Chapter 2 Terrorism and the Internet : New Threats Posed by Cyberterrorism and Terrorist Use of the Internet
نویسندگان
چکیده
Although it is known that terrorists already routinely use the Internet for purposes such as spreading propaganda or conducting internal communication, the threat that results from this use is heavily debated. Especially the question whether a cyber terrorist attack is imminent or if it is only a purely fictitious scenario is subject to many discussions. One reason for these differences in opinion is a lack of exact terminology. Already for the term “terrorism”, more than 100 different definitions with more than 20 definitional elements have been identified (for further details, see Record 2003) . The addition of “cyber” to this word already fraught with meanings does not help to clarify this issue. Consequently, current interpretations of “cyberterrorism” range from very narrow to very broad. A more narrow view is often worded close to common terrorism definitions and might include only politically motivated attacks against information systems and only if they result in violence against noncombatant targets (Pollitt 1998) . Broader approaches often include other forms of terrorist use of the Internet and therefore might define cyberterrorism as almost any use of information technology by terrorists (National Conference of State Legislatures 2002) . To complicate matters even more, additional terminology is being introduced into the discussion, e.g. “digital Pearl Harbor”, “electronic Waterloo”, “Cyber war”, or “electronic Chernobyl”. These terms, however, focus mainly on the effects of possible future attacks by terrorists. Therefore, they rather cloud the discussion about a precise terminology on cyberterrorism or a terrorist use of the Internet. This chapter is divided into three parts that depict the problematic areas that are currently under discussion. Part one will deal with what is usually considered as “real” cyberterrorism: attacks that are carried out via the Internet and that are aimed either at other IT systems or at real-world property and human lives. Part two will then cover issues that might not be considered as cyber terrorism in a narrow sense,
منابع مشابه
Discovering Cyber Terrorism Using Trace Pattern
Nowadays, as the Internet user increased, the number of cyber threats is also increased. Internet has provided a medium for criminal to do the crime and become the target for cyber terrorist to spread their negative propaganda, and promote extreme activities. One of the crimes is cyber terrorism. Cyber terrorism became more sophisticated and it difficult to discover its activities. Hence, this ...
متن کاملNew Science and Technology in Line with Terrorist Groups in the Middle East
Abstract:Terrorism is a phenomenon that has spread to almost all parts of the world in the late 20th century and the beginning of the 21th century to the extent that many Middle East-ern countries have been subjected to such violence and unrest; in fact, with the advent of science and technology, particularly the global spread of the Internet and social net-works, the face of terrorism ha...
متن کاملReality Bytes: Cyberterrorism and Terrorist 'Use' of the Internet
This paper examines the concept of cyberterrorism. Fringe activity on the Internet ranges from nonviolent ‘Use’ at one end to ‘Cyberterrorism’ at the other. Rejecting the idea that cyberterrorism is widespread, the focus here is on terrorist groups’ ‘use’ of the Internet, in particular the content of their websites, and their ‘misuse’ of the medium, as in hacking wars, for example. Terrorist gr...
متن کاملCyber Terrorism: A New Dimension in Battlespace
This paper discusses the concept of terrorism, who the terrorists are and develops an understanding of why they conduct the activities they do. Understanding the mens rea of the attacker will allow consideration of the type of attack they may plan and the effect they are likely to try and achieve. It looks at the main motivations of terrorist groups and discusses their use of the Internet for v...
متن کاملCombating Cyber Terrorism: Countering Cyber Terrorist Advantages of Surprise and Anonymity
The paper proposes ways to counter the Cyber Terrorist (CT) advantages of surprise and anonymity. It recommends the creation of a Cyberint Analysis Center to develop and evaluate methods to improve the ability to detect, identify and deter Cyber Terrorist attack. It also proposes ways to implement responsible, accountable and identifiable use of the Internet, and deny anonymity to the attackers.
متن کامل