Abstract
Although it is known that terrorists already routinely use the Internet for purposes such as spreading propaganda or conducting internal communication, the threat that results from this use is heavily debated. Especially the question whether a cyber terrorist attack is imminent or if it is only a purely fictitious scenario is subject to many discussions. One reason for these differences in opinion is a lack of exact terminology. Already for the term “terrorism”, more than 100 different definitions with more than 20 definitional elements have been identified (for further details, see Record 2003). The addition of “cyber” to this word already fraught with meanings does not help to clarify this issue. Consequently, current interpretations of “cyberterrorism” range from very narrow to very broad. A more narrow view is often worded close to common terrorism definitions and might include only politically motivated attacks against information systems and only if they result in violence against noncombatant targets (Pollitt 1998). Broader approaches often include other forms of terrorist use of the Internet and therefore might define cyberterrorism as almost any use of information technology by terrorists (National Conference of State Legislatures 2002). To complicate matters even more, additional terminology is being introduced into the discussion, e.g. “digital Pearl Harbor”, “electronic Waterloo”, “Cyber war”, or “electronic Chernobyl”. These terms, however, focus mainly on the effects of possible future attacks by terrorists. Therefore, they rather cloud the discussion about a precise terminology on cyberterrorism or a terrorist use of the Internet.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
See the section “ Denial-of-Service Attacks” for further details on the Estonian case.
- 2.
DDoS attacks are a way to hinder the accessibility of computer systems. For further details, see below.
- 3.
“Script Kiddies” is a term commonly used to describe people who do not possess the knowledge to build attacking software by themselves and who therefore have to rely on “ready-to-use” construction kits. Successful attacks by script kiddies are thus often only possible against very poorly protected targets.
- 4.
The White House, for example, has just allocated a sum of 6 billion US dollars for the strengthening of its systems against cyber attacks (Johnson 2008).
- 5.
For more detailed information about the experiment “Eligible Receiver”, see Sect. 2.2.3.
- 6.
See the section “Hybrid Attacks” below for further information on the so-called “hybrid attacks”.
- 7.
For other aspects of terrorist financing, see Chap. 16.
- 8.
For legal responses that have been taken to conquer cyberterrorism see Sieber, this volume.
References
AFP News Agency. (2005). Hacker Attacks in US Linked to Chinese Military [Electronic Version]. Breitbart.com, 12.12.2005. Retrieved April 2008 from http://www.breitbart.com/article.php?id=051212224756.jwmkvntb&show_article=1.
Bachfeld, D. (2003). War der Wurm drin? c’t, 2003(18), 34.
Berinato, S. (2002). Cybersecurity – The Truth About Cyberterrorism [Electronic Version]. CIO Magazine. Retrieved April 2008 from http://www.cio.com/article/30933/CYBERSECURITY_The_Truth_About_Cyberterrorism.
Borland, J. (1998). Analyzing the Threat of Cyberterrorism [Electronic Version]. Techweb. From http://www.techweb.com/showArticle.jhtml?articleID=29102707.
Brunst, P. W. (2008). Use of the Internet by Terrorists – A Threat Analysis. In Centre of Excellence – Defence Against Terrorism (Ed.), Responses to Cyber Terrorism (pp. 34–60). Amsterdam: IOS Press.
Brunst, P. W. (2009). Anonymität im Internet – rechtliche und tatsächliche Rahmenbedingungen. Berlin: Duncker & Humblot.
Buettner, R. (2001). Web of Terror Thrivin on Net. Retrieved April 2008 from http://www.nydailynews.com/archives/news/2001/09/18/2001–09–18_web_of_terror_thriving_on_net.html
Centers for Disease Control and Prevention. (2007). Bioterrorism Overview. From http://www.bt.cdc.gov/bioterrorism/overview.asp
Chen, H., & Larson, C. (2007). Dark Web Terrorism Research. Retrieved April 2008 from http://www.ai.arizona.edu/research/terror/index.htm
Cilluffo, F. J. (2000). Cyber Attack: The National Protection Plan and Its Privacy Implications. Testimony of Frank J. Cilluffo Before the Subcommittee on Technology, Terrorism, and Government Information Committee on the Judiciary on 1 February 2000 [Electronic Version]. From http://www.csis.org/media/csis/congress/ts000201cilluffo.pdf.
Coll, S., & Glassner, S. (2005, 7 August). Terrorists Turn to the Web as Base of Operations. The Washington Post, p. A01.
Collin, B. C. (1997). The Future of Cyberterrorism. Crime and Justice International, 13(2), 15–18.
Committee on Water Systems Security Research. (2007). Improving the Nation’s Water Security. Washington, DC: The National Academies Press.
Conway, M. (2002). Reality Bites: Cyberterrorism and Terrorist ‘Use’ of the Internet (Publication. Retrieved 01.12.2005): http://www.firstmonday.org/Issues/issue7_11/conway/index.html
Davis, J. (2007). Hackers Take Down the Most Wired Country in Europe [Electronic Version]. Wired Magazine. Retrieved April 2008 from http://www.wired.com/politics/security/magazine/15–09/ff_estonia.
Denning, D. E. (2001). Activism, Hacktivism, and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy. In Arquilla, J. & Ronfeldt, D. (Eds.), Networks and Netwars (pp. 239–288). Santa Monica, CA: Rand Corp.
Desouza, K. C., & Hensgen, T. (2003). Semiotic Emergent Framework to Address the Reality of Cyberterrorism. Technological Forecasting & Social Change, 70, 385–396.
Drogin, B. (1999). Russians seem to be Hacking into Pentagon [Electronic Version]. San Francisco Chronicle Online, 07.10.1999. Retrieved April 2008 from http://www.sfgate.com/cgi-bin/article.cgi?file=/chronicle/archive/1999/10/07/MN58558.DTL.
Embar-Seddon, A. (2002). Cyberterrorism – Are We Under Siege? American Behavioral Scientist, 45(6), 1033–1043.
Espiner, T. (2005). Security Experts Lift Lid on Chinese Hack Attacks [Electronic Version]. ZDNet News, 23.11.2005. Retrieved April 2008 from http://news.zdnet.com/2100–1009_22–5969516.html.
FCW Staff. (1999). Russia Hacking Stories Refuted [Electronic Version]. Federal Computer Week, 27.09.1999. Retrieved April 2008 from http://www.fcw.com/print/5_188/news/68553–1.html.
Foltz, B. (2004). Cyberterrorism, Computer Crime, and Reality. Information Management & Computer Security, 12(2), 270–295.
Force10 Networks. (2007). Customer Profile: DE-CIX. Retrieved April 2008 from https://www.force10networks.com/company/customer_profiles/profiles-de-cix.asp
Gellman, B. (2002, 27 June). Cyber-Attacks by Al Qaeda Feared. The Washington Post, p. A01.
Giacomello, G. (2004). Bangs for the Buck: A Cost-Benefit Analysis of Cyberterrorism. Studies in Conflict & Terrorism, 27(5), 387–408.
Gleick, P. H. (2006). Water and Terrorism. Water Policy, 8, 481–503.
Graham, B. (2005). Hackers Attack Via Chinese Web Sites [Electronic Version]. The Washington Post Online, 25.08.2005, A01. Retrieved April 2008 from http://www.washingtonpost.com/wp-dyn/content/article/2005/08/24/AR2005082402318.html.
Green, J. (2002). The Myth of Cyberterrorism [Electronic Version]. Washington Monthly. Retrieved April 2008 from http://www.washingtonmonthly.com/features/2001/0211.green.html.
Harding, T. (2007). Terrorists ‘Use Google Maps to Hit UK Troops’ [Electronic Version]. The Telegraph Online. From http://www.telegraph.co.uk/news/main.jhtml?xml=/news/2007/01/13/wgoogle13.xml.
ICANN. (2007). Factsheet: Root Server Attack on 6 February 2007. Retrieved April 2008 from http://icann.org/announcements/factsheet-dns-attack-08mar07.pdf
Janczewski, L. J., & Colarik, A. M. (2005). Managerial Guide for Handling Cyber-Terrorism and Information Warfare. Hershey, PA: Idea Group Publishing.
Johnson, B. (2008). Nato Says Cyber Warfare Poses as Great a Threat as a Missile Attack [Electronic Version]. The Guardian Online. Retrieved April 2008 from http://www.guardian.co.uk/technology/2008/mar/06/hitechcrime.uksecurity.
Kristof, N. D. (2005, 20 December 2005). Terrorists in Cyberspace. The New York Times, p. 31.
La Guardia, A. (2005). Al-Qa’eda Launches Voice of the Caliphate Internet News Bulletins [Electronic Version]. The Telegraph Online. Retrieved April 2008 from http://www.telegraph.co.uk/news/main.jhtml?xml=/news/2005/09/28/wirq128.xml&sSheet=/news/2005/09/28/ixnewstop.html.
Leitenberg, M. (2005). Assessing the biological weapons and bioterrorism threat. Strategic Studies Institute of the U.S. Army War College.
Lenzner, R., & Vardi, N. (2004). The Next Threat [Electronic Version]. Forbes Magazine. From http://www.forbes.com/forbes/2004/0920/070_print.html.
Leppard, D. (2007). Al-Qaeda Plot to Bring Down UK Internet [Electronic Version]. The Times Online. From http://www.timesonline.co.uk/tol/news/uk/crime/article1496831.ece.
Leyden, J. (2001). Mass Hack Takes Out Govt Sites [Electronic Version]. The Register. Retrieved April 2008 from http://www.theregister.co.uk/2001/01/22/mass_hack_takes_out_govt/.
Miniwatts Marketing Group. (2007). Internet Usage Statistics. Retrieved April 2008 from http://www.internetworldstats.com/
Musharbash, Y. (2004). US-Firmen-Website für Qaida-Botschaft gehackt. Spiegel Online, 17.06.2004.
Musharbash, Y. (2005). Al-Qaida Launches a Weekly News Show [Electronic Version]. Spiegel Online. Retrieved April 2008 from http://www.spiegel.de/international/0,1518,378633,00.html.
National Conference of State Legislatures. (2002). Cyberterrorism. Retrieved April 2008 from http://www.ncsl.org/programs/lis/cip/cyberterrorism.htm.
Nelson, B., Choi, R., Iacobucci, M., Mitchell, M., & Gagnon, G. (1999). Cyberterror: Prospects and Implications. From http://www.nps.edu/Academics/Centers/CTIW/files/Cyberterror%20Prospects%20and%20Implications.pdf.
OLG Frankfurt a.M. (2006). Lufthansa Online Demonstration. Multimedia und Recht 2006, 547–552.
Persson, C. (2006). “Rückfall ins Telefonzeitalter” nach Erdbeben. Retrieved April 2008 from http://www.heise.de/newsticker/Rueckfall-ins-Telefonzeitalter-nach-Erdbeben--/meldung/83007
Pike, J. (2005, 27.04.2005). Eligible Receiver. Retrieved April 2008 from http://www.globalsecurity.org/military/ops/eligible-receiver.htm
Pollitt, M. M. (1998). Cyberterrorism – Fact or Fancy? Computer Fraud & Security (February 1998), 8–10.
Record, J. (2003). Bounding the Global War on Terrorism. University Press of the Pacific.
Reuters. (2001). This Jihad WEb Site Brought to You by… Visa? Retrieved April 2008 from http://www.usatoday.com/tech/news/2001/09/19/jihad-sites.htm
Rolski, T. (2007). Estonia: Ground Zero for World’s First Cyber War? [Electronic Version]. ABC News. From http://abcnews.go.com/International/Technology/Story?id=3184122&page=1.
Sedarat, F. (2008). Jihadi Software Promises Secure Web Contacts [Electronic Version]. Reuters Online, 2008. From http://www.reuters.com/article/internetNews/idUSL1885793320080118.
Sieber, U. (2004). The Threat of Cybercrime. In Council of Europe (Ed.), Organized Crime in Europe: The Threat of Cybercrime (pp. 81–217). Strasbourg: Council of Europe.
Sieber, U., & Brunst, P. W. (2008). Cyberterrorism and Other Use of the Internet for Terrorist Purposes – Threat Analysis and Evaluation of International Conventions. In Council of Europe (Ed.), Cyberterrorism – The Use of the Internet for Terrorist Purposes (pp. 9–105). Strasbourg: Council of Europe Publishing.
Sliva, J., & Ritter, K. (2006). Estonia’s Defense Minister Says Kremlin Involvement Possible in Cyberattacks [Electronic Version]. The Sydney Morning Herald Online. Retrieved April 2008 from http://www.smh.com.au/news/Technology/Estonia39s-defense-minister-says-Kremlin-involvement-possible-in-cyberattacks/2007/05/18/1178995335698.html.
Testimony of FBI Deputy Assistant Director Keith Lourdeau on “Virtual Threat, Real Terror: Cyberterrorism in the 21st Century”, Subcommittee on terrorism, technology and homeland security of the committee on the judiciary United States Senate, 24 February Sess. (2004).
Testimony of James Adams, Chief Executive Officer, Infrastructure Defense, Inc., United States Senate, Committee on Governmental Affairs (2000).
Thornburgh, N. (2005a). Inside the Chinese Hack Attack [Electronic Version]. Time Online, 25.08.2005. Retrieved April 2008 from http://www.time.com/time/nation/article/0,8599,1098371,00.html.
Thornburgh, N. (2005b). The Invasion of the Chinese Cyberspies [Electronic Version]. Time Online, 29.08.2005 from http://www.time.com/time/magazine/article/0,9171,1098961–1,00.html.
Traynor, I. (2007). Russia Accused of Unleashing Cyberwar to Disable Estonia [Electronic Version]. The Guardian Online, 17.05.2007 from http://www.guardian.co.uk/world/2007/may/17/topstories3.russia.
Tsfati, Y., & Weimann, G. (2002). www.terrorism.com: Terror on the Internet. Studies in Conflict & Terrorism, 2002(25), 317–332.
Vargas, J. A. (2006). Way Radical, Dude [Electronic Version]. The Washington Post Online. From http://www.washingtonpost.com/wp-dyn/content/article/2006/10/08/AR2006100800931.html.
Vatis, M. A. (2001). Cyber Attacks During the War On Terrorism: A Predictive Analysis. Retrieved April 2008 from http://www.ists.dartmouth.edu/analysis/cyber_a1.pdf.
Weimann, G. (2004a). Cyberterrorism: How Real is the Threat? [Electronic Version]. Special Report (United States Institute of Peace), 119.
Weimann, G. (2004b). www.terror.net. How Modern Terrorism Uses the Internet [Electronic Version]. Special Report (United States Institute of Peace), 116.
Weimann, G. (2005). Cyberterrorism: The Sum of All Fears? Studies in Conflict & Terrorism, 28, 129–149.
Weimann, G. (2006). Terror on the Internet. Washington, DC.
White, J. R. (1990). Terrorism – an Introduction. Pacific Grove, CA: Brooks/Cole Publishing Co.
Wilson, C. (2005). Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress (Vol. RL32114). Washington, DC
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
Brunst, P.W. (2010). Terrorism and the Internet: New Threats Posed by Cyberterrorism and Terrorist Use of the Internet. In: Wade, M., Maljevic, A. (eds) A War on Terror?. Springer, New York, NY. https://doi.org/10.1007/978-0-387-89291-7_3
Download citation
DOI: https://doi.org/10.1007/978-0-387-89291-7_3
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-0-387-89290-0
Online ISBN: 978-0-387-89291-7
eBook Packages: Humanities, Social Sciences and LawLaw and Criminology (R0)