Skip to main content

Cyber-Terrorism and the Information Sword

Dr. Mahmoud Eid, University of Ottawa

Although there are many different concepts of “terrorism” and no one agreed-upon definition of the term to date, most would acknowledge the existence of “cyber-terrorism,” i.e., the use of information and communications technologies to facilitate any or all forms of terrorism. Individuals or groups can now use cyberspace, computers, and information technology, especially the Internet, to threaten, terrorize and cause harm to both governments and civilians. Terrorists are pioneers in using the latest technologies. In our growing era of cyber-terrorism, a cyber-terrorist can not only conduct the types of attacks that we have grown accustomed to, such as remote bombing, but are increasingly able to deliver horrific destruction at a remove. For example, it is possible, through the use of the Internet, to hack into the processing control systems of a cereal manufacturer, change the levels of iron supplement, and consequently kill the children of a nation enjoying their breakfast. Info-terrorists no longer need to enter an office or a home to steal or distort the information. Without leaving a single trace behind, info-terrorists can steal and tamper with information, create new and corrupt existing electronic files, block access to information by authorized users, and so on.
Information technology is a double-edged sword in time of terrorism. It can be used to create strategies for peaceful resolutions or it can be attacked in ways that exacerbate insecurity. Information can be accurate or distorted, true or false, complete or partial, clear or vague, simple or complicated, stored or distributed, etc. In addition, any information can be re-produced and re-created and consequently constitutes new set(s) of information—hence the relationship to Norbert Wiener’s 1947 cybernetics. There are several impediments to the comprehensive and effective flow of information during a terrorist attack, such as lack of time, lack of adequate infrastructure and information processing technologies, reduced communication between the opposing parties, and the bureaucratic politics of information processing within the governmental apparatus. Information that comes out of terrorist attacks has a different nature from that of normal situations; it has similar characteristics to those of the terrorist situation itself. Therefore, it must be searched out, produced, and dealt with differently by decision-makers (i.e., political, media, etc.); it should be accurate, clear, rational, fast, de-escalating, constructive, and responsible. This session aims at sharing both ideas and the latest experiences regarding the search, creation, processing, reproduction and attack of information in the era of cyber-terrorism.
Source:

Comments

Popular posts from this blog

Smart Security, Free Society: Malaysia’s Data Dilemma

In today’s digitally driven world, national security is no longer confined to borders or traditional threats. Cyberattacks, disinformation campaigns, and asymmetric warfare have become the new frontiers of conflict. Malaysia, strategically located in Southeast Asia and increasingly exposed to regional tensions and internal vulnerabilities, must strengthen its security apparatus. However, doing so must not come at the cost of civil liberties. Malaysia can enhance its security strategy by leveraging insights from advanced data platforms like those pioneered by Palantir Technologies, while maintaining strong democratic oversight to safeguard the fundamental freedoms protected by the Federal Constitution. Palantir Technologies, a U.S.-based company, gained prominence in the aftermath of the September 11 attacks. Its core software, Gotham, was designed to integrate fragmented intelligence and provide real-time, actionable insights to military and intelligence agencies. Over the years,...

Syringe Attacks in Malaysia and France: Random Violence or Terrorism? - Part 3

The syringe attack on the 12-year-old son of Pandan MP and former Economy Minister, Datuk Seri Rafizi Ramli, has shaken Malaysia. What initially appeared as a rare and bizarre incident now echoes a disturbing pattern witnessed abroad, notably in France. In June 2025, during the Fête de la Musique festival, over 145 people across France reported being pricked with syringes in crowded public areas. In both cases, the weapon of fear was not a gun or bomb but a syringe. When viewed together, the Rafizi incident and the mass needle attacks in France reveal an alarming global trend of unconventional, psychological violence that leaves behind not just physical uncertainty but emotional trauma. The question we must now ask is: are these acts simply random criminality, or should they be treated with the gravity of terrorist attacks? A Pattern Beyond Borders In France, the attacks spanned multiple cities, with 13 confirmed cases in Paris alone. Victims included women, men, and even min...

Constitution of Malaysia: An Introduction Part 5

7 (1) No person shall be punished for an act or omission which was not punishable by law when it was done or made, and no person shall suffer greater punishment for an offence than was prescribed by law at the time it was committed. (2) A person who has been acquitted or convicted of an offence shall not be tried again for the same offence except where the conviction or acquittal has been quashed and a retrial ordered by a court superior to that by which he was acquitted or convicted.