Cyber Terrorism: A Reality in Today’s Connected World

Gaining increased attention over the last several years, the term “Cyber Terrorism” has become more than just a buzzword in our lives these days.

We’ve seen how technological advancements have brought with itself some far-reaching changes in society. We’ve also seen how the growth and affordability of technological tools have helped in propagating the movements of computers from secret laboratories to normal households. This is all good, but brings with itself some new challenges. Especially when seen in the context of cyber terrorism.

What is Cyber Terrorism?

The convergence of terrorism and cyberspace has given rise to “Cyber Terrorism.”  It generally relates to unlawful attacks and threat of attacks against computers, networks and the information stored in them. The information can be used for the purposes of intimidating or coercing a government or its people to achieve nefarious political or social objectives.

Our increased technical dependence is strengthening the potential for our gadgets being used against us. This extension of terrorism is the capability of striking actual damage on critical infrastructures of society such as telecommunication, economic and financial institutions. It brings a government’s or a corporation’s entire infrastructure at stake.

Purpose of Cyber Terrorism in Today’s Connected World

Cyber terrorism is a frightening scenario; it conjures up images of vicious terrorists unleashing catastrophic attacks. Many of the systems that are designed to provide cheap and extensive network access greatly increase the ability of malicious people to find and exploit vulnerabilities.

The purpose of terrorist in cyberspace falls into three categories:

  1. To use cyber space as a means of attacking other targets
  2. To support their activities and infrastructure indirectly
  3. To clearly attack parts of the cyber infrastructure.

Types of Cyber Terrorism

Many features of our modern life are reliant on cyber space and unfortunately, a terrorist can exploit an opportunity and distrupt our every day lives. These opportunities are increasing as we are become more and more dependent on computers.

The possibilities of attacking electronic means are

  • Web defacement: It is an easy way to annoy a target and spread propaganda; these attacks alter the data and information on an official site.
  • Malware:  Malware are viruses that can bring down systems or networks and cause great disruption to the target.
  • Data mining: An area where personal and financial details are held on record in electronic file format by the government. Security services can be hacked to gather information about potential targets, financial details or even alter information to damage the target.
  • Denial of Services: Bandwidth on which the internet relies upon can also be targeted with Distributed Denial of Services (DDOS) attack. It can block select servers from operating.

Cyberspace is certainly a new area of battlefield where terrorism is taking place in the form of new methods of carrying out attacks, propaganda campaigns and recruitment. Bringing down internet in any country can do immense damage to the population, infrastructure and financial sectors of the society.

A Global Problem that Requires Global Attention

It is an obligation to develop an international game plan in order to fight against cyber terrorism. Following measures can be of great help in this regard:

  1. Cyber Defense expert teams should be created and given a mandate to deal with cyber threats that hit a country. Internationally, counter cyber-attacks exercises should be planned and executed in order to help nations prepare for the threat.
  2. International and national essential legal measures should be taken and legal arrangements must be realized.
  3. On cyber Security cooperation, both bilateral and multilateral agreements should be signed among nations.
  4. In order to collect and share the intelligence, an intelligence pool should be created among the nations.
  5. A complete analysis must be done in order to identify and improve the weak points of the system.

Cyber terrorism has become a growing concern for the international community but the current regime of laws and norms address the issues very insufficiently. This issue not only requires legislative but also the military cooperation including prevention strategies.

Making a difference in others life though projects like #BeingGuru #Konbola #Truedrops.

  • This comment is directed towards Mr. Aamir Atta, who is responsible for the content of this site:

    The title and contents of this post have no relation whatsoever. The content seriously misleads the readers about the concept of cyber terrorism. The things written in this article have nothing to do with cyber terrorism at all. TBH I opened this article to increase my knowledge about this topic but what I read hurt my feelings and now I’ll always be in doubt about the content shared on this site. Defacing sites, stealing data, ddosing companies is not always done for terrorism or should I say never used for terrorism. This guy is calling all hackers (yes, all of them) terrorists. He has no idea about terrorism man.. I’ve no more words to prove my point. Seriously disappointed!

    Waiting for an official response from admin.

    • Oh, poor PHP wannabe hacker! Your feelings are hurt? Did the article hit too close to home?

      • “PHP wannabe hacker” nice. Have you ever seen any site I hacked or any defacement by me? answer would be ofcourse no cause I don’t do such things. If it was 2012 or 2013 I would’ve not minded about you calling me like this. But now boy, you have no idea….
        And those feelings were for propakistani Ms. Ruby in distress….

        • you would not have minded years ago but you mind now?? Oh, poor widdle PHP hacker-wannabe! Hurt feelings! Whay are you going to do to soothe them?

    • pata na nahi jab log popular ho jatay ha tu chut***ya**pa khyon kertay ha………….theme is really bad…………..

  • close