Issued by CEMO Center - Paris
ad a b
ad ad ad

Cyber-terrorism… Facebook as example

Sunday 25/November/2018 - 02:38 PM
The Reference
Mahmoud Roshdi
طباعة

When Mark Zuckerberg, CEO of Facebook, decided to create a social networking site, he did not know that his website would spread to become the first site of communication between people in the world and of social mobility and technological development.

 The task of social sites has been intertwined to include concepts and tasks other than networking that have transcended the concept of interpersonal communication. These include the concepts of e-commerce, distance education, and the human dimension in helping victims of natural disasters and poor countries.

The radical movements have taken advantage of the information technology revolution as a means to recruit new members and spread their extremist dogmas and even direct members to carry out terrorist attacks.

Cyber-terrorism is defined as the use on Internet to hack a country's network or its own protection systems to spread viruses that stall operations for a certain period of time or destroy its database, causing losses worth billions of dollars.

The Washington Center for Strategic Studies said terrorist attacks caused losses worth $700 bn in 2017.

ISIS' cyber-terrorism 

ISIS highly relies on the cyberspace to widen the base of sympathizers and promote its power and terrorist operations worldwide, especially in Europe. Many of ISIS members are IT wizards.

ISIS is trying to preserve its so-called caliphate via the social media to keep its followers. The terrorist organization claims responsibility from time to time to prove its presence on the scene. It has claimed responsibility for an attack on a military parade in Ahvaz on September 22.

Although ISIS extensively uses the Internet more than any other terrorist organizations, it has not used it in carrying out any attacks. Its use has been only confined to recruitment and announcement of operations and videos of the attacks.

ISIS has used Al-Furqan and Ajnad and other media platforms to broadcast its terrorist attacks. It has also used the Dark web to recruit new members and bitcoin for its financial resources.

Russia Today has said ISIS uses Deep web and Onion Tor, which are associated with illegal practices, to ensure secrecy.

Why cyber-terrorism?

-         Low cost: Cyber-terrorism is of low cost. There's no need to buy machine guns and bombs.

-         Hard to be traced: Cyber-terrorism is unknown like other traditional instruments of terrorism. There are many anonymous pages and no boundaries or checkpoints.

-         Multiplicity of targets: Terrorists may target computers, government databases.

-         Remote attacks: Implementation can be done remotely. Cyber-terrorism doesn't physical efforts.

Increase of media coverage: Terrorists want their operations to widely spread. Cyber-terrorism is widespread and influences as many people as possible.

"