Chapter Overview
This chapter engages with the concept of cyberterrorism by investigating three connected questions. First, to what – if anything does cyberterrorism refer, and from where does its meaning derive? Second, how useful is this term for academics, policymakers, legislators and other potential users? Third, what problems or limitations might be identified with the concept of cyberterrorism? The chapter begins with a brief account of the concept’s emergence in the 1980s, linking this to two prominent dynamics of this period: a post-Cold War geopolitical reshuffle, and the rise of new security concerns linked to the Internet. Upon this, we note that although the concept has become increasingly prominent in the intervening years, its meaning has, if anything, become more rather than less contested. The chapter’s second section builds on our account of this contestability by exploring whether it is useful, or even desirable, to situate cyber-activities of any sort within a broader history of terrorism. While acknowledging the evolution (hence variability) of terrorism over time, we identify a number of factors that make it challenging to describe any cyber-activity as ‘terrorist’. The paper’s third section posits three competing ways to deal with these challenges. The first is simply to abandon the concept of cyberterrorism as a misnomer. The second is to engage in further definitional work to clarify that to which cyberterrorism might refer. The third—our preferred route—is to eschew the question of definition altogether and approach cyberterrorism as a social construction rather than a stable and coherent ontological entity.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Further Reading and Resources
Conway M (2004) Cyberterrorism: media myth or clear and present danger? In: Irwin J (ed) War and virtual war: the challenges to communities. Rodopi, Amsterdam, pp 79–95
Denning D (2000) ‘Cyberterrorism: testimony before the Special Oversight Panel on Terrorism Committee on Armed Service U.S. House of Representatives. http://www.stealth-iss.com/documents/pdf/CYBERTERRORISM.pdf. Accessed 31 Aug 2012
Denning D (2010) Terror’s web: how the Internet is transforming terrorism. In: Jewkes Y, Yar M (eds) Handbook on internet crime. Wilan Publishing, Devon, pp 194–213
Gordon S, Ford R (2002) Cyberterrorism? Comput Secur 21(7):636–647
Weimann G (2006) Terror on the Internet: the new arena the new challenges. United Institute of Peace Press, Washington, DC
Weinberg L, Pedahzur A, Hirsch-Hoefler S (2004) The challenges of conceptualizing terrorism. Terrorism Polit Violence 16(4):777–794
References
Anderson K (2009) Hacktivism and politically motivated computer crime. Encurve. http://www.aracnet.com/~kea/Papers/Politically%20Motivated%20Computer%20Crime.pdf. Accessed 3 Aug 2012, pp 1–15.
Bendrath R, Eriksson J, Giacomello G (2007) From ‘cyberterrorism’ to ‘cyberwar’, back and forth: how the United States securitized cyberspace. In: Eriksson J, Giacomello G (eds) International relations and security in the digital age. Routledge, Abingdon
Blakeley R (2007) Bringing the state back into terrorism studies. Eur Polit Sci 6(3):228–235
Blakeley R (2009) State terrorism and neoliberalism: the north in the south. Routledge, London
Bourdieu P et al (1999) The weight of the world. Social suffering in contemporary society. Policy Press, Oxford
Burnett J, Whyte D (2005) Embedded expertise and the new terrorism. J Crime Conflict Media 1(4):1–18
Carlile L, Macdonald S (2014) The criminalisation of terrorists’ online preparatory acts. In: Chen T, Jarvis L, Macdonald S (eds) Cyberterrorism: understanding, assessment, and response. Springer, New York
Cavelty M (2007) Cyber-terror—looming threat or phantom menace? The framing of the US Cyber-Threat Debate. J Inform Technol Pol 4(1):19–36
Collin BC (1997) The future of cyberterrorism. Crim Justice Int 13(2):15–18
Conway M (2002) Reality bytes: cyberterrorism and terrorist ‘use’ of the Internet. First Monday 7(11), (n.p.)
Conway M (2004) Cyberterrorism: media myth or clear and present danger? In: Irwin J (ed) War and virtual war: the challenges to communities. Rodopi, Amsterdam, pp 79–95
Conway M (2011) Against cyberterrorism: why cyber-based terrorist attacks are unlikely to occur. Viewpoints: Privacy Secur 54(2):26–28
Conway M (2014) Reality check: assessing the (un)likelihood of cyberterrorism. In: Chen T, Jarvis L, Macdonald S (eds) Cyberterrorism: understanding, assessment, and response. Springer, New York
Cowen T (2006) Terrorism as theater: analysis and policy implications. Publ Choice 128(1–2):233–244
Cronin A (2002/2003) Behind the curve globalisation and international terrorism. Int Secur 72(3):30–58
Denning D (2000) Cyberterrorism. Testimony before the Special Oversight Panel on Terrorism Committee on Armed Services U.S. House of Representatives. http://www.cs.georgetown.edu/~denning/infosec/cyberterror.html. Accessed 4 Feb 2012
Denning D (2010) Terror’s web: how the Internet is transforming terrorism. In: Jewkes Y, Yar M (eds) Handbook on internet crime. Wilan Publishing, Devon, pp 194–213
Desouza KC, Hensgen T (2003) Semiotic emergent framework to address the reality of cyberterrorism. Technol Forecast Soc Change 70(4):385–396
Devost MG, Houghton BK, Pollard NA (1997) Information terrorism: political violence in the information age. Terrorism Polit Violence 9(1):72–83
Embar-Seddon A (2002) Cyberterrorism: are we under siege? Am Behav Sci 45(6):1033–1043
Fletcher G (2006) The Indefinable Concept of Terrorism. J Int Criminal Justice 4(5):894–911
Galtung J (1969) Violence, peace and peace research. J Peace Res 6(3):167–191
Gibbs J (2012) Conceptualization of terrorism. In: Horgan J, Braddock K (eds) Terrorism studies: a reader. Routledge, Abingdon, pp 41–62
Gillespie M (2006) Transnational television audiences after September 11. J Ethnic Migrat Stud 32(6):903–921
Gordon S, Ford R (2002) Cyberterrorism? Comput Secur 21(7):636–647
Gordon S, Ford R (2003) Cyberterrorism? Symantec security response. Symantec, Cupertino
Guzzini S (2005) The concept of power: a constructivist analysis. Millenn J Int Stud 33(3):495–521
Halkides M (1995) How not to study terrorism. Peace Rev 7(3/4):253–260
Hanlon M (2007) Attack of the cyber terrorists. The Daily Mail. http://www.dailymail.co.uk/sciencetech/article-457504/Attack-cyber-terrorists.html. Accessed 2 Aug 2012
Hardy K, Williams G (2014) What is ‘cyberterrorism’? Computer and internet technology in legal definitions of terrorism. In: Chen T, Jarvis L, Macdonald S (eds) Cyberterrorism: understanding, assessment, and response. Springer, New York
Harknett R (2003) Integrated security: a strategic response to anonymity and the problem of the few. Contemp Secur Pol 24(1):13–45
Hoffmann B (2001) Change and continuity in terrorism. Stud Conflict Terrorism 24(5):417–428
Hülsse R, Spencer A (2008) The metaphor of terror: terrorism studies and the constructivist turn. Secur Dialog 39(6):571–592
Isenberg D (2000) Electronic pearl harbor? More hype than threat. CATO Institute. http://www.cato.org/publications/commentary/electronic-pearl-harbor-more-hype-threat Accessed 7 Sept 2012.
Jackson R (2010) In defence of ‘terrorism’: finding a way through a forest of misconceptions. Behav Sci Terr Pol Aggr 3(2):1–15
Jackson R et al (2010) Introduction: terrorism, the state and the study of political terror. In: Jackson R et al (eds) Contemporary state terrorism: theory and practice. Routledge, London, pp 1–11
Jackson R et al (2011) Terrorism: a critical introduction. Palgrave, Basingstoke
Jarvis L (2009) The spaces and faces of critical terrorism studies. Secur Dialog 40(1):5–29
Jarvis L, Macdonald M (Forthcoming) What is cyberterrorism? Findings from a survey of researchers. Terrorism Polit Violence
Jarvis L, Macdonald S (2014) ‘Locating Cyberterrorism: how Terrorism researchers use and view the Cyber Lexicon’, Perspectives on Terrorism 8(2):52–65
Kostopoulos G (2008) Cyberterrorism: the next arena of confrontation. Comm IBIMA 6(1): 165–169
Laqueur W (1977) Terrorism. Little Brown, Boston, MA
Laqueur W (1996) Postmodern Terrorism: New Rules for an Old Game. Foreign Affairs 75(5)
Legrand T (2014) The citadel and its sentinels: state strategies for contesting cyberterrorism in the UK. In: Chen T, Jarvis L, Macdonald S (eds) Cyberterrorism: understanding, assessment, and response. Springer, New York
Macdonald S, Jarvis L, Chen T, Lavis S (2013) Cyberterrorism: a survey of researchers. Cyberterrorism project research report (No. 1), Swansea University. Available via: www.cyberterrorism-project.org
Malcolm JG (2004) ‘Testimony of Deputy Assistant Attorney General John G. Malcolm on Cyberterrorism’, before the Senate Judiciary Committee Subcommittee on Terrorism. Technology, and Homeland Security, February 24, Washington, DC
McGuire M (2014) Putting the ‘cyber’ into cyberterrorism: re-reading technological risk in a hyperconnected world. In: Chen T, Jarvis L, Macdonald S (eds) Cyberterrorism: understanding, assessment, and response. Springer, New York
Meisels T (2009) Defining terrorism—a typology. Crit Rev Int Soc Polit Philos 12(3):331–351
National Academy of Sciences (1991) Computers at risk: safe computing in the information age. Computer Science and Tele-communications Board. National Academy Press, Washington, DC
Neumann P (2009) Old and new terrorism. Polity Press, Cambridge
Olmstead S, Siraj A (2009) Cyberterrorism: the threat of virtual warfare. CrossTalk: J Defense Software Eng 22(7):16–18
Pollitt M (1998) Cyberterrorism—fact or fancy. Comput Fraud Secur 3(2):8–10
Post J, Ruby K, Shaw E (2000) From car bombs to logic bombs: the growing threat from information terrorism. Terrorism Polit Violence 12(2):97–122
Rapoport D (2012) The four waves of modern terrorism. In: Horgan J, Braddock K (eds) Terrorism studies: a reader. Routledge, Abingdon, pp 41–62
Schmid A, Jongman A (1988) Political terrorism. Transaction, Piscataway
Shoshani A, Slone M (2008) The drama of media coverage of terrorism: emotional and attitudinal impact on the audience. Stud Conflict Terrorism 31(7):627–640
Silke A (1996) Terrorism and the blind men’s elephant. Terrorism and Political Violence 8(3): 12–28
Singer PW (2012) The cyber terror bogeyman. Armed Forces J. http://www.brookings.edu/research/articles/2012/11/cyber-terror-singer. Accessed 16 Sept 2013
Soo Hoo K, Goodman S, Greenberg L (1997) Information technology and the terrorist threat. Survival 39(3):135–155
Stohl M (2012) State terror: the theoretical and practical utilities and implications of a contested concept. In: Jackson R, Sinclair J (eds) Contemporary debates on terrorism. Routledge, Abingdon, pp 43–49
Stohl M (2014) Dr. Strangeweb: or how they stopped worrying and learned to love cyber war. In: Chen T, Jarvis L, Macdonald S (eds) Cyberterrorism: understanding, assessment, and response. Springer, New York
Stohl M, Lopez G (eds) (1988) Terrible beyond endurance? The foreign policy of state terrorism. Greenwood Press, New York
Stump J, Dixit P (2012) Toward a completely constructivist critical terrorism studies. J Int Relat 26(2):199–217
Tsfati Y, Weimann G (2002) www.terrorism.com: terror on the Internet. Stud Conflict Terrorism 25(5):317–332
Weimann G (2006) Terror on the Internet: the new arena the new challenges. United Institute of Peace Press, Washington, DC
Weinberg L, Pedahzur A, Hirsch-Hoefler S (2004) The challenges of conceptualizing terrorism. Terrorism Polit Violence 16(4):777–794
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer Science+Business Media New York
About this chapter
Cite this chapter
Jarvis, L., Nouri, L., Whiting, A. (2014). Understanding, Locating and Constructing Cyberterrorism. In: Chen, T., Jarvis, L., Macdonald, S. (eds) Cyberterrorism. Springer, New York, NY. https://doi.org/10.1007/978-1-4939-0962-9_2
Download citation
DOI: https://doi.org/10.1007/978-1-4939-0962-9_2
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4939-0961-2
Online ISBN: 978-1-4939-0962-9
eBook Packages: Computer ScienceComputer Science (R0)