A Growing “Threat” to Society Essay

  • Category: Culture
  • Words: 1287
  • Published: 01.25.20
  • Views: 431
Download This Paper Check the price for your custom essay

The Internet is one of the most powerful sources of info today.

Therefore, it has the capacity to enlighten, as well as to deceived. This double-edged potential features turned the web into the newest avenue pertaining to terrorism. Terrorists are now harnessing the power of the net to cause havoc among the public (Conway, 2002). Terrorists use the Internet primarily as a propaganda tool – it is a area wherein they publicize all their cause or explain their very own ideological reason without misinterpretation or censorship. As of 2002, a majority of the 33 groupings deemed overseas terrorist agencies by the United States State Office had their particular web sites.

Additionally, there are many other websites, that, in spite of not being related to any terrorist group, showcase how to devote terrorist actions such as bomb-making. The latter typically escape felony prosecution due to the First Modification, which ensures freedom of speech towards the general people (Conway, 2002). The very concept of cyber-terrorism, however , is not without the law. For one, it is still unclear as to what differentiates cyber-terrorism via freedom of expression. Also, there are certain Internet-related crimes that cannot be regarded as cyber-terrorism, whilst they inflict destruction upon people.

Indeed, terrorism in itself is a notoriously difficult concept to establish. The addition of pcs to it further complicates the idea (Conway, 2002). The world wide web: A New System The Internet was originally meant as a means of resuming get in touch with in the event of a nuclear harm. But because of speed and convenience, it is currently a significant venue for facts, communication and commerce.

Since September 2006, there were much more than 1 billion dollars Internet users throughout the world (Vatis, 2006). With just one single click of any mouse, a business person in Australia can first deposit funds into a bank account in Switzerland and talk to a London-based relation face to face by using a web camera. A student in California, at the same time, can learn everything about the Great Wall of China and tiawan with merely a few pressed keys.

After 9/11 It was just after 9/11 that the very concept of cyber-terrorism was actually created. Before 9/11, Internet-related criminal activity were usually in the form of mailing pornographic email to those under 18, defacing web pages, stealing credit-based card information and launching pc viruses (Conway, 2002). After 9/11, yet , US officials realized that terrorist organizations could use the Internet to create more bloodshed (Weimann, 2004). Al-Qaeda, for example, could launch missiles or perhaps biological weapons to the US by simply pressing the “Enter” button of any laptop (Stohl, 2006). To some extent, the concerns over the US were well-founded.

In November 2000, an electronic assault was carried out from Pakistan against the Washington-based pro-Israeli the lobby group American Israel Public Affairs Committee (AIPAC). Apart from defacing AIPAC’s site with anti-Israeli commentaries, the opponent likewise stole some 3, 500 emails and seven-hundred credit card amounts, sent anti-Israeli diatribes towards the addresses and published the credit card data on the Internet. The Pakistaner hacker, regarded by the alias “Dr. Nuker, ” stated responsibility for the occurrence. It turned out that “Dr.

Hacker” was a creator of the Pakistani Hackerz Membership, an organization in whose objective was to “hack to get the injustice going around the globe, especially with (sic) Muslims” (Conway, 2002). These cyber invasion was not without precedent. The Lebanese Shiite Islamic group Hezbollah set up its number of web sites in 1995. Currently, the group has 3 websites which can be viewed in either English language or Arabic – one particular for its press office, one other to describe it is attacks about Israeli objectives (http://www. moqawama. tv) and a third, Al-Manar TV, for news and information (http://www. manartv. com). These websites frequently provide the newest information about Hezbollah, including press statements, personal declarations, images, video and audio fasteners.

An email treat is also provided as info (Conway, 2002). After 9/11, as a result, national agents granted subpoenas and search justifies to almost every major Web-based company, including America On the net, MSN, Askjeeve! and Yahoo. In addition , various web sites had been subjected to established closure by the Federal Bureau of Investigation (FBI). Included between those that were closed straight down were revolutionary Internet car radio shows just like “IRA The airwaves, ” “Al Lewis Live” and “Our Americas. ” The “jihad web diamond ring, ” a collection of 55 jihad-related websites, dropped dozens of their sites due to pullouts by simply Yahoo! Lycos Europe, meanwhile, created a 20-person team to filter it is websites for illegal activity and terrorist-related content (Conway, 2002).

Cyber-terrorism: Is There Really Such Thing? One of the most common arguments against cyber-terrorism is that it is an fictional threat (Lacey, 2007). Despite popular belief, there is a little chance that cyber-terrorists will exact injury on blameless people by attacking company and government computer systems. As of this moment, terrorist businesses use the Internet only for fundraising, marketing and sales communications and propaganda.

There is the likelihood that terrorists might work with computers because weaponry into a significant level, but this will likely “probably happen in the (distant) future” (Conway, 2002). At present, terrorists might draw more attention to all their cause by setting off bombs instead of cracking bytes (Conway, 2002). Instead of getting extremely paranoid regarding cyber-terrorism, the federal government should rather focus on getting rid of cyber attacks against firms.

As of July 2002, cyber criminals had effectively launched at least 180, 000 Net attacks against more than 400 public, personal, governmental and nonprofit businesses. The brunts of these attacks fell on the power and energy sectors, as well as on the technology and financial services. In the event left unchecked, these types of cyber attacks would be incredibly detrimental to consumers – produce up for all their losses to hackers, owners of the above-mentioned industries must raise the rates of their products and services (Fishman, Jospehberg, Linn, Pollack, Victoriano, 2002).

Conclusion Systematisierter wahn over cyber-terrorism is very hazardous. Aside from directing attention coming from more serious crimes such as web attacks, it violates city rights and liberties. Underneath the guise of “fighting terrorism, ” possibly websites whose only crime was to express radical concepts were sealed down.

Although it is the work of the condition to safeguard their constituents by danger, this should not infringe their personal rights. It is true that terrorism may possibly turn to the internet in the future in order to spread even more fear and bloodshed. But before the government pushes out to eradicate “cyber-terrorists, ” it must initial have a clear-cut notion of what comprises cyber-terrorism and what makes a cyber-terrorist.

Or else, the government find yourself worse compared to the terrorists that this aims to eliminate. References Conway, M. (2002). What is Cyberterrorism? Current History, 101, 436-442.

Retrieved March 17, 2008 from Academic Research Selection. Fishman, R. M., Josephberg, K., Linn, J., Pollack, J., & Victoriano, T. (2002). Menace of Foreign Cyberterrorism on the Rise.

Intellectual Home & Technology Law Record, 14, 23. Retrieved August 17, 2008, from ABI/INFORM Global. Lacey, D. ComputerWeekly. com. (2007, April 29). How Genuine is the Risk of Internet Terrorism? Gathered October 17, 2008, coming from http://www. computerweekly. com/blogs/david_lacey/2007/04/ how_real_is_the_threat_of_cybe. html Stohl, M. (2006).

Cyber Terrorism: A Clear and Present Threat, the Total of All Fears, Breaking Level or Patriot Games? Crime Law Soc Change, 46, 223-238. Recovered October 17, 2008 via SpringerLink. Vatis, M. (2006).

The Next Battlefield: The Reality of Virtual Threats. Harvard International Review, twenty eight, 56-61. Retrieved October 17, 2008 from ABI/INFORM Global. Weimann, G. United States Institute of Tranquility. (2004, December).

Cyberterrorism: Just how Real Is definitely the Threat? Retrieved October seventeen, 2008, by http://www. usip. org/pubs/specialreports/sr119. html#threat

Need writing help?

We can write an essay on your own custom topics!

Check the Price