Cyberterrorism – An Overview

Please Help Us Help Scam Victims Worldwide By Making A Small Donation To SCARS
Your generous contribution of Just $5 will help us continue to educate & support the victims of relationship scams.
You will be helping to support free scam avoidance education for adults & children, free victims’ assistance & support, free victim recovery programs, real advocacy on behalf of victims, online crime prevention programs, and so much more that SCARS delivers.
Click Here To Donate Now On Donate.AgainstScams.org

Cyberterrorism – An Overview

The Internet can easily be used for terrorist purposes!

This includes:

  • propaganda (including recruitment, radicalization and incitement to terrorism)
  • terrorist financing (through online scams and direct fundraising)
  • terrorist training
  • planning of terrorist attacks (including through secret communication and open-source information)
  • execution of terrorist attacks
  • cyberattacks & cybercrime

The term cyberterrorism has been applied by some to describe the use of the Internet for terrorist purposes.

Online Terrorism Connection

Information and communication technology (ICT) can be used to facilitate the commission of terrorist-related offenses (a form of cyber-enabled terrorism) or can be the target of terrorists (a form of cyber-dependent terrorism).

Specifically, ICT can be used to promote, support, facilitate, and/or engage in acts of terrorism.

Particularly, the Internet can be used for terrorist purposes such as the spreading of “propaganda (including recruitment, radicalization and incitement to terrorism); [terrorist] financing; [terrorist] training; planning [of terrorist attacks] (including through secret communication and open-source information); execution [of terrorist attacks]; and cyberattacks” (UNODC, 2012, p. 3).

Just as there is no universal consensus on a definition of cybercrime, there is no universally accepted definition of terrorism nor of cyberterrorism.

Conceptions of cyberterrorism have ranged from “more expansive conceptions; including any form of online terrorist activity; and narrower understandings of this concept.”

The narrow understanding of cyberterrorism has been described as “pure cyberterrorism” by some. This narrow definition considers cyberterrorism as a cyber-dependent crime perpetrated for political objectives to provoke fear, intimidate and/or coerce a target government or population, and cause or threaten to cause harm (e.g., sabotage). Examples of this narrow conception of cyberterrorism include “attacks that lead to death or bodily injury, explosions, plane crashes, water contamination, or severe economic loss. Serious attacks against critical infrastructures could be acts of cyberterrorism, depending on their impact. Attacks that disrupt nonessential services or that are mainly a costly nuisance would not” according to some sources. It is important to note that this limitation of cyberterrorism to cybercrimes committed against critical infrastructure (or pure cyberterrorism) is not widely held.

Some cyberterrorism laws have been criticized for being overly broad and being used by governments to prosecute activists and dissidents. In view of that, more expansive conceptions of cyberterrorism in law lead to disproportionate limitations of human rights.

While certain countries have national cyberterrorism laws (e.g., India, Section 66-F, Information Technology Act of 2000; Pakistan, Section 10, Prevention of Electronic Crimes Act of 2016; and Kenya, Section 33, Computer Misuse and Cybercrimes Act of 2018), cyberterrorism is not explicitly prohibited under international law up to the present.

Even though there is no universally accepted definition of cyberterrorism and international law does not explicitly criminalize cyberterrorism, “most laws contain offense-creating provisions directly targeting malicious acts aimed at destroying or interfering with the functioning of” critical infrastructure. Specifically, acts of terrorism against critical infrastructure sectors, such as the transportation (e.g., aviation and maritime), nuclear, and government sectors, are prohibited under certain provisions of United Nations international conventions and protocols, such as:

Countries that are parties to these conventions and protocols are obliged to harmonize their domestic legal frameworks with the provisions of these instruments, whereas those “that are not parties to some of the conventions and protocols are encouraged to ratify or accede them” pursuant to United Nations Security Council Resolution 1373 (2001). Countries are further required to comply with UNSC Chapter VII binding resolutions in the fight against terrorism. UNSC Resolution 2370 (2017) “urges the Member States to act cooperatively to prevent terrorists from acquiring weapons, including through information and communications technologies, while respecting human rights and fundamental freedoms and in compliance with obligations under international law, and stresses the importance of cooperation with civil society and the private sector in this endeavor, including through establishing public-private partnerships.”

Countries, who are not parties frequently have equivalent, or in some cases stronger laws – such as the United States.

Ultimately, what is considered cyberterrorism depends on the country that is labeling the act. Nonetheless, the mislabeling of acts as cyberterrorism can have detrimental consequences, resulting in disproportionate sentences for those prosecuted for this cybercrime. In this vein, in the United Nation’s view: all counterterrorism laws “must be limited to the countering of offenses within the scope of, and as defined in, the international conventions and protocols relating to terrorism, or the countering of associated conduct called for within resolutions of the Security Council, when combined with the intention and purpose elements identified in Security Council resolution 1566 (2001)” ( E/CN.4/2006/98, para. 39). Conversely, “[c]rimes not having the quality of terrorism, regardless of how serious, should not be the subject of counter-terrorism legislation” ( E/CN.4/2006/98, para. 47).

Reality

Terrorism, wherever it is located, relies on the Internet for communications and functions.

Much of cybercrime serves to fund terrorism in all its forms. Prior to 9/11, Al Qaeda generated billions of dollars by its connection to African, Middle Eastern, and Asian online scams & fraud.

When both experiencing cybercrime or combatting it, it is important to remember that still today that much of it is funding groups like Boko Haram, Abu Nidal, and other Al Qaeda or Islamic State affiliates.

This is particularly important for vigilante victims to insist on rushing into territories and situations where they have no business going. While not all scammers are violent, they are all capable of violence when pushed. Some estimates are that dozens (possibly hundreds) of scam victims are killed or disappear each year while trying to track down and get revenge against cybercriminals.

Even if cyber criminals were not connected to terrorism, they remain dangerous in their home territories.

Fortunately, this terrorism connection is considered a major priority for global anti-terrorism and national law enforcement agencies around the world.

TAGS: SCARS, Cyberterrorism, Cyberterrorists, Terrorists, Terrorist funding, scams & terrorism, Information About Scams, Anti-Scam, Scams, Scammers, Fraudsters, Cybercrime, Crybercriminals, Romance Scams, Scam Victims, Online Fraud, Online Crime Is Real Crime, Scam Avoidance

SCARS the Society of Citizens Against Relationship Scams Incorporated

SCARS™ Team
Society of Citizens Against Relationship Scams Inc.
A Worldwide Crime Victims Assistance Nonprofit Organization
Visit: www.AgainstScams.org
Contact Us: Contact@AgainstScams.org

PLEASE SHARE OUR ARTICLES WITH YOUR FRIENDS & FAMILY

HELP OTHERS STAY SAFE ONLINE – YOUR KNOWLEDGE CAN MAKE THE DIFFERENCE!

REPORT-BLOCK-RECOVER

REPORT-BLOCK-RECOVER

 

 

 

 

FIND MORE SCAM NEWS
SCAMCRIME.COM

FIND SCAMMER PHOTOS ON
SCARSONLINE.ORG

JOIN US ON FACEBOOK
CLICK HERE

MORE INFORMATION

Tell us about your experiences with Romance Scammers in our
Scams Discussion Forum on Facebook

FAQ: How Do You Properly Report Scammers?

It is essential that law enforcement knows about scams & scammers, even though there is nothing (in most cases) that they can do.

Always report scams involving money lost or where you received money to:

  1. Local Police – ask them to take an “informational” police report – say you need it for your insurance – get a police report number
  2. U.S. State Police (if you live in the U.S.) – they will take the matter more seriously and provide you with more help than local police
  3. Your National Police or FBI www.IC3.gov & FTC www.FTC.gov/complaint
  4. The SCARS|CDN™ Cybercriminal Data Network – Worldwide Reporting Network on www.Anyscam.com

This helps your government understand the problem, and allows law enforcement to add scammers on watch lists worldwide. Your reports are essential even if the police cannot take action!


To learn more about SCARS visit « www.AgainstScams.org »

Please be sure to report all scammers
on www.Anyscam.com

Disclaimer:

SCARS IS A DIGITAL PUBLISHER AND DOES NOT OFFER HEALTH OR MEDICAL ADVICE, LEGAL ADVICE, FINANCIAL ADVICE, OR SERVICES THAT SCARS IS NOT LICENSED OR REGISTERED TO PERFORM.

IF YOU’RE FACING A MEDICAL EMERGENCY, CALL YOUR LOCAL EMERGENCY SERVICES IMMEDIATELY, OR VISIT THE NEAREST EMERGENCY ROOM OR URGENT CARE CENTER. YOU SHOULD CONSULT YOUR HEALTHCARE PROVIDER BEFORE FOLLOWING ANY MEDICALLY RELATED INFORMATION PRESENTED ON OUR PAGES.

ALWAYS CONSULT A LICENSED ATTORNEY FOR ANY ADVICE REGARDING LEGAL MATTERS.

A LICENSED FINANCIAL OR TAX PROFESSIONAL SHOULD BE CONSULTED BEFORE ACTING ON ANY INFORMATION RELATING TO YOUR PERSONAL FINANCES OR TAX RELATED ISSUES AND INFORMATION.

This content and other material contained on the website, apps, newsletter, and products (“Content”), is general in nature and for informational purposes only and does not constitute medical, legal, or financial advice; the Content is not intended to be a substitute for licensed or regulated professional advice. Always consult your doctor or other qualified healthcare provider, lawyer, financial, or tax professional with any questions you may have regarding the educational information contained herein. SCARS makes no guarantees about the efficacy of information described on or in SCARS’ Content. The information contained is subject to change and is not intended to cover all possible situations or effects. SCARS does not recommend or endorse any specific professional or care provider, product, service, or other information that may be mentioned in SCARS’ websites, apps, and Content unless explicitly identified as such.

The disclaimers herein are provided on this page for ease of reference. These disclaimers supplement and are a part of SCARS’ website’s Terms of Use

Legal Notices: 

All original content is Copyright © 1991 – 2021 Society of Citizens Against Relationship Scams Inc. (D.B.A SCARS) All Rights Reserved Worldwide & Webwide. Third-party copyrights acknowledge.

SCARS, SCARS|INTERNATIONAL, SCARS, SCARS|SUPPORT, SCARS, RSN, Romance Scams Now, SCARS|INTERNATION, SCARS|WORLDWIDE, SCARS|GLOBAL, SCARS, Society of Citizens Against Relationship Scams, Society of Citizens Against Romance Scams, SCARS|ANYSCAM, Project Anyscam, Anyscam, SCARS|GOFCH, GOFCH, SCARS|CHINA, SCARS|CDN, SCARS|UK, SCARS|LATINOAMERICA, SCARS|MEMBER, SCARS|VOLUNTEER, SCARS Cybercriminal Data Network, Cobalt Alert, Scam Victims Support Group, SCARS ANGELS, SCARS RANGERS, SCARS MARSHALLS, SCARS PARTNERS, are all trademarks of Society of Citizens Against Relationship Scams Inc., All Rights Reserved Worldwide

Contact the law firm for the Society of Citizens Against Relationship Scams Incorporated by email at legal@AgainstScams.org

Share This Information - Choose Your Social Media!

Please Leave A Comment - Tell Us What You Think About This!