Skip to main content

Cyber-Terrorism and the Information Sword

Dr. Mahmoud Eid, University of Ottawa

Although there are many different concepts of “terrorism” and no one agreed-upon definition of the term to date, most would acknowledge the existence of “cyber-terrorism,” i.e., the use of information and communications technologies to facilitate any or all forms of terrorism. Individuals or groups can now use cyberspace, computers, and information technology, especially the Internet, to threaten, terrorize and cause harm to both governments and civilians. Terrorists are pioneers in using the latest technologies. In our growing era of cyber-terrorism, a cyber-terrorist can not only conduct the types of attacks that we have grown accustomed to, such as remote bombing, but are increasingly able to deliver horrific destruction at a remove. For example, it is possible, through the use of the Internet, to hack into the processing control systems of a cereal manufacturer, change the levels of iron supplement, and consequently kill the children of a nation enjoying their breakfast. Info-terrorists no longer need to enter an office or a home to steal or distort the information. Without leaving a single trace behind, info-terrorists can steal and tamper with information, create new and corrupt existing electronic files, block access to information by authorized users, and so on.
Information technology is a double-edged sword in time of terrorism. It can be used to create strategies for peaceful resolutions or it can be attacked in ways that exacerbate insecurity. Information can be accurate or distorted, true or false, complete or partial, clear or vague, simple or complicated, stored or distributed, etc. In addition, any information can be re-produced and re-created and consequently constitutes new set(s) of information—hence the relationship to Norbert Wiener’s 1947 cybernetics. There are several impediments to the comprehensive and effective flow of information during a terrorist attack, such as lack of time, lack of adequate infrastructure and information processing technologies, reduced communication between the opposing parties, and the bureaucratic politics of information processing within the governmental apparatus. Information that comes out of terrorist attacks has a different nature from that of normal situations; it has similar characteristics to those of the terrorist situation itself. Therefore, it must be searched out, produced, and dealt with differently by decision-makers (i.e., political, media, etc.); it should be accurate, clear, rational, fast, de-escalating, constructive, and responsible. This session aims at sharing both ideas and the latest experiences regarding the search, creation, processing, reproduction and attack of information in the era of cyber-terrorism.
Source:

Comments

Popular posts from this blog

India-Malaysia ties and the future

Prime Minister Anwar Ibrahim is on his first official visit to India. The main aim of this visit is to seek support for Malaysia’s application to join Brics and to fortify bilateral ties, as the country is keen to improve its connections with one of the rapidly expanding economies in Asia. In light of the increasing crumbling of the global order, particularly stemming from trade disputes between the United States and China, as well as the proxy conflict involving the United States and Russia, Malaysia is encouraged to reassess its foreign policy to uphold its neutral stance. Given India’s status as the largest democracy and the fifth-largest economy globally, along with its notable advancements in indigenous space and defence technologies, it is proposed that India emerge as Malaysia’s key partner in the years ahead. Why India is important for Malaysia The historical ties between India and Malaysia extend back several centuries, with significant Indian cultural, religious, and administ...

THE HISTORY OF TERRORISM: MORE THAN 200 YEARS OF DEVELOPMENT

The history of terrorism dates back at least 1500 years when Jewish resistance groups (66 - 72 A.D.) known as Zealots killed Roman soldiers and destroyed Roman property. The term assassin comes from a Shi'ite Muslim sect (Nizari Isma'ilis - also known as hashashins "hashish-eaters") fighting Sunni Muslims (1090 - 1275) and during Medieval Christendom resisting occupation during the Crusades (1095-1291). The hashashins were known to spread terror in the form of murder, including women and children. The brotherhood of Assassins committed terror so as to gain paradise and seventy-two virgins if killed and to receive unlimited hashish while on earth. The modern development of terrorism began during the French Revolution's Reign of Terror (1793 - 1794). During this period the term terrorism was first coined. Through the past two hundred years, terrorism has been used to achieve political ends and has developed as a tool for liberation, oppression, and i...

The by-election in Kuala Kubu Baharu (KKB) and the Indian electorate

  I was born in Malaysia, belonging to the Indian ethnic group, which constitutes approximately 7% of the country's total population. My durable credence is that I am Malaysian first and foremost, and only then do I identify myself as Indian. Regrettably, it saddens me to witness and hear about the actions of certain politicians who question my loyalty to Malaysia. What is even more disheartening is that some Malaysians have been influenced by the manipulative rhetoric of these self-serving politicians. Recently, I have observed numerous discussions on both mainstream and online news platforms regarding the recognition and inclusion of Indians by ruling parties. Surprisingly, even the opposition has displayed a significant interest in the welfare of Indians. Upon contemplating the reasons behind this sudden surge in attention towards Indians, it becomes evident that it is primarily driven by the upcoming Kuala Kubu Baharu (KKB) by-election. It is noteworthy that such ...