03-05-2012, 04:30 PM
Cyber Terrorism Hurdles faced by the wired World
CyberTerrorism.doc (Size: 89.5 KB / Downloads: 40)
Introduction
The world is a very large place, but it is getting smaller, thanks to the advent of computers and Information Technology. However, the progress that we've made in these fields also has a dark side, in that a new terrorist tactic, commonly called Cyberterrorism has developed. The old, conventional methods of assassination and hostage taking are slowly fading, as terrorists head towards the Internet to pull their stunts. The cause for this kind of a transition stems from the fact that the terrorist has long since realized that removing one official from office only causes another official to take his place; which is not the end-result the terrorist wished to achieve. This causes the terrorist to take to the net, thus affecting a wider section than could otherwise have been targeted. From disabling a country's economy to shutting off power in large areas, it's all possible, with less risk to the terrorists.
Cyberterrorism is any act of terrorism that uses information systems or digital technology (computers or computer networks) as either an instrument or a target. Cyberterrorism can either be "international", "domestic" or "political", according to the nature of the act, but it is always an act involving a combination of the terrorist and the computer.
Why IT is so attractive to the terrorist?
Terrorist groups have been using computer technology to secure many of their goals. They have been exploiting existing modern technology to accomplish the same goals that they have been working towards in the past. However, the key differences between their old tactics and their newer methods lie in the ease with which their operations can be performed, as well as increased anonymity. It is extremely difficult to detect such clandestine operations, and needless to say, even more difficult to counter such acts. Terrorist groups take advantage of computer technology to create support structures that serve to strengthen their tactical and strategic plans and goals. These are achieved by:
• Political propaganda
• Recruitment
• Financing
• Intra and inter-group communication and coordination
• Information and intelligence gathering
• Ease of operations that are cost-effective, both in terms of resources used, and ability to strike worldwide.
Specific examples of the facilitation of terrorism through the use of computer technology illustrate the appeal this technology has for terrorist groups interested in advancing their particular agendas. The use of the Internet for propaganda and disinformation purposes is an especially popular one. Many exiled political opposition groups from such states as Iran, Iraq, Mexico, Northern Ireland and Saudi Arabia have used the World Wide Web for just such purposes.
One of the most demonstrative examples, however, involves the case of the December, 1996 takeover of the Japanese Ambassador's residence in Lima, Peru by the Tupac Amaru Revolutionary Movement. Not only did this terrorist group use the Internet to communicate its revolutionary message to the rest of the world through a European website, it even offered a video clip of its members preparing for their mission.