Skip to main content

Cyber-Terrorism and the Information Sword

Dr. Mahmoud Eid, University of Ottawa

Although there are many different concepts of “terrorism” and no one agreed-upon definition of the term to date, most would acknowledge the existence of “cyber-terrorism,” i.e., the use of information and communications technologies to facilitate any or all forms of terrorism. Individuals or groups can now use cyberspace, computers, and information technology, especially the Internet, to threaten, terrorize and cause harm to both governments and civilians. Terrorists are pioneers in using the latest technologies. In our growing era of cyber-terrorism, a cyber-terrorist can not only conduct the types of attacks that we have grown accustomed to, such as remote bombing, but are increasingly able to deliver horrific destruction at a remove. For example, it is possible, through the use of the Internet, to hack into the processing control systems of a cereal manufacturer, change the levels of iron supplement, and consequently kill the children of a nation enjoying their breakfast. Info-terrorists no longer need to enter an office or a home to steal or distort the information. Without leaving a single trace behind, info-terrorists can steal and tamper with information, create new and corrupt existing electronic files, block access to information by authorized users, and so on.
Information technology is a double-edged sword in time of terrorism. It can be used to create strategies for peaceful resolutions or it can be attacked in ways that exacerbate insecurity. Information can be accurate or distorted, true or false, complete or partial, clear or vague, simple or complicated, stored or distributed, etc. In addition, any information can be re-produced and re-created and consequently constitutes new set(s) of information—hence the relationship to Norbert Wiener’s 1947 cybernetics. There are several impediments to the comprehensive and effective flow of information during a terrorist attack, such as lack of time, lack of adequate infrastructure and information processing technologies, reduced communication between the opposing parties, and the bureaucratic politics of information processing within the governmental apparatus. Information that comes out of terrorist attacks has a different nature from that of normal situations; it has similar characteristics to those of the terrorist situation itself. Therefore, it must be searched out, produced, and dealt with differently by decision-makers (i.e., political, media, etc.); it should be accurate, clear, rational, fast, de-escalating, constructive, and responsible. This session aims at sharing both ideas and the latest experiences regarding the search, creation, processing, reproduction and attack of information in the era of cyber-terrorism.
Source:

Comments

Popular posts from this blog

Terrorism in Africa

According to state.gov, ISIS was defeated a few years ago. However, the organization's presence and existence remain conspicuous in Africa. Ongoing conflicts in Somalia, Ethiopia, Mozambique, Nigeria, and Burkina Faso demonstrate that ISIS has shifted its focus away from Iraq and Syria. Although ISIS lacks a clear hierarchy like Al-Qaeda, its followers and supporters wholeheartedly believe in its strong ideology. In 2014, the United States led the formation of a broad international coalition known as 'The Global Coalition to Defeat ISIS' to combat the organization during the height of the Syrian and Iraqi conflict. The primary objectives of this 83-member coalition are to degrade and defeat ISIS, which poses a threat to international peace and security. ISIS has brought thousands of foreign fighters from around the world to combat zones like Syria and Iraq, and it has used technology to promote its violent extremist ideology and instigate terrorist attacks. For example, t

Sedition Act 1948 should have been repealed a long time ago. But why?

THE Sedition Act 1948 is a legislative measure that was enacted in Malaysia during the colonial era, designed to curb any form of speech or expression that was deemed to be seditious in nature with the aim of maintaining public order and security. The Sedition Act has been subject to much debate and criticism, with some arguing that it is a violation of freedom of speech and expression. Despite this, the Act remains in force in Malaysia to this day, albeit with some amendments made over the years. Although I concur with the abolition of this Act, it is imperative that a comparable new legislation be enacted to address the escalating prevalence of racially and religiously bigoted remarks that have been unsettling our distinctive multicultural and multi-religious society as of late. An instance that exemplifies the prudent decision-making of the governing body is the substitution of the Internal Security Act of 1960 with the Security Offences (Special Measures) Act 2012 (SOSMA). This rep

THE HISTORY OF TERRORISM: MORE THAN 200 YEARS OF DEVELOPMENT

The history of terrorism dates back at least 1500 years when Jewish resistance groups (66 - 72 A.D.) known as Zealots killed Roman soldiers and destroyed Roman property. The term assassin comes from a Shi'ite Muslim sect (Nizari Isma'ilis - also known as hashashins "hashish-eaters") fighting Sunni Muslims (1090 - 1275) and during Medieval Christendom resisting occupation during the Crusades (1095-1291). The hashashins were known to spread terror in the form of murder, including women and children. The brotherhood of Assassins committed terror so as to gain paradise and seventy-two virgins if killed and to receive unlimited hashish while on earth. The modern development of terrorism began during the French Revolution's Reign of Terror (1793 - 1794). During this period the term terrorism was first coined. Through the past two hundred years, terrorism has been used to achieve political ends and has developed as a tool for liberation, oppression, and i