Cyber Caliphate

Just came upon this intriguing article on CNN.

It seems that the forty-third president in the United States’ campaign against terrorism has escalated into yet another theater of conflict.

We have moved on to cyberwarfare from the traditional methods of waging conflicts on the front.

Furthermore, that can’t imply too well for us.

Similar to correspondents without borders, where press freedom does not end at national boundaries, ordinary folks are being drawn into a conflict that we do not desire in a world where criminality disregards the bounds of the physical universe.

Terrorists or self-declared islamists battle for a cause, to put it simply. to defend Islam in battle. Yet these terrorists don’t have the barest inkling that their preachers, or whomever they pretended to be their clerics, have corrupted their doctrine.

Our crime-fighting agencies constantly monitored the work of preventing these crimes that were known to be committed using weapons and severe force.

Over the last ten years, these terrorist groups have become more sophisticated, and now the C.C.A., or the Computer Caliphate Association, has emerged.

These criminals are of a different species; they fight their battles without the use of weapons or physical force. They are made up of brilliant people who are skilled above what an average terrorist would be.

How secure Singapore can feel from such assaults is what frightens me the most. Our economy depends on heavily digitalized infrastructures and platforms that are locked behind in the cyber realm. However, just like regular doors, these platforms may be opened with the right skills if the culprit wants to.

Actual case example

How can we protect ourselves against these assaults? Without a doubt, the Singaporean government always assures us that we have the finest protections available for cyber security. There have been instances when cash went missing or was taken out without authorization. Since then, there haven’t been many examples of money theft recorded.

If stealing money was this simple, what about stealing personal information? What about the protection of our possessions, social security numbers, and other information?

By entering your contact information on the PDPA website, you can guard against illegal use of your personal information. The least they can do to safeguard ourselves from the nefarious eyes of cyberterrorists like the CCA is this.

Leave a Comment