Sie sind auf Seite 1von 36

Cyber Security

In this age where the use of computers and networks related to them has become
commonplace, there has developed problems concerning cyber security. Cyber
security is an important factor to be considered if one is to be able to protect
oneself from malicious people and software from the internet. Most of the threats to
computer networks come from the internet and these are often intentional, having
been developed by people with malicious intent. Cyber security is, therefore, an
attempt by individuals to protect their personal information and other digital assets
from attacks from the internet.
Cyber security involves various steps the most important of these being an
individuals understanding of the different forms of attacks that they are likely to
encounter. Once one has knowledge of this, then it is his or her responsibility to
ensure that they have put in place the best security system they can get their
hands on. There exist different types of threats and these can be considered to be
of varying levels and risks to an individuals personal information in their
computers. The higher the possibility of an attack, the more advanced the security
system that is to be put in place to ensure that the threat is minimized.
Cyber security involves dealing with threats that range from malicious codes, which
are known as malware and spyware, to computer viruses. Some of these viruses are
so serious that they have the ability to erase entire operating systems of
computers. These viruses also enable hackers to have access to all the data stored
in the infected computers, ensuring that they have access to information, which can
be used for personal gain.
It is, therefore, necessary for individuals to avoid such intrusion into their computer
systems by having the best cyber security systems. These involve the acquisition of
antivirus software that is reliable as well as frequently checking this software to
ensure that they are preventing attacks. The software has to be frequently updated
so that there is an assurance that it is working at its full capacity, hence additional
security against attack. It is important to ensure that individuals are conscious of
their cyber security because it is not known when a threat is likely to be
encountered.
The importance of cyber security in modern Internet age
The internet has become the integral part of todays generation of people; from
communicating through instant messages and emails to banking, travelling,
studying and shopping, internet has touched every aspect of life. With the growing
use of the internet by people, protecting important information has become a
necessity. A computer that is not having appropriate security controls can be
infected with malicious logic and thus any type of information can be accessed in
moments. Number of infected Web Pages and malicious websites can be seen every

day that infects the computer and allow hackers to gain illegal access to other
computer systems.

Hacking of important data, network outages, computer viruses and other cyber
related threats affect our lives that range from minor inconvenience to serious
incidents. Cyber threats can be caused due to negligence and vulnerabilities, or
unintentional accidents. Nevertheless, they can also be planned or intentional, like
hacking or access by unauthorized users. The main objectives of such type of
system attackers or hackers are to steal confidential information, to make illegal
monetary transactions, to destroy or to change data and the like. System attackers
can be terrorists, crackers or recreational hackers. They have a variety of tools that
can harm or infect the computer; usually they use malicious logic or virus to gain
unauthorized access to a computer. Opening email attachments that carry the virus,
clicking malicious links or websites or unintentionally downloading a dangerous
program are common ways through which a computer can be infected and data can
be stolen.

As the number of data networks, digital applications, as well as internet and mobile
users are growing, so do the chances of cyber exploitation and cyber crimes. Even a
small mistake in securing data or bad social networking can prove to be extremely
dangerous. If accounts are not properly secured, it makes easier for hackers or
unauthorized users to spread viruses or social engineered attacks that are designed
to steal data and even money. Such types of issues highlight the need for cyber
security as an essential approach in protecting and preventing data from being used
inappropriately.

In simple language, Cyber Security or Information technology security means


protecting data, networks, programs and other information from unauthorized or
unintended access, destruction or change. It can be also be defined as all
operations and activities that are undertaken to minimize threats and any kind of
vulnerabilities, and enforcing required policies for prevention, data assurance,
recovery and other cyber security related operations. It encompasses all the
mechanisms and processes that protect digital equipment, information and records
from illegal or unintended access, manipulation or destruction.

In todays dynamic environment, cyber security has become vital for individuals and
families, as well as organizations (such as military, government, business houses,
educational and financial institutions, corporations and others) that collect and store

a wide range of confidential data on computers and transmit that to other


computers across different networks. For families, protection of children and family
members from cyber crime has become substantially important. For an individual,
protecting information that could impact social life as well as personal finance is
essential. The internet has provided a wide array of learning opportunities, but there
are risks too. Photos, videos and other personal information shared by an individual
on social networking sites such as Facebook, Twitter can be inappropriately used by
others may lead to serious and even life-threatening incidents. Social networking
sites have become the most popular medium for sharing information and
connecting with other people. But these sites have created varied opportunities for
cyber crimes, compromised personal identities and information leakage. Therefore,
it is important for individuals to understand how to protect against cyber threats,
and must also comprehend the difference between virtual and real world. One
should learn how to protect computers and personal information from being hacked
and should engage in appropriate online behavior in order to eliminate changes of
cyber threats and thereby creating a safer online environment.

Business organizations, mainly small and medium-size face critical challenges in


protecting data. Limited financial and technological resources make it difficult for
them to upgrade security system and to stay updated with technology. However,
better awareness towards cyber security and proper planning can prove to be very
beneficial for such business organizations in protecting their information and trade
secrets from being disclosed. Many small business organizations are now taking
initiatives to protect their information from being accessed illegally.

Cyber security is equally important for local, state, and central government as these
organizations maintain a huge amount of confidential data and records concerning
the country and its citizens. Yet several government organizations face difficulty in
protecting data because of inadequate secured infrastructure, limited funding and
lack of security awareness. Stealing of confidential data or sensitive information,
digital by terrorists from government organizations, as well as digital spying can
lead to serious threats on a country. For this reason, cyber security is of paramount
importance for government organizations also and is a vital asset to the nation

The increasing use of the internet and social media has made cyber security even
more important that it was before. Growing cyber threats such as data theft,
phishing scams and other cyber vulnerabilities demand that users should remain
vigilant about protecting data. It is essential to understand the varied type of risks
and vulnerabilities that exists in the Internet world. For every user, it is important to

think before connecting to someone using online medium. Users should also think
prior to sharing any information with other users through the internet.

Cyber Crimes Precaution And


Prevention Information Technology
Essay
13.1. Introduction
Whole world is now increasingly dependent on computer and internet services. Almost all the social
and economic activities have shifted to computers and internet including match-making, accounting,
business, banking, cash disbursal, etc., when majority of human activities are being shifted to cyber
space, than criminal relatives is naturally to shift to cyber space. We have to now gear up to face it
and make devices to prevent it.
The cyber-crimes are comparatively more serious due to the internet characteristic and network
functioning. Its global nature and scope of anonymity is an encouraging factor for the cyber
criminals. Criminals are able to use the technology to conduct their activities in much sophisticated
manner with relative safety because they may operate even from their homes and continents away
from the actual "scene of crime". The important factors, which facilitate the vulnerability of cybercrimes, are density of information and process in the network, comparatively easy accessibility to the
system, vulnerability due to dependence on telecommunication systems and uncertainties of the
complex logical processes.

This essay is an example of a student's work


Disclaimer
We cannot tackle hi-tech cyber-crimes in the traditional and concurrent ways. We have to make
innovative strategies and effective technologies to combat menace of cyber criminals. The ecommerce and e-banking is now major target to cyber offenders and they may result in huge
financial losses. It is high time that each of financial institutions must have a technological expert to
keep a watch on their system.

13.2. Awareness and Law Reforms


Present experiences with cyber-crimes are showing that the traditional laws, enforcement agencies
and concurrent, preparedness are guide inadequate enough to deal with cyber-crimes. Police
officers are not properly trained to deal with the situation. The investigating agencies are also not
well trained to collect, seize and preserve the evidences concerning cyber-crimes. The Indian
Information Technology Act, 2000, which is primarily meant to be a legislation to promote ecommerce, is not very effective in dealing with several emerging cyber-crimes like cyber harassment,
defamation, stalking and so on. It is often said that, The IT Act 2000 is not comprehensive enough
and does not even define the term' cyber-crime. In fact, the Act cites such acts under a separate
Chapter XI entitled "offence", in which various crimes have been declared penal offences punishable
with imprisonment or a fine but still there are several grey areas that exist within the law.
The well-known proverb "prevention is better than cure" may come to our help in the present
situation. The adequate people's awareness and law reforms should be adopted at the earliest to
deal with the hi-tech crimes. In the wake of creating public awareness against cyber crimes, an
expert Mr. Shailesh Zarker suggests a few security tips1 as follows :
(a) Avoid giving out any information about yourself in chat room.
(b) Children should never arrange face-to-face meetings or send their photographs online without
informing their parents.
(c) Use the latest anti-virus software, operating system, web browsers and e-mail programmes.
(d) Check out the site your are doing business with thoroughly. Send credit card information only to
secure sites.
(e) Use a security programme that gives you control over cookies that send information back to
website. Letting all cookies in without monitoring them could be risky.
(f) If you own a website, watch traffic and put host-based intrusion detection devices on your servers.
Monitor activity and look for any irregularities.
(g) Put in a firewell and develop your content off line.

(h) Make sure web servers running your public site are phYSically separate and individually
protected from your internal corporate network.
(i) Protect your database. If your website serves up dynamic content from a database, consider
putting that database behind a second interface on your firewell, with tighter access rules than the
interface to your server.
j) Back up your website after every update, so you can re-lauch it immediately in case of a malacious
defacement.
Besides awareness and any matter should be reported immediately to the police, it is also important
that the user must try and save any electronic information trail on their computers.

13.3. Improving Criminal Justice Administration


The law enforcement agencies, legal and judicial communities now require developing new skill to
combat with the challenges presented by computer crimes. The growing sophistication of
telecommunications systems and the high level of expertise of many systems operators complicate
significantly the task of regulatory and legal interventions.2 The ignorance of sophisticated
techniques among the law enforcing agencies and the familiarity with electronic complexity in the
general population is contributing to the rapid increase in cyber crimes. It is, therefore, now urgent to
educate these agencies about the complex computer techniques so as to make them competent in
enforcing the law. Law enforcing agencies, legal and judicial communities need to develop minimum
level of skills and expertise to understand the complexities of the computer networks and
sophisticated telecommunication systems so as to effectively deal with their possible misuse and
indulgence in criminal activities.
Gone are the days when the computer crimes were maintained limited to the economic activities and
therefore, the law enforcing agencies were given the training to deal with the economic offences
such as fraud, embezzlements, etc. But after advent of internet revolution all around the world
gripping the entire population of the world, the cyber crimes have acquired several forms affecting
vast areas and have reached all the forms of traditional crimes including women and drug trafficking,
industrial, banking and military espionage, etc. Therefore, the training and awareness campaign
cannot be limited to the level of any group of personnel on the law enforcing agencies but has to be
extended to all organisations involved in cyber crimes prevention endeavours.
U.N. Manual on the prevention and control of computer related crimes have identified five areas in
which appropriate training should be given to all the members of judicial administration and
enforcement agencies. These areas are as ollows:
(a) Knowledge of Difference between Civil Wrong and a Criminal Wrong: Since all forms of computer
abuse may not constitute a 'criminal offence, it is essential that persons concerned must be able to
differentiate between the civil wrongs and the criminal wrongs. The law enforcing agencies,
therefore, must be trained properly as to which activity or abuse of computer shall amount to a civil
wrong or constitute a criminal offence.

(b) Both Technology and Computer Trainings : Police must introduce compulsory computer training
to all its officers involved in detection, investigation and prevention of cyber crimes. Such training
should include both computer and technological trainings. In the lack of appropriate, technological
and computer trainings police personnel may commit serious error in the course of their duty. For
example, Mumbai Police once raided a house for alleged cyber crime but seized only monitor and
not the CPU (Central Processing Unit). The police officers, therefore, must have the adequate
technical knowledge. All persons involved in both prosecution and judicial duties must have
adequate technical knowledge to be able to perform the work of prosecution and adjudication
properly.
(c) Ability to Preserve Evidence and Present it Before the Courts: The task of collection of evidence
in the paperless transaction of cyber world have become a challenging job. It differs from the
traditional forms of evidences. It is, therefore, now essential that the legal system of present day
must change so that the investigators may be able to search, collect, maintain, preserve and present
it before the courts in a fair and proper manner. It is necessary because only well skilled personnel
can handle computer datas so that there may not be the risk of damaging or modifying the original
data.
(d) Involvement of the International Nature of Problem: In order to deal with cyber crimes, the
investigation must be able to understand and deal with international issues, including extradition,
mutual assistance, concerned laws, etc. Due to the global nature of cyber crimes, the investigators
are required to have fair knowledge of laws of evidence, criminal procedure and data protection of
other legal, jurisdiction while pursuing international investigation regarding cyber crimes.
(e) Rights and Priviledges of Involved Parties: UN further envisages that there should be training
programmes for the personnels involved in the cyber crimes' investigation and adjudication so that
they may be aware towards the rights and the priviledges involved in the cyber crimes. UN also
desires that the Criminal Justice Administration also must be sensitive towards this problem. This is
necessary because the credibility of the enforcement agencies involved in various jurisdiction
depends upon their equitable application of law. If aspect of human rights and privileges are taken
into consideration, this gesture will help in winning confidence of the people in general in the
administration and as a result the victims and others coming into the knowledge of cyber crimes shall
come fonvard with information and cooperation.

13.4. Increasing International Cooperation


The harmonisation of criminal and cyber laws at international level and cooperation between
countries are now very essential for tackling the problem of cyber crimes. The advent of internet has
virtually broken the national boundaries and whole world has not turned into a global village. The
efforts at the level of organisation like OECD, UN, Council of Europe, etc., are afoot for increasing
international cooperation. The convention of European Council has taken resolution to increase
international cooperation among member countries for the timely assistance to each other in
preventing and detecting cyber crimes.

Some private organisations and universities have also come forward for strengthening international
cooperation for the sake of checking cyber crimes. Stanford University, for example, has organised a
conference on International cooperation to fight against terrorism and cyber crimes in December,
1999 and resolution was introduced in August, 2000.3 The international organisations, such as
Interpol, are also making efforts in the field. Interpol organised first training camp to train
investigators of cyber crimes in 1981. Thereafter several seminars were organised in different parts
of the world.

This essay is an example of a student's work


Disclaimer
U.S. Attorney General in January, 2000 suggested state and local law enforCing agencies to adopt
the following measures to:
(a) Establish a 24-hours cyber crimes point of contract network where law enforcing agencies
belonging to federal, state and local law enforCing agencies may meet with each other to exchange
their information. Their contact should be coordinated through a centralised "command centre".
(b) Create an online clearing house for sharing information to avoid duplication of effort and multiple
investigation of the unlawful conduct in the cyber world.
(c) Organise conferences of all state and local cyber crime investigators annually or bi-annually for
discussion on recent developments, sharing of cases, progresses, enforcement of networks, etc.
(d) Develop new additional policies and mechanism to increase international cooperation between
world's law enforcing agencies and investigators and to encourage coordination among them.
Cyber crime cannot be checked unless it is made an offence all over the world. We cannot control
cyber crime in the situation when one country's laws declares it a criminal offence and another
country's law do not. So, it is now necessary to establish global cooperation to solve the crime and to
make possible the extradition of criminals for effective trial.

13.5. Curricular Endeavors and Checking Kids'


Net Addiction
Children are one of the most easy victims of cyber crimes. The increasing obsession of children
towards the internet chat and games is matter of serious concern. Media has highlighted many cases
of obsessed internet garners, some of whom have flunked out of school, committed suicide or
murder. Internet cafes continue to thrive, with outlets in even the smallest and poorest of villages.
According to officials figures, China has the world's second largest online population, about 94
million, after the U.S.4 and has also the largest number af kids having Net addiction. China is the first
country to establish officially licensed clinic for internet addiction. Dr. Tao Ran of the clinic says about

the children undergoing treatment here, "They are suffering from depression, nervousness, fear and
unwillingness to interact with others, panic and agitation. They also have sleep disorders, the shakes
and numbness in their hands." Further says, "All the children here have left school because they are
playing games or in chat rooms every day. "5
Popular computer games for children having hidden sex trips are also producing adverse effects on
their mind. For example, the latest version of a popular game called 'The Grand Theft Auto (GTA)'
looks like any other action packed 3D animation fare in which the player goes on a mission down city
lanes. The innocent user will play within the apparent boundaries of an imaginary city, modelled after
Los Angles. But many young users all over the world, including India, are downloading a free patch
(a set of software codes, usually created by a hacker) from the internet that suddenly gives access to
hidden alley. Dr. Harish Shetty, a noted psychiatrist, says, "Parents do not know much about the
games that their children are playing. In fact, some parents gift such games. All that parents see on
the children's computer monitor are stars, rockets and the moon. With a mouse click the children
hide what they do not want the parents to see. I would advise the parents to trust their kids but keep
their eye open."6
Although some games with explicit sexual content are clearly labelled" A", the games like the Grand
Theft Auto does not come with such a warning, obviously because the creators intended to hide the
sexual content.
The time has how come when the children and even adults should be given lessons about
acceptable online behaviour so that internet may remain a safe and useful medium. There is also
need to educate the people on the danger being posed by cyber crimes and how the people can
reduce the dangers of cyber crimes. Thus, there is need to introduce safety measures in the
curriculum of universities and colleges.

13.6. Role of Guardians


The parents and guardians have an important role to play in moulding the character and conduct of
their children in the society. They can also play an important role in protecting children from the ill
effects of cyber space. Since home is the first school, they may teach their children how to use
internet and avoid the harmful sites with greater responsibility. The following are the some of the
safety measures which guardians may adopt to protect their children from harmful effects of
internet7:

This essay is an example of a student's work


Disclaimer
This essay has been submitted to us by a student in order to help you with your studies. This is not
an

(a) They should not give any kind of personal information. Such as residential address, school's
home, telephone number, etc., in chat room or bulletin board.
(b) One should not leave photographs on websites.
(c) Children should not be allowed to face-to-face meeting with other computer users without
guardian's permission.
(d) Guardians should keep an eye on the children's companions.
(e) Children should be encouraged to inform parents about any message received by them.
(f) Children should be asked not to respond to message which are obscene, suggestive, belligerent,
threating.
(g) Computer should not be kept in children's bedroom and the online use of computer by them
should be monitored.
(h) Guardians should know the online friends on their children as they know about their other friends.
(i) Parents should permit limited use of internet to their children.
There are many websites which provide appropriate guidelines for the parents and make available
necessary software programmes for checking the children's access to improper materials. The
school teachers and libraries may also provide appropriate guidance to the children.

13.7. Mobile Pornography: No Nearer Solution


in Sight
In the last few years, technology in the area of electronic communication has developed to such an
extent that it is capable of being misused and abused. But there is no technological device nor there
is specific legislation to deal with the abuse of electronic data which has been doctored. The
Information Technology Act, 2000 is not really equipped to deal with the day-to-day problems of
offensive electronic message.
According to the law, any form of electronic communication which tends to "outrage the immodesty"
of a person infringes on personal or family relationships is an invasion of privacy. It is engraved as a
fund!lffiental right under Article 21 (right to life and personal liberty) of the Constitution, and every
person is entitled to safeguard such privacy. The Supreme Court has held that the right to privacy is
a part of fundamental right and held further that even a woman of easy virtue is entitled to privacy
and no one can invade her privacy as and when he likes.
However, the technological advances in the age of downloads and hi-tech handsets have been so
sweeping that the law-makers have evidently not reckoned with them.8 For example, the case of
Pune landlord who installed a camera in a toilet and caught his lady tenants in a compromising
situation. And also in the case of BPO in Mumbai who captured two of its employees "making out" a

100. The BPO wanted to sack them but the duo, in turn, accused the company of violation of their
right to privacy. The company refrained from taking any action.
The IT Act bans dissemination of obsence images and makes such action punishable by up to five
years. It is cognisable but its implementation is far from satisfactory. For instance, Mallika Sherawat's
lawyer has sought a police investigation into MMS under the IT Act. But police demanded the copy of
MMS clip to proceed with. Police finds it difficult to establish the source and hence chance of
conviction are hard to come by.
The number of MMS messages are now increasing very rapidly. Last new year's night, 60 million
MMS greetings were passed. A billion message are sent every month.9 At an average rate of one
rupee per message, it is a considerable sum of earnings. Service providers are also planting porn
messages. Now nearly 57 million persons have cell phones that allows MMS. That's why the issue of
MMS pornography is increasing at alarming extent.

13.8. Self-regulation in Cyber Space


Self-regulation is also an important strategy, which is the strategy of adopting soft laws for selfregulation by the users and service providers of the internet. Such self-regulatory device is popularly
known as "Netiquette", which are in fact gentlemen's agreement and can be very effective in
calculating the proper behaviour amongst the Net users. Services providers may play an important
role in developing and implementing properly these Netiquettes. They can make such regulations a
part of their service contract with condition to that effect that any violation shall lead to
discontinuouance of service. For example, the user guidelines of Sunrise Internet Service contains
such type of conditions.
The Department of Justice and the Information Technology Association of America (ITAA) has
initiated a joint campaign to educate and raise awareness of computer responsibility among the
users. They have also initiated a national compaign to educate and arouse consciousness of
computer responsibility and to provide resources to empower concerned people. Such awareness
programme should now be made a part of the schools and colleges' curricula to create awareness
among cyber citizens.

13.9. Conclusion
The awareness and capacity building among cyber people and law enforcing agencies should be
given the top priority. The role of parents and teachers in molding the cyber behaviour of future
generation should also be given adequate priority. Strict enforcement of cyber regulations should be
ensured at all levels. The major focus should be given to the international efforts of mutual
cooperation.

WHAT IS CYBER CRIME?


Crime is a common word that we always heard in this globalization era. Crimes
refer to any violation of law or the commission of an act forbidden by law. Crime and
criminality have been associated with man since long time ago. There are different
strategies practices by different countries to contend with crime. It is depending on
their extent and nature. It can be concluded that a nation with high index of crime
cases cannot grow or develop well. This is because crime is the direct opposite of
development. It can contribute to negative impact in term of social and economic
development.
Cyber crime is a new type of crime that occurs in this Science and Technology years.
There are a lot of definitions for cyber crime. According to Wikipidia.com cyber
crime also known as computer crime that refers to any crime that involves a
computer and a network. Cyber crime is defined as crimes committed on the
internet using the computer as either a tool or a targeted victim. Besides that cyber
crime can be defined as crimes committed on the internet using the computer as
either a tool or a targeted victim (Joseph A E, 2006). Computer can be considers as
a tool in cyber crime when the individual is the main target of cyber crime. But
computer can be considers as target when the crime is directed to the computer. In
addition, cyber crime also includes traditional crimes that been conducted with the
access of Internet. For example hate crimes, telemarketing Internet fraud, identity
theft, and credit card account thefts. In simple word, cybercrime can be defined as
any violence action that been conducted by using computer or other devices with
the access of internet. This action can give harmful effects to other.
Report made by authorities showed that our country involved in 2,123 of cyber
crime cases during 2008 which is more than 100 per cent increase compared with
2007, but that rate was an incident and may not correlate with cyber crimes rates.
Cyber Security Malaysia said, the number is not from the rate of cyber crimes
analysis but only from the complaint they received. Furthermore, they said, they
cannot analyze the actual statistic because police, Bank Negara, Securities
Commission and Malaysian Communications and Multimedia Commission (MCMC)
have their own statistics and they have not been able to collate these statistics to
see the clearer image about cyber crimes.

There are many factors that causes the statistic of cyber crime cannot be detected
or analyzed. First, the aggressive development of todays technology making this
crime is very difficult to be detected. Second, law enforcement officials lack of
necessary technical expertise to deal with criminal activity. Third, once criminal

activity has been detected many businessmen are reluctant to lodge a report
because they afraid of adverse publicity, embarrassment, loss of public confidence,
investor loss, or economic repercussions. Due to these factors, the actual number of
cyber crime cases and the statistic of cyber crime in our country cannot be recorded
accurately.

There are three major categories of cyber crimes which are crimes against the
person, property and the government. The first category of cyber crimes is cyber
crime against person. Cyber crime against person is included harassment via email
or cyber-stalking. Cyber Stalking means following the moves of an individual's
activity over internet. It can be done with the help of many protocols available such
at e- mail, chat rooms, user net groups while, harassment can be included sexual,
racial, religious, or others. This crime usually happens to women and teenager.
There is a case happened to a girl in Ahmedabad, Gujarat India. She was lured to a
private place through cyber chat by a man with his friends, attempted to rape her.
Luckily she was rescue by passersby that heard she cried she was rescued.
Second category of cyber crimes is that of cybercrimes against all forms of property.
These crimes include computer vandalism by transmission of harmful programmes
to other computer through internet. The other example is cyber criminal can take
the contents of individual bank account. One widespread method of getting people's
bank account details is the money transfer email scam. People receive emails
requesting help with transferring funds from another country. Hacking into company
websites is property trespass, and stealing information is property theft. Internet
time theft also one of the cyber crime against property. It is done by an authorized
person in the usage of the internet hours which is actually paid by another person.
The third category is cyber crimes against governments constitute another level of
crime. Cyber terrorism is the most serious type of crime in this category. Hacking
into a government website, particularly the military sites, is one manifestation of
cyber terrorism. The example of cyber crime against government is web jacking. By
web jacking, hackers gain access and control over the website of another, even they
change the content of website for fulfilling political objective or for money.
Cyber crimes are everywhere, can happen to anyone, in any time. Some examples
of cyber crime are identifying theft, storing illegal information, computer viruses,
and fraud. We will discuss about each example in detail.
First, we will talk about identify theft. What is actually identify theft? Identity
theft, also known as ID theft is a crime in which a criminal obtains key pieces of
personal information, such as Social Security or driver's license numbers, in order to
pose as someone else. The information can be used to obtain credit, merchandise,
and services using the victims name. There are two main types of identity theft
named account takeover and true name theft. Account takeover identity theft refers

to the type of situation where an imposter uses the stolen personal information to
gain access to the persons existing accounts. True name identity theft means that
the thief uses personal information to open new accounts. The thief might open a
new credit card account, establish cellular phone service, or open a new checking
account in order to obtain blank checks. To prevent, dont keep all of your
identification and financial information in one place and never write down your PIN
(personal identification numbers) anywhere. Besides, never respond to emails or
snail mail that requests personal information such as passwords or PIN numbers.
Storing illegal information also considered as cyber crime. Criminals often use
the Internet to obtain and transfer illegal images. What do we mean by illegal
images on the web? This means images and in some cases text, which you see or
may be inadvertently exposed to on a website, which contains any of the following:
Child abuse images (also known as child pornography).
Criminally obscene content which means images featuring acts of extreme and
violent sexual activity.

Those who involves in this crime, dont just ignore it, report it. It is important
because reports from the public help the IWF (Internet Watch Foundation) to
remove the images from the internet and to support the investigative processes
which could bring those responsible to justice. Child sexual abuse images record the
real abuse of a child and your reports to the IWF might help the authorities to trace
and rescue a young victim from further exploitation.
Next is computer virus. A computer virus is a small software program that
spreads from one computer to another computer and that interferes with computer
operation. A computer virus may corrupt or delete data on a computer, use an email program to spread the virus to other computers, or even delete everything on
the hard disk. Computer viruses are most easily spread by attachments in e-mail
messages or by instant messaging messages. Therefore, you must never open an email attachment unless you know who sent the message or unless you are
expecting the e-mail attachment. Computer viruses can be disguised as
attachments of funny images, greeting cards, or audio and video files. Computer
viruses also spread by using downloads on the Internet. Computer viruses can be
hidden in pirated software or in other files or programs that you may download.
Last but not least, fraud. Fraud is a deliberate misrepresentation which
causes another person to suffer damages. Fraud can be committed through many
media, including mail, wire, phone, and the Internet (computer crime and Internet
fraud). Several types of criminal fraud include false advertising, advance-fee fraud,
bankruptcy fraud, etc. The best way to prevent fraud in both personal and

organizational finances is to develop processes that protect sensitive information,


enforce accountability, and consistently review financial records.

Religion And Terrorism The World Situation Politics Essay


Published: 23, March 2015

Religion can inspire people's potential and make them undaunted in the face of
death. However, countless disasters have broken out when religious extremism and
terrorism combined with each other. Religious- based terrorism has become a major
form of contemporary terrorism. Currently, the world's situation has experienced
drastic changes and religion as a supernatural deity worship met the requirements
of people's spiritual sustenance. Therefore, the religious- based terrorism as a type
of terrorist activities spread around the world rapidly and it will long exist. This
essay will firstly discuss the similarities between terrorism that is primarily religious
and terrorism that is primarily secular. Following this, it will discuss the differences
between terrorism that is primarily religious and terrorism that is primarily secular
by analyzing one act of contemporary religious violence in detail. Finally, it will
analyze the reason why it is not possible for terrorists to achieve their aims by using
violence..

Similarities between terrorism that is primarily religious and terrorism that is


primarily secular
After experienced the "9 11" incident in 2001, a discussion on the so-called
"fourth wave of terrorism" had risen. Unlike the previous several waves of terrorism,
religious issue has become the main motive force of this new terrorism (David C.
Rapoport, 2001). Religious-based terrorism means "for the religious or political
reasons, a religious group, organization, government or individuals attacks their
religion or other religions and use violence against the innocent civilians or
property." Aref M. Al- Khattar, 2003

Although driving by different forces, the religious-based terrorism and secular


terrorism use violence to solve their problem and bring the society a great panic.
First, both the religious-based terrorism and secular terrorism are act of violence.
They convey their ideas and intentions to certain social groups by those planned
violence. They seek political change by the public impact of violence. Second, the
religious-based terrorism and secular terrorism are always unpredictable. Organized
terroristic activities have a shelter and it is difficult to predict in advance. When and

where will the terrorist activities occur? What are their aims? How terrorist activities
start on? All of these issues are unknown until the terrorist events happen. Its
unpredictability expanding the effect of terrorist violence and terrorism becomes
very difficult to deal with. Third, the victims of the religious-based terrorism and
secular terrorism have a symbolic meaning. The potential victims of terrorist attacks
are not really randomly selected. These targets are the symbol of what the terrorists
want to attack because of their status, their location or their activities. Fourth, the
religious-based terrorism and secular terrorism's action usually has a specific
political purpose. Terrorism has a political purpose which includes two situations:
Firstly, some groups or organizations use such means of violent and terrorist to
achieve their own political purposes. Secondly, they adopt that means of violent
terrorist to change social political thoughts.

Differences between terrorism that is primarily religious and terrorism that is


primarily secular
The religious-based terrorism and secular terrorism are different in those issues of
motivation, legitimization and justification. Some Islamic fundamentalist
organizations are the typical delegate of religious-based terrorism. They advocate to
restore the original form of Islam and to establish a theocracy country. Terrorism is
the stock in trade of the Islamic fundamentalist. The Muslim Brotherhood is a
representation of fundamentalist. This organization was established in 1928 and its
initial aim is to "resist Western cultural influence on the Arab world." Since its
inception, the Muslim Brotherhood spread its influence in the Arab world, and
gradually evolved from a religious organization to a paramilitary terrorist
organization. Hamas is an organization which is derived from the Muslim
Brotherhood. They put forward a very aggressive struggle aim: destroy Israel with a
holy war and establish an Islamic state in Palestine ultimately. After the Cold War,
the terrorism activities of Islamic fundamentalist have become increasingly frequent
and prove to be the most dangerous terrorism in the world (Bar S, 2004).

Take Islamic fundamentalist terrorism for example. Compared with the secular
terrorism, they considered violence as a sacred act or duty and terrorist activities
have been given a sacred name. Killing is "glorious" if it is for the sacred religious.
Secular moral fetters, struggle of the human nature dissipated in this "glorious".
Terrorists use murder and they have no limitation on the political impact, moral and
practical conditions that limited secular terrorism. Bruce Hoffman, 1993
Religious allow terrorists to find a way to legitimize their acts of terror. Many
religious doctrines have violent sanctions content to urge their follower filled with
admiration to the God. Terrorism is a natural supporter of violence. It captured this
feature of religion, misleading those devout followers. These followers believed that

violence is an expression of worship and they were taking away the sinners in
accordance the will of God. Therefore, they not only will not feel guilty for the
murder, but believes their actions are legitimate and sacred (Sedgwick M, 2004).
Compared with the other types of terrorism, their "enemy" is broader and
numerous. This fact doomed religious-based terrorism are much bloody than the
other types of terrorism.

The religious-based extremism terrorists are both victimizer and victim. Piety to the
religious is their spiritual motivate of carrying out terrorist attacks, but not the root
causes of terrorism. They had lived quietly in the world which many religions exist
there like most people. They protected their religion carefully, but their religion
gradually declined under the impact of Western culture. Those desperate followers
have to take the extreme method of killing to eradicate those who threaten their
religious beliefs and it seems that those numerous religions may erode their faith.
Those experiences in the real-life, including the power politics of Western countries,
economic sanctions, military strikes, made them feel that they are victims and they
have the right to retaliate to these people who bring them disaster. Terrorism will
not grow up without any reason and no one born a suicide bomber ( Jones JW,2009;
Roislien HE, 2005).

Analysis of the possibility for religious terrorists to achieve their aims by violence
Since the nineteen eighties, various types of world's religious terrorist organizations
developed rapidly. The ravages of terrorism have brought great harm to the
international community and undermine the normal social order. Terrorism
intensifies various contradictions and becomes a major threat to the peace of the
world. Therefore, many governments condemn atrocities of the terrorist and have
made it clear that they will fight against terrorism.

In recent years, the international community has joint together to act against
terrorism. Many countries recognize that anti-terrorism can not be met by one
country alone. They must rely on the strength of the entire international community.
Contemporary terrorism is more like cancer, which spread and undermined the body
health of the community seriously. It undermines the international peace and social
stability, which lead the international community into deep fear. So compromise
with terrorists is generally refused by the whole world. Recently, many countries
have committed to the fight against terrorism and have made remarkable
achievements. Therefore, in this situation, religious terrorism is difficult to achieve
their goal by violence.

Same example can be used to illustrate the above conclusion. Organizations of


Islamic fundamentalists, like Hamas, have not achieved its goal by using violence.
Although causing great damageHamas suicide bombing attacks do not destroy
Israel and have no positive effects on the establishment of an Islamic state in
Palestine. InsteadGaza as the stronghold of Hamas has been blockaded by
Israel since 2007. As a result, Hamas lost the ability to launch large-scale attack in a
long period of time.

Global Terrorism
Our history blog for Mr.Schwab's US history class.
Monday, January 2, 2012
essay
Terrorism. This word strikes fear into the hearts of many, and yet to others it is misunderstood. Terrorism
has no internationally agreed-upon definition, but essentially, terrorists are ideologically motivated and
use violence against civilians to create panic and fear, in hopes of changing policies or laws. While there
is no international definition of terror, there are many different types, and the following will demonstrate
the dizzying array terrorist practices. Firstly there is civil disorder. It can range from protesting legally to
illegally lambasting the government. Different countries allow for different levels of dissent, but in some
peaceful assembly is considered terrorism. Truly destructive forms of terrorism are political, quasi political,
and religious. Political terrorists attack in hopes of changing policies, usually in reference to color, creed,
or profession. Quasi political terrorism is the use of terrorist tactics for personal gain. For instance, taking
a hostage is terrorizing someone, but it is not an action designed to enact wide scale change. Lastly,
religious terrorism focuses on proliferating ones belief at the cost of others. Overall, terrorism is unjust
and cruel; we must take stand against it.
Terrorism flies in the face of diplomatic process, purposefully disrupting peace and safety in order to
achieve a goal. Many terrorists consider a mission successful if hundreds of helpless, innocent women
and children lie bloody in the street. A popular terrorist attack is to set off a relatively small bomb, and kill
say, 30 people, and detonate a far larger one when police and medics arrive. If this problem sounds like
something that does not affect you, think again. Terrorist attacks have happened literally hundreds of
times in the United States. Exact figures are unclear because the line between domestic terrorism and
political violence is blurred, but since 1999, there have been over 50 separate terror attacks on domestic
soil according the Department of Justice. In 2011 alone there have been over 11,500 acts of terror
around the world, according the FBIs worldwide NCTC data trend. These international attacks were
located in 72 countries, and resulted in approximately 50,000 casualties. Of this 50,000, 13,200
succumbed to massive trauma. The methods are diverse, the perpetrators are perverse, and the acts of
terror are utterly inexcusable.
Terrorism comes from the Latin word terrero, meaning fear. This could not be a more accurate depiction
of terrorists and their actions. Commonly terrorists are generalized as Middle Eastern men, motivated by

their fanatic beliefs to harm innocent people. Unfortunately, terrorism is incredibly diverse, located in
every region of the world and used for almost any goal imaginable. Generally, terrorists are either
politically or religiously motivated. There are international and homegrown terrorists. As the latter
suggests, homegrown terrorists organize and act in their native countries. The list of terrorist
organizations is far too long to discuss in this project, but I will provide a brief summary of various groups,
their motivations and tactics, and most importantly, what is being done to stop it and how you can help.
I deliberately chose a homegrown terrorist group as the first to be reviewed, because Americans need to
understand, fear, and work against terrorism at home. Jamaat al-Fuqra is an Islamic terror organization
whose goal, according to the Center for Peace and Security, is to purify Islam through violence. Put
simply, this group of radical Islamic men believe that they are commanded by God to proliferate their
religion. Furthermore, violence is the only acceptable way to deal with differing beliefs, and frighteningly,
they are credited with various shootings and firebombings, and members have been convicted of criminal
violations, including murder and fraud. This group was active largely in the 1980s, but it has given birth to
a radical Islamic movement in America, and other terrorist groups have stepped in to fill the void left by
Jamaat al-Fuqra.
Terrorist groups are numerous and wide ranging. Al Shabaab is a radical Islamic group with strongholds in
Pakistan and the United Kingdom. Various small scale bombings have been traced back to this group. In
India, the Al Tipura Tiger force blows up innocent civilians about once a year in an effort to fight the
governments Pakistani foreign policy. The Maoist Party of India and Communist Party of the Philippines
train guerillas to frighten individuals in order to gain votes and support. Hamas is another Islamic group
operating in Palestine, and they are responsible for hundreds of rocket and mortar attacks on Israel. The
Pilipino Liberation Tigers of Tamil recently gunned down a local organizer who questioned their brutal
tactics and radical beliefs. In the news recently, political Anarchists have rioted in various places around
Europe, including Greece, Italy, the U.K., and France. As I said before, these maniacs are numerous and
wide ranging. They are deadly and must be met with equal force.
September 11, 2001 is a day that will live in infamy. On that fateful day, various al Qaeda operatives of
Pakistani and Saudi birth hijacked three planes. One plane was flown into the world trade center. In this
first impact, 1402 people were killed. As fire scorched the building, the main support beam began to heat
and bend. Slightly over an hour later, a second plane impacted the tower sending deadly shrapnel onto
the streets and effectively destroying the buildings structural support. As we know, the towers fell. Later
that day, passengers aboard another hijacked plane realized their inevitable fate, and overpowered their
hijackers, crashing the plane in an amazing display of patriotic sacrifice. These attacks killed 2,918 people
total, 343 firefighters and paramedics, and 23 NYPD officers. It was the greatest loss of life on American
soil since Pearl Harbor. This attack proved to many Americans that terrorism was very real and needed to
be ended.
Globally, terrorism is down 12 percent, according the FBI NCTC data compilation. This has been
accredited to slight economic success in some countries, yet baffling because the number of young males
in places of conflict rose by 70,000. Despite this clear success by counter terrorism organizations, attacks
continue to be prevalent in Southeast Asia. Contrary to popular belief, Asia is the terrorism capital of the
world; with the FBI estimating that 75 percent of the worlds terrorist attacks and deaths took place in
South Asia and the near East. This year, these attacks totaled 8,690 and resulted in 9,960 deaths. Due to
rural conditions and lack of medical care, NTC.gov report on 2011 terror does not include a figure
assessing the number of people wounded by these attacks. With terrorism obviously being incredibly

prevalent and equally dangerous, you may wonder what is being done to stop it, and what you can do to
help.
Our group is arguing that either you stand up against terrorism today, or will see the horror and
destruction that it creates. Terrorists are viscous criminals who feel no shame in taking life, and
deliberately instill fear and panic. This is wrong, and is unacceptable. If we continue to turn a blind eye to
these killers we will lose more lives globally, and as a result we are sending the wrong message to
terrorists that what theyre doing is ok, and until we stop them, they will keep doing such. This is also
using logos, or the logical approach of persuasion in our facts, statistics, and commentary. As human
beings it is our duty stand up for what is right and protect the lives of other people.
The United States is without question home to the finest counterterrorism forces on the planet. The
Federal Marshalls, Critical Incident Response Team, FBI Counterterrorism division, CIA Counterterrorism
division, Department of Homeland Security, federal tactical teams and many more stand constantly vigil,
ready to defend you against an attack. Local police S.W.A.T. teams are trained and equipped to handle
attacks as well, and there are thousands of professionals who remain on the watch. If you are under age,
the best way to support these groups is spreading awareness. Attend counterterrorism seminars, and
learn as much as you can. The first step in preventing recruitment is understanding what terrorism is. If
you know what these groups do and why, you will be much more willing to take a stand against them.
Additionally, organizations such as the United Nations offer jobs in which you can help victims of terror
overseas and see firsthand what these horrible acts do. You can also donate money through multiple
organizations to a number of countries crippled by war and terrorism. You can help children who have
been plagued with poverty and who live in fear everyday of being attacked. So educate yourself, join
organizations, donate for the cause, and the educate others. Our future is bleak if terrorism continues to
ruin the lives of many, so do your part to help create a brighter future, today.

Conclusion
Religion is an important component of human civilization and its contribution to
mankind is undeniable. The ethical and legal norms it advocates still play an
irreplaceable constraints role of people's behavior for peace and stability of human
society. But religious-based terrorism undermined international peace and social
stability, which lead the international community into deep fear. Anti-terrorist is
imperative, but it is also essential for each country involved in terrorism to rethink
what makes them become the targets of terrorist attacks. If people use violence to
combat with religious terrorism, this will only lead to more conflict of civilizations
and more severe social panic. However, elimination of terrorism is an extremely
complex and difficult task. So the religious-based terrorism will long exist. Therefore,

all the countries involved in terrorism need to find the root causes of religious-based
terrorism .What they can do now is try to prevent terrorism and minimize losses
caused by terrorist activities.

TERRORISM

Word Count: 652


Approx Pages: 3

Terrorism is an international problem in todays global community. Many nations


are affected, whether directly or indirectly. Most nations oppose terrorism, while
others condone or even support active, brutal terrorism and terrorist groups.
Terrorism is defined by the US State Department to contain four elements. The
first is a threat of violence or an act of violence. Next is a political objective. Third
is that violence and threat of violence is a direct attack on civilians making
civilians a primary target. Lastly, it is perpetrated by a supporting a nation or
nations of terrorism.
Two examples of terrorism and non terrorism are: the bombing of the US
Embassy in Dar-Es-Salaam and the dropping of the atomic bomb on Hiroshima
and Nagasaki. In the Dar-Es-Salaam bombing, it is believed that there is one sub
national actor involved: Osama bin Laden. With Nagasaki and Hiroshima, the US
State Department agreed to drop the bomb. This was a general agreement of the
American government, a national actor. Though both fit three criteria for a
terrorist attack, the US governments general decision to drop the bomb
automatically makes it an act of war, not terrorism.
One of the goals of terrorism is to make the terrorists views heard. This can be
caused by a total media blitz that usually occurs after a terrorist attack. The

media is an excellent window for the terrorists to shout their demands and views
immediately after an attack. The US has a very strict policy concerning terrorism.
Our country refuses to negotiate with terrorists or give in to any of their demands.
We do all we can to bring terrorists to justice after they commit crimes. We aim to
isolate terrorist sponsoring nations, such as Iraq, from the rest of the world and
attempt to perform counter-terrorism.
Although this policy is written down on paper down at the State Department, it is
not always followed. For example, whe...

International Terrorism
International terrorism is referred to violent acts that are used to put fear into the people that they are targeting.
These are usually done because of an ideological, political, or religious goal and they sometimes have target but
sometimes they just kill harmless and defenseless civilians. International terrorism has been such a problem that
there is a convention to help stop it. At the Comprehensive Convention On International Terrorism a treaty was
proposed, this is intended to criminalize every form of international terrorism and to deny the terrorists finances and
the supporters that gives them the funds, safe havens, and arms.
The negotiations have been going on over thirteen years and the United Nations are deadlocked on the proposal that
was established at the convention on international terrorism. Even with suicide bombings going on in places like
Russia, Iraq, Afghanistan, Egypt, and Syria, they still havent reached an agreement treaty. International terrorism is
defined by the convention as a person who commits an offence that causes death or serious injury to another person,
major damage to public or private property, this included places like state and government facilities, public transit, or
the environment, also damage that leads to a major economic loss that can prevent people from doing anything after
the attack.

For example, 9/11 is a good example of this because it covered all of the requirements of an international terrorism
attack. It causes death and injuries to people, it has serious damage to property and made it impossible for people to
work, which is why the stock market crashed after it happened and gas prices went up. International terrorism is a
very scary thing because it can cause so much damage during and long after the attack is over. The long term can
be just as bad as the actually act.
Its not that the convention doesnt like the definition it is just they arent sure if it applies to some groups like the
armed forces or people that are in the self-determination movements. Because of this they have been trying to adjust
it to make it more clear but have been unsuccessful in their efforts. If you think about it, they have been taking a long
time to decide but maybe they want to make the right decision so as to not leave something out. Or they are just
being difficult like most governments like to do sometimes.

International Terrorism Essay


by Anshul Rox | category Essay
ADVERTISEMENTS:

In legal terms, An act committed with any lethal weapon is classed as


terrorism. Inviting support for a terrorist person, group or
organization addressing a gathering of terrorism sympathizers, or
assisting in arranging a meeting where support is expressed for
terrorist groups or financing of terrorist activists all come under the
acts of terrorism. Terrorism has become the most un-natural, dehumanizing and politically destabilizing phenomenon of the
21st century. Terrorist movements are neither radical not
revolutionary. They are destructive and usually stem from
conservatism and feeling of revenge. Terrorism seems to have become
endemic to modern society. It is generated by recurrent social crisis
arising out of increasing marginalization of a section by indiscriminate

spread of capitalism and free market economy through vaunted


process of globalization, rising Islamic fundamentalism, availability of
latest technology and know-how to the terrorist organizations, close
interaction between various terrorist groups and organizations,
availability of large finances through drug trafficking and lack of
coordination between countries and want of common laws against
terrorism.
Terrorism may of four type (a) criminal terrorism uses terrorism
for material gain by encouraging drug trafficking and smuggling
operations. (b) Psychic terrorism aims at archiving religious
objectives. (c) Political terrorism conducts systematic use of
violence to achieve political objectives. (d) War terrorism aims at
slow attrition of adversarys forces so as to destroy their ability to fight.
International terrorism is a post-cold war phenomenon when forces
driven by religious sentiments and factional sub-nationalism appeared
in the aftermath of bi-polarity. State sponsored terrorism received a
fillip due to advanced military hardware. Terrorism acquired a
different face during 1990s. They started taking advantage of the
openness of information technology and easy availability of
sophisticated weapons not-with-standing the use of computers and
access to chemical and biological agents. This extended their field of
action from physical space to cyber space and from land, sea and air to
human body. The current global terrorism has acquired specific
identity which combines religious fervor with intent militant political
ideology. They get financial support from clandestine trade in drugs
and narcotics which are utilized for the purchase of arms. The narcotic
terrorism is a double-edged sword and disrupts socio-economic
development on the one hand and political order on the other.
With the disintegration of Soviet Union and cessation of cold war
militant Muslim groups who were differently supported in the war
against communism took a pan-Islamic shape. Armed volunteers
emerged in different parts of the world from Bosania to Afghanistan
and Pakistan in search of means to survive. It is believed that fulcrum
of pan-Islamic terrorism was located in Pakistan and Afghanistan. The
terrorism groups controlled by the inter services Intelligence (ISI) of

Pakistan recruit volunteers from all Islamic countries and countries


with Muslim population. Terrorist recruits by Taliban-Pakistan
combine and supported by fundamentalist Islamic regimes have
spread out in places like Kashmir, Chechnya, Dagestan, Bosania,
Finjiang, with their networks in West Asia, Africa, Indonesia,
Malaysia, European Union, Bhutan and India. Their aim is to
dominate the political scene in the sub-continent and to capture the
resource-rich central Asia.
Since September 11, 2001 terrorism has shown a face like never before.
Terrorism became the focus of global attention since bomb explosions
at the U.S. embassy in Nairobi and Dares Salaam in 1998. the blowing
up of the twin towers of the world Trade Center in New York killing
5000 people shows that terrorists have access to almost every weapon
from biological, chemical and probably nuclear technology. Besides
advantages of the open-nests in the September 11 attack as act of war.
The U.S president Mr. George W. Bush emphasized that the US world
respond as if it is a war and vowed that the US will lead the war on
terrorism and that US will treat alike the terrorists and those who
harbor them. The well planned attack on the twin terrorists and
pentagon marked the beginning of a war on civilized humanity itself
and more than proved that the problem has acquired international
dimensions. The attack resulted in the destruction of top 155
multinational companies displacing 50,000 people and killing 5000
persons belonging to countries of the entire world creating political
instability in central Asia due to US campaign against terrorism.
The United states Justice Department identified the highjackers. They
were linked with the Saudi fugitive and terrorist master mind Osama
Bin Laden and his organization Al-Quaeda who operating from
Afghanistan under Taliban regime. Hence Bush administration gave
an ultimation to the Taliban Mutates rulings Afghanistan to hand over
Osama Bin Laden otherwise face consequences. Operation enduring
Freedom was launched by the US to hunt down Osama Bin Laden
and his terrorist group Al-Quaeda which resulted in the rout of

Taliban regime. But Osama-Bin-Laden is yet to be apprehended. He is


supposed to be hiding somewhere in Pakistan.
Osama-Bin-Laden is the most significant sponsored of Islamic
extremist activities in the world today. He was born in 1957 in Saudi
Arabia. He joined fight against Soviet invasion of Afghanistan in 1979
and is said to have received training from CIA which aided Afghan
rebels. He founded Al-Quada and focused on attack on US and its
allies. He was expelled from Saudi Arabia for anti-government
activities in 1991. He lived in Sudan for five years until the US
pressurized Sudan to oust him. Then he lived in Afghanistan as a guest
of Taliban regime. Terrorist activities linked with his organization AlQuada are(i)Bombing of New York World Centre in 1993, (ii) Car bomb in Saudi
Arabia in 1996, (iii) Bombing of US embassies in Kenya and Tazania in
1998, (iv) Suicide bombing of USS Cole in Yemen in 2000 and (v)
Attacks of WTC towers and pentagon in the US.
International terrorist organizations may be enumerated as

Al-Qaeda, an Islamic terrorist organization headed by Osama Bin


Laden as described above aims at the destruction of the United States, Israel
and India.

Hizbullah, Lebanese state terrorist groups aim is the creations of


independent Islamic Lebanon by outsting any thing western. It has targeted
US Embassy in Berirut, US Marine head quarter and Israeli embassy in
Buenos Aires.

LTTE the Liberation Tigers of Tamil Elam aims at the creation of


separate Tamil Land in Srilanka. In June 1991, Indias Prime Minister Rajeev
Gandhi was assassinated in 1993 Srilankan President Premadasa was their
victim. In 1999 an attempt was made on the life of srilankan President
Chadrika Kumaratunga. Between 1987 and 2000 it has carried out 168
suicide attacks in Srilanka and India.

HAMAS, The Harket-el-Mukawma-el-Islamia aims at founding


Islamic state in Palestine their home land. Israel has been their target so far.

PIJ, the Palestine Islamic Jehad has so far inflicted 30 suicide attacks
on Israel.
There are a number of terrorist organization recruiting and training
militants against India particularly to disturb peace in Kashmir.
Kashmir valley has been under the shadow of militancy since 1989.
There is large infiltration of foreign mercenaries from across the
border. Pakistans ISI spend Rs. 60 to 80 crores every year for running
proxy war in Jammu and Kashmir. Besides youths from Jammu and
Kashmir and Pakistan occupied Kashmir a large number of heavily
armed foreign militants are also operating in the state attacking
military and civil targets. Pakistans regular army personnel are also
operating in disguise as militants and civilians collecting intelligence
about Indian army and air force movements. A new phenomenon of
Fidayeen attacks have been added to the operating method of
terrorists, various suicidal missions have been carried out by them
which include attacks on Indian parliament, Akshardham Temple,
Temples in Jammu and latest twin blasts in Bombay.
After September 11 attack the world realized the gravity and
seriousness of the terrorists problem. Britain, Russia, India, Iran,
China, NATO, the UN all pledged support to the United States in their
campaign against terrorists. Pakistan has forced to support the US and
out of compulsion condescendly offered full cooperation and bases for
US forces. Pakistans motive was to prevent a hostile especially proIndia regime in Afghanistan and at the same time to save Kashmir
militants from larger war on terrorism. The US put together an
international coalition in its war against terrorism. Aim was to hunt
down Osama-Bin-Laden and destroy the Al-Qaeda network in
Afghanistan. It was also stressed that the operation will not be
restricted to capture of Osama-Bin-Laden only but will extend to other
countries to hunt down associated networks of terrorists.
The rout of the Taliban forces that were hardworking the Al-Qaeda
organization finally broke the Taliban Osama axis. The Al-Qaeda
forces in Afghanistan were destroyed and Afghanistan was no longer a
haven for their activity. Most of the fighters of Osama Bin Ladens Al-

Qaeda network were either killed or captured. But Osama-Bin-Laden


himself with his family managed to escape and his whereabouts are
not known till date.
India expressed solidarity with the United States and expressed its
willingness to co-operate with the US in combating international
terrorism. Prime Minister Atal Behari Vajpayee said that the
international community must hold Govt. fully responsible for
terrorism which originates from their countries. Hence to do away
with the terrorists the world community must isolate and compel
states sponsoring terrorism to desist from doing so. India also
expressed the need for international laws to facilitate extradition of
wanted terrorists. India made a diplomatic move to ensure cessation
of Pakistan support to militants in Kashmir.
Pakistan was under compulsion to extend unequivoed support to the
US action in Afghanistan to prove its integrity on the one hand and the
state of economy, the sustainability of its strategic assets of nuclear
weapons and missiles and to seek support in Kashmir cause. Pakistan
is now seen as an epicenter for war against terrorism by the US who
realizes that the sources of terrorist threat lie in the breeding ground
of extremism and terrorism that Pakistan has nurtured in the last two
decades. As such the US cannot eliminate the threats to its security by
leaving Pakistan free to retain its terrorist leverage against India. The
US hopes to coerce the Pakistan military regime to reverse the course
and give up its culture of terrorism and extremism.
The terrorist attack on Indian parliament exposed the double hand
policy of the United States of America. Indian was more than justified
in proclaiming that Pakistan was a perfect target for pre-emptive
strike just as US was doing against Iraq. Indian leaders openly
declared that it was Pakistan rather than Iraq that should have been
proper target for a pre-emptive war. It was argued that if possession of
weapons of mass destruction, a lack of democratic political structure
and sponsorship of acts of cross-border terrorism were cause of
military action against Iraq, Pakistan was a far greater offender

requiring even stronger action. Thereupon United States with extreme


caution warned Pakistan that any attempts to draw parallels between
Kashmir and Iraq situations are futile and wrong and India was
strongly urged to declare that his countrys soil would not be used for
carrying out acts of violence in Jammu and Kashmir. To avert the
crisis the US president asked the Pakistani president to live up to his
worlds and that he needed to stop infiltration across the line of control
and he must do so. Thus General Mushrraf faces the twin challenges of
providing the success of his anti-terror strategy in Pakistan and his
political survival in the face of internationalized radicalism.
The global spread of terrorism indicates that nation cannot cope up
with this threat on individual basis. A time has come for the nations to
pool up their resources and defines a clear cut strategy to counter this
dragon. Terrorism will have to be tackled without any regard to
regional, political, religious or ethnic loyalties. Global co-operation is a
necessity but alliances may not be successful in view of various
political or religious implications. An organization under the control of
the UN may be set up with adequate financial resources and staff. The
United Nations along should be authorized to sanction military action
against states sponsoring terrorism. Effective and specialized
intelligence services must be utilized to tackle this gigantic problem.
And finally international terrorism should be evaluated objectively
without any political or religious affiliations. Terrorist acts must be
well defined and definitions thereof should not change according to
the situations.

Dhaka, the capital city of Bangladesh is one of the most populous megacities in the world. As the growth
of urban population tacking place at an exceptionally rapid rate, the city is unable to cope with changing
situations due to their internal resource constraints and management limitations. In recent years Dhaka
City is facing extensive water logging during the monsoon (May to October) as a common and regular

problem of the city like water pollution, traffic congestion, air and noise pollution, solid waste disposal,
black smoke etc. This research applied remote sensing and GIS techniques to detect the low land status
in different time period and the trend of unplanned urbanization that is one of the major causes of water
logging in Dhaka City. Remote sensing could provide timely and low-cost information on floods and land
use status whereas GIS is an excellent tool in handling information in land management and flood
mitigation. Management of drainage system of Dhaka City is presently a challenge for the urban
authorities because of rapid growth of population and unplanned development activities. Therefore, a
close coordination among urban authorities and agencies and collaboration between public and private
sectors is needed for effective management and sustainable operation of urban drainage system. It
ascertain the inherent causes of such water logging and its effects on the city life from the perception of
authorities of different development organizations, experts and people living in different parts of Dhaka
City

Dhakas chronic water logging problem


Syed Mehdi Momin

The heat wave in May and June really brought the city dwellers to their knees. It was a suffocating,
energy sapping heat and continued for days on end. There were reports of people dying due to
heatstroke other heat-related illnesses. So when the rains came in the morning of June 11, Thursday,
Dhakaites breathed a sigh of relief as the temperatures came down. Unfortunately though, what
started as a relief to the citizens soon enough became a source of countless miseries. The downpour
in no time became a deluge and many parts of the city were submerged in knee-deep water bringing
traffic to a standstill.
People of the city, instead of enjoying cooler weather and heavy rain, had now to deal with making
their ways through flood and sewage water. Some of the main streets in Mirpur, Shantinagar, Jurain,
Malibagh, old quarters of the city, Motijheel, Kakrail became waterlogged. In some of the areas,
rainwater had entered many houses on the ground floor. Even after the rain stopped the waters took
hours to drain. This proves that the drainage system was not functioning properly for swift water
drainage. And traffic jams, already terrible in the city in the best of times worsened even further, as
the day progressed. In these days in a modern city such a situation should not be expected. However
in Bangladesh one learns to expect the unexpected and also live with it.
More perplexing is the fact that the capital witnesses severe water logging even after brief spells of
rain, throwing life out of gear. Almost on an annual basis Dhaka WASA and the two city corporations
trade blame over the recurrent failure to keep the 360 square km capital free from water logging in
rainy days.
The three entities repeated the same old story that none of them controlled the facilities for the
drainage of the entire capital. The blame game does little good to the residents as they see no
progress in bringing the capitals drainage system under a single authority, though a move was
initiated in this direction more that a decade back.
Increased traffic jams due to water logging caused terrible sufferings to office and school goers and
other commuters. Many pedestrians fell into manholes without covers as they had just gone under
clogged water. Its a routine plight of the residents during monsoons, said residents, the only
difference being water logging increased on broken and ill maintained streets and lanes. Apparently
there is no one to address the recurring problem. People are forced to wade through on several
streets and lanes even in posh neighbourhoods. Acute water logging disrupted normal life in most
areas of the capital.
Dhaka Water Supply and Sewerage Authority has the responsibility to look after the drainage of 39
per cent area of the capital. DWASA with its 10 km of box culverts and four pumping stations drains
140 square km of the 360-square km capital into 65km open canals. DWASAs drainage pumping
stations are located at Dholaikhal, Kallayanpur, Rampura and Janapath. The two city corporations
maintain around 2,500 km of surface drains and around 4,000 km of underground drains.
According to experts until and unless DWASA recovered its 26 canals there could be no
improvement of the situation. WASAs clogged outlets obstruct the passage of water into its canals
and WASA rarely if ever cleans its outlets. As said earlier the situation can improve only if the three
entities worked together. On July 11, 2003, the government decided to bring the drainage system
either under the control of either then Dhaka City Corporation or DWASA. There has been no
progress on the issue ever since.
A total of Tk 303 crore was spent in last four years of the project launched for reducing the water
logging problem of the capital city Dhaka. But what is the outcome of the project? On May 24, an

only 34 millimeter rainfall was witnessed while only 20 millimeter on May 25, created water logging
in several areas of Dhaka. Similarly, on June 25 2 milimetre rain caused massive water logging in 20
areas of Dhaka including the old part of the city. Dhaka WASA source claimed that crores of taka was
spent for a smooth drainage system. So far, in five months of this year, WASA authorities got Tk 20
crore in three phases.
Garbage keeps piling on the roadside or beside the drains and many manholes are kept uncovered.
So the solid waste is washed into the drains after rainfalls. Thus hundred crores of taka is wasted in
the name of sewerage clean up. It is vital to clear the drains before the rainy season. Besides, Dhaka
WASA should ensure transparency of the drainage clean up fund.
Now when it rains in Dhaka rather than people being out on the streets singing and dancing in the
rain, they have to worry about flooded major connecting roads, water logging and falling trees. The
situation is quite similar in other parts of country as well.
A major cause of the problem is that cities have become less dependent on their own water sources.
The number of water bodies in all major cities has drastically come down over the last three decades.
The builder-politician nexus has knowingly and intentionally suffocated the city's open spaces for
commercial purposes. This loss of and subsequent commercialization and concretization of open
spaces has meant that water, which previously could seep into the soil has practically nowhere to go,
leading to flooding.
These floodplains and lakes in the low-lying parts of a
city, did not just fulfil the water needs of a city, but also drained it off the excess rain water. When
construction blocked the path of water, it led to water-logging on the city roads.
The blame then fell on the storm water drains which in most cases, were designed very long ago and
were not capable of handling the excess.
Dhakas drainage system was designed in the early 20th century for a maximum rainfall of 25 mm
per hour, assuming that half the rain would be absorbed by the soil and only half would flow into the
drainage system. With the onset of rampant and indiscriminate urbanization, most areas are now
paved, concreted or asphalted. As a result very little rainwater is absorbed into the ground. Thus
even at one inch per hour, the drainage system is having to cope with almost twice its intended
capacity. Natural drainage or the slope of a city was never kept in mind when cities were planned.
The government should start cleaning drains in February at least so that passage for rain water is
clear. But they wake up only in May when monsoon is right in the face and then too, debris collected
from the drain is left on the banks of water bodies for it to flow back when rain comes.
Water harvesting in lakes and ponds is a time-tested solution and need of the hour, not just to
mitigate floods but also to fulfil our water requirements locally. Rain water is actually meant to
become ground water so every citizen has to take the initiative to recharge it. When somebody
constructs a house it is their responsibility to take care of the excess water from that plot of land,
which would otherwise go into a storm water drain or else create water-logging around the plot.
The solution is a proper rain water harvesting system in the house itself. It would not just replenish
ground water but also improve its quality and mitigate flooding. Five per cent of
any built up area, be it an apartment complex or individual house, if used for rainwater harvesting,
can mitigate floods and also reduce water bills. Some towns in Germany have made it mandatory for
construction projects to take responsibility for their excess run-off or pay more for putting pressure
on storm water drains.

Rain water harvesting is what all individuals can do but the administration can contribute to this
effort as well. Storm water drains could be utilized as water harvesting measure rather than just act
as carriers of excess water to the sea. Recharge wells can be constructed in open spaces around storm
water drains. Water in drains can be intercepted and directed to these wells. In areas where open
spaces are not available, recharge wells can be dug in the drain itself under the man-hole so that it
can be cleaned also from time to time.
Every drop of rainwater contributes to floods, so permeable gravel or stone lined parking spaces and
footpaths that can absorb water rather than concretized floor would also help. And there is no
substitute to planting trees in whatever area is available to promote absorption of water and control
run-off of soil. The incidents of water-logging in Dhaka, other cities and rural areas have been
worsening every monsoon due to the fact that effective prevention measures are not undertaken or
executed properly by the designated authorities.
Even though the issue of water logging hits the headlines and the authorities concerned repeatedly
admit their inability to tackle it and pledge better action and preparedness, we dont see urgency in
government officials to work for an end to the massive hindrance of public life by carrying out
effective long, medium or short-term measures.
Water-logging has a serious impact on public health as rain water mixes with dumped waste, toxins
of the drains and even weak sewerage systems. In many areas, water supply connections are
contaminated and people have to go far to collect drinking water. People often face common skin
diseases, malaria and water-borne diseases.
Initiating development activities in the dry season is a major step the government has to take
breaking the age-old malpractice. Theres no alternative to coordination among the related
agencies and individuals in planning and execution of the comprehensive work plans to protect the
people of the country. We need to ensure a sustainable society where the citizens would not be
devastated by natural disasters due to a handful of brutal and greedy officials lack of affection for
mankind. It is perhaps the incredible and natural abundance of water in Bangladesh that has
resulted in many of the environmental concern that Bangladesh faces today. The dual forces of the
topography and ecology of Bangladesh have certainly shaped water logging as a natural problem,
but this cannot be cited as the only reason. In fact, it is a dangerous inclination to leave the solution
to water logging in the hands of nature hoping it will take care of itself.
Water logging in Dhaka can also be considered a result of poor river management and in general,
failed water management projects over decades, making it a primarily a human induced issue. In
fact, most modern environmental problems are human induced, resulting either from a lack of
compliance with national policies, rules and regulations, or from resource constraints to implement
different measures.
The case for taking action against water logging in Dhaka must further be framed through an
economic lens. It is well recognized that flooding and water logging has severe impacts on local
businesses and commerce. During the major floods in September 2004, business and economic
activities came to a halt in Dhaka as a result of heavy rainfall and flooding. Dhakas Stock Exchange
was temporarily suspended and many garment factories were closed and many workers were unable
to even reach the factories since most of their homes were flooded. Business in shopping centers and
stores were unusually low for the city and airline flights, especially on domestic routes which also
faced severe delays.

We hope that the government will take more notice and


understand that efficient measures can be developed and put into place to tackle an issue as daunting
as water logging in Dhaka City.

Traffic Jam of Bangladesh and solution of this


problem
Bangladesh is a most densely populated country in the world. The Traffic jam is the main and common
problem in the country, especially Dhaka and Chittagong district. Dhaka is mega city and Dhaka is the
capital of Bangladesh. More than twelve million people live in Dhaka and the population of Dhaka is
increasing rapidly. So, many problems created by its huge population. Every day about seven hundred
thousand rickshaws ply in road of Dhaka and the huge number of rickshaws is creating a Traffic jam in
the city. Almost all the street is getting jammed by buses, CNG and rickshaws.

Traffic jam has become a regular feature of Dhaka city. Traffic jam obstructed increasing our trade and
commerce. If we out from home for office or school, we may face jam and only twenty minute way may

take two hours because of the jam. So that we need more time to reach our destination and we lose our
valuable time. The students also face problems to attend their class times. For Traffic jam we cannot
complete our task write time so our trade and commerce affected. We cannot provide goods and material
with in due time. We have to spend half of the day on the road if we want to go somewhere in the city. It
also polluted our environment because many vehicles gathering together are created sound and air
pollution.

Reasons behind
Many reasons are for causing frequent jams in the Dhaka city. Illegal parking is one of the main reasons
for Traffic jam. Many trucks, Cars and other vehicles are parked inside and on the road. The reason is
faulty traffic signaling systems, narrow road spaces and overtaking tendency of drivers. Bus drivers are
mostly responsible for a Traffic jam and they do not care about the traffic rules and signals.
The drivers and person's irresponsibility and lack of knowledge is also causing jams. The rickshaw pullers
are mostly responsible for Traffic jam in the Dhaka city. There are about seven hundred thousand
rickshaws are playing on the road of Dhaka city. So the huge rickshaw makes jam and it is one of the
most uses vehicle in the city. The narrow roads are also causes Traffic jam because huge vehicle are
playing in the road.

Can we reduce Traffic jam?


If some steps follow then we may reduce somehow, but we cannot solve it permanently. The
steps:
If we really want to solve this problem, then decentralization is a must of everything.Our Industrialization
should be based on upozila it should not depend on metropolitan cities. And our garments may be shifted
from Dhaka city. It will reduce increase population in the city.
Make a good public transport system that people get it easily and it will reduce Traffic jam.
If possible create a rickshaw and by cycle street beside the main street of the city and withdraw rickshaw
from the main roads of Dhaka city then it may reduce Traffic jam.
Establish a good traffic system and create lane for different vehicles and strictly maintain it.

Main roads should be one way and all parking must bend in all roads.
People should use zebra cross and foot over bridge while crossing roads and should respect the law.
Increase parking facilities for vehicles.
Invalid vehicles must be prohibits in the road.
Everyone should follow the Traffic rules.
So everybody should care about Traffic rules that will helpful to prevent jamming. If we solve Traffic
jam we get facilities of all sectors of our city life like trade and commerce and personal life also. We can
reach our destination within short time and we will work more in every day.

Das könnte Ihnen auch gefallen