Cyberterrorism Essay

Cyberterrorism Essay
The scary thing about living in the cyber age is that a hacker in a Bombay hotel room can in theory cause a nuclear Armageddon through an Internet connection using US military nukes, ending life as we know it. No amount of military spending on anti-ballistic missiles or federal funding to increase FBI field agents can stop this threat since it's a digital threat and not a physical one. The only thing a nation can do is invest in cyber security, and make sure that their servers are protected with the best encryption software possible or are remotely stationed outside the Internet.

The interesting aspect about the Internet is that states don't necessarily control the Internet, individuals do, in the sense that the Internet empowers individuals disproportionately compared to their real, physical power. The Internet is the great equalizer because all individuals have equal access to the same information; the Harvard professor and the twelve-year old Mali teenager share the same database as long as they have an Internet connection to the World Wide Web. From the US military standpoint, it's somewhat easy for the Pentagon to see large troop movements or even rogue states accruing weapons of mass destruction via satellite communications, but how are you supposed to monitor every one of the 500 million internet users, where a few will be cyber terrorists whose sole intent is on destroying the US?

Cyber terrorism can be defined as, “…the premeditated politically motivated attack against information, computer systems, computer programs, and data which result in violence against noncombatant targets by sub national groups or clandestine agents” (Pollitt 2). The goal of terrorism is to frighten the targeted populace enough that they decide it's better to accede to the terrorists political demands rather than continue living in the current state of terror. But it's important to differentiate the cyber terrorist from the elite hacker: the cyber terrorist has a political agenda in mind and is willing to go to extremes to achieve his goal while an individual hacker is financially motivated or hacks for pure entertainment purposes.

Cyberterrorism Essay 8.1 of 10 on the basis of 847 Review.