Cyber Terrorism
Is It Bloodless War?
By
PUNEET NAGPAL
Master of Science Cyber Law and Information Security (IIIT-Allahabad)
Cyber Terrorism :-
According to the U.S. Federal Bureau of Investigation, Cyberterrorism is any "premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets by sub-national groups or clandestine agents."
In this I would like to share some Hide and Seek Games of al-Qa’ida and Other Cyber Terror Organizations with some references
During the march 2004 whenever Madrid attacks were happened , that time al-Qa’ida was in habbit of sending e-mails to various newspapers and claiming responsibility of attacks. But these days the trend is totally changed . Any message if any terrorist want to share some message , the message is posted on some jihadi websites ensuring it will be read by various people around the world in few seconds.
Every al-Qa’ida member was carrying a laptop after the bombardments. It means the internet has become a key element in al-Qa’ida training and Cyber space is becoming the field of battle. Now a days the terrorist groups are in need of following essential ingredients :-
1. Members
2. A Leader
3.
A Religious Guide
4.
Information Technology/Security Specialists
The internet is a multipurpose tool and weapon. It can be use to communicate one-to-one or to millions, it can be used to convey hidden information , instructions or plans . Cyber attacks can create enormous damage at very little costs to jihadis. Al-Qa’ida has put the internet to many and varied uses.
Secrets:-
Cryptography / Crypto-Systems are the heart of Cyber – Warfare. The messages are concealed , embedded or coded and sent over internet.
According to experts there are more than 5000 jihadi websites which help al-Qa’ida maintain its network over the world. The first website by al-Qa’ida is believed to have been ‘maalemaljihad.com’(Milestones of Holy War) but it was crashed by China in Feb. 2001 when Mr. Muhammad Ali forgot to pay the renewal subscription on time. The successful use of internet in cyber jihad depends upon secrecy and deception on the one side and vigilance and intelligence on other side.
Different ways in which online – war is joined:-
Future of Cyber Terrorism :-
All of these scenarios can be executed today. As you may know, some of these incidents already have occurred in various nations. More of such acts will take place tomorrow.
Are you prepared?