Skip to main content

Cyber Terrorism

  • Chapter
  • First Online:
  • 1099 Accesses

Abstract

The Stuxnet attack on Iranian centrifuges is a well-known example of a cyber attack, not yet a cyber war. As we read below, Stuxnet was delivered to Iran’s Natanz centrifuge factory on a memory stick, raising and lowering the rotation frequencies close to several resonant frequencies, destroying a thousand centrifuges.

The US has crossed a Rubicon in cyber space. It launched a cyber attack that has caused another nation’s sensitive equipment to be destroyed. It has legitimized that behavior. In the process it delayed the Iranian nuclear program by many months, but only by months. And, because Stuxnet escaped into the hands of hackers throughout the world, the US has also launched what is likely to be a cyber boomerang, a weapon that will someday be used to attack some of America’s own defenseless networks.

[Richard A. Clarke, former National Coordinator for Security, Infrastructure Protection, and Counterterrorism under four presidents, Cyber War, 2010].

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   44.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   59.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   59.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    The price of a electronic storage dropped by two million: $200/Mbyte to $0.01/100-Mbyte. Moore’s law has existed for 50 years (2015–1965), which is 25 doubling periods of 2 years. This gives an increase in electronic surface density of transistors by a factor of 225 = 210 × 1010 × 25 = 1024 × 1024 × 32 = 34 million over a longer period of time.

Bibliography

  • Clarke, R., & Knake, R. (2010). Cyber war: The next threat to national security and what to do about it. NY: HyperCollins.

    Google Scholar 

  • de Montjoye, Y., Radaelli, L., Singh, V., & Pentland, A. (2015). Unique in the shopping mall: On the reidentifiability of credit card metadata, Science 347, 536–539.

    Google Scholar 

  • Elazari, K. (2015). How to survive cyberwar. Scientific American, 66–69, April 2015.

    Google Scholar 

  • Elazari, K. (2015). Who are the hackers? Nine Ted Talks. www.ted.com/playlists/10/

  • Glick, J. (2012). The information: a history, a theory, a flood. NY: Pantheon.

    Google Scholar 

  • Healey, J. (Ed.). (2013). A fierce domain: Conflict in cyberspace, 1986 to 2012. NY: Atlantic Council.

    Google Scholar 

  • Henschke, A., & Lin, H. (2014). Cyberwarfare ethics, or how Facebook could accidentally make its engineers into targets. Bulletin Atomic Scientists, 25 August 2014.

    Google Scholar 

  • Lin, H. (2012). A virtual necessity: some modest steps towards greater cyber security. Bulletin Atomic Scientists, 68(5), 75–87.

    Article  Google Scholar 

  • Nye, J. (2010). Cyber power. Cambridge, MA: Harvard Belfour Center.

    Google Scholar 

  • Nye, J. (2013). From bombs to bytes: Can our nuclear history inform our cyber future? Bulletin Atomic Scientists, 69(9), 8–14.

    Article  Google Scholar 

  • Owens, W., Dam, K., & Lin, H. (Eds.). (2009). Technology, policy, law and ethics regarding US acquisition and use of cyberattack capabilities. Washington, DC: National Academy Press.

    Google Scholar 

  • Rid, T. (2013). Cyberwar will not take place. London, UK: Oxford University Press.

    Google Scholar 

  • Rosenzweig, P. (2012). Cyber warfare: How conflicts in cyberspace are challenging America in changing the world. Santa Barbara, CA: Praeger.

    Google Scholar 

  • Rosenzweig, P. (2013). Thinking about cyber security: from cyber crime to cyber warfare. Chantilly, VA: The Great Courses.

    Google Scholar 

  • Schneier, B. (2003). Beyond fear. NY: Copernicus.

    Google Scholar 

  • Schneier, B. (2013). Carry on: Sound advice from Schneier on security. NY: Wiley.

    Google Scholar 

  • Science Authors. (2015). The end of privacy. Science, 347, 479–540.

    Google Scholar 

  • Singer, P., & Friedman, A. (2014). Cybersecurity and cyberwar. London, UK: Oxford University Press.

    Google Scholar 

  • Wolter, D. (2013). UN takes a big step forward on cybersecurity. Arms Control Today, September 25–29, 2013.

    Google Scholar 

  • Zetter, K. (2014). Countdown to zero days: Stuxnet and the launch of the world’s first digital weapon. New York, NY: Crown.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to David Hafemeister .

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Hafemeister, D. (2016). Cyber Terrorism. In: Nuclear Proliferation and Terrorism in the Post-9/11 World. Springer, Cham. https://doi.org/10.1007/978-3-319-25367-1_14

Download citation

Publish with us

Policies and ethics