Essay, Research Paper: Information Terrorism 

Computers

Free Computers research papers were donated by our members/visitors and are presented free of charge for informational use only. The essay or term paper you are seeing on this page was not produced by our company and should not be considered a sample of our research/writing service. We are neither affiliated with the author of this essay nor responsible for its content. If you need high quality, fresh and competent research / writing done on the subject of Computers, use the professional writing service offered by our company.

The introduction of the computer has created a new type of terrorism known as
informational terrorism, which presents a threat, equal to or greater than
physical terrorism. E-mail bombs and attacks on internet servers are the lowest
forms of informational terrorism in terms of destruction. Higher forms of
informational warfare include using the internet as a catalyst to produce
physical terrorism on a higher scale. “The national security establishment is
concerned with a new form of conflict; informational warfare.” (Devost, 1) The
Department of Defense definition of terrorism is "the calculated use of
violence or the threat of violence to inculcate fear; intended to coerce or to
intimidate governments or societies in the pursuit of goals that are generally
political, religious, or ideological." (Research, 1) While in physical
terrorism, the perpetrator must come in contact with the target, in
informational terrorism the perpetrator only needs a computer connection. Not
only are the tools of information terrorism more accessible but the implications
can be more devastating. In conjunction with the Internet and the infancy of its
laws, the criminal justice system has fallen behind with its vague set of
incoherent laws. Terroristic violence, as portrayed in Tom Clancy’s Clear and
Present Danger, presents a serious threat to the U.S. which should be dealt not
only with caution and security, but also in conjunction with response.
“Identifying international terrorists and their networks providing warning so
that protective or deterrent measures can be taken, and gathering information on
terrorist acts require a major U.S. intelligent effort.” (Wilcox, 1) In Tom
Clancy’s Clear and Present Danger, information is not correctly distributed to
U.S. agents causing underestimation of enemies. To rectify the drug problem
initiated by Columbia, both the United States and Columbia use physical
terrorism to contend one another. After Colombian drug lords murder a United
States ambassador, the United States retaliates by mounting a series of covert
operations including assassinations and interdiction of drug production and
smuggling. Does the Colombian drug lords murder of one man justify the reactions
of over exertion of force from the U.S.? Tom Clancy used small teams of covert
operatives to launch a counter attack on the Colombians. The U.S. currently
employs a strategy similar to this. “To respond promptly to terrorist
incidents abroad which require varied U.S. resources, we have developed a unique
fast reaction team. This team, led by an officer from S/CT, consists of experts
from DOD, CIA, FBI and other agencies, as needed. At the request of a foreign
government or an U.S. Ambassador abroad, this team can be dispatched within a
few hours on a specially dedicated aircraft provided by DOD to any place in the
world. The team's job is to provide support to the Ambassador and the host
government in resolving a terrorist crisis, and to advise on additional U.S.
assets that might be needed.”(Combating, 2) This response does not only embody
Clancy’s counteraction but surpasses it with the annexation of whatever force
is necessary. “Small, tailored teams can be launched, depending on the crisis,
and specialists from individual urgencies can be sent alone, as the situation
arises”(Wilcox, 2) If the product of physical terrorism is fear and death, how
can information terrorism render a greater threat? “Considering the presence
of computers in modern society, it is not surprising that terrorists have
occasionally targeted computers systems in the past.”(Devost, 2)
“Information terrorism is the nexus between criminal information system fraud
abuse, and the physical violence of terrorism”(Devost, 2) “Information
technology offers new opportunities to terrorists”(Devost, 1) “Information
warfare, loosely defined, is targeting the information and information systems
that comprise and support civilian and military infrastructures of an adversary.
Information warfare runs deeper than attacks on tanks and troops: an information
warfare campaign can target and disrupt the information and networks that
support crucial day-to-day workings of civilian, commercial, and military
systems, e.g., air traffic control, power grids, stock markets, international
financial transactions, logistics controls, etc. ”(Informational, 1)
“Information technology offers new opportunities to terrorists. “A terrorist
organization can reap low-risk, highly visible payoffs by attacking information
systems. In an effort to attract the attention of the public, political
terrorists perpetrate their acts with the media at the forefront of their
strategy: this strategy calculus is based on the assumption that access to the
communication structure is directly related to power.” (Informational, 1) In
short, informational terrorism can affect millions of people, thousands of miles
away, without leaving a trail for restitution. “Terrorism is a rapidly
evolving and responsive phenomenon.” (Devost, 1) “It is war in which there
are no front lines and in which terrorism practitioners have intentionally
blurred the distinction between combatants and noncombatants.”(Responding, 5)
Any type of terrorism is too destructive, whether it’s as small as a
kidnapping or as complex as state-sponsored terrorism between two conflicting
governments. “Terrorist violence represents a serious threat to U.S.
personnel, facilities, and interests around the world”(Responding, 4) “As
technology becomes more cost effective to terrorists – that is, its
availability and potential for disruptive effects rise wile its financial and
other costs go down.”(Devost, 2) “To combat this growing threat, many
members of Congress have recently proposed anti-terrorist
legislation.”(Terrorism, 1) In my opinion the response to terrorism is too
late. When presented with an act of violence the counter-action will involve
violence. After the operation has transpired the anti-terrorism is only
vengeance. The only true way to combat terrorism and terrorist activities is
prevention. “The war against terrorism will be a protracted conflict.”
(Responding, 5) “Terrorism for the foreseeable future will remain a weapon of
choice for government groups, and other parties to conflict.” (Responding, 4)
0
0
Good or bad? How would you rate this essay?
Help other users to find the good and worthy free term papers and trash the bad ones.
Like this term paper? Vote & Promote so that others can find it

Get a Custom Paper on Computers:

Free papers will not meet the guidelines of your specific project. If you need a custom essay on Computers: , we can write you a high quality authentic essay. While free essays can be traced by Turnitin (plagiarism detection program), our custom written papers will pass any plagiarism test, guaranteed. Our writing service will save you time and grade.




Related essays:

0
0
Computers / Internet And WWW
The “Internet” and “World Wide Web” Defined In recent years the Internet and World Wide Web (WWW) have become more and more popular as an information resource. Many people believe that the WWW is the ...
2739 views
0 comments
0
0
The Internet is a wonderful place of entertainment and education but like all places used by millions of people, it has some murky corners people would prefer children not to explore. In the physical ...
3497 views
0 comments
0
0
NOTE: To start off this project we clicked on the Explorer Icon on the desktop. Once we were online, we typed the following URL’s according to the part of the assignment in which we were to complete. ...
2886 views
0 comments
0
0
For the first time in human history, we have the means to connect people from every corner of the globe, to talk to each other and share information at a cost that's far more affordable than any other...
3583 views
0 comments
0
0
Computers / Internet History
In 1973, the U.S. Defense Advanced Research Projects Agency (DARPA) initiated a research program to investigate techniques and technologies for interlinking packet networks of various kinds. The objec...
2814 views
0 comments