PL EN
Wydawnictwo
AWSGE
Akademia Nauk Stosowanych
WSGE
im. Alcide De Gasperi
BOOK CHAPTER (85-112)
Modern tools in the fight against islamic extremism
 
More details
Hide details
 
 
KEYWORDS
ABSTRACT
Combating terrorism information has become not only an important matter of policy, but also, and perhaps above all, the problem of economic nature. Cyberterrorist can also adjust their activities in order to maximize the positive outcome for themselves. In addition, cyberterrorism does not require physical training or high security logistics. There also requires travel. Cyberterrorism is not a separate or specific type of terrorism because of ideology. It serves exactly the same purpose as bombings, kidnapping or hostage taking. There are only a form − using computer hardware and software. Cyberattacks do not pose a risk of death or physical injury, reduce the need for so risking life − attacks on the network do not require for suicide attacks. To carry out such an attack, you do not need to have virtually no skill − you can rent a cracker who broke security (often without realizing the consequences of his actions) money will carry out a terrorist attack. Past examples of cyber crimes show how a large number of people may be affected by the consequences of such action; this is due to the global nature of computerization. Thus one of the essential objectives of terrorists − mediality attack − is huge. A separate issue is the use of the Internet and computers by terrorists for purposes other than direct attacks. Computer systems are a great collection and exchange of information and communication. They provide anonymity, allow coding or hiding information. Transfers can be hidden do not raise suspicions text files or graphics.
 
REFERENCES (31)
1.
Adamski J. (2007). Nowe technologie w służbie terrorystów. Warszawa.
 
2.
Adamski A. (2002). Cyberterroryzm, [w:] Materiały z konferencji na temat terroryzmu, 11.04.2002 r. Wydział Prawa UMK Toruń.
 
3.
Adkins B. (2001). The spectrum of cyber conflikt from hacking to information warfare: What is law enforcament’s role? Maxwell AFB, Alabama.
 
4.
Aronson E., Pratkanis A. (2004). Wiek propagandy. Warszawa.
 
5.
Barnas R. (2001). Terroryzm. Od Asasynów do Osamy bin Laden. Wrocław.
 
6.
Białek T. (2005). Terroryzm − manipulacja strachem. Warszawa.
 
7.
Borkowski R. (2006). Terroryzm ponowoczesny. Toruń.
 
8.
Bógdał-Brzezińska A., Gawrycki M. (2003). Cyberterroryzm i problemy bezpieczeństwa informacyjnego we współczesnym świecie. ASPRA-JR. Warszawa.
 
9.
Denning D. (2002). Wojna informacyjna i bezpieczeństwo informacji. Wydawnictwa Naukowo-Techniczne. Warszawa.
 
10.
Denning D.E. (2001). Activism, hacktivism and cyberterrorism: The Internet as a tool for influencing foreign policy, [w:] J. Arquilla, D. Ronfeldt, Networks and Netwars, Santa Monica.
 
11.
Doroziński D. (2001). Hakerzy. Technoanarchiści cyberprzestrzeni. Helion.
 
12.
El Ghamari M. (2016). Cool Jihad. Wydawnictwo Difin.
 
13.
Gawrycki M.F. (2003). Cyberterroryzm. Fundacja Studiów Międzynarodowych. Warszawa.
 
14.
Kerr K. (2003). Putting cyberterrorism into contex. AusCERT.
 
15.
Kosta R. (2007). Terroryzm jako zagrożenie dla bezpieczeństwa cywilizacji zachodniej w XXI wieku. Toruń.
 
16.
Lawson S.M. (2002). Information Warfare: An Analysis of the Threat of Cyberterrorism Towards the US Critical Infrastructure. SANS Institute.
 
17.
Monge P., Janet F., Communication technology for global network organizations, [w:] Shaping Organizational Form: Communication, Connection and Community, red. G. Desanctis, J. Fulk, Thousand Oaks, Calif., 1999.
 
18.
Pollitt M., Cyberterrorism: Fact or Fancy? Proceedings of 20-th National Information Systems Security Conference, październik 1997.
 
19.
Münkler H., Terrorismusheute. Die Asymmetrisierung des Krieges, „Internationale Politik”, nr 2, 2004.
 
20.
Organised Crime Situation Report 2004, Focus on the Threat of Cybercrime, Council of Europe, Strasburg, 23.12.2003.
 
21.
Reeve S. (1999). The New Jackals: Ramzi Yousef, Osama Ben Laden and the Future of Terrorism. Mass, Boston.
 
22.
Serwiak S. (2005). Cyberprzestrzeń jako źródło zagrożenia terroryzmem, [w:] E. Pływaczewski, Przestępczość zorganizowana. Kraków.
 
23.
Staten C. (24.02.1998). Subcommitte of Technology. Terrorism and Government Information, U.S. Senate Judiciary Committee.
 
24.
Stern J. (listopad/grudzień 2000). Pakistan’s Jihad Culture.„Foreign Affairs”.
 
25.
Verton D. (2004). Black Ice. Niewidzialna groźba cyberterroryzmu. Helion..
 
26.
Whine M., Islamist organizations on the Internet, „Terrorism and Political Violence”, t. 11, nr 1, 1999.
 
27.
Zanini M., Edwards S.J.A. (2001). The networking of terror in the information age, [w]: J. Arquilla, D. Ronfeldt, Networks and Netwars. Santa Monica.
 
28.
Garrison J., Grand M., Cyberterrorism: An evolving concept, NIPC Highlights, http://www.nipc.gov/publicatio... highlight-01-06.html [data dostępu: 15.06.2012].
 
30.
http://technologie.gazeta.pl/ internet/1,104530,9036923,Mobilny_Internet_na_swiecie___Polacy_na_ni echlubnym.html [data dostępu: 15.06.2012].
 
Journals System - logo
Scroll to top