Skip to main content

The Citadel and Its Sentinels: State Strategies for Contesting Cyberterrorism in the UK

  • Chapter
  • First Online:
Cyberterrorism
  • 4035 Accesses

Chapter Overview

The spectre of cyberterrorism portends a spectrum of, hitherto unrealised, catastrophic scenarios for the United Kingdom. Indeed, governments worldwide now face the task of creating or adapting state institutions to engage with rapidly evolving, elusive and recalcitrant cyber-threats that have the potential to cause harm to life, limb or livelihood. This chapter offers an overview of the principal institutions mandated to address cyberterrorism within the UK, and explores a series of complex policy problems that continue to confound government agencies and corporate actors in this area. Here I contend that the UK government has struggled to conceptualise the threat of cyberterrorism. In a post-privatisation era, the government has instead elided the unrealised threat of cyberterrorism with a broader range of cyber threats and pursued a two-pronged strategy to meet these threats by (i) constructing a protected government ‘citadel’ of standardised core government services, and (ii) commissioning government ‘sentinel’ services to advise the private sector owners and operators of critical infrastructure on meeting and mitigating cyber threats. I argue that this strategy does not overcome a latent challenge of the cyber era: that is, the profit-maximising instincts of the private sector remain in tension with the protection of the public interests that rely on (privately owned) critical infrastructure.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    Though some analysts point to an incident of cyber-sabotage to a waste management system in Maroochy Shire, Queensland in 2000, most agree that cyberterrorism -as understood as political violence- has not yet transpired.

  2. 2.

    Figures taken: http://www.theukcardsassociation.org.uk/2010-facts-figures/Internet_card_use_2010.asp, accessed 13th August 2013.

  3. 3.

    Survey findings reported at http://blogs.ixiacom.com/ixia-blog/cyber-terrorism-going-happen-whoe28099s-responsible-protecting-us-part-1/, accessed 13th August 2013.

Further Reading and Resources

  • Amoore L, de Goede M (eds) (2008) Risk and the war on terror. Routledge, Oxford

    Google Scholar 

  • Clemente D (2013) Cyber security and global interdependence: what is critical? The Royal Institute of International Affairs: Chatham House, London

    Google Scholar 

  • Giacomello G (2004) Bangs for the buck: a cost-benefit analysis of cyberterrorism. Stud Conflict Terrorism 27(5):387–408

    Google Scholar 

References

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tim Legrand .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer Science+Business Media New York

About this chapter

Cite this chapter

Legrand, T. (2014). The Citadel and Its Sentinels: State Strategies for Contesting Cyberterrorism in the UK. In: Chen, T., Jarvis, L., Macdonald, S. (eds) Cyberterrorism. Springer, New York, NY. https://doi.org/10.1007/978-1-4939-0962-9_8

Download citation

  • DOI: https://doi.org/10.1007/978-1-4939-0962-9_8

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4939-0961-2

  • Online ISBN: 978-1-4939-0962-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics