User:Newsoutlook

The perception of cyberterrorism requires, in retrospect, understanding physical terrorism. There are many variations in what features of terrorism are emphasized in definitions.

Terrorism as an asymmetric form of conflict is continually changing to adopt with change in the world socio-political environment. The panoptic surveillance and the discursive power of global security forced terrorists to converge the attacks by embracing new forms of change that facilitate the abilities to operate remotely. The fact that information is the new lifeblood of the international system, terrorists moved to remote tactics coined as cyber terrorism. Cyber terrorism has become increasingly common among those pursuing extreme goals throughout the world. Even though cyberterrorism is known as the connection between terrorism and technology, its definition is perplex depends on whose point of view is being represented. Generally speaking, cyber terrorism resituates the conventional forms of terrorist attacks. It is about the transition to adopt remote arsenal to carry attacks on the information society infrastructures.

The development of internet globalization made of the Internet either a potential instrument/ arsenal for carrying out attacks or a potential target. That is, on one hand terrorists advocates the use of computers as a facilitator of their activities one of which is terrorism, on the other, terrorism involves computer technology as a or target by means of property vandalism. In essence, it is about the scenario in which technology infrastructures or services are targeted deliberately. In short, Cyber terrorism  can disrupt critical networks and infrastructure like electrical grids, key financial networks, water and electricity supply systems, radars , hospitals , satellites , military, systems of nuclear reactors, large storage areas of strategic raw materials (gas, oil), traffic and communications centers, secret biological labs, chemical plants , rail road , airports , radars and the like. Furthermore, this evolution in the sphere of information created many opportunities for terrorists to cyber steal others legal identity  to provide both cover for infiltration ,financial means to fund their terrorist activities , launch training, recruitment , buying arsenals and above all organise their network. Because cyber terrorist attacks are becoming increasingly pervasive and sophisticated, and can have more severe economic impact than many conventional terrorist acts, cyber terrorists are categorized as rational actors owing to their cost-benefit calculus.

The first chapter defines physical / traditional terrorism within perplex semantic sociological, legal, political and religious framework. Meanwhile, the second chapter will investigate the shift to virtual terrorism throughout the convergence of terrorism and cyberspace formulating a definition of cyberterrorism.

The chapter which concerns computer as an arsenal: attacks on infrastructure will marshal the scopes of cyber attacks to disrupt critical networks and infrastructures like electrical grids and water supply, key financial networks, military, air traffic and communications centers. Whereas the cyber economic jihad will be highlighted on one hand in terms of economic disruption orchestrating a coordinated attack to block the communications to and from financial and economic institutions that could seriously damage the economies. On the other hand, I will explain how Distributed Denial of Service makes systems unavailable or having them operate on the basis of incorrect data.

The fact that global population becomes more and more connected to the world wide web, the opportunity for criminals of hijacking other’s legal identity becomes a commonplace in cyberterrorism .Identity fluidity is the process through which online stolen identities are constructed either in order to avoid watch list related to the damaged identity and gain unauthorized access to entry points such as airline gates, border crossings, or other facilities, , or to open bank accounts and obtain credit card to generate funds.

Organised cyber attacks to destroy and weaken the enemy are an answer to the social theory question “why do they do it?”. From rational choice theory perspectives, terrorist organizations consider cyberterrorism as a more efficient alternative on the basis of cost-benefit calculus. This design’s elements (pain-pleasure) allow terrorists to engage in their terrorist activities with minimal risks to paralyse the enemy, diminish his resistance, and reduce his ability to fight.

Rachid Chelouah. Cambridge. UK http://newsoutlook.info/