Addressing the spectre of cyber terrorism: a comparative perspective

Authors

  • Fawzia Cassim University of South Africa

DOI:

https://doi.org/10.17159/1727-3781/2012/v15i2a2494

Keywords:

Cyber space, cyber terrorists, cyber crime, cyber terrorism, hacktivism, legislation, international legislation, anti-terrorist legislation, cyber security, computer networks, critical infrastructure, United States of America, United Kingdom, India, South

Abstract

This article looks at the definition of cyber terrorism and terrorist use of the Internet. The article evaluates cyber terrorist threats facing countries such as the United States of America, the United Kingdom, India and South Africa. The article also examines measures introduced by the respective governments in these countries to counteract cyber terrorist threats. Finally, the article will propose a way forward to counteract such possible threats in the future.

 

The face of terrorism is changing. The convergence of the physical and virtual worlds has resulted in the creation of a “new threat” called cyber terrorism. Cyber terrorism is one of the recognised cyber crimes. The absence of suitable legal frameworks to address cyber terrorism at national and regional levels, the lack of adequate safeguards, the lack of cyber security strategies and the pre-occupation of countries with internal factors have all contributed to the creation of an environment that can be easily infiltrated by cyber terrorists.

 

The horrific events of 9/11 provided the impetus for many countries to introduce anti-terrorist legislation. The United States of America, United Kingdom, India and South Africa have introduced legislation to address the threat of cyber terrorism.

     1_ScienceOpen_Log03432128.png

Downloads

Download data is not yet available.

References

Bibliography

Basdeo 2011 Proceedings of the First International Conference of the South Asian Society of Criminology and Victimology (SASCV)

Basdeo V “Terrorist financing in Southern Africa: African commitment to combating terrorism” Proceedings of the First International Conference of the South Asian Society of Criminology and Victimology (SASCV) 15-17 January 2011 Jaipur 49-52

Bazelon D et al 2006 The American Criminal Law Review

Bazelon D et al “Computer crimes” 2006 The American Criminal Law Review 43 260-308

Brunst P W 2010 Springer

Brunst PW “Terrorism and the Internet: New Threats Posed by Cyber terrorism and Terrorist Use of the Internet” in A War on Terror? The European Stance on a New Threat, Changing Laws and Human Rights Implications Wade M and Maljevic A (ed) (2010 Springer) 51-78

Cassim F 2009 PER

Cassim F “Formulating specialised legislation to address the growing spectre of cybercrime: A comparative study” 2009 PER 36-79

Cassim F 2011 CILSA

Cassim F “Addressing the growing spectre of cyber crime in Africa: evaluating measures adopted by South Africa and other regional role players” 2011 CILSA XLIV 123-138

Cassim F 2011Proceedings of the Third Annual Conference of Asian Criminological Society (ACS)

Cassim F “Combating Cyber Terrorism in South Africa: Are Adequate Measures in Place?” Proceedings of the Third Annual Conference of Asian Criminological Society (ACS) 17-19 December 2011 Taiwan 96-105

Conway M 2007 Praeger Security International – Greenwood Publishing

Conway M “Terrorism and New Media: the Cyber Battle Space” in Countering Terrorism and Insurgency in the twenty first century James F Forest (ed) (2007 Praeger Security International – Greenwood Publishing) 1-31

Dominguez R 2008 Third Text

Dominguez R “Electronic Civil Disobedience Post 9/11: Forget Cyber-Terrorism and Swarm the Future Now!” 2008 Third Text 22(5) 661-670

Embar-Seddon A 2002 American Behavioral Scientist

Embar-Seddon A “Cyber terrorism: Are we under siege?” 2002 American Behavioural Scientist 45(6) 1033-1043

Garg N 2011 Proceedings of the First International Conference of the South Asian Society of Criminology and Victimology (SASCV)

Garg N “Cyber terrorism: The advent of E-War” Proceedings of the First International Conference of the South Asian Society of Criminology and Victimology (SASCV) 15-17 January 2011 Jaipur 121-123

Goodman MD and Brenner S 2002 International Journal of Law and Information Technology

Goodman MD & Brenner S “The Emerging Consensus on Criminal Conduct in Cyberspace” 2002 International Journal of Law and Information Technology 139-223

Guru & Mahishwar 2011 Proceedings of the First International Conference of the South Asian Society of Criminology and Victimology (SASCV)

Guru A & Mahishwar U “Terror Networking via Social Networking: Are the Laws adequate” Proceedings of the First International Conference of the South Asian Society of Criminology and Victimology (SASCV) 15-17 January 2011 Jaipur 71-73

Krapp P 2005 Grey Room Inc and Massachusetts Institute of Technology

Krapp P “Terror and Play, or What was Hacktivism?” 2005 Grey Room Inc and Massachusetts Institute of Technology 70-93

Nappinai NS 2009 International Association of IT lawyers

Nappinai NS “Cyber crime law in India: Has Law Kept Pace with Emering Trends? - An Empirical Study” in Legal Discourse in Cyberlaw and Trade Kierkegaard SM (ed) (2009 International Association of IT lawyers) 405-414

Raghavan TM 2003 Journal of Law, Technology and Policy

Raghavan TM “In Fear of Cyberterrorism: An Analysis of the Congressional Response” 2003 Journal of Law, Technology and Policy 297-312

Tushabe and Baryamureeba 2005 World Academy of Science, Engineering and Technology

Tushabe F & Baryamureeba V “Cyber Crime in Uganda: Myth or Reality?” 2005 World Academy of Science, Engineering and Technology 8 66-70

Van der Merwe et al 2008 Information and Communications Technology Law

Van der Merwe D et al 2008 Information and Communications Technology Law (Lexis Nexis)

Veerasamy 2009 4th International Conference on Information Warfare and Security

Veerasamy N 2009 “Towards a Conceptual Framework for Cyber- terrorism” 4th International Conference on Information Warfare and Security 26-27 March 2009 Cape Town

Walker 2006 Pennsylvania State Law Review

Walker C “Cyber-Terrorism: Legal Principle and Law in the United Kingdom” 2006 Pennsylvania State Law Review 110(3) 625-665

Weimann G 2005 Studies in Conflict and Terrorism

Weimann G “Cyber terrorism: The sum of all fears?” 2005 Studies in Conflict and Terrorism 129-149

Young R 2006 Boston College International and Comparative Law Review

Young R “Defining Terrorism: The Evolution of Terrorism as a Legal Concept in International Law and Its Influence on Definitions in Domestic Legislations 2006 Boston College International and Comparative Law Review 29(1) 23-103

Register of legislation

South Africa

Constitution 108 of 1996

The Electronic Communications and Transactions Act 25 of 2002 (“ECT)

The Financial Intelligence Centre Act 38 of 2001 (“FICA”)

The Prevention of Organised Crime Act 38 of 1999 (“POCA”)

The Protection of Constitutional Democracy against Terrorism and Related Activities

Act 33 of 2004 (“PCDTRA”)

The Regulation of Interception of Communications and Provision of

Communications-Related Information Act 70 of 2002 (“RICA”)

International

Convention on Cybercrime ETS 185

Information and Technology Amendment Act of India, 2008

UK Anti-Terrorism, Crime and Security Act of 2001

UK Terrorism Act of 2000

UK Terrorism Act of 2006

USA Patriot Act of 2001

Register of Internet sources

Anonymous 2011 http://www.defenceweb.co.za/index; http://cbr.co.za/news.aspx ; http://conventions.coe.int/Treaty/en/Treaties/Html/185.htm ; http://www.elaw@legabrief.co.za ; http://mg.co.za/article/2011-06-17; http://mg.co.za

/article/2010-05-31 ; http://mg.co.za/article/2010-04-19

Anonymous 2011 “South Africa to establish a national computer security incident response team” http://www.defenceweb.co.za/index [accessed on 6 October 2011]

Anonymous 2011 “SA takes first steps towards Computer Security Incident Response Team (CSIRT)” http://cbr.co.za/news.aspx [accessed on 6 October 2011]

Anonymous 2011 “European Convention on Cyber crime” http://conven

tions.coe.int/Treaty/en/Treaties/Html/185.htm [accessed on 16 February 2011]

Anonymous 2011 “eLaw and Management” http://www.elaw@legabrief.co.za [accessed on 14 September 2011]

Anonymous 2011 “Terrorists favour “easy” fake SA passports” http://mg.co.za/article/2011-06-17 [accessed on 5th October 2011]

Anonymous 2011 “There is no World Cup terror threat” http://mg.co.za/article/2010-05-31 [accessed on 3rd October 2011]

Anonymous 2011 “Right-wing link in arms cache found”

http://mg.co.za/article/2010-04-19 [accessed on 3rd October 2011]

Anonymous 2011“eLaw and Management” http://www.elaw@legabrief.co.za [accessed on 3rd October 2011]

Anonymous 2012 http://www.csoonline.com/article/700397/liberman-cybersecurity-act-of-2012; http://www.elaw@legalbrief.co.za; http://wwwnews.bbc.co.uk

Anonymous 2012 “Lieberman: Cybersecurity Act of 2012 will help us protect critical infrastructure” http://www.csoonline.com/article/700397/liberman-cybersecurity-act-of-2012 [accessed on 23 April 2012]

Anonymous 2012“eLaw and Management” http://www.elaw@legalbrief.co.za [accessed on 4 April 2012]

Anonymous “New terror laws come into force” http://wwwnews.bbc.co.uk [accessed on 1 May 2012]

Anonymous 2012 mhtml:file: // E:Warning of rise in cyber-terrorism – Crime – UK – The Independent; mhtml: file: //E:Cambridge Wireless debates UK cyber terrorism agency Business Wee...

Anonymous 2012“Al Qaida in the UK” The Independent

mhtml:file: // E:Warning of rise in cyber-terrorism – Crime – UK – The Independent [accessed on 23 April 2012]

Anonymous 2012 “Cambridge Wireless debates UK Cyber Terrorism Agency” Business Weekly mhtml: file: //E:Cambridge Wireless debates UK cyber terrorism agency Business Wee... [accessed on 23 April 2012]

Botha A 2005 http://www.jamestown.org

Botha A 2005 “PAGAD: A Case study of Radical Islam in South Africa” Terrorism Monitor 3(17) http://www.jamestown.org [accessed on 5th October 2011]

Denning D 2000 http://www/iwar.org.uk/cyberterror/resources/denning.htm

Denning D 2000 “Activism, Hacktivism, and Cyber terrorism: The Internet as a Tool for Influencing Foreign Policy” http://www/iwar.org.uk/

cyberterror/resources/denning.htm [accessed on 3 October 2011]

FATF http://www.fatf-gafi.org

FATF http://www.fatf-gafi.org [accessed on 5th October 2011]

Frauenheim E 2002http://news.cnet.com/2100-1001-977780.html?tag=fd_top

Frauenheim 2002 “IDC: Cyber terror and other prophecies” http://news.cnet.com/2100-1001-977780.html?tag=fd_top [accessed on 07 April 2012]

Gerke M 2009 http://www.itu.int/ITU-D/cyb/cybersecurity/legislation/html

Gerke M 2009 “Understanding Cybercrime: a guide for developing countries (ITU 2009)” http://www.itu.int/ITU-D/cyb/cybersecurity/legislation/html [accessed on 29 September 2011]

Gordon S & Ford R 2002 http://www.symantec.com/avcenter/

reference/cyberterrorism

Gordon S & Ford R 2002 “Cyberterrorism?” Computers and Security 21(7) 636-647 http://www.symantec.com/avcenter/reference/cyberterrorism [accessed on 29 September 2011]

Green J 2002 http://www.washingtonmonthly.com/features/2001/0211.green.html

Green J ‘The Myth of Cyberterrorism’

http://www.washingtonmonthly.com/features/2001/0211.green.html (accessed on 17 April 2012).

Jalalzai MK http://outlookafghanistan.net/topics.php?post_id=3833

Jalalzai MK “Britain faces the Threat of Cyber terrorism and Economic Warfare” The Daily Outlook http://outlookafghanistan.net/topics.php?

post_id=3833 [accessed 23 April 201]

Kufa M 2009 http://umkn-lib01.int.unisa.ac.za/nxt/gateway

Kufa M 2009 “Cybersurfing without boundaries” http://umkn-lib01.int.unisa.ac.za/nxt/gateway [accessed on 7th October 2009]

Kumar N 2010 http://www.psfk.com/2010/04

Kumar N “Africa could become the cybercrime capital of the world” http://www.psfk.com/2010/04 [accessed on 6 December 2010]

Nicholls 2002 CHRI News http://www.humanrightsiniative.org/

publicatons/hl/1/5/2012

Nicholls C” UK Anti-Terrorism Crime and Security Act 2001: Too much…too soon” CHRI News http://www.humanrightsiniative.org/publicatons/hl/1/5/2012 [accessed on 1 May 2012]

Pollit MM 1998 http://www.scribd.com/doc/

Pollit MM 1998 “Cyber Terrorism-Fact or Fancy?” http://www.scribd.com/doc/ [accessed on 3rd October 2011]

SABRIC https://www.sabric.co.za

SABRIC https://www.sabric.co.za [accessed on 16 February 2011]

Stohl M 2006 Crime Law and Social Change http://ceps.anu.edu.au/publications/

pdfs/stohl

Stohl M “Cyber terrorism: a clear and present danger, the sum of all fears, breaking point or patriot games?” Crime Law and Social Change http://ceps.anu.edu.au/publications/pdfs/stohl [accessed on 17 April 2012]

Published

25-05-2017

How to Cite

Cassim, F. (2017). Addressing the spectre of cyber terrorism: a comparative perspective. Potchefstroom Electronic Law Journal, 15(2), 380–415. https://doi.org/10.17159/1727-3781/2012/v15i2a2494

Issue

Section

Articles

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.