Skip to main content

What is ‘Cyberterrorism’? Computer and Internet Technology in Legal Definitions of Terrorism

  • Chapter
  • First Online:
Cyberterrorism

Chapter Overview

The idea that terrorists could cause massive loss of life, worldwide economic chaos and irreparable environmental damage by hacking into critical infrastructure systems has captured the public imagination. Air traffic control systems, nuclear power stations, hospitals and stock markets are all viable targets for ‘cyberterrorists’ wanting to wreak havoc and destruction. On the less serious end of the spectrum, cyber-attacks against websites and other non-essential infrastructure by political ‘hacktivists’ are increasing by the day. Governments clearly need laws in place to protect against acts of cyberterrorism, but they also need to ensure that these laws do not encompass less serious uses of computer and Internet technology. This chapter examines legal definitions of terrorism and related offences in four Commonwealth nations (the United Kingdom, Australia, Canada and New Zealand). In doing so it addresses two questions. Firstly, what uses of computer and Internet technology does domestic law regard as acts of terrorism? Secondly, are existing legal responses to terrorism sufficient to cover the possibility of a serious act of cyberterrorism?

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The first change, made by section 34 of the Terrorism Act 2006, was to extend the definition to attacks against ‘international governmental organisations’. The second change, made by section 75 of the Counter-Terrorism Act 2008, was to extend the definition to acts committed for the purpose of ‘racial’ causes. We have included these amendments when setting out the TA2000 definition.

  2. 2.

    [2007] EWCA Crim 243.

  3. 3.

    [2012] EWCA Crim 280.

  4. 4.

    [2006] NSWSC 691.

  5. 5.

    See Combating Terrorism Act (SC 2013, c 9), which came into force 24 May 2013.

Further Reading and Resources

  • Bronitt S, Gani M (2003) Shifting boundaries of cybercrime: from computer hacking to cyber-terrorism. Crim Law J 27:303–321

    Google Scholar 

  • Conte A (2007) Counter-terrorism and human rights in New Zealand. New Zealand Law Foundation, Wellington

    Google Scholar 

  • Hardy K (2010) Operation titstorm: hacktivism or cyber-terrorism? Univ New S Wales Law J 33(2):474–502

    Google Scholar 

  • Hardy K, Williams G (2011) What is ‘terrorism’? Assessing domestic legal definitions. UCLA J Int Law Foreign Aff 16(1):77–162

    Google Scholar 

  • Lynch A, Williams G (2006) What price security? Taking stock of Australia’s anti-terror laws. Federation Press, Sydney

    Google Scholar 

  • Lynch A, Macdonald E, Williams G (2007) Law and liberty in the war on terror. Federation Press, Sydney

    Google Scholar 

  • Ramraj VV et al (2011) Global anti-terrorism law and policy. Cambridge University Press, Cambridge

    Book  Google Scholar 

  • Roach K (2011) The 9/11 effect. Cambridge University Press, Cambridge

    Book  Google Scholar 

  • Roach K (2003) September 11: consequences for Canada. McGill-Queen’s University Press, Montreal

    Google Scholar 

  • Walker C (2009) Blackstone’s guide to the anti-terrorism legislation. Oxford University Press, Oxford

    Google Scholar 

References

  • Cabinet Office (2010) The national security strategy: a strong Britain in an age of uncertainty. Cm 7953

    Google Scholar 

  • Carlile A (2007) The definition of terrorism: a report by Lord Carlile of Berriew QC, Independent Reviewer of Terrorism Legislation. Cm 7052

    Google Scholar 

  • Carlile L, Macdonald S (2014) The criminalisation of terrorists’ online preparatory acts. In: Chen T, Jarvis L, Macdonald S (eds) Cyberterrorism: understanding, assessment, and response. Springer, New York

    Google Scholar 

  • Conway M (2003) Hackers as terrorists? Why it doesn’t compute. Comput Fraud Secur 12:10–13

    Article  Google Scholar 

  • Conway M (2014) Reality check: assessing the (un)likelihood of cyberterrorism. In: Chen T, Jarvis L, Macdonald S (eds) Cyberterrorism: understanding, assessment, and response. Springer, New York

    Google Scholar 

  • Hardy K (2011) WWWMDs: cyber-attacks against infrastructure in domestic anti-terror laws. Comput Law Secur Rev 27:152–161

    Article  Google Scholar 

  • Home Office (2011) Prevent strategy. Cm 8092

    Google Scholar 

  • House of Commons (1999) Hansard 341:Column 159

    Google Scholar 

  • House of Lords (2000) Hansard 352:Column 161

    Google Scholar 

  • Huff S (2012) Anonymous group poses bomb threat for Nov. 5, pisses off Anonymous. Betabeat (online) 24 October. http://betabeat.com/2012/10/anonymous-group-posts-bomb-threat-for-nov-5-pisses-off-anonymous/

  • Jarvis L, Nouri L, Whiting A (2014) Understanding, locating and constructing ‘cyberterrorism’. In: Chen T, Jarvis L, Macdonald S (eds) Cyberterrorism: understanding, assessment, and response. Springer, New York

    Google Scholar 

  • Kerin J, Joyce J (2013) RBA confirms cyber attacks. The Australian Financial Review. http://www.afr.com/p/national/rba_confirms_cyber_attacks_ZsVpeJas8JX6UXCLwOVJKP.

  • New Zealand Parliamentary Debates (NZPD) (2002) Hansard

    Google Scholar 

  • Roach K (2008) Defining terrorism: the need for a restrained definition. In: LaViolette N, Forcese C (eds) The human rights of anti-terrorism. Irwin Law, Toronto, pp 97–127

    Google Scholar 

  • Stohl M (2006) Cyber terrorism: a clear and present danger, the sum of all fears, breaking point or patriot games? Crime Law Soc Change 46:223–238

    Article  Google Scholar 

  • Stohl M (2014) Dr. Strangeweb: or how they stopped worrying and learned to love cyber war. In: Chen T, Jarvis L, Macdonald S (eds) Cyberterrorism: understanding, assessment, and response. Springer, New York

    Google Scholar 

  • Walker C (2005/2006) Cyber-terrorism: legal principle and law in the United Kingdom. Penn State Law Rev 110:625–665

    Google Scholar 

  • Weimann G (2005a) Cyberterrorism: the sum of all fears? Stud Confl Terrorism 28:129–149

    Article  Google Scholar 

  • Weimann G (2005b) How modern terrorism uses the Internet. J Int Secur Aff 8. http://www.securityaffairs.org/issues/2005/08/weimann.php.

  • White House (2009) Remarks by the president on securing our nation’s cyber infrastructure. http://www.whitehouse.gov/the-press-office/remarks-president-securing-our-nations-cyber-infrastructure.

  • Yannakogeorgos P (2014) Rethinking the threat of cyberterrorism. In: Chen T, Jarvis L, Macdonald S (eds) Cyberterrorism: understanding, assessment, and response. Springer, New York

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Keiran Hardy .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer Science+Business Media New York

About this chapter

Cite this chapter

Hardy, K., Williams, G. (2014). What is ‘Cyberterrorism’? Computer and Internet Technology in Legal Definitions of Terrorism. In: Chen, T., Jarvis, L., Macdonald, S. (eds) Cyberterrorism. Springer, New York, NY. https://doi.org/10.1007/978-1-4939-0962-9_1

Download citation

  • DOI: https://doi.org/10.1007/978-1-4939-0962-9_1

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4939-0961-2

  • Online ISBN: 978-1-4939-0962-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics