Friday 16 December 2011

How to counter cyber-terrorism?


Published: 1 December, 2011, 07:45
December 2011







































Maksim Volodin In addition to revolutions, terrorist attacks are being organized online.
The UK government has unveiled a program that will prepare the country for a cyber-war. The new strategy includes the creation of new sub-units that will be able to respond to the actions of a hostile state or terrorists with a cyber-attack.
In Russia, the hot topic of cyber-terrorism was addressed at the interdepartmental conference dedicated to “countering crimes against the peace and security of humanity, extremism and terrorism,” hosted by Russia’s Prosecutor General’s Office.
Previously, the need to counter online extremism was expressed by President Dmitry Medvedev. In turn, the interior minister, Rashid Nurgaliyev, also urged the protection of youth from extremism on the internet, without infringing on the freedom of speech. “For extremist and terrorist organizations, the internet serves as a means of communication and coordination during preparations for terrorist attacks and extremist provocations, as well as a training center for conspiracy and terror tactics,” he said. According to Nurgaliyev, currently there are approximately 7,500 (!) extremist websites on Russian territory.
What is an effective way to counter this threat? “This is not the first year,” recalls the deputy prosecutor general, Viktor Grin, “that the Prosecutor General’s Office has tried to draw public attention, including that of the international community, to counteract the propaganda of terrorism and extremism with the use of the internet, which, given the high level of computer availability in all spheres of human activity, poses a greater risk each day.” Russia, like the rest of the world, is concerned about the establishment of the protection of national information resources from cyber-attacks from any part of the world. Such qualities of the global information network as the lack of state borders and the complete anonymity of the user are widely used.
“The threat of cyber-terrorism,” warned Grin, “has long transferred from the realm of theoretical discourse to the stage of concrete realization. Its danger is considered from two aspects. In the first case, we are talking about cyber-terrorists’ use of specially-designed software tools, aimed at the destabilization of operations of various infrastructure elements. For example, the threat of electronic attacks on the operating systems of strategically important sites and harmful and hazardous production facilities in the sphere of energy and transport, have become commonplace. In the second case, the web is used for destructive advocacy, control over social groups and individual consciousness, and disruptive action.”
Moreover, the internet is being used to control, attract, and recruit supporters, organize illegal immigration and arms-trafficking schemes, and fund terrorist activity.
There is another aspect to the problem: the use of the internet for the organization of mass protests and riots. The recent events in the Arab states, Great Britain, and before that on Manezh Square in Moscow, were preceded by active campaigns on Facebook and other popular social networking sites.
How do law enforcement agencies prevent online extremism? “Based on the review of the prosecutors’ recognition of online materials as being extremist,” said Grin, “courts are making the appropriate decisions, which are directed to be executed by the providers, who have the opportunity to limit access to extremist sites on Russian territory. And yet, these measures are clearly insufficient, as the majority of these sites continue their operations and publication of prohibited materials. One of the reasons is the server’s location outside the jurisdiction of the Russian Federation. This also significantly complicates the process of obtaining information about the individuals who publish this information and bringing them to justice.”

No comments:

Why cows may be hiding something but AI can spot it

  By Chris Baraniuk Technology of Business reporter Published 22 hours ago Share IMAGE SOURCE, GETTY IMAGES Image caption, Herd animals like...