Chapter Overview
Threat assessments of cyberterrorism have so far tended to focus upon on two kinds of question. First, the extent to which such a construct really ‘exists’—or at least exists in any way substantively different from other forms of terrorism. Second, its destructive potentials and the kinds of targets this might involve. This chapter considers a more basic set of questions about the cyberterrorist threat. These centre upon the very thing considered to make it a distinctive form of offending: (information) technology and its relationships with the intentions of potential terrorists. Central to this analysis is an attempt to clarify some recurring confusions about the criminogenic potentials of technology in general—in particular the extent to which it can be causally agentic or ‘enables’ offending. I argue that it is only by developing a more coherent understanding of contemporary socio-technic relations that a robust evaluation of the risks posed by cyberterrorism can be made.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Added by the Cyber Security Enhancement Act of 2002, and implemented under the title of the (more familiar) Homeland Security Act of 2002.
- 2.
Beldam, LJ Rv Cheshire (1991) 1 WLR 844.
- 3.
The recent reported hack of a baby monitor (Seltzer 2013) offers an especially disturbing ‘proof of concept’ of the way that hyperspatialisation can bring terror into the heart of our homes.
Further Reading
Blyth T (2003) Terrorism as technology: a discussion of the theoretical underpinnings. Knowl Tech Pol 16(1):45–55
Brey P (2000) Theories of extension as extension of human faculties. In: Mitcham C (ed) Metaphysics, epistemology and technology, research in philosophy and technology, vol 19. Elsevier, London
Chan W, Simester A (2011) Four functions of mens rea. Camb Law J 70(2):381–396
Cockfield A (2004) Towards a law and technology theory. Manitoba Law J 30:383–415
Feenberg A (2002) Transforming technology—a critical theory revisited. OUP, Oxford
McGuire M (2012) Technology, crime and justice. Routledge, London
References
ACC (2011) Enabler activities, organised crime in Australia. Australian Crime Committee report
ACPO (2009) ACPO E-crime strategy. Association of Chief Police Officers, August 2009
Adams D (1999) How to stop worrying and love the internet. Times 29 August 1999
Anderson J, Rainie L (2012) Millennials will benefit and suffer due to their hyperconnected lives. Pew Research Center’s Internet & American Life Project
Bachmann S (2014) Hybrid threats, cyber warfare and NATO’s comprehensive approach for countering 21st century threats. Amicus Curiae 88:14–17
Bedford T, Cooke R (2001) Probabilistic risk analysis: foundations and methods. Cambridge University Press, Cambridge
Bimber B (1990) Karl Marx and the three faces of technological determinism. Soc Stud Sci 20(2):333–351
Bowman-Grieve L (2014) Cyberterrorism and moral panics: a reflection on the discourse of cyberterrorism. In: Jarvis L, Macdonald S, Chen T (eds) Terrorism online. Routledge, Abingdon
Brickey J (2012) Defining cyberterrorism: capturing a broad range of activities in cyberspace. Westpoint CTC Sentinel, vol 5, p 8
Brown S (2006) The criminology of hybrids: rethinking crime and law in technosocial networks. Theor Criminol 10(2):223–244
Busby C (2004) Nuclear pollution, childhood leukaemia, retinoblastoma and brain tumours in Gwynedd and Anglesey Wards near the Menai Straits, North Wales 2000-2003. Report 04/1B;2. Green Audit, Aberystwyth
Cha I, Shah Y, Schmidt A, Leicher A, Meyerstein M (2009) Security and trust for M2M communications. Vehicular Technology Magazine, IEEE
Clark A (2006) Natural-born cyborgs: minds, technologies, and the future of human intelligence. OUP, Oxford
Clarke R, Knake R (2010) CyberWar: the next threat to national security and what to do about it. Ecco/HarperCollins, New York
CO (2013) Computer misuse act 1990 productions. Crown Office and Procurator Fiscal Service
Conant J (ed) (1950) The overthrow of phlogiston theory: the chemical revolution of 1775–1789. Harvard University Press, Cambridge
Conway M (2007) Cyberterrorism: hype and reality. In: Armistead L (ed) Information warfare: separating hype from reality. Potomac Books, Inc., Washington, DC, pp 73–93
Conway M (2011) Against cyberterrorism. Comm ACM 54(2):26–28
Conway M (2012) What is cyberterrorism and how real is the threat? A Review of the Academic Literature, 1996–2009, pp 277–303
Conway M (2014) Three arguments against cyberterrorism: technological complexity; the image factor; and, the accident issue. In: Cyberterrorism, a multidisciplinary approach, Springer
CPS (2010) Sentencing manual: knives and offensive weapons. UK Crown Prosecution Service, London
Darby G, Williamson J (2011) Imaging technology and the philosophy of causality. Philos Technol 24:115–136
Deazley R, Kretschmer M, Bently L (eds) (2010) Privilege and property: essays on the history of copyright. Open Book Publishers, Cambridge
Feenberg A (2002) Transforming technology. Oxford University Press, Oxford
Fredette J, Marom R, Steinart K, Witters L (2012) The promise and peril of hyperconnectivity for organizations and societies. Chapter 1.10 the global information technology report, World Economic Forum 2012
Freud S (1962) Civilization and its discontents. Trans. James Strachey. Norton, New York
Frosch CA, Johnson-Laird PN, Cowley M (2007) It’s not my fault, Your Honour, I’m only the enabler. In: McNamara DS, Trafton JG (eds) Proceedings of the 29th Annual Cognitive Science Society. Cognitive Science Society, Austin, p 1755
GACOC (2012) Organized crime enablers, Global Agenda Council on Organized Crime. World Economic Council
Ganascia JG (2013) View and examples on hyper-connectivity. European Commission working paper
Gehlen A et al (1965) Anthropologische Ansicht der Technik. In: Freyer H (ed) Technik im Technischen Zeitlater. J Schilling, Dusseldorf, pp 101–118
Giddens A (1990) The consequences of modernity. Stanford University Press, Stanford
Green J (2002) The myth of cyberterrorism. Washington Monthly
Harvey D (1989) The condition of postmodernity. Blackwell, Oxford
Heidegger M (1949/1977) The question concerning technology. In: Lovitt W (ed & trans.) The question concerning technology and other essays. Harper & Row, New York, pp 3–35
HO (2011) Fighting fraud together: the strategic plan to reduce fraud. National Fraud Authority 12 Oct 2011
Kapp E (1877) Grundlinien einer Philosophie der Technik. George Westermann, Braunschweig
Kirk J (2012) Pacemaker hack can deliver deadly 830-volt jolt. Computerworld 17 October 2012
Konstam A (2008) Piracy: the complete history. Osprey Publishing, Westminster
Kravets S (2012) Tracking school children with RFID tags? It’s all about the Benjamins. Wired 7 September 2012
Kroes P, Meijers A (2006) The dual nature of technical artefacts. Stud Hist Philos Sci 37(1):1–4
Latour B (1994) On technical mediation—philosophy, sociology, genealogy. Common Knowl 3(2):29–64
LC (1996) Law Commission, legislating the criminal code: involuntary manslaughter: item 11 of the sixth programme of law reform: criminal law: report no 237, HC (1995-96) 171, clause 4(2)(b) back
Lemke L (2013) .The cursus publicus in the 4th century through the lens of the Codex Theodosianus. Shifting frontiers in late antiquity X conference, Ottawa, Ontario, March 2013
Marx K (1847/1975) The poverty of philosophy, in collected works, vol. 6. Lawrence & Wishart, London, pp 105–212
Mather F (1953) The railways, the electric telegraph and public order during the Chartist period. History 38:40–53
McGuire M (2007) Hypercrime: the new geometry of harm. Routledge, London
McGuire M (2008) From hyperspace to hypercrime: technologies and the new geometries of deviance and control. Papers from the British Criminology Conference, vol 8
McGuire M (2012) Technology, crime and justice: the question concerning technomia. Routledge, London
McLuhan M (1962) The Gutenberg galaxy: the making of typographic man. University of Toronto Press, Toronto
McLuhan M (1964) Understanding media: the extensions of man. McGraw Hill, New York
Mitcham C (1994) Thinking through technology, the path between engineering and philosophy. University of Chicago Press, Chicago
HS Newswire (2010) FBI: cyber-terrorism a real and growing threat to U.S. Home Security Newswire 5 March 2010
Parks C (2003) Cyber terrorism: hype or reality? J Corp Account Finance 14(5):9–11
Pearl J (2000) Causality. Cambridge University Press, Cambridge
RAE (2011) Global navigation space systems: reliance and vulnerabilities. Royal Academy of Engineering, London
Rodewig C (2012) Geotagging poses security risks. US Army News 7 March 2012
ROSPA (2010) Home and leisure accident surveillance system. See: http://www.hassandlass.org.uk/query/MainSelector.aspx
Schmidt C, Darby T (2001).The what, why, and how of the 1988 Internet worm. See: http://www.snowplow.org/tom/worm/worm.html
Seltzer L (2013) Baby monitor hack shows danger of default passwords. ZdNet 14 August 2013
Shiels M (2011) Targeted cyber attacks an ‘epidemic’. BBC 2 June 2011
Singer PW (2013) The cyber terror bogeyman. Armed Forces J
Stohl M (2014) Dr. Strangeweb: or how they stopped worrying and learned to love cyber war. In: Chen T, Jarvis L, Macdonald S (eds) Cyberterrorism: understanding, assessment, and response. Springer, New York
Taylor C, Krings A, Alves-Foss J (2002) Risk analysis and probabilistic survivability assessment (RAPSA): an assessment approach for power substation hardening. In: Proc ACM workshop on scientific aspects of cyber terrorism. UK Cabinet Office, Washington, DC. http://www.cabinetoffice.gov.uk/sites/default/files/resources/uk-cyber-security-strategy-final.pdf
UK Cabinet Office (2012) Written evidence from the Ministry of Defence. Defence Select Committee 20 Feb 2012
van Kranenburg R (2008) The Internet of Things: a critique of ambient technology. Institute of Network Cultures working paper
Weimann G (2004) Cyberterrorism, how real is the threat? USIP report 119, December—2006 terror on the Internet: the new arena, the new challenges. U.S. Institute of Peace Press, Washington, DC
White L Jr (1964) Medieval technology and social change. Oxford University Press, Oxford
Whiting A, Nouri L, Jarvis L (2014) Understanding, locating and constructing cyberterrorism. In: Chen T, Jarvis L, Macdonald S (eds) Cyberterrorism: a multidisciplinary approach. Springer, New York
Wilson C (2014) Cyber threats to critical information infrastructure. In: Chen T, Jarvis L, Macdonald S (eds) Cyberterrorism: a multidisciplinary approach. Springer, New York
Wohlsen M (2011) Biopunk: DIY scientists hack the software of life. Current, New York
Wykes M, Harcus D (2010) Cyber-terror: construction, criminalisation & control. In: Yar M, Jewkes Y (eds) Handbook of internet crime. Willan, Cullompton
Yannakogeorgos P (2014) On the terrorist misuse of the internet. In: Chen T, Jarvis L, Macdonald S (eds) Cyberterrorism: a multidisciplinary approach. Springer, New York
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer Science+Business Media New York
About this chapter
Cite this chapter
McGuire, M.R. (2014). Putting the ‘Cyber’ into Cyberterrorism: Re-reading Technological Risk in a Hyperconnected World. In: Chen, T., Jarvis, L., Macdonald, S. (eds) Cyberterrorism. Springer, New York, NY. https://doi.org/10.1007/978-1-4939-0962-9_4
Download citation
DOI: https://doi.org/10.1007/978-1-4939-0962-9_4
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4939-0961-2
Online ISBN: 978-1-4939-0962-9
eBook Packages: Computer ScienceComputer Science (R0)