Monday, June 3, 2019
The Internet Can Be Used For Terrorism
The Internet Can Be Used For TerrorismThe profit covers a vast number of ways in which it drive out be employ for terrorism, the most common way in which terrorist use the internet, is in fact the use we fear least, namely the use to recruit, communicate and spread propaganda. Cyber war, which includes, terrorist fires such as hacking into nu decipherable power plants, flight control or even businesss is in reality until now to be seen or even developed by terrorists, even it is hush the side of internet terrorism that we fear most. The terrorists using the internet can non be soft defined as one group of people. John Deutch argues that there atomic number 18 three types of terrorists, the offset is state sponsored terrorists, second is groups trying to overthrow their government to gain independence and finally Islamic terrorists who operate and have interests in non one sole country but instead with in a region, which in their case is predominantly, but not solely, the mi ddle east.1The different aims and the spot of how radical each group is, will affect the extent to which different terrorists are willing to use the internet to achieve their goal.The internets simple accessibility, minimal restrictions and revive to reach vast potential audiences is the basis for why it has become so popular for governments, businesses and the public, including terrorists, to increasingly use it for e reallyday tasks. The freedom and equality that the internet allows, and which participatory countries support, is a double-edged sword as it allows terrorists to just as easily coordinate and conform to round these democratic values. The internet provides a means for terrorists to attack on a more level playing field in a cyber war, instead of the traditional means of state of war in which the states military high quality can usually defeat the terrorists. However, accessing and attacking information on the internet can be sternlyer in less democratic countrie s such as chinaware where the internet is heavily censored. Gabriel Weimann says that most terrorist sites emphasize two issues, the restrictions placed on freedom of expression and the plight of comrades who are now political prisoners2. With regard to the first point that terrorists sites emphasize the restrictions placed on their freedom, this in truth notion that they are publicising this worldwide on their sites to mass audiences is a contradiction of having their free speech restricted. Furthermore, notwithstanding the United States military attacks on Al Qaeda since the war on terror, Al Qaeda has still gained large publicity in the west. Whether this is video tapes of Osama stash away Laden, or messages warning of further attacks, it has allowed them the freedom to spread their message and fear to their enemies. Weimann goes on to say though that terrorist sites swiftly emerge, modify their formats, and then swiftly thaw again. In some cases, e.g. Al Qaedas, locations an d contents change almost insouciant3. If terrorists freedom were unrestricted, they would not have to do this, therefore the internet is clearly a place that offers terrorists vast opportunities, but not without extreme risk and precaution.The internets opportunities that have been exploited the most are the use of propaganda and recruiting, targeting mainly potential supporters and the public of the confrontation, Potentials are bombarded with anti-American propaganda4. Prior to the internet, the only outlet the terrorists had was television, radio and newspapers, all of which are selective, and more cautious to a certain extent, of what they choose to publicise. Indirectly however, the internet has in truth helped terrorists reach audiences through these traditional media outlets. Press releases are often placed on the websites in an effort to get the organisations point of view into the traditional media.5 strange journalists are genuinely aimed at through the internet in thi s manner, the internet not only provides a way for terrorists to reach the public, but also in fact allows them to reach out through traditional media outlets, which previously was very rare. It allows mainstream journalists to access and choose whether to publicise their material, which prior to the internet would have been very hard to get their message to these journalists. The extent of this should not be overstated though, it whitethorn have made it easier for terrorist groups to catch the attention of journalists, but that by no means, and is still very rare, that they will publicise their message, at least not in the light that the terrorists would like it to be portrayed anyway.The internet also provides an outlet for mental warfare, fundraising, co-ordinating attacks and for hiding encrypted manuals and instructions6. There is much evidence to support this the IRA as well as other terrorist groups has received many donations online. Psychological warfare has been committed by posting beheadings and murder online, such as the murder of American journalist Daniel pearl. Donald Rumsfeld said that an Al Qaeda terrorist manual said it was potential to gather at least 80% of all information required about the enemy to co-ordinate an attack. As for terrorist manuals and instructions, the terrorists handbook, anarchists cookbook and the Encyclopaedia of jihad, which include exposit of how to run an underground organisation and execute attacks, can be easily found online. Despite the internet providing an outlet for these uses, most of the operating systems and programs used by these terrorists are likely to be American made meaning it is highly likely that precautionary counter measures are already in place by America to balk an attack against them. Fundraising can be easily quashed through the collaboration of the governments and card companies, as seen recently with visa and MasterCards ban on donations to Wikileaks. Although not a terrorist organisation , a group nonetheless causing problems to the U.S that they quickly restricted. Psychological warfare using murder and brutality videos are rarely on the internet for long and usually seen by very few because they are not easily available, or plainly because many people do not call for to watch them. The internets use for distributing manuals and co-ordinating attacks has proved harder to restrict though and the growth of cloud computing is only hindering this, cloud computing also at the corresponding time provides another possible area for terrorists to attack, particularly businesss using cloud networks.The mass media has overstated the holy terror of cyber terrorism and made inadequate awareness to the daily uses like recruitment and spreading of propaganda, but this is not to say that the cyber terrorism is not a threat. John Arquilla says that cyberwar Like war in Clausewitzs view, may be a chameleon. It will be adaptable to varying contexts.7As cyberwar is a new concept, i n relation to the centuries of warfare, it is hard to say yet whether this is the case. The extent of its use is fast appearing though, the ability to recruit and train as previously mentioned as well as the ability to hack enemy systems and potentially cripple them shows that a battle could be started, carried out and win with just the effective use of superior hackers. Vice admiral Bevrowski said, We are in the midst of a revolution in military affairs (RMA) unlike any seen since the Napoleonic Age8. I believe that the development of the internet and networks is actually much bigger than the Napoleonic age RMA, but at the same time much more restrained. In a way, it is a much larger revolution because for the first time it creates a more level battlefield for terrorists who can rarely compete militarily against states. Cyberwar in theory can cause an even more destructive victory without killing one person, by solely destroying vital enemy networks and systems, or merely just blu ffing that you are capable and willing to do so. Christopher Joyner believes that it only needs an adversary to attack the US banks and the whole economy would crumble.9On the other hand it could actually prevent what John Arquilla says has been the main aim of warfare since the sixteenth century, attrition or absolute defeat of the enemy10. If you manage to access the enemys networks, but not attack and instead threaten the enemy to surrender, then this could potentially end the battle without casualties. The flaw in the threat of cyberwar is that although the enemy has effectively been defeated, they have not been weakened at all and could come back and attack very quickly. Americans and other nations threatened by terrorists will likely have superior defences in place to prevent this sort of catastrophic attack though, limiting and restraining the use of internet warfare by terrorists. At the same time, despite states superior networks and technology, it is very hard for states t o know how to directly attack rogue terrorist groups without unintentionally attacking civilians again, the possibilities for internet warfare are especial(a). The exception to this would be state sponsored terrorists, states have clear targets such as the military, transportation systems or their stock exchange, all of which can be dealt powerful blows to get them to hand over terrorists and stop supporting them. tralatitious views of war can be applied to cyber war, as Von Clausewitz argues the defending party always has an advantage over the attacking forces. This is true for cyber war and is why attempts to successfully combat cyber terrorism are made more difficult. The defending state has to produce advanced, expensive technological methods to protect all of its information, from its stock exchanges and health address systems to its military and nuclear systems. The attacker on the other hand only has to find a way to access one of these areas to cause catastrophic damage, t hus they can spend more time and money focussing on one area of attack while the defending nation has to spread its resources crossways many this gives the attacking terrorists the advantage. To combat this, the easiest way is to know what area the terrorists plan to attack so you can focus resources. The problem that arises from this solution though is that it is very easy to start abusing civil liberties by illegally monitoring citizens activities and restricting certain information whether this prevents the attack or not, the terrorists will have already won a victory of discrediting the western values of freedom and liberty. The illegal wiretaps that George Bush approved without a warrant under the PATRIOT Act prove this the threat of terrorism is enough to make governments crack and hand the terrorists a small victory.The rise of internet terrorism has changed the hierarchical system in terror cells to a network of international, independent terrorist cells. In order to combat this, states moldiness co-operate and share information. There is plenty of evidence to suggest that sharing information occurs, it is likely that a lot of useful information is not shared though. The issue is not just the sharing information if terrorist cells co-ordinate globally then likewise must governments. John Deutch mentions how Europeans protested over the U.S bombing of Libya after a bomb killed two Americans.11Disagreements make an international response, slower, inefficient and divided. The terrorist cells, for the most part to not have this problem, they articulatio specific terrorist groups because of its reputation and intentions and are usually united under one political or religious aim.The opportunities presented to terrorists by the internet are increasing as the world become more reliant on the internet. At present though, the opportunities are largely non-aggressive and this is mainly because actions such as recruiting over chat entourage and spreading propag anda are hard to combat and even if the enemy finds them, there is usually nothing illegal about these websites and new ones can be easily re-opened under a different name. For terrorists trying to use the internet for aggressive means such as hacking, the opportunities are a lot more limited because most states threatened by terrorism, have invested large amounts of money into cyber defences to combat this.
Subscribe to:
Post Comments (Atom)
The Woman in Black Free Essays
string(65) o As a phantom story its motivation is to engage and to frighten. Part rundowns Arthur Kipps o Introduced in the novel as an ...
-
An examination of the connection between sexuality and suffering - Essay Examplejournal du voleur is the closest genet came to writing a tra...
-
Missing FiguresINTRODUCTIONDespite the fact that divorce is discussed in almost any sociology or anthropology book, no unified explanations ...
-
1. What is the markets perception of the Nivea family brand on each of the following dimensions? Performance- Nivea-primarily through Nivea ...
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.