Cyber terrorism is defined as those attacks that via computer networks can disable or disrupt computers and their networks causing serious material and/or economic damage and, possibly, loss of life. To (partially) correct this situation, it could be argued that there are two distinctive types of “cyber terrorism”: the “Hard-Rock” version includes attacks by terrorists of a country’s infrastructures via computer networks and to block critical functions such as water and energy distribution and cause disruption and possibly casualties. The “Lite” version is the competence by terrorist organizations to use the Web (and the Internet) to communicate with their affiliates, recruit new elements and, most importantly, publicize their deeds (Locatelli, 2015).
Cyber terrorism aims to diminish human dignity than add value in a number of ways;
• The use of violence: – The first constitutive element of cyber terrorism is represented by the use of cyber violence. By definition, violence implies physical destruction (of properties and, most commonly, human lives). The terrorists aim to destroy various forms of data, information or infrastructure. Again, they also aim to diminish human dignity through functional disruption – that is, those threats that endanger the capacity of a given society to function.
• Political goal and effect: – Cyber terrorism to some extend possesses some under tones of political connections. Most commonly, this takes the form of a political goal, like opposing a given regime, claiming independence, calling for social revolution or fostering policy change.
• Patent breach of accepted rules: – Acts of cyber terrorism have been highlighted by some scholars as immoral and/or illegal. The central aim of cyber terrorism as an action is the infringement of some norms and acceptable rules. This intrinsic proclivity of cyber terrorism to breach accepted rules is witnessed by the many tactics used to perpetrate attacks while demanding ransom or theft of intellectual property (Giacomello, 2015).
Culture is, increasingly becoming a target of cyber terrorism. Beyond the physical damage or destruction of monuments, temples or symbols of a given culture and way of life, such terrorist acts target the very cultural identity of a people or a population. They also harm a cultural heritage that is common to all people in the world.
Globalization and the information society allow unprecedented contact and interaction between peoples, ideas and cultures. Some aspects of it, however, can potentially foster terrorism and the ideologies that encourage it in several ways:
- The gap is increasing between rich and poor nations and populations. Poverty, oppression, disrespect for human rights, the sense of injustice and lack of brighter prospects for the future are fertile ground for any sort of cyber terrorism acts;
- The world dominance of western culture in its most commercial forms based on violence, money and sex, is perceived by more traditional societies as deeply offensive and in sharp contradiction with the high democratic standards which it is supposed to reflect;
- The global village created by the modern media and the Internet means that never before have terrorist acts gained such public prominence. Cyber terrorism acts thus appear to extremists as the most efficient and “cost-effective” means of getting a message through;
- Modern information technologies have also allowed far better communication and networking of terrorist groups, leading to a new form of international terrorism with an “a-territorial” and “a-cultural dimension”, even if affiliation is claimed with a particular territory or culture;
- Dependence on information technologies has led to the appearance of cyber terrorism, threatening the functioning of modern life through manipulation of computer systems (Rathmell, 1999).
References
Giacomello, G. (2015). Close to the edge: Cyberterrorism today. Understanding Terrorism. https://doi.org/http://dx.doi.org/10.1108/MRR-09-2015-0216
Locatelli, A. (2015). What is terrorism? Concepts, definitions, and classifications. Understanding Terrorism. https://doi.org/http://dx.doi.org/10.1108/MRR-09-2015-0216
Rathmell, A. (1999). Cyber‐terrorism: The shape of future conflict? Journal of Financial Crime, 6(3). https://doi.org/10.1080/03071849708446185