Finding a definition
As one among the many different newest modus operandi used by terrorists in the recent times, with the boom in the internet one that has come to existence is the term ‘cyber terrorism’. As it’s evident from the word cyber, this new phenomenon of terrorism is related to the cyber world, that is the world of internet. Now, to coin an apt definition of cyber terrorism is somewhat difficult because of the obvious fact that this comes together with the word terrorism and there has not be any common definition of terrorism itself so far. Barry Collin, a senior research fellow at the Institute for Security and Intelligence in California, coined the term ‘cyberterrorism’ in the 1980s, which primarily had two elements: cyberspace and terrorism.1 This following article will look to investigate the very basis of cyberterrorism and if anything of this sort really exists? Is cyber terrorism a fact, fiction or a fantasy?
The term cyber terrorism has appeared in both academic literatures and has been defined by defence and security organisations. According to the Cyber Operations and Cyber Terrorism, Handbook No. 1.02 of the US Army TRADOC 2005, cyber terrorism is a new type of terrorism that involves the use of technology and network so that the terrorist groups can conduct their operations with nominal or barely any physical threat to themselves.2 It states, “The premeditated use of disruptive activities, or the threat thereof, against computers and/or networks, with the intention to cause harm or further social, ideological, religious, political or similar objectives. Or to intimidate any person in furtherance of such objectives.”
According to the National Conference of State Legislators (NCSL), “Cyberterrorism can be defined as the use of information technology by terrorist groups and individuals to further their agenda. This can include use of information technology to organize and execute attacks against networks, computer systems and telecommunications infrastructures, or for exchanging information or making threats electronically. Examples are hacking into computer systems, introducing viruses to vulnerable networks, web site defacing, denial-of-service attacks, or terroristic threats made via electronic communication”.3
NCSL has brought numerous modus operandi under the purview of cyber terrorism that incudes direct attacks on networks, computer systems, computer programs, and data that has an impact on key infrastructural facilities.
Looking at the definition provided by key government agencies, Mark M. Pollitt by taking cue from the definition of terrorism by US Department of Justice goes to define terrorism as, “a premeditated, politically motivated attack against information, computer systems, computer programs, and data which result in violence against non-combatant targets by subnational groups or clandestine agents.”4
NATO defines cyber terrorism as, “A cyberattack using or exploiting computer or communication network to cause sufficient destruction or disruption to generate fear or to intimidate a society into an ideological goal.”5
Why it’s important to scratch the reality?
Just like terrorism the definition of cyber terrorism put forward by government agencies bears bombastic terms like destruction, disruption, fear etc. Thus it’s very important to find out if this phenomenon of cyber terrorism really exists and if so how big potential threat it possess? Knowing so would help the government and law enforcement agencies to work in the right direction and formulate means to combat this as a defence. However, if there is no any real threat from cyber terrorism then spending money, energy and resources in defence of something non-existence is a waste. Furthermore, by bringing into existence something which do not exist we are creating an atmosphere of fear thus giving and advantage to the goal of terrorists itself. According to Weimann an exaggerated and hyped statements in the media like ‘success in the “war on terror” is likely to make terrorists turn increasingly to unconventional weapons, such as cyberterrorism. And as a new, more computer-savvy generation of terrorists comes of age, the danger seems set to increase.”6
Getting to the bottom of it
The same report ‘Responses to Cyber Terrorism’ where NATO has defined cyber terrorism, Lt. Everard categorically mentioned that many in the world of information technology(IT) do not believe in the existence of the phenomenon of cyber terrorism. While individuals or groups may attack using informational warfare to meet their personal goals but the intensity cannot be categorised as destructive or devastation as that to the scale of a terrorist attack.7 In the very definition of cyber terrorism NATO starts by defining cyberattacks and not cyber terrorism. Further it concedes that because of the fact that ‘cyber terrorism’ is non-physical in a nature it is very difficult to define aptly this particular term.
According to a Gallup poll of 2016, 79 per cent of Americans ranked a cyberterrorism attack as third in a list of the greatest threats facing the US.8 However, former FBI special agent Andre McGregor denied the existence of my threat from cyber terrorism. He said, “I’m not too concerned that were going to have a cyber 9/11 tomorrow.” He believes that of course there are hacking or cyberattacks which could be destructive but it’s not terrorism.9
From an academic perspective, Maura Conway in the paper – Reality Bytes: Cyber terrorism and Terrorists use of the internet – concluded that tough terrorists group maybe be using the internet as a tool for propaganda building, dissemination of information and fund raising activities however they haven’t yet resorted to cyber terrorism or haven’t shown any intention of doing so.10
Gabriel Weimann in Cyberterrorism How Real Is the Threat? has come up with the view that the potential impact of cyberterrorism is indeed alarming however no real instance of cyberterrorism has been recorded so far. The fears of cyberterrorism is unjustified and exaggerated because most of the time members of the press or the politicians mixes the cyberattacks, hacking with cyberterrorism.11 Weimann elicits, “Cyberattacks are common, but they have not been conducted by terrorists and they have not sought to inflict the kind of damage that would qualify them as cyberterrorism. Technological expertise and use of the Internet do not constitute evidence of planning for a cyberattack.”
Thus by investigating the academic and empirical evidences and looking at what law enforcement agencies have to say we can conclude that, the phenomenon of cyber terrorism is a hyped and exaggerated one. Of course there has been numerous instances of cyberattacks by individuals or groups, also terrorist organisations have used the internet for propaganda building or communication but until now neither they have used to stage potential attack or shown any inclination to do so. As mentioned by Weimann keeping in lines with terrorism, we can actually use the term cyber terrorism only when, an attack using the cyber medium results in ‘violence against persons or property, or at least cause enough harm to generate fear.’ “Attacks that lead to death or bodily injury, explosions, or severe economic loss would be examples. Serious attacks against critical infrastructures could be acts of cyberterrorism, depending on their impact. Attacks
that disrupt nonessential services or that are mainly a costly nuisance would not qualify as cyber terrorism.”12
It is worthwhile to mention that cyberterrorism does have the potential to cause large scale disruption and get unprecedented access to national defence systems, air traffic control systems, power grids etc., but as of now that exists only in theory and there isn’t sufficient evidence – academic and empirical – to corroborate about the existence of cyber terrorism.
*Shamim Zakaria is a journalist, author and academic. An alumnus of the University of Sussex, England he holds a master’s degree in International Journalism. His writings are primarily focused on politics, media, human rights and the socio-political spectrum. He has worked internationally based out of India, China and the United Kingdom. Visit www.shamimzakaria.com
Everard, Paul, Lt. “NATO and Cyber Terrorism.” In Responses to Cyber Terrorism, 118-26. Centre of Excellence Defence Against Terrorism.
NCSL. “Cyberterrorism.” Razor Tie Artery Foundation Announce New Joint Venture Recordings | Razor & Tie. February 28, 2002. Accessed October 07, 2018. https://web.archive.org/web/20030110120948/http://www.ncsl.org/programs/lis/CIP/cyberterrorism.htm.
“Figure 2f From: Irimia R, Gottschling M (2016) Taxonomic Revision of Rochefortia Sw. (Ehretiaceae, Boraginales). Biodiversity Data Journal 4: E7720. Https://doi.org/10.3897/BDJ.4.e7720.” doi:10.3897/bdj.4.e7720.figure2f.
Conway, Maura. “Reality Bytes: Cyberterrorism and Terrorist ‘use’ of the Internet.” First Monday. Accessed October 07, 2018. http://firstmonday.org/article/view/1001/922#c3.
Weimann, Gabriel. “Cyberterrorism: How Real Is the Threat?” United States Institute of Peace. May 21, 2015. Accessed October 07, 2018. https://www.usip.org/publications/2004/05/cyberterrorism-how-real-threat.
Pollitt, Mark M. “Cyber Terrorism – Fact or Fancy.” Scribd. Accessed October 07, 2018. https://www.scribd.com/document/21173253/Mark-M-Pollitt-Cyber-Terrorism-Fact-or-Fancy.
Lillington, Karlin. “How Real Is the Threat of Cyberterrorism?” The Irish Times. April 14, 2016. Accessed October 07, 2018. https://www.irishtimes.com/business/technology/how-real-is-the-threat-of-cyberterrorism-1.2608935.
1. The Future of Cyberterrorism. See http://afgen.com/terrorism1.html
2. Cyber operations and cyber terrorism. See http://www.dtic.mil/cgi-bin/GetTRDoc?Location=U2&doc=GetTRDoc.pdf&AD=ADA439217
3. See http://www.ncsl.org/programs/lis/CIP/cyberterrorism.htm
4. Mark M. Pollitt, “Cyber terrorism – fact or fancy”
5. P. Everaed, “NATO and Cyber terrorism”, p119
6. Weimer. See https://www.usip.org/sites/default/files/sr119.pdf
7. P. Everaed, “NATO and Cyber terrorism”, p118
8. See https://www.irishtimes.com/business/technology/how-real-is-the-threat-of-cyberterrorism-1.2608935
9. The Irish Times, 2016
10. Conway, 2002
11. Weimann, “Cyberterrorism How Real Is the Threat?” 2004.
12. Weimann, 2004, See https://www.usip.org/sites/default/files/sr119.pdf
|Enjoy the article? Then please consider donating today to ensure that Eurasia Review can continue to be able to provide similar content.|