Categories
Armed Hostilities

Non-Conventional Terrorism from Theoretical Viewpoints

Non-Conventional terrorism mainly uses and executes non-traditional forms of weapons. They might include chemical, biological, and nuclear types of threat. In addition, the opportunities for terrorist attacks in cyberspace can also be considered as a non-conventional manifestation. Although the planning process for these types of acts is more delicate and difficult, the terrorists can transition to non-traditional methods. It is mainly due to the development of regular terrorism prevention measures. However, it is clear that planning and organizing the cyberattack is more available and executable, whereas biochemical weapons are difficult to acquire.

Our experts can deliver a customized essay
tailored to your instructions
for only $13.00 $11.05/page
308 qualified specialists online

Learn more

The suicide bombing threat is the most prevailing type of terrorism, which is used by Islamic radical groups. The danger will come in the form of cyberattacks by religious extremists against technologically developed nations in the foreseeable future. The opposing theoretical assumptions are that terrorism will occur either in the form of cyberattacks or biochemical ones. There are several cases where the largest corporations, such as Citigroup, have undergone hacking threats and resulted in leaked credit cards and bank account passwords (Khattak, Park, Hong, Boateng, & Smith, 2018). The given method is constantly improving, and today’s effective prevention methods of cybersecurity can render itself useless tomorrow.

It is important not to dismiss the potential dangers of the bio-chemical and nuclear forms of terrorism. Although these approaches are difficult to execute because of the need for the biological weapon, the outcome can be devastating. Spreading viruses, and hazardous gases and toxins are the main methods of bio-chemical terrorism (Horowitz & Narang, 2014). The nuclear threat is also considered a non-conventional one, but planning and executing it is almost impossible because of the rarity and expensiveness of the required materials. All these approaches demand a sufficient level of funding and secrecy because the national security agencies all around the world are becoming more competent.

It is important to note that both cyberterrorism and bio-chemical attacks are difficult to prevent and track, and they both can result in massive losses. The development of technology and the world’s high reliance on the internet increases the opportunities for hackers to execute the given practice (Wang, Lau, & Gerdes, 2018). Cyberattacks do not require a lot of funding, and they can be done by combining advanced technology and access to private information. In addition, it is challenging to track and prevent cyberterrorism due to the increasing use of the internet and the intellectual competence of hackers (Davies, 2018). The amount of information is growing with each second, which renders the targeted prevention useless. An average internet user can avoid IP number identification and encrypt the messages; thus, a properly armed and equipped cyberterrorist can plan and execute the attack without being caught.

In conclusion, non-conventional terrorism can manifest itself either in biochemical and nuclear form, or cyberthreat. Both of these approaches require a certain amount of resources and materials. Although virus and hazardous gas attacks can pose a danger on a massive scale, terrorists do not need many resources to execute cyberattacks.

References

Davies, S. R. (2018). Characterizing hacking: Mundane engagement in US hacker and makerspaces. Science, Technology, & Human Values, 43(2), 171-197.

Horowitz, M. C., & Narang, N. (2014). Poor man’s atomic bomb? Exploring the relationship between “weapons of mass destruction.” Journal of Conflict Resolution, 58(3), 509-535.

On-Time Delivery! Get your 100% customized paper
done in
as little as 3 hours

Let`s start

Khattak, Z. H., Park, H., Hong, S., Boateng, R. A., & Smith, B. L. (2018). Investigating cybersecurity issues in active traffic management systems. Transportation Research Record, 2672(19), 79-90.

Wang, H., Lau, N., & Gerdes, R. M. (2018). Examining cybersecurity of cyberphysical systems for critical infrastructures through work domain analysis. Human Factors, 60(5), 699-718.

This page is having a slideshow that uses Javascript. Your browser either doesn't support Javascript or you have it turned off. To see this page as it is meant to appear please use a Javascript enabled browser.

Jessy
Jessy
Just a bit off from the syllabus rubric, but I can add to the slides on my own. Thank you anyway.
Alvin
Alvin
To the writer, THANK YOU, a million times over, this is very impressive! Thank you to the support team for making a hiccup not turn into a disaster!
Milly.P
Milly.P
There was consistent communication from the start, and it was obvious the writer thoroughly reviewed the information provided. Thank you.
Ivy.G
Ivy.G
Excellent work all the time! love my writer also. Don't know if I'm supposed to do this but I just need to say this writer does excellent work!
Emily.s
Emily.s
The writer followed my instruction thoroughly and did a great job. The quality of the paper is more than I expected. Thank you.
Justus N
Justus N
You people have been really patient with me as I created mechanical engineering content. It’s not an easy topic to handle, yet I can say that I worked with a skilled specialist. My writer took time to understand my ideas but it was mostly my fault. Just share more details.
Kelly H
Kelly H
When I received a paper revision from my new college professor, I was desperate as I didn’t know what to do. If not for Academized, I would be doomed. They know how to fix things for you and explain what was wrong as they fix it.
Paul D
Paul D
You're the best, I'll be using your services again soon! Thank you Thank you Thank you!
Mark P.
Mark P.
I asked my writer to help me compose a personal essay about charity work that I do at the local church. It is not easy for me to express myself in words, which is why I needed some privacy and a good person who would appreciate my thoughts and ideas.

error: Content is protected !!
Open chat
1
Do You Need Assignment Help? Lets Chat!
StudyPoo Inc.
Get Help Instantly direct from an Expert.

Talk through Live Chat right now!