Terriorism
Terriorism
Terriorism
PRESENTER:
FPI/CSC/20/011
SUBMITTED TO:
MR. IBIYOMI M. A.
SOCIETY
1.0 INTRODUCTION
The dependence of the society today on the computer technology is enormous and is
increasing every day. The digitalization of the working process in all social and economic
spheres of life is a real phenomenon today and it is growing every day. The development of
world trade has a direct effect on the further development of the computer technology and
interne. This development of the industry has created an opportunity for the use of these
algorithmic processes and development of both hardware and software. It has scientific,
computer program. The program has an executable form that the computer can use directly to
execute the instructions. The same program in its human-readable source code form, enables
a programmer to study and develop a sequence of steps known as an algorithm. Because the
instructions can be carried out in different types of computers, a single set of source
reasons, whereby – in contrast to assassination – the direct targets of violence are not the
main targets. The immediate human victims of violence are generally chosen randomly
processes between terrorist (organization), (imperilled) victims, and the main targets are used
to manipulate the main target (audience(s)), turning it into a target of terror, a target of
computer systems and programs, informational systems, military objectives and databases
that contain information regarding these military objectives. Unlike a simple annoying virus,
a cyber-attack is designed to cause physical pain and to destroy the financial services.
Computer terrorism is however the simple use of the computers and internet network to
design and conduct terrorist attacks. It is an actual fact that nowdays someone or certain
groups might use computer and technological means to conduct a military or a terrorist attack
Although it is difficult to say where and when ‘new terrorism’ exactly started, many point to
the mid1990s, and the bombing of the World Trade Center in New York in 1993 as well as
the sarin gas attack in the Tokyo underground by the Aum Shinrikyo cult in 1995. It is said,
that this terrorism has a different set of new characteristics in comparison to the traditional or
‘old terrorism’ mentioned above (Davies, 2014). Many supporters of the concept ‘new
terrorism’ point to the prominence of religion, mainly radical Islam, as one of its main
characteristics.33 Whereas ‘old terrorism’ was primarily secular in its orientation and
inspiration, terrorism linked to religious fanaticism is on the increase. According to Nadine
Gurr and Benjamin Cole only two out of sixty-four international terrorist organisations in
1980 could be classified as religious. This figure has risen sharply to twenty-five out of fifty-
eight by 1995.34 ‘New terrorism’ is often portrayed as a terrorism, which rejects all other
ways and promotes an uncompromising view of the world in accordance with the belief of
the religion. Bruce Hoffman believes that this religious motivation is the defining
These are some of the reason why terrorist chose to adopt computer in their operation and it
is considered that computer terrorism will become more and more attractive to the cyber
terrorists
i. The risk of getting caught after committing a crime has been reduced due to the
ii. It is possible to cause large amount of economic and technical damage without
iii. The experts on these issues can be easily hired for the job.
iv. A successful attack will make the front pages of all the media all around the world
v. The internet can be used as a tool to generate money all over the world.
vi. The internet offers great possibilities for spreading propaganda about a terrorist group
government.
vii. The attacks can be prepared and conducted in a short amount of time and with little
expenses.
3.4 Roles of Computer in Modern Terrorism
Internet is the most suitable media used today by the terrorists to achieve their goals such as
spreading propaganda, planning attacks and recruiting new members into their organizations.
Internet grants its users a measure of anonymity, a feature, which has contributed in enabling
groups create and publish websites in different languages. Consequently, the sites are
accessible to people from different countries throughout the world, yet they offer various
forms of protection for their users. For example, Al-Qaeda followers can enter onto website
azzam.com which bears the name of Abdullah Azzam, the spiritual leader of Osama Bin
1. Hacker
The term ‘hacker’ was originally used in computing circles to refer to individuals who had a
low-level familiarity with the operation of technology and were capable of devising
technically elegant software solutions (Joshua, 2019). However, the usage of the term has
changed over the years and is now generally accepted as referring to persons who deliberately
gain (or attempt to gain) unauthorized access to computer systems. Hackers are by no means
a new threat and have routinely featured in news stories during the last two decades. Indeed,
they have become the traditional ‘target’ of the media, with the standard approach being to
present the image of either a ‘teenage whizzkid’ or an insidious threat. In reality, it can be
argued that there are different degrees of the problem. Some hackers are malicious, whilst
others are merely naive and, hence, do not appreciate that their activities may be doing any
real harm.
2. Cyber Terrorist
Recent years have witnessed the widespread use of information technology by terrorist-type
organizations. This has led to the emergence of a new class of threat, which has been termed
‘cyber terrorism’. This can be viewed as distinct from ‘traditional’ terrorism since physical
terror does not occur and efforts are instead focused upon attacking information
systems/resources (Corner, 2015). When viewed from the perspective of skills and
techniques, there is little to distinguish cyber terrorists from the general classification of
hackers. Both groups require and utilize an arsenal of techniques in order to breach the
security of target systems. From a motivational perspective, however, cyber terrorists are
clearly different, operating with a specific political or ideological agenda to support their
actions.
However, the difference does not necessarily end there and other factors should be
considered. Firstly, the fact that cyber terrorists are part of an organized group could mean
relaying their political messages to the general public without being censored.
However, they can now use the Internet for this purpose. Examples of where this is
already the case include the Irish Republican Information Service and the Zapatista
ii. Fundraising: Some terrorist/resistance groups linked to political parties are now
using the Internet for funding raising purposes. In the future this may mean that
smaller terrorist/resistance groups may be able to receive the majority of their funding
iii. Information Dissemination: It is also possible that groups may publish sensitive
information about a particular country. For example, Sinn Fein supporters at the
University of Texas made details about British Army establishments within Northern
engaging in terrorist activities. For example, the ‘Terrorist Handbook’ [lo] instructs
beginners how to make explosives and weapons and is widely referenced and
iv. Secure Communication: Terrorist use of more advanced encryption methods and
difficult to break and allows for the control of groups anywhere in the world. This
causes a problem for the security services, as it means that they will have to spend
more time and resources on trying to decrypt electronic messages (Forouzan,, 2017).
4.0 CONCLUSION
Modern society has a significant (and increasing) dependence upon information technology.
This paper has sought to suggest that, as a result of this, we face a number of immediate and
long-term threats that need to be recognized in order for protective action to be taken. In the
case of hackers, we can, to some extent, take comfort from the fact that a significant
proportion of them are not engaging in their activities for a malicious purpose. The hacker
Cyber terrorists operate with a political agenda. This motivation (which could often be more
accurately described as fanaticism) will mean these types of attacks will be more specifically
targeted and aimed at more critical systems. This collective action would do more harm than
Comer 2015, Sect. 7.7.4 – “Cyber Problems and Survey of Computer and Fraud Abuse.”,
Network MTU, and Fragmentation, p. 104, Explains fragmentation and the effect on
Furnelb P and Warren M. (2019): “Computer Hacking and Cyber Terrorism: The Real
18 (2019) 28-34
Joshua K. (2019), “Israeli Arrested for Hacking U.S. Military Computers". OECD Digital