Terrorism in Cyberspace
Keywords:
terrorism, cyber-space, cyberterrorism, cyber-terrorists, internetAbstract
This paper presents the research on the growing threat of cyber-terrorism, which needs to be addressed by this concept and tries to answer why terrorists carry out this type of activity. It seems that among the main motivations of terrorists is their use of the Internet for different aspects of the terrorist campaign, such as propaganda and recruiting. It will consider the different tactics they use and present the way in which the Internet has provided a new opportunity for terrorists in their implementation of the campaign, and how it was adapted to their needs. Cyber-terrorism is a new terrorist tactic in the expansion and use of information systems or digital technology, especially the internet, as an instrument of action or target, where they are a battleground for terrorists, where they are trying to use it as a means to improve their campaigns and attacks. It examines the potential threat of cyber-attacks by terrorist organisations and the ways in which they can use the internet and cyberspace to attack and thereby achieve goals similar to conventional physical attacks. As the developed societies increasingly rely on electronic communications, control systems and trade, the potential for terrorists to hit their target becomes an increasingly realistic possibility. Internet has become more a way of life and making it easier for users to become targets cyberterorism.
References
Bogdanski, M., & Petreski, D. (2013). Cyber terrorism—Global security threat. International Scientific Defence, Security and Peace Journal, 59–71.
Bosch, O., Bailes, A., & Frommelt, I. (Eds.). (2004). Defending against cyber terrorism: Preserving the legitimate economy. In Business and security: Public–private sector relationships in a new security environment (pp. 187–196). SIPRI; Oxford University Press.
Estevez-Tapiador, J. M. (2004). The emergence of cyber-terrorism. IEEE Distributed Systems Online, 5(10).
Brahm, E. (2008). Propaganda. Beyond Intractability.
Brantly, A. (2014). Financing terror bit by bit. CTC Sentinel, 7(10), 1–5.
Brenner, S., & Goodman, S. (2002). Cyberterrorism: An argument for anticipating cyber attacks. Journal of Law, Technology & Policy, 2002(1).
Brett, P. (2007). Cyber terrorism and information security. East Carolina University.
Cassim, F. (2012). Addressing the spectre of cyber terrorism: A comparative perspective. Potchefstroom Electronic Law Journal, 15(2).
Charvat, P. (2014). Terrorism: A new dimension in battlespace. Centre of Excellence Defence Against Terrorism.
Cohen, A. (2010). Cyberterrorism: Are we legally ready? Journal of International Business and Law, 9(1).
Cohen-Almagor, R. (2012). Internet’s way: Radical, terrorist Islamists on the free highway. International Journal of Cyber Warfare and Terrorism, 2(3), 39–58.
Conway, M. (2005). The media and cyberterrorism: A study in the construction of reality. Paper presented at the First International Conference on the Information Revolution and the Changing Face of International Relations and Security, Lucerne, Switzerland.
Cottim, A. (2010). Cybercrime, cyber terrorism and jurisdiction: An analysis of Article 22 of the CoE Convention on Cybercrime. European Journal of Legal Studies, 2(3).
Cronin, A. K. (2003). Globalization and international terrorism: Behind the curve. International Security, 27(3), 30–58.
Australian Reinsurance Pool Corporation. (2016). Cyber terrorism and Australia’s terrorism insurance scheme. Australian Government.
Denning, D. E. (2000). Cyberterrorism. Testimony before the Special Oversight Panel on Terrorism, Committee on Armed Services, U.S. House of Representatives.
Denning, D. E. (2001). Activism, hacktivism, and cyberterrorism: The Internet as a tool for influencing foreign policy. In J. Arquilla & D. Ronfeldt (Eds.), Networks and netwars. RAND.
Denning, D. E. (2010). Terror’s web: How the Internet is transforming terrorism. In Y. Jewkes & M. Yar (Eds.), Handbook on Internet crime. Willan Publishing.
Denning, D. E. (2007). Cyberterrorism five years later. In K. E. Himma (Ed.), Internet security: Hacking, counterhacking, and society (Chap. 7). Jones & Bartlett.
Denning, D. E. (2000). Reflections on cyberweapons controls. Georgetown University Computer Security Journal, 16(4), 43–53.
Denning, D. E. (2008). The ethics of cyber conflict. In K. E. Himma & H. T. Tavani (Eds.), Information and computer ethics. Wiley.
Denning, D. E., & Baugh, W. (1999). Hiding crimes in cyberspace. Information, Communication & Society, 2(3).
Gable, K. (2010). Cyber-apocalypse now: Securing the Internet against cyberterrorism and using universal jurisdiction as a deterrent. Vanderbilt Journal of Transnational Law, 43, 57–117.
Gercke, M. (2010). Challenges in developing a legal response to terrorist use of the Internet. Defence Against Terrorism Review, 3(2).
Gordon, S., & Ford, R. (2006). Cyberterrorism? Computers & Security.
Gregory, T., & Kheng, L. (2003). Cyberterrorism with cyber deception. Naval Postgraduate School.
Herzog, S. (2011). Revisiting the Estonian cyber attacks: Digital threats and multinational responses. Journal of Strategic Security, 4(2), 49–60.
Hinnen, T. (2004). The cyber-front in the war on terrorism: Curbing terrorist use of the Internet. Columbia Science and Technology Law Review.
Prichard, J. J., & MacDonald, L. E. (2004). Cyber terrorism: A study of the extent of coverage in computer security textbooks. Journal of Information Technology Education, 3.
Imran, A. (2014). Debating the term cyberterrorism: Issues and problems. Internet Journal of Criminology.
United Nations. (2012). The use of the Internet for terrorist purposes. Counter-Terrorism Implementation Task Force.
U.S. House of Representatives. (2011). Jihadist use of social media: How to prevent terrorism and preserve innovation (Hearing No. 112–62).
Kaplan, E. (2009). Terrorists and the Internet. Council on Foreign Relations.
Keith, S. (2005). Fear-mongering or fact: The construction of ‘cyber-terrorism’ in U.S., U.K., and Canadian news media. Paper presented at Safety and Security in a Networked World: Balancing Cyber-Rights and Responsibilities, Oxford Internet Institute.
Kostopoulos, G. (2008). Cyberterrorism: The next arena of confrontation. Communications of the IBIMA, 6, 165–169.
Kurmnik, B., & Ribnikar, D. (2003). Asimetrični ratovi. Evro Đunti.
Lewis, J. (2002). Assessing the risks of cyber terrorism, cyber war, and other cyber threats. Center for Strategic and International Studies.
Lipshultz, J. (2007). Framing terror: Violence, social conflict and the “war on terror”. Electronic News, 1, 21–35.
Lumbaca, S., & Gray, D. (2011). The media as an enabler for acts of terrorism. Global Security Studies, 2(1), 45–54.
Moslemzadeh, T. P., & Manap, N. A. (2013). Cyber terrorism challenges. In Proceedings (pp. 207–213).
NATO. (n.d.). Threat of cyberterrorism. Prague Student Summit XVIII, Model NATO III background reports.
Nelson, B., Choi, R., Labbouchi, R., Michel, M., & Gagnon, G. (1999). Cyberterror: Prospects and implications. Center for the Study of Terrorism and Irregular Warfare.
Pope, L. (2014). Cyberterrorism and China (Master’s thesis). Internet Journal of Criminology.
Raghavan, T. (2000). Cyberwarfare and cyberterrorism: In brief.
Rajeev, P. (2003). Beyond conventional terrorism: The cyber assault. SANS Institute InfoSec Reading Room.
Siraj, A. (2009). Cyberterrorism: The threat of virtual warfare. The Journal of Defense Software Engineering, 16–18.
Starrs, S. (2012). Fight for the spoils: The future role of Syria’s armed groups. CTC Sentinel, 5(8).
Terrorism and the media. (2008). Deliverable 6, Workpackage 4.
Theohary, C., & Rollins, J. (2015). Cyberwarfare and cyberterrorism: In brief. Congressional Research Service.
Thomas, T. (2003). Al Qaeda and the Internet: The danger of cyber-planning. Parameters: U.S. Army War College Quarterly, 33(1), 112–123.
United States Institute of Peace. (2004). Cyberterrorism: What is cyberterrorism?
Mliyanarachchi, F., Wijesinghe, W. S., & Jayarathne, H. (n.d.). Cyberterrorism: Is Sri Lanka ready? General Sir John Kotelawala Defence University.
Weimann, G. (2014). New terrorism and new media. Wilson Center.
Weimann, G. (1983). The theater of terror: The effects of press coverage. Journal of Communication, 33, 38–45.
Weimann, G. (2005). Cyberterrorism: The sum of all fears? Studies in Conflict & Terrorism.
Wilkinson, P. (2002). Terrorism versus liberal democracy: The problems of response. In Terrorism versus liberal democracy (pp. 1–19). Centre for Security and Conflict Studies.
Wilson, G. (2005). Computer attack and cyberterrorism: Vulnerabilities and policy issues for Congress. Congressional Research Service.


