The current world relies on technology to advance its operations in all domains of life including trade, education, and security. Currently, the Internet traverses almost the whole world since it is present in more than 200 countries with about one billion users (Goodman, 2007). The Internet is built on both national and international infrastructures including landlines and satellite communications. Since the cyberspace plays a critical role in the life of many people and functioning of governments, terrorists have targeted this aspect to advance their malicious agendas. Terrorists intend to use the cyberspace to support their infrastructure and activities, attack other parts of the cyber infrastructures, and use it as a means of attacking other targets among others (Goodman, 2007). According to Nozzolio (2015), these violations are costly because data breach costs organizations in average $3.5 million, and out of all the cyber-attacks, 42% are caused by criminal or malicious attacks. Such a thing creates the need to prevent and control cyber terrorism despite the ever changing technology. This essay discusses how to control cyber terrorism even with the rapidly altering technology.
Controlling Cyber Terrorism
Cyber terrorism is not a phenomenon that one country can fight against on its own because terrorism is an international threat that traverses the boundaries of many countries, hence the need to fight this threat in cooperation is urgent. Witkowsky (2010) reiterates that addressing the menace of terrorism demands strong multilateral cooperation, capacity building as well as efforts to curb violent extremism across the world by all levels of the government and the society as a whole. For instance, terrorists may target all the countries that do not sympathize with extremists or lack support for terrorist actions. As a result, these countries should form alliances so that they can counter the effects through various measures that include strict control of cyber terrorism. Currently, the United States is reinvigorating alliances and strengthening the already existing partnerships that will create a formidable force behind counterterrorism in the cyberspace (Witkowsky, 2010). The use of diplomatic engagements, the political will, and the move to strengthen the resolve leaders across the world to confront cyber terrorism will be an easy task. Strengthening those countries that lack resources and other important things for fighting this international threat will be more challenging.
Furthermore, involving the local communities in each of the countries to fight cyber terrorism is a critical issue towards the control of this menace. People in the community may find an opportunity to understand what the terrorists are planning about the cyberspace or how they intent to breach cyber security for their malice purposes. According to Witkowsky (2010), the involvement of the community in the fight against cyber terrorism helps bring the perpetrators to the attention of the law enforcement officials who may have a limited penetration to the local communities that act as a source of terrorists. In some cases, the role of the community has manifested since the United States has used it to prevent terrorist attacks (Witkowsky, 2010). Therefore, giving communities the possibility to participate in actions that can help curb this menace is a step forward towards counterterrorism.
Creating legislations, strengthening the already existing ones, and training the officials engaged in the tasks to enhance the control of cyber terrorism are the way to which stakeholders will be empowered to fight this menace. At this moment, the United States is trying its best by promoting the rule of law, good governance, and effective enforcement of the civilian law so as to increase the strictness of protecting the cyberspace (Witkowsky, 2010). The Attorney General from the renowned State of New York intends to strengthen New York’s Data Security Act through a legislative process that has been behind the times because of the changes in technology since it became law (Nozzolio, 2015). This law will increase the level of protecting private information. Such things are the only way through which cyber terrorism can be controlled since the technology is changing together with the tactics of breaching cyber security, hence the need to update the laws is crucial. Moreover, it is important to aim at making counterterrorism training for prosecutors, the police, members of the judiciary, and border officials (Witkowsky, 2010). Such a practice will improve the effectiveness of combating cyber terrorism among these officials.
Finally, any country should create agencies and departments to help fulfill counterterrorism functions so as to execute all the measures that aim at fighting cyber crimes. The United States has entrusted this functions in many agencies including the Federal Bureau of Investigation (FBI), the Department of Homeland Security (DHS), and the Homeland Security among many others. The FBI has created a Cyber Division whose responsibility if to handle all types of cyber crimes and matters of national cyber security (Chabinsky, 2009). This body has specialized officers who have been trained in matters of cyber security, and with all the necessary resources, they help the Americans avoid the dangerous effects of terrorism. Chabinsky (2009) explains that the FBI has more than 2,000 special agents who have received specialized cyber training at Quantico. These agencies work together to ensure the menace of cyber terrorism is no longer a threat to the country.
There are many ways to control cyber terrorism even with the rapidly changing technology. First, countries can handle this menace by forming formidable collaborations and partnership since terrorism is a global threat to security. The involvement of the community and the local populations in the fight against cyber terrorism is another way. Moreover, creating legislations and strengthening the existing laws that guide the control of this international security threat can be a good means through which counterterrorism of the cyberspace can occur. Most importantly, forming and empowering the agencies that implement the measures to fight this global challenge is important.