Chapter Overview
The idea that terrorists could cause massive loss of life, worldwide economic chaos and irreparable environmental damage by hacking into critical infrastructure systems has captured the public imagination. Air traffic control systems, nuclear power stations, hospitals and stock markets are all viable targets for ‘cyberterrorists’ wanting to wreak havoc and destruction. On the less serious end of the spectrum, cyber-attacks against websites and other non-essential infrastructure by political ‘hacktivists’ are increasing by the day. Governments clearly need laws in place to protect against acts of cyberterrorism, but they also need to ensure that these laws do not encompass less serious uses of computer and Internet technology. This chapter examines legal definitions of terrorism and related offences in four Commonwealth nations (the United Kingdom, Australia, Canada and New Zealand). In doing so it addresses two questions. Firstly, what uses of computer and Internet technology does domestic law regard as acts of terrorism? Secondly, are existing legal responses to terrorism sufficient to cover the possibility of a serious act of cyberterrorism?
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
The first change, made by section 34 of the Terrorism Act 2006, was to extend the definition to attacks against ‘international governmental organisations’. The second change, made by section 75 of the Counter-Terrorism Act 2008, was to extend the definition to acts committed for the purpose of ‘racial’ causes. We have included these amendments when setting out the TA2000 definition.
- 2.
[2007] EWCA Crim 243.
- 3.
[2012] EWCA Crim 280.
- 4.
[2006] NSWSC 691.
- 5.
See Combating Terrorism Act (SC 2013, c 9), which came into force 24 May 2013.
Further Reading and Resources
Bronitt S, Gani M (2003) Shifting boundaries of cybercrime: from computer hacking to cyber-terrorism. Crim Law J 27:303–321
Conte A (2007) Counter-terrorism and human rights in New Zealand. New Zealand Law Foundation, Wellington
Hardy K (2010) Operation titstorm: hacktivism or cyber-terrorism? Univ New S Wales Law J 33(2):474–502
Hardy K, Williams G (2011) What is ‘terrorism’? Assessing domestic legal definitions. UCLA J Int Law Foreign Aff 16(1):77–162
Lynch A, Williams G (2006) What price security? Taking stock of Australia’s anti-terror laws. Federation Press, Sydney
Lynch A, Macdonald E, Williams G (2007) Law and liberty in the war on terror. Federation Press, Sydney
Ramraj VV et al (2011) Global anti-terrorism law and policy. Cambridge University Press, Cambridge
Roach K (2011) The 9/11 effect. Cambridge University Press, Cambridge
Roach K (2003) September 11: consequences for Canada. McGill-Queen’s University Press, Montreal
Walker C (2009) Blackstone’s guide to the anti-terrorism legislation. Oxford University Press, Oxford
References
Cabinet Office (2010) The national security strategy: a strong Britain in an age of uncertainty. Cm 7953
Carlile A (2007) The definition of terrorism: a report by Lord Carlile of Berriew QC, Independent Reviewer of Terrorism Legislation. Cm 7052
Carlile L, Macdonald S (2014) The criminalisation of terrorists’ online preparatory acts. In: Chen T, Jarvis L, Macdonald S (eds) Cyberterrorism: understanding, assessment, and response. Springer, New York
Conway M (2003) Hackers as terrorists? Why it doesn’t compute. Comput Fraud Secur 12:10–13
Conway M (2014) Reality check: assessing the (un)likelihood of cyberterrorism. In: Chen T, Jarvis L, Macdonald S (eds) Cyberterrorism: understanding, assessment, and response. Springer, New York
Hardy K (2011) WWWMDs: cyber-attacks against infrastructure in domestic anti-terror laws. Comput Law Secur Rev 27:152–161
Home Office (2011) Prevent strategy. Cm 8092
House of Commons (1999) Hansard 341:Column 159
House of Lords (2000) Hansard 352:Column 161
Huff S (2012) Anonymous group poses bomb threat for Nov. 5, pisses off Anonymous. Betabeat (online) 24 October. http://betabeat.com/2012/10/anonymous-group-posts-bomb-threat-for-nov-5-pisses-off-anonymous/
Jarvis L, Nouri L, Whiting A (2014) Understanding, locating and constructing ‘cyberterrorism’. In: Chen T, Jarvis L, Macdonald S (eds) Cyberterrorism: understanding, assessment, and response. Springer, New York
Kerin J, Joyce J (2013) RBA confirms cyber attacks. The Australian Financial Review. http://www.afr.com/p/national/rba_confirms_cyber_attacks_ZsVpeJas8JX6UXCLwOVJKP.
New Zealand Parliamentary Debates (NZPD) (2002) Hansard
Roach K (2008) Defining terrorism: the need for a restrained definition. In: LaViolette N, Forcese C (eds) The human rights of anti-terrorism. Irwin Law, Toronto, pp 97–127
Stohl M (2006) Cyber terrorism: a clear and present danger, the sum of all fears, breaking point or patriot games? Crime Law Soc Change 46:223–238
Stohl M (2014) Dr. Strangeweb: or how they stopped worrying and learned to love cyber war. In: Chen T, Jarvis L, Macdonald S (eds) Cyberterrorism: understanding, assessment, and response. Springer, New York
Walker C (2005/2006) Cyber-terrorism: legal principle and law in the United Kingdom. Penn State Law Rev 110:625–665
Weimann G (2005a) Cyberterrorism: the sum of all fears? Stud Confl Terrorism 28:129–149
Weimann G (2005b) How modern terrorism uses the Internet. J Int Secur Aff 8. http://www.securityaffairs.org/issues/2005/08/weimann.php.
White House (2009) Remarks by the president on securing our nation’s cyber infrastructure. http://www.whitehouse.gov/the-press-office/remarks-president-securing-our-nations-cyber-infrastructure.
Yannakogeorgos P (2014) Rethinking the threat of cyberterrorism. In: Chen T, Jarvis L, Macdonald S (eds) Cyberterrorism: understanding, assessment, and response. Springer, New York
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer Science+Business Media New York
About this chapter
Cite this chapter
Hardy, K., Williams, G. (2014). What is ‘Cyberterrorism’? Computer and Internet Technology in Legal Definitions of Terrorism. In: Chen, T., Jarvis, L., Macdonald, S. (eds) Cyberterrorism. Springer, New York, NY. https://doi.org/10.1007/978-1-4939-0962-9_1
Download citation
DOI: https://doi.org/10.1007/978-1-4939-0962-9_1
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4939-0961-2
Online ISBN: 978-1-4939-0962-9
eBook Packages: Computer ScienceComputer Science (R0)