Cyberterrorism Today and Tomorrow

Summary of cyber crime

Many people argue that the current threat of cyber terrorism has been highly exaggerated. The U.S defence and intelligence computer system have claimed that there has been no instance of cyber terrorism recorded. However, why would the U.S defence intelligence ever admit attacks and portray vulnerability to enemy terrorists? The vast majority of cyber terrorist attacks actually come from ‘hackers’ with virtually no political goals or desire to cause internal harm such as an extremist terrorist.

So why has this become such a moral panic?

The media seem to fail to explain the difference between an actual cyber terrorist attack and a simply computer ‘hacker’. An example of this occurred within The Sun newsagent on Wednesday, June 22nd, 2011 the headlines wrote ‘Hack the Lad Essex geek, 19, arrested for being global cyber villain (Weimann, G.2004)

Nevertheless, many other experts argue that due to the increasing advancements in information technology in general, we have to accept that cyber terrorism is only going to increase and become even more popular in the future. Cyber terrorism can occur at relatively low costs and the simplicity of attacks can generalise too many criminal organisations, not to mention that the number of highly skilled professionals in the computer field is increasing through the generations.

To finish I would defiantly consider cyber terrorism to be a highly significant problem , considering cyber terrorists are experts within their field while keeping anonymity central to their operations, how can we reduce the problem if we don’t know who the people responsible are? I consider many cyber terrorists are being naively mistaken for hackers. Cyber terrorist are targeting critical infrastructure, such as financial, military and governmental sectors, while using the internet as a propaganda tool to introduce other cyber terrorists to their organisation (Awan, I.2014).

Reference List

Awan, I. (2014). Debating the term cyber terrorism: issues and probelms. Cyber Terrorism. 1 (1), p14.

Weimann, G. (2004). Cyber Terrorism: How real is the threat. Cyber Terrorism. 2 (4), p133.

Advertisements
Standard

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s