Sunday, April 14, 2019
A Growing ââ¬ÅThreatââ¬Â to Society Essay Example for Free
A Growing Threat to clubho persona EssayThe network is one of the most powerful sources of information today. Thus, it has the capacity to enlighten, as well as to mislead. This double-edged potential has flexureed the earnings into the latest avenue for terrorism. Terrorists are now harnessing the power of the Internet to wreak havoc among the public (Conway, 2002). Terrorists use the Internet mainly as a propaganda tool it is a venue wherein they publicize their cause or explain their ideological justification with fall out misinterpretation or censorship.As of 2002, a majority of the 33 groups deemed foreign terrorist organizations by the United States State Department had their own web sites. There are also m any(prenominal) other websites, that, despite not being related to any terrorist group, provide information on how to commit terrorist activities such as bomb-making. The latter often escape culpable prosecution collectible to the First Amendment, which guarante es freedom of speech to the general populace (Conway, 2002). The very idea of cyberwar, however, is not without contention. For one, it is still not clear as to what differentiates cyberwar from freedom of expression.Also, there are certain Internet-related crimes that cannot be considered as cyber-terrorism, although they inflict damage upon the public. Indeed, terrorism in itself is already a notoriously difficult invention to define. The addition of computers to it further complicates the idea (Conway, 2002). The Internet A New Weapon The Internet was originally think as a means of resuming contact in the event of a nuclear attack. still due to its speed and convenience, it is currently a major venue for information, communication and commerce. As of September 2006, there were much than 1 billion Internet users worldwide (Vatis, 2006).With just one click of a mouse, an entrepreneur in Germany can deposit funds to a bank account in Switzerland and talk to a London-based cousin -german face to face through a web camera. A student in California, meanwhile, can check off everything about the Great Wall of China with merely a few keystrokes. After 9/11 It was only after 9/11 that the very plan of cyber-terrorism was actually developed. Before 9/11, Internet-related crimes were usually in the form of sending pornographic email to minors, defacing web pages, stealing credit billhook information and launching computer viruses (Conway, 2002).After 9/11, however, US officials realized that terrorist organizations could use the Internet to provide more bloodshed (Weimann, 2004). Al-Qaeda, for instance, could launch missiles or biological weapons to the US by simply pressing the embark button of a laptop (Stohl, 2006). To a certain extent, the fears of the US were well-founded. In November 2000, an electronic attack was carried out from Pakistan against the Washington-based pro-Israeli lobbying group American Israel Public Affairs Committee (AIPAC).Aside from defacing AIPACs site with anti-Israeli commentaries, the attacker alike stole some 3,500 email look ates and 700 credit card numbers, sent anti-Israeli diatribes to the addresses and published the credit card info on the Internet. The Pakistani hacker, known by the alias Dr. Nuker, claimed responsibility for the incident. It turned out that Dr. Hacker was a founder of the Pakistani Hackerz Club, an organization whose objective was to hack for the injustice going around the globe, especially with (sic) Muslims (Conway, 2002).The same cyber assault was not without precedent. The Lebanese Shiite Islamic group Hezbollah established its collection of web sites in 1995. At present, the group has three websites that can be viewed in either English or Arabic one for its press office, another to describe its attacks on Israeli targets (http//www. moqawama. tv) and a third, Al-Manar TV, for news and information (http//www. manartv. com). These websites regularly provide the latest inform ation about Hezbollah, including press statements, political declarations, photos, video and audio clips.An email address is also provided as contact information (Conway, 2002). After 9/11, as a result, federal agents issued subpoenas and front warrants to almost every major Internet-based company, including America Online, MSN, Yahoo and Google. In addition, many web sites were subjected to official pulley by the Federal Bureau of Investigation (FBI). Included among those that were closed down were radical Internet radio set shows such as IRA Radio, Al Lewis Live and Our Americas. The jihad web ring, a collection of 55 jihad-related websites, lost dozens of its sites due to pullouts by YahooLycos Europe, meanwhile, created a 20-person team to filter its websites for illegal natural process and terrorist-related content (Conway, 2002). Cyber-terrorism Is There Really Such Thing? One of the most common arguments against cyber-terrorism is that it is an imaginary threat (Lacey, 20 07). Contrary to popular perception, there is a minimal chance that cyber-terrorists would exact violate on innocent people by attacking corporate and governmental computer networks. As of this moment, terrorist organizations use the Internet only for fundraising, communications and propaganda.There is the possibility that terrorists might use computers as weaponry to a significant degree, but this will probably happen in the (distant) future (Conway, 2002). At present, terrorists would draw more attention to their cause by setting off bombs instead of hacking bytes (Conway, 2002). Instead of getting extremely paranoiac about cyber-terrorism, the government should instead focus on eliminating cyber attacks against companies. As of July 2002, hackers had successfully launched at least 180,000 Internet attacks against more than 400 public, private, governmental and non-profit organizations.The brunt of these attacks fell on the power and energy industries, as well as on the technolo gy and financial services. If left unchecked, these cyber attacks would be very detrimental to consumers in order to advance up for their losses to hackers, owners of the above-mentioned industries will have to raise the prices of their products and services (Fishman, Jospehberg, Linn, Pollack, Victoriano, 2002). Conclusion Paranoia over cyber-terrorism is very dangerous. Aside from diverting attention from more serious crimes such as cyber attacks, it violates civil rights and liberties. downstairs the guise of fighting terrorism, even websites whose only crime was to express radical ideas were closed down. While it is the concern of the state to safeguard its constituents from danger, doing so should not infringe their inalienable rights. It is true that terrorism might turn to cyberspace in the future in order to spread even more fear and bloodshed. But before the government rushes out to eliminate cyber-terrorists, it must first have a clear-cut concept of what constitutes cy ber-terrorism and what makes a cyber-terrorist. Otherwise, the government will end up worse than the terrorists that it aims to get rid of.References Conway, M. (2002). What is Cyberterrorism? present-day(prenominal) History, 101, 436-442. Retrieved October 17, 2008 from Academic Research Library. Fishman, R. M. , Josephberg, K. , Linn, J. , Pollack, J. , Victoriano, J. (2002). Threat of International Cyberterrorism on the Rise. Intellectual Property Technology Law Journal, 14, 23. Retrieved October 17, 2008, from ABI/ avow Global. Lacey, D. ComputerWeekly. com. (2007, April 29). How Real is the Threat of Cyber Terrorism? Retrieved October 17, 2008, from http//www. computerweekly. com/blogs/david_lacey/2007/04/how_real_is_the_threat_of_cybe. html Stohl, M. (2006). Cyber Terrorism A Clear and Present Danger, the Sum of on the whole Fears, Breaking Point or Patriot Games? Crime Law Soc Change, 46, 223-238. Retrieved October 17, 2008 from SpringerLink. Vatis, M. (2006). The Next Ba ttlefield The Reality of practical(prenominal) Threats. Harvard International Review, 28, 56-61. Retrieved October 17, 2008 from ABI/INFORM Global. Weimann, G. United States Institute of Peace. (2004, December). Cyberterrorism How Real Is the Threat? Retrieved October 17, 2008, from http//www. usip. org/pubs/specialreports/sr119. htmlthreat
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.