Crime, Law and Social Change

, Volume 46, Issue 4–5, pp 223–238 | Cite as

Cyber terrorism: a clear and present danger, the sum of all fears, breaking point or patriot games?

  • Michael StohlEmail author


Over the past two decades there has developed a voluminous literature on the problem of cyber terrorism. The themes developed by those writing on cyber terrorism appear to spring from the titles of Tom Clancy’s fiction, such as Clear and Present Danger, The Sum of All Fears and Breaking Point, or somewhat more cynically, Patriot Games. This essay examines both the gap between the presumed threat and the known cyber terror behaviors and the continuing literature which suggests an attack is imminent. It suggests that at least part of the explanation lies both in the continuing failure to distinguish between what Denning (Activism, hacktivism, and cyber terrorism: The internet as a tool for influencing foreign policy, 1999) referred to as hactivism and cyberterrorism and also the failure to distinguish between the use of digital means for organizational purposes (information, communication, command and control) and the use of digital communications to actually commit acts of terror.


Terrorist Group Critical Infrastructure Computer Attack Pearl Harbor Security Firm 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Altheide, D. (1997). The news media, the problem frame and the production of fear. The Sociological Quarterly, 38(4), 647–668.CrossRefGoogle Scholar
  2. 2.
    Anti-Defamation League (1999). CyberTerrorism – Terrorism update. Retrieved March 1, 2006, from
  3. 3.
    Arquilla, J., Ronfeldt, D., & Zanini, M. (1999). Networks, netwar and information-age terrorism. In Z. M. Khalilzhad & J. P. White (Eds.), The changing role of information in warfare. Santa Monica, CA: Rand.Google Scholar
  4. 4.
    Barnett, R. J. (1973). Roots of war: The men and institutions behind U.S. foreign policy. Baltimore: Penguin Books.Google Scholar
  5. 5.
    Conway, M. (2005). Terrorist “use” of the internet and fighting back. Paper prepared for presentation at the conference Cybersafety: Safety and security in a networked world: Balancing cyber-rights and responsibilities. Oxford Internet Institute (OII), Oxford University, UK, 8–10 September, 2005. Retrieved February 1, 2006, from
  6. 6.
    Damphousse, K. R., & Smith, B. L. (1998). The internet: A terrorist medium for the 21st century. In H. W. Kushner (Ed.), The future of terrorism: Violence in the new millennium. Thousand Oaks, CA: SAGE.Google Scholar
  7. 7.
    Debrix, F. (2001). Cyberterror and Media-Incluced fears: The production of emergency culture, Strategies: Journal of Theory, Culture and Politics, 14(1), 149–168.Google Scholar
  8. 8.
    Denning, D. E. (1999). Activism, hacktivism, and cyber terrorism: The internet as a tool for influencing foreign policy.” Presented to “The Internet and International Systems:Information Technology and American Foreign Policy Decision Making,” The World Affairs Council, San Francisco, December 10, 1999. Retrieved February 1, 2006, from
  9. 9.
    Denning, D. E. (2000). Cyberterrorism. Testimony before the Special Oversight Panel on Terrorism Committee on Armed Services U.S. House of Representatives, May 23, 2000. Retrieved February 1, 2006, from
  10. 10.
    Duvall, R. D., & Stohl, M. (1983). Governance by terror, chapter six. In M. Stohl (Ed.), The politics of terrorism (2nd ed., pp. 179–219). New York: Marcel Dekker.Google Scholar
  11. 11.
    Embar-Seddon, A. (2002). Cyber terrorism: Are we under siege? American Behavioral Scientist, 45(6), 1033–1043.CrossRefGoogle Scholar
  12. 12.
    Flemming, P., & Stohl, M. (2001). Myths and realities of cyber terrorism. In A. P. Schmid (Ed.), Countering terrorism through international cooperation (pp. 70–105). Vienna, Austria: ISPAC (International Scientific and Professional Advisory Council of the United Nations Crime Prevention and Criminal Justice Program.Google Scholar
  13. 13.
    Gellman, B. (2002). Cyber-attacks by Al Qaeda feared: Terrorists at threshold of using internet as tool of bloodshed, experts say,” Washington Post June 27: A01. Retrieved December 1, 2005, from
  14. 14.
    Gerbner, G., & Gross, L. (1976). The scary world of tv’s heavy Viewer. Psychology Today, 89–91, April.Google Scholar
  15. 15.
    Giacomello, G. (2004). Bangs for the buck: A cost-benefit analysis of cyber terrorism. Studies in Conflict and Terrorism, 27, 387–408.CrossRefGoogle Scholar
  16. 16.
    Glassner, B. (1999). The culture of fear: Why Americans are afraid of the wrong things. New York: Basic Books.Google Scholar
  17. 17.
    Grabosky, P. N., & Stohl, M. (2003). Cyberterrorism Reform 82, Autumn:8–13. Retrieved September 15, 2005 from
  18. 18.
    Green, J. (2002). The myth of cyber terrorism. Washington Monthly, November. Retrieved February 1, 2006, from
  19. 19.
    Hoffman, L. (2006). ‘Cyber Storm’ simulation aims to head off computer assault, February 9, 2006. Retrieved March 1, 2006, from
  20. 20.
    Hundley, R. O., & Anderson, R. H. (1996). A qualitative methodology for the assessment of cyberspace-related risks. Santa Monica: Rand.Google Scholar
  21. 21.
    Lemos, R., Borland, J., Bowman, L., & Junnarkar, S. (2002). E terrorism-threats. Have Digital Myths Diverted Attention from True Threats?” CNET Retrieved August 26, 2002, from
  22. 22.
    Lenzner, R., & Vardi, N. (2004). Cyber-nightmare. Forbes. Retrieved September 20, 2004, from
  23. 23.
    Lerner, J. S., Gonzalez, R. M., Small, D. A., & Fischhoff, B. (2003). Emotion and perceived risks of terrorism: A national field experiment. Psychological Science, 14, 144–150.CrossRefGoogle Scholar
  24. 24.
    Lewis, J. A. (2006). The war on hype: The deadly terror lurking around the corner may not be such a big, ominous threat after all. San Francisco Chronicle, February 19, 2006. Retrieved March 1, 2006, from
  25. 25.
    Nabi, R. L. (2002). Anger, fear, uncertainty, and attitudes: A test of the Cognitive-Functional Model. Communication Monographs, 69(3), 204–216.Google Scholar
  26. 26.
    National Commission on Terrorism. (1998). Countering the Changing Threat of International Terrorism. Report of the National Commission on Terrorism,
  27. 27.
    Rathmell, A. (1997). Cyber-terrorism: The shape of future conflict. Royal United Service Institute Journal. October, 40–46. Retrieved March 1, 2006, from
  28. 28.
    Rollins, J., & Wilson, C. (2005). Terrorist capabilities for cyberattack: Overview and Policy Issues, Congressional Research Service, October 20, 2005. Retrieved February 1, 2006, from
  29. 29.
    Ryter J. C. (2004). Can we trust the guy who gave us Y2K?? Jon Christian Ryter March 27, 2004 retrieved on February 1, 2006 from
  30. 30.
    Savas, A. (2006). IBM launches internal network protection. Computer weekly. Com, Monday, 27 February 2006. Retrieved March 1, 2006, from
  31. 31.
    Schwartz, J. (2003). Decoding computer intruders. The New York Times, April 24, 2003. Retrieved March 1, 2006, from
  32. 32.
    Simpson, P. (2005). Don’t fear e-terror hype Computer Weekly March 7. Retrieved February 1, 2006, from’tfeare-terrorhype.htm.
  33. 33.
    Squitieri, T. (2002). Cyberspace full of terror targets , USA Today, May 5, 2002. Retrieved February 1, 2006, from
  34. 34.
    Stanton, J. J. (2002). Terror in cyberspace terrorists will exploit and widen the gap between governing structures and the public. American Behavioral Scientist, 45(6), 1017–1032.CrossRefGoogle Scholar
  35. 35.
    Stohl, M. (1986). The superpowers and international terrorism. In M. Stohl & G. Lopez (Eds.), Government violence and repression: An agenda for research. Greenwood Press, 207–228.Google Scholar
  36. 36.
    Stohl, M. (1988a). Demystifying terrorism: The myths and realities of contemporary political terrorism. In M. Stohl (Ed.), The politics of terrorism (3rd ed.). New York: Marcel Decker.Google Scholar
  37. 37.
    Stohl, M. (2006). Knowledge claims and the study of terrorism. In S. Melnick & J. Victoroff (Eds.), Psychology and terrorism. Amsterdam, the Netherlands: Ios Press (forthcoming).Google Scholar
  38. 38.
    Stohl, C., & Stohl, M. (2007). Networks of terror: Theoretical assumptions and pragmatic consequences, Communication Theory. (forthcoming).Google Scholar
  39. 39.
    Thomas, T. L. (2003). Al Qaeda and the internet: The danger of “cyberplanning.” Parameters, 33(1), 112–23. Retrieved February 1, 2006, from Carlisle
  40. 40.
    Warner, B. (2003). Intelligence experts comb web for terror clues. Reuters News Service, November 12. Retrieved March 1, 2006, from
  41. 41.
    US News and World Report. (1998). Terrorists on the web: Electronic ‘safe haven’ guerrillas use guns, bombs and home pages. 124(24), 46, June 22.Google Scholar
  42. 42.
    Weimann, G. (2005). Cyber terrorism: The sum of all fears? Studies in Conflict and Terrorism, 28, 129–149.CrossRefGoogle Scholar
  43. 43.
    White, C., K., C. (1998). Cyber-terrorism: Modem mayhem. Carlisle Barracks, Pennsylvania: U.S. Army War College. Retrieved March 1, 2006, from

Copyright information

© Springer Science + Business Media B.V. 2007

Authors and Affiliations

  1. 1.Department of CommunicationUniversity of CaliforniaSanta BarbaraUSA

Personalised recommendations