Cyber-Terrorism and the Information Sword Special Session Organized by Dr. Mahmoud Eid University of Ottawa Information–MFCSIT'06 The International Conference on Information The Irish Conference on the Mathematical Foundations of Computer Science and Information Technology August 1st to 5th, 2006 National University of Ireland, Cork, Ireland International Information Institute (III), Tokyo, Japan Conference website: http://www.ucc.ie/info-mfcsit/index.html Information–MFCSIT'06 National University of Ireland, Cork, Ireland, August 1 - 5, 2006 Theme: Although there are many different concepts of “terrorism” and no one agreedupon definition of the term to date, most would acknowledge the existence of “cyberterrorism,” i.e., the use of information and communications technologies to facilitate any or all forms of terrorism. Individuals or groups can now use cyberspace, computers, and information technology, especially the Internet, to threaten, terrorize and cause harm to both governments and civilians. Terrorists are pioneers in using the latest technologies. In our growing era of cyber-terrorism, a cyber-terrorist can not only conduct the types of attacks that we have grown accustomed to, such as remote bombing, but are increasingly able to deliver horrific destruction at a remove. For example, it is possible, through the use of the Internet, to hack into the processing control systems of a cereal manufacturer, change the levels of iron supplement, and consequently kill the children of a nation enjoying their breakfast. Info-terrorists no longer need to enter an office or a home to steal or distort the information. Without leaving a single trace behind, info-terrorists can steal and tamper with information, create new and corrupt existing electronic files, block access to information by authorized users, and so on. Information technology is a double-edged sword in time of terrorism. It can be used to create strategies for peaceful resolutions or it can be attacked in ways that exacerbate insecurity. Information can be accurate or distorted, true or false, complete or partial, clear or vague, simple or complicated, stored or distributed, etc. In addition, any information can be re-produced and re-created and consequently constitutes new set(s) of information—hence the relationship to Norbert Wiener’s 1947 cybernetics. There are several impediments to the comprehensive and effective flow of information during a terrorist attack, such as lack of time, lack of adequate infrastructure and information processing technologies, reduced communication between the opposing parties, and the bureaucratic politics of information processing within the governmental apparatus. Information that comes out of terrorist attacks has a different nature from that of normal situations; it has similar characteristics to those of the terrorist situation itself. Therefore, it must be searched out, produced, and dealt with differently by decision-makers (i.e., political, media, etc.); it should be accurate, clear, rational, fast, de-escalating, constructive, and responsible. This session aims at sharing both ideas and the latest experiences regarding the search, creation, processing, reproduction and attack of information in the era of cyber-terrorism. Presentations and Speakers: Chair: Dr. Mahmoud Eid Cyber-Terrorism in the Information Age: Actors, Communications, Tactics, Targets, and Influences. Mahmoud Eid, University of Ottawa, Canada. Islamists and The Internet. Maura Conway, Dublin City University, Ireland. Cyber-Terrorism and the Information Sword 1 Information–MFCSIT'06 National University of Ireland, Cork, Ireland, August 1 - 5, 2006 Anti- and Counter-Terrorism: Snagging the Practice of a Human Right to Communicate. Aliaa Dakroury, Carleton University, Canada. E-initiatives and the Information Management of Ethnopolitical Conflicts. Georgios Terzis, Vesalius College, Vrije Universiteit Brussel, Belgium. and Bert Smeets, Belgian Army, Belgium. Critical Interpretation of Broadband Services: Increasing Cyberterrorism in the Information Age. Dal Yong Jin, Simon Fraser University, Canada. Cyber-Terrorism, Information Warfare, and the Olympics: An Application of Information Filter Theory (Chomsky & Herman) to Security against Terrorism in the Modern Olympics. Michael Real and Diana Beeson, Royal Roads University, Canada. Kavkaz Center vs. Kremlin: Cyber War and Propaganda during the Second Russia-Chechnya Conflict. Elina Yalov, University of Leeds, United Kingdom. Speakers Biographies: Diana Beeson graduated from the distinguished journalism school at the University of Missouri, worked in newspaper and television news for six years, public relations for five years, and broadcast management for eighteen years. She completed her M.S. and Ph.D. in journalism and mass communication at the University of Iowa. She currently teaches communication at Royal Roads University in Victoria, British Columbia, Canada. Maura Conway is a Lecturer in the School of Law & Government at Dublin City University where she teaches on the MA programmes in International Relations and International Security & Conflict Studies. Previously, she was a Teaching Fellow in the School of International Relations at the University of St. Andrews, Scotland and was awarded her PhD from the Department of Political Science at Trinity College Dublin, Ireland. Her research interests are in the area of terrorism and the Internet. She is particularly interested in cyberterrorism and its portrayal in the media, and the functioning and effectiveness of terrorist Web sites. Along with a number of book chapters, Maura has also published in First Monday, Current History, the Journal of Information Warfare, and elsewhere. Aliaa Dakroury is a Lecturer at the Communication Program, School of Journalism and Communication, Carleton University, Ottawa, Canada. Her work involves the examination of communication and human rights. She is a member of Cyber-Terrorism and the Information Sword 2 Information–MFCSIT'06 National University of Ireland, Cork, Ireland, August 1 - 5, 2006 many human rights organizations, such as the right to communicate group, IFEX, WACC, among others. Her areas of interest include human rights, communication history, diaspora, and Islam. She is the recipient of the Van Horne Award from the Canadian Communication Association, in its annual conference in June 2005, London-Ontario. She received a B.A. (1993) in Public Relations and Advertising from Cairo University’s Faculty of Mass Communication in Egypt and a M.A. (2003) in Communication from Carleton University’s School of Journalism and Communication in Canada, where she is currently completing her Ph.D. degree. Her recent publications appear in different refereed journals such as: Journal of Intergroup Relations, Culture, Language, and Representation Journal, Reconstruction: Studies in Contemporary Culture Journal, American Journal of Muslim Social Scientist, Global Media Journal, Journal of International Communication, and elsewhere. Mahmoud Eid is an Assistant Professor at the Department of Communication, University of Ottawa, Canada. He previously taught in the University of Regina’s School of Journalism in Saskatchewan, and in Carleton University’s School of Journalism and Communication in Ontario. His professional expertise lies in quantitative and qualitative research regarding the effects of mass media and social development. His teaching experience, research interests, and publications concentrate on international communication, media studies, communication research methods, terrorism, crisis management and conflict resolution, modernity, and the political economy of communication. He received his Ph.D. (2004) from Carleton University’s School of Journalism and Communication in Canada. Dr. Eid is the editor of the e-Book Cybercultures and serves as an editorial board member for several academic journals and as an organizing committee member for various international conferences. He has presented numerous papers in global conferences and has published several book chapters as well as journal articles in Communications: The European Journal of Communication Research, International Journal of the Humanities, First Monday, INFORMATION, and elsewhere. Dal Yong Jin is Assistant Professor at Simon Fraser University, Canada. He received his MA degree from the LBJ school of Public Affairs at the University of Texas (Austin) in 2000, and he finished his Ph.D. degree from the Institute of Communications Research at the University of Illinois at Urbana Champaign in 2004. Before coming to the U.S. in 1998, he had worked as a newspaper reporter for 10 years in Seoul, Korea. His major research and teaching interests are media studies, including political economy of culture and critical cultural studies, new media and communication technology, international media and globalization, and telecommunications policy. He is currently interested in doing research on the macro-level effects of the diffusion of information and communication technologies and their policy implications. His recent work has appeared in several scholarly journals, including Media, Culture and Society, Telecommunications Policy, Television and New Media, Information, Communication & Society, and Gazette. His book entitled Hands On/Hands Off: Cyber-Terrorism and the Information Sword 3 Information–MFCSIT'06 National University of Ireland, Cork, Ireland, August 1 - 5, 2006 The Korean State and the Market Liberalization of the Communication Industry is currently under contract with Hampton Press. Michael Real is Professor of Applied Communication at Royal Roads University in Victoria, B.C., Canada. The focus of his work is media, culture, and social responsibility. His Ph.D. is from the University of Illinois. He has written scores of scholarly and general publications, directed local and international research projects, and hosted television and radio programs. His books include Exploring Media Culture, Super Media, and Mass-Mediated Culture. His numerous articles have appeared in Critical Studies in Mass Communication, American Quarterly, Journal of Communication, Media Development, Journalism and Mass Communication Quarterly, Journal of Popular Culture, and elsewhere. Bert Smeets studied at the faculty of social sciences of Katholieke Universiteit Louvain, Belgium and he got his Master’s degree in 2001 in European Studies. In his thesis “Media for Peace: Does the media contribute to peace?”, he analyses the influence of mainstream and peace media on the dynamics of conflicts. In 2002 he did an internship at the International NGO European Centre for Common Ground, where he did research on web-based media and their relation to ethnopolitical conflict. Currently he is working for the Belgian Army. He served for four months in Kosovo (KFOR) and prepares his second term in Mitrovica as an intelligence and operations officer. Georgios Terzis is an Associate Professor at Vesalius College, Vrije Universiteit Brussel in Belgium www.vesalius.edu and the Chair of the Journalism Studies Section of the European Communication Research and Education Association www.journalismstudies.edu. He received his Ph.D. in Communication Studies from the Katholieke Universiteit Brussel and he also studied Journalism and Mass Communication in Greece, U.K., USA and The Netherlands. He worked as a foreign correspondent for Greek Media and as a course leader for the European Journalism Centre, training journalists from all over the world on EU affairs. Finally, he organized for the international NGO Search for Common Ground media and conflict resolution web-based programs and trainings for journalists from Angola, BiH, Cyprus, Greece, The Middle East, Sri Lanka, and Turkey. Elina Yalov is a PhD student at the Institute of Communications Studies in the University of Leeds. She has been an Associate Lecturer in Sheffield Hallam University since February, 2006. Prior to that, she had been working as a journalist in the magazine and as a research assistant in Bar-Ilan University, Israel. Her research interests are Military-Media Relations, Russian-Chechnya Conflicts, Propaganda and Psychological Warfare, Psychological Operations, Mass Communications and War on Terrorism. Her M.A. and PhD dissertations are dealing with propaganda during the two Russia-Chechnya Conflicts. The title of her PhD thesis is: “Russia vs. Chechnya: Fearing the Domino Effect. Propaganda and Counter Propaganda during the Two Russian-Chechnya Conflicts (1994-1996, 1999-present) and their Influence on the Outcomes of the Conflicts”. Cyber-Terrorism and the Information Sword 4 Information–MFCSIT'06 National University of Ireland, Cork, Ireland, August 1 - 5, 2006 Cyber-Terrorism in the Information Age: Actors, Communications, Tactics, Targets, and Influences Mahmoud Eid University of Ottawa (558 King Edward Avenue, Room 202, Ottawa, Ontario K1N 6N5 Canada, Tel.: 1-613-562-5800 ext. 3841, Fax: 1-613-562-5240, E-mail: meid@uottawa.ca) Abstract: Threats to global citizens emanating from various terrorist groups around the world are increasingly widespread. No country is excluded from terrorists’ potential plans, and both transnational and internal terrorist attacks are possible in every country as long as the roots of terrorism are not able to be effectively expunged. In understanding terrorism as political violence, this paper sheds light on the major terrorist organizations, their use of traditional and new media technologies, their tactics, their target audiences, and their influences. With special attention to information technologies, the paper demonstrates how modern terrorists rely heavily on cyberspace to communicate messages, implement operations, and achieve goals. There are serious threats to global citizens emanating from various terrorist groups around the world. Most noticeable in the late 20th and early 21st centuries are those threats which come from Al-Qaeda, exemplified by bombings and multiple deaths in Bali, Dar es Salaam, Istanbul, Nairobi, New York, Madrid, London, and Sharm AlSheikh. America’s recent “war on terrorism” has made the West in general and North America in particular a major target of terrorist attacks. Even countries with good foreign relationships and international reputation of peacekeeping, which might possibly reduce potential external or transnational terrorist attacks, still cannot guarantee that they will have any bearing in the face of potential national or internal terrorism. The argument that recent internal terrorism has occurred in United Kingdom as a result of the country’s policies towards some Muslim countries in the Middle East may be partially correct, but it does not tell the whole story. As Majid Tehranian (2002) explains, 9/11, 2001, showed that the global villagers entertain profound misperceptions about, and abhorrence for, each other. “Living in a largely mediated world, they are hostage to the images of "the other" received through the mass media. A growing global apartheid is tearing them apart into opposing camps. . . . Global terrorism appears to be a direct outcome of this apartheid” (59). The convergence of both traditional and transnational terrorism becomes a very dangerous threat. As Joseph Nye (2005) calls it, transnational terrorism is a “type of non-state actor that is becoming more important” (229). If external threats of terrorism are dangerous and require a rational response from policy decision-makers, it is also true that internal extremist groups can become more dangerous if policy decision- Cyber-Terrorism and the Information Sword 5 Information–MFCSIT'06 National University of Ireland, Cork, Ireland, August 1 - 5, 2006 makers do not seriously address the issues these groups are concerned with, or indeed the groups themselves. Some argue, for instance, that “most terrorist attacks start from a racially, ethnically, or religiously motivated conviction that certain categories of human beings are not worthy of moral standing or consideration” (Ignatieff, 2004: 94). To help focusing the discussion of terrorism in this paper, it is worth referring to one of the most recent definitions of terrorism relevant to discussion at stake. As Brigitte Nacos (2006) defines it, “terrorism is political violence or the threat of violence by groups or individuals who deliberately target civilians or noncombatants in order to influence the behavior and actions of targeted publics and governments” (32). With special focus on the political dimension, it is also important to note that the major objective of terrorism “is not the winning of a military victory, nor the fulfilling of private motives such as revenge or enrichment. It is a political manifestation and normally aims at winning a political victory and thereby possibly also an ethical and legal victory” (Thomassen, 1992: 219). One less severe way of defining terrorism considers it as something in itself unethical, as a crime, or as a form of justifiable warfare. In this way, terrorists are to be treated as prisoners of war and not as criminals. The question then is whether or not terrorism can be defended under any circumstances. Terrorism can only be justified, according to Niels Thomassen (1992: 219-222), if: 1) it is used against a form of power that uses illegitimate violence; 2) the situation excludes all other possibilities for action; 3) it is only directed against those who are responsible for the practice of illegitimate violence; 4) its sole aim is to neutralize those people as practitioners of violence and not to harm them further; and 5) one has taken precautions against unwanted side-effects or has seen to it that these are at any rate kept within restricted limits. In short, terrorism can be justified as the absolute last weapon of the oppressed. As Nicholson (1996) explains, it is conventional for the opponents of a group that uses terrorism as a political tool to regard terrorists as either mad or wicked. However, from the terrorists’ perspective “they are freedom fighters, or fighters in a holy war or whatever. Thus, to execute a captured terrorist might have the very opposite effect from that which the authorities desired in that it creates a martyr and brings new people into the movement” (169). So, conception of the belief structures of the terrorists will help opponents understand the appropriate ways of either defeating or negotiating with terrorists. But who are the terrorists of the Internet? What are the contents of their websites? Whom do the Internet terrorists target, and what are their goals? According to Yariv Tsfati and Gabriel Weimann (2002: 320-326), numerous organizations have entered cyberspace and created Internet sites. These include Hamas (the Islamic Resistance Movement), the Lebanese Hizbollah (Party of God), the Egyptian Al-Gama’a al Islamiyya (Islamic Group), the Popular Front for the Liberation of Palestine, the Palestinian Islamic Jihad, the Basque ETA movement, the Irish Republican Army, the Colombian National Liberation Army, the Liberation Tigers of Tamil Eelam, the Armed Revolutionary Forces of Colombia, the Popular Democratic Liberation Front Party in Turkey, the Kurdish Workers’ Party, and the Japanese Red Army. Geographically, most of the organizations that have turned to the Internet are based in Third World countries (in South America, East Asia, and the Middle East), and only a few are located in Europe. Terrorist websites usually include information about the history of the organization and biographies of its leaders, founders, heroes, commanders or revered personalities, information on the political and ideological aims of the organization, and up-to-date news. While avoiding the violent aspects of their activities, the Internet terrorists usually Cyber-Terrorism and the Information Sword 6 Information–MFCSIT'06 National University of Ireland, Cork, Ireland, August 1 - 5, 2006 stress two issues: freedom of expression and political prisoners. The contents of their websites generally attempt to approach 1) potential supporters, 2) their enemies, and 3) international public opinion. The terrorists’ three main goals are attracting attention, getting their demands recognized, and winning respect or gaining legitimacy. In achieving these goals, terrorists appear to have seven main methods or tactics; ranked from the most frequently to least frequently used, these are bombings, assassinations, suicide missions, hijackings, kidnapping, missile attacks, and mass disruption/mass destruction (Nacos, 2006: 126). Modem terrorism is very dependent on the attention of the media. Thus, “modern terrorism can be understood as an attempt to communicate messages through the use of orchestrated violence” (Tsfati & Weimann, 2002: 317). As Former British Prime Minister Margaret Thatcher once said “publicity is the oxygen of terrorism” and that terrorists “understood this and acted accordingly” (Nacos, 2006: 208). Terrorists of our era are much more aware of their relationship to the media and understand how they can benefit the most from using them. Moreover, they are even more aware of avoiding “the use by the media”—the other side of the relationship. In the first side, there are many incidents in history when the media were used by terrorists and their sympathizers. “At the time of the Tehran embassy incident … the Canadian Broadcasting Corporation filmed a mob demonstration. As soon as the cameras were on, the demonstrators began shouting ‘Death to Carter’, raised their fists, looked angry and burned American flags. After two minutes, the cameramen signaled the end of the ‘take’. Then the same scene was done once more for the French-speaking Canadians, with the crowd shouting ‘Mort à Carter’” (Schmid, 1989: 559). On the other side, “terrorists themselves also feel ‘used’ by the media which pick up their action, but offer no guarantee of transmitting their message” (Ibid). However, terrorists of our era overcome this obstacle and benefit from their relationship to the media the most. Osama bin Laden used to provide Al-Jazeera with videotapes to broadcast without any distortion of his messages. He can still even publish that on-line in case the media would not give him exactly what he asked for. In today’s world, “technology is putting into the hands of deviant individuals and groups destructive powers that were once reserved primarily to governments. . . . [It] has made the complex systems of modern societies more vulnerable to large-scale attack” (Nye, 2005: 229). Although the “Internet, relying on widely separated but interconnected computer systems, was originally designed as a military solution to the threat of communication disruption due to nuclear attack” (Briggs, 2004: 453), individuals or groups can now use cyberspace, computers, and information technology, especially the Internet, to threaten, terrorize and cause harm to both governments and civilians. Terrorists have been always pioneers in embracing the newest communication technologies and adding them to the available media. Much easier than the traditional mass media, the new media technologies allow terrorist organizations to transmit their messages. “The network of computer-mediated communication … is ideal for terroristsas-communicators: it is decentralized, it cannot be subjected to control or restriction, it is not censored, and it allows access to anyone who wants it” (Tsfati & Weimann, 2002: 319). According to Gabriel Weimann (2005: 137) cyber-terrorism is a very attractive option for modern terrorists for several reasons: 1) It is cheaper than traditional terrorist methods and all what the terrorist needs is a personal computer and an online connection; 2) it is more anonymous than traditional terrorist methods as terrorists use online nicknames or log on to a website as an unidentified “guest user,” making it very hard for security agencies and police forces to track down the terrorists’ real identity; 3) the Cyber-Terrorism and the Information Sword 7 Information–MFCSIT'06 National University of Ireland, Cork, Ireland, August 1 - 5, 2006 variety and number of targets are enormous as the cyber-terrorist can target the computers and computer networks of governments, individuals, public utilities, private airlines, and so on; 4) it can be conducted remotely, a feature that is especially appealing to terrorists because it requires less physical training, psychological investment, risk of mortality, and travel than conventional forms of terrorism; and 5) it has the potential to directly affect a larger number of people than traditional terrorist methods, thereby generating greater media coverage, which is ultimately a major goal for terrorists. Members of Al-Qaeda, for example, rely heavily on the Internet to spread their propaganda and have used it to plan and coordinate their operations; most notably the 9/11 attacks. “Former FBI Director Louis J. Freeh told the Citizens Crime Commission of New York, when Ramzi Yousef (the mastermind of the World Trade Center bombing) was being tracked in the Philippines, he left behind a laptop computer that itemized plans to blow up (11) U.S. airliners in the Western Pacific on a particular day. All of the details and planning were set forth in that laptop computer. While part of the information was encrypted and difficult to decode, it revealed for the first time how sophisticated terrorists utilized computers for planning their operations” (Nacos, 2006: 237). However, unlike many other terrorist organizations, “Al Qaeda never established its own web site but has depended on sympathetic individuals and groups to carry their propaganda” (Ibid: 230). Terrorists have been also using the net in recruiting and fund raising. The Internet has become the most effective recruiting tool for terrorists “simply by making their propaganda material available online, by glorifying those who have committed political violence against civilians, and by urging visitors to their web sites to join the cause, these groups attract new followers” and a major tool for fund raising for “even the well-funded Al Qaeda network [that] utilized web sites to solicit contributions” (Ibid: 240). Despite the many attempts by governments and individuals to limit the terrorists’ use of the media and information technologies, terrorists’ messages continue to be conveyed to their audiences with increasing influences over the years. “The growing use and manipulation of modern communications by terrorist organizations led governments and several media organizations to consider certain steps in response. These included limiting terrorists’ access to the media, reducing and censoring news coverage of terrorist acts and their perpetrators, and minimizing the terrorists’ capacity for manipulating the media” (Tsfati & Weimann, 2002: 319). Also, there are many attempts by individual hackers and governments to block terrorist organizations from using the Internet, especially after 9/11. However, “these attacks affected the sites’ presence on the Internet only temporarily” (Ibid: 329). The websites of terrorist organizations change addresses frequently. Some sites disappeared from the network for a while. “The fact that most of these sites reopened after a while demonstrates the futility of attempts to block terrorists or their supporters from using the Internet to communicate their messages” (Ibid). This is most likely to continue to be the case as long terrorists are pioneers in using the most advanced technologies. Cyber-Terrorism and the Information Sword 8 Information–MFCSIT'06 National University of Ireland, Cork, Ireland, August 1 - 5, 2006 Islamists and the Internet Maura Conway Dublin City University (Glasnevin, Dublin 9, Tel.: 01 700 6472, E-mail: maura.conway@dcu.ie) Abstract: The purpose of the paper is to describe and analyze Islamic terrorists’ use of the Internet, with a particular focus on their use of the Web for intelligence gathering purposes and their establishment of their own Web sites to engage in offensive information operations. The impact of the Internet on the adoption of networked forms of organization by Islamist groups will also be addressed, as will the effects of such structures on both the conduct of international relations and our understanding of same. When US Defense Secretary Donald Rumsfeld was asked about soft power in 2003, he replied “I don’t know what it means” (as quoted in Nye 2006). In February 2006, in a speech at the Council on Foreign Relations in New York, however, Rumsfeld was forced to concede: Our enemies have skillfully adapted to fighting wars in today’s media age, but for the most part we, our country, our government, has not adapted. Consider that the violent extremists have established media relations committees—these are terrorists and they have media relations committees that meet and talk about strategy, not with bullets but with words. They’ve proven to be highly successful at manipulating the opinion elites of the world. They plan and design their headline-grabbing attacks using every means of communication to intimidate and break the collective will of free people…They know that communications transcend borders and that a single news story handled skillfully can be as damaging to our cause and helpful to theirs as any other method of military attack. And they’re doing it. They’re able to act quickly. They have relatively few people. They have modest resources compared to the vast and expensive bureaucracies of Western governments. Our federal government is really only beginning to adapt our operations to the 21st century. For the most part, the U.S. government still functions as a five and dime store in an eBay world (Council on Foreign Relations 2006). “In the global ‘war’ against terrorism, the ability to take command and control of the global info-sphere is every bit as important as any other weapon on the military, intelligence, financial or any other fronts” (Taylor 2004, 108). Cyber-Terrorism and the Information Sword 9 Information–MFCSIT'06 National University of Ireland, Cork, Ireland, August 1 - 5, 2006 Certainly, one of the most significant aspects of al-Qaeda’s post-9/11 reshaping has been the significant increase in its reliance on the Internet as a soft power tool (Eedle 2004). Bin Laden’s cadres had employed the Internet for communication and propaganda purposes prior to the US attacks (see Conway 2002), but their use of the Internet increased exponentially thereafter. Michael Scheuer has put this down to the loss of alQaeda’s Afghan base and the consequent dispersal of fighters, along with rapid development of the medium itself and the computers and other gadgets with which it can increasingly be accessed, and the proliferation of Internet cafes globally (2004, 78). Indeed al-Qaeda’s increased virtuality post-9/11 inspired one analyst to coin the descriptor “al Qaeda 2.0” (Bergen 2002) and another to liken al-Qaeda’s deployment of cyber-based tools to their own “stealth ‘revolution in military affairs’” (Ranstorp 2004, 61). In a videotaped statement that was released in December 2001 in which he comments upon the 9/11 attackers, Osama bin Laden stated: “[T]hose youths who conducted the operations did not accept any fiqh in the popular terms, but they accepted the fiqh1 that the Prophet Muhammad brought. Those young men…said in deeds, in New York and Washington, speeches that overshadowed all other speeches made everywhere in the world. The speeches are understood by both Arabs and non-Arabs—even by the Chinese” (as quoted in Devji 2005, 13). Bin Laden thus describes the events of 9/11 not as primarily hostile or vengeful actions, which they undoubtedly were, but underlines instead their essentially communicative aspect(s) (Devji 2005, 14). The centrality of communication(s) and communication technologies, especially the Internet, to al-Qaeda and its affiliates was not immediately clear to researchers, analysts, or policy makers, however. Michael Scheuer admits in the introduction to Imperial Hubris (2004) that a major problem with his previous book, Through Our Enemies Eyes (2003), was that in it he seriously underestimated the role of the Internet in al-Qaeda’s activities (2004, xx). Of course, one reason for this may be the rapidly evolving nature of al-Qaeda’s Internet use and thus also its impact. Clearly interesting things can happen when a “complex world discourse” such as Islam comes into contact with a force that can claim an equally wide geographic spread: the socially and politically transformative effects of the Internet. Islam and political Islam in particular has exhibited a wide range of responses to this relatively new information and communication technology with certain features being eagerly appropriated and others vociferously rejected (Mandaville 2001, 153). Bin Laden himself has observed that “In the past there was imperfection, but it was partial. Today, however, the imperfection touches the entire public because of the communications revolution and because the media enter every home” (as quoted in Scheuer 2004, 152). However, citing the Western media’s “vicious campaign” against Islam, Bin Laden called in a 2002 Internet posting on Muslim publishers and broadcasters to take “[their] rightful position and play [their] required role in confronting…[the West’s] visual, audio, and written organs” (as quoted in Scheuer 2004, 132). 1 Fiqh is a generic term used to describe a School of Islamic law. Cyber-Terrorism and the Information Sword 10 Information–MFCSIT'06 National University of Ireland, Cork, Ireland, August 1 - 5, 2006 Al-Qaeda’s Internet presence increased from January 2002 when the group began to employ two sites, in particular, to spread their message. Al-Qaeda never claimed ownership of the sites, Al-Neda and Al-Ansar, but senior al-Qaeda commander Abu-alLayth al-Libi provided the following recommendation as regards the al-Neda site—also known as the ‘Center for Islamic Studies and Research’—to visitors to Islamic Jihad Online: It is a website run by reliable brothers …and financed by brothers that you know. It is a good website and we hope that God will accept its actions…[W]e will not spare any effort or withhold anything we can offer to this website” (as quoted in Scheuer 2004, 79). Al-Neda and Al-Ansar published, amongst other things: - - Audio and video clips of Osama bin Laden, al-Qaida spokesman Sualaiman Abu Ghaith, and others. Bi-weekly electronic journals containing analyses of the conflicts in Iraq and Afghanistan. Islamic scholars’ and clerics’ evaluations and explanations of al-Qaeda’s past attacks, future plans, and admonishments to others to act. These included a series of articles claiming that suicide bombings aimed at Americans are justifiable under Islamic law Essays describing al-Qaeda’s war aims and assessments of how achieving these goals would benefit the Muslim umma (Iqbal 2002; Kelley 2002; Scheuer 2004, 79) There was also media speculation that the Al-Neda site was being used to direct al-Qaeda operational cells. According to one report the site has carried low-level operational information: for example, in February 2002 it was said to have published the names and home phone numbers of al-Qaeda fighters captured by Pakistan following their escape from fighting in Afghanistan with the aim that sympathisers would contact their families and let them know they were alive (Eedle 2002). Click on Alneda.com today and the following appears: Hacked, Tracked, and NOW Owned by the USA. The site is described as “a mostly unmoderated discussion board relating to current world affairs surrounding Islamic Jihad [sic] and the US led war on terrorism (plus other conflicts around the globe).” Michael Scheuer has argued that post-9/11 bin Laden has maintained a deliberately low profile for two reasons: firstly, to avoid the US and her allies fixing his position and, secondly, because he knows his continued silence induces fear amongst Western publics. The latter notwithstanding, however, Internet sites maintained by alQaeda and its supporters provide not just bin Laden’s followers, but also those he is seeking to incite to holy war, with a regular, easily accessible flow of information and comment carrying al Qaeda’s imprimatur” (Scheuer 2004, 79). Discussing the impact of these websites, Paul Eedle goes further asserting: “As a result of the al Qaeda viewpoint, it now takes great courage to speak out against the jihadi view….[and] public debate in the Muslim world is now very radical” (as quoted in Scheuer 2004, 79). Cyber-Terrorism and the Information Sword 11 Information–MFCSIT'06 National University of Ireland, Cork, Ireland, August 1 - 5, 2006 There is no requirement that soft power be employed only by the ‘good guys;’ indeed whether soft power produces ‘positive’ behaviour depends largely on the context and the skills with which available informational resources are converted into outcomes. It has been observed further that “it is a mistake to rely on hard or soft power alone.” The ability to combine them effectively, Nye (2006) says, might be termed ‘smart power,’ the employment of which has been adopted with alacrity by al-Qaeda and affiliated organisations. Burkhart and Older’s observation that “When the social compact between the government and the governed is bankrupt, information and communications technologies become powerful weapons for both sides, but are of limited use to voices of moderation” certainly appears to be borne out by recent events (2003, 31). It is doubtless the case that “AQ’s online presence has become more potent and pertinent than its actual physical presence because of the Internet” (Gruen 2005, 354). Despite their recognition of the radicalising influence of the Internet, Burkhart & Older persisted in dismissing the latter, insisting that radio and television remained the most important media outlets because they reached out to those at all levels of society and into every corner of a given country. The Internet was said to get most attention from students of globalisation, “but it is the unwritten word that remains of most concern to MENA governments” (Burkhart & Older 2003, 42). Such an insistence underlines the way in which, as late as 2003, researchers were underestimating the soft power potential of the Net and were also out of touch with the evolution of Internet tools and their effects, especially streaming audio.2 Violent Islamists were labouring under neither of these misapprehensions, however. In fact, almost from the outset Bin Laden and his associates “thought big” by integrating local causes and conflicts into a global campaign shaped “to resonate with Muslims of all stripes and cultures.” Bin Laden has made globalisation work for him; he has a capacity for what business executives term ‘strategic control,’ that is tailoring himself, his ‘workforce,’ and his ‘product(s)’ to the changing ‘marketplace,’ whilst at the same time making the most of the best available technologies (Larry Seaquist quoted in Scheuer 2004, 117). The seriousness of the implications of such a strategy were remarked upon by a number of commentators prior to being taken up by Rumsfeld. In an article that appeared in Foreign Policy in 2004, Jason Burke made the following admonition: Bin Laden is a propagandist, directing his efforts at attracting those Muslims who have hitherto shunned his extremist message. He knows that only through mass participation in his project will he have any chance of success. His worldview is receiving immeasurably more support around the globe than it was two years ago, let alone 15 years ago when he began serious campaigning. The objective of Western countries is to eliminate the threat of terror, or at least to manage it in a way that does not seriously impinge on the daily lives of its citizens. Bin Laden’s aim is to radicalize and mobilize. He is closer to achieving his goals than the West is to deterring him (p.26). 2 Although they do comment that “[Osama bin Laden] has made rather clever use of the other new medium prevalent in the MENA countries—satellite television—and the Internet provides an inexpensive adjunct, especially to the extent that it can be used to generate dialog with potential new supporters and recruits” (Burkhart & Older 2003, 60). Cyber-Terrorism and the Information Sword 12 Information–MFCSIT'06 National University of Ireland, Cork, Ireland, August 1 - 5, 2006 Anti- and Counter-Terrorism: Snagging the Practice of a Human Right to Communicate Aliaa Dakroury Carleton University (1125 Colonel By drive, Ottawa, K1S 5B6 Canada, Tel.: 613-526-2371, Fax: 613-520-6690, E-mail: adakrour@connect.carleton.ca) Abstract: Following the September 11 attacks, and under the state of anti/counter terrorism that preoccupies most of the national and international discourses and spheres nowadays, global communicative patterns have shifted towards highlighting “anti/counter-terrorism” actions. In this paper, I argue that there is an ongoing elimination of the emphasis of the human right to communicate as a core civil liberty as stated in article (19) of the Universal Declaration of Human Rights (1948), the International Covenant on Civil and Political Rights (1966), and other international treaties. As McNeill and McNeill argue in their book The Human Web, our world has been transformed through different communicative patterns associated with diseases, friendship, rivalry, military, wars, technology, and so on. “In all such relationships, people communicate information and use information to guide their future behavior” (2003, p. 3). In other words, we can say that in each era/period, there are certain events, crises or ideas that societies build their communication around. Following the September 11 attacks, I would argue that our world began to center its global communicative patterns based on anti- or counter-terrorism actions. In this paper, I will suggest that these actions are infringing on the human right to communicate as a core civil liberty as stated in article (19) of the Universal Declaration of Human Rights (1948) as well as in other international treaties. I will start by first explaining what exactly the right to communicate is. Following that, I will show what the relationship is between this basic human right and the idea of anti- or counter-terrorism. Finally, through the use of some current examples, I will show how a state’s policies of anti-/counterterrorism can eradicate the practice of the human right to communicate. As I have argued elsewhere1, the concept of the right to communicate is first associated with the language of international legal documents that go back to the late eighteenth century. Drawing from the language of eighteenth-century philosophy, the Virginia Declaration of June 12, 1776, the Declaration of Independence of July 4, 1776, and the American Bill of Rights of 1789, appeared to placed great emphasis on the idea 1 Dakroury, Aliaa. (2003). Is communication a basic human right? An intellectual history. Unpublished Masters’ thesis. Ottawa: Carleton University. Cyber-Terrorism and the Information Sword 13 Information–MFCSIT'06 National University of Ireland, Cork, Ireland, August 1 - 5, 2006 of freedom through the use of phrases such as ‘by nature free,’ ‘inherent rights,’ ‘enjoyment of life and liberty,’ ‘no men be deprived of this liberty,’ ‘unalienable right,’ and ‘pursuit of happiness2. The same idea has been firmly emphasized in Article 1 from the American Bill of Rights, in which it specified the freedom of expression as part of the basic rights: Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or the press; or the right of the people peaceably to assemble. Following that, Article (19) of the Universal Declaration of Human Rights (1948) asserts that: Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers. However, the actual term “the right to communicate” is attributed to Jean d’Arcy, the Director of Radio and Visual Services during the 1960s in the Office of Public Information at the United Nations in New York. d’Arcy launched this concept in the late 1960s in his European Broadcasting Union article Direct Satellite Broadcasting and the Right to Communicate in which he (1969) argued that: The time will come when the Universal Declaration of Human Rights will have to encompass a more extensive right than man’s right to information, first laid down twenty-one years ago in Article 19. This is the right of man to communicate. This is the angle from which the future development of communications will have to be considered if it is to be fully understood. (1977, p. 1) It is important to understand that the notion of communication does not include merely the process of sending and receiving information; rather, it is argued to be the process of social thinking, common understanding, ability to freely meet and associate between human beings and so on. As Jean d’Arcy notes: “To cut communications within a human group is equivalent to annihilating that group. To cut communications between it and other groups, to prevent it practically from expressing itself tantamount, as in the case of the individual, to destroying its personality…” (1982, p. 2). Hence, under the conditions of anti-/counter-terrorism that currently preoccupy most of the national and international discourse and spheres, it is argued that there is an ongoing obstruction of the free practice of the human right to communicate both in what are supposed to be the most democratic places in the world, such as the United States, 2 For example, Article 1 of the Virginia Declaration stated “That all men are by nature equally free and independent, and have certain inherent rights, of which, when they enter into a state of society, they cannot by any compact deprive or divest their posterity; namely, the enjoyment of life, liberty, with the means of acquiring and possessing property, and pursuing and obtaining happiness and safety”. Cyber-Terrorism and the Information Sword 14 Information–MFCSIT'06 National University of Ireland, Cork, Ireland, August 1 - 5, 2006 and the least democratic places, such as many countries in the developing world. Reitan maintains that many human rights activists and observers have concluded that a number of countries, “including China, India, Indonesia, Singapore, Malaysia, Russia, …and Israel are using the US led campaign against terrorism as a cover to justify repression of all kinds, including that of non-violent activism for democratic change” (2005, p. 52). For example, in the United States there has been an ongoing dispute as to whether it is justifiable for the President to use his declared war on terrorism to violate many of the basic rights and freedoms as stated in various American legal documents, particularly the Constitution. Historically, as Macmahon (2005) notes, during the American Civil War, President Lincoln wanted to use his power to try Americans captured in the North in military tribunals instead of through the courts, arguing that this is a need to protect national security. The US Supreme Court rejected his suggestion, arguing that the state of war could never be a justification for violating citizens’ rights to a fair trial. Macmahon comments that “even in America’s darkest hour–the Civil War–the Supreme Court refused to allow the rule of law to be replaced by a rule that vested absolute power in the executive branch” (2005, p. 125). In other words, despite the fact that terrorism, as UN Secretary General Kofi Annan, states is “by its very nature . . . an assault on the fundamental principles of law, order, human rights, and peaceful settlement of disputes upon which the United Nations is established” (4 October 2002), battling it is undeniably associated with possible violation of civil liberties and freedoms such as the right to communicate. Joyner maintains that even the United Nations, as a major international enforcement power in the field of human rights was changed by acts of terrorism that “destroy human rights and fundamental freedoms” (2004, p. 234); even more importantly, the ways in which acts of terrorism are employed by nations, governments, and states may serve as “the rationale by governments to crack down on dissident groups and critics of a regime,” and moreover, by which its counter/anti terrorism legislations adopted “might infringe on human rights and civil liberties of persons in those states” (2004, p. 243). Yet, during times of crisis such as September 11/01, the Madrid Massacre, and the London Bombings, states derogate certain rights and freedoms. Among these is the right to freedom of association which, as stated in the 1948 Universal Declaration of Human Rights and the 1966 International Covenant on Civil and Political Rights, constitutes a basic part of the right to communicate. In other words, it is civilians who are most often the victims of terrorism. Unfortunately, “terrorists commonly justify the targeting of civilians by denying their moral innocence, by insisting that civilian settlers who profit from an unjust colonial occupation are not entitled to immunity from attack, since they are either beneficiaries or accomplices of injustice” (Ignatieff, 2004, p. 94). However, it is not just terrorists who victimize innocent bystanders in this respect: by creating and implementing policies that do not manage the fine line between liberty and security, governments may also be responsible for the violation of civilians’ human rights. Paul Hoffman, the Chair of the International Executive Committee of Amnesty International, presents Amnesty’s view that “the way in which the ‘war on terrorism’ has been waged threatens to undermine the international human rights framework so painstakingly built since World War II” (2004, p. 932). Hoffman argues that “abandoning human rights in times of crisis is shortsighted and self-defeating. A ‘war on terrorism’ waged without respect for the rule of law undermines the very values that it presumes to Cyber-Terrorism and the Information Sword 15 Information–MFCSIT'06 National University of Ireland, Cork, Ireland, August 1 - 5, 2006 protect. We must restore the balance between liberty and security by reasserting the human rights framework, which provides for legitimate and effective efforts to respond to terrorist attacks” (2004, p. 932). Michael Ignatieff (2004) highlights the importance of how a nation responds to terrorism. He claims that “it is the response to terrorism, rather than terrorism itself, that does democracy most harm” (p. 61) and these harms are what terrorism intends. The United States’ “war on terrorism” as exemplified after 9/11 by the sending of US troops into Afghanistan to oust the Taliban, as well as the subsequent war on Iraq, has failed terribly. The pre-emptive strategy of war on Iraq did not stop terrorism; instead, “Iraq has become a recruiting ground for Al-Qaeda, a fascist Salafi group which is training agents, including Western nationals, and sending them home to set up networks or form sleeper cells.” (Iraq as a base, 2005). In summary, although the actions of terrorism systematically violate human rights and disrupt basic political processes common to liberal democracies, the actions of nations in combating terrorism also undermine these basic human rights. Thus, the enforcement of a human right to communicate is eradicated through the setting of measures that limit freedom of expression, the right to peaceful assembly, and the right to privacy among others. Our major concern in the future should be to find possible ways to maintain a balance between the existence of a secure state and the effective combating of terrorism on the one hand, and the enforcement of the human right to communicate and the practice of democracy on the other. Cyber-Terrorism and the Information Sword 16 Information–MFCSIT'06 National University of Ireland, Cork, Ireland, August 1 - 5, 2006 E-initiatives and the Information Management of Ethnopolitical Conflicts Georgios Terzis Vesalius College, Vrije Universiteit Brussel (Pleainlaan 2, 1050 Brussels, Belgium, Tel : +32 2 629 2821, E-mail: Georgios.Terzis@vub.ac.be) Bert Smeets Belgian Army (Email: bert_smeets@hotmail.com) Abstract: Taking the outreach of the Internet into account, ethnopolitical violence on the net has the potential to reach a large audience and thus have a significant influence on what we know about ethnopolitical conflicts around the world. Cyberspace itself became a battleground where opponents attack each other, while it is has also become a useful organisational tool for groups involved in ethnopolitical violence, and thus cyber attacks are seen as side effects but also as initiators to more traditional modes of attacks. As we speak cyberspace is changing the nature of the Iraqi War. [In Their Own Words: Reading the Iraqi Insurgency, ICG Middle East Report N°50, 15 February 2006] This paper introduces the theory and experience on media, society and the rising role of the net in the information management of contemporary ethnopolitical conflicts. Thereupon we state that einitiatives for the information management of ethnopolitical conflicts are best framed into the traditional hate and peace media literature. Further we analyse the advantages and disadvantages the Internet has over traditional media and look at how these open up opportunities and present barriers for e-initiatives. At one level, the Internet is just another new communication tool that is accessible to anyone with proper equipment and can similarly to all other forms of media be used to disseminate or distort information that can be used for conflict management. But at another level, the Internet, including electronic mail, the World Wide Web and its other facets like blogs, offers the potential of changing how we interact with one another, how we gather and disseminate information and even how we make decisions about these conflicts (Bentivegna, 1998: 2-3). It offers opportunities for conflict management and opens up possibilities that transcend previous traditional media boundaries. Some of them are: Cyber-Terrorism and the Information Sword 17 Information–MFCSIT'06 National University of Ireland, Cork, Ireland, August 1 - 5, 2006 1. The Internet entails an increase in speed. Information travels much faster using the Internet in comparison to other media forms. 2. The Internet is inexpensive and convenient. The decrease in cost goes for the messenger as well as for the recipient. However, this is only true if some conditions are met. For instance, infrastructure needs to be available and costs for the end user also depend on the costs of access (Lie, 2001: 5). 3. The Internet allows any group to broadcast their message to millions throughout the world. Internet allows the exchange of information dissemination without regard to geographical and national borders. 4. It allows individuals and grass-root movements to internationalise local problems and put it on the international news agenda. And they can do this behind the screen of anonymity what makes it easier to express opinions without risking social sanctions (Bentivegna, 1998: 9). 5. Internet allows a bi- and multi-directional way of communication. The interactivity is a very important tool for group building and self-determination of groups. 6. Internet allows users to consult any time and from any place information stored on different databases around the world. 7. Internet allows the integration and convergence of different media forms like text, audio, visuals and moving pictures. 8. The Internet is an organisational tool “par excellence” (Danitz & Strobel, 1999: part 3, 2). The Internet is a useful tool for groups to organise and coordinate their activities. Mobilisation and enlisting world-wide support is facilitated by using the Internet. Besides the fact the Internet has some important advantages over other forms of traditional media, its content also affects, and it is affected by the traditional media. Traditional media fundamentally affects the content of the Internet since a number of websites and e-groups download or discuss the issues that are reported on traditional media. But the web technology also strengthens the traditional watchdog functions of journalism for example, by giving reporters efficient ways to probe for information. The capacity to search documents, compile background and historical context, and identify authoritative and non-authoritative sources in the net has expanded the reporter’s toolbox. It also has introduced a fundamentally different culture on interactivity, fewer rules, and fewer limits (Giles, 2000: 3). When speaking about e-initiatives for the information management of ethnopolitical conflicts it is useful though to put these initiatives in the wider context of the literature on Information technology and society as well. A reading of this literature Cyber-Terrorism and the Information Sword 18 Information–MFCSIT'06 National University of Ireland, Cork, Ireland, August 1 - 5, 2006 reveals a number of contradictions that are best kept in mind when analysing e-initiatives for the information management of ethnopolitical conflicts. First, when analysing the impact of the internet we have to consider the dispersion of Internet users in societies. It is impossible to assess the exact number of users in the world, however, over 90 percent of the computers linked to the Internet are found in the United States, Europe and Asia, while Internet users in less economically developed countries only constitute a small percentage of total users. Thus the question of Where we are analysing the impact of the internet is detrimental. E-initiatives have another important limitation, the existence of language barriers. Especially among e-peace groups who try to get in touch with the ‘other’, English is the language used for their dialogue. That excludes large parts of populations that don’t speak English. The question then is Who is using the peace initiatives. Third, according to the literature the impact of media, and so the Internet, on the attitude of its recipients is more important during times of crisis and conflict than during everyday non-conflictual situations (Reljic, 1998: 39) and thus the question of When einitiatives are used is very important. Finally, the fact that recipients are no longer passive and can actively participate, and control the flow of communication can also have its downsides. Information transmitted on the Internet often “unmediated” and can sometimes be of questionable accuracy. The multitude of information sources and directions that can be found on the Internet creates as well new opportunities as pitfalls for conflict prevention and conflict management. “Internet will bring world peace by breaking down national borders”, Nicholas Negroponte said during an information technology conference in Brussels in 1997. Four years later, in a briefing given in late September 2001, Ronald Dick, assistant director of the FBI and head of the United States National Infrastructure Protection Center (NIPC), told reporters that the hijackers of 9/11 had used the Internet, and “used it well.” (Weimanm, 2004: 11)! That the Internet will have a growing impact on our societies is disputed by few, but that it will bring world peace and stop political violence is only believed by Utopians. Some authors consider the Internet as a tool for more co-operation and democracy, while others consider it as a cause for increased political violence and a peril for societies. Mesthene captures a more ‘balanced’ understanding of the relationship between the Internet and society when he states: “New technology creates new opportunities for men and society, and it also generates new problems for them. It has both positive and negative effects, and it usually has the two at the same time and in virtue of each other” (Mesthene, 1986: 76). Cyber-Terrorism and the Information Sword 19 Information–MFCSIT'06 National University of Ireland, Cork, Ireland, August 1 - 5, 2006 Critical Interpretation of Broadband Services: Increasing Cyberterrorism in the Information Age Dal Yong Jin Simon Fraser University (E-mail: daljin@uic.edu) Abstract: This paper studies how the swift growth of broadband services has led to negative aspects, in particular cyberterrorism and cyber crimes in the information society by exploring the relationship between new technology and cyberterrorism. It does not aim to provide solutions to cyberterrorism and cybersecurity. Instead, it raises the questions of critical values, ideas, and ethical issues of cyberterrorism and cybersecurity in relation to broadband services. It then discusses the relationship between humans and technology to develop a research framework that would help to expedite research on new technology with insights drawn from the analysis of critical considerations. The swift growth in Internet and broadband services is blamed for the emergence of several negative effects in our information society, including cybercrimes and/or cyberterrorism, which have become one of the most significant global issues in recent years. Although the Internet and broadband services have contributed to the development of the information economy, the rapid deployment of broadband has also brought about a number of side effects from informatization, which is expected to become more of a challenge as society becomes more digitally sophisticated in many countries. There is no consensus about cyberterrorism and/or cybercrimes because they are relatively new phenomena and recent history. Several scholars and government agencies have given different definitions of cyberterrorism; however, they cannot agree on a unified definition on cyberterrorism because terrorism in cyberspace is difficult to define.1 After the 9/11 terrorist attacks on the U.S., many scholars have particularly focused on the nature of cyberterrorism related to the possibility of physical attacks on people; however, they point out that cyberterrorism represents a new stage in that it occurs in and via cyberspace, and refers to an attack on the information structure and functions, not persons. In other words, “cyberterrorism is the execution of a surprise attack by a subnational terrorist group or individuals with a domestic political agenda using computer technology and the Internet to cripple of disable a nation’s electrnoic and 1 Barry Collin (1996), a senior research fellow at the Institute for Security and Intelligence in California, defined cyberterrorism as the convergence of cybernetics and terrorism. The U.S. Federal Bureau of Investigation also defines cyberterrorism as any politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets by subnational groups or clandestine agents (Cyberterrorism, 2001). Cyber-Terrorism and the Information Sword 20 Information–MFCSIT'06 National University of Ireland, Cork, Ireland, August 1 - 5, 2006 physical infrastructures, thereby causing the loss of critical services, such as electric power, emergency 911 systems, telephone services, banking systems, the Internet, and a host of others” (Vernon, 2003a; xx). Examples of cyber terrorist activity include use of information technology to organize and carry out attacks, to support group activities and perception-management campaigns. Attacks that disrupt nonessential services or that are mainly a costly nuisance would not be cyberterrorism (Denning, 2002). A major aspect of the debate is also the likelihood of cyber attacks―whether terrorists could take control of a computer system or destroy a database that stores vital information used by a government and corporations, as well as individual users (Thibodeau, 2001; Barsamian, 2001). Cases of privacy invasion and circulation of misinformation are on the rise, and forms of cyberterror such as the dissemination of viruses and hacking are increasing (Misra, 2003). As these definitions imply, computer and security experts do not take seriously the connection between computer and physical attacks on people, although they believe that terrorists would coordinate a cyber attack with other forms of attacks against physical infrastructure, such as those on Sept. 11.2 The threat of cyberterrorism and/or cyber crimes growing with the deployment of use of the Internet and broadband services—a range of service speeds from 256 Kbps to 100 Mbps and up (ITU 2003c)―cautions us about the vulnerability of the information society. Many computer and security experts have come to understand that terrorists and cyber criminals are using today’s information infrastructure to bring havoc to computer traffic and thereafter safety (Sofaer et al., 2001, vii; Garfinkel, 2002). Several governments, from the U.S. to developing countries, have also recognized that the number, cost, and sophistication of these attacks are rising at alarming rates, with aggregate annual damage worldwide now measured in billions of dollars (Garfinkel, 2002). Computer and security experts fear that cyberspace could be terrorists’ next target because they have seen a clear warning in the terrorists’ reliance on and expertise in Internet and broadband services, in particular, after the September 11 terrorist attacks. As Brynjar Lia (2005) points out, “terrorist groups will become increasingly adept at exploiting information technology in a growing number of files.” It hadsbecome clear that the computer communication infrastructure, on which wealth, information, and power in our world depend, is highly vulnerable to intrusion, interference, and disruption (Castells, 2001). Cybersecurity measures therefore have come to the attention of governments and corporations as a significant means to protect society from cyberterrorism (Kizza, 2002). This paper studies how the swift growth of broadband services, one of the most significant developments in information technology, has led to negative effects, in particular, cyberterrorism and/or cybercrimes, by exploring the relationship between new technology and cyberterrorism. It does not aim to provide solutions to cyberterrorism and cybersecurity; instead, it raises the questions of critical values, ideas, and ethical issues of 2 Several scholars clearly differenciate between cybercrimes and cyberterrorism. For instance, Barry Sandywell (2006) defines cybercrimes as money laundering, drug trafficking, credit card fraud from cyberterrorism and hacking. However, as explained above, cyberterrorism is not directly related to physical attacks on people unlike traditional terrorism, and it includes attacks in cyberspace; therefore, one should note that the concepts of cyberterrorism and cybercrimes are more generally interchangeable in this paper. Cyber-Terrorism and the Information Sword 21 Information–MFCSIT'06 National University of Ireland, Cork, Ireland, August 1 - 5, 2006 cyberterrorism and cybersecurity in relation to broadband services. It then discusses the relationship between people and technology to develop a research framework that would help to expedite research on broadband with insights drawn from the analysis of critical considerations. This paper broadly employs the critical approach on technology as an analytical framework for examining negative aspects of broadband services. As well documented, neo-Marxists such as political economists and radical and/or cultural theoreticians critically analyze the forms of oppression and power associated with new technology. They emphasize that technology can mainly be understood relative to a particular set of class interests that are shaped by a dominant class hegemony. They contribute to the maintenance of deeply rooted inequalities in power in today’s so-called information or knowledge societies (Mansell, 1999, 2004; Saravanamuthu, 2002). Although the critical research on technology is not a mainstream approach in studying the diffusion and use of new technology, it is of significance to interpret the essence of technology, in particular, in the current capitalist society; therefore, a few scholars have argued for a critical approach to new technology. This tradition acknowledges that modern capitalism is symbolized by its revolution in high technology, including computers, telecommunications, broadband, and digital systems (Sussman, 1997). Among these, Feenberg’s idea of technology (1991) significantly contributes to theorizing about a critical approach. He calls for a Marxist-based critique and claims that technological innovation has functioned to divide the members of capitalist industrial societies into two groups. One group is made up of intellectually skilled managers or technical experts, while the other groups contain much larger numbers of deskilled and less valued labors (1991). Dyer-Withefold (1999) has also criticized hierarchical managerial and economic models and the type of technological innovation they breed because such technological innovation stunts human potential and undermines democratic practices. More importantly, the political economic approach to the mass media and communication has contributed profoundly to developing a critical theory of technology. Media scholars (Schiller, 1999; Garnham, 2000; McChesney, 2000; Boyd-Barrett, 2006) have elaborated this analysis with detailed research into the operations of the capitalist media. While several information society theorists claim that a proliferation of technologies and channels democratizes and diversifies opinion formation (Downing, 1989; Jaffe, 1994), Nicholas Garnham (2000) emphasizes that a political economy of new media should seek to understand the way in which power is structured and differentiated, where it comes from and how it is renewed. This suggests an examination of new media to show how the structuring of global networks and digital information flows and their consumption are informed by predominant and alternative principles, values, and power relations (Mansell, 2004). As McChesney (2000) argues, communication and information technology should not be influenced by exploitation. In contrast, as of today, the whole driving force for the rapid growth of communication technology, including the Internet and broadband services, considers new technologies as profitable business and useful for the exploitation of society rather than as a public service agency. In fact, technologies embody social choices made by those with power over their construction. Cyber-Terrorism and the Information Sword 22 Information–MFCSIT'06 National University of Ireland, Cork, Ireland, August 1 - 5, 2006 As these theoreticians have argued, the critical approach to technology is representative of a contemporary trend in social theory, although it is a less common paradigm. A technological process achieves advances of general utility, but the concrete form in which these advances are realized is determined by the social power under which they are made and ensures that they also serve the interests of that power. According to this view, technology is a dependent variable in the social system, shaped for its purpose by the dominant class, and subject to reshaping for new purposes under a new technology. This article aims to contribute to this ongoing debate of critical research on new media with an example of rapidly growing broadband services and their relationship with cyberterrorism and/or cybercrimes. Cyber-Terrorism and the Information Sword 23 Information–MFCSIT'06 National University of Ireland, Cork, Ireland, August 1 - 5, 2006 Cyber-Terrorism, Information Warfare, and the Olympics: An Application of Information Filter Theory (Chomsky & Herman) to Security against Terrorism in the Modern Olympics Michael Real Diana Beeson Royal Roads University (2005 Sooke Road, Victoria, BC, Canada V9B 5Y2, Tel.: 250-3912600 ext.4436, E-mail: michael.real@royalroads.ca) Abstract: Modern political terrorism is a form of information warfare, born in the desire to break through mainstream information media via shock value and countered by establishment information efforts to discredit and destroy terrorists, their acts and their political agenda. At the same time, governments use mainstream media, to exploit terrorist acts and threats to foster fear among their citizenries with the aim of solidifying legitimacy and rule. In 1972 the Black September hostage-taking of 11 Israeli athletes captured world attention as it unfolded on TV screens around the world. Today security efforts to control and contain information and physical access to high visibility events like the Olympics become expensive pre-occupations of host cities and the governments of the host countries. The media “information filter theory,” labeled the propaganda model and developed by Edward S. Herman and Noam Chomsky (1988), examines the processes and structures that determine which news perspectives will predominate and which will be marginalized. This paper applies that model to issues of cyber-terrorism and the information sword, with particular reference to terrorism, security, and the Olympic Games. Herman and Chomsky’s original model included “anti-communism” as a component of their information theory model. In this paper, we maintain that the “anti-communism” component has been replaced by “anti-terrorism.” Unclassified literature on terrorism, security, and the Olympics is limited. “Stochastic Modeling of a Terrorist Event via the ASAM System” (Singh et al., 2004) was written by a group at the University of Connecticut in the U.S. The group applied its Adaptive Safety Analysis and Monitoring (ASAM) to two hypothetical terrorist activities at the 2004 Athens Olympics using a combination of tracking models that involve variable at each moment of time. In another study, a large team of medical and information specialists developed an automated syndromic health surveillance system for the Salt Lake City Winter Games in 2002 (Gesteland et al., 2003). Both the 9/11 attack and the first anthrax release through the U.S. Postal System occurred in the six months prior to the start of the Salt Lake City Games. The system monitored more than 114,000 acute care encounters in order to instantly identify possible bioterrorism outbreaks. None were detected. An extensive overview by Chris Johnson of Glasgow University (2006) traces in great detail the history of terrorism and security arrangements for all Olympic events since 1972. Cyber-Terrorism and the Information Sword 24 Information–MFCSIT'06 National University of Ireland, Cork, Ireland, August 1 - 5, 2006 In Steven Spielberg’s 2005 film, Munich, Black September members explain that their Olympic hostage-taking finally had captured the Western world’s attention and publicized the reasons behind their actions in the mainstream Western media. In a striking comment, a member of the Israeli assassination team, charged with eliminating the surviving hostage-takers, analyzes the effect of having blown up several members of Black September. He notes that, in response, Black September mounted several new and bloody attacks. The Israeli concludes without emotion, “Now we’re in dialogue.” The dialogue between the two death-wielding groups - one pro-Israeli, one pro-Palestinian takes place through mass media reports of the brutal successes of each. This dialogue exemplifies information warfare in the age of terror. Information in the mainstream Western media is essential to terrorist strategy. In a Faustian bargain, the media inform, excite, and expand their audiences with vivid coverage of terrorism. Terrorists depend on the same coverage to intimidate and confuse and also to show their resilience in the face of massive efforts to contain and eliminate them. In what can only be described as a further perverse twist in information warfare is the way that Western governments, the U.S. most notably, initially use media coverage of terrorism as a rallying cry, in spite of the fact that their own failures in policy, security, and intelligence contribute to their happening in the first place. The Herman/Chomsky model explains several aspects of these trade-offs among media, terrorists, and governments. First, the model clarifies the deep background of selective media emphases that structures the readily observable polarization of world opinion, side-taking, and agendas. Herman and Chomsky identify an institutionalized “dichotomization” in news that favors establishment versions of world events “by controlling how ideas are presented to the public, and also by limiting the range of credible alternatives” (Klaehn, 2005, p. 7). Since they first articulated their theory almost two decades ago, the Internet, has accelerated this polarization through increased self-selection of news and information sources. The Internet allows individuals of all stripes to select information that confirms their own worldview. This increases polarization, extremism, and conflict. Terrorists use selective information to support their own position and attempt to influence public opinion. Counter-terrorists do the same. Media on both sides express and confirm their audiences’ pre-conceptions, validate hard-line positions, and legitimate the status quo in governance. Western “free” commercial media fall into this trap through what Herman and Chomsky identify as five mechanisms that distort news. (1) Ownership and profit-orientation favors establishment-serving information and interpretation. (2) Advertiser sponsorship and pressure protect the system. (3) Selectivity in news sources ensures government, corporate and accepted experts interpret the news. (4) “Flak” discredits opposing points of view and eliminates deviance. (5) Anti-communism [we suggest inserting instead “anti-terrorism”] forces conformity. In applying this model, they are able to explain the elimination of legitimacy for the groups that eventually named as terrorists: News from primary establishment sources . . . is readily accommodated by the mass media. Messages from and about dissidents and weak, unorganized individuals and groups, domestic and foreign, are at an initial disadvantage in sources costs and credibility, and they often do not comport with the ideology or interests of the gatekeepers and other powerful parties (p. 31). . . . This tends to close out dissenting views (34). Cyber-Terrorism and the Information Sword 25 Information–MFCSIT'06 National University of Ireland, Cork, Ireland, August 1 - 5, 2006 A second contribution of the Herman/Chomsky model is its identification of the power of the “dominant ideology” as an information system filter. The dominant ideology in 1988 was anti-communism, but Herman subsequently conceded this fifth filter perhaps should have been originally labeled dominant ideology. Chomsky notes that anticommunism was replaced in the 1990s by a dichotomy of “otherness.” Since then this fifth filter’s simple bipolar picture of the world has replaced anti-communism with “antiterrorism,” abetted by the Bush and Blair emphasis on this fundamental divide. The end of the Cold War left a vacuum in bipolar worldviews and popular ideology. No longer were all foreign policy decisions made simple by whether they favored the Communists or their enemies. With the elevation of the War on Terror to an all-encompassing global struggle, once again simple polarities can guide policy and thinking. The violence of terrorists makes the military-industrial complex once again justified and gives it a ready target. The villainy of the “other” confirms “our” virtue. The systematic and organized forces behind the “Axis of Evil” and other terrorist sponsors enable anti-terrorism to expand in scale and demand vast resources. Entrenched terrorist cells and seedbeds require the War on Terror to continue as a permanent state, reminiscent of the absoluteness and longevity of the Cold War. The unpredictability of terrorism requires constant vigilance and maximum readiness. Its potential destructiveness recalls the fearsome specter of communist nuclear aggression. Terrorism’s ability to strike with dramatic force anywhere justifies massive military expenditures, restrictions on civil liberties, and other actions similarly carried out by some and questioned by others during the Cold War. A third contribution of the Herman/Chomsky propaganda model is how it underscores the role of information selection and flow. The potential manipulation of information in the form of cyber-terrorism creates possibilities for disrupting or destroying high-visibility targets with maximum dramatic effect. What are the characteristics terrorism needs to be successful? The Olympics provide a ready example. The symbolic association of the target with the terrorist’s enemies leads to attacks on the ultimate monument to capitalism, the World Trade Center, and the military control center of the West, the Pentagon. Commuters on a London subway symbolize the work of Western capitalism. A Bali nightclub represents the decadence of consumer culture and entertainment. The Olympics are of little meaning or attraction in the Muslim world and within other dissident groups. The Olympics epitomize the competitive strivings of Western culture. Rooted in ancient Greek mythology and practice, the very slogan of “faster, higher, stronger” imply a worldly zeal and materialism less attractive to nonWestern religions and ideologies. The visibility of a terrorist target correlates with the terrorist’s desired impact in the dominant visual media and on public emotion. Tall buildings, large crowds, public figures all offer a physical presence that can be attacked in ways that can be seen. The target is visual, the act is visual, and the effects are visual. In a world in which television is the dominant medium, the visibility of terrorist targets is essential. If “cyber-terrorism” were to impact only information systems, no matter how profoundly disruptive, it will only be successful if the results are visible in conflagrations, catastrophes, and death. The Olympics rely on immense, complex, inter-connected information technologies for their preparation and execution. Profound as the effect of hacking into the system might be, as a threat in early February to the Turin Olympics warned, visible results are the most sought after effect of terrorist acts, even if it is as Cyber-Terrorism and the Information Sword 26 Information–MFCSIT'06 National University of Ireland, Cork, Ireland, August 1 - 5, 2006 distasteful as the grisly beheading of a hostage. The scale of the target and its visible destruction is important to terrorist effectiveness. Large buildings, crowds, and events suggest themselves as targets. Timothy McVeigh chose the large, visible “federal” building to represent the government he feared and resented. Black September knew the world’s media attention would be focused on Munich for the Olympics. Hundreds of millions of television viewers throughout the world would see this act. What greater opportunity could there be for impacting public awareness? The drama of the terrorist act plays a role. In the film Munich the assassination squad was instructed not to kill but to “blow up” the Black September hostage-takers and planners. Bombs dominate terrorism not only for their tactical value – remote detonation, expansive destructiveness, portability, delivery by non-professionals, etc. – but also for their dramatic appeal. The explosion offers rapid and partially random destruction, smoke and fire, noise, confusion, Hollywood-like special effects. The drama of Black September members in their black hoods with weapons visible on a balcony in the Olympic Village in Munich was clear, as was the wait for resolution of the stand-off. The Vancouver Organizing Committee (VANOC) has budgeted $175 million (CDN) for security, compared to $310 million for the Salt Lake City Games and $1.4 billion for the Athens Summer Games. The Vancouver budget is split 50/50 between the federal and provincial governments. VANOC has created the Olympics Integrated Security Unit which combines personnel from the Royal Canadian Mounted Police (RCMP), the Vancouver Police Department, and the Department of National Defence. The chief operations officer is RCMP Superintendent Robert Harriman. Almost twothirds of the budget, $110 million, is for police personnel. Summarizing the challenge to Vancouver, Charlie Smith (2006) writes: “Vancouver would be a soft terrorism target because of its geography and because Canadian political leaders are complacent about security. The rugged terrain along the Sea to Sky Highway is ideal for ambushes. The region’s many bridges serve as choke points where large amounts of traffic can be disrupted. The new RAV line, which will travel underneath Cambie Street and downtown Vancouver, will afford opportunities for suicide bombers. The ferry system is vulnerable because anyone could drive onto a vessel in a vehicle packed with explosives. There will be two Olympic villages to protect, one in Whistler and one in Vancouver. And the distances between Olympic venues stretching from the Callaghan Valley to Richmond mean that athletes and officials will require lots of transportation, elevating security risks.” A major contribution of the Herman/Chomsky model is its ability to explain how propaganda warfare is now conducted. The drive to maximize audiences and expand advertising leads to sensationalism, papered over with lip service to the First Amendment. It is media’s narrowed vision that accounts for the marginalization that gives birth to terrorism. Ironically, the media’s willingness to publicize the effects of terrorist acts sustains the very terrorist methodology that the media then condemn. Further, governments play into the equation by exploiting media coverage of terrorist acts to sustain, justify, and legitimize their own self-interests. Information warfare has become a central dynamic and pre-occupation in contemporary public life. Understanding the place of information in terrorism and counter-terrorism is a major step toward combating cyber-terrorism and the information sword. Cyber-Terrorism and the Information Sword 27 Information–MFCSIT'06 National University of Ireland, Cork, Ireland, August 1 - 5, 2006 Kavkaz Center vs. Kremlin: Cyber War and Propaganda during the Second Russia-Chechnya Conflict Elina Yalov University of Leeds (Dixon Lane Road, 28, Leeds LS12 4RU, Mobile: 07738934584/+79629446390, E-mail: iscey@leeds.ac.uk) Abstract: One of the major differences between the two Russia-Chechnya conflicts (1994-1996, 1999-present) was in the nature of media coverage. While the first conflict was covered freely by the Russian, Chechen and neutral press, the second one had been developing in the information blockade environment. During the years of the first conflict, the Russian government gave nearly the free entrance to Chechnya and almost didn’t try to shape the news reports. Hundreds of journalists had been working in the Chechen territory – showing the reality, as they saw it. After the end of the first conflict, the Russian military and the government accused the press in subjectivity. The “forth power” from their point of view manipulated the public opinion in a way suitable for the Chechen rebellions, the fact that caused Russian withdrawal from Chechnya and their signing the Hasavjurt peace agreement in 1996. At the end of 1999, with the beginning of the second conflict, the Chechen Goebbels, Movladi Udugov, started his propaganda campaign, which was very similar to the one he had been leading in the previous conflict. Since it was very successful in the few first months, the Chechens decided not to change their first conflict’s tactics, and that turned out later to be a great mistake. From the beginning of the year 2000 it became obvious that Russia was intending to close Chechen information borders, the fact that demanded creation of the new propaganda strategy. The free flow of information, from and to Chechnya, was stopped and that prevented Chechen ideologists from spreading their ideas and gaining the support from Russian, European and American public. During the years of the second conflict Chechen separatists and terrorists found number of ways to break Russian information blockade. One of them was using the internet sites and forums in order to promote their point of view. Kavkaz Center, the news agency, which was established in March, 1999 by Movladi Udugov, became one of the most important Chechen terrorists' sites. In its early days Kavkaz Center that was poorly organized, written in very low English and used a lot of disinformation material, was unpopular. People were mostly entering the site for citing it in order to make fun of its texts. But in many cases bad publicity is better than no publicity at all, so in a while Kavkaz Center became quite well known. Within some time, when its content and layout improved, the site became the real threat for Kremlin’s official propaganda. Cyber-Terrorism and the Information Sword 28 Information–MFCSIT'06 National University of Ireland, Cork, Ireland, August 1 - 5, 2006 During its first years the news agency was mostly using counter propaganda techniques. It was revealing Russian disinformation material, publishing secret Russian documents and orders - all that to do demonization to Russians. The site also used to minimize Chechen and maximize Russian casualties in its reports. This tactic’s purpose was to demoralize Russian troops and to encourage Chechens attending terrorist groups. During its first year Kavkaz Center used to quote a lot different Chechen politicians, fighters and leaders. Some facts that were published showed that agency’s journalists had very good sources of information in Russian and Chechen governments and all this added credibility to the site. It must be added here that in its early days, Kavkaz Center rarely used Islamic themes and motives that could be widely seen since 2001. In this year the agency started to give accent on the news and in 2002 the site’s format and layout were totally changed. The 1999-2001 archives were blocked and Kavakaz Center’s propaganda became much less visible. This strategy turned out to be more effective and taking into consideration that Kavkaz Center was the only big alternative source of information for Russian propaganda machine, it could now be understood that its popularity grew very fast. Different types of propaganda, like atrocities, big lie strategy, disinformation and brainwashing started to prevail. The site tended to show Russians as barbarians, killers, rapists and to publish different anti-Russian documents, speeches and articles. As it was said before, the Islamic motives were also brought up by the journalists, for example Darvin’s evolution theory was called “satanic” because it was going against the religious texts. The calls for studying the religion and the calls for performing extremist acts were also appearing quite frequently on the site and became the biggest part of the brainwashing system: “The lack of literature knowledge, for example, won’t affect our life in this or other world in any way, but lack of Allah religion knowledge will destroy us in both worlds” (28.06.2006). “Now tell me, what Muslim scholar will dare nowadays to insist, that the defensive Jihad isn’t mandatory for each Muslim…? Fight against them until idolatry is no more and God's religion reigns supreme… [Koran, 2:193]” (09.01.2005) The disinformation tactic was also used widely by the agency. Publishing false documents and facts, bringing false figures of supporters or dead Russian soldiers was the regular practice of the site. In the Constitution of Russian Federation (article 29) written: “Propaganda or campaigning inciting social, racial, national or religious hatred and strife are impermissible. The propaganda of social, racial, national, religious or language superiority is forbidden” (Russia – Constitution). This paragraph gave the Russian government and its intelligent services the legitimate cause to start the cyber war against the news agency, which was, from Russian point of view Violating the Constitution. The site became the Russian intelligence’s and Russian hackers’ battlefield. While in 1999 the group of students from Tomsk (Russia) hacked quite easily the site of the Chechen separatists and changed it’s start page, later they failed doing that. The first internet battle started on the 30th of August. Tomsk group changed the front page of the site and put the picture of the famous poet Michail Lermontov, dressed like a soldier with a gun in his hands. The text that was added to the picture said: “Misha was here. Kavkaz.org and Amina.com (another site of the Chechen separatists – now closed) were shut down because of the Russian citizen’s demands. This will happen to all Cyber-Terrorism and the Information Sword 29 Information–MFCSIT'06 National University of Ireland, Cork, Ireland, August 1 - 5, 2006 terrorists’ and killers’ sites”. After a few hours the front page started to change from the original to the hacker’s one every few minutes. The Chechens tried to restore the site dozens of times during the day, but initially failed. They managed doing that only on the next morning. After this cyber attack the site’s popularity grew rapidly, as the agency wrote, but after a few days the number of visitors dropped down to a few dozens instead of few thousands (Lebedev). The next hackers attack was in October of the same year and it took Chechens 6 hours to restore the site. The front page showed the grave with the epitaph “Kavkaz Center”. Within some time the tactic of different “enthusiasts” and government groups had changed and they started corresponding with hosting companies all over the world, assigning permanent IP addresses to the site, in order to convince them refusing providing the agency with the hosting services. It must be added here that most of the “enthusiasts” weren’t independent and had contacts or worked for FSB. After 9/11 Canada and US hosting firms became very influential and accepted easily the demands not to provide hosting services to “Chechen terrorists”. Verio Inc., WebHosting.Com Inc. and XO Communications, Inc. were the first companies to refuse providing host services to Kavkaz Center. In 2002, when the agency became international, i.e. started publishing the news from Afghanistan, Iraq and other Islamic countries, Tomsk group managed to hack it once again. They changed the start page and left the massage saying: “We have pulled out a sting from the stinky mouth of the ‘Bow-Wow Center’ and now there is silence spreading over the den of the Chechen terrorists…” The group hacked the site after the “Nord-Ost” terrorist act in October 2002, when Chechen terrorists took more than 700 hostages in the theater in Moscow. The Russian government sent a note to Lithuania, where Kavkaz Center’s server was based at the time, asking to shut the agency down, and when they refused the Tomsk group took their own steps (06.02.2002). It must be admitted here that each time the agency had been attacked; it managed to recover its contents very fast. The only time the site didn’t work for almost a month was in summer, 2003. Kavkaz Center, that had very big problems with host services in US and Canada, moved to Estonia and after that to Lithuania. It was closed in Estonia in April 2003 after the ceaseless demands from Russian Ministry of Foreign Affairs and was reopened two weeks after that once again in Lithuania, where the agency was shut down for almost a month but after that was reopened and its texts were fully recovered. It must be added that this cyber war gave the best publicity to Kavkaz Center. All Russian major information agencies mentioned site’s closures and as a result, all those who never heard about the Kavkaz Center, were now following impatiently after the development of the events. All this changed after the 1st of September 2004, when the group of Chechen terrorists took more than thousand hostages in the city Beslan, North Osetia. More than 300 hostages: men, women and children died in this operation. So when one of the terrorists announced by Kavkaz Center that he had been responsible for Beslan tragedy and the explosions of the two airplanes earlier this year – the Russian government decided to destroy the agency once and for all. After Beslan Lithuanian government had very dynamic debates about shutting down the site. At this time the agency moved to Finland, where it was closed almost immediately by the Finnish internet provider Cyber-Terrorism and the Information Sword 30 Information–MFCSIT'06 National University of Ireland, Cork, Ireland, August 1 - 5, 2006 ‘Sonera’ (11.10.2004). In September of the same year the site was under attack again. Though Kavkaz Center’s leaders wrote and explained that these attacks were useless, not only because they had all the back-ups on 3 different servers, but also because they became stronger and more popular after them, they continued. In December of the same year Rimanas Pashis, the director of the private company ‘Elneta’ in Vilnus gave the interview to radio ‘Liberty’. He explained that the mirror site was still working in Lithuania, though the primary one operated in Sweden. It was shut down by the government only in May 2006 (06.05.2006). In the end of 2005 the cyber war changed its face once again. The hackers started the spam-war and the DoS attacks. The agency’s spokesmen wrote that FSB agents were sending a lot of spam emails signed by Kavkaz Center to different foreign users and also managed to block the agency’s paypal account. The aim of the spam-war was to make users complaining to internet provider on the site’s owners in order to shut it down. The second attack was the DoS one. It was lasting for a few days and managed to disrupt the site’s work, but as usual it was recovered fully by the agency’s technicians (18.10.2005). Cyber-Terrorism and the Information Sword 31