Cyber Terrorism: A Reality in Today’s Connected World

Gaining increased attention over the last several years, the term “Cyber Terrorism” has become more than just a buzzword in our lives these days.

We’ve seen how technological advancements have brought with itself some far-reaching changes in society. We’ve also seen how the growth and affordability of technological tools have helped in propagating the movements of computers from secret laboratories to normal households. This is all good, but brings with itself some new challenges. Especially when seen in the context of cyber terrorism.

What is Cyber Terrorism?

The convergence of terrorism and cyberspace has given rise to “Cyber Terrorism.”  It generally relates to unlawful attacks and threat of attacks against computers, networks and the information stored in them. The information can be used for the purposes of intimidating or coercing a government or its people to achieve nefarious political or social objectives.

Our increased technical dependence is strengthening the potential for our gadgets being used against us. This extension of terrorism is the capability of striking actual damage on critical infrastructures of society such as telecommunication, economic and financial institutions. It brings a government’s or a corporation’s entire infrastructure at stake.

Purpose of Cyber Terrorism in Today’s Connected World

Cyber terrorism is a frightening scenario; it conjures up images of vicious terrorists unleashing catastrophic attacks. Many of the systems that are designed to provide cheap and extensive network access greatly increase the ability of malicious people to find and exploit vulnerabilities.

The purpose of terrorist in cyberspace falls into three categories:

  1. To use cyber space as a means of attacking other targets
  2. To support their activities and infrastructure indirectly
  3. To clearly attack parts of the cyber infrastructure.

Types of Cyber Terrorism

Many features of our modern life are reliant on cyber space and unfortunately, a terrorist can exploit an opportunity and distrupt our every day lives. These opportunities are increasing as we are become more and more dependent on computers.

The possibilities of attacking electronic means are

  • Web defacement: It is an easy way to annoy a target and spread propaganda; these attacks alter the data and information on an official site.
  • Malware: Malware are viruses that can bring down systems or networks and cause great disruption to the target.
  • Data mining: An area where personal and financial details are held on record in electronic file format by the government. Security services can be hacked to gather information about potential targets, financial details or even alter information to damage the target.
  • Denial of Services: Bandwidth on which the internet relies upon can also be targeted with Distributed Denial of Services (DDOS) attack. It can block select servers from operating.

Cyberspace is certainly a new area of battlefield where terrorism is taking place in the form of new methods of carrying out attacks, propaganda campaigns and recruitment. Bringing down internet in any country can do immense damage to the population, infrastructure and financial sectors of the society.

A Global Problem that Requires Global Attention

It is an obligation to develop an international game plan in order to fight against cyber terrorism. Following measures can be of great help in this regard:

  1. Cyber Defense expert teams should be created and given a mandate to deal with cyber threats that hit a country. Internationally, counter cyber-attacks exercises should be planned and executed in order to help nations prepare for the threat.
  2. International and national essential legal measures should be taken and legal arrangements must be realized.
  3. On cyber Security cooperation, both bilateral and multilateral agreements should be signed among nations.
  4. In order to collect and share the intelligence, an intelligence pool should be created among the nations.
  5. A complete analysis must be done in order to identify and improve the weak points of the system.

Cyber terrorism has become a growing concern for the international community but the current regime of laws and norms address the issues very insufficiently. This issue not only requires legislative but also the military cooperation including prevention strategies.

Share
Published by
Hisham Sarwar