Cyber Terrorism & Information All Term Paper

Total Length: 2274 words ( 8 double-spaced pages)

Total Sources: 1+

Page 1 of 8

The increasing skill of these terrorists in using cyberspace has led some officials to believe that they are on the point of using computers for increasing bloodshed. This new threat is not similar to hackers' earlier using computers for passing viruses and worms. This has now reached a level of being able to reach the meeting point of computers and physical structures controlled by computers. The belief of analysts in U.S. is that they may try to disable or control floodgates in dams or electrical stations handling large quantities of power and through them destroy lives and property around them.

Though there is not much evidence, they believe that al Qaeda may be using these capacities with other weapons like explosives. The al Qaeda is known to have capacity to use other sites for their own benefit, and al Qaeda laptop in Afghanistan had visited the French site of Anonymous Society. From this they had apparently collected a sabotage handbook which had sections on tools required by terrorists, planning a hit, switch gear and instrumentation, air surveillance and other such matter. In Islamic chat rooms there were some computers linked up to the al Qaeda computers that had access to crack tools that permit computers to search computers on the network, find out their security defects and thus find the method to gain full control of such computers. In the recent analysis of the logs which trace the path of computers, it has been found by U.S. investigators that al Qaeda persons have been spending time at sites that give software and programming for digital switches used to run, power, water and other communication grids. (Gellman, 2002)

During the interrogations of al Qaeda prisoners recently, there has been information passed on by the prisoners that they would like to use these methods.

Stuck Writing Your "Cyber Terrorism & Information All" Term Paper?

There has also been a police investigation in California that they have found a suspicious pattern of surveillance of computers used by Silicon Valley. It was seen that Unknown browsers from the Middle East and South Asia were trying to find out details of the digital system that is used for the management of utilities and government offices in California. This made a high technology crime expert warn the FBI through its computer intrusion squad. FBI in turn studied the matter in greater detail with Lawrence Livermore National Laboratory. They have found many intrusions, and a summary of that says that this was being conducted through telecommunication switches in Saudi Arabia, Pakistan and Indonesia. The matters studied by the visitors were telephone systems, electrical generation and transmission, water storage and distribution, nuclear power plants and gas facilities. (Gellman, 2002)

However the subject of information warfare includes a lot of action and of those actions, cyber attacks may not be that important. It is true that information operations and superiority are very important for war, it is still not a world where any country places its own forces in a position where they can be manipulated through computers, which can be attacked from outside. This limits the effect of cyber attacks which are just code sent through the network of computers. There are reports of military computers being hacked, but these are not necessarily connected to the Net. There are however clear indications that regular reports indicate many attacks that have taken place on the computers of the Department of Defense, but these attacks have not led to any degradation of the capabilities of the U.S. military. (Lewis, 2002)

Works.....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Cyber Terrorism & Information All" (2005, May 16) Retrieved May 19, 2024, from
https://www.aceyourpaper.com/essays/cyber-terrorism-information-63961

Latest MLA Format (8th edition)

Copy Reference
"Cyber Terrorism & Information All" 16 May 2005. Web.19 May. 2024. <
https://www.aceyourpaper.com/essays/cyber-terrorism-information-63961>

Latest Chicago Format (16th edition)

Copy Reference
"Cyber Terrorism & Information All", 16 May 2005, Accessed.19 May. 2024,
https://www.aceyourpaper.com/essays/cyber-terrorism-information-63961