Skip to main content

Cyber-Terrorism and the Information Sword

Dr. Mahmoud Eid, University of Ottawa

Although there are many different concepts of “terrorism” and no one agreed-upon definition of the term to date, most would acknowledge the existence of “cyber-terrorism,” i.e., the use of information and communications technologies to facilitate any or all forms of terrorism. Individuals or groups can now use cyberspace, computers, and information technology, especially the Internet, to threaten, terrorize and cause harm to both governments and civilians. Terrorists are pioneers in using the latest technologies. In our growing era of cyber-terrorism, a cyber-terrorist can not only conduct the types of attacks that we have grown accustomed to, such as remote bombing, but are increasingly able to deliver horrific destruction at a remove. For example, it is possible, through the use of the Internet, to hack into the processing control systems of a cereal manufacturer, change the levels of iron supplement, and consequently kill the children of a nation enjoying their breakfast. Info-terrorists no longer need to enter an office or a home to steal or distort the information. Without leaving a single trace behind, info-terrorists can steal and tamper with information, create new and corrupt existing electronic files, block access to information by authorized users, and so on.
Information technology is a double-edged sword in time of terrorism. It can be used to create strategies for peaceful resolutions or it can be attacked in ways that exacerbate insecurity. Information can be accurate or distorted, true or false, complete or partial, clear or vague, simple or complicated, stored or distributed, etc. In addition, any information can be re-produced and re-created and consequently constitutes new set(s) of information—hence the relationship to Norbert Wiener’s 1947 cybernetics. There are several impediments to the comprehensive and effective flow of information during a terrorist attack, such as lack of time, lack of adequate infrastructure and information processing technologies, reduced communication between the opposing parties, and the bureaucratic politics of information processing within the governmental apparatus. Information that comes out of terrorist attacks has a different nature from that of normal situations; it has similar characteristics to those of the terrorist situation itself. Therefore, it must be searched out, produced, and dealt with differently by decision-makers (i.e., political, media, etc.); it should be accurate, clear, rational, fast, de-escalating, constructive, and responsible. This session aims at sharing both ideas and the latest experiences regarding the search, creation, processing, reproduction and attack of information in the era of cyber-terrorism.
Source:

Comments

Popular posts from this blog

Constitution of Malaysia: An Introduction Part 5

7 (1) No person shall be punished for an act or omission which was not punishable by law when it was done or made, and no person shall suffer greater punishment for an offence than was prescribed by law at the time it was committed. (2) A person who has been acquitted or convicted of an offence shall not be tried again for the same offence except where the conviction or acquittal has been quashed and a retrial ordered by a court superior to that by which he was acquitted or convicted.

Brexit: A lesson for Malaysians

Yesterday, Britons through a referendum made a decision to leave European Union. The ruling Conservative Party divided on this referendum and David Cameron in favour of ‘Remain’ was defeated outright. Even though he is disagreed with the decision of Britons, he announced that he is resigning from his premiership in respect of people’s decision. We can expect in a mature democracy country like United Kingdom this is vastly anticipated to be transpired.   A few days ago, the current Chief Commissioner of Malaysian Anti-Corruption of Commission made a statement that he is stepping down from his position and there are some rumours indicating that a few prominent officers from the said Commission will either resign or retire. It’s very eccentric news for Malaysians as it will have a profound impact on bribery and corruption issues in Malaysia as a whole. Recently, the results of two by elections were won by Barisan Nasional, the ruling party of Malaysia. Many promises had been...

Trump's role in the Israel-Hamas ceasefire

As the Israel-Hamas ceasefire, scheduled to commence on Jan 19, 2025, approaches, it is essential to examine the potential impact of president-elect Donald Trump on this event and Middle East security. Considering Trump’s past foreign policy actions, especially those concerning Israel, alongside the wider geopolitical environment, his prospective role in shaping the ceasefire and future peace initiatives is intricate and layered. Historical influence Trump’s initial term as president was characterised by a robust endorsement of Israel, a position that resonated with his domestic political supporters and simultaneously altered US foreign policy, thereby impacting the wider dynamics of the Middle East. Key actions during this period included the formal acknowledgement of Jerusalem as the capital of Israel, the transfer of the US embassy to that city, and the withdrawal from the 2015 Iran nuclear agreement. These measures solidified his rapport with Israeli leadership and exemplified his ...