Close to the edge: Cyberterrorism today
ISBN: 978-1-78350-827-3, eISBN: 978-1-78350-828-0
Publication date: 21 June 2014
Abstract
Purpose
This chapter examines the phenomenon of cyberterrorism, which is a form of terrorism that could be potentially devastating as terrorists could, through computer networks, wreak havoc in the critical infrastructure of an advanced country.
Methodology/approach
Review of relevant literature.
Findings
The chapter argues that there are actually two types of cyberterrorism: “Hard-Rock” and “Lite.” Both are potential “force multiplier” for terrorists. The former relies on attacking a country’s infrastructures via computer networks and blocking the working of critical functions like water and energy distribution and the like. Because of its complexity and costs, this type of cyberterrorism is far from frequent and actually almost non-existent. The latter type (Lite) is much more commonplace and is the capability by terrorist organizations to use the Web (and the Internet) to communicate with their affiliates, recruit new elements and, most importantly, publicize their deeds.
Research limitations/implications
Because the use of the Web and the Internet by terrorists give intelligence agencies more opportunities to actually monitor them, this form of terrorism is much more a “double-edged sword” than regular terrorism.
Originality/value of the chapter
The chapter tries to better classify and compare the two forms of cyberterrorism; it also shows how remote the prospect of Hard-Rock Cyberterrorism still is.
Keywords
Citation
Giacomello, G. (2014), "Close to the edge: Cyberterrorism today", Understanding Terrorism (Contributions to Conflict Management, Peace Economics and Development, Vol. 22), Emerald Group Publishing Limited, Leeds, pp. 217-236. https://doi.org/10.1108/S1572-8323(2014)0000022015
Publisher
:Emerald Group Publishing Limited
Copyright © 2014 Emerald Group Publishing Limited