Skip to main content

Illegal analysis in cyber terrorism: Literature Research and Case Studies of Cyber terrorism in UK, USA, Malaysia



Illegal analysis in cyber terrorism:


Literature Research and Case Studies of Cyber terrorism in UK, USA, Malaysia




The purpose of research is to examine and analyze cyber terrorism cases and literature in UK, US and Malaysia perspectives as well as usage of information technology by certain terrorists, upon determining what does and does not constitute cyber-terrorism and the real threat it poses for the countries mentioned.


United Kingdom(UK)


The great advances in information and communications technology have unprecedented impact on the society as well as considerable percentage of life and activities have come to depend heavily on information infrastructure. Computers are not inherently good or bad, so they can be either used for moral and legitimate purposes, or manipulated by criminals to pursue their immoral and illegitimate ambitions. Terrorists constitute one of the criminal groups that are expected to take advantage of information technology, either as means of enhancing their traditional activity or as new attractive target against which to launch their attacks. Cyber-terrorism is recently adopted term used to describe the convergence of cyberspace, the virtual world where computer programs function and data moves, with traditional terrorism (Arquilla and Ronfeldt, 1996). Even though terrorists seem to become more and more familiar with computers and the internet, it is important to clear out that not any malicious use of information technology constitutes cyber terrorism. Cyber-terrorism should also be differentiated from the so-called "information warfare", the manipulation of computers and networks in the context of war conflict between countries (Arquilla and Ronfeldt, 1996). The latter has been offensive and defensive function of states, while the former is an intimidating tactics of non-state factors fighting for an ideology. These two may resort to the same techniques, for example the distortion of an electricity network, but still this does not make them the same phenomenon. The use of information technology works in the same context as using the internet to collect information about targets or to communicate and co-ordinate action with fellow conspirators or recruit supporters. Neither constitutes a complete terrorist action to qualify as cyber-terrorism. Preceded analysis has shown that, although terrorists seem to be taking full advantage of information technology as a useful tool, there is no clear picture as to whether information infrastructure will constitutes new target. However, clearing up the picture of what is and what is not cyber-terrorism and the actual threat it poses is important because it will be decisive factor when choosing the weapons to fight it. The bad reputation of terrorism can be easily used as an excuse for extended intervention in the newly formed cyberspace.


USA(United States of America)


Cyber terrorism refers to premeditated, politically motivated attacks by sub-national groups or clandestine agents against information, computer systems, computer programs, and data that result in violence against noncombatant targets (Denning 1999, p. 27). According to Denning: cyber terrorism is the convergence of cyberspace and terrorism refers to unlawful attacks and threats of attacks against computers, networks and the information stored therein when done to intimidate or coerce government or its people in furtherance of political and or social objectives. UN manual on IT-related crime recognizes even after several years of debate among experts on just what constitutes cyber crime and what cyber terrorism, "there is no internationally recognized definition of those terms" (Mates 2001). The patriot movement in the United States is known to haveadopted inter-networked forms of organization similar to those outlined above. Whilethe anonymity of the Internet is seen as fuelling the conspiracies of the militias, forthe groups themselves access to such new technologies is seen as vital tool forrecruitment and funding. The Internet hasenabled the militias to spread their ideas worldwide. There are militias in Australiaand Canada has been suggested that the Far Right in Europe has adopted theidea of 'leaderless resistance' via the Internet (Mulloy 1999, p. 16; Hoffman1998, pp. 105-120; Levin 2002, p. 964). Activists within the patriot movement haverepeatedly urged their compatriots, not only to organize themselves along networkedlines but also to opt out of other more pervasive networks that are viewedas dangerously perceptible to attack, as after September 2001, the U.S. government declared a "war on terrorism," thus prompting a considerable concentration of scholarly resources to investigate and address the threat presented by terrorists. Given the nature of terrorist acts, which rely heavily on surprise and attacking at unexpected times and places, it is obvious that the first reports on U.S. readiness are at least questionable (Department of the Army, 2003).


Malaysia


Terrorism in Malaysia began with the response to insurgent movement launched by the Malayan Communist Party (MCP), believed that the British wanted to manipulate and exclude them from the independence process. Malaysia's advocacy of military civil initiatives and experience of the past, the successful application of the elements of national power and the close cooperation with its immediate neighbors. Malaysia believes that media must be rational and sincere. The people in the media can sometimes lose control in their effort to gain higher ratings among the media community. As such, careful control of the media cannot be over-emphasized on its importance and what they could do to assist the government in maintaining conducive environment for peace and development. The Malaysian government has no control over individual accessibility to Internet facility. What it has done is to encourage Internet users to surf those items beneficial to individual development. Due to the lack of freedom of press, much of the criticism against the government is done via Internet. Malaysia's response to the latest manifestation of terrorism is not only to "act against the potential terrorists, but seek to define terrorism and terrorists so that there is no ambiguity and everyone will be able to fight against them" (Dato' Seri and Mahathir bin Mohamad, 2002).Malaysia's experience should not be taken in total but rather examined, improved and implemented when and where it deems fit. Malaysia's strategy in combating terrorism, based on its experience in defeating the communist terrorists has been on "two parallel levels namely; punitive/preventive law enforcement measures and, examination of the root causes of terrorism" (A CSCAP RoundtableDiscussion). In the country's history, "political causes were an important factor in the country's victory over the communists" (A CSCAP Roundtable Discussion) When Malaysia battled the communist terrorists, it was necessary to "demonstrate that Malaysians had secure life under the government of the day" (Dato' Seri and Abdullah Hj Ahmad Badawi, 2003) and the population had every confidence in the government.




Arquilla, John and Ronfeldt, David, "The Advent of Netwar", RAND Report for the Office of the Secretary of Defence, CA, USA 1996



Terrorism in Southeast Asia: Perspectives from the Region. A CSCAP Roundtable Discussion



Denning, Dorothy. 1999. Activism, Hacktivism, and Cyber terrorism: The Internet as a Tool for Influencing Foreign Policy. Washington DC: Nautilus.



Department of the Army (2003) "Information Operations: Doctrine, Tactics, Techniques, and Procedures", Field Manual 3-13, November, Washington, DC, available from www.iwar.org.uk/iwar/resources/doctrine/fm-3-13.pdf



Asia Society, A Speech by the Honorable Dato' Seri Dr. Mahathir bin Mohamad on `Islam, Terrorism and Malaysia's Response', in New York on February 4, 2002


Keynote Address by HE Dato' Seri Abdullah Hj Ahmad Badawi, Deputy Prime Minister of Malaysia, 15th Pacific Economic Cooperation Council (PECC) General Meeting, Brunei Darulssalam, 3 September 2003



Mates, Michael (Rapporteur). 2001. Technology and Terrorism. Brussels: NATO.



Comments

Popular posts from this blog

The analysis on the external and internal environment of Primark retailing industry

Introduction The omnipresence of global trends and innovations debunk the idea of business monopoly and empire states. Today, the trends are set to maximize the potential of human powers by trivializing simple phenomena in order to fashion complex and subtle effects. In the minds of prominent sociologists and philosophers these trivialization of occurrences brought about by man's deepest desire of uncovering the truth and meaning of life. However, our correspondence and connection with the truth is indirect and diluted which can only be accessible via representations and constructs. Hence, the necessity, though, not necessarily is, of excavating the truth embedded on phenomena became an ordinary human laborious pursuit. Moreover, due to rapid changes on various aspects of human life our reactions vary depending on the way we perceive it, while forming effective and efficient mechanisms become a mechanical elocutionary act. This fact is paralleled with the nature and condition of b

Sample Research Proposal on The Influence and Impact of Advertising to Consumer Purchase Motive

Introduction   Today's market is characterised by highly competitive organisations which are all vying for consumer's loyalty. Firms are faced with the challenge to maintain their own competitive edge to be able to survive and be successful. Strategies are carefully planned and executed to gain the ultimate goal of all: company growth. However, external factors are not the only elements which influence growth. There are also internal factors, components working within the organisation which shape the direction of the company. Along with the changing business world, customers change as well, becoming more demanding and knowledgeable than before. In turn, company management had shifted their focus on their clients or customers so as to stay successfully in business. This transition meant that organisations have to completely reformulate their conventional business aims and purposes from being process-focused to customer-centred. Hence, in order to bring out exceptional custome

Sample Research Proposal on IMPROVING VOCABULARY AND COMPREHENSION SKILLS IN ESL STUDENTS THROUGH LANGUAGE PROFICIENCY

Introduction               This paper proposes a research study that will test and determine the effects of language proficiency, critical thinking, and study skills approach on improving the vocabulary and comprehension skills in English as Second Language (ESL) students. The aim of this paper is to determine and examine the specific advantages and disadvantages of the three approaches mentioned. The purpose of this study is to build new theories in ESL learning and to further contribute on knowledge about ESL learning and teaching.             Statement of the Problem                 Currently in the United States , there is great impetus for ESL programs because of the continuous increase of non-English speaking immigrants in the country since the latter 1990s (Schmidt, 2001; Kuntz, 2003; August, 2003). Immigrants who cannot speak fluent English cannot contribute much to the American society because of their limited capacity to comprehend and communicate with the American pe