IRLS 210 B006
American Military University “Cyber terrorism has become one of the most significant threats to the national and international security of the modern state, and cyber attacks are occurring with increased frequency. The Internet not only makes it easier for terrorists to communicate, organize terrorist cells, share information, plan attacks, and recruit others but also is increasingly being used to commit cyber terrorist acts. It is clear that the international community may only ignore cyber terrorism at its peril.” (Kelly G. 2010) Americans are becoming more and more codependent on technology. The vast majority of homes in the United States have at least one home personal computer (PC) that is connected to the internet. Americans have gotten accustom to being able to access the internet from their homes. Banking, social media, video teleconferencing and business ventures are all examples of how the internet is being used. The availability of the internet and computers in homes have simplified lives in the United States, however this allows cyber-terrorist to have direct access to the most personal of information. Much like the attacks that took place on September 11th the average American is completely unaware of the vulnerabilities that lye waiting around every corner of cyberspace. Cyber-terrorism not only affects individuals, it can also affect the entire nation. The United States critical infrastructures are becoming more dependent on computer networks for there operations. If security is not stepped up terrorist may be able to disrupt or shut down critical support systems. Americans and American companies must educate themselves on the vulnerabilities that cyber-terrorism presents and begin to work toward securing our networks in the same manner as we do our borders. “If the new terrorism directs its energies toward information warfare, its destructive power will be exponentially greater
References: Army, U. (2005). Cyber Operations and Cyber Terrorism. In U. Army, U.S. Army Training Doctrine Command, Handbook No Colin Soloway, Rod Nordland and Barbie Nadeau Newsweek (June 17, 2002) “Hiding (and Seeking) Messages on the web” http://www.mafhoum.com/press3/102T43.htm Constantine J Kelly A. Gable, Cyber-Apocalypse Now; securing the internet Against Cyberterrorism and using Universal Jurisdiction and a Deterrent, 43 Vand. J. Transnat’l L. 57 (2010) Kent Anderson (October 13, 2010) The Prague Post Mudawi M. Elmusharaf (April 08, 2004) Cyber Terrorism: The new kind of Terrorism http://www.crime-research.org/articles/Cyber_Terrorism_new_kind_Terrorism Walter Laqueur, (September/October 1996) “Postmodern Terrorism”