Spear Phishing
The ubiquitous use of the Internet has made it possible for terrorist groups to remotely foment attacks with little risk of capture. Among the newest forms of attacks is cyber hacking, which has seen increased use by terrorist groups for acts ranging from pinpointing targets for assassination to holding organisations hostage and embarrassing governments. In almost all these attacks, spear phishing is the vector used to gain access to a computer network – making it imperative that policymakers find ways to stop it. This chapter provides an overview of the different types of spear phishing attacks and the reasons they succeed. The chapter then provides an overview of the different strategies being used to combat it and their relative effectiveness. Drawing from the latest social science research and from initiatives that have worked around the world, the chapter culminates with six policy suggestions, which could significantly reduce the effectiveness of spear phishing and protect nations from a major cyber attack.