11-24-45.png","datePublished":"2024-12-31T10:00:09+00:00","dateModified":"2025-10-09T17:06:16+00:00","description":"Explore the history, impact, and future cyber warfare or cyber terrorism as it\u2019s becoming more frequent and sophisticated.","breadcrumb":{"@id":"https:\/\/uitac.com\/inthenewsblog\/cyber-attacks-and-cyberterrorism\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/uitac.com\/inthenewsblog\/cyber-attacks-and-cyberterrorism\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/uitac.com\/inthenewsblog\/cyber-attacks-and-cyberterrorism\/#primaryimage","url":"https:\/\/uitac.com\/inthenewsblog\/wp-content\/uploads\/sites\/8\/2024\/10\/Screenshot-from-2024-10-29-11-24-45.png","contentUrl":"https:\/\/uitac.com\/inthenewsblog\/wp-content\/uploads\/sites\/8\/2024\/10\/Screenshot-from-2024-10-29-11-24-45.png","width":296,"height":195,"caption":"A computer keyboard with a green key that says \u201cterrorism\u201d in white letters."},{"@type":"BreadcrumbList","@id":"https:\/\/uitac.com\/inthenewsblog\/cyber-attacks-and-cyberterrorism\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/uitac.com\/inthenewsblog\/"},{"@type":"ListItem","position":2,"name":"Cybercrimes"}]},{"@type":"WebSite","@id":"https:\/\/uitac.com\/inthenewsblog\/#website","url":"https:\/\/uitac.com\/inthenewsblog\/","name":"In The NEWS Blog","description":"UITAC Blog","publisher":{"@id":"https:\/\/uitac.com\/inthenewsblog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/uitac.com\/inthenewsblog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/uitac.com\/inthenewsblog\/#organization","name":"In The NEWS Blog","url":"https:\/\/uitac.com\/inthenewsblog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/uitac.com\/inthenewsblog\/#\/schema\/logo\/image\/","url":"https:\/\/uitac.com\/inthenewsblog\/wp-content\/uploads\/sites\/8\/2021\/01\/inthenewsblog-1.svg","contentUrl":"https:\/\/uitac.com\/inthenewsblog\/wp-content\/uploads\/sites\/8\/2021\/01\/inthenewsblog-1.svg","width":1136,"height":394,"caption":"In The NEWS Blog"},"image":{"@id":"https:\/\/uitac.com\/inthenewsblog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/uitacpublishing","https:\/\/www.linkedin.com\/company\/uitac-publishing\/","https:\/\/www.youtube.com\/@UITACScholar","https:\/\/www.pinterest.com\/UITACPublishing\/"]},{"@type":"Person","@id":"https:\/\/uitac.com\/inthenewsblog\/#\/schema\/person\/57e6677d37133017c879133bcd14b7c7","name":"Angela Thompson, Ph.D","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/b14155c7fd3643e40dbcd78b9fa432d7364d5ac83fab3acdb84d11a3b28d3cfa?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b14155c7fd3643e40dbcd78b9fa432d7364d5ac83fab3acdb84d11a3b28d3cfa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b14155c7fd3643e40dbcd78b9fa432d7364d5ac83fab3acdb84d11a3b28d3cfa?s=96&d=mm&r=g","caption":"Angela Thompson, Ph.D"},"url":"https:\/\/uitac.com\/inthenewsblog\/author\/angela\/"}]}},"_links":{"self":[{"href":"https:\/\/uitac.com\/inthenewsblog\/wp-json\/wp\/v2\/posts\/110413","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/uitac.com\/inthenewsblog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/uitac.com\/inthenewsblog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/uitac.com\/inthenewsblog\/wp-json\/wp\/v2\/users\/30"}],"replies":[{"embeddable":true,"href":"https:\/\/uitac.com\/inthenewsblog\/wp-json\/wp\/v2\/comments?post=110413"}],"version-history":[{"count":6,"href":"https:\/\/uitac.com\/inthenewsblog\/wp-json\/wp\/v2\/posts\/110413\/revisions"}],"predecessor-version":[{"id":110698,"href":"https:\/\/uitac.com\/inthenewsblog\/wp-json\/wp\/v2\/posts\/110413\/revisions\/110698"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/uitac.com\/inthenewsblog\/wp-json\/wp\/v2\/media\/110416"}],"wp:attachment":[{"href":"https:\/\/uitac.com\/inthenewsblog\/wp-json\/wp\/v2\/media?parent=110413"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/uitac.com\/inthenewsblog\/wp-json\/wp\/v2\/categories?post=110413"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/uitac.com\/inthenewsblog\/wp-json\/wp\/v2\/tags?post=110413"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}