Advertisement

Terrorism and the Internet: New Threats Posed by Cyberterrorism and Terrorist Use of the Internet

  • Phillip W. Brunst
Chapter

Abstract

Although it is known that terrorists already routinely use the Internet for purposes such as spreading propaganda or conducting internal communication, the threat that results from this use is heavily debated. Especially the question whether a cyber terrorist attack is imminent or if it is only a purely fictitious scenario is subject to many discussions. One reason for these differences in opinion is a lack of exact terminology. Already for the term “terrorism”, more than 100 different definitions with more than 20 definitional elements have been identified (for further details, see Record 2003). The addition of “cyber” to this word already fraught with meanings does not help to clarify this issue. Consequently, current interpretations of “cyberterrorism” range from very narrow to very broad. A more narrow view is often worded close to common terrorism definitions and might include only politically motivated attacks against information systems and only if they result in violence against noncombatant targets (Pollitt 1998). Broader approaches often include other forms of terrorist use of the Internet and therefore might define cyberterrorism as almost any use of information technology by terrorists (National Conference of State Legislatures 2002). To complicate matters even more, additional terminology is being introduced into the discussion, e.g. “digital Pearl Harbor”, “electronic Waterloo”, “Cyber war”, or “electronic Chernobyl”. These terms, however, focus mainly on the effects of possible future attacks by terrorists. Therefore, they rather cloud the discussion about a precise terminology on cyberterrorism or a terrorist use of the Internet.

Keywords

Terrorist Organization Domain Name System Successful Attack Illegal Access Hack Attack 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. AFP News Agency. (2005). Hacker Attacks in US Linked to Chinese Military [Electronic Version]. Breitbart.com, 12.12.2005. Retrieved April 2008 from http://www.breitbart.com/article.php?id=051212224756.jwmkvntb&show_article=1.
  2. Bachfeld, D. (2003). War der Wurm drin? c’t, 2003(18), 34.Google Scholar
  3. Berinato, S. (2002). Cybersecurity – The Truth About Cyberterrorism [Electronic Version]. CIO Magazine. Retrieved April 2008 from http://www.cio.com/article/30933/CYBERSECURITY_The_Truth_About_Cyberterrorism.
  4. Borland, J. (1998). Analyzing the Threat of Cyberterrorism [Electronic Version]. Techweb. From http://www.techweb.com/showArticle.jhtml?articleID=29102707.
  5. Brunst, P. W. (2008). Use of the Internet by Terrorists – A Threat Analysis. In Centre of Excellence – Defence Against Terrorism (Ed.), Responses to Cyber Terrorism (pp. 34–60). Amsterdam: IOS Press.Google Scholar
  6. Brunst, P. W. (2009). Anonymität im Internet – rechtliche und tatsächliche Rahmenbedingungen. Berlin: Duncker & Humblot.Google Scholar
  7. Buettner, R. (2001). Web of Terror Thrivin on Net. Retrieved April 2008 from http://www.nydailynews.com/archives/news/2001/09/18/2001–09–18_web_of_terror_thriving_on_net.html
  8. Centers for Disease Control and Prevention. (2007). Bioterrorism Overview. From http://www.bt.cdc.gov/bioterrorism/overview.asp
  9. Chen, H., & Larson, C. (2007). Dark Web Terrorism Research. Retrieved April 2008 from http://www.ai.arizona.edu/research/terror/index.htm
  10. Cilluffo, F. J. (2000). Cyber Attack: The National Protection Plan and Its Privacy Implications. Testimony of Frank J. Cilluffo Before the Subcommittee on Technology, Terrorism, and Government Information Committee on the Judiciary on 1 February 2000 [Electronic Version]. From http://www.csis.org/media/csis/congress/ts000201cilluffo.pdf.
  11. Coll, S., & Glassner, S. (2005, 7 August). Terrorists Turn to the Web as Base of Operations. The Washington Post, p. A01.Google Scholar
  12. Collin, B. C. (1997). The Future of Cyberterrorism. Crime and Justice International, 13(2), 15–18.Google Scholar
  13. Committee on Water Systems Security Research. (2007). Improving the Nation’s Water Security. Washington, DC: The National Academies Press.Google Scholar
  14. Conway, M. (2002). Reality Bites: Cyberterrorism and Terrorist ‘Use’ of the Internet (Publication. Retrieved 01.12.2005): http://www.firstmonday.org/Issues/issue7_11/conway/index.html
  15. Davis, J. (2007). Hackers Take Down the Most Wired Country in Europe [Electronic Version]. Wired Magazine. Retrieved April 2008 from http://www.wired.com/politics/security/magazine/15–09/ff_estonia.
  16. Denning, D. E. (2001). Activism, Hacktivism, and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy. In Arquilla, J. & Ronfeldt, D. (Eds.), Networks and Netwars (pp. 239–288). Santa Monica, CA: Rand Corp.Google Scholar
  17. Desouza, K. C., & Hensgen, T. (2003). Semiotic Emergent Framework to Address the Reality of Cyberterrorism. Technological Forecasting & Social Change, 70, 385–396.CrossRefGoogle Scholar
  18. Drogin, B. (1999). Russians seem to be Hacking into Pentagon [Electronic Version]. San Francisco Chronicle Online, 07.10.1999. Retrieved April 2008 from http://www.sfgate.com/cgi-bin/article.cgi?file=/chronicle/archive/1999/10/07/MN58558.DTL.
  19. Embar-Seddon, A. (2002). Cyberterrorism – Are We Under Siege? American Behavioral Scientist, 45(6), 1033–1043.CrossRefGoogle Scholar
  20. Espiner, T. (2005). Security Experts Lift Lid on Chinese Hack Attacks [Electronic Version]. ZDNet News, 23.11.2005. Retrieved April 2008 from http://news.zdnet.com/2100–1009_22–5969516.html.
  21. FCW Staff. (1999). Russia Hacking Stories Refuted [Electronic Version]. Federal Computer Week, 27.09.1999. Retrieved April 2008 from http://www.fcw.com/print/5_188/news/68553–1.html.
  22. Foltz, B. (2004). Cyberterrorism, Computer Crime, and Reality. Information Management & Computer Security, 12(2), 270–295.CrossRefGoogle Scholar
  23. Force10 Networks. (2007). Customer Profile: DE-CIX. Retrieved April 2008 from https://www.force10networks.com/company/customer_profiles/profiles-de-cix.asp
  24. Gellman, B. (2002, 27 June). Cyber-Attacks by Al Qaeda Feared. The Washington Post, p. A01.Google Scholar
  25. Giacomello, G. (2004). Bangs for the Buck: A Cost-Benefit Analysis of Cyberterrorism. Studies in Conflict & Terrorism, 27(5), 387–408.CrossRefGoogle Scholar
  26. Gleick, P. H. (2006). Water and Terrorism. Water Policy, 8, 481–503.CrossRefGoogle Scholar
  27. Graham, B. (2005). Hackers Attack Via Chinese Web Sites [Electronic Version]. The Washington Post Online, 25.08.2005, A01. Retrieved April 2008 from http://www.washingtonpost.com/wp-dyn/content/article/2005/08/24/AR2005082402318.html.
  28. Green, J. (2002). The Myth of Cyberterrorism [Electronic Version]. Washington Monthly. Retrieved April 2008 from http://www.washingtonmonthly.com/features/2001/0211.green.html.
  29. Harding, T. (2007). Terrorists ‘Use Google Maps to Hit UK Troops’ [Electronic Version]. The Telegraph Online. From http://www.telegraph.co.uk/news/main.jhtml?xml=/news/2007/01/13/wgoogle13.xml.
  30. ICANN. (2007). Factsheet: Root Server Attack on 6 February 2007. Retrieved April 2008 from http://icann.org/announcements/factsheet-dns-attack-08mar07.pdf
  31. Janczewski, L. J., & Colarik, A. M. (2005). Managerial Guide for Handling Cyber-Terrorism and Information Warfare. Hershey, PA: Idea Group Publishing.Google Scholar
  32. Johnson, B. (2008). Nato Says Cyber Warfare Poses as Great a Threat as a Missile Attack [Electronic Version]. The Guardian Online. Retrieved April 2008 from http://www.guardian.co.uk/technology/2008/mar/06/hitechcrime.uksecurity.
  33. Kristof, N. D. (2005, 20 December 2005). Terrorists in Cyberspace. The New York Times, p. 31.Google Scholar
  34. La Guardia, A. (2005). Al-Qa’eda Launches Voice of the Caliphate Internet News Bulletins [Electronic Version]. The Telegraph Online. Retrieved April 2008 from http://www.telegraph.co.uk/news/main.jhtml?xml=/news/2005/09/28/wirq128.xml&sSheet=/news/2005/09/28/ixnewstop.html.
  35. Leitenberg, M. (2005). Assessing the biological weapons and bioterrorism threat. Strategic Studies Institute of the U.S. Army War College.Google Scholar
  36. Lenzner, R., & Vardi, N. (2004). The Next Threat [Electronic Version]. Forbes Magazine. From http://www.forbes.com/forbes/2004/0920/070_print.html.
  37. Leppard, D. (2007). Al-Qaeda Plot to Bring Down UK Internet [Electronic Version]. The Times Online. From http://www.timesonline.co.uk/tol/news/uk/crime/article1496831.ece.
  38. Leyden, J. (2001). Mass Hack Takes Out Govt Sites [Electronic Version]. The Register. Retrieved April 2008 from http://www.theregister.co.uk/2001/01/22/mass_hack_takes_out_govt/.
  39. Miniwatts Marketing Group. (2007). Internet Usage Statistics. Retrieved April 2008 from http://www.internetworldstats.com/
  40. Musharbash, Y. (2004). US-Firmen-Website für Qaida-Botschaft gehackt. Spiegel Online, 17.06.2004.Google Scholar
  41. Musharbash, Y. (2005). Al-Qaida Launches a Weekly News Show [Electronic Version]. Spiegel Online. Retrieved April 2008 from http://www.spiegel.de/international/0,1518,378633,00.html.
  42. National Conference of State Legislatures. (2002). Cyberterrorism. Retrieved April 2008 from http://www.ncsl.org/programs/lis/cip/cyberterrorism.htm.
  43. Nelson, B., Choi, R., Iacobucci, M., Mitchell, M., & Gagnon, G. (1999). Cyberterror: Prospects and Implications. From http://www.nps.edu/Academics/Centers/CTIW/files/Cyberterror%20Prospects%20and%20Implications.pdf.
  44. OLG Frankfurt a.M. (2006). Lufthansa Online Demonstration. Multimedia und Recht 2006, 547–552.Google Scholar
  45. Persson, C. (2006). “Rückfall ins Telefonzeitalter” nach Erdbeben. Retrieved April 2008 from http://www.heise.de/newsticker/Rueckfall-ins-Telefonzeitalter-nach-Erdbeben--/meldung/83007
  46. Pike, J. (2005, 27.04.2005). Eligible Receiver. Retrieved April 2008 from http://www.globalsecurity.org/military/ops/eligible-receiver.htm
  47. Pollitt, M. M. (1998). Cyberterrorism – Fact or Fancy? Computer Fraud & Security (February 1998), 8–10.CrossRefGoogle Scholar
  48. Record, J. (2003). Bounding the Global War on Terrorism. University Press of the Pacific.Google Scholar
  49. Reuters. (2001). This Jihad WEb Site Brought to You by… Visa? Retrieved April 2008 from http://www.usatoday.com/tech/news/2001/09/19/jihad-sites.htm
  50. Rolski, T. (2007). Estonia: Ground Zero for World’s First Cyber War? [Electronic Version]. ABC News. From http://abcnews.go.com/International/Technology/Story?id=3184122&page=1.
  51. Sedarat, F. (2008). Jihadi Software Promises Secure Web Contacts [Electronic Version]. Reuters Online, 2008. From http://www.reuters.com/article/internetNews/idUSL1885793320080118.
  52. Sieber, U. (2004). The Threat of Cybercrime. In Council of Europe (Ed.), Organized Crime in Europe: The Threat of Cybercrime (pp. 81–217). Strasbourg: Council of Europe.Google Scholar
  53. Sieber, U., & Brunst, P. W. (2008). Cyberterrorism and Other Use of the Internet for Terrorist Purposes – Threat Analysis and Evaluation of International Conventions. In Council of Europe (Ed.), Cyberterrorism – The Use of the Internet for Terrorist Purposes (pp. 9–105). Strasbourg: Council of Europe Publishing.Google Scholar
  54. Sliva, J., & Ritter, K. (2006). Estonia’s Defense Minister Says Kremlin Involvement Possible in Cyberattacks [Electronic Version]. The Sydney Morning Herald Online. Retrieved April 2008 from http://www.smh.com.au/news/Technology/Estonia39s-defense-minister-says-Kremlin-involvement-possible-in-cyberattacks/2007/05/18/1178995335698.html.
  55. Testimony of FBI Deputy Assistant Director Keith Lourdeau on “Virtual Threat, Real Terror: Cyberterrorism in the 21st Century”, Subcommittee on terrorism, technology and homeland security of the committee on the judiciary United States Senate, 24 February Sess. (2004).Google Scholar
  56. Testimony of James Adams, Chief Executive Officer, Infrastructure Defense, Inc., United States Senate, Committee on Governmental Affairs (2000).Google Scholar
  57. Thornburgh, N. (2005a). Inside the Chinese Hack Attack [Electronic Version]. Time Online, 25.08.2005. Retrieved April 2008 from http://www.time.com/time/nation/article/0,8599,1098371,00.html.
  58. Thornburgh, N. (2005b). The Invasion of the Chinese Cyberspies [Electronic Version]. Time Online, 29.08.2005 from http://www.time.com/time/magazine/article/0,9171,1098961–1,00.html.
  59. Traynor, I. (2007). Russia Accused of Unleashing Cyberwar to Disable Estonia [Electronic Version]. The Guardian Online, 17.05.2007 from http://www.guardian.co.uk/world/2007/may/17/topstories3.russia.
  60. Tsfati, Y., & Weimann, G. (2002). www.terrorism.com: Terror on the Internet. Studies in Conflict & Terrorism, 2002(25), 317–332.CrossRefGoogle Scholar
  61. Vargas, J. A. (2006). Way Radical, Dude [Electronic Version]. The Washington Post Online. From http://www.washingtonpost.com/wp-dyn/content/article/2006/10/08/AR2006100800931.html.
  62. Vatis, M. A. (2001). Cyber Attacks During the War On Terrorism: A Predictive Analysis. Retrieved April 2008 from http://www.ists.dartmouth.edu/analysis/cyber_a1.pdf.
  63. Weimann, G. (2004a). Cyberterrorism: How Real is the Threat? [Electronic Version]. Special Report (United States Institute of Peace), 119.Google Scholar
  64. Weimann, G. (2004b). www.terror.net. How Modern Terrorism Uses the Internet [Electronic Version]. Special Report (United States Institute of Peace), 116.
  65. Weimann, G. (2005). Cyberterrorism: The Sum of All Fears? Studies in Conflict & Terrorism, 28, 129–149.CrossRefGoogle Scholar
  66. Weimann, G. (2006). Terror on the Internet. Washington, DC.Google Scholar
  67. White, J. R. (1990). Terrorism – an Introduction. Pacific Grove, CA: Brooks/Cole Publishing Co.Google Scholar
  68. Wilson, C. (2005). Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress (Vol. RL32114). Washington, DCGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC 2010

Authors and Affiliations

  1. 1.Max Planck Institute for Foreign and International Criminal LawFreiburgGermany

Personalised recommendations