Cyber Crimes
Discipline: History
Type of Paper: Essay (any type)
Academic Level: Undergrad. (yrs 3-4)
Paper Format: APA
Question
Discuss how the Internet and netwar networks have changed the way terrorists connect and
organize in the modern age. How do you think Homeland Security can tackle this virtual threat?
Be sure to support your statements with logic and argument, citing any sources referenced. Post
your initial response by Thursday at 11:59 p.m. MT of this week. and check back often to
continue the discussion. Be sure to respond to two of your peers’ posts as well by Sunday at
11:59 p.m. MT of this week.
Search entries or author Filter replies by unreadUnread Collapse replies Expand replies
Subscribe
ReplyReply to Module 2: Discussion Forum
Collapse SubdiscussionKingson Njoku
Kingson Njoku
5:23pmNov 22 at 5:23pm
Manage Discussion Entry
Social Underpinnings of Terrorism
Hello Class
The purpose of this discussion topic is to assist students to advance their
understanding of how the internet and netwar networks have changed the
way terrorists connect and organize in the modern age. Also, to have an
indebt conceptualization of how the world of information technology/revolution
is bolstering the rise of the network form of pockets organizations, that allow
small but isolated groups to communicate, link up, and undertake coordinated
joint actions that never happened before. Netwar is now creating a whole new
face of conflict in the world of terrorism. Netwar can better be branded as an
advanced tool that terrorists are effectively utilizing. This new modus-operandi
of terrorists makes it difficult for law enforcement and intelligence agencies to
detect future threats. Organizations like al-Qaida have capitalized on netwar
to export terrorism to the United States and around the world, especially
Africa which is now their heaven. The danger lies in the enormity of damage
netwar networks activities can cause to the public sector and our critical
infrastructure. For the most part, infrastructure pilots all the activities in the
world advanced by innovative information systems technology. Such as the
provision of essential services, like energy, telecommunications, water,
transportation, and financial services. The 21 st -century advancement in
information technology has impacted the global social system. Improved
communication networks, strategic intelligence systems, and machine
intelligence have advanced the security architecture and strategies of
America and the world. The global business and commerce operativity have
simplified since the advent of high-speed internet, telegram, tweeter,
Facebook, and a host of other social media. World leaders are now able to
meet and dialogue for peace at the comfort of their homes.
The negative effect of internet network evolution is that it has been wrongfully
exploited by terrorists, small isolated groups, and Jihadists to communicate,
link up, and undertake coordinated joint actions as never done before. This
has given rise to a new mode of conflict in the history of terrorism (netwar)
(Fisher & Fisher, 2015). Netwar has turned to be a powerful tool by terrorists
and propagandists to attack the critical infrastructure of the world and the US.
Cyberspace attack. Fisher and Fisher (2015) has defined netwar as “an
emerging mode of conflict and crime at societal levels which involves
measures short of traditional war in which the protagonists use network
forums to organize and relate doctrines, strategies, and technologies to
attend to their self-acclaimed goal, agenda, and objectives.” For example, the
Jihadist movement and Isis, and a host of other religious extremists are now
using the social media platform to advance their evil course, creating online
propaganda to attract intended fighters and fundraisers to advance their
course. The author classified netwar and cyberwar as modes of conflicts that
are largely about knowledge about who knows what, where, and why, about
how secure a societal military or other actor is regarding its knowledge of
itself and its adversaries.
Internet, netwar, and networks have made our critical infrastructure
vulnerable to a wide range of risks that span from both physical and cyber
threat hazards (DHS,2014). Cyber terrorists prey on these vulnerabilities to
steal information and money. They are continuously developing strong
capabilities to disrupt, destroy, as well as threaten the delivery of all essential
services. Cybercrime has created associated crimes such as child
pornography, child exploitation conspiracies, banking and financial fraud,
intellectual property violations. These crimes we know have substantial
human and economic consequences. The Department of Homeland Security
and the nation's intelligence community have made the protection of our
Cyberspace an important homeland security mission. However, achieving this
mission is not easy, the reason stems from the fact, those malicious actors
can operate from anywhere globally, the linkages between cyberspace and
the physical systems, and the complexities of dislodging cyber networks.
Department of Homeland Security on Cyberwar: Collaboration between
government and private sector partners is important. The department must
partner with these agencies to be able to strengthen all cybersecurity
protections. Private engagements are required to assist in the investigation of
those that engage in cybercrime, help in machine intelligence and
communications. Other ways DHS can assist to counter cybercrime include,
risk reduction approaches, assisting people impacted when a crime occurs,
analyzing potential impact across critical infrastructure, investigating crime
and holding offenders accountable, and coordinating the national response to
all significant cyber incidents. The DHS has a whole array of responsibilities
to counter cybercrime and secure our people. Their role remains
inexhaustible and does not limit the dissemination of domestic cyber threat
information.
Cheers
Dr.Njoku
Reference
Department of Homeland Security, (2014). The 2014 Quadrennial homeland
security review.www.dhs.gov
Fisher, A., & Fisher, A. (2015). Swarmcast: How Jihadists maintain a
persistent online pressure. Perspectives on Terrorism, (9(3), 3-2.
ReplyReply to Comment