Vojenské rozhledy / Czech Military Review Nr. 2/2013: 94-102
The Conceptualization of CyberterrorismReviewed - Review
The purpose of this paper is to define cyberterrorism phenomenon with the use of available documents, reports, and expert texts, and to evaluate its role and occurrence in contemporary world's events. The cyberterrorism is very often discussed nowadays, but there is a total lack of any consensus as far as a precision definition is concerned. The critique of current state is summarized at the end of the final chapter, describing leading causes of present situation, i.e. a situation when the cyberterrorism is discussed, politicised, all repeatedly underline its dangerousness, but in practice no cyber attract has occurred.
Keywords: Conceptualization, cyberterrorism, electronic attack, hacker, hackerspace communities, data collection, cyber criminality, industrial espionage.
Published: June 15, 2013 Show citation
References
- Kybernetický terorismus. Praha: Ministerstvo vnitra České republiky - Odbor bezpečnostní politiky, 2009 [cit. 2013-02-11] Dostupné z http://www.mvcr.cz/clanek/typologie-terorismu.aspx?q=Y2hudW09NA%3d%3d.
- Strategie boje proti terorismu. Praha: Ministerstvo vnitra České republiky - Odbor bezpečnostní politiky, 2010 [cit. 2013-02-11] Dostupné z http://www.mvcr.cz/soubor/nap-2010-pdf.aspx.
- Bezpečnostní strategie České republiky. Praha: Ministerstvo zahraničních věcí ČR, 2011 [cit. 2013-02-11] Dostupné z http://www.mzv.cz/file/69991/Bezpecnostni_strategie_CR_2011.pdfle/69991/Bezpecnostni_strategie_CR_2011.pdf.
- JIRÁSEK, Petr - NOVÁK, Luděk - POŽÁR, Josef. Výkladový slovník kybernetické bezpečnosti. Praha: Policejní akademie ČR, 2012 [cit. 2013-02-11] Dostupné z http://www.cybersecurity.cz/data/slovnik_v150.pdf.
- JANOUŠEK, Michal. Kyberterorismus: terorismus informační společnosti. Obrana a strategie, 2/2006 [cit. 2013-02-11] Dostupné z http://www.mocr.army.cz/mo/obrana_a_strategie/2-2006cz/janousek.pdfpdf.
- JIROVSKÝ, Václav. Kybernetická kriminalita. Praha: Grada, 2007. 284 s. ISBN 978-80-247-1766-1.
- JIROVSKÝ, Václav - HNÍK, Václav - KRULÍK, Oldřich. Kybernetické hrozby: Výzva pro moderní společnost. Současnost a budoucnost krizového řízení 2006. Praha: T-SOFT s.r.o., 2006.
- LIEBERMAN, Danny. A strategy for combating cyber terror. Software Associates, 2011 [cit. 2013-02-11] Dostupné z http://www.software.co.il/2011/07/a-strategy-for-combating-cyber-terror/.
- SAINT-CLAIRE, Steve. Overview and Analysis on Cyber Terrorism. Florence: School of Doctoral Studies of the European Union. Department of Engineering and Technology, 2011. [cit. 2013-02-11] Dostupné z http://www.iiuedu.eu/press/journals/sds/SDS_2011/DET_Article2.pdf.
- TAFOYA, William L. Cyber Terror. FBI Law Enforcement Bulletin [cit. 2013-02-11] Dostupné z http://www.fbi.gov/stats-services/publications/law-enforcement-bulletin/november-2011/cyber-terror.
- JARVIS, Goerge. Comprehensive Survey of Cyber-Terrorism. St. Louis: Washington University in St. Louis, Department of Science and Engineering, 2011[cit. 2013-02-11] Dostupné z http://www.cse.wustl.edu/~jain/cse571-11/ftp/terror.pdfwustl.edu/~jain/cse571-11/ftp/terror.pdf.
- GREEN, Joshua. The Myth of Cyberterrorism. Washington DC, The Washington Monthly, 2002 [cit. 2013-02-11] Dostupné z http://www.washingtonmonthly.com/features/2001/0211.green.html.
- CAVELTY, Myriam Dunn. Cyber-Terror-Looming Threat or Phantom Menace? Haworth Press, Journal of Information Technology & Politics, Vol. 4(1) 2007 [cit. 2013-02-11] Dostupné z http://ethz.academia.edu/MyriamCavelty/Papers/450281/Cyber-Terror_Looming_Threat_or_Phantom_Menace_The_Framing_of_the_US_Cyber-Threat_Debateacademia.edu/MyriamCavelty/Papers/450281/Cyber-Terror_Looming_Threat_or_Phantom_Menace_The_Framing_of_the_US_Cyber-Threat_Debate.
- GORDON, Sarah - FORD, Richard. Cyberterrorism? Cupertino: Symantec Security Response. 2003. [cit. 2013-02-11] Dostupné z http://www.symantec.com/avcenter/reference/cyberterrorism.pdf.
- CLARKE, Richard A. How China Steals Our Secrets. The New York Times, 2012 [cit. 2013-02-11] Dostupné z http://www.nytimes.com/2012/04/03/opinion/how-china-steals-our-secrets.html.
- JACKSON, William. Is a 'digital Pearl Harbor' in our future? Vienna, GCN, 2009 [cit. 2013-02-11] Dostupné z http://gcn.com/Articles/2009/12/04/digital-Pearl-Harbor.aspx.
- DICKMAN, Frank. Hacking the industrial SCADA network. Houston, Pipeline & Gas Journal, November 2009 Vol. 236 No. 11. [cit. 2013-02-11] Dostupné z; GILLINGWATER, Paul. The Myth of CyberTerrorism. Insecurity: Musings on Risk Management, 2009. [cit. 2013-02-11] Dostupné z http://security-risk.blogspot.com/2009/10/myth-of-cyberterrorism.htmlblogspot.com/2009/10/myth-of-cyberterrorism.html.
- ZETTER, Kim. How Digital Detectives Deciphered Stuxnet, the Most Menacing Malware in History. Wired - Threat Level, 2011. [cit. 2013-02-11] Dostupné z http://www.wired.com/threatlevel/2011/07/how-digital-detectives-deciphered-stuxnet/all/12011/07/how-digital-detectives-deciphered-stuxnet/all/1; FALLIERE, Nicolas - O MURCHU, Liam - CHIEN, Eric. W32 Stuxnet Dossier. Cupertino: Symantec - Security Response, February 2011. [cit. 2013-02-11] Dostupné z http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_stuxnet_dossier.pdfresponse/whitepapers/w32_stuxnet_dossier.pdf.
- HOLLIS, David M. Cyberwar Case Study: Georgia 2008. [cit. 2013-02-11] Bethesda, Small Wars Journal, 2011. Dostupné z; MSHVIDOBADZE, Khatuna. State-sponsored Cyber Terrorism: Georgia's Experience. Tbilisi: Georgian Foundation for Strategic and International Studies, 2011[cit. 2013-02-11] Dostupné z http://www.gfsis.org/media/download/GSAC/cyberwar/State-sponsored_Cyber_Terrorism.pdf.
- ABRAMS, Marshall - WEISS, Joe. Malicious Control System Cyber Security Attack Case Study. Maroochy Water Services, Australia. Gaithersburg: National Institute of Standards andTechnology, Computer Security Division, 2008[cit. 2013-02-11] Dostupné z http://csrc.nist.gov/groups/SMA/fisma/ics/documents/Maroochy-Water-Services-Case-Study_report.pdf.
- FEUERBERG, Gary. Commission Hears Extent of China's Espionage and Cyber Terrorism. Washington DC, The Epoch Times, 2009[cit. 2013-02-11] Dostupné z http://www.theepochtimes.com/n2/world/china-espionage-cyber-terrorism-16827.htmlworld/china-espionage-cyber-terrorism-16827.html; ODIOGOR, Hugo. U.S, China bicker over Cyber terrorism. Lagos, Vanguard, 2011.[cit. 2013-02-11] Dostupné z http://www.vanguardngr.com/2011/08/u-s-china-bicker-over-cyber-terrorism/com/2011/08/u-s-china-bicker-over-cyber-terrorism/.
- WILSON, Clay. Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress. Washington DC, Congressional Research Service, 2008; 2012 [cit. 2013-02-11] Dostupné z http://www.fas.org/sgp/crs/terror/RL32114.pdf.
- SCHWATRZ, Mathew J. Red October Espinage Network Rivals Flame. Manhasset, Information Week - Security, 2013 [cit. 2013-02-11] Dostupné z http://www.informationweek.com/security/attacks/redoctober-espionage-network-rivals-fla/240146215espionage-network-rivals-fla/240146215.
- JACOBY, David. Mass Defacements: the tools and tricks. Moskva, Kaspersky - Securelist, 2010 [cit. 2013-02-11] Dostupné z http://www.securelist.com/en/analysis/204792127/Mass_Defacements_the_tools_and_trickthe_tools_and_trick.
- ADDLEY, Esther - HALLIDAY, Josh. WikiLeaks supporters disrupt Visa and MasterCard sites in 'Operation Payback'. London, The Guardian, 2012 [cit. 2013-02-11] Dostupné z http://www.guardian.co.uk/world/2010/dec/08/wikileaks-visa-mastercard-operation-paybackco.uk/world/2010/dec/08/wikileaks-visa-mastercard-operation-payback.
- BRIGHT, Peter. Anonymous speaks: the inside story of the HBGary hack. Ars Technica, 2011. [cit. 2013-02-11] Dostupné z http://arstechnica.com/tech-policy/news/2011/02/anonymous-speaks-theinside-story-of-the-hbgary-hack.ars/1story-of-the-hbgary-hack.ars/1.
- MARTIN, Adam. Anonymous Goes After the Pepper Spray Cop's Personal Info. Washington, DC, Atlantic Wire, 2011 [cit. 2013-02-11] Dostupné z http://www.theatlanticwire.com/national/2011/09/anonymous-goes-after-pepper-spray-cops-personal-info/42960/anonymous-goes-after-pepper-spray-cops-personal-info/42960/.
- ŘEHÁK, D. - FOLTIN, P. - STOJAR, R. Vybrané aspekty soudobého terorismu. Praha: MO ČR-AVIS, 2008, 144 str., ISBN 978-80-7278-443-1, kapitola 6.2.2, Nezbraňové prostředky, str. 75.
- DENNING, Dorothy. Whither Cyber Terror? New York, A Social Science Research Council Essay Forum. "10 Years After September 11", September 2011 [cit. 2013-02-11] Dostupné z http://essays.ssrc.org/10yearsafter911/whither-cyber-terror/whither-cyber-terror/
- DENNING, Dorothy. Take This Joke Seriously. Toronto, The Mark, 2011. [cit. 2013-02-11] Dostupné z http://www.themarknews.com/articles/5844-take-this-joke-seriously.


