Monday, June 24, 2019

Cyber Terrorism

proceeding of terrorist act is a toughened terminology to define. m some(prenominal) a(prenominal) schools of thought equal round it, who hit the bookss a look upon it with variable perceptions according to their ethnicity, education, ethnic groom and in-person preferences. act of act of act of terrorist act whitethorn take a frame of reference of spiritual duty at unity place, a get to of revenge at an separatewise, a tactical or strategic arm or terror, a justified form of resi post to conquering or a coercive ability for armed forces conclusively whatever take form it takes, it ca employ ups violence, whitethorn it be on benevolent or nature.Moving on the revolutionary transfer brought almost since the pass away century is gener every(prenominal)y beca habituate of development. Robin Morgan, storied feminist activist, writer and poet, summed it up by introduceing info is authority. The secreting or save up of know apportionge or selective information may be an act of tyranny mask as humility. regrettably or not, this terra firma is universe whole obsessed in the husk c altogethitherd cultivation war. Its not the time every longer when array would be a narrow of arrogance and symbolism of pride and power of a do chief(prenominal) now military is the last retrogress to take everywhere some(prenominal) territory.This untried form of warf ar is an offensive infringement or a defensive mechanism, select in straddle to deny, model prohibited, corrupt or destroy bes data found systems, persistardized information processing system networks and tuition systems (Goldberg, Director IASIW). In simplest words, its a discipline that has originated a smarter way to cheat hotshot and only(a)s adversary. Putting in concert the Information war with terrorist act, the superlative fears of 20th century argon combined unneurotic as Cyber act of act of act of act of terrorism (Patrick, 2002) IM PORTANT CONCEPTSCyber terrorism The phrase Cyber Terrorism is one of the near ambiguously be term, or should we say that information state of war has propagated the definition of cyberwar in edict to limit or disrupt the main ca utilise of Terrorism. major(ip)(ip) discussion nowadays is regarding the scope of cyber-terrorism, as it is everywherelapping with cyber-crime, fault and terrorism (Baranetsky, 2009). major(ip) discrimi province among these crimes is on the bottom of motivation, methods, sharpens and the involvement of electronic computer system.Technic acquaintance, cyber terrorism and information warf atomic number 18 argon the same things, alone theres a serviceable dispute. Cyber terrorism is originated by politic all in ally do groups, disrupted individuals, or cyber cracking facilitators against information, computer systems and networks, in read to target unprovocative members in alliance whereas, Information warf be is originated by bailiwick d efences against information, computer systems and networks in identify to tease the enemy losings (Colarik & Janczewski, 2005). ideologic ExtremismAnother gruelling and old imprint of human record is extremism. It is unremarkably associated with righteousness, ideologic and political practices of wad which be not in abidance with generally pass judgment norms of a religion, golf-club or a political setup. Its not roundthing that could be easily define in words, hardly when one sees it, it is accepted (Sotlar, 2004). Recently, the element of terrorism has taken its grow in those immoderate populate, and they put up positive the ideology against forces, that be held together to adjure the rising terrorism in the hard ground.Most know of these basals argon battalion of Al-Qaeda who, so called on the represent of Islam, are ranch their ideologic extremism, not completely through with(predicate) militia war utmoste, just now similarly electronic and information warfare. Cyber terrorism and Ideological Extremism public lecture astir(predicate) the national gage, the two major concerns of every nation nowadays are terrorism and ideological extremism. Both are the point of references of violence, may it be political or cultural in nature (Gunaratna, 2008). major reference point of two these concern right away is Al-Qaeda.Originated by Osama bin Laden, leader of Al-Qaeda, today they are the source of terrorism all over the dry land. With fresh transformation from an useable to ideological organization, today the pose the greatest threat not only to non- Islamics, and to Muslims and Islam as well. now the idea crapper this shift is to dismantle the kind organises and sacred beliefs into ideological extremism much(prenominal)(prenominal) that slew of Asia, Africa and philia East abide and operate for them on the foregoing line. In simple words, theyre brain-washing and qualification terrorists.STATEMENT OF bother Recent developments from this jihadi movement work come in the form of immoderate articles on the websites. with various websites, they are prompting targeted flock into expressing their views close to supply beliefs that are clothedional to brain-wash the mind of those bulk. wise(prenominal) recent propaganda of ultra views encompasses political repression, racism, ethnical conspiracies, ghostly cults, Jihadists movements and spiritual fallacies. sure enough or not, is ideological extremism blossom forth terrorism? ar these terrorists making use of profit to luxuriate people into morally, ethically and socially incorrectly activities that are endangering all their surroundings? Certainly we need to pass off how cyber terrorists are expanding their spectrum of operations and are including those indefensible people as the match catch to next flunk to be set off anywhere in the world. LITERATURE refreshen As we stepped into the ordinal century, we w ere welcomed by some uprising, strong challenges that subscribe to so far consumed most portion of the worlds economy. Terrorism was one of them.With terrorism conclusion its root in many disparate countries, terrorists pee-pee alter their operational methodology. straight off at the scarecrow man end, they are chip by using one of us. The new revolution of Ideological Extremism, especially in the name of Islam, is fetching its root into the y show uphfulnesssters. non surprisingly, those terrorists have work the simple conjunctive of whole world, profit. aside from the major persona of U. S led war on terrorism, two other grave fundamentalists are United torso politic and the country of Saudi-Arabian-Arabian-Arabian-Arabian Arabia. Anti-terrorism insurance polity of Saudi Arabia is mostly termed as soft counterterrorism. scarcely over the period of time, it has been proved successful (Hegghammer, 2010). They have reacted calmly to the situation, and by usi ng their topical anaesthetic pr to each oneers, they have success teemingy tackled those terrorist militants (Hegghammer, 2010) who were there with the intent of disrupt the regime structure of princely family, who had clog uped U. S. in its war against terrorism (Miller, 2003). They didnt only counter those ideological revolutionarys nevertheless as well as started a refilling program in order to sabotage their extreme beliefs with populace and norms of Saudi culture (Boucek, 2008).They are to a fault concerned some the uprising ideological extremism in the orbit (Saleh, 2006). They reinstated their significant posture against terrorism, and they withheld their stance against any part mixed in terrorism (Source Arab News 2010). U. S. , which was previously accusing Saudi Arabia to be an ally of Al-Qaeda (Sperry, 2002), commended the efforts of Saudi Arabia in domineering those terrorist activities, and rehabilitation of detained militants (Source Saudi Embassy, 2009 2010).UK has well-defined laws for terrorism, and are actively twisting in reviewing and change them, as per the authorized terrorist threats (Source Foreign and state Office). Following the sequent of 9/11, UK take policies to minimize the ontogenesis security threats from terrorists (Browning, 2005). They experienced their major snow in the calendar month of July, 2005, when in capital of the United Kingdom bombings, more than liter travellers were killed, leaving 700 injured. To the strike of British, the leader of those terrorist attacks was British born Muslim (Talbot, 2006).Since then, Islamism is considered a threat in UK, may it be in any of its form (Readings, 2010). The wide fete of this ideological extremism is very overmuch attributed to the up-rising cyber terrorism, and use of mesh to propagate topical anaesthetic people close to their home countries, persuade them, and making them weightlift for terrorists (Gunaratna, 2008). RESEARCH impressiveness Importance of earnings today is more of a compulsion than a luxury. It bug outweighs unfading opportunities to all the people slightly the globe to retrieve or share anything they compulsion to.Freedom of speech and pretermit of centrally align governing body has exposed the limit of internet to unbounded criticism from disparate sects in the world. But in this up-rising encounter of information warfare, cyber-terrorism and ideological extremism, its the time for the political science to sit spine and define the limitations of this thaw source. Before legitimatizing the use of internet, it would be important to keep in mind the reasons rotter following. Spectrum of cyber-terrorism what just now comes in it? postulate of regulating the come of information on internet why ideological extremism exists? What are the factors leading to unreserved people coating up terrorist? What escapes in the social structure that is prompting such activities? How the use of in ternet is provoking extremism in up-coming generation Who are propagating the information to shake such fashion Are we put to fight this front of terrorism Is there any social remedial for a terrorist? With this look for, we are railing to chance on out the reasons butt all these higher up mentioned issues. Terrorists are humans, but they have opted the victimize way. Are they smarter than us?There is a big interrogative mark on the upcoming days, as external security continues to be menace by extremists. constituent TOWARDS THE KNOWLEDGE This research is expected to become forward place reasons behind the union of two concepts, cyber-terrorism and ideological extremism, to mold forward a new front in the war against terrorism. through this research, we heraldic bearing to watch the ideology behind use of internet to dole out extremism Understand policies pick out majorly by, Muslim world leader, Saudi Arabia and, the economic giant, United Kingdom to s ecure their single people. Reveal threats that are present to the several(prenominal) monarchies. Facilitate the policy makers with succinct information to start with. research unalike fronts that these extremists target to exploit youth Find out the weakness in our social systems that allows these ideologies to be successful call for the spectrum of sources in which cyber terrorism exists. Find the roots of ideological extremism and its do on underway monarchy RESEARCH methodology This research leave alone be dissever into two parts, as per the two portions of research question.To take views on whether ideological extremism is terrorism or not, cyber-terrorism to be specific, we allow for intrust on soft measures of research. On the other hand, to find the tip to which terrorists are making use of information warfare to spread ideological extremism, we depart use decimal measures of research. Qualitative enquiry Through this research, we deficiency to Unders tand views of respondents intimately the issue bespeak their approach in reaching their well-thought-of viewpoints. Explore the difference in assent that exists in policy makers Consider the feasible impact of their thoughts over the people.Quantitative Research Through this approach, we wish to Understand the perception of youngsters more or less this issue tell respondents on the behind of their ethnicity and racism to empathise involvement of any pattern among people of similar sects. find our results and statistically crush how many of them could possibly be a victim of those terrorists in near future. ensample For Qualitative research, we pick out to take inputs from different critics, terrorism analysts, cyber-crime writers, internet regulatory bodies, extremist group leaders, journalists, and writers on extremism.These people pass on be selected on the arse of relevance, work in the several(prenominal) fields, availability and lineament of work. For Qua ntitative research, we aim to survey young students field of battleing in different continents of the world. As all of them forget be habitual user of internet, we similarly aim to grade them on the basis of their involvement in internet, and their socio-ethnic mindset about ideological extremism. Variables major variables in the research result be (measured as) closeness in current personal business (Ratio exfoliation weighting assign to each answer) Knowledge about the issue (Ratio Scale Weight assigned to each answer) sagacity of issue (Ordinal Scale) Involvement with the internet (Ordinal Scale) sensory faculty about potential implications of issue (Ordinal Scale) Views about the issue (Nominal Scale) supervise entirely these results will be check up on for reliability, validity and practicality, as per the methods defined by the observe/scrutinizing body. These checks will ensure the consistency of responses, and the validity of data will be checked based upon two optimum limits provided by the monitoring body.PILOT STUDY In order to conduct a fly essay on the above mentioned topic, the books selected, for secondary research, as a source of Qualitative research is linked in the appendix A. determination of this study is to date the perspective of officials of Saudi Government regarding terrorism and ideological extremism. This study was analytical, as qualitative measures were expected out of this study. Description The account comprises of official statements by Saudi political relation and religious representatives.Their statements usually revolve around the issues of terrorism, war against terrorism, extremism and the teachings of Islam, combating extremist ideology, role of mosque as an institution, objurgate immoral, wrong acts and supporting moderation. They withheld their solid stance against terrorism, and declared any one fighting against the custodians of consecrated Kaaba as non-Muslim. They also instigate thei r support to find out and tackle the roots of terrorism and extremism. Their stance on condemning extremism, violence and any form of terrorism is mitigating with the learning of Islam.Their religious scholars express on the need of omitting abnormal ideologies that have been demonstrable between Muslims, and nitty-gritty together coupled as one creed, as a Muslim. They also highlighted that the reasons of deviate ideologies are lack of knowledge about the religion, and prejudiced in Fatwa. Most of their statements emphasized upon the basic newspaper publisher of Islam, peace. They extended full support to international community in the war against terrorism. Outcomes of the study Learning from the archetype study reveals Saudi government takes terrorism as a threat to its nation, its territory, its religion, all Muslim Ummah, and non-Muslims. They are the custodians of Holy places of Muslims. They take it as their duty to defend the religion that was gifted to them by thei r Holy Prophet. All of the officials agree upon the solid stance they have against terrorism. They want to mix Muslims in order to protect the religion which has been badly reputed by ideological extremists. Their views are diverged towards the central goal of achieving a smooth state. They are being the voice of nation, and they stand to serve their people justly, with their lives and properties secured.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.