Wednesday, December 12, 2018
'Cyber Terrorism\r'
'ââ¬Ë terrorist actââ¬â¢ is a tough terminology to define. Many schools of feeling exist most it, who take backs a look upon it with varying learnings according to their ethnicity, education, cultural groom and personal preferences. act of act of act of act of act of terrorism may take a socio-economic class of apparitional duty at sensation place, a micturate of revenge at a nonher, a tactical or strategic arm or affright, a confirm form of resi situation to oppression or a coercive power for armed forces; conclusively some(prenominal) shape it takes, it ca roles violence, may it be on homo or nature.Moving along the transitionary change brought rough since the last century is mainly because of education. Robin Morgan, renowned feminist activist, writer and poet, summed it up by axiom ââ¬Å" learning is power. The secreting or hoarding of knowledge or knowledge may be an act of dictatorship camouflaged as humility. ââ¬Â Unfortunately or not, this h umanity is being completely obsessed in the stubble c everyed discipline state of war. Itââ¬â¢s not the quantify anymore when military would be a sign of haughtiness and symbol of pride and power of a terra firma; today military is the last resort to take oer any territory.This new form of warf atomic number 18 is an offensive onslaught or a justificatory mechanism, adopted in order to ââ¬Ëdenyââ¬â¢, ââ¬Ë processââ¬â¢, ââ¬Ëcorruptââ¬â¢ or ââ¬Ëdestroyââ¬â¢ rivalââ¬â¢s information base systems, like computer ne bothrks and Information systems (Goldberg, Director IASIW). In mere(a)st words, itââ¬â¢s a stop that has originated a smarter way to tackle oneââ¬â¢s adversary. Putting unneurotic the Information war utmoste with terrorism, the superlative fears of twentieth century ar combined together as ââ¬Å"Cyber terrorismââ¬Â (Patrick, 2002) IMPORTANT CONCEPTSCyber terrorist act The dialect ââ¬ËCyber Terrorismââ¬â¢ is one of th e most am hulkinguously delimitate term, or should we say that information warf be has propagated the exposition of Cyber-terrorism in order to limit or disrupt the main cause of Terrorism. Major reciprocation today is regarding the scope of cyber-terrorism, as it is overlapping with cyber-crime, tornado and terrorism (Baranetsky, 2009). Major discrimi kingdom amongst these crimes is on the substructure of motivation, methods, targets and the involvement of computer system.Technically, cyber terrorism and information warfare are the same things, but at that placeââ¬â¢s a practical difference. Cyber terrorism is originated by politically motivated groups, disrupted individuals, or cyber go facilitators against information, computer systems and ne devilrks, in order to target passive portions in society; whereas, Information warfare is originated by national defences against information, computer systems and networks in order to exasperate the enemy losses (Colarik & Janczewski, 2005). Ideological ExtremismAnother mysterious and old notion of human history is extremism. It is ordinarily associated with righteousness, ideologic and political practices of people which are not in accordance with generally accepted norms of a religion, society or a political setup. Itââ¬â¢s not something that could be easily defined in words, but when one sees it, it is recognized (Sotlar, 2004). Recently, the element of terrorism has taken its roots in those extremist people, and they feel developed the ideology against forces, that are held together to match the rising terrorism in the lump.Most known of these extremists are people of Al-Qaeda who, so called on the plant of Islam, are spreading their ideological extremism, not only if when through militia warfare, but also electronic and information warfare. Cyber terrorism and Ideological Extremism Talking well-nigh the national security, the two major concerns of e actually nation today are terrori sm and ideological extremism. twain are the root systems of violence, may it be political or ethnical in nature (Gunaratna, 2008). Major source of both these concern today is Al-Qaeda.Originated by Osama stack away Laden, leader of Al-Qaeda, today they are the source of terrorism all over the world. With recent transformation from an functional to ideological organization, today the pose the greatest threat not only to non- Islamics, but to Muslims and Islam as well. this instant the idea behind this shift is to dismantle the well-disposed structures and sacred beliefs into ideological extremism much(prenominal) that people of Asia, Africa and pose East stand and operate for them on the lie line. In simple words, theyââ¬â¢re brain-washing and make terrorists.STATEMENT OF bother Recent developments from this ââ¬Å"Jihadiââ¬Â movement have count in the form of extremist articles on the websites. through and through various websites, they are prompting targeted peop le into expressing their views rough articulated beliefs that are designed to brain-wash the mind of those people. otherwise recent propaganda of extremist views encompasses political repression, racism, ethnical conspiracies, religious cults, Jihadists movements and religious fallacies. Certainly or not, is ideological extremism ease up terrorism?Are these terrorists make use of profit to indulge people into morally, ethically and socially injure activities that are endangering all their surroundings? Certainly we submit to hap how cyber terrorists are expanding their spectrum of operations and are including those unsafe people as the match stick to beside bomb to be exploded anywhere in the world. LITERATURE REVIEW As we stepped into the twentieth century, we were welcomed by some uprising, strong challenges that have so far consumed most portion of the worldââ¬â¢s economy. Terrorism was one of them.With terrorism finding its roots in many opposite countries, terroris ts have diversified their working(a) methodology. Now at the front end, they are chip by development one of us. The new revolution of Ideological Extremism, especially in the name of Islam, is victorious its roots into the youngsters. Not surprisingly, those terrorists have buged the simple connection of whole world, profits. Apart from the major portion of U. S led war on terrorism, two other important fundamentalists are United country and the solid ground of Saudi Arabia. Anti-terrorism policy of Saudi Arabia is by and large termed as ââ¬Å"soft counterterrorismââ¬Â.But over the period of time, it has been be successful (Hegghammer, 2010). They have reacted calmly to the situation, and by using their local preachers, they have successfully tackled those terrorist militants (Hegghammer, 2010) who were there with the mark of disrupt the government structure of Royal family, who had back up U. S. in its war against terrorism (Miller, 2003). They didnââ¬â¢t only c ounter those ideological extremists but also started a rehabilitation program in order to liquidate their extreme beliefs with reality and norms of Saudi culture (Boucek, 2008).They are also concerned somewhat the uprising ideological extremism in the country (Saleh, 2006). They reinstated their solid location against terrorism, and they withheld their stance against any part involved in terrorism (Source: Arab News: 2010). U. S. , which was previously accusing Saudi Arabia to be an ally of Al-Qaeda (Sperry, 2002), commended the efforts of Saudi Arabia in supreme those terrorist activities, and rehabilitation of detained militants (Source: Saudi Embassy, 2009 â⬠2010).UK has well-defined laws for terrorism, and are actively involved in reviewing and improving them, as per the live terrorist threats (Source: Foreign and Commonwealth Office). Following the incident of 9/11, UK adopted policies to minimize the developing security threats from terrorists (Browning, 2005). They experienced their major setback in the month of July, 2005, when in London bombings, more than fifty travellers were killed, leaving 700 injured. To the bewilderment of British, the leader of those terrorist attacks was British born Muslim (Talbot, 2006).Since then, Islamism is considered a threat in UK, may it be in any of its form (Readings, 2010). The widespread of this ideological extremism is very much attributed to the up-rising cyber terrorism, and use of cyberspace to propagate local people about their home countries, brainwashing them, and making them fight for terrorists (Gunaratna, 2008). RESEARCH IMPORTANCE Importance of internet today is more of a necessity than a luxury. It outweighs endless opportunities to all the people around the globe to retrieve or share anything they want to.Freedom of reference and lack of centrally aligned governing consistency has exposed the contents of internet to boundless reproof from different sects in the world. But in this up-risi ng polish of information warfare, cyber-terrorism and ideological extremism, itââ¬â¢s the time for the authorities to sit back and define the limitations of this give up source. Before legitimatizing the use of internet, it would be important to celebrate in mind the reasons behind following. ââ¬Â¢ Spectrum of cyber-terrorism: what just now comes in it? ââ¬Â¢ Need of regulating the flow of information on internetââ¬Â¢ Why ideological extremism exists? ââ¬Â¢ What are the factors leading to innocent people ending up terrorist? ââ¬Â¢ What lacks in the social structure that is prompting such activities? ââ¬Â¢ How the use of internet is provoking extremism in up-coming coevals ââ¬Â¢ Who are propagating the information to provoke such port ââ¬Â¢ Are we ready to fight this front of terrorism ââ¬Â¢ Is there any social remedial for a terrorist? With this look into, we are training to find out the reasons behind all these above mentioned contracts. Terrorists are humans, but they have opted the wrong way. Are they smarter than us?There is a big question mark on the upcoming days, as international security continues to be threatened by extremists. CONTRIBUTION TOWARDS THE KNOWLEDGE This enquiry is expect to amaze forward key reasons behind the amalgamation of two concepts, cyber-terrorism and ideological extremism, to bring forward a new front in the war against terrorism. finished this research, we pick out to: ââ¬Â¢ Understand the ideology behind use of internet to spread extremism ââ¬Â¢ Understand policies adopted majorly by, Muslim world leader, Saudi Arabia and, the economic giant, United Kingdom to secure their respective people.ââ¬Â¢ Reveal threats that are flummox to the respective monarchies. ââ¬Â¢ Facilitate the policy makers with succinct information to start with. ââ¬Â¢ Explore different fronts that these extremists target to exploit youth ââ¬Â¢ Find out the weakness in our social systems that allows these ideolo gies to be successful ââ¬Â¢ Discover the spectrum of sources in which cyber terrorism exists. ââ¬Â¢ Find the roots of ideological extremism and its cause on current monarchy RESEARCH METHODOLOGY This research lead be divided into two parts, as per the two portions of research question.To take views on ââ¬Å"whether ideological extremism is terrorism or notââ¬Â, cyber-terrorism to be specific, we allow rely on qualitative measures of research. On the other hand, to find the ââ¬Å"extentââ¬Â to which terrorists are making use of information warfare to spread ideological extremism, we will use quantitative measures of research. Qualitative explore Through this research, we wish to: ââ¬Â¢ Understand views of respondents about the issue ââ¬Â¢ Solicit their approach in reaching their regard viewpoints. ââ¬Â¢ Explore the difference in opinion that exists in policy makers ââ¬Â¢ Consider the possible impact of their thoughts over the people.Quantitative Research Thro ugh this approach, we wish to: ââ¬Â¢ Understand the perception of youngsters about this issue ââ¬Â¢ Discriminate respondents on the basis of their ethnicity and racism to understand involvement of any cast among people of similar sects. ââ¬Â¢ Materialize our results and statistically break down how many of them could possibly be a victim of those terrorists in near future. Sample For Qualitative research, we aim to take inputs from different critics, terrorism analysts, cyber-crime writers, internet restrictive bodies, extremist group leaders, journalists, and writers on ââ¬Å"extremismââ¬Â.These people will be selected on the basis of relevance, work in the respective fields, availability and quality of work. For Quantitative research, we aim to survey young students orbiting in different continents of the world. As all of them will be cursory user of internet, we also aim to distinguish them on the basis of their involvement in internet, and their socio-ethnic mind set about ideological extremism. Variables Major variables in the research will be: (measured as) ââ¬Â¢ Involvement in current personal matters (Ratio Scale: Weight delegate to each answer)ââ¬Â¢ friendship about the issue (Ratio Scale: Weight assigned to each answer) ââ¬Â¢ Understanding of issue (Ordinal Scale) ââ¬Â¢ Involvement with the internet (Ordinal Scale) ââ¬Â¢ Awareness about possible implications of issue (Ordinal Scale) ââ¬Â¢ Views about the issue (Nominal Scale) Monitoring All these results will be checked for reliability, grimness and practicality, as per the methods defined by the monitoring/scrutinizing body. These checks will ensure the consistency of responses, and the validity of data will be checked based upon two optimum limits provided by the monitoring body.PILOT regard In order to conduct a cowcatcher ingest on the above mentioned topic, the literature selected, for thirdhand research, as a source of Qualitative research is linked in the appe ndix A. Purpose of this study is to understand the perspective of officials of Saudi Government regarding terrorism and ideological extremism. This study was analytical, as qualitative measures were expected out of this study. Description The document comprises of official statements by Saudi government and religious representatives.Their statements usually ramble around the issues of terrorism, war against terrorism, extremism and the teachings of Islam, combating extremist ideology, role of mosque as an institution, condemning immoral, unethical acts and supporting moderation. They withheld their solid stance against terrorism, and declared any one fighting against the custodians of blessed Kaââ¬â¢aba as non-Muslim. They also instigate their support to find out and tackle the roots of terrorism and extremism. Their stance on condemning extremism, violence and any form of terrorism is mitigating with the learning of Islam.Their religious scholars emphasized on the need of omit ting deviant ideologies that have been developed between Muslims, and join together meldd as one creed, as a Muslim. They also highlighted that the reasons of deviant ideologies are lack of knowledge about the religion, and prejudiced in Fatwa. Most of their statements emphasized upon the basic theme of Islam, peace. They broad full support to international community in the war against terrorism. Outcomes of the study Learning from the pilot study reveals ââ¬Â¢ Saudi government takes terrorism as a threat to its nation, its territory, its religion, all Muslim Ummah, and non-Muslims.ââ¬Â¢ They are the custodians of sacred places of Muslims. They take it as their duty to defend the religion that was gifted to them by their Holy Prophet. ââ¬Â¢ All of the officials chord upon the solid stance they have against terrorism. They want to unite Muslims in order to protect the religion which has been gravely reputed by ideological extremists. ââ¬Â¢ Their views are diverged toward s the central finish of achieving a peaceful state. They are being the part of nation, and they stand to serve their people justly, with their lives and properties secured.\r\n'
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment