.U.S. Intelligence and defense computers
The threats have exaggerated cyberterrorism .U.S. Intelligence and defense computers are air-gapped, thus cut off from using the internet. The systems operated by private organizations are at high risk to be attacked by hackers. Currently, cyberterrorism is becoming advanced due to the improvement of technology. Hackers who know how the systems operate are used to carry out the attacks. The internet is used by terrorists to conduct plans or raising finances, secure their information and distribute their objectives. Hackers can cause system manipulation by deleting important data, stealing information, damaging web sites and inserting viruses in the operating systems. The most weapons used by terrorist to create attacks are computers.
In 2012, united states HOR announced various amendments to CISA, including the addition of anti-tasking stipulations to prohibit the administration from sharing cyber threats with the private organizations.
Sarah Gordon and Richard Ford, cyberterrorism is not only identified when the attack is instigated on the computers, but when other abilities and factors are leveraged by the hackers to accomplish their mission. Additionally, the meaning of cyberterrorism is different on media and how the public defines it. Gordon and Ford draw the learner to the differences between pure cyberterrorism and traditional cyberterrorism. Pure cyberterrorism is limited to network and computer attacks while traditional cyberterrorism features computers as the main tool or target of the attack as their analyses show. Don't use plagiarised sources.Get your custom essay just from $11/page
The convergence of the virtual and physical world has led to the formation of cyberterrorism. It is associated with the use of threat or disruptive activities in cyberspace to create terror to people. Media coverage is the main affiliation used by terrorist to converge with other terrorist organizations. Terrorists are using media to communicate and plan their next targets.
It is evident that ISIS is using social media like a telegram, facebook, online magazines and twitter to conduct the attacks. However, they use these platforms to recruit young people joining the organization. Use social media by militant groups and ISIS corresponds with the improved internet access, literacy and penetration. They do not need to coordinate attacks by meeting, but with the use of improved technology, they can communicate easily.ISIS uses social media as it is the cheapest mode of communication and reaches many people at the same time. They are using ICT to get support and territory among politically aggrieved regions. Also, they are using ICT to remove negative views of their organization from the public and attract new followers by mostly projecting on their successes.ISIS are limiting civilian access to internet, monitoring and closing the internet cafes to avoid the substantial spread of their missions. Since youtube has many followers, ISIS uses it to ost images and videos to entice new followers.
Additionally, ISIS poses an active cyber attack by recruiting skilled hackers with computing aptitude of hacking and damaging the systems. Through social media, they have identified specialized hackers who perform terrorist activities.ISIS and other hacking groups have a ledged commitment to the organization and implement their cyber policies. The hacking groups claim to choose their hacking targets, but in reality, they stick on to ISIS grant policies.The groups which compose the organization of the ISIS terrorism include Cyber Caliphate Army, Islamic State Hacking Division, Kalashnikov E-Security, ICA and Cyber Rox Team. Each of the groups has their contribution and function to ISIS cyber policies.Some of the ISIS groups mostly focus actively on introducing cyber attacks to the public They result to defacing or hijacking the social media accounts, websites, images and videos used for spreading the bad view of their organization. As a result, many businesses and activities performed by individuals are disrupted. Other hijacking activities used by ISIS is by providing education to its members. They equip both the current and performing members with computing knowledge and skills which are required when hacking the systems. Furthermore, groups siding with ISIS use cyberspace for recruitment, creating and spreading terror and insecurity. The attacks have led to the embarrassment of individuals and government organizations.