Skip to main content

Understanding, Locating and Constructing Cyberterrorism

  • Chapter
  • First Online:
Book cover Cyberterrorism

Chapter Overview

This chapter engages with the concept of cyberterrorism by investigating three connected questions. First, to what – if anything does cyberterrorism refer, and from where does its meaning derive? Second, how useful is this term for academics, policymakers, legislators and other potential users? Third, what problems or limitations might be identified with the concept of cyberterrorism? The chapter begins with a brief account of the concept’s emergence in the 1980s, linking this to two prominent dynamics of this period: a post-Cold War geopolitical reshuffle, and the rise of new security concerns linked to the Internet. Upon this, we note that although the concept has become increasingly prominent in the intervening years, its meaning has, if anything, become more rather than less contested. The chapter’s second section builds on our account of this contestability by exploring whether it is useful, or even desirable, to situate cyber-activities of any sort within a broader history of terrorism. While acknowledging the evolution (hence variability) of terrorism over time, we identify a number of factors that make it challenging to describe any cyber-activity as ‘terrorist’. The paper’s third section posits three competing ways to deal with these challenges. The first is simply to abandon the concept of cyberterrorism as a misnomer. The second is to engage in further definitional work to clarify that to which cyberterrorism might refer. The third—our preferred route—is to eschew the question of definition altogether and approach cyberterrorism as a social construction rather than a stable and coherent ontological entity.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Further Reading and Resources

  • Conway M (2004) Cyberterrorism: media myth or clear and present danger? In: Irwin J (ed) War and virtual war: the challenges to communities. Rodopi, Amsterdam, pp 79–95

    Google Scholar 

  • Denning D (2000) ‘Cyberterrorism: testimony before the Special Oversight Panel on Terrorism Committee on Armed Service U.S. House of Representatives. http://www.stealth-iss.com/documents/pdf/CYBERTERRORISM.pdf. Accessed 31 Aug 2012

  • Denning D (2010) Terror’s web: how the Internet is transforming terrorism. In: Jewkes Y, Yar M (eds) Handbook on internet crime. Wilan Publishing, Devon, pp 194–213

    Google Scholar 

  • Gordon S, Ford R (2002) Cyberterrorism? Comput Secur 21(7):636–647

    Google Scholar 

  • Weimann G (2006) Terror on the Internet: the new arena the new challenges. United Institute of Peace Press, Washington, DC

    Google Scholar 

  • Weinberg L, Pedahzur A, Hirsch-Hoefler S (2004) The challenges of conceptualizing terrorism. Terrorism Polit Violence 16(4):777–794

    Google Scholar 

References

  • Anderson K (2009) Hacktivism and politically motivated computer crime. Encurve. http://www.aracnet.com/~kea/Papers/Politically%20Motivated%20Computer%20Crime.pdf. Accessed 3 Aug 2012, pp 1–15.

  • Bendrath R, Eriksson J, Giacomello G (2007) From ‘cyberterrorism’ to ‘cyberwar’, back and forth: how the United States securitized cyberspace. In: Eriksson J, Giacomello G (eds) International relations and security in the digital age. Routledge, Abingdon

    Google Scholar 

  • Blakeley R (2007) Bringing the state back into terrorism studies. Eur Polit Sci 6(3):228–235

    Article  Google Scholar 

  • Blakeley R (2009) State terrorism and neoliberalism: the north in the south. Routledge, London

    Google Scholar 

  • Bourdieu P et al (1999) The weight of the world. Social suffering in contemporary society. Policy Press, Oxford

    Google Scholar 

  • Burnett J, Whyte D (2005) Embedded expertise and the new terrorism. J Crime Conflict Media 1(4):1–18

    Google Scholar 

  • Carlile L, Macdonald S (2014) The criminalisation of terrorists’ online preparatory acts. In: Chen T, Jarvis L, Macdonald S (eds) Cyberterrorism: understanding, assessment, and response. Springer, New York

    Google Scholar 

  • Cavelty M (2007) Cyber-terror—looming threat or phantom menace? The framing of the US Cyber-Threat Debate. J Inform Technol Pol 4(1):19–36

    Article  Google Scholar 

  • Collin BC (1997) The future of cyberterrorism. Crim Justice Int 13(2):15–18

    Google Scholar 

  • Conway M (2002) Reality bytes: cyberterrorism and terrorist ‘use’ of the Internet. First Monday 7(11), (n.p.)

    Google Scholar 

  • Conway M (2004) Cyberterrorism: media myth or clear and present danger? In: Irwin J (ed) War and virtual war: the challenges to communities. Rodopi, Amsterdam, pp 79–95

    Google Scholar 

  • Conway M (2011) Against cyberterrorism: why cyber-based terrorist attacks are unlikely to occur. Viewpoints: Privacy Secur 54(2):26–28

    Google Scholar 

  • Conway M (2014) Reality check: assessing the (un)likelihood of cyberterrorism. In: Chen T, Jarvis L, Macdonald S (eds) Cyberterrorism: understanding, assessment, and response. Springer, New York

    Google Scholar 

  • Cowen T (2006) Terrorism as theater: analysis and policy implications. Publ Choice 128(1–2):233–244

    Article  Google Scholar 

  • Cronin A (2002/2003) Behind the curve globalisation and international terrorism. Int Secur 72(3):30–58

    Google Scholar 

  • Denning D (2000) Cyberterrorism. Testimony before the Special Oversight Panel on Terrorism Committee on Armed Services U.S. House of Representatives. http://www.cs.georgetown.edu/~denning/infosec/cyberterror.html. Accessed 4 Feb 2012

  • Denning D (2010) Terror’s web: how the Internet is transforming terrorism. In: Jewkes Y, Yar M (eds) Handbook on internet crime. Wilan Publishing, Devon, pp 194–213

    Google Scholar 

  • Desouza KC, Hensgen T (2003) Semiotic emergent framework to address the reality of cyberterrorism. Technol Forecast Soc Change 70(4):385–396

    Article  Google Scholar 

  • Devost MG, Houghton BK, Pollard NA (1997) Information terrorism: political violence in the information age. Terrorism Polit Violence 9(1):72–83

    Article  Google Scholar 

  • Embar-Seddon A (2002) Cyberterrorism: are we under siege? Am Behav Sci 45(6):1033–1043

    Article  Google Scholar 

  • Fletcher G (2006) The Indefinable Concept of Terrorism. J Int Criminal Justice 4(5):894–911

    Google Scholar 

  • Galtung J (1969) Violence, peace and peace research. J Peace Res 6(3):167–191

    Article  Google Scholar 

  • Gibbs J (2012) Conceptualization of terrorism. In: Horgan J, Braddock K (eds) Terrorism studies: a reader. Routledge, Abingdon, pp 41–62

    Google Scholar 

  • Gillespie M (2006) Transnational television audiences after September 11. J Ethnic Migrat Stud 32(6):903–921

    Article  Google Scholar 

  • Gordon S, Ford R (2002) Cyberterrorism? Comput Secur 21(7):636–647

    Google Scholar 

  • Gordon S, Ford R (2003) Cyberterrorism? Symantec security response. Symantec, Cupertino

    Google Scholar 

  • Guzzini S (2005) The concept of power: a constructivist analysis. Millenn J Int Stud 33(3):495–521

    Article  Google Scholar 

  • Halkides M (1995) How not to study terrorism. Peace Rev 7(3/4):253–260

    Article  Google Scholar 

  • Hanlon M (2007) Attack of the cyber terrorists. The Daily Mail. http://www.dailymail.co.uk/sciencetech/article-457504/Attack-cyber-terrorists.html. Accessed 2 Aug 2012

  • Hardy K, Williams G (2014) What is ‘cyberterrorism’? Computer and internet technology in legal definitions of terrorism. In: Chen T, Jarvis L, Macdonald S (eds) Cyberterrorism: understanding, assessment, and response. Springer, New York

    Google Scholar 

  • Harknett R (2003) Integrated security: a strategic response to anonymity and the problem of the few. Contemp Secur Pol 24(1):13–45

    Article  Google Scholar 

  • Hoffmann B (2001) Change and continuity in terrorism. Stud Conflict Terrorism 24(5):417–428

    Article  Google Scholar 

  • Hülsse R, Spencer A (2008) The metaphor of terror: terrorism studies and the constructivist turn. Secur Dialog 39(6):571–592

    Article  Google Scholar 

  • Isenberg D (2000) Electronic pearl harbor? More hype than threat. CATO Institute. http://www.cato.org/publications/commentary/electronic-pearl-harbor-more-hype-threat Accessed 7 Sept 2012.

  • Jackson R (2010) In defence of ‘terrorism’: finding a way through a forest of misconceptions. Behav Sci Terr Pol Aggr 3(2):1–15

    Google Scholar 

  • Jackson R et al (2010) Introduction: terrorism, the state and the study of political terror. In: Jackson R et al (eds) Contemporary state terrorism: theory and practice. Routledge, London, pp 1–11

    Google Scholar 

  • Jackson R et al (2011) Terrorism: a critical introduction. Palgrave, Basingstoke

    Google Scholar 

  • Jarvis L (2009) The spaces and faces of critical terrorism studies. Secur Dialog 40(1):5–29

    Article  Google Scholar 

  • Jarvis L, Macdonald M (Forthcoming) What is cyberterrorism? Findings from a survey of researchers. Terrorism Polit Violence

    Google Scholar 

  • Jarvis L, Macdonald S (2014) ‘Locating Cyberterrorism: how Terrorism researchers use and view the Cyber Lexicon’, Perspectives on Terrorism 8(2):52–65

    Google Scholar 

  • Kostopoulos G (2008) Cyberterrorism: the next arena of confrontation. Comm IBIMA 6(1): 165–169

    MathSciNet  Google Scholar 

  • Laqueur W (1977) Terrorism. Little Brown, Boston, MA

    Google Scholar 

  • Laqueur W (1996) Postmodern Terrorism: New Rules for an Old Game. Foreign Affairs 75(5)

    Google Scholar 

  • Legrand T (2014) The citadel and its sentinels: state strategies for contesting cyberterrorism in the UK. In: Chen T, Jarvis L, Macdonald S (eds) Cyberterrorism: understanding, assessment, and response. Springer, New York

    Google Scholar 

  • Macdonald S, Jarvis L, Chen T, Lavis S (2013) Cyberterrorism: a survey of researchers. Cyberterrorism project research report (No. 1), Swansea University. Available via: www.cyberterrorism-project.org

  • Malcolm JG (2004) ‘Testimony of Deputy Assistant Attorney General John G. Malcolm on Cyberterrorism’, before the Senate Judiciary Committee Subcommittee on Terrorism. Technology, and Homeland Security, February 24, Washington, DC

    Google Scholar 

  • McGuire M (2014) Putting the ‘cyber’ into cyberterrorism: re-reading technological risk in a hyperconnected world. In: Chen T, Jarvis L, Macdonald S (eds) Cyberterrorism: understanding, assessment, and response. Springer, New York

    Google Scholar 

  • Meisels T (2009) Defining terrorism—a typology. Crit Rev Int Soc Polit Philos 12(3):331–351

    Article  Google Scholar 

  • National Academy of Sciences (1991) Computers at risk: safe computing in the information age. Computer Science and Tele-communications Board. National Academy Press, Washington, DC

    Google Scholar 

  • Neumann P (2009) Old and new terrorism. Polity Press, Cambridge

    Google Scholar 

  • Olmstead S, Siraj A (2009) Cyberterrorism: the threat of virtual warfare. CrossTalk: J Defense Software Eng 22(7):16–18

    Google Scholar 

  • Pollitt M (1998) Cyberterrorism—fact or fancy. Comput Fraud Secur 3(2):8–10

    Article  Google Scholar 

  • Post J, Ruby K, Shaw E (2000) From car bombs to logic bombs: the growing threat from information terrorism. Terrorism Polit Violence 12(2):97–122

    Article  Google Scholar 

  • Rapoport D (2012) The four waves of modern terrorism. In: Horgan J, Braddock K (eds) Terrorism studies: a reader. Routledge, Abingdon, pp 41–62

    Google Scholar 

  • Schmid A, Jongman A (1988) Political terrorism. Transaction, Piscataway

    Google Scholar 

  • Shoshani A, Slone M (2008) The drama of media coverage of terrorism: emotional and attitudinal impact on the audience. Stud Conflict Terrorism 31(7):627–640

    Article  Google Scholar 

  • Silke A (1996) Terrorism and the blind men’s elephant. Terrorism and Political Violence 8(3): 12–28

    Google Scholar 

  • Singer PW (2012) The cyber terror bogeyman. Armed Forces J. http://www.brookings.edu/research/articles/2012/11/cyber-terror-singer. Accessed 16 Sept 2013

  • Soo Hoo K, Goodman S, Greenberg L (1997) Information technology and the terrorist threat. Survival 39(3):135–155

    Article  Google Scholar 

  • Stohl M (2012) State terror: the theoretical and practical utilities and implications of a contested concept. In: Jackson R, Sinclair J (eds) Contemporary debates on terrorism. Routledge, Abingdon, pp 43–49

    Google Scholar 

  • Stohl M (2014) Dr. Strangeweb: or how they stopped worrying and learned to love cyber war. In: Chen T, Jarvis L, Macdonald S (eds) Cyberterrorism: understanding, assessment, and response. Springer, New York

    Google Scholar 

  • Stohl M, Lopez G (eds) (1988) Terrible beyond endurance? The foreign policy of state terrorism. Greenwood Press, New York

    Google Scholar 

  • Stump J, Dixit P (2012) Toward a completely constructivist critical terrorism studies. J Int Relat 26(2):199–217

    Article  Google Scholar 

  • Tsfati Y, Weimann G (2002) www.terrorism.com: terror on the Internet. Stud Conflict Terrorism 25(5):317–332

  • Weimann G (2006) Terror on the Internet: the new arena the new challenges. United Institute of Peace Press, Washington, DC

    Google Scholar 

  • Weinberg L, Pedahzur A, Hirsch-Hoefler S (2004) The challenges of conceptualizing terrorism. Terrorism Polit Violence 16(4):777–794

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lee Jarvis .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer Science+Business Media New York

About this chapter

Cite this chapter

Jarvis, L., Nouri, L., Whiting, A. (2014). Understanding, Locating and Constructing Cyberterrorism. In: Chen, T., Jarvis, L., Macdonald, S. (eds) Cyberterrorism. Springer, New York, NY. https://doi.org/10.1007/978-1-4939-0962-9_2

Download citation

  • DOI: https://doi.org/10.1007/978-1-4939-0962-9_2

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4939-0961-2

  • Online ISBN: 978-1-4939-0962-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics