At the commencement of the twenty-first century, societies witnessed a rapid increase in the levels at which the world’s reliance on information technology and computer systems grow. Concurrently, while nations continue to rely on the networks and technological advancements with which the global environment maintains the world economy, there is still concern that the same advantages have an equal capacity to cause harm. To that end, there are limitations to the current perceptions on the grounds on which terrorism and the virtual environment relate: the fact that people fail to recognize terror activities amid the many different forms of violence and that they underestimate the relative power of information technology. In other words, the fundamental principles of terrorists’ ideologies and tactics remain the same as they utilize all means possible to access their victims and make sure their attacks affect the largest audience.
Foremost, terror attacks do not need to have multiple casualties to work; on the contrary, terrorism relies on the calculated act of using a particular target to reach the public and governments that make the wider audience. Naturally, while the attacked subjects face possible harm, destruction, or death, they merely serve as the means through which terrorists can influence a more diverse and bigger audience, most times at a global capacity. Subsequently, by inflicting their hostility on the immediate victims, terrorists affect the targeted more major group of people who remain behind to combat resulting emotions and need for retribution.
Cyber terrorism marks the evolution of terror attacks as terrorist organizations manage to capitalize on computer technology in their tactics. Previously, such groups faced physical constraints as their influence relied on existing resources, work force, and the ability to maintain both numbers at a figure that would allow smooth operation. However, the introduction of computer networks has significant implications for the acquisition of men and resources as distance and time become less of a problem in the global environment.
Bibliography
Counterterrorism Threat Assessment and Warning Unit, National Security Division. Terrorism in the United States. Government Report. Washington D.C.: Federal Bureau of Investigation, 1999. Web. <https://www.fbi.gov/stats-services/publications/terror_98.pdf>.
John Arquilla, David Ronfeldt, and Michele Zanini. "Networks, Netwar and Information-Age Terrorism." Strategic Appraisal: The Changing Role of Information in Warfare. Ed. Zalmay M. Khalilzad and John P. White. California: RAND Corporation, 1999. 75-111. Print.
Martin, Gus. Understanding Terrorism: Challenges, Perspectives, and Issues. 4th. Carlifornia: SAGE Publications, 2012. Print.
Rathmella, Andrew. "Cyber‐terrorism: The shape of future conflict?" The RUSI Journal 142.5 (1997): 40-45. Web.
Stohl, Michael. "Demystifying Terrorism: The Myths and Realities of Contemporary." The Politics of Terrorism. Ed. Michael Stohl. New York: Marcel Decker, Inc., 1988. 1-28. Print.
The National Commission on Terrorist Attacks Upon the United States. Complete 9/11 Commission Report. Government Report. Washington, D.C.: Government Printing Office, 2004. Web. <http://govinfo.library.unt.edu/911/report/911Report.pdf>.
Williams, Keiran Hardy and George. "What is 'Cyberterrorism'? Computer and Internet Technology in Legal Definitions of Terrorism." Cyberterrorism: Understanding, Assessment, and Response. Ed. Lee Jarvis, and Stuart Macdonald Tom Chen. New York: Springer, 2014. 1-24. Print.