ﺍﻟﻌﻼﻗﺔ ﺑﲔ ﺍﻷﺭﻫﺎﺏ ﺍﳌﻌﻠﻮﻣﺎﺗﻰ ﻭﺍﳉﺮﺍﺋﻢ ﺍﳌﻨﻈﻤﺔ

of 17

Please download to get full document.

View again

All materials on our website are shared by users. If you have any questions about copyright issues, please report us to resolve them. We are always happy to assist you.
PDF
17 pages
0 downs
14 views
Share
Description
‫‪١‬‬ ‫ﻤﻘﺩﻤﻪ‪:‬‬ ‫ﺗﻔﺮض اﻟﻈﺮوف اﻟﺪوﻟﻴﺔ اﻟﻘﺎﺋﻤﺔ ﻋﻠﻲ آﻞ ﻣﻦ ﻳﺮﻏﺐ…
Transcript
‫‪١‬‬ ‫ﻤﻘﺩﻤﻪ‪:‬‬ ‫ﺗﻔﺮض اﻟﻈﺮوف اﻟﺪوﻟﻴﺔ اﻟﻘﺎﺋﻤﺔ ﻋﻠﻲ آﻞ ﻣﻦ ﻳﺮﻏﺐ اﻟﻤﺸﺎرآﺔ ﻓﻲ اﻟﻌﻴﺶ ﺑﻜﺮاﻣﺔ ﻣﻊ‬ ‫اﻟﻮاﻗﻊ اﻟﻌﺎﻟﻤﻲ أن ﻳﺘﺴﻢ ﺑﺮؤﻳﺔ إﺳﺘﺮاﺗﻴﺠﻴﺔ ﻣﺘﻜﺎﻣﻠﺔ ﻟﻠﺘﺨﻄﻴﻂ اﻟﺴﻠﻴﻢ ﻟﺤﺴﻦ إدارة‬ ‫ﺟﻤﻴﻊ اﻟﻌﻨﺎﺻﺮ اﻟﺘﻲ ﺗﺘﻄﻠﺒﻬﺎ ﺗﻠﻜﻤﻮا اﻟﺼﻨﺎﻋﺔ ﻣﻦ ﺣﻴﺚ ؛ اﻟﻌﻨﺎﺻﺮ اﻟﺒﺸﺮﻳﺔ اﻟﻮﻃﻨﻴﺔ ؛‬ ‫و اﻟﺘﻘﻨﻴﺎت اﻟﻨﺎﺑﻌﺔ ﻣﻦ ﻓﻜﺮ وإﺑﺪاع اﻟﻌﻨﺎﺻﺮ اﻟﻮﻃﻨﻴﺔ وﺣﺎﺟﺔ اﻟﻤﺠﺘﻤﻊ ؛ ﺑﺎﻹﺿﺎﻓﺔ إﻟﻲ‬ ‫ﺗﻄﻮﻳﺮ اﻟﻨﻈﻢ واﻟﻠﻮاﺋﺢ واﻟﻘﻮاﻧﻴﻦ ﺑﻤﺎ ﻳﺤﻘﻖ ﺣﺴﻦ إﺳﺘﺜﻤﺎر ﺻﻨﺎﻋﺔ اﻟﻤﻌﻠﻮﻣﺎت‬ ‫واﻷﻏﺘﺼﺎﻻت ﺑﺼﻔﺔ ﻋﺎﻣﺔ ‪.‬‬ ‫وهﺬا ﻣﺎ دﻓﻊ ﺟﺎﻣﻌﺔ ﻧﺎﻳﻒ اﻟﻌﺮﺑﻴﺔ ﻟﻠﻌﻠﻮم اﻷﻣﻨﻴﺔ إﻟﻲ إدراج هﺬﻩ اﻟﺪورة ﻣﻨﺬ ﺳﻨﻮات‬ ‫ﻋﺪة ﻓﻲ ﻧﺸﺎﻃﺎﺗﻬﺎ وﺑﺮاﻣﺞ ﻋﻤﻠﻬﺎ اﻟﺴﻨﻮﻳﺔ اﻟﻤﺒﺎرآﺔ إن ﺷﺎء اﷲ أﻣﻼ ﻓﻲ اﻟﺘﻮﺻﻞ إﻟﻲ‬ ‫ﻧﺘﺎﺋﺞ ﺳﺎرة ﻓﻲ هﺬاﻟﻤﻴﺪان اﻟﺨﺼﺐ ذو اﻟﺪﻳﻨﺎﻣﻴﻜﻴﺔ اﻟﻤﺘﻨﺎهﻴﺔ ﻓﻲ اﻟﺴﺮﻋﺔ ‪.‬‬ ‫واﷲ وﻟﻲ اﻟﺘﻮﻓﻴﻖ واﻟﺴﺪاد‪،،‬‬ ‫ﻟﻮاء ﻓﻨﻲ ‪/‬م‬ ‫د‪.‬ﻋﺒﺪ اﻟﺮﺣﻤﻦ ﺑﻦ ﻋﺒﺪ اﻟﻌﺰﻳﺰ ﺑﻦ زﻳﺪ ﺑﻦ ﻋﺒﺪ اﻟﻮاﺣﺪ‬ ‫ﺍﻷﻫﺩﺍﻑ‬ ‫ﺗﻬﺪف ﺟﺎﻣﻌﺔ ﻧﺎﻳﻒ اﻟﻌﺮﺑﻴﺔ ﻟﻠﻌﻠﻮم اﻷﻣﻨﻴﺔ ﻣﻦ ﻋﻘﺪ هﺬﻩ اﻟﺪورة اﻟﺘﺪرﻳﺒﻴﺔ ﻋﻦ‬ ‫اﻹرهﺎب اﻟﻤﻌﻠﻮﻣﺎﺗﻲ إن ﺷﺎء اﷲ إﻟﻰ ﻋﺪة أﻣﻮر ﻣﻦ أهﻤﻬﺎ ‪-:‬‬ ‫اﻟﻤﺸﺎرآﺔ ﻓﻲ ﻧﺸﺮ اﻟﻮﻋﻲ واﻟﺘﺜﻘﻴﻒ ﺑﺎﻹرهﺎب اﻟﻤﻌﻠﻮﻣﺎﺗﻲ آﺄﺣﺪ اﻟﻘﻀﺎﻳﺎ اﻷﻣﻨﻴﺔ‬ ‫اﻟﻤﻌﺎﺻﺮة ‪.‬‬ ‫ﺗﺴﻠﻴﻂ اﻟﻀﻮء ﻋﻠﻰ ﺗﻔﺎﻋﻞ ﺑﻌﺾ اﻟﺪول ﻓﻲ ﻣﺠﺎل ﻣﻮاﺟﻬﺔ اﻹرهﺎب اﻟﻤﻌﻠﻮﻣﺎﺗﻲ ‪.‬‬ ‫وﺗﻬﺪف اﻟﺪراﺳﺎت اﻟﻤﻘﺪﻣﺔ ﻣﻦ ﻗﺒﻞ ﻧﺨﺒﺔ ﻣﻦ اﻟﻤﺨﺘﺼﻴﻦ واﻟﺨﺒﺮاء اﻷﻣﻨﻴﻴﻦ اﻟﻤﻤﺎرﺳﻴﻦ‬ ‫إﻟﻰ ﺗﻨﻤﻴﺔ وﺗﻄﻮﻳﺮ اﻟﺤﺲ واﻟﻮﻋﻲ واﻟﻤﻤﺎرﺳﺔ ﻓﻲ ﺣﻤﺎﻳﺔ اﻷﻣﻦ اﻟﻮﻃﻨﻲ ﻟﺪول اﻟﺠﺎﻣﻌﺔ‬ ‫اﻟﻌﺮﺑﻴﺔ ﺧﺎﺻﺔ وﻟﻠﻌﺎﻟﻢ اﻹﺳﻼﻣﻲ ﺑﺼﻔﺔ ﻋﺎﻣﺔ‬ ‫اﻟﺤﺪ ﻣﺎ أﻣﻜﻦ ﻣﻦ ﺳﻠﺒﻴﺎت ﺛﻮرة اﻟﻤﻌﻠﻮﻣﺎت و اﻹﺗﺼﺎﻻت ؛ وﺗﻘﻠﻴﻞ اﻷﺿﺮار اﻟﻤﺘﺮﺗﺒﺔ‬ ‫ﻋﻠﻲ ﺣﺎﻻت اﻹﺧﺘﺮاق واﻟﺘﺪﻣﻴﺮ أو اﻟﺘﻌﻄﻴﻞ ﻟﻠﻨﺸﺎﻃﺎت اﻷﻣﻨﻴﺔ أو اﻟﺨﺪﻣﻴﺔ‪.‬‬ ‫‪١‬‬ ‫‪٢‬‬ ‫اﻟﺘﻌﺮف ﻋﻠﻰ ﺑﻌﺾ اﻟﻤﺸﺎآﻞ اﻟﻤﻌﺎﺻﺮة اﻟﻨﺎﺟﻤﺔ ﻋﻦ اﻹرهﺎب اﻟﻤﻌﻠﻮﻣﺎﺗﻲ وإدراك‬ ‫أﺳﺒﺎﺑﻬﺎ وﺗﻮﺣﻴﺪ اﻟﺠﻬﻮد ﻟﻠﻤﻌﺎﻟﺠﺔ ﻋﻦ ﻃﺮﻳﻖ ﺗﺒﺎدل اﻵراء وﺗﺠﻤﻴﻊ اﻟﻤﻌﻠﻮﻣﺎت ﻣﻦ‬ ‫واﻗﻊ اﻟﺘﺠﺎرب اﻟﺬاﺗﻴﺔ ﻟﻠﻤﺸﺎرآﻴﻦ آﻤﺤﺎوﻟﺔ ﺟﺎدة ﻟﻤﻤﺎرﺳﺎت ﻋﻠﻤﻴﺔ ﺗﺤﻘﻖ ﺑﺈذن اﷲ‬ ‫اﻟﻠﺤﺎق ﺑﺮآﺐ ﻣﺴﻴﺮة ﻧﺮﺟﻮ ﻣﻦ اﻟﻤﻮﻟﻲ أن ﻳﻜﺘﺐ ﻟﻨﺎ ﻓﻴﻬﺎ اﻟﺴﺒﻖ آﺄﺳﻼﻓﻨﺎ‪!!! .‬‬ ‫‪٢‬‬ ‫‪٣‬‬ ‫اﻟﺒﺮﻧﺎﻣﺞ اﻟﺰﻣﻨﻲ‬ ‫ﺍﻟﻴﻮﻡ‪/‬ﺍﻟﺘﺎﺭﻳﺦ‬ ‫ﺍﻟﺘﻮﻗﻴﺖ‬ ‫ﺻﺒﺎﺣﺎ‬ ‫ﺍﻷﺣﺪ‬ ‫‪١٤٢٧/٣/١١‬‬ ‫‪٢٠٠٦/٤/٩‬‬ ‫ﺍﻷﺛﻨﲔ‬ ‫‪١٤٢٧/٣/١٢‬‬ ‫‪٢٠٠٦/٤/١٠‬‬ ‫‪١٠ -٩‬‬ ‫ﻇﻬﺮﺍ‬ ‫‪١٢-١٠‬‬ ‫‪٢٠٠٦/٤/١١‬‬ ‫ﺗﺴﺠﻴﻞ ﺍﳌﺸﺎﺭﻛﲔ‬ ‫ﺍﳌﻨﺴﻖ ﺍﻷﺩﺍﺭﻯ‬ ‫ﺍﳌﺸﺮﻑ ﺍﻟﻌﻠﻤﻲ‬ ‫ﺗﻘﺪﱘ ﻋﺎﻡ ﳌﻮﺿﻮﻋﺎﺕ ﺍﻟﺪﻭﺭﺓ‬ ‫ﺩ‪/‬ﻋﺒﺪﺍﻟﺮﲪﻦ ﺑﻦ ﻋﺒﺪ‬ ‫ﺍﻟﻌﺰﻳﺰ ﺑﻦ ﻋﺒﺪﺍﻟﻮﺍﺣﺪ‬ ‫ﺻﺒﺎﺣﺎ‬ ‫ﺍﻷﺭﻫﺎﺏ ﺍﳌﻌﻠﻮﻣﺎﺗﻰ‬ ‫ﺍﳌﺮﺍﻗﺐ ﺍﻟﻌﺎﻡ‬ ‫‪١١ -٩‬‬ ‫ﰱ ﺍﻟﻘﺎﻧﻮﻥ ﺍﳌﻐﺮﰉ ﻭﺍﻟﺪﻭﱃ‪.‬‬ ‫ﻋﺒﺪﺍﳊﻖ ﺑﺎﺳﻮ‬ ‫ﻭﺳﺎﺋﻞ ﺍﻷﻋﻼﻡ ﺍﳌﻌﺎﺻﺮﺓ ﻭﻇﺎﻫﺮﺓ‬ ‫ﺃ‪.‬ﺩ ‪ /‬ﻋﺒﺪﺍﷲ‬ ‫ﻇﻬﺮﺍ‬ ‫‪١٣-١١‬‬ ‫ﺍﻟﺜﻼﺛﺎﺀ‬ ‫‪١٤٢٧/٣/١٣‬‬ ‫ﻣﻮﺿﻮﻋﺎﺕ ﺍﻟﺪﻭﺭﺓ‬ ‫ﺍﶈﺎﺿﺮ‬ ‫ﺻﺒﺎﺣﺎ‬ ‫‪١١ -٩‬‬ ‫ﺍﻷﺭﻫﺎﺏ ﺍﳌﻌﻠﻮﻣﺎﺗﻰ‬ ‫ﺍﻟﻌﻼﻗﺔ ﺑﲔ ﺍﻷﺭﻫﺎﺏ ﺍﳌﻌﻠﻮﻣﺎﺗﻰ ﻭﺍﳉﺮﺍﺋﻢ‬ ‫ﺍﳌﻨﻈﻤﺔ‬ ‫ﻭﻣﺎ ﻫﻮ ﺭﺩ ﻓﻌﻞ ﺍﻟﻘﻄﺎﻉ ﺍﳋﺎﺹ‬ ‫‪٣‬‬ ‫ﻧﺎﺻﺮ ﺍﳊﻤﻮﺩ‬ ‫ﻟﻮﺍﺀ‪/‬ﻋﺒﺪ ﺍﳊﻤﻴﺪ ﺍﻟﻌﺮﻳﺎﻥ‬ ‫ﺍﻟﻌﻤﻴﺪ‪/‬ﳑﺘﺎﺯ ﺃﲪﺪ ﺍﻟﻄﺎﻟﺐ‬ ‫‪٤‬‬ ‫ﺍﻷﺭﻫﺎﺏ ﺍﻟﻔﻀﺎﺋﻰ ﻭﻋﻤﻠﻴﺎﺕ ﺍﻟﺘﺠﺴﺲ‬ ‫ﻇﻬﺮﺍ‬ ‫‪١٣-١١‬‬ ‫ ﻣﻦ ﻳﺰﺍﻭﻟﻪ؟‬‫‪ -‬ﻛﻴﻒ ﻳﺘﻢ ﲢﺪﻳﺪﻩ؟‬ ‫ﺃ‪:‬ﺭﺿﻮﺍﻥ ﻳﻮﻋﻮﻥ‬ ‫ ﻣﺎﻫﻰ ﺍﻷﺳﺘﺮﺍﺗﻴﺠﻴﺔ ﳌﻮﺍﺟﻬﺘﻪ؟‬‫‪ -‬ﺩﺭﺍﺳﺔ ﺣﺎﻻﺕ ﻭﺃﺣﺼﺎﺋﻴﺎﺕ‬ ‫ﺍﻟﻴﻮﻡ‪/‬ﺍﻟﺘﺎﺭﻳﺦ‬ ‫ﺍﻟﺘﻮﻗﻴﺖ‬ ‫ﻣﻮﺿﻮﻋﺎﺕ ﺍﻟﺪﻭﺭﺓ‬ ‫ﺍﶈﺎﺿﺮ‬ ‫ﺩﻭﺭ ﺍﻷﺣﻬﺰﺓ ﺍﻷﻣﻨﻴﺔ ﰱ ﻣﻜﺎﻓﺤﺔ ﺟﺮﺍﺋﻢ‬ ‫ﺍﻷﺭﻫﺎﺏ ﺍﳌﻌﻠﻮﻣﺎﺗﻰ‬ ‫ﺻﺒﺎﺣﺎ‬ ‫ﺍﻷﺭ ﺑﻌﺎﺀ‬ ‫‪١١ -٩‬‬ ‫ ﻣﱴ ﻳﺘﻢ؟‬‫‪ -‬ﻣﻦ ﻳﺘﻮﻻﻩ؟‬ ‫ﺍﻟﺒﺪﺍﻳﻨﺔ‬ ‫‪ -‬ﻛﻴﻒ ﻭﺃﻳﻦ ﻳﺘﻢ ؟‬ ‫‪١٤٢٧/٣/١٤‬‬ ‫‪ -‬ﳌﺎﺫﺍ ﳚﺐ ﺍﻥ ﻳﺘﻜﺮﺭ؟‬ ‫‪٢٠٠٦/٤/١٢‬‬ ‫ﻇﻬﺮﺍ‬ ‫‪١٣-١١‬‬ ‫ﺍﳋﻤﻴﺲ‬ ‫ﺍﻟﺘﺤﻘﻴﻖ ﻭ ﺍﻟﺘﺪﻗﻴﻖ ﺍﻷﻣﲎ ﺍﻟﺮﻗﻤﻰ‪-:‬‬ ‫ﺃ‪.‬ﺩ ‪ /‬ﺫﻳﺎﺏ ﻣﻮﺳﻰ‬ ‫ﺃﳘﻴﺔ ﺍﻟﺘﻌﺎﻭﻥ ﺍﻟﻌﺮﰉ ﻭﺍﻟﺪﻭﱃ ﰱ ﻣﻜﺎﻓﺤﺔ‬ ‫ﺟﺮﺍﺋﻢ ﺍﻷﺭﻫﺎﺏ ﺍﳌﻌﻠﻮﻣﺎﺗﻰ‬ ‫ﺍﻟﻌﻤﻴﺪ ﺷﺮﻃﺔ‬ ‫ﻋﺒﺪﺍﺠﻤﻟﻴﺪ ﺍﳊﻼﻭﻯ‬ ‫ﺻﺒﺎﺣﺎ‬ ‫ﺍﻷﺭﻫﺎﺏ ﺍﳌﻌﻠﻮﻣﺎﺗﻰ‬ ‫ﺩ‪/‬ﻋﺒﺪﺍﻟﺮﲪﻦ ﺑﻦ ﻋﺒﺪ‬ ‫‪١١ -٩‬‬ ‫ﺣﺠﻢ ﺍﳌﺸﻜﻠﺔ ﻭﺍﻟﺘﻔﺎﻋﻞ ﻣﻌﻬﺎ‬ ‫ﺍﻟﻌﺰﻳﺰ ﺑﻦ ﻋﺒﺪﺍﻟﻮﺍﺣﺪ‬ ‫‪١٤٢٧/٣/١٥‬‬ ‫‪٢٠٠٦/٤/١٣‬‬ ‫ﻇﻬﺮﺍ‬ ‫‪١٣-١١‬‬ ‫ﺇﺧﺘﺘﺎﻡ ﺍﻟﺪﻭﺭﺓ ﻭﺗﺴﻠﻴﻢ ﺍﻟﺸﻬﺎﺩﺍﺕ‬ ‫‪٤‬‬ ‫‪٥‬‬ ‫ﺑﻴﺎﻥ ﺑﺎﲰﺎﺀ ﺍﻟﺴﺎﺩﺓ ﺍﶈﺎﺿﺮﻳﻦ‬ ‫ﻡ‬ ‫ﺃﺳﻢ ﺍﶈﺎﺿﺮﻩ‬ ‫اﳉﻨﺴﻴﺔ‬ ‫ﺍﻹﺭﻫﺎﺏ ﺍﳌﻌﻠﻮﻣﺎﰐ ﺣﺠﻢ ﺍﳌﺸﻜﻠﺔ ﻭﻃﺒﻴﻌﺔ‬ ‫ﺍﳌﻤﻠﻜﺔ ﺍﻟﻌﺮﺑﻴﺔ‬ ‫ﺍﻟﺘﻔﺎﻋﻞ ﻣﻌﻬﺎ‬ ‫ﺍﻟﺴﻌﻮﺩﻳﺔ‬ ‫ﺍﶈﺎﺿﺮ‬ ‫ﻟﻮﺍﺀ ﻓﲏ ‪ /‬ﻡ‬ ‫‪١‬‬ ‫ﺩ‪.‬ﻋﺒﺪ ﺍﻟﺮﲪﻦ ﺑﻦ ﻋﺒﺪ ﺍﻟﻌﺰﻳﺰ ﺑﻦ‬ ‫‪٢‬‬ ‫ﻟﻮﺍﺀ‪.‬ﻡ‪/‬ﻋﺒﺪ ﺍﳊﻤﻴﺪ ﺍﻟﻌﺮﻳﺎﻥ‬ ‫‪٣‬‬ ‫ﺍﻟﻌﻤﻴﺪ‪/‬ﳑﺘﺎﺯ ﺃﲪﺪ ﺍﻟﻄﺎﻟﺐ‬ ‫ﺍﳌﻨﻈﻤﺔ‬ ‫‪٤‬‬ ‫ﺭﺿﻮﺍﻥ ﻳﻮ ﻋﻮﻥ‬ ‫ﺍﻷﺭﻫﺎﺏ ﺍﻟﻔﻀﺎﺋﻰ ﻭﻋﻤﻠﻴﺎﺕ ﺍﻟﺘﺠﺴﺲ‬ ‫‪٥‬‬ ‫ﺃ ‪ /‬ﻋﺒﺪﺍﳊﻖ ﺑﺎﺳﻮ‬ ‫ﻋﺒﺪ ﺍﻟﻮﺍﺣﺪ‬ ‫ﺍﻟﻌﻼﻗﺔ ﺑﲔ ﺍﻷﺭﻫﺎﺏ ﺍﳌﻌﻠﻮﻣﺎﺗﻰ ﻭﺍﳉﺮﺍﺋﻢ‬ ‫‪٦‬‬ ‫ﺃ‪.‬ﺩ ‪ /‬ﻋﺒﺪﺍﷲ ﻧﺎﺻﺮ ﺍﳊﻤﻮﺩ‬ ‫‪٧‬‬ ‫ﺃ‪.‬ﺩ ‪ /‬ﺫﻳﺎﺏ ﻣﻮﺳﻰ ﺍﻟﺒﺪﺍﻳﻨﺔ‬ ‫‪٨‬‬ ‫ﺍﻟﻌﻤﻴﺪ ﺷﺮﻃﺔ ‪/‬ﻋﺒﺪﺍﺠﻤﻟﻴﺪ ﺍﳊﻼﻭﻯ‬ ‫ﺍﳌﻨﻈﻤﺔ‬ ‫_ ﻭﻣﺎ ﻫﻮ ﺭﺩ ﻓﻌﻞ ﺍﻟﻘﻄﺎﻉ ﺍﳋﺎﺹ‬ ‫ﺍﻟﻌﻼﻗﺔ ﺑﲔ ﺍﻷﺭﻫﺎﺏ ﺍﳌﻌﻠﻮﻣﺎﺗﻰ ﻭﺍﳉﺮﺍﺋﻢ‬ ‫ﲨﻬﻮﺭﻳﺔ ﻣﺼﺮ‬ ‫ﺍﻟﻌﺮﺑﻴﺔ ﻣﺼﺮ‬ ‫ﺍﳌﻤﻠﻜﺔ ﺍﳌﻐﺮﺑﻴﺔ‬ ‫ﻣﺎﻟﻴﺰﻳﺎ‬ ‫ﺣﺮﺏ ﺍﻟﻔﻀﺎﺀ ‪ ٢٠٠١‬ﺑﲔ ﺍﻟﺼﲔ‬ ‫ﻭﺍﻟﻮﻻﻳﺎﺕ ﺍﳌﺘﺤﺪﺓ ﺍﻷﻣﺮﻳﻜﻴﺔ‬ ‫ﻭﺳﺎﺋﻞ ﺍﻷﻋﻼﻡ ﺍﳌﻌﺎﺻﺮﺓ ﻭﻇﺎﻫﺮﺓ ﺍﻷﺭﻫﺎﺏ‬ ‫ﺍﳌﻌﻠﻮﻣﺎﺗﻰ‬ ‫ﺍﳌﻤﻠﻜﺔ ﺍﻟﻌﺮﺑﻴﺔ‬ ‫ﺍﻟﺴﻌﻮﺩﻳﺔ‬ ‫ﺩﻭﺭ ﺍﻷﺣﻬﺰﺓ ﺍﻷﻣﻨﻴﺔ ﰱ ﻣﻜﺎﻓﺤﺔ ﺟﺮﺍﺋﻢ‬ ‫ﺍﻷﺭﻫﺎﺏ ﺍﳌﻌﻠﻮﻣﺎﺗﻰ‬ ‫ﺍﻟﺘﺤﻘﻴﻖ ﻭ ﺍﻟﺘﺪﻗﻴﻖ ﺍﻷﻣﲎ ﺍﻟﺮﻗﻤﻰ‪-:‬‬ ‫ ﻣﱴ ﻳﺘﻢ؟‬‫‪ -‬ﻣﻦ ﻳﺘﻮﻻﻩ؟‬ ‫ﺍﳌﻤﻠﻜﺔ ﺍﻷﺭﺩﻧﻴﺔ‬ ‫ﺍﳍﺎﴰﻴﺔ‬ ‫ ﻛﻴﻒ ﻭﺃﻳﻦ ﻳﺘﻢ ؟‬‫ ﳌﺎﺫﺍ ﳚﺐ ﺍﻥ ﻳﺘﻜﺮﺭ‬‫ﺃﳘﻴﺔ ﺍﻟﺘﻌﺎﻭﻥ ﺍﻟﻌﺮﰉ ﻭﺍﻟﺪﻭﱃ ﰱ ﻣﻜﺎﻓﺤﺔ‬ ‫ﺟﺮﺍﺋﻢ ﺍﻷﺭﻫﺎﺏ ﺍﳌﻌﻠﻮﻣﺎﺗﻰ‬ ‫‪٥‬‬ ‫ﺍﳌﻤﻠﻜﺔ ﺍﳌﻐﺮﺑﻴﺔ‬ ‫‪٦‬‬ ‫ﺃﺴﻡ ﺍﻟﻤﺤـﺎﻀﺭ‪:‬‬ ‫ﻟﻮﺍﺀ ﻓﲏ ‪ /‬ﻡ ﺩ‪.‬ﻋﺒﺪ ﺍﻟﺮﲪﻦ ﺑﻦ ﻋﺒﺪ ﺍﻟﻌﺰﻳﺰ ﺑﻦ ﻋﺒﺪ ﺍﻟﻮﺍﺣﺪ ﺍﳌﻤﻠﻜﺔ ﺍﻟﻌﺮﺑﻴﺔ ﺍﻟﺴﻌﻮﺩﻳﺔ(‬ ‫ﻤﻭﻀﻭﻉ ﺍﻟﻤﺤــﺎﻀﺭﺓ ‪:‬‬ ‫ﺍﻹﺭﻫﺎﺏ ﺍﳌﻌﻠﻮﻣﺎﰐ ﺣﺠﻢ ﺍﳌﺸﻜﻠﺔ ﻭﻃﺒﻴﻌﺔ ﺍﻟﺘﻔﺎﻋﻞ ﻣﻌﻬﺎ‬ ‫ƒ ﺣﺠﻢ ﺍﳌﺸﻜﻠﺔ‬ ‫ƒ ﳌﺎﺫﺍ ﺍﻟﻐﻤﻮﺽ ﺍﶈﻴﻂ ﲟﻔﻬﻮﻡ ﺍﻟﻺﺭﻫﺎﺏ‬ ‫ƒ ﻃﺒﻴﻌﺔ ﺍﳌﺨﺎﻃﺮ ﻟﻨﻈﻢ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻭﺍﻹﺗﺼﺎﻻﺕ‬ ‫ƒ ﻣﺘﻄﻠﺒﺎﺕ ﺇﺧﺘﺮﺍﻕ ﻧﻈﻢ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺃﻭ ﺍﻹﺗﺼﺎﻻﺕ‬ ‫ƒ ﻃﺒﻴﻌﺔ ﺍﳌﺨﺎﻃﺮ ﻟﻨﻈﻢ ﺍﳌﻌﻠﻮﻣﺎﺕ ﻭﺍﻹﺗﺼﺎﻻﺕ‬ ‫ƒ ﻣﻔﻬﻮﻡ ﺣﺮﺏ ﺍﳌﻌﻠﻮﻣﺎﺕ‬ ‫ƒ ﻣﺘﻄﻠﺒﺎﺕ ﺍﺧﺘﺮﺍﻕ ﺍﻟﻨﻈﻢ‬ ‫ƒ ﻣﺒﺪﺃ ﺍﻟﺸﻤﻮﻟﻴﺔ ﻟﻠﺨﻄﺔ‬ ‫ƒ ﻣﻔﻬﻮﻡ ﺃﻣﻦ ﺍﻷﻓﺮﺍﺩ‬ ‫ƒ ﺗﻔﺎﻋﻞ ﺑﻌﺾ ﺍﻟﺪﻭﻝ ﰲ ﻣﻮﺍﺟﻬﺔ ﺍﻹﺭﻫﺎﺏ ﺍﳌﻌﻠﻮﻣﺎﰐ‬ ‫ƒ ﺇﺳﺘﺠﺎﺑﺔ ﻋﺎﳌﻨﺎ ﺍﻟﻌﺮﰊ ﻟﻺﺭﻫﺎﺏ ﺍﳌﻌﻠﻮﻣﺎﰐ‬ ‫‪٦‬‬ ‫‪٧‬‬ ‫ﺃﺴﻡ ﺍﻟﻤﺤـﺎﻀﺭ‪:‬‬ ‫ﻟﻮﺍﺀ‪.‬ﻡ‪/‬ﻋﺒﺪ ﺍﳊﻤﻴﺪ ﺍﻟﻌﺮﻳﺎﻥ‪).....‬ﲨﻬﻮﺭﻳﺔ ﻣﺼﺮ ﺍﻟﻌﺮﺑﻴﺔ (‬ ‫ﻤﻭﻀﻭﻉ ﺍﻟﻤﺤــﺎﻀﺭﺓ ‪:‬‬ ‫ﺍﻟﻌﻼﻗﺔ ﺑﲔ ﺍﻷﺭﻫﺎﺏ ﺍﳌﻌﻠﻮﻣﺎﺗﻰ ﻭﺍﳉﺮﺍﺋﻢ ﺍﳌﻨﻈﻤﺔ‬ ‫) ﺩﻭﺭ ﺍﺠﻤﻟﺘﻤﻊ ﺍﳌﺪﱏ ‪ /‬ﺍﳋﺎﺹ (‬ ‫ƒ ﻣﺪﺧﻞ ﻋﺎﻡ )ﻣﻘﺪﻣﺔ (‬ ‫ƒ ﺍﳌﺒﺤﺚ ﺍﻷﻭﻝ ‪ :‬ﺍﻳﻦ ﳓﻦ ﻣﻦ ﻧﺸﻄﺎﺀ ﺍﻻﻧﺘﺮﻧﺖ؟‬ ‫ƒ ﺍﳌﺒﺤﺚ ﺍﻟﺜﺎﱏ ‪ :‬ﺑﻌﺾ ﺍﻟﻌﻮﺍﻣﻞ ﺍﻟﻔﺎﻋﻠﺔ ﰲ ﺍﻧﺘﺸﺎﺭ ﺟﺮﺍﺋﻢ ﺍﻷﺭﻫﺎﺏ ﺍ‬ ‫ƒ ﺍﳌﺒﺤﺚ ﺍﻟﺜﺎﻟﺚ ‪ :‬ﺗﺄﻣﻼﺕ ﺣﻮﻝ ﺍﻟﺘﺼﺪﻱ ﻟﻠﺠﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ƒ ﺍﳌﺒﺤﺚ ﺍﻟﺮﺍﺑﻊ ‪ :‬ﺧﺼﺎﺋﺺ ﺍﳉﺮﺍﺋﻢ ﺍﻟﱴ ﺗﺮﺗﻜﺐ ﻋﱪ ﺍﻹﻧﺘﺮﻧﺖ‬ ‫ƒ ﺍﳌﺒﺤﺚ ﺍﳋﺎﻣﺲ ‪ :‬ﺩﻭﺭ ﺍﺠﻤﻟﺘﻤﻊ ﺍﳌﺪﱐ ﰲ ﻣﻜﺎﻓﺤﺔ ﺍﻷﺭﻫﺎﺏ ﺍﳌﻌﻠﻮﻣﺎﺗﻰ‬ ‫ƒ ﺍﳌﺒﺤﺚ ﺍﻟﺴﺎﺩﺱ ‪ :‬ﰲ ﺍﻧﺘﻈﺎﺭ ﺍﻟﺒﻨﺎﺀ ﺍﻟﺘﺸﺮﻳﻌﻲ ﳌﻮﺍﺟﻬﺔ ﺟﺮﺍﺋﻢ ﺍﻻﻧﺘﺮﻧﺖ‬ ‫ƒ ﺍﳌﺒﺤﺚ ﺍﻟﺴﺎﺑﻊ ‪ :‬ﺑﻌﺾ ﺍﳌﺨﺎﻃﺮ ﺍﻟﻨﺎﲨﺔ ﻋﻦ ﺇﺳﺎﺀﺓ ﺍﺳﺘﺨﺪﺍﻡ ﺍﻻﻧﺘﺮﻧﺖ‬ ‫ƒ ﺍﳌﺒﺤﺚ ﺍﻟﺜﺎﻣﻦ ‪ :‬ﺟﺮﺍﺋﻢ ﺍﻹﺭﻫﺎﺏ ﺍﻹﻟﻜﺘﺮﻭﱐ ﺍﳌﻌﻠﻮﻣﺎﺗﻰ ﻭﻋﻼﻗﺘﻪ ﺑﺎﳉﺮﳝﺔ ﺍﳌﻨﻈﻤﺔ‬ ‫ƒ ﺍﳌﺒﺤﺚ ﺍﻟﺘﺎﺳﻊ ‪ :‬ﺩﻭﺭ ﺍﻟﻘﻄﺎﻉ ﺍﳋﺎﺹ ﺍﳉﻤﻌﻴﺔ ﺍﳌﺼﺮﻳﺔ ﳌﻜﺎﻓﺤﺔ ﺟﺮﺍﺋﻢ ﺍﳌﻌﻠﻮﻣﺎﺗﻴﺔ‬ ‫ƒ ﺍﳌﺒﺤﺚ ﺍﻟﻌﺎﺷﺮ ‪ :‬ﺍﻟﺘﻮﺻﻴﺎﺕ )ﻋﻠﻰ ﺍﳌﺴﺘﻮﻯ ﺍﶈﻠﻰ ‪ /‬ﻋﻠﻰ ﺍﳌﺴﺘﻮﻯ ﺍﻟﺪﻭﱃ(‬ ‫ƒ ﺍﳌﺒﺤﺚ ﺍﳊﺎﺩﻯ ﻋﺸﺮ ‪ :‬ﻣﺮﺍﺟﻊ ﺍﻟﺒﺤﺚ ﻭﺍﻟﺪﺭﺍﺳﺔ‬ ‫ﳕﺎﺯﺝ ﻭﺣﻠﻮﻝ ﺍﻣﻨﻴﺔ ﻭﻋﺮﺽ ﺑﺎﻟﺒﻮﺭ ﺑﻮﻳﻨﺖ‬ ‫‪٧‬‬ ‫‪٨‬‬ ‫ﺃﺴﻡ ﺍﻟﻤﺤـﺎﻀﺭ‪:‬‬ ‫ﺭﺿﻮﺍﻥ ﻳﻮ ﻋﻮﻥ ‪)........‬ﻣﺎﻟﻴﺰﻳﺎ(‬ ‫ﻤﻭﻀﻭﻉ ﺍﻟﻤﺤــﺎﻀﺭﺓ ‪:‬‬ ‫ﺍﻷﺭﻫﺎﺏ ﺍﻟﻔﻀﺎﺋﻰ ﻭﻋﻤﻠﻴﺎﺕ ﺍﻟﺘﺠﺴﺲ‬ ‫‪Next generation security technologies.‬‬ ‫ƒ ﻣﻘﺪﻣﺔ – ﻭﻣﻔﻬﻮﻡ ﺍﻹﺭﻫﺎﺏ ﺍﻟﻔﻀﺎﺋﻲ‬ ‫ƒ ﳌﺎﺫﺍ ﳚﺐ ﺃﻥ ﻬﻧﺘﻢ‬ ‫ƒ ﻣﺎﺫﺍ ﰎ ﺇﲣﺎﺫﻩ ﻣﻦ ﺇﺟﺮﺍﺀﺍﺕ‬ ‫ƒ ﻛﻴﻒ ﺃﲪﻲ ﻧﻔﺴﻲ – ﻭﻣﻨﻈﻤﱵ‬ ‫ƒ ﻋﻴﻨﺔ ﻟﺒﺾ ﺍﻟﻘﻀﺎﻳﺎ ﻭﺍﻟﻘﻴﻢ ﺍﳌﻬﻨﻴﺔ‬ ‫ƒ ﻋﻴﻨﺎﺕ ﻟﻌﻤﻠﻴﺎﺕ ﺍﻹﺭﻫﺎﺏ ﺍﻟﻔﻀﺎﺋﻲ‬ ‫ƒ ﻗﻀﺎﻳﺎ ﺍﻟﺘﺸﻔﲑ ﻭﺍﻟﺘﻘﺪﻡ ﺍﻟﺘﻘﲏ‬ ‫ﻣﻘﺪﻣﺔ‬ ‫ﻳﻌﺘﱪ ﺍﳌﺆﻟﻒ ﻣﻦ ﻣﺆﻳﺪﻱ ﺍﺳﺘﺨﺪﺍﻡ ﺍﻟﱪﳎﺔ ﺍﳌﻔﺘﻮﺣﺔ ﺍﳌﺼﺪﺭ ﻭﺫﻟﻚ ﻭﺍﺿﺢ ﰲ ﻣﺪﺧﻠﻪ ﺍﳌﺘﻤﻴﺰ ﰲ ﻫﺬﺍ ﺍﻟﺼﺪﺩ‬ ‫‪ http://red1.org‬ﻭﳝﻜﻦ ﻟﻺﺭﻫﺎﺏ ﺍﳊﺎﺳﻮﰊ ﻣﻦ ﺍﺳﺘﺨﺪﺍﻡ ﺍﻟﱪﺍﻣﺞ ﺍﳌﻔﺘﻮﺣﺔ ﺍﳌﺼﺪﺭ ﺳﻠﺒﺎ ﺃﻭ ﺇﳚﺎﺑﺎ ﻷﻬﻧﺎ ﲢﻤﻞ‬ ‫ﺍﳌﺨﺎﻃﺮﺓ ﺩﺍﺧﻠﻴﺎ‪ .‬ﺇﻥ ﺍﳊﺪ ﺍﻷﺩﱏ ﻫﻮ ﺍﳊﺎﺟﺔ ﻟﻠﺬﻛﺎﺀ ﻭﺍﳌﻌﺮﻓﺔ ﺍﻟﻜﻴﻔﻴﺔ ﻗﺒﻞ ﻣﺒﺎﺷﺮﺓ ﺃﻱ ﻋﻤﻞ ﺃﻣﲏ ﺫﻭ ﻗﺎﻋﺪﺓ ﻭﻳﺐ‬ ‫ﺗﻜﻨﻮﻟﻮﺟﻴﺔ ‪.‬‬ ‫ﻫﺬﻩ ﺍﻷﻭﺭﺍﻕ ﻫﻲ ﻣﻘﺪﻣﺔ ﻟﺸﺮﺡ ﺧﻠﻔﻴﻪ ﻋﻨﻮﺍﻥ ﺍﳌﻮﺿﻮﻉ ﻭﻗﺎﻋﺪﺓ ﺍﻧﻄﻼﻕ ﳌﻨﺎﻗﺸﺎﺕ ﻣﺘﻘﺪﻣﺔ‪ .‬ﻫﺬﻩ ﺍﻷﻭﺭﺍﻕ ﺗﻌﺘﻤﺪ‬ ‫ﻋﻠﻰ ﲡﺮﺑﺔ ﲝﺜﻴﺔ ﻟﻠﻤﺆﻟﻒ ﰲ ﺍﳌﻮﻗﻊ ﺍﳌﺸﺎﺭ ﺇﻟﻴﻪ ﻭﻫﻲ ﺁﺧﺮ ﻣﺎ ﺗﻮﺻﻞ ﺇﻟﻴﻪ ﻣﻦ ﺗﻄﻮﻳﺮ ﻣﺘﻘﺪﻡ ﰲ ﻫﺬﺍ ﺍﺠﻤﻟﺎﻝ‪.‬‬ ‫ﻣﺎﻫﻮ ﺍﻹﺭﻫﺎﺏ ﺍﳊﺎﺳﻮﰊ؟‬ ‫ﺇﻥ ﺍﻹﻑ ﰊ ﺁﻱ ﻳﻌﺮﻑ ﺍﻹﺭﻫﺎﺏ ﺑﺄﻧﻪ ﺍﺳﺘﺨﺪﺍﻡ ﺍﻟﻘﻮﺓ ﺃﻭ ﺍﻟﻌﻨﻒ ﺑﻄﺮﻳﻘﺔ ﻏﲑ ﺷﺮﻋﻴﺔ ﺿﺪ ﺃﺷﺨﺎﺹ ﺃﻭ ﳑﺘﻠﻜﺎﺕ‬ ‫ﻹﻛﺮﺍﻩ ﺃﻭ ﺇﺭﻏﺎﻡ ﳊﻜﻮﻣﺔ ﺃﻭ ﳎﺘﻤﻌﺎﺕ ﺳﻜﺎﻧﻴﺔ ﺃﻭ ﺃﻫﺪﺍﻑ ﳎﺘﻤﻌﺎﺗﻴﺔ‪.‬‬ ‫‪٨‬‬ ‫‪٩‬‬ ‫ﻭﻬﺑﺬﺍ ﻳﻜﻮﻥ ﺍﻹﺭﻫﺎﺏ ﺍﳊﺎﺳﻮﰊ ﻫﻮ ﺍﺳﺘﺨﺪﺍﻡ ﻣﻮﺍﺭﺩ ﺣﺎﺳﻮﺑﻴﺔ ﺿﺪ ﺃﺷﺨﺎﺹ ﺃﻭ ﳑﺘﻠﻜﺎﺕ ﻹﻛﺮﺍﻩ ﺃﻭ ﺇﺭﻏﺎﻡ ﺣﻜﻮﻣﺔ‬ ‫ﺃﻭ ﳎﺘﻤﻌﺎﺕ ﺳﻜﺎﻧﻴﺔ ﺃﻭ ﺃﻫﺪﺍﻑ ﳎﺘﻤﻌﺎﺗﻴﺔ‪ .‬ﻭﻣﺜﺎﻝ ﻋﻠﻰ ﺫﻟﻚ ﺍﻟﺪﺧﻮﻝ ﺍﻟﻐﲑ ﺷﺮﻋﻲ ﻋﻠﻰ ﺟﻬﺎﺯ ﺣﺎﺳﻮﺏ ﻭﺗﻐﻴﲑ‬ ‫ﺟﺮﻋﺎﺕ ﺩﻭﺍﺋﻴﺔ ﺇﻷﻯ ﺩﺭﺟﺔ ﲰﻴﺔ ﻗﺎﺗﻠﻪ ﻋﻠﻰ ﺳﺒﻴﻞ ﺍﻻﻧﺘﻘﺎﻡ‪ .‬ﻳﺒﺪﻭﺍ ﺫﻟﻚ ﻗﻠﻴﻞ ﺍﳊﺪﻭﺙ ﻭﻟﻜﻨﻪ ﳛﺪﺙ‪.‬‬ ‫ﳌﺎﺫﺍ ﻬﻧﺘﻢ ؟‬ ‫ﺍﻥ ﺍﻟﻔﻜﺮﺓ ﻣﻦ ﻫﺬﺍ ﺍﻟﺒﺤﺚ ﻫﻮ ﻋﺮﺽ ﺃﳘﻴﺔ ﻓﻬﻢ ﺧﻄﻮﺭﺓ ﺍﻹﺭﻫﺎﺏ ﺍﳊﺎﺳﻮﰊ ﻭﺗﻮﻓﲑ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺍﻟﱵ ﺗﺴﺎﻋﺪ ﻋﻠﻰ‬ ‫ﺫﻟﻚ ﺍﻟﻔﻬﻢ ‪ .‬ﺇﻥ ﻋﻠﻰ ﳏﺘﺮﰲ ﺍﳊﺎﺳﺐ ﺃﻥ ﻳﻌﻮﺍ ﻣﻨﺎﻃﻖ ﺍﻟﻀﻌﻒ ﺍﳌﻤﻜﻨﺔ ﳍﺬﺍ ﺍﻹﺭﻫﺎﺏ ﻣﻦ ﺃﺟﻞ ﲪﺎﻳﺔ ﺃﻓﻀﻞ ﻷﻧﻈﻤﺔ‬ ‫ﺍﻟﻜﻤﺒﻴﻮﺗﺮ ﻭﺑﺎﻟﺘﺎﱄ ﺍﳌﺴﺎﻋﺪﺓ ﰲ ﻭﺿﻊ ﺣﺪ ﻟﻠﻨﺸﺎﻃﺎﺕ ﺍﻹﺭﻫﺎﺑﻴﺔ ﺍﳊﺎﺳﻮﺑﻴﺔ‪ .‬ﺇﻥ ﻣﻦ ﺃﻫﻢ ﺍﻷﻣﻮﺭ ﻟﺪﻯ ﺍﳌﻬﻨﻴﲔ‬ ‫ﺍﳊﺎﺳﻮﺑﻴﲔ ﻫﻮ ﺍﻟﻘﻴﺎﻡ ﻋﻠﻰ ﲪﺎﻳﺔ ﻣﻬﻨﺘﻬﻢ ﺍﻟﺴﻴﺌﺔ ﺍﻟﺴﻤﻌﺔ ﺑﺴﺒﺐ ﺍﻹﺭﻫﺎﺏ ﺍﳊﺎﺳﻮﰊ ‪ .‬ﻭﻫﻜﺬﺍ ﻋﻠﻰ ﻣﻬﻨﻴﲔ ﺍﳊﺎﺳﻮﺏ‬ ‫ﺍﻟﻘﻴﺎﻡ ﺑﻔﻬﻢ ﺍﻹﺭﻫﺎﺏ ﺍﳊﺎﺳﻮﰊ ﳌﻨﻔﻌﺘﻬﻢ ﺍﻟﺸﺨﺼﻴﺔ ﻭﻣﻨﻔﻌﺔ ﻣﻬﻨﺘﻬﻢ ﻭﳎﺘﻤﻌﻬﻢ ﻛﻜﻞ ‪.‬‬ ‫ﻣﺎ ﰎ ﻓﻌﻠﻪ ﺣﱴ ﺍﻵﻥ؟‬ ‫ﻭﻟﺪﻭﺍﻓﻊ ﺍﳋﻮﻑ ﺍﳌﺘﺰﺍﻳﺪ ﻣﻦ ﺍﻹﺭﻫﺎﺏ ﺍﳊﺎﺳﻮﰊ ﺍﻟﻜﺎﻣﻦ ﻗﺎﻡ ﺍﻟﺮﺋﻴﺲ ﺍﻷﻣﺮﻳﻜﻲ ﻛﻠﻴﻨﺘﻮﻥ ﻋﺎﻡ ‪ ١٩٩٦‬ﺑﺈﻧﺸﺎﺀ ﻫﻴﺌﺔ‬ ‫ﲪﺎﻳﺔ ﺍﻟﺒﻨﻴﺔ ﺍﻟﺘﺤﺘﻴﺔ ﺍﳊﺮﺟﺔ‪ .‬ﻭﺟﺪﺕ ﺍﻟﻠﺠﻨﺔ ﺃﻥ ﺗﺮﻛﻴﺒﺔ ﺍﻟﻜﻬﺮﺑﺎﺀ ﻭﺍﳊﺎﺳﻮﺑﺎﺕ ﻭﺍﻻﺗﺼﺎﻻﺕ ﺍﻟﻀﺮﻭﺭﻳﺔ ﻟﺒﻘﺎﺀ ﺍﻟﻮﻻﻳﺎﺕ‬ ‫ﺍﳌﺘﺤﺪﺓ‪ ،‬ﳝﻜﻦ ‪‬ﺪﻳﺪ ﻛﻞ ﻣﻨﻬﺎ ﺑﻮﺍﺳﻄﺔ ﺍﳊﺮﺏ ﺍﳊﺎﺳﻮﺑﻴﺔ‪ .‬ﻓﺒﺈﺣﻀﺎﺭ ﺣﺎﺳﻮﺏ ﻭﺭﺑﻄﻪ ﺑﺎﻹﻧﺘﺮﻧﺖ ﻣﻦ ﺃﻱ ﻣﻜﺎﻥ ﰲ‬ ‫ﺍﻟﻌﺎﱂ ﻗﺪ ﳝﺜﻞ ﺍﻧﻄﻼﻗﺔ ﳊﺮﺏ ﲢﺪﺙ ﺩﻣﺎﺭﺍ ﻫﺎﺋﻼ ﻟﺘﻠﻚ ﺍﻟﺒﻨﻴﺔ ﺍﻟﺘﺤﺘﻴﺔ‪ .‬ﺃﺿﻒ ﻋﻠﻰ ﺫﻟﻚ ﺃﻥ ﺍﻟﺸﻌﺐ ﺍﳌﻤﺘﻠﻚ‬ ‫ﻟﻠﺤﻮﺍﺳﻴﺐ ﺍﻟﻀﺮﻭﺭﻳﺔ ﻟﻪ ﳚﻬﻞ ﻣﻘﺪﺍﺭ ﺍﳋﻄﺮ ﺍﻟﺬﻱ ﻳﻬﺪﺩ ﺣﻴﺎﺗﻪ ﻣﻦ ﺧﻼﳍﺎ ﻭﳚﻬﻞ ﻣﻘﺪﺍﺭ ﺳﻬﻮﻟﺔ ﻭﺻﻮﻝ ﺗﻠﻚ‬ ‫ﺍﻷﺧﻄﺎﺭ ﻷﺟﻬﺰﺗﻪ ‪ .‬ﻭﻭﺟﺪﺕ ﺍﳍﻴﺌﺔ ﻛﺬﻟﻚ ﺃﻥ ﻋﻠﻴﻬﺎ ﺍﻛﺘﺸﺎﻑ ﺍﳉﺮﳝﺔ ﻭﻣﻜﺎﻥ ﺍﻟﻔﺎﻋﻞ ﻗﺒﻞ ﺃﻥ ﳜﺘﻔﻲ ﺍﻟﻔﺎﻋﻞ‬ ‫ﻭﺗﻀﻴﻊ ﺇﻣﻜﺎﻧﻴﺔ ﲢﺪﻳﺪ ﻣﺴﺆﻭﻟﻴﺘﻪ‪ .‬ﻓﺎﻗﺘﺮﺣﺖ ﺍﳍﻴﺌﺔ ﻋﺰﻝ ﺍﻷﻧﻈﻤﺔ ﺍﳋﻄﲑﺓ ﻋﻦ ﺍﻻﺗﺼﺎﻝ ﺑﺎﳋﺎﺭﺝ ﻭﲪﺎﻳﺘﻬﺎ ﺑﺄﻧﻈﻤﺔ‬ ‫ﺟﺪﺭﺍﻥ ﻧﺎﺭﻳﺔ ﻛﺎﻓﻴﺔ ﻭﺍﻗﺘﺮﺣﺖ ﺃﻓﻀﻞ ﲡﺎﺭﺏ ﻟﺼﻨﻊ ﺍﻟﻜﻠﻤﺎﺕ ﺍﻟﺴﺮﻳﺔ ﻭﺳﺠﻼﺕ ﺍﳌﺘﺎﺑﻌﺔ ﺍﻟﺪﺧﻮﻟﻴﺔ‪.‬‬ ‫ﻫﺬﺍ ﻭﻗﺪ ﻛﻮﻧﺖ ﻣﻌﻈﻢ ﺍﳌﻨﻈﻤﺎﺕ ﺍﳊﻜﻮﻣﻴﺔ ﺍﻷﺧﺮﻯ ﻛﺬﻟﻚ ﻧﻮﻋﺎ ﻣﻦ ﺍﺠﻤﻟﻤﻮﻋﺎﺕ ﺍﻟﱵ ﺗﻌﲏ ﻬﺑﺬﺍ ﺍﻷﻣﺮ‪ .‬ﻓﻘﺪ ﻛﻮﻧﺖ‬ ‫ﺍﻟﺴﻲ ﺁﻱ ﺇﻳﻪ ﳎﻤﻮﻋﺘﻬﺎ ﺍﳋﺎﺻﺔ ﻭﲰﺘﻬﺎ ﻣﺮﻛﺰ ﺷﺌﻮﻥ ﺣﺮﺏ ﺍﳌﻌﻠﻮﻣﺎﺕ ﺑﺪﺃ‪‬ﺎ ﺑﺄﻟﻒ ﻣﻮﻇﻒ ﻳﻌﻤﻠﻮﻥ ﻋﻠﻰ ﻣﺪﺍﺭ‬ ‫ﺍﻷﺭﺑﻊ ﻭﻋﺸﺮﻭﻥ ﺳﺎﻋﺔ‪ .‬ﻭ ﺍﻝ ﺇﻑ ﰊ ﺁﻱ ﺗﺮﺍﻗﺐ ﺍﳍﺎﻛﺮﺯ ﻭﺣﺎﻻﺕ ﻣﺸﺎﻬﺑﻪ‪ .‬ﻭﺍﺠﻤﻟﻤﻮﻋﺎﺕ ﺍﻟﺴﺮﻳﺔ ﺗﻼﺣﻖ ﻟﺼﻮﺹ‬ ‫ﺍﻟﺒﻨﻮﻙ ﻭﺍﶈﺘﺎﻟﲔ ﻭﺣﺎﻻﺕ ﺍﻟﺘﻨﺼﺖ‪ .‬ﺍﻟﻘﻮﺍﺕ ﺍﳉﻮﻳﺔ ﻛﻮﻧﺖ ﻛﺬﻟﻚ ﳎﻮﻋﺘﻬﺎ ﺍﳋﺎﺻﺔ ﻭﲰﺘﻬﺎ ﻓﺮﻕ ﺍﳌﻬﻨﺪﺳﲔ ﺍﻷﻣﲏ‬ ‫ﺍﻷﻟﻜﺘﺮﻭﱐ ‪ ، ESET‬ﺗﺘﻜﻮﻥ ﺍﻟﻔﺮﻗﺔ ﻣﻦ ﺍﺛﻨﲔ ﺇﱃ ﺛﻼﺛﺔ ﺃﻋﻀﺎﺀ ﻳﺬﻫﺒﻮﻥ ﺇﱃ ﻣﻮﺍﻗﻊ ﻋﺸﻮﺍﺋﻴﺔ ﻟﻠﻘﻮﺍﺕ ﺍﳉﻮﻳﺔ‬ ‫ﻭﲢﺎﻭﻝ ﺃﻥ ﺗﻘﻮﻡ ﺑﺎﻟﺘﺤﻜﻢ ﺑﺄﺟﻬﺰ‪‬ﺎ ﻋﻠﻰ ﺳﺒﻴﻞ ﺍﻹﺧﺘﺒﺎﺭ‪ .‬ﻭﻗﺪ ﺍﺳﺘﻄﺎﻋﺖ ﺍﻟﻔﺮﺑﻖ ﺍﻟﺘﺤﻜﻢ ﺍﻟﻜﺎﻣﻞ ﻟﺜﻼﺛﲔ ﺑﺎﳌﺎﺋﺔ ﻣﻦ‬ ‫ﺍﻷﺟﻬﺰﺓ ﺍﳊﺎﺳﻮﺑﻴﺔ ﺍﳋﺎﺻﺔ ﺑﺎﻟﻘﻮﺍﺕ ﺍﳉﻮﻳﺔ‪.‬‬ ‫– ‪Cyber Terrorism & Espionage‬‬ ‫‪The Challenge‬‬ ‫‪By Redhuan D. Oon‬‬ ‫‪٩‬‬ ١٠ Introduction................................................................................................................... 10 What is Cyber-terrorism?.............................................................................................. 10 Why do we care?........................................................................................................... 10 What is being done?...................................................................................................... 11 How can I protect myself? ............................................................................................ 11 Some relavent ethical issues: ........................................................................................ 12 Scenarios of Cyber-terrorism........................................................................................ 12 Case 1:....................................................................................................................... 12 Case 2:....................................................................................................................... 13 Case 3:....................................................................................................................... 13 Case 4:....................................................................................................................... 13 Case 5:....................................................................................................................... 13 Links ............................................................................................................................. 14 Sites related to terrorism prevention:........................................................................ 14 Sites of terrorists and hackers: .................................................................................. 14 Cyber-Espionage – the Case for Open Source.............................................................. 14 Cryptography or Intelligence? ...................................................................................... 15 Introduction /. Open http://red1.orgThe author is an Open Source advocate with his own portal of resource at Source can be used as a positive or negative resource against cyber-terorrism as it carries its own risks. The bottom line is the need of much intelligence and know-how before embarking on a certain security policy for web based technologies. This paper serves as an introduction to the background of the title and acts as a launching pad for further more advanced discussion. This paper is based on ready research material present in the web and is used as a basis for discussion into the latest and contemporary development in the field. What is Cyber-terrorism? The FBI defines terrorism as the unlawful use of force or violence against persons or property to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives. Cyber-terrorism could thus be defined as the use of computing resources to intimidate or coerce others. An example of cyber-terrorism could be hacking into a hospital computer system and changing someone's medicine prescription to a lethal dosage as an act of revenge. It sounds far fetched, but these things can and do happen. Why do we care? The idea of this site is to both illustrate the importance of understanding the dangers of cyber-terrorism, and provide information that can aid in that understanding. Computing professionals all over the world need to be aware of possible areas of weakness to such terrorism, in order to better protect their computer systems and possibly help put an end to terrorist activity. An important part of any profession is promoting the good name of that profession, but cyber-terrorist continue to give the computing profession a bad reputation. Thus, it is important for computing professionals to understand cyber-terrorism for the benefit of themselves, their profession, and society as a whole. ١٠ ١١ What is being done? In response to heightened awareness of the potential for cyber-terrorism President Clinton, in 1996, created the Commission of Critical Infrastructure Protection. The board found that the combination of electricity, communications and computers are necessary to the survival of the U.S., all of which can be threatened by cyber-warfare. The resources to launch a cyber attack are commonplace in the world; a computer and a connection to the Internet are all that is really needed to wreak havoc. Adding to the problem is that the public and private sectors are relatively ignorant of just how much their lives depend on computers as well as the vulnerability of those computers. Another problem with cyber crime is that the crime must be solved, (i.e. who were the perpetrators and where were they when they attacked you) before it can be decided who has the actual authority to investigate the crime. The board recommends that critical systems should be isolated from outside connection or protected by adequate firewalls, use best practices for password control and protection, and use protected action logs. Most other government organizations have also formed some type of group to deal with cyber-terrorists. The CIA created its own group, the Information Warfare Center, staffed with 1,000 people and a 24-hour response team. The FBI investigates hackers and similar cases. The Secret Service pursues banking, fraud and wiretapping cases. The Air Force created its own group, Electronic Security Engineering Teams, ESETs. Teams of two to three members go to random Air Force sites and try to gain control of their computers. The teams have had a success rate of 30% in gaining complete control of the systems. How can I protect myself? Currently there are no foolproof ways to protect a system. The completely secure system can never be accessed by anyone. Most of the militaries classified information is kept on machines with no outside connection, as a form of prevention of cyber terrorism. Apart from such isolation, the most common method of protection is encryption. The wide spread use of encryption is inhibited by the governments ban on its exportation, so intercontinental communication is left relatively insecure. The Clinton administration and the FBI oppose the export of encryption in favor of a system where by the government can gain the key to an encrypted system after gaining a court order to do so. The director of the FBI's stance is that the Internet was not intended to go unpoliced and that the police need to protect people's privacy and public-safety rights there. Encryption's draw back is that it does not protect the entire system, an attack designed to cripple the whole system, such as a virus, is unaffected by encryption. Others promote the use of firewalls to screen all communications to a system, including e-mail messages, which may carry logic bombs. Firewall is a relatively generic term for methods of filtering access to a network. They may come in the form of a computer, router other communications device or in the form of a network configuration. Firewalls serve to define the services and access that are permitted to each user. One method is to screen user requests to check if they come from a previously defined domain or Internet Protocol (IP) address. Another method is to prohibit Telnet access into the system. Here are few key things to remember to pretect yourself from cyber-terrorism: ١١ ١٢ 1. All accounts should have passwords and the passwords should be unusual, difficult to guess. 2. Change the network configuration when defects become know. 3. Check with venders for upgrades and patches. 4. Audit systems and check logs to help in detecting and tracing an intruder. 5. If you are ever unsure about the safety of a site, or receive suspicious email from an unkown address, don't access it. It could be trouble. Some relevent ethical issues: The ethical issues involved in cyber-terrorism are manifold. Any sort of crime or ethical violation can occur using a computer. Extortion of banks takes money from the banks, as well as their customers. The bank's, on the other hand, which many times refuse to admit to their inadequate defenses violate the public trust that the bank will be secure. The illegal altering medical records is unethical, as it can quickly and easily cause harm to another. Spreading disinformation is unethical in its lack of regard for the truth, as well as for the safety of and consequences on others who believe the misinformation. Altering, destroying, or stealing others data is a violation of their privacy. The ordinary hacker is guilty of lack of regard for the privacy of the peoples systems that he or she would enter. Hacking-for-hire is additionally illicit because they openly sell their services to break into others systems. Scenarios of Cyber-terrorism Why would a terrorist decide to use the Internet, rather than using the usual methods of assassination, hostage taking and guerrilla warfare? Part of the problem is that terrorist may come to realize that removing one official from office only causes another to take the officials place, which may not cause the result the terrorist wished to achieve. By using the internet the terrorist can affect much wider damage or change to a country than one could by killing some people. From disabling a countries military defenses to shutting off the power in a large area, the terrorist can affect more people at less risk to him or herself, than through other means. Introducing cyber discruptions to the country’s economic institutions such as the stock or forex markets can also be a form of terrorism as it meets a certain objective of chaos and drain of resources to defend against other accompanying attacks in other fronts. Cyber terrorism takes many forms. One of the more popular is to threaten a large bank. The terrorists hack into the system and then leave an encrypted message for senior directors, which threatens the bank. In essence, the message says that if they do not pay a set amount of money, then the terrorists will use anything from logic bombs to electromagnetic pulses and high-emission radio frequency guns to destroy the banks files. What adds to the difficulty to catch the criminals is that the criminals may be in another country. A second difficulty is that most banks would rather pay the money than have the public know how vulnerable they are. Here are some examples of cyber-terroism in its many forms: Case 1: Cyber-terrorists often commit acts of terrorism simply for personal gain. Such a group, known as the Chaos Computer Club, was discovered in 1997. They had created ١٢ ١٣ an Active X Control for the Internet that can trick the Quicken accounting program into removing money from a user's bank account. This could easily be used to steal money from users all over the world that have the Quicken software installed on their computer. This type of file is only one of thousands of types of viruses that can do everything from simply ann
Advertisements
Similar documents
Advertisements
We Need Your Support
Thank you for visiting our website and your interest in our free products and services. We are nonprofit website to share and download documents. To the running of this website, we need your help to support us.

Thanks to everyone for your continued support.

No, Thanks