Cyberterrorism
With the continued integration of technology, and especially internet-based technologies, into everyday life, the threat of cyberterrorism becomes more and more of a concern, as the potential for exponentially devastating effects increases alongside reliance on these emerging technologies. However, combating cyberterrorism is not as simple as one might think (or hope), because even the definition of the word itself remains under discussion. Nonetheless, after examining some of the more common definitions of cyberterrorism as well as the most obvious and evolving cyberterrorist threats, it becomes clear that much of the official preparation and response to cyberterrorism tends to focus on red herrings, missing the areas with the greatest potential for harm while focusing on far less likely doomsday scenarios. Realizing this fact ultimately offers some better ideas for stopping current and future cyberterrorists.
The first hurdle to understanding and combating cyberterrorism is the fact that there is no singularly agreed-upon definition of what it is. Most broadly:
While there is not a standardized definition of cyberterrorism, the general theme among the many proposed definitions is that cyberterrorism is a premeditated criminal act by subnational groups or clandestine agents, for political, religious, or social purposes, against an entity's computer, data, or information systems, to entice fear and results in physical violence (Sharp Parker, 2010, p. 159).
This represents a fairly common formulation of cyberterrorism that "combines the United States Department of State's definition of terrorism as politically motivated acts of violence against non-combatants with a definition of cyberspace as the computers, networks, programs and data which make up the information infrastructure" (Pollitt, 1998, p. 8). However, "cyberterror" is also frequently used to describe those acts which fulfill most of the descriptions above but which are not designed to entice fear or result in physical violence, further blurring the line between what is considered legitimate protest (also known as "hacktivism") and "terrorism" (Vegh, 2003, p. 821). For example, some groups contend that Denial-of-Service attacks, in which a website is overloaded with numerous simultaneous connections, is a legitimate form of protest, while other have gone so far as to label it terrorism (Anonymous, 2001, p. 272). The Naval Postgraduate school defines cyberterrorism "as the unlawful destruction or disruption of digital property to intimidate or coerce people," acknowledging terrorism's psychological aspect without including physical violence as a condition for cyberterrorism (Thomas, 2003, p. 112).
Thus, while using the definition of cyberterrorism which includes physical violence or destruction as a result means that there are no recorded instances of a cyberterrorist attack outside of the Stuxnet worm which affected the Iranian nuclear refinement program (likely a result of United States and Israeli cooperation), using the broader definition which does not include physical destruction as an identifying feature means that many more activities may be labeled cyberterrorism, and many different groups of people may subsequently be considered "terrorists." Adding to this relative confusion over the precise meaning of the word, a number of illegal activities may fall under the dual rubrics of cyberterrorism and cybercrime, with the only distinction being whether money or ideology was the most prominent motivating factor, with cybercrime sometimes financing physical terrorism (Baldwin, 2004, p. 128). Finally, cyberterrorism is occasionally used to describe the online activities of established terrorist groups, with a particular focus on the planning of attacks and dissemination of information, although the distinction between "cyberplanning" (itself a somewhat useless phrase) and cyberterrorism is noted (Thomas, 2003, 112).
Despite the variability in potential definitions, some key factors do stand out which allow one to chart the development of cyberterrorism as a concept (using a broader definition of the term) over the course of the last few years. Although the potential for cyberterrorism appeared once the first computers were connected to each other remotely, the threat of cyberterrorism did not enter the public consciousness until somewhat later, with the first inclinations that the fear of cyberterrorism was growing beyond...
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now