Cyberterrorism

The Prohibition of Cyberterrorism as a Method of Warfare in International Law: The Need for a New IHL Treaty

Abstract:

There is no doubt that cyber operations can play a significant role in the conduct of warfare. This article focuses on a specific aspect of cyber operations that is growing in significance: cyberterrorism as a method of warfare. It begins by exploring the definitional issues surrounding cyberterrorism. It then examines the extent to which international humanitarian law (IHL), which was primarily designed to govern kinetic means and methods of warfare, applies to cyberterrorism, and concludes that there is a need for new treaty law to explicitly prohibit such acts and to hold the perpetrators responsible.

Beyond Kinetic Harm and towards a Dynamic Conceptualization of Cyberterrorism

Abstract:

After more than two decades of discussion, the concept of cyberterrorism remains plagued by confusion. This article presents the result of an integrative review which maps the development of the term and which situates the epistemic communities that have shaped the debate. After critically assessing existing accounts and highlighting the key ethical, social, and legal dimensions at stake in preventing cyberterrorist attacks, it calls for a more dynamic conceptualization that views cyberterrorism as more abstract, difficult to predict, and hard to isolate; and which embraces a different conception of sufficient harm. In concluding, it proposes a novel definition of cyberterrorism, intended to catalyse a new research program, and sketches a roadmap for further research.

Lone-Operator Cyberterrorism

Abstract:

This paper describes lone-operator cyberterrorism, a topic that is nearly absent in the literature. The paper will present a working definition of the base terms—terrorism, lone operator, and cyberterrorism—in order to start the conversation, and will compare and contrast the motivation, expectations, and characteristics of the lone-operator terrorist and lone-operator cyberterrorist.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

P

PDA

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com