Cyber Terrorism in the Future: Criminology Theories

Abstract

Overall, cybercrimes are correlated to the traditional crimes as indicated by laid down criminology theories. We analyse the existing cyberterrorism based on those theories and predicts future trends. We have considered multifaceted factors, technology, regulations and policies, and criminology theories

I. Introduction

Cyberterrorism is a difficult term to study because it is multifaceted topic. There is no globally accepted definitions and laws which is often political. It is being said, “One man’s terrorist is another man’s freedom fighter”. But, literally, it is a new form of terrorism facilitated using technologies mainly the Internet.

In order to understand cyberterrorism, we consider three main actors. One, cybersecurity experts who are saddled to developing solutions to mitigate risks. Second, the policymakers who are responsible for making policies, legal and jurisdiction provisions and needed government institutions. Lastly, attackers themselves who commit terror attacks.

We consider Cyberterrorism to be a major issue of concern in the future, due its uncertainty. Although, there are not many pieces of research in studying how criminology is used to study cyber terrorisms which according to Dolliver & Seigfried-Spellar, terrorists are not easy to be seen for sampling, which lead to lack of data needed by academics to make their analysis.

The remaining sections are as follows: section II- attempts to cyberterrorism and its shortcomings; section III- understanding cyberterrorism through criminology theory; section IV- future of cyberterrorism by emerging technologies; and section V- wrapping up.

II. Responses to Cyberterrorims and Its Pitfalls

Cybersecurity experts put in place techniques such as Closed-Circuit TV (CCTV), Honeypots which are used for monitoring physical movements of people and malicious network traffic respectively, among others. Despite measures yet leaving behind other issues like Open Source Intelligence (OSINT) - which according to, Al-Qaida use through the medium of the Internet to gather intelligence information publicly available as well as raise volunteers through social network platforms available. Technologies are often developed without oversight about future risks. The CCTV, unfortunately, could be displaced by the terrorists as well.

Meanwhile, the second actor predominantly uses surveillance in some ways. For instance, in Africa, there exists a Centre for Applied Policy Research which highlighted the ways in which the Tunisian government have come up with laws to curtail suspicious financial activity relating to terrorism. This has been through enabling laws for money laundering that could lead to the cyberterrorist financing check by the National Cyber Security Commission and Tunisia Commission for Financial Analysis. Unfortunately, it is only activities terrorists could do on the surface web that could be monitored but, yet the anonymous market (Dark Web) making it worsts.

Although, no any reported case of successful terrorist attack primarily on the Internet, according to, the use of the Internet for information gathering, can aid terrorists to learn how to build sophisticated weapons and or even easily share communicate propaganda. Therefore, despite cybersecurity techniques, the openness of information publicly and freely available on the web through the ungoverned Internet that terrorists could look for to carry out a horrible attack in the physical world. Similarly, the failure to address Tor and the dark web anonymous activities supporting terrorist without being noticed. A recent study indicates that almost half of the activities therein are illicit. Therefore, in order to ensure adequate cyber defence, there should be a balance between Internet governance and anonymity issues on it causing a lot of trouble towards future cyberterrorism.

III. Criminology and Cyberterrorism

Criminology is a pathway which applies sociological, physiological and computer science to study, analyse the causes of the cybercrimes. Although the far majority of researches analyse how cyberterrorism if motivated based on Rational Choice Theory (RCT) which is based on whether or not the terrorist will get some benefits or not, based on the cost-benefit analysis. In understanding the cyberterrorism, we consider three main theories; the RCT, Deterrence theory and Labelling theory, discussed in detail in the subsequent paragraphs.

Typically, consider, ‘RCT’ which is based on cost-benefit analysis decision the making process by terrorists. It is obvious that cyber will be more and more cost-effective for cyber terrorists especially for it been open and cheap, as well as the anonymity that is provided for terrorists to remain hidden while exploiting its benefits. Based on their interviews with the active and non-active members of some selected terrorist organisations, they realised that they do have entrepreneurial leadership where they balance between the cost of launching the was worth the potential benefits to derive thereafter, which is rational. Undergo similar approaches towards explaining the RCT in relation to terrorist activities.

On the other hand, uses the ‘Deterrence Theory’ to study why terrorist group could undertake cyber-attacks. Deterrence theory implies crimes are committed if explicit punishments are not defined. To Sterner, it is due to lack of stiff punishments by governments that makes terrorists conducts their attacks even more. This could be true taking an example of two popular and rising terrorist groups militants in Nigeria who were pardoned in recent years. They are Movement for Emancipation of Niger Delta and the Boko Haram (BH). The former was pardon so as to reduces the damages in the Oil region whereas the latter were set out of prison in exchange to the adducted school girls. Sometimes, it could be that, just as we mentioned that terrorisms have political affiliation at some stage, such punishments are not explicitly stated due to interest by those in position. A closely applicable Cyber related example is the Israeli-Palestinian conflict and the Russo-Georgian cyber conflict in 2008 where the risk assessment undertaking in the US is confirmed not really enough as a solution to the dimension of the problem without clear punishment. This even makes new terror organisation rise making future to be unpredictable.

Unfortunately, considering the complex nature of terrorism being it political, sometimes powerless states or individuals are labelled as terrorists even if they are not. This idea is called ‘Labelling theory’. Example Senator Mohammed Ali Ndume was labelled to be linked to the BH, which many consider to be a political issue, allegedly perpetuated by the presidency, simply because he seems to be against the President in power at that time. Labelling theory brings about uncertainty in policing real terrorists and their sponsors, if politics is involved. However, some authors like set up some criminological paradigms encompassing disciplines psychological, social structure, social processes, and political.

IV. Future World of Cyberterrorism- Machine Learning (ML):

The current manual techniques of information gathering that we indicated to be the main contribution of the Internet to the cyberterrorists in section II, will in the future be facilitated by the sophisticated self-automated tools such as ‘Social Mapper’ which is a software for tracking individual face. Such technologies are cheap and could be obtained by cyberterrorists on their fingertips almost anonymously on the Web. This supports the idea of RCT where, it is about exploiting cheaper alternatives and avoiding been in risk of being caught by authorities.

ML was used to impersonate the speech of the former president Obama was reported. In the future, this could allow cyber terrorist to impersonate some reputable entities to share propaganda. This will be dangerous especially if such individuals have great impacts in influencing people to do something, for example, imagine a terrorist impersonating the preaching of one of respected cleric and pass commands to his followers to incite violence terror activity.

However, uses the idea of Game Theory to analyse the correlation and coexistence between groups in terms cyber terrorism, they compare the theory with the decision-making theory which is the subset of RCT. The decision theory mainly focuses on how individual portray his/her decisions. Whereas in game theory it is a matter of having actors in place under uncertain equilibrium. For example, in cyberterrorism you have the terrorists as actors and governments as defenders. This kind of attempt could be useful in understanding the future cyberterrorism as defence/mitigation mechanisms.

V. Conclusion

The future cyberterrorism is better understood by criminology theories which need refinement across multidisciplinary research paradigms, encompassing computer science, particularly cyber security, criminology, sociology, history, political science among others. Overall, cyberterrorism is becoming easier and cheaper due to the ‘anonymity’ and evolving technologies like ML, supported by the current Internet. The big questions are, how could we develop a very efficient identity management system in the future? Could it be developed? If yes, what cyberterrorists would likely do is to surrender in as much as there exists a globally accepted definition, laws and collaborative combat to terrorism generally.

VI. References

  1. Ablon L., (2018) Data Thieves: The Motivations of Cyber Threat Actors and Their Use and Monetization of Stolen Data. RAND Corporation, Available at https://www.rand.org/content/dam/rand/pubs/testimonies/CT400/CT490/RAND_CT490.pdf (Accessed on: 10/03/2019).
  2. Bandyopadhyay, T. & Sebalia, R. (2008). Countering Cyberterrorism: Investment Models Under Decision and Game Theoretic Frameworks. Proceedings of the Southern Association for Information Systems Conference, Richmond 36. Available at https://aisel.aisnet.org/sais2008/36/?utm_source=aisel.aisnet.org%2Fsais2008%2F36&utm_medium=PDF&utm_campaign=PDFCoverPages (Accessed on: 10/03/2019)
  3. BBC World (2011). Nigeria senator Ali Ndume 'linked to Boko Haram'. Available at https://www.bbc.co.uk/news/world-africa-15829203. (Accessed on: 15/03/2019)
  4. Becker (1973) in Ballard, D. J., Hornik, G. J., and McKenzie, D. (2002) Technological facilitation of Terrorism: Definition, Legal and Policy Issues, American Behavioural Scientist (ABS), 45, pg. 989-1016. Available at: https://journals.sagepub.com/doi/abs/10.1177/0002764202045006005?casa_token=l7LNHutjMuMAAAAA:2rlUjMQ3C1iA89hvlc97kVAePXNS2fLNz85xfgIQDzEo4MTcH8OUaKUKhrVEZGId07vxKwHljV25qg (Accessed on: 12/03/2019)
  5. Choi., K., & Lee., C., S., (2018). The Present and Future of Cybercrime, Cyberterrorism, and Cybersecurity. International Journal of Cybersecurity Intelligence and Cybercrime, 1 (1), 1-4. Available at: htp://vc.bridgew.edu/ijcic/vol1/iss1/2 (Accessed on: 7/03/2019)
  6. Dolliver D. & Seigfried-Spellar K., C., (2017), Legal, Forensic, Criminological Aspects of Cyberterrorism, Available at https://www.researchgate.net/publication/314350231_Legal_Forensic_and_Criminological_Aspects_of_Cyberterrorism (Accessed on: 12/03/2019)
  7. Ganor, B. (2010) Defining Terrorism: Is One Man's Terrorist another Man's Freedom Fighter?, Police Practice and Research, 3:4, pg. 287-304. Available at: https://www.tandfonline.com/doi/pdf/10.1080/1561426022000032060?needAccess=true&instName=University+of+Southampton (Accessed on: 11/03/2019)
  8. Giacomello, G. (2004). Bangs for the Buck: A Cost-Benefit Analysis of Cyberterrorism. Journal of Studies of Conflict and Terrorism. 27(5), pg. 387-408. Available at https://www.tandfonline.com/doi/abs/10.1080/10576100490483660 (Accessed on: 7/03/2019)
  9. Guardian (2009). Nigeria begins amnesty for Niger Delta militants, available at https://www.theguardian.com/world/2009/aug/06/niger-delta-militants-amnesty-launched (Accessed on: 14/03/2019)
  10. Guardian (2014). 82 Chibok schoolgirls freed in exchange for five Boko Haram leaders, available at https://www.theguardian.com/world/2017/may/07/chibok-schoolgirls-familes-await-as-82-are-freed-by-boko-haram-exchange-prison (Accessed on: 14/03/2019)
  11. Kate A. (2018), Briefs hot topic: The dark side of the Bitcoin Available at https://search.informit.com.au/documentSummary;dn=436097450333633;res=IELHSS (Accessed on: 13/03/2019)
  12. Matusitz, J. (2009). A postmodern theory of cyberterrorism: Game theory. Information Security Journal: A Global Perspective. 18(6). 273-281 Available at https://www.tandfonline.com/doi/abs/10.1080/19393550903200474 (Accessed on: 06/03/2019).
  13. Paternoster, R. & Bachman, R. (2001). Explaining criminals and crime: essays in contemporary criminological theory. New York: Oxford University Press.
  14. Pollitt (2001), in Ballard, D. J., Hornik, G. J., and McKenzie, D. (2002) Technological facilitation of Terrorism: Definition, Legal and Policy Issues, American Behavioural Scientist, 45, pg. 989-1016. Available at: https://journals.sagepub.com/doi/abs/10.1177/0002764202045006005?casa_token=l7LNHutjMuMAAAAA:2rlUjMQ3C1iA89hvlc97kVAePXNS2fLNz85xfgIQDzEo4MTcH8OUaKUKhrVEZGId07vxKwHljV25qg (Accessed on: 12/03/2019)
  15. Robert S. Mueller III (2012), Combatting Threats in the Cyber World: Outsmarting Terrorists, Hackers, and Spies. prepared remarks at RSA Cyber Security Conference, Available at http://www.fbi.gov/news/speeches/combating-threats-in-the-cyber-world-outsmarting-terrorists-hackers-and-spies (Accessed on: 13/03/2019)
  16. Robert W. (2016). Terror on the Internet: The New Arena, The New Challenges. New York Times Book Review
  17. Sterner, E. (2011). Retaliatory deterrence in cyberspace. Strategic Studies Quarterly. Spring, pg. 62- 80. Available at https://deepsec.net/docs/t/Retaliatory%20Deterrence%20in%20Cyberspace.pdf (Accessed on: 09/03/2019).
  18. Suwajanakorn, S., Seitz, S.,M., & Kemelmacher-Shlizerman, I., (2017). Synthesizing Obama: Learning Lip Sync from Audio, ACM Transactions on Graphics, 36(4). Available at https://dl.acm.org/citation.cfm?id=3073640 (Accessed on 10/03/2019).
  19. Taylor, R., Caeti, T., Loper, D., Fritsch, E., Liederbach, J. (2006). Digital crime and digital terrorism. NJ: Pearson.
  20. Tucker, D. (2000). The future of armed resistance: Cyberterror? Mass destruction? University Pantheon-Assas (Paris II). Monterey,: U.S. Naval Postgraduate School. Available at https://apps.dtic.mil/dtic/tr/fulltext/u2/a470542.pdf (Accessed on: 08/03/2019).
  21. Wilkin, J., (2018). Mapping Social Media with Facial Recognition: A New Tool for Penetration Testers and Red Teamers. Available at https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/mapping-social-media-with-facial-recognition-a-new-tool-for-penetration-testers-and-red-teamers/ (Accessed on: 15/03/2019).
  22. Zerzri M. (2017). The Threat of Cyber Terrorism and Recommendations for Countermeasure. Center for Applied Policy Research. Available. at https://www.cap-lmu.de/download/2017/CAPerspectives-Tunisia-2017-04.pdf (Accessed on: 05/03/2019)
29 April 2022
close
Your Email

By clicking “Send”, you agree to our Terms of service and  Privacy statement. We will occasionally send you account related emails.

close thanks-icon
Thanks!

Your essay sample has been sent.

Order now
exit-popup-close
exit-popup-image
Still can’t find what you need?

Order custom paper and save your time
for priority classes!

Order paper now