2000 Level Course Instructor: Dr. Schubert Defining Cyberterrorism One of the most necessary questions for the UN to answer at the moment is “What is terrorism?”, since there is no universal definition for terrorism. This is because it is needed to determine the differences between terrorism and other forms of crimes. In the past there have been many spreads of terror, especially from the Arabic Comment [SS1]: How shall I put this? Your ending is better than the beginning. The middle is wasted. You seem to rely on one author’s point of view. You fail to present different theoretical perspectives, mainly because you failed to read up on the topic at hand. You mention no serious competitive models for defining terrorism and confuse cyber warfare and espionage with cyber terrorism. countries. This makes the impression towards society – especially in the United States You need to expand your knowledge greatly and tighten the text. Fix all my comments and resubmit. – that anyone from an Arabic country is a terrorist, which is not correct. This has As it stands: 14/20 occurred due to coincidences such as the September 11th incidence, which has been claimed to be caused by al-Qaeda. These forms of terrorism are slowly turning into cyberterrorism, since the developments in technologies have improved in a way in Comment [SS2]: Who says this is the reason. For example, Schubert (2007) or Hoffman (2010). Comment [SS3]: Again, who says so. This is a lit review. which even personal cars can now be controlled through a computer (Corneliussen, Comment [SS4]: Not claimed, but executed by. There is no debate or question of any real scholarly nature here. 2012). My question is, what is the link between “cyber” and “terrorism”, and how can Field Code Changed Formatted: English (U.S.) cyberterrorism be defined? Firstly we have to be able to define terrorism to start talking about cyber Comment [SS5]: This is the first useful sentence and it is a good one, but nevertheless AQ terrorism is not transforming as you say. Cyberterror is just another tool in the toolbox. terrorism. There are many different definitions of terrorism since there is no universal accepted definition of terrorism. The definition the UN – being the most accepted – Comment [SS6]: Repetitive. has agreed on “Criminal acts intended or calculated to provoke a state of terror in the general public, a group of persons or particular persons for political purposes are in any circumstance unjustifiable, whatever the considerations of a political, philosophical, ideological, racial, ethnic, religious or any other nature that may be invoked to justify them (Perera, 1994).” The FBI (Federal Bureau of Investigation) also came up with a definition for terrorism, “the unlawful use of force or violence, Field Code Changed Formatted: English (U.S.) committed by a group(s) of two or more individuals, against persons or property, to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives (FBI, 2002).” The DOD (Department of Defense) has as well a different but similar definition of terrorism, “the unlawful use Formatted: English (U.S.) Field Code Changed of, or threatened use, of force or violence against individuals or property, to coerce and intimidate governments or societies, often to achieve political, religious or ideological objectives (Gordon, 2003).” When analyzing terrorism, what is looked at are different aspects or “elements”: the people, the location, the methods, the tools, the targets, the affiliations and the motivations; which all together define a terrorism act for what it is. The problem with these aspects of terrorism, is that not many people agree on all these “elements” (Gordon, 2003). Comment [SS7]: All these definitions should be cited with their defining institutions (DOD, UN, State etc. ). The authors you are referring to such as Gordon make analyses about those definitions and you say nothing about that until the next sentence, which is good. Formatted: English (U.S.) Field Code Changed Field Code Changed Formatted: English (U.S.) The word cyber means, “relating to or characteristic of the culture of computers, information technology, and virtual reality (Oxford University Press).” Comment [SS8]: You mean here the oxford dictionary and not the press. Cyber comes from the word cybernetics, which means “the science of Field Code Changed Formatted: English (U.S.) communications and automatic control systems in both machines and living things (Oxford University Press).” The definitions of terrorism, if applied to the definition of Field Code Changed Formatted: English (U.S.) cybernetics, applies in the control of automatic systems, meaning that through a command or program using a computer someone can release a chain of reactions controlling a form of act that will eventually cause and spread terror. One example to this form of terrorism, of controlling a system would be the disruption of a Syrian air defense network, while Israel was bombing an alleged Syrian nuclear facility in September 2007 (CSIS, 2006-2012). More importantly, the connection between terrorism, and the information technology and communication to achieve this terror is less common and more complicated. A recent example would be the case of the Comment [SS9]: Are you saying that is cyberterrorism as opposed to cyberwarfare. There must a difference and you seem to be ignoring that. Field Code Changed Formatted: English (U.S.) Trojan virus named “Mahdi” gathering information about critical infrastructure engineering firms, government agencies, financial houses, and academia throughout the Middle East, this happened in July 2012 (CSIS, 2006-2012). It must not be confused, that hacking for other reasons than a political mean or a mean to spread Comment [SS10]: So how is collecting information terrorism and not cyber espionage? Field Code Changed terror is not cyber terrorism, such as the case of the withdraw of $16 million from the Formatted: English (U.S.) Merrick Bank in May 2009 (CSIS, 2006-2012). This particular example is not an act Comment [SS11]: Good, but then why do you fail to make similar distinctions earlier. of terrorism, especially since it does not spread terror, is not for political reasons and Field Code Changed does not include an act of violence, but this act might also be an example of pure Comment [SS12]: This is the central component that divides crime from terrorism. Formatted: English (U.S.) cyberterrorism, which definition has not been elaborated on. When talking about cyber terrorism, we expect it to be a terrorist act through a Comment [SS13]: Or the threat of violence. You really need to think a little but deeper. computer. Which leads to the main problem with cyberterrorism. The issue is that it is not known if the terror is caused through a computer, or if it is terror in cyberspace, meaning terror through loss of valuable information, or loss of software. Both forms are subcategories of cyberterrorism. One of these forms is called “pure cyberterrorism”, meaning terrorist acts that are entirely carried out in the virtual world. Comment [SS14]: According to whose typology. I hope it isnot Gordon, because then you are only relying on one author’s concept and that is the opposite of a literature review. The other method is a more direct one, which for example means to explode a bomb through a computer; of course the bomb had already been set on place (Gordon, 2003). Cyberterrorism can’t be properly defined, after all there is still need to find a universally accepted definition of terrorism. However, based on the literature, it nay indeed be characterized and described. But one We can say with relative certainty that Comment [SS15]: And of course because you are ignoring other authors you miss here the vital aspect of using digitally connected industrial systems to overload an electricity grid, over heat a nuclear reactor, open the flood gates on a dam, etc. Think man, think! Field Code Changed Formatted: English (U.S.) straightforward and simple definition of cyberterrorism includes would be, the creation or spread of terror or severe disruption caused by the willful and harmful use of an information technology and a with a politically motivation. ed use of computers. BibliographyCited References Corneliussen, S. T. (2012, 7 10). Does Hacking Threaten Motorists. Retrieved from Phisics Today: http://www.physicstoday.org/daily_edition/science_and_the_media/does_hacking_thr eaten_motorists CSIS. (2006-2012). Significant Cyber Incidents Since 2006. Retrieved from CSIS: http://csis.org/files/publication/121113_Significant_Cyber_Incidents_Since_2006.pdf FBI. (2002). Terrorism 2002-2005. Retrieved from The Federal Bureau of Investigation: http://www.fbi.gov/stats-services/publications/terrorism-2002-2005 Gordon, S. (2003). Cyberterrorism? Retrieved from Symantec: https://www.symantec.com/avcenter/reference/cyberterrorism.pdf Oxford University Press. (n.d.). Cyber. Retrieved from Oxford Dictionary: http://oxforddictionaries.com/definition/english/cyber?q=cyber Oxford University Press. (n.d.). Oxford Dictionaries. Retrieved from Cybernetics: http://oxforddictionaries.com/definition/english/cybernetics Perera, R. (1994). Declaration on Measures to Eliminate International Terrorism (1994). Retrieved from http://untreaty.un.org/cod/avl/ha/dot/dot.html
© Copyright 2026 Paperzz