Skip to main content

Terrorism in Transition: The Implications of Cyber-Terrorism

  • Chapter
Societies in Transition
  • 636 Accesses

Abstract

Terrorism is one of the fears that influenced the economic, political and security transformations of contemporary societies. The effects of terrorism can be traced back to ancient Greece and evolved en par with societies through the centuries. The anarchist ‘propaganda by deed’ methodology was followed by other terrorist movements later on in history, as well as in the modus operandi of the terrorist organization in the last decade. So the question remains, so now what’s next? The Internet and its ‘natural habitat’ gave the possibility to develop what has been recognized as cyber-terrorism. The services provided by the Internet allow terrorists to adopt an entrepreneur approach to their business. New products are quickly sought and customised to achieve defined goals like any other enterprise. The Internet allows terrorists to spread their message to a far wider audience than that permitted by other non-Internet environments. Cyber-terrorism evolved from being the support infrastructure necessary to commit an attack to the attack itself. This lethal cocktail kindles the need to rethink the economic, political and security strategies in order to mitigate the effects of cyber-terrorism.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Estonia was the victim of a nationwide sustained cyber-attack during a 2 week period in April and May 2007. Its information critical infrastructure was the main focus of this attack. The targets included government and parliament portals, financial institutions, ministries, media and news broadcasters. A number of distributed denial of service attacks focused their wrath on the country’s infrastructure forcing some of them to shut down for prolonged periods. These attacks were supported by a number of defacement attacks that planted Russian propaganda on several Estonian websites. In retaliation a number of Russian web pages were compromised and defaced. Estonia blamed the attack on Russia after a period of fall out between the two nations related to the shifting of a Soviet-era war memorial in Tallinn. The country appealed to European Union and NATO partners to take firm action against this form of cyber threat.

References

  • Abdukadirov, S. (2010). Terrorism: The dark side of social entrepreneurship. Studies in Conflict & Terrorism, 33(7), 603–617. New York: Routledge.

    Article  Google Scholar 

  • Ariely, G. (2008). Knowledge management, terrorism and cyber terrorism. In L. Janczewski & A. M. Colarik (Eds.), Cyber warfare and cyber terrorism (pp. 7–16). London: Information Science Reference.

    Google Scholar 

  • Awan, I. (2012). Cyber threats and cyber terrorism: The internet as a tool for extremism. In I. Awan & B. Blackmore (Eds.), Policing cyber hate, cyber threats and cyber terrorism (pp. 21–38). Surrey: Ashgate.

    Google Scholar 

  • Behr, I., Reding, A., Edwards, C., & Gribbon, L. (2013). Radicalisation in the digital era. The use of the internet in 15 cases of terrorism and extremism. Brussels: RAND.

    Google Scholar 

  • Blakemore, B. (2012). Cyberspace, cybercrime and cyber terrorism. In I. Awan & B. Blackmore (Eds.), Policing cyber hate, cyber threats and cyber terrorism (pp. 5–20). Surrey: Ashgate.

    Google Scholar 

  • Borowitz, A. (2005). Terrorism for self-glorification: The Herostratos syndrome. Kent, OH: Kent State University Press.

    Google Scholar 

  • Britz, T. M. (2009). Computer forensics and cybercrime. An introduction (2nd ed.). London: Pearson.

    Google Scholar 

  • Brunst, W. P. (2010). Terrorism and the internet: New threats posed by cyberterrorism and terrorist use of the internet. In M. Wade & A. Maljevic (Eds.), A war on terror? The European stance on a new threat, changing laws and human rights implications (pp. 51–79). New York: Springer.

    Google Scholar 

  • Charvat, J. P. I. A. G. (2009). Cyber terrorism: A new dimension in battlespace. The Virtual Battlefield: Perspectives on Cyber Warfare, 3, 77–87. doi:10.3233/978-1-60750-060-5-77.

    Google Scholar 

  • Colarik, A. M. (2006). Cyber terrorism: Political and economic implications. London: Idea.

    Book  Google Scholar 

  • Constantine, L. (2011). Crossing the line: Terrorism in cyberspace and targets in real-space. Paper presented at the 2011 international conference on cyberworlds.

    Google Scholar 

  • Convention on Cybercrime. (2001). Accessed March 15, 2014, from http://conventions.coe.int/Treaty/Commun/QueVoulezVous.asp?CL=ENG&NT=185

  • Conway, M. (2011). Privacy and security against cyberterrorism—Why cyber-based terrorist attacks are unlikely to occur. Communications of the ACM, 54(2), 26–28. doi:10.1145/1897816.1897829.

    Article  Google Scholar 

  • Curran, K., Concannon, K., & McKeever, S. (2008). Cyber terrorism attacks. In L. Janczewski & A. M. Colarik (Eds.), Cyber warfare and cyber terrorism (pp. 1–6). London: Information Science Reference.

    Google Scholar 

  • Denning, D. E. (1998). Cyberspace attacks and countermeasures. In D. E. Denning & P. J. Denning (Eds.), Internet besieged: Countering cyberspace scofflaws. New York: ACM Press. In Yannakogeorgos (2011).

    Google Scholar 

  • Denning, D. (2007). A view of cyberterrorism five years later. In K. Himma (Ed.), Internet security: Hacking, counterhacking, and society (p. 124). Sudbury, MA: Jones and Bartlett.

    Google Scholar 

  • Denning, D. (2010). Terror’s web: How the internet is transforming terrorism. In Y. Jewkes & M. Yar (Eds.), Handbook of internet crime (pp. 194–213). London: Routledge.

    Google Scholar 

  • Farwell, J. P., & Rohozinski, R. (2012). The new reality of cyber war. Survival: Global Politics and Strategy, 54(4), 107–120. London: Routledge.

    Article  Google Scholar 

  • Friedman, L. T. (2006). The world is flat—The globalized world in the twenty-first century. London: Penguin Books.

    Google Scholar 

  • Gearson, J. (2002). The nature of modern terrorism. In L. Freedman (Ed.), Superterrorism: Policy responses. Oxford, UK: Blackwell.

    Google Scholar 

  • Gellen, B. (2002, June 27). Cyber-attacks by al-Qaeda feared. Washington Post, A01. In Weimann (2006).

    Google Scholar 

  • Goodman, S. E., Kirk, J. C., & Kirk, H. M. (2007). Cyberspace as a medium for terrorists. Technological Forecasting and Social Change, 74(2), 193–210. Netherlands: Elsevier.

    Article  Google Scholar 

  • Gordon, S., & Ford, R. (2002). Cyberterrorism? Computers and Security, 21(7), 636–647. London: Elsevier.

    Article  Google Scholar 

  • Gorge, M. (2007). Cyberterrorism: Hype or reality? Computer Fraud & Security, 2007(2), 9–12. Netherlands: Elsevier.

    Article  Google Scholar 

  • Heickerö, R. (2008). Terrorism online and the change of modus operandi. Retrieved August 1–13, 2008, from http://www.dodccrp.org/events/13th_iccrts_2008/presentations/209.pdf

  • Hoffman, B. (2006). Inside terrorism: Revised and expanded edition. New York: Columbia University Press.

    Google Scholar 

  • Internet World Stats—Usage and Population Statistics. (2014). Internet usage statistics, the internet big picture, world internet users and population stats. Retrieved February 25, 2014, from http://www.internetworldstats.com/stats.htm

  • Janczewski, L. J., & Colarik, A. M. (2005). Managerial guide for handling cyber-terrorism and information warfare. London: Idea.

    Book  Google Scholar 

  • Janczewski, L. J., & Colarik, A. M. (2008). Cyber warfare and cyber terrorism. New York: Idea.

    Google Scholar 

  • Joll, J. (1979). The anarchists (2nd ed.). London: Eyre & Spottiswoode.

    Google Scholar 

  • Land, M. (2014). Security management for occupational safety. Boca Raton, FL: CRC Press.

    Google Scholar 

  • Laqueur, W. (1987). The age of terrorism. London: Weidenfeld and Nicolson.

    Google Scholar 

  • Leighton, T. (2006, September). The net’s real security problem. Scientific American, p. 44. In Yannakogeorgos (2011).

    Google Scholar 

  • Leung, R. (2003, May 25). Mind of the suicide bomber, 60 minutes. Retrieved from http://www.cbsnews.com/stories/2003/05/23/60minutes/main555344.shtml. Accessed 16 June 2009.

  • Lewis, J. A. (2006). Cybersecurity and critical infrastructure protection. In J. J. F. Forest (Ed.), Homeland security: Protecting America’s targets. III: Critical infrastructure (pp. 324–328). Westport, CT: Praeger.

    Chapter  Google Scholar 

  • Mantel, B. (2011). Terrorism and the internet should web sites that promote terrorism be shut down? In C. Q. Researcher (Ed.), Issues in terrorism and homeland security: Selections from CQ researcher (pp. 129–153). Thousand Oaks, CA: Sage.

    Google Scholar 

  • Montalvo, J. C. (2010). The effect of the terrorist attacks on the outcome of the 2004 Spanish election: A survey. In M. Buesa & T. Baumert (Eds.), The economic repercussions of terrorism (pp. 199–214). Oxford: Oxford University Press.

    Google Scholar 

  • Nellis, A. M., & Savage, J. (2012). Does watching the news affect fear of terrorism? The importance of media exposure on terrorism fear. Crime & Delinquency, 58(5), 748–768. London: Sage.

    Article  Google Scholar 

  • Noor, E. (2011). The problem with cyberterrorism. SEARCCT’s Selection of Articles, 2, 51–63. Malaysia: Institute of Strategic & International Studies (ISIS).

    Google Scholar 

  • Ogun, M. N. (2012). Terrorist use of internet: Possible suggestions to prevent the usage for terrorist purposes. Journal of Applied Security Research, 7(2), 203–217. doi:10.1080/19361610.2012.656252.

    Article  Google Scholar 

  • O’Neill, M. (2012). The evolving EU counter-terrorism legal framework. London: Routledge.

    Google Scholar 

  • Ramesh, R. (2008, December 19). Mumbai attacks spark media clampdown. The Guardian, p. 32.

    Google Scholar 

  • Rapoport, D. C. (1971). Assassination & terrorism. Toronto: Canadian Broadcasting Corporation, retrieved from http://www.rand.org/pubs/notes/2005/N1942.pdf. Accessed 1 July 2009.

  • Schmid, A. P. (Ed.). (2011). The Routledge handbook of terrorism research. London: Routledge.

    Google Scholar 

  • (2012, October 23). Terror plot accused ‘posed as charity collectors to raise funds’. The Guardian.

    Google Scholar 

  • Tsfati, Y., & Weimann, G. (2002). www.terrorism.com: Terror on the internet. Studies in Conflict & Terrorism, 25, 317–332.

  • Yannakogeorgos, P. A. (2011). Privatized cybersecurity and the challenges of securing the digital environment. In L. W. Kennedy & E. G. McGarrell (Eds.), Crime and terrorism risk: Studies in criminology and criminal justice (pp. 255–267). London: Routledge.

    Google Scholar 

  • Warren, M. J. (2008). Terrorism and the internet. In L. Janczewski & A. M. Colarik (Eds.), Cyber warfare and cyber terrorism (pp. 42–49). London: Information Science Reference.

    Google Scholar 

  • Weimann, G. (2006). Terror on the internet, new arena, new challenges. Washington, DC: United States Institute of Peace.

    Google Scholar 

  • Woodcock, G. (Ed.). (1977). The anarchist reader. Glasgow: Fontana. In Hoffman (2006).

    Google Scholar 

  • Wykes, M., & Harcus, D. (2012). Cyber-terror: Construction, criminalisation and control. In Y. Jewkes & M. Yar (Eds.), Handbook of internet crime (pp. 214–229). London: Routledge.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Trevor Calafato .

Editor information

Editors and Affiliations

Author Biographies

Author Biographies

Calafato Trevor is a Lecturer at the University of Malta in the Department of Criminology. Before moving to university he was a probation officer for more than 6 years, where he was also in charge of the health, safety and security of the Department of Probation. While reading a M.Sc. in Security and Risk Management at the University of Leicester he studied the potential responses and preventive measures of terrorist incidents in Malta. He holds a PhD from the University of Sheffield which focuses on security measures and terrorism research. He published articles and book chapters on security, terrorism, criminology, criminal justice and on Cesare Lombroso.

Caruana Paul has just joined the University of Malta after a career in policing. During his service within the Malta Police, he was responsible for police ICT infrastructure, cybercrime investigations and criminal statistics. In 2002 he was appointed as head of a specialised cybercrime team for the Malta Police. Participating in a number of international investigations and initiatives, Paul led this specialist team until his retirement in 2012. During this period he managed to bring together key stakeholders addressing eSecurity and cybercrime management through a holistic approach. Working within the Department of Criminology, Paul specialises in cyber based criminology. He is currently participating in the Commonwealth Cybercrime Initiative helping member states in safeguard their ICT infrastructure from cyber related threats. He is also reading for a PhD in cyberstalking and harassment at the University of Leicester.

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Calafato, T., Caruana, P. (2015). Terrorism in Transition: The Implications of Cyber-Terrorism. In: Katsikides, S., Koktsidis, P. (eds) Societies in Transition. Springer, Cham. https://doi.org/10.1007/978-3-319-13814-5_10

Download citation

Publish with us

Policies and ethics