Search results

1 – 3 of 3
Book part
Publication date: 21 June 2014

Giampiero Giacomello

This chapter examines the phenomenon of cyberterrorism, which is a form of terrorism that could be potentially devastating as terrorists could, through computer networks, wreak…

Abstract

Purpose

This chapter examines the phenomenon of cyberterrorism, which is a form of terrorism that could be potentially devastating as terrorists could, through computer networks, wreak havoc in the critical infrastructure of an advanced country.

Methodology/approach

Review of relevant literature.

Findings

The chapter argues that there are actually two types of cyberterrorism: “Hard-Rock” and “Lite.” Both are potential “force multiplier” for terrorists. The former relies on attacking a country’s infrastructures via computer networks and blocking the working of critical functions like water and energy distribution and the like. Because of its complexity and costs, this type of cyberterrorism is far from frequent and actually almost non-existent. The latter type (Lite) is much more commonplace and is the capability by terrorist organizations to use the Web (and the Internet) to communicate with their affiliates, recruit new elements and, most importantly, publicize their deeds.

Research limitations/implications

Because the use of the Web and the Internet by terrorists give intelligence agencies more opportunities to actually monitor them, this form of terrorism is much more a “double-edged sword” than regular terrorism.

Originality/value of the chapter

The chapter tries to better classify and compare the two forms of cyberterrorism; it also shows how remote the prospect of Hard-Rock Cyberterrorism still is.

Content available
Book part
Publication date: 21 June 2014

Abstract

Details

Understanding Terrorism
Type: Book
ISBN: 978-1-78350-828-0

Book part
Publication date: 21 June 2014

Abstract

Details

Understanding Terrorism
Type: Book
ISBN: 978-1-78350-828-0

Access

Year

Content type

Book part (3)
1 – 3 of 3