Saturday, May 25, 2019

A Growing “Threat” to Society Essay

The profits is one of the most powerful sources of information today. Thus, it has the capacity to enlighten, as well as to mislead. This double-edged potential has turned the Internet into the latest avenue for terrorism. Terrorists are now harnessing the power of the Internet to wreak havoc among the public (Conway, 2002). Terrorists use the Internet mainly as a propaganda tool it is a venue wherein they publicize their cause or explain their ideological justification with go forth misinterpretation or censorship.As of 2002, a majority of the 33 convocations deemed foreign terrorist organizations by the United States State Department had their own web sites. There are also many early(a) websites, that, despite not being related to any terrorist group, provide information on how to commit terrorist activities such as bomb-making. The latter often escape vile prosecution due to the First Am quitment, which guarantees freedom of speech to the general populace (Conway, 2002). The genuinely idea of cyberwar, however, is not without contention. For one, it is still not clear as to what differentiates cyber-terrorism from freedom of ex packion.Also, there are certain Internet-related crimes that cannot be considered as cyber-terrorism, although they inflict damage upon the public. Indeed, terrorism in itself is already a notoriously difficult ideal to define. The addition of computers to it further complicates the idea (Conway, 2002). The Internet A New Weapon The Internet was originally intended as a means of resuming contact in the event of a nuclear attack. scarcely due to its speed and convenience, it is currently a major venue for information, communication and commerce. As of September 2006, there were more(prenominal) than 1 billion Internet users worldwide (Vatis, 2006).With just one click of a mouse, an entrepreneur in Germany can deposit funds to a believe account in Switzerland and talk to a London-based cousin face to face through a web camera . A student in California, meanwhile, can pick out everything about the Great Wall of China with merely a few keystrokes. After 9/11 It was only after 9/11 that the very concept of cyber-terrorism was actually developed. Before 9/11, Internet-related crimes were usually in the form of sending pornographic email to minors, defacing web pages, stealing credit plug-in information and launching computer viruses (Conway, 2002).After 9/11, however, US officials realized that terrorist organizations could use the Internet to generate more bloodshed (Weimann, 2004). Al-Qaeda, for instance, could launch missiles or biologic weapons to the US by simply pressing the Enter button of a laptop (Stohl, 2006). To a certain extent, the fears of the US were well-founded. In November 2000, an electronic attack was carried out from Pakistan against the Washington-based pro-Israeli lobbying group American Israel Public Affairs Committee (AIPAC).Aside from defacing AIPACs site with anti-Israeli commen taries, the attacker likewise stole some 3,500 email addresses and 700 credit shake numbers, sent anti-Israeli diatribes to the addresses and published the credit card data on the Internet. The Pakistani hacker, known by the alias Dr. Nuker, claimed responsibility for the incident. It turned out that Dr. Hacker was a founder of the Pakistani Hackerz Club, an organization whose objective was to hack for the injustice going around the globe, especially with (sic) Muslims (Conway, 2002).The aforementioned cyber assault was not without precedent. The Lebanese Shiite Islamic group Hezbollah established its collection of web sites in 1995. At present, the group has three websites that can be viewed in either English or Arabic one for its press office, another to describe its attacks on Israeli targets (http//www. moqawama. tv) and a third, Al-Manar TV, for news and information (http//www. manartv. com). These websites regularly provide the latest information about Hezbollah, including p ress statements, political declarations, photos, video and audio clips.An email address is also provided as contact information (Conway, 2002). After 9/11, as a result, federal agents issued subpoenas and await warrants to almost every major Internet-based company, including America Online, MSN, Yahoo and Google. In addition, many web sites were subjected to official closure by the Federal Bureau of Investigation (FBI). include among those that were closed down were radical Internet radio shows such as IRA Radio, Al Lewis Live and Our Americas. The jihad web ring, a collection of 55 jihad-related websites, lost dozens of its sites due to pullouts by YahooLycos Europe, meanwhile, created a 20-person team to filter its websites for illegal activity and terrorist-related content (Conway, 2002). Cyber-terrorism Is There Really such Thing? One of the most common arguments against cyber-terrorism is that it is an imaginary threat (Lacey, 2007). Contrary to popular perception, there is a minimal chance that cyber-terrorists would exact abuse on innocent people by attacking corporate and governmental computer networks. As of this moment, terrorist organizations use the Internet only for fundraising, communications and propaganda.There is the hap that terrorists might use computers as weaponry to a significant degree, but this will probably happen in the (distant) future (Conway, 2002). At present, terrorists would draw more attention to their cause by setting off bombs instead of hacking bytes (Conway, 2002). Instead of getting extremely paranoid about cyber-terrorism, the government should instead focus on eliminating cyber attacks against companies. As of July 2002, hackers had successfully launched at least 180,000 Internet attacks against more than 400 public, private, governmental and non-profit organizations.The brunt of these attacks fell on the power and energy industries, as well as on the technology and financial services. If left unchecked, these cyber attacks would be very detrimental to consumers in order to make up for their losses to hackers, owners of the above-mentioned industries will grant to raise the prices of their products and services (Fishman, Jospehberg, Linn, Pollack, Victoriano, 2002). Conclusion Paranoia over cyber-terrorism is very dangerous. Aside from diverting attention from more serious crimes such as cyber attacks, it violates civil rights and liberties. beneath the guise of fighting terrorism, even websites whose only crime was to express radical ideas were closed down. While it is the duty of the state to safeguard its constituents from danger, doing so should not encroach their inalienable rights. It is true that terrorism might turn to cyberspace in the future in order to spread even more fear and bloodshed. But before the government rushes out to eliminate cyber-terrorists, it must first have a clear-cut concept of what constitutes cyber-terrorism and what makes a cyber-terrorist. Otherwise, the go vernment will end up worse than the terrorists that it aims to get rid of.References Conway, M. (2002). What is Cyberterrorism? Current History, 101, 436-442. Retrieved October 17, 2008 from Academic Research Library. Fishman, R. M. , Josephberg, K. , Linn, J. , Pollack, J. , & Victoriano, J. (2002). Threat of International Cyberterrorism on the Rise. Intellectual Property & Technology Law Journal, 14, 23. Retrieved October 17, 2008, from ABI/ aver Global. Lacey, D. ComputerWeekly. com. (2007, April 29). How Real is the Threat of Cyber Terrorism? Retrieved October 17, 2008, from http//www. computerweekly. com/blogs/david_lacey/2007/04/how_real_is_the_threat_of_cybe. html Stohl, M. (2006). Cyber Terrorism A Clear and Present Danger, the Sum of All Fears, Breaking Point or Patriot Games? offensive activity Law Soc Change, 46, 223-238. Retrieved October 17, 2008 from SpringerLink. Vatis, M. (2006). The Next Battlefield The Reality of Virtual Threats. Harvard International Review, 28, 56-61. Retrieved October 17, 2008 from ABI/INFORM Global. Weimann, G. United States Institute of Peace. (2004, December). Cyberterrorism How Real Is the Threat? Retrieved October 17, 2008, from http//www. usip. org/pubs/specialreports/sr119. htmlthreat

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.