Skip to main content

Putting the ‘Cyber’ into Cyberterrorism: Re-reading Technological Risk in a Hyperconnected World

  • Chapter
  • First Online:
Cyberterrorism

Chapter Overview

Threat assessments of cyberterrorism have so far tended to focus upon on two kinds of question. First, the extent to which such a construct really ‘exists’—or at least exists in any way substantively different from other forms of terrorism. Second, its destructive potentials and the kinds of targets this might involve. This chapter considers a more basic set of questions about the cyberterrorist threat. These centre upon the very thing considered to make it a distinctive form of offending: (information) technology and its relationships with the intentions of potential terrorists. Central to this analysis is an attempt to clarify some recurring confusions about the criminogenic potentials of technology in general—in particular the extent to which it can be causally agentic or ‘enables’ offending. I argue that it is only by developing a more coherent understanding of contemporary socio-technic relations that a robust evaluation of the risks posed by cyberterrorism can be made.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Added by the Cyber Security Enhancement Act of 2002, and implemented under the title of the (more familiar) Homeland Security Act of 2002.

  2. 2.

    Beldam, LJ Rv Cheshire (1991) 1 WLR 844.

  3. 3.

    The recent reported hack of a baby monitor (Seltzer 2013) offers an especially disturbing ‘proof of concept’ of the way that hyperspatialisation can bring terror into the heart of our homes.

Further Reading

  • Blyth T (2003) Terrorism as technology: a discussion of the theoretical underpinnings. Knowl Tech Pol 16(1):45–55

    Article  Google Scholar 

  • Brey P (2000) Theories of extension as extension of human faculties. In: Mitcham C (ed) Metaphysics, epistemology and technology, research in philosophy and technology, vol 19. Elsevier, London

    Google Scholar 

  • Chan W, Simester A (2011) Four functions of mens rea. Camb Law J 70(2):381–396

    Article  Google Scholar 

  • Cockfield A (2004) Towards a law and technology theory. Manitoba Law J 30:383–415

    Google Scholar 

  • Feenberg A (2002) Transforming technology—a critical theory revisited. OUP, Oxford

    Google Scholar 

  • McGuire M (2012) Technology, crime and justice. Routledge, London

    Google Scholar 

References

  • ACC (2011) Enabler activities, organised crime in Australia. Australian Crime Committee report

    Google Scholar 

  • ACPO (2009) ACPO E-crime strategy. Association of Chief Police Officers, August 2009

    Google Scholar 

  • Adams D (1999) How to stop worrying and love the internet. Times 29 August 1999

    Google Scholar 

  • Anderson J, Rainie L (2012) Millennials will benefit and suffer due to their hyperconnected lives. Pew Research Center’s Internet & American Life Project

    Google Scholar 

  • Bachmann S (2014) Hybrid threats, cyber warfare and NATO’s comprehensive approach for countering 21st century threats. Amicus Curiae 88:14–17

    Google Scholar 

  • Bedford T, Cooke R (2001) Probabilistic risk analysis: foundations and methods. Cambridge University Press, Cambridge

    Book  Google Scholar 

  • Bimber B (1990) Karl Marx and the three faces of technological determinism. Soc Stud Sci 20(2):333–351

    Article  Google Scholar 

  • Bowman-Grieve L (2014) Cyberterrorism and moral panics: a reflection on the discourse of cyberterrorism. In: Jarvis L, Macdonald S, Chen T (eds) Terrorism online. Routledge, Abingdon

    Google Scholar 

  • Brickey J (2012) Defining cyberterrorism: capturing a broad range of activities in cyberspace. Westpoint CTC Sentinel, vol 5, p 8

    Google Scholar 

  • Brown S (2006) The criminology of hybrids: rethinking crime and law in technosocial networks. Theor Criminol 10(2):223–244

    Article  Google Scholar 

  • Busby C (2004) Nuclear pollution, childhood leukaemia, retinoblastoma and brain tumours in Gwynedd and Anglesey Wards near the Menai Straits, North Wales 2000-2003. Report 04/1B;2. Green Audit, Aberystwyth

    Google Scholar 

  • Cha I, Shah Y, Schmidt A, Leicher A, Meyerstein M (2009) Security and trust for M2M communications. Vehicular Technology Magazine, IEEE

    Google Scholar 

  • Clark A (2006) Natural-born cyborgs: minds, technologies, and the future of human intelligence. OUP, Oxford

    Google Scholar 

  • Clarke R, Knake R (2010) CyberWar: the next threat to national security and what to do about it. Ecco/HarperCollins, New York

    Google Scholar 

  • CO (2013) Computer misuse act 1990 productions. Crown Office and Procurator Fiscal Service

    Google Scholar 

  • Conant J (ed) (1950) The overthrow of phlogiston theory: the chemical revolution of 1775–1789. Harvard University Press, Cambridge

    Google Scholar 

  • Conway M (2007) Cyberterrorism: hype and reality. In: Armistead L (ed) Information warfare: separating hype from reality. Potomac Books, Inc., Washington, DC, pp 73–93

    Google Scholar 

  • Conway M (2011) Against cyberterrorism. Comm ACM 54(2):26–28

    Article  Google Scholar 

  • Conway M (2012) What is cyberterrorism and how real is the threat? A Review of the Academic Literature, 1996–2009, pp 277–303

    Google Scholar 

  • Conway M (2014) Three arguments against cyberterrorism: technological complexity; the image factor; and, the accident issue. In: Cyberterrorism, a multidisciplinary approach, Springer

    Google Scholar 

  • CPS (2010) Sentencing manual: knives and offensive weapons. UK Crown Prosecution Service, London

    Google Scholar 

  • Darby G, Williamson J (2011) Imaging technology and the philosophy of causality. Philos Technol 24:115–136

    Article  Google Scholar 

  • Deazley R, Kretschmer M, Bently L (eds) (2010) Privilege and property: essays on the history of copyright. Open Book Publishers, Cambridge

    Google Scholar 

  • Feenberg A (2002) Transforming technology. Oxford University Press, Oxford

    Google Scholar 

  • Fredette J, Marom R, Steinart K, Witters L (2012) The promise and peril of hyperconnectivity for organizations and societies. Chapter 1.10 the global information technology report, World Economic Forum 2012

    Google Scholar 

  • Freud S (1962) Civilization and its discontents. Trans. James Strachey. Norton, New York

    Google Scholar 

  • Frosch CA, Johnson-Laird PN, Cowley M (2007) It’s not my fault, Your Honour, I’m only the enabler. In: McNamara DS, Trafton JG (eds) Proceedings of the 29th Annual Cognitive Science Society. Cognitive Science Society, Austin, p 1755

    Google Scholar 

  • GACOC (2012) Organized crime enablers, Global Agenda Council on Organized Crime. World Economic Council

    Google Scholar 

  • Ganascia JG (2013) View and examples on hyper-connectivity. European Commission working paper

    Google Scholar 

  • Gehlen A et al (1965) Anthropologische Ansicht der Technik. In: Freyer H (ed) Technik im Technischen Zeitlater. J Schilling, Dusseldorf, pp 101–118

    Google Scholar 

  • Giddens A (1990) The consequences of modernity. Stanford University Press, Stanford

    Google Scholar 

  • Green J (2002) The myth of cyberterrorism. Washington Monthly

    Google Scholar 

  • Harvey D (1989) The condition of postmodernity. Blackwell, Oxford

    Google Scholar 

  • Heidegger M (1949/1977) The question concerning technology. In: Lovitt W (ed & trans.) The question concerning technology and other essays. Harper & Row, New York, pp 3–35

    Google Scholar 

  • HO (2011) Fighting fraud together: the strategic plan to reduce fraud. National Fraud Authority 12 Oct 2011

    Google Scholar 

  • Kapp E (1877) Grundlinien einer Philosophie der Technik. George Westermann, Braunschweig

    Google Scholar 

  • Kirk J (2012) Pacemaker hack can deliver deadly 830-volt jolt. Computerworld 17 October 2012

    Google Scholar 

  • Konstam A (2008) Piracy: the complete history. Osprey Publishing, Westminster

    Google Scholar 

  • Kravets S (2012) Tracking school children with RFID tags? It’s all about the Benjamins. Wired 7 September 2012

    Google Scholar 

  • Kroes P, Meijers A (2006) The dual nature of technical artefacts. Stud Hist Philos Sci 37(1):1–4

    Article  Google Scholar 

  • Latour B (1994) On technical mediation—philosophy, sociology, genealogy. Common Knowl 3(2):29–64

    Google Scholar 

  • LC (1996) Law Commission, legislating the criminal code: involuntary manslaughter: item 11 of the sixth programme of law reform: criminal law: report no 237, HC (1995-96) 171, clause 4(2)(b) back

  • Lemke L (2013) .The cursus publicus in the 4th century through the lens of the Codex Theodosianus. Shifting frontiers in late antiquity X conference, Ottawa, Ontario, March 2013

    Google Scholar 

  • Marx K (1847/1975) The poverty of philosophy, in collected works, vol. 6. Lawrence & Wishart, London, pp 105–212

    Google Scholar 

  • Mather F (1953) The railways, the electric telegraph and public order during the Chartist period. History 38:40–53

    Article  Google Scholar 

  • McGuire M (2007) Hypercrime: the new geometry of harm. Routledge, London

    Google Scholar 

  • McGuire M (2008) From hyperspace to hypercrime: technologies and the new geometries of deviance and control. Papers from the British Criminology Conference, vol 8

    Google Scholar 

  • McGuire M (2012) Technology, crime and justice: the question concerning technomia. Routledge, London

    Google Scholar 

  • McLuhan M (1962) The Gutenberg galaxy: the making of typographic man. University of Toronto Press, Toronto

    Google Scholar 

  • McLuhan M (1964) Understanding media: the extensions of man. McGraw Hill, New York

    Google Scholar 

  • Mitcham C (1994) Thinking through technology, the path between engineering and philosophy. University of Chicago Press, Chicago

    Google Scholar 

  • HS Newswire (2010) FBI: cyber-terrorism a real and growing threat to U.S. Home Security Newswire 5 March 2010

    Google Scholar 

  • Parks C (2003) Cyber terrorism: hype or reality? J Corp Account Finance 14(5):9–11

    Article  MathSciNet  Google Scholar 

  • Pearl J (2000) Causality. Cambridge University Press, Cambridge

    MATH  Google Scholar 

  • RAE (2011) Global navigation space systems: reliance and vulnerabilities. Royal Academy of Engineering, London

    Google Scholar 

  • Rodewig C (2012) Geotagging poses security risks. US Army News 7 March 2012

    Google Scholar 

  • ROSPA (2010) Home and leisure accident surveillance system. See: http://www.hassandlass.org.uk/query/MainSelector.aspx

  • Schmidt C, Darby T (2001).The what, why, and how of the 1988 Internet worm. See: http://www.snowplow.org/tom/worm/worm.html

  • Seltzer L (2013) Baby monitor hack shows danger of default passwords. ZdNet 14 August 2013

    Google Scholar 

  • Shiels M (2011) Targeted cyber attacks an ‘epidemic’. BBC 2 June 2011

    Google Scholar 

  • Singer PW (2013) The cyber terror bogeyman. Armed Forces J

    Google Scholar 

  • Stohl M (2014) Dr. Strangeweb: or how they stopped worrying and learned to love cyber war. In: Chen T, Jarvis L, Macdonald S (eds) Cyberterrorism: understanding, assessment, and response. Springer, New York

    Google Scholar 

  • Taylor C, Krings A, Alves-Foss J (2002) Risk analysis and probabilistic survivability assessment (RAPSA): an assessment approach for power substation hardening. In: Proc ACM workshop on scientific aspects of cyber terrorism. UK Cabinet Office, Washington, DC. http://www.cabinetoffice.gov.uk/sites/default/files/resources/uk-cyber-security-strategy-final.pdf

  • UK Cabinet Office (2012) Written evidence from the Ministry of Defence. Defence Select Committee 20 Feb 2012

    Google Scholar 

  • van Kranenburg R (2008) The Internet of Things: a critique of ambient technology. Institute of Network Cultures working paper

    Google Scholar 

  • Weimann G (2004) Cyberterrorism, how real is the threat? USIP report 119, December—2006 terror on the Internet: the new arena, the new challenges. U.S. Institute of Peace Press, Washington, DC

    Google Scholar 

  • White L Jr (1964) Medieval technology and social change. Oxford University Press, Oxford

    Google Scholar 

  • Whiting A, Nouri L, Jarvis L (2014) Understanding, locating and constructing cyberterrorism. In: Chen T, Jarvis L, Macdonald S (eds) Cyberterrorism: a multidisciplinary approach. Springer, New York

    Google Scholar 

  • Wilson C (2014) Cyber threats to critical information infrastructure. In: Chen T, Jarvis L, Macdonald S (eds) Cyberterrorism: a multidisciplinary approach. Springer, New York

    Google Scholar 

  • Wohlsen M (2011) Biopunk: DIY scientists hack the software of life. Current, New York

    Google Scholar 

  • Wykes M, Harcus D (2010) Cyber-terror: construction, criminalisation & control. In: Yar M, Jewkes Y (eds) Handbook of internet crime. Willan, Cullompton

    Google Scholar 

  • Yannakogeorgos P (2014) On the terrorist misuse of the internet. In: Chen T, Jarvis L, Macdonald S (eds) Cyberterrorism: a multidisciplinary approach. Springer, New York

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. R. McGuire .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer Science+Business Media New York

About this chapter

Cite this chapter

McGuire, M.R. (2014). Putting the ‘Cyber’ into Cyberterrorism: Re-reading Technological Risk in a Hyperconnected World. In: Chen, T., Jarvis, L., Macdonald, S. (eds) Cyberterrorism. Springer, New York, NY. https://doi.org/10.1007/978-1-4939-0962-9_4

Download citation

  • DOI: https://doi.org/10.1007/978-1-4939-0962-9_4

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4939-0961-2

  • Online ISBN: 978-1-4939-0962-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics