Redefining Conflict Information-age Terrorism Politics in Cyberspace Fourth in a Series
نویسنده
چکیده
rorism” makes the news almost every week. The idea of terrorists surreptitiously hacking into a government, military, commercial, or socially critical computer system to introduce a virus or worm, turn off a crucial public service, steal or alter sensitive information, deface or swamp a web site, route bogus messages, or plant a Trojan horse for future activation alarms security personnel, spellbinds the media, and genuinely worries policymakers. Although fears that the Y2K problem could provide opportunities to some terrorists have not been realized, other developments since January—such as the denial-of-service attacks against a few on-line commercial enterprises based in the United States (Yahoo! and eBay, among others), and speculation that software developers secretly associated with Aum Shinrikyo cult may have placed Trojan horses in sensitive computer systems in Japan—continue to enliven the threat of cyberterrorism. Cyberterrorism thus looks like the darkest downside of the information revolution. It is dramatic and it makes for quite a story. It is also a potentially serious threat, although most instances have had more in common with graffiti vandalism than with bomb-tossing anarchism. But a focus on the drama of cyberterrorism risks overlooking the broader phenomenon of which it is only a part: the rise of what we call “netwar.” Cyberterrorism and terrorist netwar are not the same thing (although at times some media conflate the two). While some terrorists will eventually have the technological skills or opportunities to engage in extremely damaging cyberterrorism, this is not the only dangerous implication of the information revolution. More seriously, this revolution is enabling new forms of organization and new doctrines that will affect the spectrum of conflict, including terrorism. Indeed, signs are already apparent that terrorist groups in the future will try to gain strength and extend their reach by organizing into transnational networks and developing swarming strategies and tactics for destroying targets, entirely apart from whether they can hack into a target’s computer system.
منابع مشابه
James Bond and Global Health Diplomacy
In the 21st Century, distinctions and boundaries between global health, international politics, and the broader interests of the global community are harder to define and enforce than ever before. As a result, global health workers, leaders, and institutions face pressing questions around the nature and extent of their involvement with non-health endeavors, including international conflict reso...
متن کاملDemocracy, Violent Conflict and National Development in Nigeria
There seems to be a debate on the validity of democratic peace theory. Whilst, some scholars and schools of thought have argued that democracy engenders peace, others have argued exactly the opposite. In the Nigerian context, democracy appears to have been characterized by violence, this paper examines democracy and violent conflicts and in origins and its implications for development with a pa...
متن کاملThe Fourth World and Politics of Social Identity in Margaret Atwood’s MaddAddam Trilogy
With the advent of the 21st century, the way characters and identities interact under the influence of dominant powers has brought a new world into existence, a world dubbed by Manuel Castells as the ‘Fourth World’. Within the Castellsian theoretical matrix of the Fourth World and politics of identity, the present study seeks to investigate the true nature of the futuristic world Margaret Atwoo...
متن کاملProtection of consumer rights in Cyberspace
Today’s civil law faced new challenges and situations for protecting human in role of consumer and also attention to industrial life growing made new branch of law called consumer law that have some positive result in all economic, social and political aspects like increasing household income, reduce conflict and tension between buyer and seller in society and increased public participation in ...
متن کاملMotivation for Cyberterrorrism
Cyberterrorism represents the convergence of the virtual world of cyberspace and the intimidation techniques of terrorism. To better understand why cyber terrorist acts are committed, this paper investigates the motivation behind terrorism by looking at traditional terrorist groups and how their objectives can be met by Information and Communication Technology (ICT). This paper addresses the re...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2000