Abstract
In today’s postmodern world with the latest and top notch internet technologies in the market, if it has become easy and accessible for everyone to communicate with others sitting at the other corner of the world, it has also given rise to the cybercrimes including cyber terro rism which has not only provided grave threats to the whole world but also posed a question of whether with the manipulation of cyber space, cyber terrorists can damage or destroy the physical infrastructure of its target. Owing to easy access to everyone and strong damage done as compared to traditional terrorism, today terrorists are relying on cyber terrorism as well. The Islamic State (IS) has emerged as one of the brutal and violent terrorist organization s which hired cyber experts and manipulated cyber space to the extent that today they are most active and professional cyber users’ terrorist organization of the world. The main focus of the paper is to highlight the basic definition of cyber terrorism, how often it is different from traditional terrorism, use of cyber terrorism, how cyber terrorism can be manipulated through various latest tools and techniques and how Islamic State (ISIS) is using cyber space to spread its message.
Highlights
The presence of terrorist organizations in cyberspace is not a new phenomenon as they have been showing their existence online since their very own inception
The main focus of the paper is to highlight the basic definition of cyber terrorism, how often it is different from traditional terrorism, use of cyber terrorism, how cyber terrorism can be manipulated through various latest tools and techniques and how Islamic State (ISIS) is using cyber space to spread its message
If we look into the cyber space presence of Islamic State (ISIS), we come to know that there are six distinct cyber divisions taking care of various social media areas
Summary
The presence of terrorist organizations in cyberspace is not a new phenomenon as they have been showing their existence online since their very own inception. A senior research fellow Barry Collin, at the Institute for Security and Intelligence in California first coined the term ‘cyber-terrorism’ in 1980s He referred to cyber-terrorism as the linkage of cyber space and terrorism.[12] The working definition of cyber-terrorism was given by Mark Pollitt, special agent for FBI: Cyber-terrorism is the premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against noncombatant targets by sub national groups or clandestine agents.[13]. Few other assertions suggest cyber terrorism as a form of terrorism which has the ability to cut across all kinds of infrastructure protection and it cannot be executed without physical damage to the property because these two operate interdependently To further explain this concept, it may be said that cyber terrorism is the use of computer as targets or weapons, used by politically motivated national or international individuals or a group of individuals or clandestine agents who cause or threaten violence and fear for influencing audience of a particular area. There are two ways to explain cyber terrorism in general which are as follows: 1. Effects-based: This kind of cyber terrorism is done when the result of computer attacks are as destructive and disruptive as compared to traditional terrorism and create grave fear
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.