This resource is no longer available

Cover Image

by Matteo Cavallini, MSc (Royal Holloway) and John Austen, ISG, Royal Holloway

The internet is a tool that, after about 30 years, has resulted in a huge change in everyday life, modifying the lifestyle of the public, companies and government.

Terrorist groups have not been immune to these changes. Initially, they developed some capabilities at an individual level, but these have evolved over time towards a more structured approach in the use of the internet.

The interest by subversive movements in using the net to carry out their activities has recently driven many analysts to hypothesise that the conditions to exploit the internet as a weapon are now very close.

It is important to note that there is a big difference between using the internet to support terrorist activities and using it to launch attacks.

Only the latter can be fully defined as a cyber-terrorist act. In fact, the prerequisite to assess an event as “cyber-terrorism” is the use of the internet to produce violence and/ or physical effects, as in a “traditional” kinetic attack.

Bearing this in mind, it is apparent that terrorists and cyber-terrorists are different categories of criminal with different skillsets and different views about targets.

Click on the button below to download this report

Vendor:
TechTarget ComputerWeekly.com
Posted:
Feb 8, 2021
Published:
May 23, 2014
Format:
PDF
Type:
Essential Guide

This resource is no longer available.