Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Terrorism online : politics, law and technology
Jarvis L., Macdonald S., Chen T., Routledge, New York, NY, 2015. 224 pp. Type: Book (978-0-415732-88-8)
Date Reviewed: Nov 2 2016

Barry Collin, a senior research fellow at the Institute for Security and Intelligence in California, is attributed with the creation of the term “cyberterrorism” in 1997. He defines it as the convergence of cybernetics and terrorism [1]. A year later, Mark Pollitt, special agent for the FBI, came up with a working definition: “Cyberterrorism is the premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets by sub-national groups or clandestine agents” [2].

Terrorism online is a collection of nine papers investigating the intersection of terrorism, digital technologies, and cyberspace. The book was organized under the auspices of the Cyberterrorism Project [3], an international, interdisciplinary research network that was established in 2011.

Chapter 1 introduces the book by discussing the dynamics of cyberterrorism and its role in recruitment, networking, and propaganda.

Chapter 2 explores a set of questions related to the use of the Internet by lone actor terrorists, the main question being if the rise of the Internet aided lone actor terrorists.

Chapter 3 provides an insight into hacktivist groups, their history, and their communication strategy.

Chapter 4 develops a new cost estimation model to make predictions about the feasibility and likelihood of “weaponized” malware being used for future cyber attacks.

Chapter 5 talks about moral panics and their role in understanding the discourse of cyberterrorrism.

Chapter 6 provides theoretical analysis of the extent to which punishment-based deterrence-oriented criminal law might be effective in the context of cyberterrorism. Deterrence is the use or threat of criminal sanctions as a behavioral control mechanism.

Chapter 7 discusses the effectiveness of surveillance by security agencies and the need to reconcile its practice with human rights.

Chapter 8 discusses the collaborations between the US and Europe in the context of counterterrorism and exposes their divergences.

Chapter 9 explores the appropriateness of international law on employing armed force against cyberterrorism.

It’s quite clear that the chapters were intentionally selected to cover multiple disciplines. This was driven by the recommendations of the Cyberterrorism Project introduced earlier. The main goal is to try to understand cyberterrorism from different angles and therefore provide a stepping stone toward more effective solutions.

The book is a nontechnical introduction to cyberterrorism. The reader will gain a broad overview of the topic and understand the multiple challenges policy makers, engineers, and security experts need to overcome for a proper counterterrorism strategy.

Reviewer:  Ghita Kouadri Review #: CR144895 (1702-0118)
1) Collin, B. The future of cyberterrorism. Crime and Justice International 1997, March(1997), 15–18.
2) Pollitt, M. M. Cyberterrorism--fact or fancy?. Computer Fraud & Security 1998, 2(1998), 8–10.
3) Whiting, A.; Nouri, L. The Cyberterrorism Project, http://www.cyberterrorism-project.org/ (10/24/2016).
Bookmark and Share
  Featured Reviewer  
 
Abuse And Crime Involving Computers (K.4.2 ... )
 
 
Social Issues (K.4.2 )
 
Would you recommend this review?
yes
no
Other reviews under "Abuse And Crime Involving Computers": Date
The human factor in computer crime
Van Duyn J., Petrocelli Books, Inc., Princeton, NJ, 1985. Type: Book (9789780894332562)
May 1 1987
Crime and the computer
Wasik M., Oxford University Press, Inc., New York, NY, 1991. Type: Book (9780198256212)
Jun 1 1992
Combating computer crime
Buckland J. (ed), McGraw-Hill, Inc., New York, NY, 1992. Type: Book (9780830676644)
Mar 1 1993
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy