Saturday 21 May 2016

CYBER TERRORISM

By Massawe Arkadi

Terrorism is continually changing. While at the surface, it remains “the calculated use of unlawful violence or threat of unlawful violence to inculcate fear.” In wake of the recent computer attacks, new breed of terrorism is on the rise and our country must defend itself with all possible means.

Cyber Terrorism
Cyber Terrorism may be defined as “the premeditated use of disruptive activities, or threat thereof, in cyber space, with the intention to further social, ideological, religious, political or similar objectives, or to intimidate any person in furtherance to such objectives.”

Evolution of Cyber Terrorism
Cyber Terrorism can be traced back to June 1944’s attack on the communication system and logistic support of Germany. Thereafter, USA Defense Department started Internet and Computer Networks and evolved ICANN (Internet Corporation for Assigned Names and Numbers) system to regulate cyberspace. In 1988, Osama Bin Laden established “Al-Qaeda” based on “Jihad” and the same year, West German hackers accessed Department of Defense Systems of the USA. Thereafter “Gulf War” was the first information war or I-war. By 1995, Internet became popular through World Wide Web in India and before that LTTE groups’ (militant group that fought for a separate Tamil state between 1976 and 2009) activities were dependent on websites and internet.

Modes of Cyber Terrorism
ü  Attack on National Security: National security depends on confidentiality and secret information. When terrorists attack them, they delete or modify this information or purport to do the same.
ü  Cyber Terrorism is the Forerunner of Warfare: When one nation causes terrorist violence against other nation by using new technology, it is called net war or warfare.
ü  International Cyber Terrorist Attack: When international terrorist groups communicate with each other through Internet to attack any nation then it may fall under an Internationally planned cyber terrorist attack.
ü  Network to Send Terror Message: The cyber criminals have started using technology to develop their own website to send terror messages and to communicate within or between groups.
ü  Digital Signature System: Terrorists use e-mail, SMS, encryption programs and digital signature system to communicate securely and confidentially.
ü  Flowing Worm: Flowing “Worms”, Viruses, Trojan Horses to collapse government and people interest sites, network and computer is also one mode of cyber terrorism.
ü  Cyber Theft: Includes downloading illegal music files, stealing millions of dollars from online bank accounts.

Case Study: Cyber Terrorism against Indian Parliament:

In year 2001, Indian Parliament was attacked with the help of information technology. Accused forged an official gate pass with the logo of Ministry of Home Affairs and other information along with the layout of Indian Parliament. Police found out a laptop from main accused Md. Afzal and S. Hussein Guru and also found out that they did it through a Pakistani Internet Service Provider. They controlled the identity and E-mail system of Indian Army.

On 11th September, 2001 attack on WTC can also be pictured under cyber terrorism. Terrorist’s unauthorized access over the network of one airline and hijacking two airlines that resulted in crashing of those airlines into WTC twin towers and Pentagon

No comments:

Post a Comment