Skip to main content

Cyber-Terrorism and the Information Sword

Dr. Mahmoud Eid, University of Ottawa

Although there are many different concepts of “terrorism” and no one agreed-upon definition of the term to date, most would acknowledge the existence of “cyber-terrorism,” i.e., the use of information and communications technologies to facilitate any or all forms of terrorism. Individuals or groups can now use cyberspace, computers, and information technology, especially the Internet, to threaten, terrorize and cause harm to both governments and civilians. Terrorists are pioneers in using the latest technologies. In our growing era of cyber-terrorism, a cyber-terrorist can not only conduct the types of attacks that we have grown accustomed to, such as remote bombing, but are increasingly able to deliver horrific destruction at a remove. For example, it is possible, through the use of the Internet, to hack into the processing control systems of a cereal manufacturer, change the levels of iron supplement, and consequently kill the children of a nation enjoying their breakfast. Info-terrorists no longer need to enter an office or a home to steal or distort the information. Without leaving a single trace behind, info-terrorists can steal and tamper with information, create new and corrupt existing electronic files, block access to information by authorized users, and so on.
Information technology is a double-edged sword in time of terrorism. It can be used to create strategies for peaceful resolutions or it can be attacked in ways that exacerbate insecurity. Information can be accurate or distorted, true or false, complete or partial, clear or vague, simple or complicated, stored or distributed, etc. In addition, any information can be re-produced and re-created and consequently constitutes new set(s) of information—hence the relationship to Norbert Wiener’s 1947 cybernetics. There are several impediments to the comprehensive and effective flow of information during a terrorist attack, such as lack of time, lack of adequate infrastructure and information processing technologies, reduced communication between the opposing parties, and the bureaucratic politics of information processing within the governmental apparatus. Information that comes out of terrorist attacks has a different nature from that of normal situations; it has similar characteristics to those of the terrorist situation itself. Therefore, it must be searched out, produced, and dealt with differently by decision-makers (i.e., political, media, etc.); it should be accurate, clear, rational, fast, de-escalating, constructive, and responsible. This session aims at sharing both ideas and the latest experiences regarding the search, creation, processing, reproduction and attack of information in the era of cyber-terrorism.
Source:

Comments

Popular posts from this blog

Constitution of Malaysia: An Introduction Part 5

7 (1) No person shall be punished for an act or omission which was not punishable by law when it was done or made, and no person shall suffer greater punishment for an offence than was prescribed by law at the time it was committed. (2) A person who has been acquitted or convicted of an offence shall not be tried again for the same offence except where the conviction or acquittal has been quashed and a retrial ordered by a court superior to that by which he was acquitted or convicted.

Brexit: A lesson for Malaysians

Yesterday, Britons through a referendum made a decision to leave European Union. The ruling Conservative Party divided on this referendum and David Cameron in favour of ‘Remain’ was defeated outright. Even though he is disagreed with the decision of Britons, he announced that he is resigning from his premiership in respect of people’s decision. We can expect in a mature democracy country like United Kingdom this is vastly anticipated to be transpired.   A few days ago, the current Chief Commissioner of Malaysian Anti-Corruption of Commission made a statement that he is stepping down from his position and there are some rumours indicating that a few prominent officers from the said Commission will either resign or retire. It’s very eccentric news for Malaysians as it will have a profound impact on bribery and corruption issues in Malaysia as a whole. Recently, the results of two by elections were won by Barisan Nasional, the ruling party of Malaysia. Many promises had been...

Two Tales, Two Leaders - PART 1

Man has dual nature; he is both his own person and a member of his country. On the one hand, the law must protect the individual from the injustices of the multitude.  History has shown how individuals fall prey to mass perversity, their crime being simply a refusal to conform to the beliefs and prejudices of the majority. Anwar Ibrahim, The Asian Renaissance, 1997., Page 63. The value system and ethical code therefore determine the success or failure of corrective measures. If the value system is wrong, corrective measures will not be productive or will be only slightly productive. When the value system motivates, very little corrective measures are needed. Dr. Mahathir bin Mohamad, The Malay Dilemma, 1970., Pages 172-173. Introduction Malaysia is our motherland. We love our country. This country has so much of wealth. Even though, Malaysia has agonized considerably in past three decades because of the malpractices of the corrupted characters but she is never fail t...