Cyberterrorism

Read Complete Research Material

CYBERTERRORISM

Cyberterrorism

Table of Contents

Introduction3

Discussion3

Information Warfare and Cyberterrorism4

Risk and Critical Infrastructure Attacks5

Cyberterrorism as an Adjunct Attack6

Al-Qaeda and Information Technology6

Conclusion8

Cyberterrorism

Introduction

Technology is growing parallel to the growth of tools, technology, and weapons since the origin of life. During the last hundred years, warfare has evolved close range and small war weapons to technical and advanced air combat. While for the recent years, the electronic material development like “smart bomb” is programming to destroy the previous targets. Traditionally, the meaning of warfare was to distort environment by the means of technology. It was also meant to increase the activities of terrorism internationally. Before September 11, 2001, no one could even think that America's Civil Aircraft could be used as a war weapon for their own county. However, the operatives of al Qaeda committed this terror that was caused the lives over 2,840 people within few minutes. There was nothing to be surprised, then, that guerrilla offensives and military could be waged on many fronts, from the skyscrapers of Manhattan to the digital networks that coordinate our critical infrastructure (e.g.: computer networks, the Internet, telephone systems, water supplies, electricity).

Discussion

Although, the fortification of national infrastructure of America is vital responsibility of national strategy of Homeland Security, every American is likely to be secure from this point of protection. Conceivably, the notion of cyberterrorism or warfare information is not at the vanguard of America national public realization, because it is somewhat indefinable. Cyberterrorism and warfare information are wider concept that are dependent on that person who is presenting or defining them. This activity can be encountered on a wide range of activities that may be included a number of different people. Cyberterrorism and warfare information have two different events that rationale on their concepts. Information warfare does not require Cyberterrorism, means Cyberterrorism in not essential. However, Cyberterrorism is a part of information warfare. On the basis of this wide difference, these two topics should be discussed separately (Ballard 2002, 1009).

The word cyberterrorism has been misrepresented in both academic circles and by the media at large. A panel of experts on cyberterrorism was convened in March of 2003, with one stating that “Dropping ATM networks and shutting down e-mail is not terrorism. If I cannot get to my e-mail for a few days, I am not terrorized.” This illustrates the common misperception that a network disruption is an act of cyberterrorism. This would be considered as ore of an act of information warfare (Denning 1999, 68).

Cyberterrorism is also not defined by the group perpetrating it. Terrorist groups, such as Taliban, al Qaeda, can utilize the Internet to further their hide their secrets, propaganda, or recruit new members. However, none of this is considered to be inherently terroristic, and moreover may be considered more of an act of information warfare. According to one definition, “terrorism can be elaborated by the nature of act. It cannot be explained or associate with perpetrators' identity or temperament of terrorists' cause” (Denning 2001, 281).

Information Warfare and Cyberterrorism

"Information warfare" is a concept of overarching which includes cyberterrorism. Fundamentally, information warfare is the exercise or congregation of ...
Related Ads