Cyberterrorism is the convergence of cyberspace and terrorism. It refers to unlawful attacks and threats of attacks against computers, networks and the information stored therein when done to intimidate or coerce a government or its people in furtherance of political or social objectives. Recently, terrorist groups have been conducting more passive forms of information warfare. It is reported that these terrorist groups are using the Internet to conduct their operations by employing email and file encryption and steganography, as well as conducting web defacement attacks. Information Warfare (IW) has been around since the dawn of war. Information warfare has been and remains a critical element in deciding the outcome of military battles. According to Denning, "Information warfare consists of those actions intended to protect, exploit, corrupt, deny, or destroy information or information resources in order to achieve a significant advantage, objective, or victory over an adversary. This book discusses the nature and impact of cyber terrorism with the methods that have proven to be effective in law enforcement.
This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.
This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.
Continue reading “Computer Security: Are We Prepared For Cyberwar? – Scholar’s Choice Edition”
How to be a Hacktivist: Using hacking to be an Activist
With the times changing and the people losing more of their freedoms than ever to the powerful governments around the world hacktivism is quickly becoming the newest form of political activism. More and more political activists are using the internet as their preferred source to extend their voice. Hacktivists come from all walks of life. They are doctors, parents, and politicians. Hacktivists are quickly becoming the most power political activists that the world has ever seen.
Continue reading “How to be a Hacktivist – Political activism through a cyber environment”
The Twitter accounts of the activists who brought heady days of revolution to Egypt in January and February this year paint an exhilarating picture of an uprising in real-time. Thousands of young people documented on cell phones every stage of their revolution, as it happened. This book brings together a selection of key tweets in a compelling, fast-paced narrative, allowing the story of the uprising to be told directly by the people in Cairo’s Tahrir Square.
Many of the activists were “citizen journalists”, using Twitter to report what was happening. Others used the social network to organize, communicating the next steps necessary for the revolution to move forward. Nearly everyone online gave instant reactions to the extraordinary events occurring before their eyes.
Continue reading “Tweets from Tahrir”