Illegal analysis in cyber terrorism: Literature Research and Case Studies of Cyber terrorism in UK, USA, Malaysia
Illegal analysis in cyber terrorism:
Literature Research and Case Studies of Cyber terrorism in UK, USA, Malaysia
The purpose of research is to examine and analyze cyber terrorism cases and literature in UK, US and Malaysia perspectives as well as usage of information technology by certain terrorists, upon determining what does and does not constitute cyber-terrorism and the real threat it poses for the countries mentioned.
United Kingdom(UK)
The great advances in information and communications technology have unprecedented impact on the society as well as considerable percentage of life and activities have come to depend heavily on information infrastructure. Computers are not inherently good or bad, so they can be either used for moral and legitimate purposes, or manipulated by criminals to pursue their immoral and illegitimate ambitions. Terrorists constitute one of the criminal groups that are expected to take advantage of information technology, either as means of enhancing their traditional activity or as new attractive target against which to launch their attacks. Cyber-terrorism is recently adopted term used to describe the convergence of cyberspace, the virtual world where computer programs function and data moves, with traditional terrorism (Arquilla and Ronfeldt, 1996). Even though terrorists seem to become more and more familiar with computers and the internet, it is important to clear out that not any malicious use of information technology constitutes cyber terrorism. Cyber-terrorism should also be differentiated from the so-called "information warfare", the manipulation of computers and networks in the context of war conflict between countries (Arquilla and Ronfeldt, 1996). The latter has been offensive and defensive function of states, while the former is an intimidating tactics of non-state factors fighting for an ideology. These two may resort to the same techniques, for example the distortion of an electricity network, but still this does not make them the same phenomenon. The use of information technology works in the same context as using the internet to collect information about targets or to communicate and co-ordinate action with fellow conspirators or recruit supporters. Neither constitutes a complete terrorist action to qualify as cyber-terrorism. Preceded analysis has shown that, although terrorists seem to be taking full advantage of information technology as a useful tool, there is no clear picture as to whether information infrastructure will constitutes new target. However, clearing up the picture of what is and what is not cyber-terrorism and the actual threat it poses is important because it will be decisive factor when choosing the weapons to fight it. The bad reputation of terrorism can be easily used as an excuse for extended intervention in the newly formed cyberspace.
USA(United States of America)
Cyber terrorism refers to premeditated, politically motivated attacks by sub-national groups or clandestine agents against information, computer systems, computer programs, and data that result in violence against noncombatant targets (Denning 1999, p. 27). According to Denning: cyber terrorism is the convergence of cyberspace and terrorism refers to unlawful attacks and threats of attacks against computers, networks and the information stored therein when done to intimidate or coerce government or its people in furtherance of political and or social objectives. UN manual on IT-related crime recognizes even after several years of debate among experts on just what constitutes cyber crime and what cyber terrorism, "there is no internationally recognized definition of those terms" (Mates 2001). The patriot movement in the United States is known to haveadopted inter-networked forms of organization similar to those outlined above. Whilethe anonymity of the Internet is seen as fuelling the conspiracies of the militias, forthe groups themselves access to such new technologies is seen as vital tool forrecruitment and funding. The Internet hasenabled the militias to spread their ideas worldwide. There are militias in Australiaand Canada has been suggested that the Far Right in Europe has adopted theidea of 'leaderless resistance' via the Internet (Mulloy 1999, p. 16; Hoffman1998, pp. 105-120; Levin 2002, p. 964). Activists within the patriot movement haverepeatedly urged their compatriots, not only to organize themselves along networkedlines but also to opt out of other more pervasive networks that are viewedas dangerously perceptible to attack, as after September 2001, the U.S. government declared a "war on terrorism," thus prompting a considerable concentration of scholarly resources to investigate and address the threat presented by terrorists. Given the nature of terrorist acts, which rely heavily on surprise and attacking at unexpected times and places, it is obvious that the first reports on U.S. readiness are at least questionable (Department of the Army, 2003).
Malaysia
Terrorism in Malaysia began with the response to insurgent movement launched by the Malayan Communist Party (MCP), believed that the British wanted to manipulate and exclude them from the independence process. Malaysia's advocacy of military civil initiatives and experience of the past, the successful application of the elements of national power and the close cooperation with its immediate neighbors. Malaysia believes that media must be rational and sincere. The people in the media can sometimes lose control in their effort to gain higher ratings among the media community. As such, careful control of the media cannot be over-emphasized on its importance and what they could do to assist the government in maintaining conducive environment for peace and development. The Malaysian government has no control over individual accessibility to Internet facility. What it has done is to encourage Internet users to surf those items beneficial to individual development. Due to the lack of freedom of press, much of the criticism against the government is done via Internet. Malaysia's response to the latest manifestation of terrorism is not only to "act against the potential terrorists, but seek to define terrorism and terrorists so that there is no ambiguity and everyone will be able to fight against them" (Dato' Seri and Mahathir bin Mohamad, 2002).Malaysia's experience should not be taken in total but rather examined, improved and implemented when and where it deems fit. Malaysia's strategy in combating terrorism, based on its experience in defeating the communist terrorists has been on "two parallel levels namely; punitive/preventive law enforcement measures and, examination of the root causes of terrorism" (A CSCAP RoundtableDiscussion). In the country's history, "political causes were an important factor in the country's victory over the communists" (A CSCAP Roundtable Discussion) When Malaysia battled the communist terrorists, it was necessary to "demonstrate that Malaysians had secure life under the government of the day" (Dato' Seri and Abdullah Hj Ahmad Badawi, 2003) and the population had every confidence in the government.
Arquilla, John and Ronfeldt, David, "The Advent of Netwar", RAND Report for the Office of the Secretary of Defence, CA, USA 1996
Terrorism in Southeast Asia: Perspectives from the Region. A CSCAP Roundtable Discussion
Denning, Dorothy. 1999. Activism, Hacktivism, and Cyber terrorism: The Internet as a Tool for Influencing Foreign Policy. Washington DC: Nautilus.
Department of the Army (2003) "Information Operations: Doctrine, Tactics, Techniques, and Procedures", Field Manual 3-13, November, Washington, DC, available from www.iwar.org.uk/iwar/resources/doctrine/fm-3-13.pdf
Asia Society, A Speech by the Honorable Dato' Seri Dr. Mahathir bin Mohamad on `Islam, Terrorism and Malaysia's Response', in New York on February 4, 2002
Keynote Address by HE Dato' Seri Abdullah Hj Ahmad Badawi, Deputy Prime Minister of Malaysia, 15th Pacific Economic Cooperation Council (PECC) General Meeting, Brunei Darulssalam, 3 September 2003
Mates, Michael (Rapporteur). 2001. Technology and Terrorism. Brussels: NATO.
Comments