Cyber Crimes

Discipline: History

Type of Paper: Essay (any type)

Academic Level: Undergrad. (yrs 3-4)

Paper Format: APA

Pages: 1 Words: 275

Question

Discuss how the Internet and netwar networks have changed the way terrorists connect and

organize in the modern age. How do you think Homeland Security can tackle this virtual threat?

Be sure to support your statements with logic and argument, citing any sources referenced. Post

your initial response by Thursday at 11:59 p.m. MT of this week. and check back often to

continue the discussion. Be sure to respond to two of your peers’ posts as well by Sunday at

11:59 p.m. MT of this week.

Search entries or author Filter replies by unreadUnread     Collapse replies Expand replies

 Subscribe

 ReplyReply to Module 2: Discussion Forum


Collapse SubdiscussionKingson Njoku

Kingson Njoku

5:23pmNov 22 at 5:23pm

Manage Discussion Entry

Social Underpinnings of Terrorism

Hello Class

The purpose of this discussion topic is to assist students to advance their

understanding of how the internet and netwar networks have changed the

way terrorists connect and organize in the modern age.  Also, to have an

indebt conceptualization of how the world of information technology/revolution

is bolstering the rise of the network form of pockets organizations, that allow

small but isolated groups to communicate, link up, and undertake coordinated

joint actions that never happened before. Netwar is now creating a whole new

face of conflict in the world of terrorism. Netwar can better be branded as an

advanced tool that terrorists are effectively utilizing. This new modus-operandi

of terrorists makes it difficult for law enforcement and intelligence agencies to

detect future threats. Organizations like al-Qaida have capitalized on netwar

to export terrorism to the United States and around the world, especially

Africa which is now their heaven. The danger lies in the enormity of damage

netwar networks activities can cause to the public sector and our critical

infrastructure. For the most part, infrastructure pilots all the activities in the

world advanced by innovative information systems technology. Such as the

provision of essential services, like energy, telecommunications, water,

transportation, and financial services. The 21 st -century advancement in

information technology has impacted the global social system. Improved

communication networks, strategic intelligence systems, and machine

intelligence have advanced the security architecture and strategies of

America and the world. The global business and commerce operativity have


simplified since the advent of high-speed internet, telegram, tweeter,

Facebook, and a host of other social media. World leaders are now able to

meet and dialogue for peace at the comfort of their homes.

The negative effect of internet network evolution is that it has been wrongfully

exploited by terrorists, small isolated groups, and Jihadists to communicate,

link up, and undertake coordinated joint actions as never done before. This

has given rise to a new mode of conflict in the history of terrorism (netwar)

(Fisher & Fisher, 2015). Netwar has turned to be a powerful tool by terrorists

and propagandists to attack the critical infrastructure of the world and the US.

Cyberspace attack. Fisher and Fisher (2015) has defined netwar as “an

emerging mode of conflict and crime at societal levels which involves

measures short of traditional war in which the protagonists use network

forums to organize and relate doctrines, strategies, and technologies to

attend to their self-acclaimed goal, agenda, and objectives.” For example, the

Jihadist movement and Isis, and a host of other religious extremists are now

using the social media platform to advance their evil course, creating online

propaganda to attract intended fighters and fundraisers to advance their

course. The author classified netwar and cyberwar as modes of conflicts that

are largely about knowledge about who knows what, where, and why, about

how secure a societal military or other actor is regarding its knowledge of

itself and its adversaries.

            Internet, netwar, and networks have made our critical infrastructure

vulnerable to a wide range of risks that span from both physical and cyber

threat hazards (DHS,2014). Cyber terrorists prey on these vulnerabilities to

steal information and money. They are continuously developing strong

capabilities to disrupt, destroy, as well as threaten the delivery of all essential

services. Cybercrime has created associated crimes such as child

pornography, child exploitation conspiracies, banking and financial fraud,

intellectual property violations. These crimes we know have substantial

human and economic consequences. The Department of Homeland Security

and the nation's intelligence community have made the protection of our

Cyberspace an important homeland security mission. However, achieving this

mission is not easy, the reason stems from the fact, those malicious actors

can operate from anywhere globally, the linkages between cyberspace and

the physical systems, and the complexities of dislodging cyber networks.

Department of Homeland Security on Cyberwar:  Collaboration between

government and private sector partners is important. The department must

partner with these agencies to be able to strengthen all cybersecurity

protections. Private engagements are required to assist in the investigation of

those that engage in cybercrime, help in machine intelligence and

communications. Other ways DHS can assist to counter cybercrime include,

risk reduction approaches, assisting people impacted when a crime occurs,

analyzing potential impact across critical infrastructure, investigating crime

and holding offenders accountable, and coordinating the national response to


all significant cyber incidents. The DHS has a whole array of responsibilities

to counter cybercrime and secure our people. Their role remains

inexhaustible and does not limit the dissemination of domestic cyber threat

information.

Cheers

Dr.Njoku

Reference

Department of Homeland Security, (2014). The 2014 Quadrennial homeland

security review.www.dhs.gov

Fisher, A., & Fisher, A. (2015). Swarmcast: How Jihadists maintain a

persistent online pressure. Perspectives on Terrorism, (9(3), 3-2.

 ReplyReply to Comment