congresso.sifweb.org
Presynaptic control of GABAergic neurotransmission by GABAB and group I mGlu heteromers in nerve endings isolated from rat cerebral cortices. I. A. Samengo and M. Martire. Institute of Pharmacology, School of Medicine, Catholic University of Sacred Heart, Rome, Italy. Interaction between different transmitter receptor systems is an emerging feature of neurotransmission at central synaps
Abstract—Cyberterrorism represents the convergence of the
One of its members was a candidate for political office
Theological beliefs often justify the use of violence and
from a major political party. Computer sophistication is also
can include the sacrifice of one’s own life. According to
shown by StormFront through use of the internet. Their website
Nelson [11], in contrast to revolutionary terrorism, religious
has numerous boards covering topics like ideology, science,
violence may be unfocused and target the wider masses
home schooling and self-defense. It also hosts news stories,
through advanced structured attacks that offer rewards and
content aimed at children and links to various racist
comply with ideology and goals of religious terrorism.
organizations. StormFront has an internet virtual community for white extremist families and white extremist singles.
Ethno-nationalist groups are fighting to establish a new
political order based on ethnic dominance/homogeneity [15].
The Boeremag is believed to use the internet to generate
Examples of groups seeking political autonomy include
support in South Africa. The group communicates via
Provisional Irish Publican Army (PIRA), various Sikh
newsgroups, email and Small Message Service (SMS).
movements in India, Palestinian Liberation Army, Kurdish
Supporters use Global Positioning Systems (GPS) to plan and
Workers Party (PKK) in Turkey, Basque ETA in Spain and
execute activities. GPS co-ordinates and recently visited
the Liberation Tamil Tigers of Eelam (LTTE) in Sri Lanka.
locations become evidence in trials [8].
Ethno-nationalists want to achieve publicity and international recognition for their cause and have been shown to
demonstrate violent tendencies. In contrast to religious extremists, ethno-nationalists tend to have specific targets and
In 2001 and 2002, this hacking group was considered the
would typically include symbols of the state like public
most active hacking organization on the internet. Their
officials, public facilities or utilities, and members of other
objective is to liberate Kashmir. As part of hacking activities,
members have defaced websites and left profane and insulting messages [9]. The target was the Indian community.
If the terrorist is in close proximity of the target (with a
local operating base), conventional physical attacks are more
likely as they are simpler to execute. If the target has a different geographical location, cyberterror attacks could be
After having introduced various examples and types of
advantageous, as networked resources can be used to achieve
groups, the types of terrorists can be classified. To explain
traditional terrorism, some psychological theory will be given. This helps to explain the motivation of a terrorist in response to
Ethno-national separatists rely on the support of local
emotional, political and social factors. Armistead [10], Nelson
members, as well as the sympathy of the international
et al. [11] and Weimann [12] discuss the following types of
community. Thus, it is imperative that any violent action is
portrayed as purposeful and deliberate. Cyberterror attacks that cause a disruption in service can be beneficial in
Religious: have strong theological beliefs.
promoting a cause. This also eliminates casualties and injuries
Ethno-national separatist: establish new political order,
that occur as a result of violent or biological protests.
Accordingly, cyberterror attacks that interrupt services are
Revolutionary (Terrorism to the left): aim to seize
an attractive option as damages are limited and such activity
can generate support and interest in a cause. However, basic attacks can have the opposite effect than its original intention.
Far-right extremist (Right wing): believe certain
For example, a planned DoS attack could show up as
increased levels of spam or as an unusual amount of requests and go unreported. Like other terrorist groups, ethno-
New Age: usually focus on one issue (for example
nationalists can use ICT to promote their cause through
propaganda and gathering international support.
Hackers: technically competent group with various motivations including activism, financial or challenge-
C. Social revolutionary (Terrorist of the Left)
Social revolutionists seek to overthrow the capitalist
Another type of terrorism, discussed by Whelpton [13], is
economic and social order [13, 15]. Targ [16] also states that
Retributional. The next few sections discuss each of the types
revolutionary terrorism consists of a strategy to seize political
power. Such a movement would form part of a radical social and political transformation characteristic of a terrorist group. Examples of left-wing terrorist groups include the Red Army
Faction (who have kidnapped and assassinated people they
Laqueur [14] states that many terrorist groups traditionally
blamed for economic and political repression) and the Italian
contain strong quasi-religious fanatical elements, for only total
Brigades (who have carried out computer attacks).
certainty of belief (or total moral relativism) provides justification for taking lives. Al Qaeeda is a typical example.
Social revolutionists do not wish to maintain current
structure and rules. Part of the social revolt is a plan to build a
new and just society [13]. The usefulness of cyberterror
(use pseudonyms). Targets can include web and mail servers,
attacks is dependant on the information infrastructure of the
financial systems, banks, e-commerce and various other critical
region (whether it is more rural or urban). Previously, ICT was
mainly used by the government and state purposes. However,
Hackers are technical experts that can use infrastructure to
due to the advent of globalization and technological
make political statements and exploit vulnerabilities. Hackers
advancement, ICT is accessible to the wider population. ICT
demonstrate their own technological prowess and the target’s
therefore provides a useful medium through which
technological weakness. Their activities can be linked to
communications can be distributed to the public. Unfocused
criminal acts. Criminal implications include:
disturbances of this medium may therefore be counter-productive. Focused attacks on the government and
Financial: theft of funds, credit card numbers,
corporations may be useful in protesting against commercial
and capitalist regimes and demonstrating an opposed standpoint to state.
Loss of availability: take down critical servers, crash websites.
D. Far-right extremism (Right-wing)
Loss of integrity: malicious data modification,
According to the Israeli political scientist, Ehud Sprinzak,
right-wing terrorism is characterized by the process of “split-
deligitimation” in which not only the “outsider” (
Hacking skills to a large extent can be used to carry out
terrorism stemming from the other types. Political, social or
foreigners, ethnic and religious minorities) is targeted, but
religious reasoning needs to be a core motivating factor.
contemporaneously the state itself, as they are seen as
When Janczewski & Colarik [19] talk of the distinction
ineffective or worse under the sway of the outsiders [17]. Far-
between cyber terror and cyber crime, they say the answer
right extremists can be racist organizations that are willing to
does not lie in the mechanics of the event, but rather in the
use terrorism to repress other racial and ethnic groups who are
intent that drove the person’s actions.
perceived as the enemy [13]. Examples include Nazis and Italian neo-fascists. Cyberterror is an unattractive option as unfocused attacks could cause harm to the group’s own
The Retributional terrorist has a strong belief that a penalty
needs to be inflicted in order to rectify a past wrongdoing.
Group members could mainly use ICT infrastructure for
Thus, the act of revenge is justified. According to Whelpton
propaganda, selling of survivalist gear and distribution of hate
[13], the mental status of such individuals might appear
material. Far-right extremism is characterized by the strong
normal, without any sign of psychosis, but when discussing the
belief in superiority that justifies the cleansing of the inferior
incident, signs of anger and resentment may surface. Behavior
that may include violence. Far-right extremists mainly use ICT
could also be attributed to Post Traumatic Stress Disorder.
for communication, as disruptive attacks interfere with operations and do not meet psychological goals.
The previous sections discussed various types of terrorist
Gearson [18] discusses the vulnerability of modern
groups and indicate that cyberterrorism can have the same
societies to unconventional attacks. New Age terrorism has
motives as traditional terrorist, but use computer and network
developed from the shift towards violence, as a form of
mediums for attacks. In this way, cyberterrorism may span
protestation when traditional method of campaigning do not
aspects of traditional terrorism and computer crime.
yield results sufficiently fast enough. Examples are animal
Cyberterrorism acts can form part of cybercrime with the
rights groups like the Animal Liberation Front (ALF) who have
use of security and hacking knowledge to electronically leave
targeted research on animals by pharmaceutical companies.
an impact through a threat, disturbance or infliction of violence
[20]. This seeks to cause fear and influence the opinion of the
Other examples are anti-abortion or environmental groups.
government and public. ICT infrastructure can also provide
New Age groups mainly have one targeted goal and not a
many supportive functions. Jenkins [21] talks of functionally
broad range spectrum of issues like social-revolutionary
specialization tasks like recruiting, propaganda planning,
activists. Cyberterror activities can be used to disrupt e-
logistics, finance. Whelpton [13] also discusses the hype that
commerce and web-based advertising (dependant of ICT
is created through media attention and the potential moral
vulnerabilities). Unstructured attacks on low-level targets could
disengagement from society. These issues are elaborated on
Hackers possess advanced technical skills and are thus able
Terrorism is often referred to as theatrical in nature. Acts
to attack systems. Hackers can operate in isolation or as part of
are comparable to the staging of a performance that seeks to
a group (typically not a hierarchical structure). Hackers prefer
have a wide-spread response. By using the media, attacks can
to remain anonymous and build reputation in the underground
be widely publicized. A spotlight is placed on the group and
hacking world where they gain notoriety for their successes
their message is more widely distributed. Brutal images from
suicide bombings and explosions bombard news reports.
ensure activity and the rest of the money is safely
Accordingly, the virtual battle space has introduced various
Members may feel that their actions are justified as they
Fake internet drugs - harmful ingredients are used.
need retribution. Since there is no governing body that
These include arsenic, boric acid, leaded road paint,
controls the Internet, disgruntled individuals are able to voice
floor and shoe polish, talcum powder, chalk and brick
their opinions and even establish hate/racist websites. False
dust, and nickel. In one elaborate scheme, Americans
information can also be published. Terrorist websites are able
believed they were buying Viagra but the drugs are
to promote their causes by rationalizing and justifying their
fake and the money paid is actually used to fund
Middle Eastern terrorism. The UK Medicine and Healthcare Regulatory Agency reports that up to 62%
of the prescription medicine on sale on the internet,
The internet can be used to collect background information
without requiring a prescription, are fake.
in preparation for an attack, e.g. websites showing detailed
instructions on making bombs, rocker flamethrowers, other
Stealing money and money laundering, keep to low
lethal weapons and poisons. Examples include the “Anarchist
Cookbook ” from David Copland (recipes and instructions for various weapons) as well as works by Volker van der Graaf.
Computers and networks can thus serve as useful tools to
This work provides a high-level summary of the types of
facilitate other terrorist attacks – for example the co-ordination
terrorist groups and motivating forces. Future work entails
of a kinetic attack by using email, web sites and discussion
investigating the technical means that groups use ICT
forums to provide instructions (location and guidance to
infrastructure to support terrorist activities. This involves
examining topics like anti-forensics techniques, social networking tools and electronic propaganda. In addition,
countermeasure strategies in the combat of cyberterrorism will
Due to the wide and diverse spectrum of the internet,
terrorist groups have been able to reach a number of users identified as potential members. The skills and personality of
ICT users may suit the terrorist organization (young, middle-
This paper addressed the motivation behind cyberterror by
initially discussing a few incidents of cyberterror, as well as
activities of known terrorism groups. The paper also presents a classification of various terrorist groups, as well as a
Direct communication with potential members
description of ICT support functions of terrorism in general.
Thus, insight can be gained into the psychological forces driving cyberterrorism today.
Music - examples include white power music from supremacy and hip-hop Islamic music
Honeypots - linked to other websites and message
1] M. M. Pollitt. “Cyberterrorism - fact or fancy ?”, Computer Fraud & Security, vol 1998 (2), pp. 8-10, 1998.
Gaming - encouragement of violent tendencies with
[2] S. Gordon and R. Ford.,” Cyberterrorism? Comput. Secur.”, vol 21(7), pp.
636-647, 2002. [3] D. Denning, “Cyberterrorism”, Testimony before Special Oversight
Panel on Cyberterrorism, Georgetown University, 2000. [4] Thinkquest.org October 2004 web site contest. “Cyberterrorism”,
Terrorist use various practices to generate funds to support
http://library.thinkquest.org/04oct/00460/cyberterrorism.html [5] R. Nagpal, Defining cyber terrorism. WebmasterDigest, 2005 .
Online auctioneering - two partners, also known as
[6] D. Kramarenko, "Terrorism and high technologies,"Computer Crime
smurfs, arrange a fake transaction to move money. One
Research Cenrre, Accessed 20040414, Available online at
partner bids on an item and pays the auction amount to
http://www.crime-research.org/news/04.14.2004/211. [7] K. B. Olson, Aum shinrikyo: Once and future threat? Emerging Infectious
the auction house. The other partner receives payment
for the fake auction item. Scams also involve bidding
[8] B. Grobler, "What is cyber terrorism and what is at risk?" in Cyber
Terrorism 2009 Seminar, South Africa: Ekwinox, 2009, . [9] M. M. Elmusharaf, Cyber terrorism:The new kind of terrorism. Accessed
Online casinos - when dealing with large sums of
money, a helpful technique is to place it in on an online
gambling site. Thereafter, small bids are made to
[10] L. Armistead, Information Operations: Warfare and the Hard Reality of
[17] G. Michael, Confronting Right Wing Extremism and Terrorism in the
Soft Power, Pontomac Books, Dulles VA United States, 2004 .
USA, Routledge, New York and London, 2003 .
[11] B. Nelson, R. Choi, M. Iacobucci, M. Mitchell and F. Gagnon.
[18] J. Gearson, “The nature of modern terrorism. The Political Quarterly”,
Cyberterror prospects and implications. Centre for the Study of Terrorism and
[19] L. Janczewski and A. M. Colarik., Cyber Warfare and Cyber Terrorism,
[12] G. Weimann, Cyberterrorism: How real is the threat? United States
Institute of Peace. Washington, United States, 2004.
[20] N. Veerasamy, "Towards a conceptual framework for cyberterrorism," in
[13] J. Whelpton, "Psychology of cyber terrorism," in Cyberterrorism 2009
Proceedings of the 4th International Conference on Information Warfare and
Security, Cape Town, South Africa, 2009, pp. 129-137.
[14] W. Laqueur, “Postmodern terrorism”, Foreign Affairs 75, pp. 24, 1996.
[21] B. M. Jenkins. 2006, The new age of terrorism , Mcgraw-Hill, New York
[15] J. M. Post, "The New Face of Terrorism: Socio-Cultural Foundations of
Contemporary Terrorism," Behav. Sci. Law, vol. 23, pp. 451-465, 2005.
[22] N. Veerasamy, "A high-level conceptual framework of cyberterrorism,"
[16] H. R. Targ, Societal structure and revolutionary terrorism: A preliminary
Journal of Information Warfare, vol. 8, pp. 42-54, 2009.
investigation. The Politics of Terrorism pp. 127-152, 1988.