Cyber terrorism Term Paper Available

Cyber terrorism
Cyber terrorism

Cyber terrorism

Order Instructions:

The student is required to cover the required readings and apply the information provided combined with the student’s research to answer the following questions:

1. Explain the advent of Cyber terrorism? What is it? How has it been combated since September 2001? What are the current policies? And, what is being done at a national and international level to combat it?

2. Review McNeal, G. S. (2008) Cyber Embargo: Countering the Internet Jihad. Explain the interface of domestic and international terrorism through the Internet Jihad, its potential impact on domestic security (vis-a-vis the controversy over surveillance within the Patriot Act), and why this is domestic terrorism.
The following items will be assessed in particular:

1. Your ability to apply your understanding past modules into critical thinking concerning Cyber terrorism.
2. Your ability to understand past domestic and international (domestic in their countries) terror groups and relate current capabilities to combat their tactics, vision and goals.
3. In-text references to the modular background readings (APA formatting recommended) and a reference page. Outside background reading sources encouraged and expected.

Length: This Case Assignment should be at least 3 pages not counting the title page and references.

References: At least two references should be included from academic sources (e.g. peer-reviewed journal articles). Required readings are included. Quoted material should not exceed 10% of the total paper (since the focus of these assignments is critical thinking).

Organization: Subheadings should be used to organize your paper according to question

Required readings:

Cyberterrorism: The invisible threat stealth cyber predators in a climate of escalating risk (2010). Foreign Affairs, 89(6), 24A. Retrieved November 15, 2012, from ProQuest.

McNeal, G. S. (2008). Cyber embargo: Countering the internet Jihad. Case Western Reserve Journal of International Law; 2007/2008, 39(3), 789. Retrieved November 15, 2012, from ProQuest

National Strategy for Combating Terrorism (2006). The White House. Retrieved November 15, 2012, from: http://georgewbush-whitehouse.archives.gov/nsc/nsct/2006/

National Security Strategy (2010). Homeland Security Digital Library, Naval Postgraduate School. Retrieved November 15, 2012, from: http://www.hsdl.org/?view&doc=123246&coll=limited

O’Rourke, M. (2010). The real enemy, Risk Management. 57(3), 80. Retrieved November 15, 2012, from ProQuest

Theohary, C. A. and Rollins, J. (2011). Terrorist use of the internet: Information operations in cyberspace. Congressional Research Service. Retrieved November 15, 2012, from: http://www.fas.org/sgp/crs/terror/R41674.pdf

SAMPLE ANSWER

Domestic Terrorism: Cyber terrorism

Cyber terrorism is the act of using computers as weapons or as targets by the politically motivated sub-national or international groups, who end up threatening and causing fear and violence among the people so as to influence them or make the government change its current policies (Arquilla, 2013).

Advent of Cyber terrorism

The public interest in cyber terrorism began in the late 1980’s (Arquilla, 2013). The fear about the millennium bug finely tuned in the year 2000. This is when the potential cyber terrorist attacks also increased. The millennium bug was however not a terrorist attack or a plot against the United States. Instead, it acted as a catalyst to spark the fears of a large-scale devastating cyber attack. On September 11, 2001 there was a high profile terrorist attack in the United States. The states ensuing war on terror led to further media coverage of the possible threats of cyber terrorism in the following years.

How Cyber terrorism has been Combated

Since September 2001, the mainstream media coverage discusses often any possibility of a large attack making good use of the networked computers to damage dangerous infrastructures with the purpose of putting the lives of people in jeopardy or causing distraction on a national scale. Since 2002, security improved following the private sector sharing information with the government regarding the terrorist’s attacks in their private companies. There was an establishment of a Department of Homeland Security (DHS) which attempted to improve the sharing of information (Ferraro, 2014).

Current Policies Regarding Cyber terrorism

Policy makers that face the assessment and targeting of the future cyber threats should address the current and key issues from the multiple perspectives. The policy dimensions of the cyber terrorism include the possibility to discourage other people from resorting to it. Preparedness and prevention is another aspect whereby the sharing of information and establishment of good practices should be of primary importance. This involves the partnerships between the public and the private sectors. At the same time, threats should be detected and responded to via an alert system. This would dramatically increase the timely targeting of attacks. There should also be contigent plans and disaster recoveries in order to mitigate the attacks. Lastly, there should also be a placement of international cooperation and the establishment of active defenses (McCrisken, 2011).

National and International Level to Combat Cyber terrorism

The America’s National Strategy for combating terrorism recognizes that they are at war and that it is their solemn obligation to protect and defend their homeland and the American people. The National Strategy also recognizes that the war on terror is different kind of war since it is both a battle of arms and ideas. They do not only fight the terrorists on the battlefield but also promote freedom and the dignity of the people as an alternative to the terrorists’ wicked vision of oppression and totalitarian rule. Their paradigm to combat terrorism involves the application of all elements of the national power and influence. They do not only employ the military power but also use the diplomatic, intelligence, financial and law enforcement activities for the homeland protection. They also extend their defenses, disrupt the operations of terrorists and deny their enemies what they need in their operation and to survive.

Interface of Domestic and International Terrorism through the Internet Jihad

According to the article, Cyber Embargo, terrorists are occupied in an online jihad. This is characterized by the use of the internet in fundraising, distribution of messages and directives, recruitment and proselytization. It is, however, possible to limit the terrorists’ websites to a particular region, then a modification of current laws can allow the cyber embargo on the jihadists’ websites and their group. Together with the diplomatic cooperation, they are able to curb the impact of the jihadist websites while at the same time increasing the governments’ ability to monitor those websites and shut them down when necessary (McNeal, 2007).

Potential Impact on Domestic Security

Since the internet can be accessed very easily, the number of potential recruits by the terrorists has risen. Websites have provided an instant connection between the terrorists’ recruiters and the most interested sympathizers. Terrorists can then broadcast strong messages to a large audience of viewers. Apart from that, they can use browsers to check language settings and direct viewers to the required site which is customized for language and culture.

Why it is categorized as Domestic Terrorism

Cyber jihad, unlike cyber terrorism, is the information presented on behalf of the terrorist organizations. It can also be used on several activities that support war directly. For example, an expert in cyber terrorism called Joseph Shahda explains that ‘media jihad,’ which is the internet is as important as the battlefield of jihad. Through the internet, terrorist groups set up centers for operation, raise money, spread propaganda and at the same time communicate with ideologies. It provides an inexpensive recruiting tool for the terrorists to win their supporters and members from all over the world.

References

Arquilla, J. (2013). Twenty years of cyberwar. Journal Of Military Ethics, 12(1), 80-87.

Ferraro, M. F. (2014). “Groundbreaking” or broken? an analysis of sec cybersecurity disclosure guidance, its effectiveness, and implications. Albany Law Review, 77(2), 297-347.

McCrisken, T. (2011). Ten years on: Obama’s war on terrorism in rhetoric and practice. International Affairs, 87(4), 781-801.

McNeal, G. S. (2007). Cyber embargo: countering the internet Jihad. (German). Case Western Reserve Journal Of International Law, 39(3), 789-826.

We can write this or a similar paper for you! Simply fill the order form!

Unlike most other websites we deliver what we promise;

  • Our Support Staff are online 24/7
  • Our Writers are available 24/7
  • Most Urgent order is delivered with 6 Hrs
  • 100% Original Assignment Plagiarism report can be sent to you upon request.

GET 15 % DISCOUNT TODAY use the discount code PAPER15 at the order form.

Type of paper Academic level Subject area
Number of pages Paper urgency Cost per page:
 Total: