Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2015, American Intelligence Journal
The premise behind cyberterrorism as with cybercrimes is that nations’ dependence on technology will be exploited to cause harm to the economy, infrastructure, and potentially loss of life. However, there is considerable debate over the legitimacy of this threat. This paper examines the advantages of cyberspace to terrorists and how it can be utilized to support their activities. The practicality of cyber-terrorism is also examined as it relates to; achievability, availability of resources and potential for physical damage. The author concludes that cyber attacks and cyber-terrorism will potentially pose a threat as terrorist become increasingly skilled in the use of cyberattacks, however, cyber attacks are currently less effective and desirable than physical attacks, making the latter more of a salient threat than that of cyberterrorism. The real danger of terrorist use of cyberspace lies in the use of cyberspace as both a terrorist tactic and a force multiplier.
International Journal of Sustainable Future for Human Security
The advent of the Internet over 20 years ago has led to human beings around the globe becoming increasingly dependent on it as a means of communication, commerce, news gathering and socializing. This dependency has offered a perfect platform from which to launch cyber terrorism. This paper investigates the wide-reaching consequences of using the Internet in terms of human security. Our study finds that cyber terrorism, like traditional terrorism, has an obvious negative impact which involves economic, legal, physical, psychological, political and social consequences. It is the aim of this paper to show how these consequences pose a significant threat to human security and sustainability.
IntechOpen eBooks, 2024
There is no gainsaying that the threats posed by terrorists have not abated since the declaration of a Global War on terrorism following the September 11 attacks. Instead, terrorism has gradually metamorphosed into something more sophisticated that can cause even more significant destruction on a massive scale. Over the last 20 years, terrorist attacks have assumed a new and worrisome dimension with States and major international corporations being victims of cyber-terrorism and online attacks. This new face of terrorism is gradually replacing the traditional hostage-taking, suicide bombings, and kidnappings etc that followed the Global War on Terrorism (GWOT). This paper, therefore, critiques the GWOT particularly the threats posed by cyberterrorism in the post-9/11 period. Whilst detailing some of the recent cyber-terrorism attacks and other preparatory acts committed by terrorist organizations, this paper appraises the effectiveness and coherence of the mechanisms put in place by the West and its allies in addressing cyberterrorism under its so-called GWOT. This systematic appraisal of the GWOT will contribute immensely to the field of social sciences, by providing objective answers to controversial and much-disputed questions arising from the war. Further studies on the implication(s) of the disagreement between world 'super-powers' on a global strategy for cyberterrorism is needed.
2018
Cyber-space is a new battlefield. " Physical " Activities ranging from a simple greeting gesture to warfare have been cybernized and terrorism does not constitute an exception. From the days of Robespierre to the post 9/11 era, terrorism has been constantly transmuting in context, means and objectives and recently is making its first steps in cyberspace. Exploiting the advantages that this new field of expression, operations and confrontation has to offer like relative anonymity and abundance of easy targets, cyber-terrorism has been added to the cyber-vocabulary. The so-called Islamic State (ISIS) after its phenomenal expansion on the ground has become very active and innovative in the realm of cyber-terror. A number of organizations and individuals have pledged allegiance to ISIS and are employing their cyber-tactics in line with this terrorist organization's cyber-strategy.
As the addiction of internet is increasing at a highly increasing rate from our mobile phones to our streets, from our streets to our colleges, from our colleges to our work places, from our work places to our hospitals and from our hospital to everywhere, the risks caused by cyber terrorism has also increased. During the past few decades, the threats posed by cyber terrorism have increased to a deadly rate. It has raised a question mark to the Government's security policies and agendas. This caused Government agencies to revise their security policies. It has raised awareness of the other channels that terrorists might be adopting to accomplish their ambitions. These attacks are planned to cause severe economic damage to someone and even in some cases it harms someone's life. This research is designed for a clear understanding of a layman what cyber terrorism exactly is
2018
The idea that terrorists could cause massive loss of life, worldwide economic chaos and devastating environmental damage by hacking into critical infrastructure systems has captured the public imagination. Air traffic control systems, nuclear power stations, hospitals and stock markets are all vulnerable targets for cyber-terrorists wanting to wreak havoc and destruction. Counter-terrorism investigation in Europe have shown that the use of the Internet is an integral component in any terrorist plot. Terrorist groups are resorting to encryption and anonymising tools in order to keep their identities hidden while they communicate, plan attacks, purchase illegal materials and perform financial transactions. The possibility of an act of cyberterrorism against critical national infrastructure requires serious attention from legislators. There is no concrete legal definition of cyberterrorism internationally. A wide range of possible cyberattack scenarios exists - including acts of hacktivism against websites - and it is not clear which of these scenarios would fall within definitions of terrorism under domestic law. While terrorists continue to use the Internet mostly for communication, propaganda and information sharing purposes, their capabilities to launch cyberattacks remain limited.
Defence and Diplomacy, 2015
The presence of terrorists in the cyber world is not a new phenomenon as they had existed and used the resources of the internet for their operations since day one. However, their reliance on the internet is increasing day by day for various operational requirements. This is evident from the recent media reports which state that the Islamic State in Syria (ISIS), has succeeded in recruiting more than 20,000 foreign fighters to fight for its cause. It would have not been possible for the ISIS to reach out to such numbers and even more, people across the globe, had it not been fo the internet. The traditional thinking was that terrorists would cause chaos in the virtual world by attacking computer networks, including the internet. However, it was not realised for a long time that more than a rational attack, the terrorists would use the information and resources readily available on the internet and get assistance from other technological developments of the cyber world to aid and conduct their evil missions. In other words, terrorists use and abuse the internet for their own benefit, more than attacking it physically or virtually. Hence, this paper would study the modus operandi followed by the terrorists in cyber space for their operational needs.
Cyber-threats can range from minor electronic crimes to more sophisticated fraud and the infiltration and compromise of systems, networks and supply chains causing significant damage and harm. Cyber-threats are actioned by more than terrorists; actors who engage in cyber-threat activities and events vary from individuals, corporations involved in industrial espionage, criminals and criminal enterprises, terrorists and terrorist organizations and even nation states; recent reports indicate that Russian forces hacked a U.S. surveillance drone flying over the Crimea region of Ukraine in March 2014 by allegedly severing the connection between the drone and its operator using an undisclosed, complex radio-electronic technology, resulting in its interception. These asymmetrical characteristics are distinctly different than that of conventional threats, requiring specialized, “cutting edge” skills to prevent, detect, respond and recover. The Internet has added a level of ambiguity and comp...
Teme, 2021
Over time, terrorism has evolved into different forms. One of the most dangerous is certainly cyber terrorism. There are many different motivations for terrorists to deploy cyber terrorism as a tool in their fight. Internet and computer networks are powerful resources on which contemporary society relies heavily. Terrorist groups have developed new tools and methods of the fight and they have become more effective, efficient, and unpredictable. Virtual, or cyberspace, is perfect and very safe ground for terrorist groups' various activities, such are secret encrypted communication, file sharing, indoctrination and recruitment of vulnerable individuals, fundraising and promotions of their future actions and accomplishments spreading fear among common people. Are we adequately aware of these facts and prepared for countermeasures? The fact is that terrorists use mostly opensource tools (software) for their purposes, widely available and free of charge, as well as video games, popular social networks (mostly Twitter), and software developed by their programmers. The purpose of this paper is to point out some of the methods radical Islamic terrorist groups have been using and underline the importance of responding to this new security challenge.
TERRORIST USE OF CYBER TECHNOLOGY, 2021
The risk posed by terrorist use of cyber technology and cyber terrorism have been of great concern to politicians, decision makers, security officials. This article studies terrorist use of cyber technology and cyber terrorism along with history of cyber-terrorism. Moreover some concepts such as between cyber-crime, cyber-terrorism, cyber-warfare and hactivism will be analysed. Furthermore, the challenges faced by international organisations in tackling cyber terrorism will be discussed; measures introduced in some countries to address cyber terrorism treats are presented as well as discussions on the present and the future treat posed by cyber terrorism and terrorist use of cyber technology.
FCA Publication, 2024
Cyberterrorism poses a significant and evolving threat in the digital age. Cyberterrorism has emerged as a grave concern in the contemporary world, with potential impacts on national security and global stability. This paper delves into the intricate realm of cyberterrorism, shedding light on its significance and consequences. By understanding the motivations and tactics employed by cyber terrorists, we can better comprehend the threats we face and develop strategies to safeguard against them. This review paper provides an in-depth analysis of cyberterrorism, including its historical background, motivations, tactics, and potential consequences. It explores the vulnerabilities of critical infrastructure, government systems, and financial institutions, prime targets for cyber terrorists. Additionally, the paper discusses the legal and ethical implications of countering cyberterrorism and provides insights into future trends and challenges. It concludes with recommendations for effective security measures to mitigate the risks associated with cyberterrorism.
Terrorism, one of the vilest crimes, faced by the human community has posed an immense challenge in the post Cold War period. It has existed since the emergence of human societies endangering innocent lives and jeopardizing human rights and fundamental freedoms. Though the conventional motives have remained the same, the traditional concepts and methods of terrorism have taken new dimensions that are more destructive 1 and deadly in nature. In the age of information technology the terrorists have acquired an expertise to produce the most deadly combination of weapons and technology, which are much more modern and scientific. This phenomenon where the cyber space is used to launch terror attacks is also known as cyber-terrorism. It has the potential to do indeterminable harm not only by paralyzing computer infrastructures but also comprehending the use of the cyberspace to support and organize traditional forms of terrorism, such as bombings and suicide attacks. It also poses a deadly threat on the national security of a state by offering a garb of anonymity to the perpetrators of terror. The increased dependency on information technology has dramatically increased the security risks. This new menace will be a severe challenge to global security unless there are appropriate security measures to help prevention. Hence, to understand cyber terrorism, and find out the ways in which the terrorist organizations are using the advantage of this new technology, a look at its background is necessary. This paper shall make an attempt to discuss the rising incidents of cyber terrorism across the globe, the meaning and concept of the term, the motives and methods behind an attack. It shall also discuss the regional and international mechanisms to prevent cyber terrorism, and recommend what more could be done.
Science and Engineering Ethics, 2017
In the recent years, an alarming rise in the incidence of cyber attacks has made cyber security a major concern for nations across the globe. Given the current volatile socio-political environment and the massive increase in the incidence of terrorism, it is imperative that government agencies rapidly realize the possibility of cyber space exploitation by terrorist organizations and state players to disrupt the normal way of life. The threat level of cyber terrorism has never been as high as it is today, and this has created a lot of insecurity and fear. This study has focused on different aspects of cyber attacks and explored the reasons behind their increasing popularity among the terrorist organizations and state players. This study proposes an empirical model that can be used to estimate the risk levels associated with different types of cyber attacks and thereby provide a road map to conceptualize and formulate highly effective counter measures and cyber security policies.
Throughout history, there have been many events and dangers that threaten state security, causing heavy loss of life, disease, injuries, destruction of property, displacement of large numbers of people and heavy economic losses. Political unrest on international and local levels and recent technological developments increase the seriousness of threats against national security.
Journal of Social Sciences and Humanities, 2017
In today’s postmodern world with the latest and top notch internet technologies in the market, if it has become easy and accessible for everyone to communicate with others sitting at the other corner of the world, it has also given rise to the cybercrimes including cyber terro rism which has not only provided grave threats to the whole world but also posed a question of whether with the manipulation of cyber space, cyber terrorists can damage or destroy the physical infrastructure of its target. Owing to easy access to everyone and strong damage done as compared to traditional terrorism, today terrorists are relying on cyber terrorism as well. The Islamic State (IS) has emerged as one of the brutal and violent terrorist organization s which hired cyber experts and manipulated cyber space to the extent that today they are most active and professional cyber users’ terrorist organization of the world. The main focus of the paper is to highlight the basic definition of cyber terrorism, ...
Defining Terrorism 161 Traditional Definitions of Cyberterrorism 164 Operationalizing Cyberterrorism as a Multipurpose Tool 165 Propaganda, Information Dissemination, and Recruitment 166 The Internet as a Medium of Communication 173 Training, Research, and Facilitation 176 As an Attack Vector 179 Conclusions 183 References 184
O Bezpeczeństwie i Obronności, 2024
The phenomenon of globalization, the development of technology, and the widespread use of the Internet have led to the creation of a digital space for information processing and exchange. Currently, it is used by various users, including public institutions, private companies, and individual users who have access to the network at home and on private electronic devices. Cyberspace protection has therefore become one of the main strategic goals in the security area of every states. Ensuring it depends mainly on the creation of effective mechanisms for preventing and combating threats on the Internet. The aim of this article is to present the issue of cyberterrorism as one of the main threats to the security of society and the state in cyberspace. With the development of the Internet, terrorists have new opportunities to act, regardless of where they are at any given time. Therefore, the article attempts to define the concept of cyberterrorism and the possible applications of this form of activity on the Internet. An important aspect has become the analysis of the benefits of using cyberspace for terrorist groups, including in terms of the radicalization of young people.
Conventional terrorism that the world is familiar with whether carried by individuals or groups intended to use human nature of fear to gain political or financial gains. Fear is always associated with a terror act and the same as with cyber terrorism, it's using human nature of fear to gain political or financial gains, but the mechanisms to conduct this fear is different, it is our current state of technology that we utilize in cyberspace. The literature review provided an inside look at how cyberspace is being utilized as a platform for launching terrorist attacks as well as combating those attacks and threats of attacks. The real-world examples of cyberterrorism activity reviewed illustrate the complexity, power, and fear that these incidents can cause. The attacks against governments or corporations, such as the attack on Iranian nuclear program, Sonny and the 2016 Democratic National Committee email leak show link between cyberterrorism and critical infrastructure. Type of infrastructure targeted and the suspected players involved posed implications as far as counterterrorism concern. Malicious codes written to target SCADA systems was sophisticated, unprecedent and posed an implication as far as the industrial control technology concern. This type of computer worm changed the theoretical hypothesis into reality, where computer technology may be used and directed to cause physical damage. Weaponizing computer technology using sophisticated malicious codes to target infrastructure and causing physical damage constitutes a cyberwarfare competition and demonstrate the ability may be used by adversary and cause physical damage.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.