Discuss About The Journal Of Cyber Warfare And Terrorism.
In the era of technology, Internet has become the most crucial medium for making the world a better place to live. With the use of Internet, the whole world is getting connected with each other and hence becoming capable of sharing capable information with the people anywhere in the world. The biggest contribution of Internet is the fact that it has enhanced the level of communication and management it available to all at the cheapest of price. With the benefits that internet gives to the people there are many demerits that also exist with it. Internet has not only empowered the state actors in doing their work in favour of the nation but it has also facilitated non-state actors to conduct their activities[1]. They are using internet for various kinds of activities without the notice of government hence it is becoming difficult for the nations to control these activities. This report discusses the ways in which the non-state actors take the use of Internet. It also highlights the ways in which governments can respond to these non-state actors.
In any country, there are various non-state actors that are present at any time. They have the role of destabilising the environment that exists within a country. It is also termed as the organisation or individual that has a significant political impact but the only problem is that they are generally not allied to any specific state or country[2]. The division of category of the non-sate actors is based on the structure, interests and impact of non-state actors varies widely.
In several types of non-state actors there are few which are considered to be violent. They are very dangerous for the security and safety of the nation. This is because of the fact that their major objective is to create tensions in the society. In the last decades or so it has been seen that these violent non-states actors have started to take use of internet so as to conduct their operations. Their functions differ from actor to actor. Some of the most common type of non-state actors and the way in which they use internet is presented below:
In many parts of the world, it has been seen that there are individuals or organisation who are demanding for separating themselves from a country[3]. The separatist in the Kashmir is demanding of another sovereign state. For this they are taking use of violence at times. The internet has helped them in various ways. Some of them are:
They are the most common violent non-state actors which may lie inside the country as well as may exist outside the nation boundaries[5]. The biggest example of it was ISIS which was present in various parts of the Middle East. They have also taken the use of internet for various types of purposes. Some of them are:
They are also the big non state actors as their intension is also to sell their products irrespective of the fact that it destroys the health of the people taking it. Since most of the drug addicts are from young age group hence they are destroying the health economics of the nation[8]. They are also utilising the internet sources for conducting their illegal actions. Some of the uses of internet by them are illustrated below:
In recent years it was also seen that the Naxalites which were not using advanced technologies have also started to use internet mediums for achieving their objectives[10]. In various ways they have also been using it for achieving benefit. Some of their purposes for using internet mediums are:
It can be easily seen that almost all the non-state actors use internet these days and the most crucial utilisation of it is for the communication[12]. Almost all the actor’s groups take use of different functions of the internet so as to achieve their objectives.
There are various steps taken by the government in regard to use of internet for their personal benefit. Since it not possible for the government to pose restriction over the internet neither have the choice that they could ban the use of internet for the particular group. As internet these days are easily and cheaply available hence have become a very common mode of communication for all the non-state actors[13]. Along with problems that governments are facing all across the globe there are various steps that are also taken by them to respond to this record. Some of them are:
Conclusion
From the above report a conclusion can be derived that internet has not only empowered the state actors to make their process easier rather it has also empowered the non-state actors to conduct their operations. Since there are large numbers of non-state actors present in any nations who are using internet for various types of purposes hence the government must have a restriction on their use of internet. It is seen that most common use of internet is to communicate within their group. Government all around the world is trying very hard to stop these activities by non-state actors so as to ensure that security of the nation will be maintained.
References
“SPCTA”. International Journal Of Cyber Warfare And Terrorism 6, no. 2 (2016): 41-60. doi:10.4018/ijcwt.2016040104.
Tereshchenko, Natalia. “US Foreign Policy Challenges Of Non-State Actors’ Cyber Terrorism Against Critical Infrastructure”. International Journal Of Cyber Warfare And Terrorism 2, no. 4 (2012): 28-48. doi:10.4018/ijcwt.2012100103.
Delibasis, Dimitrios. “Cyberspace Warfare Attacks And Non State Actors”. SSRN Electronic Journal, 2011. doi:10.2139/ssrn.1942283.
Ghosh, Pritam. “Cyber Attacks In The Post 9/11 Era: Perspectives On The Non-State Actors And Transnational Armed Conflicts”. SSRN Electronic Journal, 2013. doi:10.2139/ssrn.2266712.
McReynolds, Phillip. “How To Think About Cyber Conflicts Involving Non-State Actors”. Philosophy & Technology 28, no. 3 (2015): 427-448. doi:10.1007/s13347-015-0187-x.
Tsagourias, Nicholas. “Non-State Actors, Ungoverned Spaces And International Responsibility For Cyber Acts”. Journal Of Conflict And Security Law 21, no. 3 (2016): 455-474. doi:10.1093/jcsl/krw020.
Gonzalez, Matthew D. “International Perspectives Of Cyber Warfare”. International Journal Of Cyber Warfare And Terrorism 5, no. 4 (2015): 59-68. doi:10.4018/ijcwt.2015100103.
Winterfeld, Steve, and Jason Andress. The Basics Of Cyber Warfare. [Place of publication not identified]: Syngress, 2012.
Surabhi, Medha. “Cyber Warfare And Cyber Terrorism”. SSRN Electronic Journal, 2012. doi:10.2139/ssrn.2122633.
Kazi, Reshmi. “The Correlation Between Non-State Actors And Weapons Of Mass Destruction”. Connections: The Quarterly Journal 10, no. 4 (2011): 1-10. doi:10.11610/connections.10.4.01.
Cornish, Paul. On Cyber Warfare. London, England: Royal Institute of International Affairs, 2010.
Ali, Zulfiqar. Cyber Warfare & National Security, 2010.
Mulvenon, James C, and Gregory J Rattray. Addressing Cyber Instability. Vienna, VA: Cyber Conflict Studies Association, civil-engineering.
Bussolati, Nicolò. “The Rise Of Non-State Actors In Cyberwarfare”. Academia.Edu, 2018. https://www.academia.edu/24359488/The_Rise_of_Non-State_Actors_in_Cyberwarfare.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download