Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2013, : CONTEMPORARY MACEDONIAN DEFENCE - INTERNATIONAL SCIENTIFIC DEFENCE, SECURITY AND PEACE JOURNAL
It is more than obvious that the way of conducting terrorism with the time is becoming more sophisticated. The cyber terrorism is real threat to fast technology development. Potential targets are systems which control the nation’s defenses and critical infrastructure. The terrorist of the future will win the wars without firing a shot - just by destroying infrastructure that significantly relies on information technology. The fast growth of the Internet users and Internet dependence dramatically increased the security risks, unless there are appropriate security measures to help prevention. To understand cyber terrorism it is important to look at its background, to see how the terrorist organizations or individuals are using the advantage of new technology and what kind of measures governments and international organizations are taking to help the fight against cyber terrorism.
Terrorism, one of the vilest crimes, faced by the human community has posed an immense challenge in the post Cold War period. It has existed since the emergence of human societies endangering innocent lives and jeopardizing human rights and fundamental freedoms. Though the conventional motives have remained the same, the traditional concepts and methods of terrorism have taken new dimensions that are more destructive 1 and deadly in nature. In the age of information technology the terrorists have acquired an expertise to produce the most deadly combination of weapons and technology, which are much more modern and scientific. This phenomenon where the cyber space is used to launch terror attacks is also known as cyber-terrorism. It has the potential to do indeterminable harm not only by paralyzing computer infrastructures but also comprehending the use of the cyberspace to support and organize traditional forms of terrorism, such as bombings and suicide attacks. It also poses a deadly threat on the national security of a state by offering a garb of anonymity to the perpetrators of terror. The increased dependency on information technology has dramatically increased the security risks. This new menace will be a severe challenge to global security unless there are appropriate security measures to help prevention. Hence, to understand cyber terrorism, and find out the ways in which the terrorist organizations are using the advantage of this new technology, a look at its background is necessary. This paper shall make an attempt to discuss the rising incidents of cyber terrorism across the globe, the meaning and concept of the term, the motives and methods behind an attack. It shall also discuss the regional and international mechanisms to prevent cyber terrorism, and recommend what more could be done.
As the addiction of internet is increasing at a highly increasing rate from our mobile phones to our streets, from our streets to our colleges, from our colleges to our work places, from our work places to our hospitals and from our hospital to everywhere, the risks caused by cyber terrorism has also increased. During the past few decades, the threats posed by cyber terrorism have increased to a deadly rate. It has raised a question mark to the Government's security policies and agendas. This caused Government agencies to revise their security policies. It has raised awareness of the other channels that terrorists might be adopting to accomplish their ambitions. These attacks are planned to cause severe economic damage to someone and even in some cases it harms someone's life. This research is designed for a clear understanding of a layman what cyber terrorism exactly is
The tremendous achievements and the development of the leading technology, sophisticaled computer systems opened new " cyberspace " that constantly destroys the old traditional forms of organization, behavior and belief. Cyber information led to cyber revolution and the emergence of the information society, which dominates the race for information and communication technologies, in parallel the global liberalization and free circulation of people, goods and ideas (Stern, Jessica, 1999). Today, thirty years after the introduction of the term, the concept of cybernetics, it inevitably became a primary component of many important terms: cyber society, cyber policy, cyber economy, cyber warefare, cyber terrorism, cyber crime, in which essentially the most precious crown represents cyber information. Cyber terrorism is an important cybersystem of cyber warefare, and is very difficult to detect and counter because it is almost impossible to determine the political affiliation or sponsors of its prepertators.
Throughout history, there have been many events and dangers that threaten state security, causing heavy loss of life, disease, injuries, destruction of property, displacement of large numbers of people and heavy economic losses. Political unrest on international and local levels and recent technological developments increase the seriousness of threats against national security.
TERRORIST USE OF CYBER TECHNOLOGY, 2021
The risk posed by terrorist use of cyber technology and cyber terrorism have been of great concern to politicians, decision makers, security officials. This article studies terrorist use of cyber technology and cyber terrorism along with history of cyber-terrorism. Moreover some concepts such as between cyber-crime, cyber-terrorism, cyber-warfare and hactivism will be analysed. Furthermore, the challenges faced by international organisations in tackling cyber terrorism will be discussed; measures introduced in some countries to address cyber terrorism treats are presented as well as discussions on the present and the future treat posed by cyber terrorism and terrorist use of cyber technology.
During the history of mankind, there have been many events and dangers that threaten the security of states. Those threats caused heavy loss of life, the spread of disease, injuries, destruction of public and private property, displacement of large numbers of people and heavy economic losses. Political unrest on international and local levels, and recent technological developments, are elements that would increase the seriousness of threats against national security. 1. The concept of security has evolved gradually, especially after a major international transformation: the disintegration of Soviet Union, the end of the Cold War. Thus, it has left behind the impact of the policy of the bipolar world, which gave a blurred image of relations between the states, and made it ambiguous. However, it has given an opportunity to them to understand and identify new threats and emerging conflicts, in addition to many unsolved problems. Simultaneously, globalisation has changed the international rules and norms, in order to facilitate the rapid flow of capital and technology, through the weakening of national barriers. Non-governmental actors have come to play an essential role in international politics, some of them a threat, and others to bridge the gap between communities and nations. In such circumstances, the role of the state began to suffer from the changes; also the accepted traditional concept of power was opposed. 2. Today there is no issue of such concern worldwide, and arousing such a high degree of hot debate at both national and international levels, as terrorism-related issues. The threat of terrorism has never been a prominent as it seems to be at the present time. Terrorism is an old phenomenon that has existed since the emergence of human societies. However, the threat of terrorism has increased steadily over the past 30 years. With the technological and Abstract SRJIS/BIMONTHLY/SANJU CHAUDHARY (1389-1397) JAN-FEB 2016, VOL-3/22 www.srjis.com Page 1390 technical progress in various areas, the actions of terrorists have become more dangerous and destructive, as the perpetrators of such acts are becoming more elusive. There are few parts of the world that have been left out of the current waves of terrorism, which started in the late 1960s.
Science and Engineering Ethics, 2017
In the recent years, an alarming rise in the incidence of cyber attacks has made cyber security a major concern for nations across the globe. Given the current volatile socio-political environment and the massive increase in the incidence of terrorism, it is imperative that government agencies rapidly realize the possibility of cyber space exploitation by terrorist organizations and state players to disrupt the normal way of life. The threat level of cyber terrorism has never been as high as it is today, and this has created a lot of insecurity and fear. This study has focused on different aspects of cyber attacks and explored the reasons behind their increasing popularity among the terrorist organizations and state players. This study proposes an empirical model that can be used to estimate the risk levels associated with different types of cyber attacks and thereby provide a road map to conceptualize and formulate highly effective counter measures and cyber security policies.
TERRORIST’S CYBER ACTIVITIES – A GROWING THREAT, 2018
The 21st century is characterized by migration of political, social or criminal processes to cyberspace. Similar tendencies are also observed in terms of terrorism. Terrorist groups do not possess cyber-attacks sufficient to cause significant harm and therefore prefer conventional attacks. However, if at least one year ago, conventional attacks were the only mechanism available to them to cause real damage and fear, nowadays the likelihood of cyber-attacks is likely to increase, due to better aware extremist generation and the failure of the conventional forces of terrorist organizations in Afghanistan and Syria-Iraq
sites.google.com
International Journal of Sustainable Future for Human Security
The advent of the Internet over 20 years ago has led to human beings around the globe becoming increasingly dependent on it as a means of communication, commerce, news gathering and socializing. This dependency has offered a perfect platform from which to launch cyber terrorism. This paper investigates the wide-reaching consequences of using the Internet in terms of human security. Our study finds that cyber terrorism, like traditional terrorism, has an obvious negative impact which involves economic, legal, physical, psychological, political and social consequences. It is the aim of this paper to show how these consequences pose a significant threat to human security and sustainability.
O Bezpeczeństwie i Obronności, 2024
The phenomenon of globalization, the development of technology, and the widespread use of the Internet have led to the creation of a digital space for information processing and exchange. Currently, it is used by various users, including public institutions, private companies, and individual users who have access to the network at home and on private electronic devices. Cyberspace protection has therefore become one of the main strategic goals in the security area of every states. Ensuring it depends mainly on the creation of effective mechanisms for preventing and combating threats on the Internet. The aim of this article is to present the issue of cyberterrorism as one of the main threats to the security of society and the state in cyberspace. With the development of the Internet, terrorists have new opportunities to act, regardless of where they are at any given time. Therefore, the article attempts to define the concept of cyberterrorism and the possible applications of this form of activity on the Internet. An important aspect has become the analysis of the benefits of using cyberspace for terrorist groups, including in terms of the radicalization of young people.
Cyber security has becoming significant for the whole national security with every passing day and major reason of is the cyber terrorism which was started as minor level has not reached to the state level where states are involved in this type of terrorism for securing own national interest and damaging others. Cyber terrorism is much safer, low cost and easily operate able from any part of the globe which make it more lethal and destructive. In paper the history of cyber terrorism and the major operations conducted by states against other states and non-state actors have been discussed keeping and advocating the increasing significance in international politics. Cyber terrorism has made its place in terrorism quite rapidly and make the security issues more complex and hard to tackle and to adopt a strong counter cyber terrorism policy and mechanism is highly necessary for every state for its own security.
Cyber-threats can range from minor electronic crimes to more sophisticated fraud and the infiltration and compromise of systems, networks and supply chains causing significant damage and harm. Cyber-threats are actioned by more than terrorists; actors who engage in cyber-threat activities and events vary from individuals, corporations involved in industrial espionage, criminals and criminal enterprises, terrorists and terrorist organizations and even nation states; recent reports indicate that Russian forces hacked a U.S. surveillance drone flying over the Crimea region of Ukraine in March 2014 by allegedly severing the connection between the drone and its operator using an undisclosed, complex radio-electronic technology, resulting in its interception. These asymmetrical characteristics are distinctly different than that of conventional threats, requiring specialized, “cutting edge” skills to prevent, detect, respond and recover. The Internet has added a level of ambiguity and comp...
Journal of Social Sciences and Humanities, 2017
In today’s postmodern world with the latest and top notch internet technologies in the market, if it has become easy and accessible for everyone to communicate with others sitting at the other corner of the world, it has also given rise to the cybercrimes including cyber terro rism which has not only provided grave threats to the whole world but also posed a question of whether with the manipulation of cyber space, cyber terrorists can damage or destroy the physical infrastructure of its target. Owing to easy access to everyone and strong damage done as compared to traditional terrorism, today terrorists are relying on cyber terrorism as well. The Islamic State (IS) has emerged as one of the brutal and violent terrorist organization s which hired cyber experts and manipulated cyber space to the extent that today they are most active and professional cyber users’ terrorist organization of the world. The main focus of the paper is to highlight the basic definition of cyber terrorism, ...
Defence and Diplomacy, 2015
The presence of terrorists in the cyber world is not a new phenomenon as they had existed and used the resources of the internet for their operations since day one. However, their reliance on the internet is increasing day by day for various operational requirements. This is evident from the recent media reports which state that the Islamic State in Syria (ISIS), has succeeded in recruiting more than 20,000 foreign fighters to fight for its cause. It would have not been possible for the ISIS to reach out to such numbers and even more, people across the globe, had it not been fo the internet. The traditional thinking was that terrorists would cause chaos in the virtual world by attacking computer networks, including the internet. However, it was not realised for a long time that more than a rational attack, the terrorists would use the information and resources readily available on the internet and get assistance from other technological developments of the cyber world to aid and conduct their evil missions. In other words, terrorists use and abuse the internet for their own benefit, more than attacking it physically or virtually. Hence, this paper would study the modus operandi followed by the terrorists in cyber space for their operational needs.
It is more than obvious that the way of conducting terrorism with time is becoming more sophisticated. Cyber terrorism is a real threat to fast technology development. The terrorist of the future will win the wars without firing a shot - just by destroying infrastructure that significantly relies on information technology. The fast growth of Internet users and Internet dependence dramatically increased the security risks, unless there are appropriate security measures to help prevention. Cyber terrorism is a catastrophic phenomenon that has not yet attracted the attention of the Indian Legislature. The law in this regard is not sufficient and the problem of cyber terrorism can be tackled properly either by making a separate law in this regard or by making suitable amendments in the already existing Information Technology Act, 2000. In the absence of the political and legislative will to fill in this lacuna, the judiciary has to play a proactive role and construe the provisions of existing laws in a purposive manner.
ABSTRACT: It is crystal clear that there has been systematic transformation of human activities and societies since the advent of information‟s technologies (IT). However, this information Technology that ought to be of enormous advantage without any fear in its usage by people has been hijacked by the world terrorists to lunch many attacks via cyberspace (internet).Cyber terrorism has been one of the social ideological menaces that have great challenges to the contemporary society all over the world. However, the emergence of this cyber terrorism has the potentials to vitiate the positive uses of information technology if not properly and promptly addressed. It is in the light of this that this study critically explores contemporary literatures of this topical issue of information technology aided terrorism (cyber terrorism). The study presents the semantic interpretations of cyber terrorism, the components of cyber terrorism, the motivating factors of cyber terrorism, the various cyber terrorism techniques usually adopted by the perpetrators (terrorists), and the consequences of such a prevalence cyber attack. The study equally suggests the possible panaceas to tackle the problem of cyber terrorism so as to maximize the benefits attached to information technology (IT) and minimize the evil posed by the terrorists.
JOURNAL OF DEFENCE STUDIES, 2021
The ever-growing dependence of man on cybernetworks has unbridled a modish genre of cyberthreat called cyberterrorism. The pervasive cyberspace has provided an advantageous operational frontier to the terrorists for executing cyberattacks on critical infrastructures, spreading hate propaganda over the Internet and using it for recruitment, planning and effecting terror attacks. Furthermore, it has proliferated terror configurations and metamorphosed terror operations. There is the most urgent need to secure our cyberspace from such formidable cyberthreats. Formulating a cybersecurity strategy through international cooperation is a desideratum to confront mushrooming cyberterrorism which poses a severe threat to global security and current economic scenario. This article examines cyberterrorism as a component of cyberthreats and further analyses the constitutional obligation of the state to protect cyberspace.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.