Institutional Repository

Cyberterrorism : future trends and impact

Show simple item record

dc.contributor.author Youssef, Imad Milad
dc.date.accessioned 2023-01-13T14:00:40Z
dc.date.available 2023-01-13T14:00:40Z
dc.date.issued 2006
dc.identifier.citation Youssef, I. M. (2006). Cyberterrorism : future trends and impact (Master's thesis, Notre Dame University-Louaize, Zouk Mosbeh, Lebanon). Retrieved from http://ir.ndu.edu.lb/123456789/1662 en_US
dc.identifier.uri http://ir.ndu.edu.lb/123456789/1662
dc.description M.A. -- Faculty of Political Science, Public Administration and Diplomacy, Notre Dame University, Louaize, 2006; "A thesis submitted to the faculty of Political Science, Public Administration and Diplomacy, in partial fulfillment of the requirements of the degree of Master of Arts in International Affairs and Diplomacy."; Includes bibliographical references (leaves 90-92). en_US
dc.description.abstract As the world enters the information age, countries has undertaken extensive study of the "Revolution in Military Affairs" and information warfare. This thesis examines the implications of information warfare tactics and techniques for terrorism. It explores the possibility that computers may revolutionize terrorism. Two concepts are often embodied in academic definitions of terrorism: violence and terror. By adding information warfare techniques, the definition of terrorism could be expanded to include "cyberviolence," the destruction or manipulation of computer information. The "violence" done to this information, which is becoming increasingly important for security and economic prosperity, should be considered terrorism. Although terrorists might turn from destruction to the creation of mass disruption, the addition of information warfare tactics to the terrorist's arsenal does not imply a less destructive future. Should terrorists choose to target critical computer systems they could create destruction and disruption simultaneously. While there have been many studies in the separate areas of terrorism, cyberterrorism and cyber warfare, it is hoped that by putting them together we can establish the significance of the cyberterrorism threat. We have verified firstly that cyberterrorists are likely to have similar motivations with terrorists in desiring violence and destruction to meet their political or other causes. While there have been no clear acts of cyberterrorism to date, this could be the result of lack of ability to carry out the attacks in cyberspace and not the feasibility. However, this situation is not expected to remain as is, given the advantages offered by cyberterrorism against forces and societies that rely heavily on information technology. Moreover, many terrorist and state sponsored groups are seeing the asymmetrical benefits of information warfare as a means of redressing the conventional military imbalance of the U.S. vis-à.-vis the rest of the world. This thesis reaches several conclusions regarding information age terrorism. First, the definition of terrorism must change to include cyberviolence and disruption. Second, the terrorist threat is likely to become more "demassified," with smaller numbers of individuals able to create disruption via virtual worldwide organizations. Third, the pattern of state sponsorship is likely to change. While old state sponsors will continue to exist, terrorists may turn to poorer states or choose to fund themselves via information warfare crime. Fourth, information warfare techniques may afford terrorists the ability to target their message more effectively. Fifth, the nature of offense and defense in cyberspace does not mirror that of "conventional" offense and defense in the physical world. In light of these conclusions, the best method to counter information age terrorism is a joint government/industry program of defensive measures that will increase the effort required for computer disruption while simultaneously diminishing the potential returns offered by this new form of terrorism. At the same time, a strategy that is based on some form of international cooperation is recommended to counter cyberterrorism. Finally, the lack of actual examples of cyberterrorism (although a blessing) makes it hard to pinpoint specific methods, tools or desired outcomes for policy recommendations. There is much literature available on the methods, motivations and psychology of terrorists, but little is available in comparison for cyberterronsts. What is available tends to be confined to arguments on the nature of the threat, rather than the threat itself. Thus more work will need to be done on studying the vulnerability of critical information systems, their potential exposure to cyberterronsts and the damage they could do if they gained access. However, just as the events of 9/11 caught the world by surprise, so could a major cyberassault. Therefore we can neither deny its threat nor dare to ignore it. en_US
dc.format.extent iv, 92 leaves
dc.language.iso en en_US
dc.publisher Notre Dame University-Louaize en_US
dc.rights Attribution-NonCommercial-NoDerivs 3.0 United States *
dc.rights.uri http://creativecommons.org/licenses/by-nc-nd/3.0/us/ *
dc.subject.lcsh Cyberterrorism
dc.title Cyberterrorism : future trends and impact en_US
dc.type Thesis en_US
dc.rights.license This work is licensed under a Creative Commons Attribution-NonCommercial 3.0 United States License. (CC BY-NC-ND 3.0 US)
dc.contributor.supervisor Kairouz, Akl, Ph.D. en_US
dc.contributor.department Notre Dame University-Louaize. Department of Government and International Relations en_US


Files in this item

The following license files are associated with this item:

This item appears in the following Collection(s)

Show simple item record

Attribution-NonCommercial-NoDerivs 3.0 United States Except where otherwise noted, this item's license is described as Attribution-NonCommercial-NoDerivs 3.0 United States

Search DSpace


Advanced Search

Browse

My Account