Introduction
Over the decades, technological advancements have evolved dramatically, especially in the 21st century that has marked a significant acceleration not only in the online world but also in the dangers that arise from it. Additionally, in the recent past, there has been a greater access to the internet all over the world, bigger capabilities of different programs as well as a larger range of services. Included, is the spread and use of online religious radicalism. For instance, a great number of Xinjiang extremists illegally crosses China’s borders to nations such as Iraq and Syria and join extreme Islamic movements. The extremists obtain special armed training and some return to China to plan and carry out terrorist activities. Many reports and intelligence information collected imply that in a number of years from now, groups of terrorists might acquire as much as necessary skills to make use of cyberspace for the purposes of attacks (Aitoro, 2009). Counterterrorism effort between China and United States have greatly helped authorities to track down and even delete numerous terrorist videos and audio files from the US servers. Reports show that the terrorism-related video has risen in number from thirteen in 2011 to one hundred and nine in 2013 in US. China ministry of security has held talks with US Ministry of Justice and the FBI on the issue of online terrorism and how to put an end to the brutal content.
Ethnocentrism is one of the theories of international relations, and might be relevant in the area of cyber in an attempt to understand the ideology, motivations and actions that brings about cyber terrorism attacks and people’s reaction to them. There are tensions between the Western and the fundamental thoughts of the Islamic religion. The theory is focused in the ideas of each person’s understanding of religion, culture, politics and society. It is based on its civilization and compares the principles of the other in the light of its individual standards of culture. In addition, this theory can be set in parallel with the American Exceptionalism theory that was developed far back at the time of Alexis de Tocqueville in the 19th century and ongoing even into the Bush administration.
There is primary importance in the meaning of security and also that it differs from time, context and place and one country to another. Making of policies in China is wholly different from that of the United States. Network security for the United States includes human rights protection and the right to freedom of speech and expression for all citizens. On the other hand, in China, national security governs the security of the internet, and this dominates any potential human insinuations that are not considered by the government as important. Nevertheless, in the present day, things have changed due to cyber terrorism. China and US have come together and enhanced judicial cooperation with a goal of fighting terrorism, and in particular, cracking down on vicious and terrorist video and audio files that are currently on the increase and being released online in the United states (Zhang, 2014). On top of that, the situation has gone from bad to worse in US this year as a result of the release of even more materials on terrorism by the East Turkish Islamic Movement and many other groups.
Fundamentalism of the Islamic is a great source of terrorism for the West, and Islamic researchers have issued numerous analyzes, more so in relation to using force. Moreover, recent media sources indicate that some Islamic scholars approve e-jihad as well as the use of cyberspace for warfare (Geller, 2012). A good example is that of a Saudi Arabia lecturer in Islamic jurisprudence, Fahd Bin Sa’d Al-Jahni, states that the Koran, as well as the Sunna on jihad, are very applicable to cyber domain warfare. Jihad is a wide concept and may even imply personal jihad, verbal jihad and jihad by money (Geller, 2012). However, many scholars agree that the e-jihad might be harmful whenever used at the wrong circumstances or wrong time. Moreover, they do not firmly prohibit or make clear the fact that cyber terrorism is a harmful act. Jihad is limitless to military weapons, and if the aim behind the attacks is being satisfied, any means are permitted are allowed (Geller, 2012). Furthermore, due to spread of online religious extremism, many members are recruited into the terrorist groups. The Xinjiang terrorists, for example, use the internet to not only recruit, but to collect funds and build connections as well. Reports have it that Xinjiang terrorist suspects together with other religious extremists are said to have watched sadistic videos, listened to audio materials about terrorism on the Internet prior to conducting atrocious terror attacks. The attacks comprise knife-wielding assailants that killed twenty-nine people in Kunming, in Yunnan Province on 1st March 2014. Later on, a bomb blast attack that led to the loss of forty-three lives in Urumqi, the capital city of Xinjiang Uygur independent region on 22nd May.
United States, being a state on the forefront in technology development is in a position to locate the terrorist websites efficiently and get rid of them. However, since the attackers know this, they continually change websites and use identities that are fake, and this makes it impossible for the police to capture and punish them for their brutal doings. Neorealist maintain that, because threats may occur from state, or even non-state actors, it is vital for international institutions to provide a medium for worldwide cooperation, even though they alone cannot fully guarantee security (Alexander, 40). Such cooperation is the one witnessed between Unites States and China. The terrorist groups may not at the very moment have the full-scale control of the cyber domain, but it is important to note that the some radical Islamic preachers encourage the use of the internet.
Conclusion
Cyber terrorism is a great menace not only to the US but also to any other country that attackers target. Initiatives that are legal, through state channels and worldwide organizations should be initiated or pursued in an effort to achieve the development of a global cyber treaty tackling terrorism. Recently, China enhanced law enforcement collaboration with the United States and some countries in Middle Eastern and Southeast Asian. Furthermore, China will carry out joint operations to combat terrorism. The cooperation of these nations has made policies that ensure they respond by taking action to today’s challenges and at the same time ensure that the future possible activities are looked into on the cyber domain. Additionally, US AND China continue to research and analyze each and every multi-disciplinary aspect concerning the cyber domain. The nations have realized that it is vital to have international cooperation, and it has to be made a long term objective, with negotiation of benchmarks that are mutually acceptable. Short and long term strategies are being set, implemented and closely monitored. This way, cyber terrorism cases will be reduced and maybe eliminated in the future altogether as a result of the cooperation of the countries.
Work cited
Aitoro, Jill R. Terrorists nearing ability to launch big cyber attacks against US. (2009).Web. 20 July 2012 http://www.nextgov.com/technology-news/2009/10/terrorists-nearing-ability-to-launch-big-cyberattacks-against-us/44951/ .
Alexander, Gerard (2007) ‘International Relations Theory Meets World Politics: the Neoconservative vs. Realism debate’ in Understanding the Bush Doctrine: Psychology and Strategy in an Age of Terrorism, edited by Peter Suedfeld and Stanley Renshon, p. 39-59. New York: Routledge, 2007.Print
Geller, Pamela Islamic scholars approve e-jihad and cyber warfare. (2012).Web. 20 July 2012 http://atlasshrugs2000.typepad.com/atlas_shrugs/2012/01/islamic-scholars-approve-e-jihad-and-cyber-warfare.html .
Zhang, Liu China, US targeting terror online.(2014).Web. 28 November 2014 http://usa.chinadaily.com.cn/world/2014-11/28/content_18990067.htm.