Globalization has become very rapid which in turn has also affected Malaysia in general. This is due to not only the never ending enhancement of information technology (IT) and the dependence as well as reliance on technology.
In light of this development, the world has become a more borderless entity and also a transparent one. With the emergence of the information superhighway communication and the sharing of information has become very fast which has befitted people around the world and has created a closer bond between them regardless of race, culture or religion. Malaysians cannot be disregarded in this as there is a shown impact of the usage of the information superhighway as a means to communicate given the fact that Malaysia constitutes the highest rate of internet users in the region. Nevertheless, for each positive entity there is a side-effect as information technology can also be exploited which has given the rise to cyber-terrorism.
There any many versions to define the meaning of cyber-terrorism. It can be defined as an act of leveraging a target's computers and information particularly via the Internet in order to cause physical, real-world harm or severe disruption of infrastructure. Another definition is the premeditated use of disruptive activities, or the threat thereof, against computers and/or networks, with the intention to cause harm or further social, ideological, religious, political or similar objectives. This misuse of information technology could also disrupt the flow of information and communications, especially for organizations in which are solely depend on information and communication as a whole. Simply put, cyber-terrorism was said to be a convergence of cyberspace and how the use of the cyberspace is being made as a tool or aid in terrorist activities.
2.0 Issue
2.1 Uncontrollable medium
The root of cyber-terrorism which is terrorism has also become more dynamic as technology has become more sophisticated, it is safe to say it grows in accordance with technology. A set example is the recent attacks in Mumbai as compared to the biggest terrorist attack of September 11th although in terms of casualties nothing measures up to the September 11th attacks but it can be seen that in a span of 7 years terror attacks have become more coordinated, widespread and unpredictable as technology becomes more enhanced. It could be expected, in the near future, the traditional terrorist threats or attacks would be overtaken by cyber-terrorism. It would be a better option as it can have a swift but disastrous effect. This option would also mean that actions taken by them would not amount to much bloodshed but has a very strong impact to the terrorists’ target. The internet is a very difficult medium to control as even a threat could look innocent, for example the rise of social websites such as FacebookTM or MyspaceTM, which has an increasing following cannot be controlled and when exploited it can be seen as a platform for recruitment by terrorist groups as well as an indoctrination of terror influence to the internet surfing generation. Since these sorts of websites are somehow protected by the users themselves, there would be no limit in expressing and influencing the world on their views or ideology. Another example would be the increase of electronic mail (E-Mail) subscribers, bulk or mass e-mails in the form of forwarded e-mails can be used to spread the terrorists cause world-wide. Not only that, e-mail is one of the major source of spreading computer viruses, bugs or other software that could harm a person’s computer or an organizational network. As users of the internet increases and with limitless boundaries and minimal control, defence against cyber-terrorism would be an uphill struggle.
2.2 Millenium Bug
One of the major events which could have lead to cyber-terrorism was the start of the new millennium. The fear of the `Millennium Bug' has placed fear to users and also made it a potential platform for cyber-terrorists to conduct their malicious acts. Though nothing disastrous happened but it did bring up fear to the world and thus hindered activities for major organizations whether it is government or commercial. If things went their way, in a worse case scenario, a total black-out would be experienced by users and thus disrupt mostly everything and everyone that depends on technology leading their lives, from life support, finance and also records kept in a database.
2.3 Act of subversion
As mentioned earlier, with the increase of dependency on technology, some organizations however would take this to their advantage, especially now as the environment has become more competitive in nature. For fear of subversion; be it commercial or military is becoming an increasing trend throughout. This could lead to extreme results if not guarded or put into place firewalls or some sort of security as if an enemy organization for example a terrorist organization happens to have hackers infiltration into a system would not be a problem.
For an organization that is technologically superior, cyber-terrorism would be advantageous. For cyber-terrorists, they could easily attack silently due to the anonymity provided. Acting as parasites, they would just feed or do damage to users and would then move on to other targets knowing that it would take time to track them down. With the low cost and ease of obtaining IT facilities leads to enormous opportunities and also flexibility for a cyber-terrorism attack is there. Cyber-terrorists would not have to stay at one place to mount and attack but the effect would be worldwide with IT having a global reach. A cyber-terrorist which can remotely access and modify information in databases or even worse, destroying files, would could give much harm to organizations such as altering numbers for financial purposes and also to modify political ballots to their advantage. Another extreme scenario will be accessing air or maritime control centre information, which could be done from through the internet, to identify and track flights or shipping to target and also leads to confusion which could cause collisions. But as most of terrorist actions conducted with the reasoning to show the world their capabilities and their cause, cyber-terrorism, in which could affect the whole world and would mean world media coverage and this is ultimately what the terrorists want.
2.4 Widespread availability of hacking tools
But surprisingly, some hacking tools could be found in computer shops and can also be made available online. An example of these hacking tools is the key logger. It is a simple device that could be plugged into a USB slot to access passwords and also gather important documents from an unknowing user with little or no encryption on their systems. Subsequently these hacking tools will increase the availability of hacking software and also communications tapping devices. To increase the threat, with more increased usage of wireless networks, this could be easier to be executed without being physically connected to a cable network which makes tracking even more difficult.
The widespread usage of Global Positioning Systems (GPS) has now picked up and has increased in popularity. From personal and public transportation and also the military is depend on GPS in position finding. The threat to these users is the availability of GPS jammers or parts to manufacture a jammer in which could be obtained in small sizes. Confusion or adverse consequences for example in military target acquisition could be a result from jamming GPS signals. This was experienced during a commercial demonstration for a military tank in Europe where the tank went out of control and went into a ditch when the GPS equipment was jammed by an unknown source.
2.5 Vulnerability of the system
To show the vulnerability of the system nowadays against cyber-terrorism threat, an exercise was conducted by the National Security Agency (NSA) in the United States in which a team of thirty-five hackers attempted to hack the national security systems. In doing so, they were allowed to penetrate any Pentagon network and could only use hacking software that could be downloaded freely from the Internet. They started mapping networks and obtaining passwords gained through "brute-force cracking" (a trial-and-error method of decoding encrypted data such as passwords or encryption keys by trying all possible combinations). Often they used simpler tactics such as a telephone call, pretending to be a technician or high-ranking official, and asking for the password. From their actions, the hackers managed to gain access to dozens of critical Pentagon computer systems. Once they entered the systems, they could easily create user accounts, delete existing accounts, reformat hard drives, scramble stored data, or shut systems down. They broke the network defenses with relative ease and did so without being traced or identified by the authorities. This was a shocking result to the organizers as in the first place, the team of hackers had shown that it was possible to break into one of the United States national security system and, potentially, if given time, cripple it. In the second place, the NSA officials who examined the experiment's results found that much of the private-sector infrastructure in the United States, such as the telecommunications and electric power grids, could easily be invaded and abused in the same way. But this was just in the United States alone, and as the cyberspace has a global reach and would have a higher risk of vulnerability with reduces security systems, this would also result in crippling, invasion and abuse of systems globally with ease. According to Symantec, one of the world's corporate leaders in the field of cyber security, new vulnerabilities to a cyber attack are being discovered all the time. The company reported that the number of "software holes" (software security flaws that allow malicious hackers to exploit the system) has grown throughout the years. Still, Symantec claimed that no single cyber terrorist attack was recorded. This may reflect the fact that terrorists do not yet have the required know-how. Alternatively, it may illustrate that hackers are not sympathetic to the goals of terrorist organizations—should the two groups join forces, however, the results could be devastating.
3.0 Conclusion
Although comfirmed cyber-terrorism attacks has not been announced or recorded, but a risk is there and measures has to be put up to secure global networks against them. The fear of cyber-terrorism is still there with the relative rise on technological dependency and cyber-terrorism opportunities such as hackers and viruses. As terrorism is still a global threat, the world has now put up defences to act as countermeasures to deter or deny any terror attacks, and counter cyber-terrorism should be one of them based on the popularity, dependancy and reach the technology has to offer. Potential cyber-terrorists such as hackers are now becoming popular with the younger generation as they grew up in the techological era. An increased emergence of younger generation taking hacking as a hobby should also be a worry as this would provide a grooming and training opportunity for a new generation of terrorist. It would also give a dynamic result for terrorist if they are able to converge traditional acts and cyber-terrorism as a combined terrorist act.
No comments:
Post a Comment