Friday, June 7, 2019

A Growing “Threat” to Society Essay Example for Free

A Growing Threat to Society EssayThe net income is one of the most virile sources of information today. Thus, it has the capacity to enlighten, as well as to mislead. This double-edged potential has turned the Internet into the latest a venue for terrorism. Terrorists are now harnessing the power of the Internet to wreak havoc among the public (Conway, 2002). Terrorists role the Internet mainly as a propaganda tool it is a venue wherein they publicize their cause or justify their ideological justification without misinterpretation or censorship.As of 2002, a majority of the 33 groups deemed foreign terrorist organizations by the United States State Department had their own web sites. There are also many other websites, that, despite non being related to any terrorist group, provide information on how to commit terrorist activities such(prenominal) as bomb-making. The latter often escape criminal prosecution due to the First Amendment, which guarantees freedom of speech t o the general populace (Conway, 2002). The very idea of cyber-terrorism, however, is not without contention. For one, it is still not clear as to what differentiates cyber-terrorism from freedom of expression.Also, on that point are true Internet-related crimes that cannot be considered as cyber-terrorism, although they inflict damage upon the public. Indeed, terrorism in itself is already a notoriously difficult purpose to define. The addition of computers to it further complicates the idea (Conway, 2002). The Internet A New Weapon The Internet was originally mean as a means of resuming contact in the event of a nuclear attack. But due to its speed and convenience, it is currently a major venue for information, communication and commerce. As of September 2006, there were more than than 1 billion Internet users worldwide (Vatis, 2006).With just one click of a mouse, an entrepreneur in Germany can deposit funds to a bank account in Switzerland and talk to a London-based cousin f ace to face through a web camera. A student in California, meanwhile, can learn everything about the Great Wall of China with merely a few keystrokes. by and by 9/11 It was only after 9/11 that the very concept of cyber-terrorism was actually developed. Before 9/11, Internet-related crimes were usually in the form of sending pornographic email to minors, defacing web pages, stealing credit card information and launching computer viruses (Conway, 2002).After 9/11, however, US officials realized that terrorist organizations could use the Internet to bewilder more bloodshed (Weimann, 2004). Al-Qaeda, for instance, could launch missiles or biological weapons to the US by simply pressing the Enter button of a laptop (Stohl, 2006). To a certain extent, the fears of the US were well-founded. In November 2000, an electronic attack was carried out from Pakistan against the Washington-based pro-Israeli lobbying group American Israel Public Affairs Committee (AIPAC).Aside from defacing AIPA Cs site with anti-Israeli commentaries, the attacker alike stole some 3,500 email addresses and 700 credit card numbers, sent anti-Israeli diatribes to the addresses and published the credit card data on the Internet. The Pakistani hacker, known by the alias Dr. Nuker, claimed responsibility for the incident. It turned out that Dr. Hacker was a founder of the Pakistani Hackerz Club, an organization whose objective was to hack for the injustice going around the globe, especially with (sic) Muslims (Conway, 2002).The aforementioned(prenominal) cyber assault was not without precedent. The Lebanese Shiite Islamic group Hezbollah established its collection of web sites in 1995. At present, the group has three websites that can be viewed in either English or Arabic one for its press office, another to describe its attacks on Israeli targets (http//www. moqawama. tv) and a third, Al-Manar TV, for news and information (http//www. manartv. com). These websites on a regular basis provide th e latest information about Hezbollah, including press statements, political declarations, photos, video and audio clips.An email address is also provided as contact information (Conway, 2002). After 9/11, as a result, federal agents issued subpoenas and search warrants to almost every major Internet-based company, including America Online, MSN, Yahoo and Google. In addition, many web sites were subjected to official hitch by the Federal Bureau of Investigation (FBI). Included among those that were closed down were radical Internet radio shows such as IRA Radio, Al Lewis stay and Our Americas. The jihad web ring, a collection of 55 jihad-related websites, lost dozens of its sites due to pullouts by YahooLycos Europe, meanwhile, created a 20-person team to filter its websites for illegal application and terrorist-related content (Conway, 2002). Cyber-terrorism Is There authenticly Such Thing? One of the most common arguments against cyber-terrorism is that it is an imaginary thre at (Lacey, 2007). Contrary to popular perception, there is a minimal chance that cyber-terrorists would exact harm on innocent people by attacking corporate and governmental computer networks. As of this moment, terrorist organizations use the Internet only for fundraising, communications and propaganda.There is the possibility that terrorists might use computers as weaponry to a significant degree, but this will probably croak in the (distant) future (Conway, 2002). At present, terrorists would draw more attention to their cause by setting off bombs instead of hacking bytes (Conway, 2002). Instead of getting extremely insane about cyber-terrorism, the government should instead focus on eliminating cyber attacks against companies. As of July 2002, hackers had successfully launched at least 180,000 Internet attacks against more than 400 public, private, governmental and non-profit organizations.The brunt of these attacks fell on the power and energy industries, as well as on the te chnology and financial services. If left unchecked, these cyber attacks would be very detrimental to consumers in value to cause up for their losses to hackers, owners of the above-mentioned industries will have to raise the prices of their products and services (Fishman, Jospehberg, Linn, Pollack, Victoriano, 2002). Conclusion Paranoia over cyber-terrorism is very dangerous. Aside from diverting attention from more serious crimes such as cyber attacks, it violates civil rights and liberties.Under the guise of fighting terrorism, even websites whose only crime was to express radical ideas were closed down. While it is the trade of the state to safeguard its constituents from danger, doing so should not infringe their inalienable rights. It is true that terrorism might turn to cyberspace in the future in order to spread even more fear and bloodshed. But before the government rushes out to eliminate cyber-terrorists, it must first have a clear-cut concept of what constitutes cyber -terrorism and what makes a cyber-terrorist. Otherwise, the government will end up worse than the terrorists that it aims to get rid of.References Conway, M. (2002). What is Cyberterrorism? Current History, 101, 436-442. Retrieved October 17, 2008 from Academic Research Library. Fishman, R. M. , Josephberg, K. , Linn, J. , Pollack, J. , Victoriano, J. (2002). Threat of International Cyberterrorism on the Rise. Intellectual Property Technology Law Journal, 14, 23. Retrieved October 17, 2008, from ABI/INFORM Global. Lacey, D. ComputerWeekly. com. (2007, April 29). How Real is the Threat of Cyber Terrorism? Retrieved October 17, 2008, from http//www. computerweekly. com/blogs/david_lacey/2007/04/how_real_is_the_threat_of_cybe. html Stohl, M. (2006). Cyber Terrorism A Clear and Present Danger, the Sum of only Fears, Breaking Point or Patriot Games? Crime Law Soc Change, 46, 223-238. Retrieved October 17, 2008 from SpringerLink. Vatis, M. (2006). The Next Battlefield The Reality of Vi rtual Threats. Harvard International Review, 28, 56-61. Retrieved October 17, 2008 from ABI/INFORM Global. Weimann, G. United States Institute of Peace. (2004, December). Cyberterrorism How Real Is the Threat? Retrieved October 17, 2008, from http//www. usip. org/pubs/specialreports/sr119. htmlthreat

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.