StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Cyber Terrorism and other types of terrorism in Australia - Research Paper Example

Cite this document
Summary
“As physical security is locked down, terrorists are likely to look at ways to strike from a distance, with low chance of capture, yet creating panic and fear within the target community” (Ellsmore, p.3). …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.6% of users find it useful
Cyber Terrorism and other types of terrorism in Australia
Read Text Preview

Extract of sample "Cyber Terrorism and other types of terrorism in Australia"

Cyber terrorism and other forms of terrorism in Australia No country seems to be free from the threats of terrorism and Australia isalso not an exception. Even though, different kinds of terrorist activities are going on in Australia, cyber terrorism seems to be the most important one.”As physical security is locked down, terrorists are likely to look at ways to strike from a distance, with low chance of capture, yet creating panic and fear within the target community” (Ellsmore, p.3). The practical difficulty in controlling cyber crimes made it one of the most dangerous terrorist activities of modern era. Since most of the critical areas of human life are making use of computers and internet at present, cyber attack can affect the social life drastically within a second. For example, transporting systems, power supply, military operation and telecommunication systems etc are relying heavily on computers and internet for its routine jobs and functions at present. Any problems occurred in the functionality of computers and internet can affect these areas negatively and cause immense damages to public life. This paper analyses the terrorism threats faced by Australia in general and cyber threats in particular. It is not necessary that cyber attacks may create physical ham alone to Australia. In fact cyber attacks can be used to defame a country like Australia in front of others. The most common form of hacktivism is the defacing of web pages to carry a message to the audience of that web site. The site shown in Figure below – an Australian business defaced to accuse Australia of being a terrorist country, is a recent example of hacktivism – as well as illustrating the tensions of the war on terror being transferred to the electronic realm (Ellsmore, p.5) The above webpage is a clear example of how the cyber attacks happening against Australia. Australia is a strong supporter of war on terror which is going on in Iraq and Afghanistan. Terrorists target all the countries which support war on terror in some way. Since most of the countries like Australia have strengthened the security measures against a physical or direct terrorist attack terrorists now adopting channels of indirect attack. Cyber attacks give them the luxury of attacking their targets from a distance and the chances of arrest or punishment are extremely rare. “Evidence exists to suggest that al-Qaeda have also been using the Internet to collect & collate information about potential critical infrastructure targets” (Ellsmore, p.6). Internet is an ocean of information. It is not necessary to visit a place to collect information about it. All the details about all the places in the world are available on internet at present. It is easy for terrorist groups to collect and analyze this information before planning an attack on a particular target. The electronic information can be used for cyber attacks or even for physical attacks. According to the CERT Co-ordination Centre, the number of reported computer security incidents increased from 9,859 in 1999 to 52,658 in 2001, and we are on track for almost 100,000 in 2023. Similarly, the 2002 Australian Computer Crime and Security Survey found that 67% of respondents suffered a security incident, twice the level of 1994 (Ellsmore, p.8). The above statistics are clear indications of growing threats faced by Australia from cyber terrorism. Cyber attacks can affect the productivity of organizations and employment losses to the employees. In other words, cyber attacks can destroy affect the financial systems more than the lives of the people. The expenses needed to conduct a cyber attack are extremely cheaper compared to the expenses needed for a physical attack. At the same time cyber attacks can cause more damages to the target than a physical attack. Moreover, the publicity generated by cyber attacks may create panic and disgust among the people. The above facts motivate terrorist in selecting cyber medium for their future channel of attack. “A cyber attack that alone might pass unnoticed in the normal clutter of daily life could have useful multiplier effects if undertaken simultaneously with a physical attack” (Stephenson). Apart from cyber attacks, Australia is facing other forms of terrorism also at present. The 1978 Sydney Hilton bombing is one best example to realize the threats of terrorism faced by Australia. In 2008, a group of Muslim terrorists arrested in Melbourne for planning terrorist attack on the 2005 AFL Grand Final, 2006 Australian Grand Prix and the Crown Casino. These terrorists confessed that they had plans to assassinate even the Australian Prime Minister John Howard. Peter Gregory and Thomas Hunter (2009) has mentioned about the arrests of some terrorists including some Australian citizens in connection with planning terrorist attack in Australian soil. On August 4, 2009, Four Australian citizens were arrested in the pre-dawn raids by 400 police targeting an alleged plot by Islamic extremists to engage in suicidal gun battles at military bases. Police charged one of the suspects, a 25-year-old Glenroy man, with conspiring to preparing a terrorist act (Gregory & Hunter). The above incident clearly indicates that Australia is currently facing terrorist challenges not only from external sources, but also internal sources as well. Terrorists succeeded in establishing nexus with the Australian citizens in order to execute their missions in Australian soil. It is somewhat easy for Australia to trace the threats from external sources; however, it is difficult to identify the threats from internal sources. On 15 July, 2004, Australian Minister for Foreign Affairs, Mr Downer published a white paper to “present to the Australian public an authoritative view of the international dimensions of the contemporary terrorist threat to Australia and Australian interests” (Transnational Terrorism: The Threat to Australia). This white paper warns the public against the increasing threats from the terrorists faced by Australia and the necessities of taking precautionary measures. To conclude, Australia is facing terrorist threats from all the corners at present. Not only external sources, but also the internal sources are raising challenges to the security of the people. Apart from physical attacks, cyber attacks also creating problems in Australia. Works Cited 1. Ellsmore, Nick. “Cyber Terrorism in Australia”. 2002. SIFT special report. Web. 25 April 2011. 2. Gregory Peter and Hunter Thomas. “Counter-Terrorism Raids Across Melbourne”. 2009. Web. 25 April 2011. 3. Stephenson, Kylie. “Australia Joins the Unlikely Cyber Terrorism War”. 2008. Web. 25 April 2011. 4. “Transnational Terrorism: The Threat to Australia”. 2004. Web. 25 April 2011. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Cyber Terrorism and other types of terrorism in Australia Research Paper”, n.d.)
Retrieved from https://studentshare.org/information-technology/1418692-cyber-terrorism-and-other-types-of-terrorism-in
(Cyber Terrorism and Other Types of Terrorism in Australia Research Paper)
https://studentshare.org/information-technology/1418692-cyber-terrorism-and-other-types-of-terrorism-in.
“Cyber Terrorism and Other Types of Terrorism in Australia Research Paper”, n.d. https://studentshare.org/information-technology/1418692-cyber-terrorism-and-other-types-of-terrorism-in.
  • Cited: 0 times

CHECK THESE SAMPLES OF Cyber Terrorism and other types of terrorism in Australia

Global Trends in Crime

About 20 years ago, terrorist activities had to be carried out with much bloodshed and physical contact among combatants, and now, the digital world has made it possible to achieve the same ends of terrorism without the necessity of physical contact among combatants (Verton, 2002).... These technologies have transformed theft, fraud, and stalking to the more sophisticated crimes of internet scamming, phishing, cyberstalking, cyber bullying, hacking, identity theft, credit card fraud and other crimes generally labeled under internet or cyber crimes....
11 Pages (2750 words) Research Paper

Cyber Threat in a Finance Organisation

This paper “cyber Threat in a Finance Organisation” will try to shed light on pertinent issues regarding identity fraud in the financial organization through cyberspace.... Identifying the loopholes in the existing regulatory framework for cyber crime will be the essence of the second part of this report.... In the final part, the paper will try to recommend a viable solution which can at least decrease the magnitude of cyber threat in terms of identity fraud for financial organizations....
12 Pages (3000 words) Essay

The United States War on Terrorism

Direct effects range from loss of our beloved ones to incidents of terrorism that we experienced live.... This research further shows the sensitivity of terrorism that requires not only the U.... Ambassador Apakan, the chairperson of the counter- terrorism committee told the committee to remain vigilant and resilient as ever and fighting terrorism and that should remain the top objective of the international community.... The participants of the global war include the United States, the United Kingdom, Canada, France, Kenya, australia, Lebanon, Tanzania and Uganda among others....
10 Pages (2500 words) Essay

Components of Cyber-Terrorism

However, the increasing influence of cyberspace has extended into the area of terrorism.... This essay "Cyber-terrorism" is about the mingling of cyberspace with terrorism.... But the basic, and perhaps the most important, part of any infrastructure today is 'cyberspace', which acts like the nervous system which connects and controls all the other functions of a country.... According to the Computer Emergency Response Team (CERT) Coordination Center, there were about 2,500 vulnerabilities detected in the nation's cyber system in 2001, and this number rose to 6,000 in 2005....
8 Pages (2000 words) Essay

The Value of Roche's Dermatological Dimension Perspective to Understand the Meaning of Mega-Events

Young and Rubican found that before the Games, foreigners often considered australia as country f great source f raw material.... However, after the Olympics, the image f australia has been changed in to a "friendly, fun and trust worthy" tourist destination (Preuss, 2004, 20, 48).... Another disadvantage is the threat f terrorism.... On the other hand, the most serious problem faced by those countries is the massive cost f operating as well as maintaining the venues....
9 Pages (2250 words) Essay

What Are the Global Trends in Crime

About 20 years ago, terrorist activities had to be carried out with much bloodshed and physical contact among combatants, and now, the digital world has made it possible to achieve the same ends of terrorism without the necessity of physical contact among combatants (Verton, 2002).... The paper "What Are the Global Trends in Crime" describes that through the rapid digitization of businesses and other political and social establishments, thieves and other criminals have also gone digital with the manner of their commission of crimes....
15 Pages (3750 words) Research Paper

Reasons for Domestic Terrorism

While discussing the terrorism in the US, no terror attack was as devastating as the World Trade Center attack.... hellip; terrorism in any form is dangerous to the integrity of a nation.... nbsp; After the enactment of the Patriotic Action 2001, the American government started including internal extremism also within the definition of terrorism.... terrorism is treated same way irrespective of its size or nature....
10 Pages (2500 words) Research Paper

Ethics of Metadata Retention

It has been established that although scores of people are against metadata retention, the scheme can be justified by its value in rooting out terrorism in australia.... IntroductionOn 13th October 2015, the new metadata retention law came into effect, and ISPs together with Telecoms were required to retain communications metadata for a period of two years so as to facilitate terrorism and crime investigation.... Besides that, the opponents of this scheme argue that the retained metadata could be utilized for other activities such as marketing rather than promoting security....
10 Pages (2500 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us