From Terrorism to Cyberterrorism

Journal Title: Security Dimensions - Year 2018, Vol 25, Issue 25

Abstract

The paper deals with a new phenomenon of crime – the terrorism in cyberspace. Terrorism, cyberterrorism and cyberwar are defined here. The paper focuses on the systemic integration of cyberterrorism into the structure of terrorist attacks, describes various types of attacks in cyberspace, and deals with the legal definition of cyberterrorism. Since the 1990´s, war and armed conflict have been moving increasingly from the interstate to the intrastate area. In the postmodern conflict, besides government troops, various irregular paramilitary groups, most commonly defined tribally, ethnically, or religiously, keep on fighting. However, their military activities are usually linked to a largescale criminal activity. Whereas, in standard wars, we expect states and their armed forces to be parties to the conflict, in the case of the postmodern conflict, hybrid wars, and the so-called asymmetric threats, war is not separated from the life of the civil society, as it used to be in standard wars of the 20th century. It is also increasingly difficult to separate war and terrorist attacks. Cyberattacks are becoming a part of terrorist attacks. Modern information technologies are becoming more and more important in spreading ideologies which provide a fertile ground for terrorism, as they are increasingly important for training and teaching terrorist practices. Terrorists use the Internet as a means of spreading propaganda aimed at recruiting sympathizers as well as instructions and manuals for training or attack planning. Cryptocurrencies such as bitcoins are used to transfer finances. In this context, cyberterrorism could be defined as the use of the means of modern information and communication technologies to implement an act of violence, in order to provoke a certain reaction (from the point of view of terrorists, in ideal case, the by them required psychological reaction) of the audience of the terrorist act. In the case of cyberterrorism, it would be a politically motivated attack on instruments and / or the process of obtaining and / or processing electronic data which, as a result, means violence against non-military targets and the purpose of which is to influence, in a certain way, a wider circle of recipients rather than the direct victims of such an attack. While mostly natural persons are the target of typical terrorism, in the case of cyberterrorism, on the contrary, the attacks are aimed at state authorities, corporations, and the critical infrastructure. It is a question whether in these cases we are able to correctly assess whether it is a terrorist attack or an (unreported) information or cyberwar conducted by a foreign state. In some cases, we cannot even be sure whether it is a criminal act which is masked as a terrorist one or vice versa, which is easier to do in cyberspace rather than in the material world.<br/><br/>

Authors and Affiliations

Vladimír Smejkal

Keywords

Related Articles

Development of Constructive Simulation in Slovak Republic Environment - Transition from Military to Civilian Sector and Its Acquisition to Science and Practice

The use of simulation in training staffs and personnel (primarily military) had already begun in the seventies of the last century, yet only in developed countries. Slovak Republic, even as non-NATO member (year 2000), h...

The crisis and the crisis situation – relations

In order to discuss the relationship between crisis and crisis situation, we should first define the two concepts and analyze them. The term „crisis” is an ambiguous notion used in many areas, such as: political science,...

Perception of Apoliticism of the Police

The article aims to present considerations and attempts to answer the questions, what dimension – trust, loyalty, commitment and specific expectations or qualifications – influences the process of staffing authorities...

Information systems in the enterprises of highly technological economic sector and their impact on the safety of business entities

the article covers the research of key aspects of information systems creation in highly technological economic sector (htEs), the analysis of their tasks and causes that influence information systems safety, the measure...

Importance of Professional Competence in the Rescue in Opinions of Young People

Specific competences of employees are important for rescue services. This means that workers who have a certain set of competences including knowledge, abilities, experience, attitudes and the worker’s readiness to act i...

Download PDF file
  • EP ID EP367925
  • DOI 10.24356/SD/25/6
  • Views 65
  • Downloads 0

How To Cite

Vladimír Smejkal (2018). From Terrorism to Cyberterrorism. Security Dimensions, 25(25), 118-130. https://europub.co.uk/articles/-A-367925