Abstract
Terrorism is one of the fears that influenced the economic, political and security transformations of contemporary societies. The effects of terrorism can be traced back to ancient Greece and evolved en par with societies through the centuries. The anarchist ‘propaganda by deed’ methodology was followed by other terrorist movements later on in history, as well as in the modus operandi of the terrorist organization in the last decade. So the question remains, so now what’s next? The Internet and its ‘natural habitat’ gave the possibility to develop what has been recognized as cyber-terrorism. The services provided by the Internet allow terrorists to adopt an entrepreneur approach to their business. New products are quickly sought and customised to achieve defined goals like any other enterprise. The Internet allows terrorists to spread their message to a far wider audience than that permitted by other non-Internet environments. Cyber-terrorism evolved from being the support infrastructure necessary to commit an attack to the attack itself. This lethal cocktail kindles the need to rethink the economic, political and security strategies in order to mitigate the effects of cyber-terrorism.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Estonia was the victim of a nationwide sustained cyber-attack during a 2 week period in April and May 2007. Its information critical infrastructure was the main focus of this attack. The targets included government and parliament portals, financial institutions, ministries, media and news broadcasters. A number of distributed denial of service attacks focused their wrath on the country’s infrastructure forcing some of them to shut down for prolonged periods. These attacks were supported by a number of defacement attacks that planted Russian propaganda on several Estonian websites. In retaliation a number of Russian web pages were compromised and defaced. Estonia blamed the attack on Russia after a period of fall out between the two nations related to the shifting of a Soviet-era war memorial in Tallinn. The country appealed to European Union and NATO partners to take firm action against this form of cyber threat.
References
Abdukadirov, S. (2010). Terrorism: The dark side of social entrepreneurship. Studies in Conflict & Terrorism, 33(7), 603–617. New York: Routledge.
Ariely, G. (2008). Knowledge management, terrorism and cyber terrorism. In L. Janczewski & A. M. Colarik (Eds.), Cyber warfare and cyber terrorism (pp. 7–16). London: Information Science Reference.
Awan, I. (2012). Cyber threats and cyber terrorism: The internet as a tool for extremism. In I. Awan & B. Blackmore (Eds.), Policing cyber hate, cyber threats and cyber terrorism (pp. 21–38). Surrey: Ashgate.
Behr, I., Reding, A., Edwards, C., & Gribbon, L. (2013). Radicalisation in the digital era. The use of the internet in 15 cases of terrorism and extremism. Brussels: RAND.
Blakemore, B. (2012). Cyberspace, cybercrime and cyber terrorism. In I. Awan & B. Blackmore (Eds.), Policing cyber hate, cyber threats and cyber terrorism (pp. 5–20). Surrey: Ashgate.
Borowitz, A. (2005). Terrorism for self-glorification: The Herostratos syndrome. Kent, OH: Kent State University Press.
Britz, T. M. (2009). Computer forensics and cybercrime. An introduction (2nd ed.). London: Pearson.
Brunst, W. P. (2010). Terrorism and the internet: New threats posed by cyberterrorism and terrorist use of the internet. In M. Wade & A. Maljevic (Eds.), A war on terror? The European stance on a new threat, changing laws and human rights implications (pp. 51–79). New York: Springer.
Charvat, J. P. I. A. G. (2009). Cyber terrorism: A new dimension in battlespace. The Virtual Battlefield: Perspectives on Cyber Warfare, 3, 77–87. doi:10.3233/978-1-60750-060-5-77.
Colarik, A. M. (2006). Cyber terrorism: Political and economic implications. London: Idea.
Constantine, L. (2011). Crossing the line: Terrorism in cyberspace and targets in real-space. Paper presented at the 2011 international conference on cyberworlds.
Convention on Cybercrime. (2001). Accessed March 15, 2014, from http://conventions.coe.int/Treaty/Commun/QueVoulezVous.asp?CL=ENG&NT=185
Conway, M. (2011). Privacy and security against cyberterrorism—Why cyber-based terrorist attacks are unlikely to occur. Communications of the ACM, 54(2), 26–28. doi:10.1145/1897816.1897829.
Curran, K., Concannon, K., & McKeever, S. (2008). Cyber terrorism attacks. In L. Janczewski & A. M. Colarik (Eds.), Cyber warfare and cyber terrorism (pp. 1–6). London: Information Science Reference.
Denning, D. E. (1998). Cyberspace attacks and countermeasures. In D. E. Denning & P. J. Denning (Eds.), Internet besieged: Countering cyberspace scofflaws. New York: ACM Press. In Yannakogeorgos (2011).
Denning, D. (2007). A view of cyberterrorism five years later. In K. Himma (Ed.), Internet security: Hacking, counterhacking, and society (p. 124). Sudbury, MA: Jones and Bartlett.
Denning, D. (2010). Terror’s web: How the internet is transforming terrorism. In Y. Jewkes & M. Yar (Eds.), Handbook of internet crime (pp. 194–213). London: Routledge.
Farwell, J. P., & Rohozinski, R. (2012). The new reality of cyber war. Survival: Global Politics and Strategy, 54(4), 107–120. London: Routledge.
Friedman, L. T. (2006). The world is flat—The globalized world in the twenty-first century. London: Penguin Books.
Gearson, J. (2002). The nature of modern terrorism. In L. Freedman (Ed.), Superterrorism: Policy responses. Oxford, UK: Blackwell.
Gellen, B. (2002, June 27). Cyber-attacks by al-Qaeda feared. Washington Post, A01. In Weimann (2006).
Goodman, S. E., Kirk, J. C., & Kirk, H. M. (2007). Cyberspace as a medium for terrorists. Technological Forecasting and Social Change, 74(2), 193–210. Netherlands: Elsevier.
Gordon, S., & Ford, R. (2002). Cyberterrorism? Computers and Security, 21(7), 636–647. London: Elsevier.
Gorge, M. (2007). Cyberterrorism: Hype or reality? Computer Fraud & Security, 2007(2), 9–12. Netherlands: Elsevier.
Heickerö, R. (2008). Terrorism online and the change of modus operandi. Retrieved August 1–13, 2008, from http://www.dodccrp.org/events/13th_iccrts_2008/presentations/209.pdf
Hoffman, B. (2006). Inside terrorism: Revised and expanded edition. New York: Columbia University Press.
Internet World Stats—Usage and Population Statistics. (2014). Internet usage statistics, the internet big picture, world internet users and population stats. Retrieved February 25, 2014, from http://www.internetworldstats.com/stats.htm
Janczewski, L. J., & Colarik, A. M. (2005). Managerial guide for handling cyber-terrorism and information warfare. London: Idea.
Janczewski, L. J., & Colarik, A. M. (2008). Cyber warfare and cyber terrorism. New York: Idea.
Joll, J. (1979). The anarchists (2nd ed.). London: Eyre & Spottiswoode.
Land, M. (2014). Security management for occupational safety. Boca Raton, FL: CRC Press.
Laqueur, W. (1987). The age of terrorism. London: Weidenfeld and Nicolson.
Leighton, T. (2006, September). The net’s real security problem. Scientific American, p. 44. In Yannakogeorgos (2011).
Leung, R. (2003, May 25). Mind of the suicide bomber, 60 minutes. Retrieved from http://www.cbsnews.com/stories/2003/05/23/60minutes/main555344.shtml. Accessed 16 June 2009.
Lewis, J. A. (2006). Cybersecurity and critical infrastructure protection. In J. J. F. Forest (Ed.), Homeland security: Protecting America’s targets. III: Critical infrastructure (pp. 324–328). Westport, CT: Praeger.
Mantel, B. (2011). Terrorism and the internet should web sites that promote terrorism be shut down? In C. Q. Researcher (Ed.), Issues in terrorism and homeland security: Selections from CQ researcher (pp. 129–153). Thousand Oaks, CA: Sage.
Montalvo, J. C. (2010). The effect of the terrorist attacks on the outcome of the 2004 Spanish election: A survey. In M. Buesa & T. Baumert (Eds.), The economic repercussions of terrorism (pp. 199–214). Oxford: Oxford University Press.
Nellis, A. M., & Savage, J. (2012). Does watching the news affect fear of terrorism? The importance of media exposure on terrorism fear. Crime & Delinquency, 58(5), 748–768. London: Sage.
Noor, E. (2011). The problem with cyberterrorism. SEARCCT’s Selection of Articles, 2, 51–63. Malaysia: Institute of Strategic & International Studies (ISIS).
Ogun, M. N. (2012). Terrorist use of internet: Possible suggestions to prevent the usage for terrorist purposes. Journal of Applied Security Research, 7(2), 203–217. doi:10.1080/19361610.2012.656252.
O’Neill, M. (2012). The evolving EU counter-terrorism legal framework. London: Routledge.
Ramesh, R. (2008, December 19). Mumbai attacks spark media clampdown. The Guardian, p. 32.
Rapoport, D. C. (1971). Assassination & terrorism. Toronto: Canadian Broadcasting Corporation, retrieved from http://www.rand.org/pubs/notes/2005/N1942.pdf. Accessed 1 July 2009.
Schmid, A. P. (Ed.). (2011). The Routledge handbook of terrorism research. London: Routledge.
(2012, October 23). Terror plot accused ‘posed as charity collectors to raise funds’. The Guardian.
Tsfati, Y., & Weimann, G. (2002). www.terrorism.com: Terror on the internet. Studies in Conflict & Terrorism, 25, 317–332.
Yannakogeorgos, P. A. (2011). Privatized cybersecurity and the challenges of securing the digital environment. In L. W. Kennedy & E. G. McGarrell (Eds.), Crime and terrorism risk: Studies in criminology and criminal justice (pp. 255–267). London: Routledge.
Warren, M. J. (2008). Terrorism and the internet. In L. Janczewski & A. M. Colarik (Eds.), Cyber warfare and cyber terrorism (pp. 42–49). London: Information Science Reference.
Weimann, G. (2006). Terror on the internet, new arena, new challenges. Washington, DC: United States Institute of Peace.
Woodcock, G. (Ed.). (1977). The anarchist reader. Glasgow: Fontana. In Hoffman (2006).
Wykes, M., & Harcus, D. (2012). Cyber-terror: Construction, criminalisation and control. In Y. Jewkes & M. Yar (Eds.), Handbook of internet crime (pp. 214–229). London: Routledge.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Author Biographies
Author Biographies
Calafato Trevor is a Lecturer at the University of Malta in the Department of Criminology. Before moving to university he was a probation officer for more than 6 years, where he was also in charge of the health, safety and security of the Department of Probation. While reading a M.Sc. in Security and Risk Management at the University of Leicester he studied the potential responses and preventive measures of terrorist incidents in Malta. He holds a PhD from the University of Sheffield which focuses on security measures and terrorism research. He published articles and book chapters on security, terrorism, criminology, criminal justice and on Cesare Lombroso.
Caruana Paul has just joined the University of Malta after a career in policing. During his service within the Malta Police, he was responsible for police ICT infrastructure, cybercrime investigations and criminal statistics. In 2002 he was appointed as head of a specialised cybercrime team for the Malta Police. Participating in a number of international investigations and initiatives, Paul led this specialist team until his retirement in 2012. During this period he managed to bring together key stakeholders addressing eSecurity and cybercrime management through a holistic approach. Working within the Department of Criminology, Paul specialises in cyber based criminology. He is currently participating in the Commonwealth Cybercrime Initiative helping member states in safeguard their ICT infrastructure from cyber related threats. He is also reading for a PhD in cyberstalking and harassment at the University of Leicester.
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Calafato, T., Caruana, P. (2015). Terrorism in Transition: The Implications of Cyber-Terrorism. In: Katsikides, S., Koktsidis, P. (eds) Societies in Transition. Springer, Cham. https://doi.org/10.1007/978-3-319-13814-5_10
Download citation
DOI: https://doi.org/10.1007/978-3-319-13814-5_10
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-13813-8
Online ISBN: 978-3-319-13814-5
eBook Packages: Humanities, Social Sciences and LawPolitical Science and International Studies (R0)