Cyber-Terrorism And Terrorism

Good Essays
Terrorism cannot be defined by one uniform definition. There are many different circumstances the prevent this. Each terrorist group has their own set of ideals, customs, means and motives. The reason they carry out criminal acts is because they believe they have been wronged. In the eyes of the organization, the only thing that will fix the injustices brought upon the is a public display of violence. Any act that has the following components may be labeled and terrorist attack: premeditation, political motivation, violence, and the act must have been committed against victims who did not warrant or provoke the attack (Schmallger. 2015. p 574). Because of the different motives for terrorist organizations, there are different types of terrorism. …show more content…
Cyber-terroism is fairly new and often is a part of other types of terrorism. According to Francis (2013), most cyber terrorist activity occurs in Eastern Europe. While cyber-terroism has the potential to cause significant harm, most hackers lack the funding to launch a large scale attack. The most prevalent cyber-terrorists groups are actually governments. Governments hack into another government 's files to steal information such as defense plans. This is the main goal for government hackers. Other hackers who commit cyber-terrorism of try to cause panic and chaos. Most of these hackers are individuals or small group with not known ideology. One group known as Anonymous is one of the most infamous groups In the United States. They have attacked government computers for the sake of making a point. Hackers have begun to dabble in organized crime. This makes them dangerous because they are willing to help other terrorist groups so long as it is for the right …show more content…
They will use these attacks to bring to light a social or political objective through force. The most well know groups that fall into this category are Al-Qaeda and the Taliban. Both groups are jihad or Islamic extremists. Many Islamic nations have their civil law tightly interwoven with the laws of their religion. Often times the laws are one and the same. The laws of Islam are called Hudud which are considered crimes against God. These laws force its worshiper to adhere to strict morale conduct. Those who do not will be severely punishes. Some groups take these laws so seriously that anyone who does not worship Islam is to convert or die. These groups have worked together in the past. Al-Qaeda was founded by Osama Bin Laden in the 1980s. This was the group responsible for flying two planes on the World Trade Centers, and another plne into the pentagon on September 11, 2001. It has been since this day that American have lived in constant fear of terrorists attacks. The US is currently fighting a “war against terror” with groups such as these. The Taliban was formed in the 1990s. The Taliban was originally formed to keep the Soviets out of Afghanistan. The group gained support because the people of Pakistan liked the fact that they had structure. They would come to realize that this structure would be harsh and totally out of their control. They began

Related Documents

  • Decent Essays

    the article talks and demand a study to find out the main reason behind horrific terrorism attacks (9/11). This article is more persuasive than the former, because it provides some evidence and information to support the thesis. For example, "Why Al-qa 'idah needed to do this as no wise human brothers including Muslims and hurts anyone without any reason". (Afghan paper calls on USA to define what terrorism is, 2007, paragraph 3). there has to be a super power behind, who is funding terrorist and paying them under the table to commence such acts against entire world, "to achieve its strategic objectives ".…

    • 1272 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    The first trait is that terrorism is violence that is for political effect and gain. Second that terrorism is a “planned systematic art”. Third terrorists are not bound to follow special rules of warfare and codes of conduct. Last, terrorism is bound to cause political repercussions beyond the victim or target. Andrew Valls states that in the political world, political actors to paint their opponents as monsters can use terrorism for political…

    • 1515 Words
    • 7 Pages
    Decent Essays
  • Decent Essays

    Human fear is a symbol that people all over the globe are being greatly concerned of why terrorism is occurring and is characterized by the influences of using many forms of terrorism such as hacking Government facilities. In the past, terrorism has been compared with how the government works and has control over power. If terrorists get too carried away, then the government will use the power to hurt society and kill innocent people. There is no actual definition of…

    • 1184 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    Cyber Crime is a malicious activity including the illegally receiving data, system interferences that compromises network and integrity and availability and copyright infringements. In other words, Cyber Crime is an illegal activity performed with the help of a computer system. It was started with hackers trying to break into computer networks. Some did it for thrill of accessing high level security networks, but others have quest to gain sensitive, classified material. Eventually, criminals started to infect computer systems with computer viruses, which led to breakdown on personal and business.…

    • 1830 Words
    • 8 Pages
    Decent Essays
  • Decent Essays

    One direction of the cyber terrorism is to use the latest technology and methods to reveal the bad things done by the government and reveal the real facts to the general public. These groups of cyber-terrorist are commonly referred as hacktivist. The other direction is to use latest technology and methods to plan attacks on different countries to cause damage to countries economy and human life. Even though both are considered to be illegal by law, people have always supported the group of hacktivist who actually the government dark secret to the public. Recently in the media sector, Panama papers are creating sensational new.…

    • 1484 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    Islamophobia In America

    • 1628 Words
    • 7 Pages

    To call someone a terrorist, would require them to have committed violent attacks on other people for political reasons, which the majority of the Muslim population, has not done. However, one could add those who commit hate crimes to the list of terror, as they have become just as bad as the people they think they’re…

    • 1628 Words
    • 7 Pages
    Decent Essays
  • Decent Essays

    Action is not allowed simply because of the terrorists lack of morality however; it is only done because of the effect it has on others. Yet, the law also has a right to imprison certain hacktivists because of their effect on others. One could us the release of bystanders’ personal information (Vamosi, “How Hacktivism Affects Us All”) as a reason to go after similar hacktivists, due to the damage that they caused to other people. Unfortunately, some hacktivists infringe on others right of politics (Vamosi, “How Hactivisism Affects Us All”) when they seek to have a voice and encourage human rights and politics (Dahan, “Hacking for the Homeland”). Not only is this hypocritical, it also goes against Utilitarianism since Mill states that free speech is a right as long as it is not “…a positive instigation to some mischievous act” (Hansson…

    • 1010 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    Evolution Of Hacking

    • 1100 Words
    • 5 Pages

    Taking down these websites became a big help to not only countries but to the people. ISIS is a terrorist group that causes fear, and in this sense, by taking down their websites, they are helping not only government agencies who were not able to take them down but the people who fear this terrorist…

    • 1100 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    The Importance Of Hacking

    • 984 Words
    • 4 Pages

    Phreaks usually steal phone card numbers, clone phones, or on rare occasions they will upload viruses to damage or eavesdrop on the device. They access your phone usually through spam or public Wi-Fi networks you have connected to. All Crackers are aware that their actions are illegal and will try to cover up their tracks anyway they…

    • 984 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    Social Disorganization

    • 1043 Words
    • 5 Pages

    As describe in our book this type of "terrorism, transitional terrorism (also called global terrorism), that is committed by residents of one or more nations against human and property targets another nation” (298). The terror may include but not limited to bombing on buildings, suicidal individual’s etc. ISIS gain will be conflicting terror to nations and to show that they can choose this path in order gain their values. As explain in our book…

    • 1043 Words
    • 5 Pages
    Decent Essays

Related Topics