From Wikispooks
Jump to: navigation, search
Concept.png "Cyberterrorism" 
Interest of Cyber Threat Intelligence Integration Center
The use of computers by "terrorists" to cause disruption. This is an arena in which the determination of responsibility is particularly difficult, and therefore false flag attacks arethat much more easy.

Cyberterrorism, like "terrorism", is a rather loosely defined term which has been criticised by authoritative computer security specialists[1]. It is generally invoked by the commercially-controlled media, often rather implausibly, to suggest that unless governments have strict control over the internet, bad things will happen. The intelligence agencies of US and Israel are generally reckoned to have the greatest expertise in this area.

Internet use

The internet, and especially the World Wide Web, has been unprecedentedly successful at allowing free exchange of information. As such, it is seen as a threat by those who have dark secrets to keep. Particularly after the Snowden Affair, the NSA is recognised as possessing the world's most technologically advanced mass surveillance capabilities.

In 2016, the US Department of Homeland Security requested $1 million to develop a public-service campaign designed to increase awareness of online threats. The new initiative will be modeled on the “If You See Something, Say Something” effort rolled out after the Sept. 11 attacks and “will look to raise public and private sector awareness of cybersecurity and to emphasize the importance of cyber awareness and information safekeeping.”[2]

By "Terrorists"

Increasingly, the threat of internet use by "terrorists" is mooted as justification for internet censorship. In 2014, the head of counter-terrorism at Scotland Yard, Assistant Commissioner, Mark Rowley stated "There are some different dynamics today, where we have an increasing number of people who weren't previously on the "terrorism" radar being attracted by an ideology they see on social media". He also claimed that counter-terrorism officers were removing more than 1000 online postings a week.[3] After the November 2015 Paris attacks a proposal was made (and rejected) to ban public WiFi networks.

By Intelligence agencies

Although precise information is lacking, intelligence agencies appear to be the most skilled creators of malware, notably the NSA and the Mossad. The USA has been reported as creating Stuxnet[4] of such complexity, combining so many different techniques, that it was immediately suspected to have been government sponsored. Since Stuxnet (2010), related malware has been detected including Duqu (2011) and Regin (November 2014).

DDOS Attacks

Various DDOS attacks have been launched against the internet's 13 root name servers (on 30 November 2015, 6 February 2007, and 21 October 2002). Their scale and duration (the 30 November 2015 attack lasted 48 hours) prompted the suggestion that "only a government could have this much clout."[5]

Promotion of fear

Fear of cyberterrorism is stoked by films as the 2013 "docu-drama" American Blackout, which IMDB introduces with the hyperbole that "Hacking into urban infrastructures isn't science fiction anymore - it's in the news every day." The film is a work of fiction; its only claim of 'documentaryhood' would appear to occasional real quotes, such as one by Richard Andres with which it begins:
“A massive and well-coordinated cyber attack on the electric grid could devastate the economy and cause a large-scale loss of life.”
Richard Andres - [6]

Geographic location

In September 2014 Bloomberg reported on a honeypot that two researchers established to investigate the sources of cyberterrorism. They reported that most cyberattacks on it were from US, followed by China, Russia and Netherlands in that order.[7]



     Page name     TypeDateAuthor(s)Subject(s)Description
StuxnetA production of the NSA and Unit 8200, designed to sabotage Iranian efforts to develop nuclear weapons.

Related Documents

TitleTypePublication dateAuthor(s)Description
Iain Lobban Addressspeech12 October 2010Iain LobbanMr Lobban addresses a selected audience of journalists, opinion formers, government officials, academia and industry representatives on issues related to cyber security and the threat posed by cyber attacks.
File:Operation-shady-rat.pdfreport2 August 2011Dmitri Alperovitch

Related Quotation

Transportation Security AdministrationEl Reg: "Sonic Screwdriver is cleared aimed at molesting seized machines, or during black bag operations, not at interfering with factory-fresh products in transit."

Do it at airports during a customs inspection. Take the computer out of the owner's sight and install whatever you want.

Or better still, come up with some sort of bogus excuse to force everyone to put their laptops in checked baggage, and then do it in the baggage handling process. That way the subject wouldn't know they had been targeted. Not that anyone would ever dream of doing something as disruptive as arbitrarily forcing people to check their laptops of course...”
23 March 2017


Facts about "Cyberterrorism"
ConstitutesTerrorism +
DescriptionThe use of computers by "terrorists" to cause disruption. This is an arena in which the determination of responsibility is particularly difficult, and therefore false flag attacks arethat much more easy. +
Display docTypeWikiSpooks Page +
Display imageFile:cyberterrorism.jpg +
Display image2File:Cyberterrorism.jpg +
Has fullPageNameCyberterrorism +
Has fullPageNameeCyberterrorism +
Has imageFile:Cyberterrorism.jpg +
Has image2File:cyberterrorism.jpg +
Has noRatings0 +
Has objectClassConcept +
Has objectClass2Concept +
Has revisionSize4,789 +
Has revisionUserRobin +
Has wikipediaPagehttps://en.wikipedia.org/wiki/Cyberterrorism +
Has wikipediaPage2https://en.wikipedia.org/wiki/Cyberterrorism +
Is not stubtrue +
So calledtrue +
Has subobject
"Has subobject" is a predefined property representing a container construct that allows to accumulate property-value assignments similar to that of a normal wiki page.
Cyberterrorism +