The introduction of the computer has created a new type of terrorism known asinformational terrorism, which presents a threat, equal to or greater thanphysical terrorism. E-mail bombs and attacks on internet servers are the lowestforms of informational terrorism in terms of destruction. Higher forms ofinformational warfare include using the internet as a catalyst to producephysical terrorism on a higher scale.
“The national security establishment isconcerned with a new form of conflict; informational warfare.” (Devost, 1) TheDepartment of Defense definition of terrorism is "the calculated use ofviolence or the threat of violence to inculcate fear; intended to coerce or tointimidate governments or societies in the pursuit of goals that are generallypolitical, religious, or ideological." (Research, 1) While in physicalterrorism, the perpetrator must come in contact with the target, ininformational terrorism the perpetrator only needs a computer connection. Notonly are the tools of information terrorism more accessible but the implicationscan be more devastating. In conjunction with the Internet and the infancy of itslaws, the criminal justice system has fallen behind with its vague set ofincoherent laws.
Terroristic violence, as portrayed in Tom Clancy’s Clear andPresent Danger, presents a serious threat to the U.S. which should be dealt notonly with caution and security, but also in conjunction with response.“Identifying international terrorists and their networks providing warning sothat protective or deterrent measures can be taken, and gathering information onterrorist acts require a major U.S. intelligent effort.
” (Wilcox, 1) In TomClancy’s Clear and Present Danger, information is not correctly distributed toU.S. agents causing underestimation of enemies. To rectify the drug probleminitiated by Columbia, both the United States and Columbia use physicalterrorism to contend one another. After Colombian drug lords murder a UnitedStates ambassador, the United States retaliates by mounting a series of covertoperations including assassinations and interdiction of drug production andsmuggling. Does the Colombian drug lords murder of one man justify the reactionsof over exertion of force from the U.
S.? Tom Clancy used small teams of covertoperatives to launch a counter attack on the Colombians. The U.S.
currentlyemploys a strategy similar to this. “To respond promptly to terroristincidents abroad which require varied U.S. resources, we have developed a uniquefast reaction team. This team, led by an officer from S/CT, consists of expertsfrom DOD, CIA, FBI and other agencies, as needed. At the request of a foreigngovernment or an U.
S. Ambassador abroad, this team can be dispatched within afew hours on a specially dedicated aircraft provided by DOD to any place in theworld. The team's job is to provide support to the Ambassador and the hostgovernment in resolving a terrorist crisis, and to advise on additional U.S.assets that might be needed.
”(Combating, 2) This response does not only embodyClancy’s counteraction but surpasses it with the annexation of whatever forceis necessary. “Small, tailored teams can be launched, depending on the crisis,and specialists from individual urgencies can be sent alone, as the situationarises”(Wilcox, 2) If the product of physical terrorism is fear and death, howcan information terrorism render a greater threat? “Considering the presenceof computers in modern society, it is not surprising that terrorists haveoccasionally targeted computers systems in the past.”(Devost, 2)“Information terrorism is the nexus between criminal information system fraudabuse, and the physical violence of terrorism”(Devost, 2) “Informationtechnology offers new opportunities to terrorists”(Devost, 1) “Informationwarfare, loosely defined, is targeting the information and information systemsthat comprise and support civilian and military infrastructures of an adversary.Information warfare runs deeper than attacks on tanks and troops: an informationwarfare campaign can target and disrupt the information and networks thatsupport crucial day-to-day workings of civilian, commercial, and militarysystems, e.g.
, air traffic control, power grids, stock markets, internationalfinancial transactions, logistics controls, etc. ”(Informational, 1)“Information technology offers new opportunities to terrorists. “A terroristorganization can reap low-risk, highly visible payoffs by attacking informationsystems. In an effort to attract the attention of the public, politicalterrorists perpetrate their acts with the media at the forefront of theirstrategy: this strategy calculus is based on the assumption that access to thecommunication structure is directly related to power.” (Informational, 1) Inshort, informational terrorism can affect millions of people, thousands of milesaway, without leaving a trail for restitution.
“Terrorism is a rapidlyevolving and responsive phenomenon.” (Devost, 1) “It is war in which thereare no front lines and in which terrorism practitioners have intentionallyblurred the distinction between combatants and noncombatants.”(Responding, 5)Any type of terrorism is too destructive, whether it’s as small as akidnapping or as complex as state-sponsored terrorism between two conflictinggovernments. “Terrorist violence represents a serious threat to U.S.personnel, facilities, and interests around the world”(Responding, 4) “Astechnology becomes more cost effective to terrorists – that is, itsavailability and potential for disruptive effects rise wile its financial andother costs go down.
”(Devost, 2) “To combat this growing threat, manymembers of Congress have recently proposed anti-terroristlegislation.”(Terrorism, 1) In my opinion the response to terrorism is toolate. When presented with an act of violence the counter-action will involveviolence. After the operation has transpired the anti-terrorism is onlyvengeance. The only true way to combat terrorism and terrorist activities isprevention. “The war against terrorism will be a protracted conflict.”(Responding, 5) “Terrorism for the foreseeable future will remain a weapon ofchoice for government groups, and other parties to conflict.” (Responding, 4)