Cyber Terrorism

Understanding Cyber Terrorism from Motivational Perspectives

Abstract:

There is no universally accepted definition of cyber terrorism, the lack of which is both an issue and a challenge in countering cyber-terrorism threats. To better understand why cyber- terrorism acts are committed, this study examines cyber terrorism from motivational perspectives. Motivational forces behind cyber terrorism can be social, political, ideological, and economic.

The Myth of Cyberterrorism

ABSTRACT

Media and emerging experts often misapply the term ‘cyberterrorism’ portraying cyber attacks as a separate form of terrorism or a new terrorism. It is simply the terrorists’ use of Computer Network Operations (CNO) as a tactic in their operations. It is important to understand the psychology of terrorism in order to evaluate the plausibility of cyberterrorism. Terrorists exercise cyber related capabilities, which are generally related in the media as extreme and exaggerated vignettes of cyberterrorism. These incidents include the popular Digital Pearl Harbor, the U.S. stock market crash, utilities infrastructure attack, and crashing airliners. Is there a likely and logical application of cyber related activities by a terrorists group in pursuit of their goals, or is simply hype by media, business, and self anointed experts?

Cyber Terrorism: An Examination of the Critical Issues

ABSTRACT

This paper examines the critical issues relevant to Cyber terrorism. A review of the literature indicates that incidences of computer crime and cyber terrorism are increasing. The cyber attacks on the U.S.’s critical infrastructure are no longer random, but rather are coordinated and precise. The types of attacks are discussed and documented instances are examined. Lastly, policy recommendations are discussed that to further assist the U.S. in defending its critical infrastructures and essential operations.

Combating Cyber Terrorism: Improving Analysis and Accountability

ABSTRACT

This paper will attempt to assess issues and strategies related to Cyber Terrorism. It examines the missions/objectives, resources, threats, systemic issues and policies related to combating the problem. The paper suggests possible measures to improve the ability to deal with Cyber Terrorism. One is to improve coordination between existing independent resources toward the goal of creating a CYBERINT Analysis Center. Another is to improve accountability and identification of Internet users.

The Law and Cyber Terrorism

ABSTRACT

The paper investigates the use of the Internet. by terrorist and dissident groups for publicity, propaganda, and fund raising. It examines the new anti-terrorism legislation passed in the last few years (especially the UK Terrorism Act), and its impact in the Internet presence of proscribed groups.

Cyberterrorism: The Story So Far

ABSTRACT

This paper is concerned with the origins and development of the concept of cyberterrorism. It seeks to excavate the story of the concept through an analysis of both popular/media renditions of the term and scholarly attempts to define the borders of same. The contention here is not that cyberterrorism cannot happen or will not happen, but that, contrary to popular perception, it has not happened yet.

Religious Internet Networks and Mobilization to Terror

ABSTRACT

The current research is a part of a broader investigation on patterns of political involvement of Diaspora Internet communities. The study has compared the Internet content of three religious groups (Muslim, Jewish and Sikh) with an attempt to reveal certain cultural and religious codes that bring the potential terrorists to use the Internet as a tool for mobilization and coordination of their actions.

Safeguarding Australia from Cyber-terrorism: A Proposed Cyber-terrorism SCADA Risk Framework for Australia

ABSTRACT

In theory terrorist groups are currently using information and communication technologies (ICTs) to orchestrate their conventional attacks. More recently, terrorists have been developing a new form of capability within the cyber arena to coordinate cyber based attacks. This paper examines a cyber-terrorism SCADA risk framework. The paper proposes a high level managerial framework which is designed to measure and protect SCADA systems from the threat of cyber-terrorism within Australia.  

A High-level Conceptual Framework of Cyber-terrorism

ABSTRACT

Uneasiness arises from the possibility of random cyber attacks.  In the global information and network warfare battle, cyber-terrorism has become a critical concern in that terrorists may seek to strike the innocent and wreak havoc due to dependency on networked communications. However, much misconception exists over what exactly cyber-terrorism entails and the role of cyber crime and hacking.

Cyber Terrorism Awareness within the New Zealand Critical Infrastructure

ABSTRACT

Dependence on computers has transformed information technology into a potential terrorist target. Prevention of Cyber terrorism should be part of holistic national security policy. This paper analyses the results of a study that indicates New Zealand’s critical infrastructure is not ready for a cyber terrorist attack and gives some recommendations.

New Media and Web 2.0: An Irish Republican Example

ABSTRACT

The initial development of the Internet and the World Wide Web was based upon the presentation of static information, this only allowed for the access and consumption of that information. The development of Web 2.0 has resulted in a situation where information is displayed in a dynamic manner and allows for interaction between the viewer and the site or application showing this information. The information may no longer just be text based but could be video, audio and information presented in an interactive manner though applications.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

P

PDA

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com