Chapter Overview
The spectre of cyberterrorism portends a spectrum of, hitherto unrealised, catastrophic scenarios for the United Kingdom. Indeed, governments worldwide now face the task of creating or adapting state institutions to engage with rapidly evolving, elusive and recalcitrant cyber-threats that have the potential to cause harm to life, limb or livelihood. This chapter offers an overview of the principal institutions mandated to address cyberterrorism within the UK, and explores a series of complex policy problems that continue to confound government agencies and corporate actors in this area. Here I contend that the UK government has struggled to conceptualise the threat of cyberterrorism. In a post-privatisation era, the government has instead elided the unrealised threat of cyberterrorism with a broader range of cyber threats and pursued a two-pronged strategy to meet these threats by (i) constructing a protected government ‘citadel’ of standardised core government services, and (ii) commissioning government ‘sentinel’ services to advise the private sector owners and operators of critical infrastructure on meeting and mitigating cyber threats. I argue that this strategy does not overcome a latent challenge of the cyber era: that is, the profit-maximising instincts of the private sector remain in tension with the protection of the public interests that rely on (privately owned) critical infrastructure.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
Though some analysts point to an incident of cyber-sabotage to a waste management system in Maroochy Shire, Queensland in 2000, most agree that cyberterrorism -as understood as political violence- has not yet transpired.
- 2.
Figures taken: http://www.theukcardsassociation.org.uk/2010-facts-figures/Internet_card_use_2010.asp, accessed 13th August 2013.
- 3.
Survey findings reported at http://blogs.ixiacom.com/ixia-blog/cyber-terrorism-going-happen-whoe28099s-responsible-protecting-us-part-1/, accessed 13th August 2013.
Further Reading and Resources
Amoore L, de Goede M (eds) (2008) Risk and the war on terror. Routledge, Oxford
Clemente D (2013) Cyber security and global interdependence: what is critical? The Royal Institute of International Affairs: Chatham House, London
Giacomello G (2004) Bangs for the buck: a cost-benefit analysis of cyberterrorism. Stud Conflict Terrorism 27(5):387–408
References
Amoore L, de Goede M (eds) (2008) Risk and the war on terror. Routledge, Oxford
Anderson DQC (2012) The terrorism acts in 2011: report of the independent reviewer on the operation of the terrorism act 2000 and part 1 of the terrorism act 2006. The Stationary Office, London
Black C (2013) Could a terrorist cyber attack set off World War 3? Mirror 10 July 2013http://www.mirror.co.uk/news/world-news/could-terrorist-cyber-attack-set-2041439. Accessed 9 Aug 2013
Boston Consulting Group (2012) The Internet economy in the G20: the $4.2 trillion growth opportunity. The Boston Consulting Group, Boston. https://publicaffairs.linx.net/news/wp-content/uploads/2012/03/bcg_4trillion_opportunity.pdf. Accessed 5 Jan 2013
Bradley J, Barbier J, Handler D (2013) White paper: embracing the Internet of everything to capture your share of $14.4 trillion. http://www.cisco.com/web/about/ac79/docs/innov/IoE_Economy.pdf. Accessed 2 Feb 2013
Cabinet Office (2004) Protecting our information systems: working in partnership for a secure and resilient UK information infrastructure. Cabinet Office, London
Cabinet Office (2009) Cyber security strategy of the United Kingdom: safety, security and resilience in cyber space. Cabinet Office, London
Cabinet Office (2011a) Government ICT strategy—strategic implementation plan: moving from the ‘what’ to the ‘how’. Cabinet Office, London
Cabinet Office (2011b) The UK cyber security strategy: protecting and promoting the UK in a digital world. Cabinet Office, London
Cabinet Office (2012) Government digital strategy
Cabinet Office & DETICA (2011) The cost of cyber crime. Cabinet Office, London
Cabinet Office (2012) Government Digital Strategy. Cabinet Office, London
Centre for the Protection of National Infrastructure (n.d) Retrieved 10 September 2013, from http://www.cpni.gov.uk/about/cni/. Accessed 20 Feb 2013
Clemente D (2013) Cyber security and global interdependence: what is critical? The Royal Institute of International Affairs: Chatham House, London
Cornish P, Livingstone D, Clemente D, Yorke C (2011) Cyber security and the UK’s critical national infrastructure. The Royal Institute of International Affairs: Chatham House, London
Department of Homeland Security (n.d) Critical infrastructure sector partnerships. Available at http://www.dhs.gov/critical-infrastructure-sector-partnerships. Accessed 23 Apr 2013
Drury I, Shipman T (2010) Our No.1 threat: cyber terrorists who can knock a jet out of the sky. The Daily Mail 19 October 2010. http://www.dailymail.co.uk/news/article-1321554/Our-No-1-threat-Cyber-terrorists-knock-jet-sky.html#ixzz2fh7ffTVF. Accessed 18 Aug 2013
Giacomello G (2004) Bangs for the buck: a cost-benefit analysis of cyberterrorism. Stud Conflict Terrorism 27(5):387–408
Government Communications Headquarters (2013) Cyber incident response scheme launched. GCHQ Press Release 13 August 2013. http://www.gchq.gov.uk/Press/Pages/CIR_Scheme_Launched.aspx. Accessed 20 Aug 2013
Hardy K, Williams G (2014) What is ‘cyberterrorism’? Computer and internet technology in legal definitions of terrorism. In: Chen T, Jarvis L, Macdonald S (eds) Cyberterrorism: understanding, assessment, and response. Springer, New York
Harvey N (2011) Forget a cyber Maginot line. The Guardian 30 May 2011. http://www.theguardian.com/commentisfree/2011/may/30/forget-cyber-maginot-line?guni = Article:in%20body%20link. Accessed 7 Aug 2013
Hayden M (2013) Speech to the Bipartisan Policy Center. The Guardian 6 August 2013. http://www.theguardian.com/technology/2013/aug/06/nsa-director-cyber-terrorism-snowden. Accessed 8 Aug 2013
Heidegger M (1977) The question concerning technology and other essays. Translated and with an introduction by William Lovitt. Harper & Row, London
Hood C (1995) The “New Public Management” in the 1980s: variations on a theme. Account Organ Soc 20(2):93–109
Jarvis L, Nouri L, Whiting A (2014) Understanding, locating and constructing ‘Cyberterrorism’. In: Chen T, Jarvis L, Macdonald S (eds) Cyberterrorism: understanding, assessment, and response. Springer, New York
Live Free or Die Hard. (2007). Twentieth Century Fox Film Corporation. Los Angeles, USA
Lord Jopling SR (2009) The protection of critical infrastructures: draft special report, 162 CDS 07 E. NATO Parliamentary Assembly. http://www.europarl.europa.eu/meetdocs/2004_2009/documents/dv/270/270907/270907jopling_en.pdf
Lynn WJ (2011) Remarks on cyber at the RSA conference. RSA conference 15 February 2011. http://www.defense.gov/speeches/speech.aspx?speechid = 1535. Accessed 12 Sep 2013
Mandiant (2013) Apt1: exposing one of China’s cyber espionage units. http://intelreport.mandiant.com/Mandiant_APT1_Report.pdf. Accessed 20 Sep 2013
May T (2011) Terrorism: Home Secretary’s speech to the Council on Foreign Relations. http://www.homeoffice.gov.uk/media-centre/speeches/HS-US. Accessed 17 Apr 2013
May T (2012) Interview. The Sun 3 December 2012. http://www.thesun.co.uk/sol/homepage/news/politics/article4678082.ece. Accessed 20 Sep 2013
McAfee & Center for Strategic and International Studies (2011) In the dark: crucial industries confront cyberattacks. http://www.mcafee.com/us/resources/reports/rp-critical-infrastructure-protection.pdf. Accessed 12 Aug 2013
McGuire M (2014) Putting the ‘cyber’ into cyberterrorism: re-reading technological risk in a hyperconnected world. In: Chen T, Jarvis L, Macdonald S (eds) Cyberterrorism: understanding, assessment, and response. Springer, New York
Minogue M, Polidano C, Hulme D (1998) Beyond the new public management: changing ideas and practices in governance. Edward Elgar, Cheltenham
National Audit Office (2013) The UK cyber security strategy: landscape review. Report by the comptroller and auditor general (HC 890). The Stationary Office, London
Organisation for Economic Co-operation and Development (2009) Innovation in country risk management. http://www.oecd.org/futures/Innovation%20in%20Country%20Risk%20Management%202009.pdf. Accessed 23 Sep 2013
Parliamentary Office of Science and Technology (2011) Cyber security in the UK. Houses of Parliament, London
Peters BG, Pierre J, King DS (2005) The politics of path dependency: political conflict in historical institutionalism. J Polit 67(4):1275–1300
Skyfall (2012) Eon Productions. London, United Kingdom
Smith C (2013) Reported in the independent. http://www.independent.co.uk/news/uk/politics/government-faces-around-33000-cyber-attacks-a-month-reveals-cabinet-office-minister-chloe-smith-8584636.html. Accessed 12 May 2013
Stohl M (2014) Dr. Strangeweb: or how they stopped worrying and learned to love cyber war. In: Chen T, Jarvis L, Macdonald S (eds) Cyberterrorism: understanding, assessment, and response. Springer, New York
Sutherland M (2012) Interview, in focus. http://www.employeepublications-baesystems.com/infocus/infocus_3/1. Accessed 12 May 2013
The Western Australian Government (2011) Western Australian Government submission to the Australian Defence Force Posture. http://www.defence.gov.au/oscdf/adf-posture-review/submissions/WA%20Government%20Submission.pdf. Accessed 12 May 2013
Yannakogeorgos P (2014) Rethinking the threat of cyberterrorism. In: Chen T, Jarvis L, Macdonald S (eds) Cyberterrorism: understanding, assessment, and response. Springer, New York
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer Science+Business Media New York
About this chapter
Cite this chapter
Legrand, T. (2014). The Citadel and Its Sentinels: State Strategies for Contesting Cyberterrorism in the UK. In: Chen, T., Jarvis, L., Macdonald, S. (eds) Cyberterrorism. Springer, New York, NY. https://doi.org/10.1007/978-1-4939-0962-9_8
Download citation
DOI: https://doi.org/10.1007/978-1-4939-0962-9_8
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4939-0961-2
Online ISBN: 978-1-4939-0962-9
eBook Packages: Computer ScienceComputer Science (R0)