Title: Exploring the Intersections of Technology, Crime, and Terror
Abstract: Abstract The Internet and computer-mediated communications (CMCs) have drastically changed the way that individuals communicate and share information across the globe. Over the last two decades, financial institutions, private industry, and governments have come to rely on technology in order to access sensitive data and manage critical infrastructure, such as electrical power grids. As a consequence, the threat posed by cybercriminals has increased dramatically and afforded significant opportunities for terrorist groups and extremist organizations to further their objectives. The complex and intersecting nature of both crime and terror make it difficult to clearly separate these issues, particularly in virtual environments, due to the anonymous nature of CMCs and challenges to actor attribution. Thus, this study examines the various definitions for physical and cyberterror and the ways that these activities intersect with cybercrime. In addition, the ways that terrorists and extremist groups use the Internet and CMCs to recruit individuals, spread misinformation, and gather intelligence on various targets are discussed. Finally, the uses of computer hacking tools and malware are explored as a way to better understand the relationship between cybercrime and terror. Keywords: cybercrimecyberterrorhackinghacktivismmalware Notes Steven Furnell, Cybercrime: Vandalizing the Information Society (Boston: Addison-Wesley, 2002); David S. Wall, “Cybercrimes and the Internet,” in Crime and the Internet, ed. David S. Wall (New York: Routledge, 2001), 1–17. Heather DiMarco, “The Electronic Cloak: Secret Sexual Deviance in Cybersociety,” in Dot.cons: Crime, Deviance, and Identity on the Internet, ed. Yvonne Jewkes (Portland, OR: Willan Publishing), 53–67. Jake Brodscky and Robert Radvanovsky, “Control Systems Security,” in Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications, ed. Thomas J. Holt and Bernadette Schell (Hershey, PA: IGI-Global, 2011), 187–204; Dorothy E. Denning, “Cyber-conflict as an Emergent Social Problem,” in Corporate Hacking and Technology-Driven Crime (see previous), 170–186; Thomas J. Holt, “Subcultural Evolution? Examining the Influence of On- and Off-line Experiences on Deviant Subcultures,” Deviant Behavior 28 (2007): 171-198. Susan W. Brenner, Cyberthreats: The Emerging Fault Lines of the Nation State (New York: Oxford University Press, 2008); Dorothy E. Denning, “Activism, Hacktivism, and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy,” in Networks and Netwars: The Future of Terror, Crime, and Militancy, ed. John Arquilla and David F. Ronfeldt (Santa Monica, CA: RAND, 2001), 239–288; Jerrold M. Post, Keven G. Ruby, and Eric D. Shaw, “From Car Bombs to Logic Bombs: The Growing Threat from Information Terrorism,” Terrorism and Political Violence 12 (2000): 97–122. Brenner, Cyberthreats (see note 4 above); Bruce Hoffman, Inside Terrorism, 2nd ed. (New York: Columbia University Press, 2006); Manuel Soriano, “The Road to Media Jihad: The Propaganda Actions of Al Qaeda in the Islamic Maghreb,” Terrorism and Political Violence 23 (2010): 72–88. Brodscky and Radvanovsky, “Control Systems Security” (see note 3 above); Dorothy Denning, “A View of Cyberterrorism Five Years Later,” in Internet Security: Hacking, Counterhacking, and Society, ed. Kenneth Himmaed (Sudbury, MA: Jones and Bartlett, 2006), 123–139; Irving Lachow, “Cyber Terrorism: Menace or Myth?,” in Cyberpower and National Security, ed. Franklin D. Kramer, Stuart H. Starr, and Larry K. Wentz (Washington DC: National Defense University, 2009), 123–139. Peter N. Grabosky, “Virtual Criminality: Old Wine in New Bottles?,” Social and Legal Studies 10 (2001): 243–249. David S. Wall, “Catching Cybercriminals: Policing the Internet,” Computers & Technology 12 (1998): 201–218. See Thomas J. Holt, ed., Crime On-line: Correlates, Causes, and Context (Raleigh, NC: Carolina Academic Press, 2010). Furnell, Cybercrime (see note 1 above); Wall, “Cybercrimes and the Internet” (see note 1 above). Furnell, Cybercrime (see note 1 above); Wall, “Cybercrimes and the Internet” (see note 1 above). Holt, “Subcultural Evolution?” (see note 3 above); Bernadette H. Schell and John L. Dodge, The Hacking of America: Who's Doing it, Why, and How (Westport, CT: Quorum Books, 2002). Computer Security Institute, Computer Crime and Security Survey, 2010, http://www.cybercrime.gov/FBI2010.pdf. Computer Security Institute, Computer Crime and Security Survey, 2008, http://www.cybercrime.gov/FBI2008.pdf. Internet Crime Complaint Center, IC3 2009 Internet Crime Report, http://www.ic3.gov/media/annualreport/2010_IC3Report.pdf. IDATE, Taking Advantage of Peer-to-Peer: What Is at Stake for the Content Industry? (2009), http://www.idate.fr/an/_qdn/an-03/IF282/index_a.htm. Thomas J. Holt and Adam M. Bossler, “Examining the Applicability of Lifestyle-Routine Activities Theory for Cybercrime Victimization,” Deviant Behavior 30 (2009): 1–25. Wall, “Cybercrimes and the Internet” (see note 1 above). Niv Ahituv, Old Threats, New Channels: The Internet as a Tool for Terrorists (Berlin: NATO Workshop, (2008); Hoffman, Inside Terrorism (see note 5 above). Brenner, Cyberthreats (see note 4 above). Ibid. Marjie T. Britz, “Terrorism and Technology: Operationalizing Cyberterrorism and Identifying Concepts,” in Crime On-Line: Correlates, Causes, and Context, ed. Thomas J. Holt (Raleigh, NC: Carolina Academic Press, 2010), 193–220; Hoffman, Inside Terrorism (see note 5 above); Gus Martin, Understanding Terrorism: Challenges, Perspectives and Issues, 2nd ed. (Thousand Oaks, CA: Sage, 2006); Alex P. Schmid and Albert J. Jongman, Political Terrorism: A New Guide to Actors, Authors, Concepts, Data Bases, Theories, & Literature (New Brunswick, NJ: Transaction Publishers, 2005). Ibid., Schmid and Jongman, Political Terrorism. Ibid. Hoffman, Inside Terrorism (see note 5 above). Ibid. Ibid. Denning, “Activism, Hacktivism, and Cyberterror” (see note 4 above). Ibid. Furnell, Cybercrime (see note 1 above); Tim Jordan and Paul Taylor, Hacktivism and Cyberwars: Rebels With a Cause (New York: Routledge, 2004). Ibid. Alex P. Schmid, “Frameworks for Conceptualising Terrorism,” Terrorism and Political Violence 16 (2004): 197–221. Stefan H. Leader and Peter Probst, “The Earth Liberation Front and Environmental Terrorism,” Terrorism and Political Violence 15 (2003): 37–58. Jordan and Taylor, Hacktivism and Cyberwars (see note 29 above). Britz, “Terrorism and Technology” (see note 22 above); Dorothy E. Denning, Cyberterrorism. Testimony before the Special Oversight Panel on Terrorism Committee on Armed Services, U.S. House of Representatives, May 23, 2000, http://www.cs.georgetown.edu/~denning/infosec/cyberterror.html; Bryan C. Foltz, “Cyberterrorism, Computer Crime, and Reality” Information Management & Computer Security 12 (2004): 154–166; Mark M. Pollitt, “Cyberterrorism—Fact or Fancy?” Computer Fraud & Security 2 (1998): 8–10. Ibid. Pollitt, “Cyberterrorism—Fact or Fancy?” (see note 34 above). Denning, “Cyberconflict” (see note 3 above), p. 178; E. Alshech, “Cyberspace as a Combat Zone: The Phenomenon of Electronic Jihad,” MEMRI Inquiry and Analysis Series 329 (Washington, DC: The Middle East Media Research Institute, 2007). Foltz, “Cyberterrorism, Computer Crime, and Reality” (see note 34 above). Hollis Stambaugh, David S. Beaupre, David J. Icove, Richard Baker, Wayne Cassady, Wayne P. Williams, Electronic Crime Needs Assessment For State And Local Law Enforcement (Washington, DC: National Institute of Justice, 2001). Foltz, “Cyberterrorism, Computer Crime, and Reality” (see note 34 above). Marjie T. Britz, Computer Forensics and Cybercrime, 2nd ed. (Upper Saddle River, NJ: Prentice-Hall, 2009). Thomas J. Holt and Heith Copes, “Transferring Subcultural Knowledge Online: Practices and Beliefs of Persistent Digital Pirates,” Deviant Behavior 31 (2010): 625–654. Gary Bunt, Islam in the Digital Age: E-jihad, Online Fatwas and Cyber Islamic Environments (London: Pluto Books, 2003); Lachow, “Cyber Terrorism” (see note 6 above). Ibid.; Marc Sageman, Leaderless Jihad: Terror Networks in the Twenty First Century, (Philadelphia: University of Pennsylvania Press, 2008). James J. F. Forest, ed., Influence Warfare: How Terrorists and Governments Struggle to Shape Perceptions in a War of Ideas (Westport, CT: Praeger, 2009); and James J. F. Forest, “Influence Warfare and Modern Terrorism,” Georgetown Journal of International Affairs 10, no. 1 (2009): 81–90. Ibid. Tammy Castle, “The Women of Stormfront: An Examination of White Nationalist Discussion Threads on the Internet,” Internet Journal of Criminology (2011), http://www.internetjournalofcriminology.com/Castle_Chevalier_The_Women_of_Stormfront_An_Examination_of_White_Nationalist_Discussion_Threads.pdf; Stormfront website. www.stormfront.org; Robert W. Taylor, Eric J. Fritsch, John Liederbach, and Thomas J. Holt, Digital Crime and Digital Terrorism, 2nd ed. (Upper Saddle River, NJ: Pearson Prentice Hall, 2010). Taylor et al., Digital Crime and Digital Terrorism (see note 47 above). See the website http://www.newsaxon.com for details. Gabriel Weimann and Katharina Von Knop, “Applying the Notion of Noise to Countering Online Terrorism,” Studies in Conflict and Terrorism 23 (2009): 883–902. Britz, “Terrorism and Technology” (see note 22 above); Lachow, “Cyber Terror” (see note 6 above); Sageman, Leaderless Jihad (see note 44 above). Vivian Salma, “Ask a Terrorist,” Newsweek, 19 December 2007, http://www.newsweek.com/2007/12/19/as-a-terrorist.html. See http://www.resistancerecords.com for details. Taylor et al., Digital Crime and Digital Terror (see note 47 above). For a description of this and several other terrorist-created video games, see Madeline Gruen, “Innovative Recruitment and Indoctrination Tactics by Extremists: Video Games, Hip Hop, and the World Wide Web,” in The Making of a Terrorist, ed. James J.F. Forest (Westport, CT: Praeger, 2005). Britz, “Terrorism and Technology” (see note 22 above); Lachow, “Cyber Terror” (see note 6 above); Sageman, Leaderless Jihad (see note 44 above). Taylor et al., Digital Crime and Digital Terrorism (see note 47 above). Britz, “Terrorism and Technology” (see note 22 above); Max Kilger, “Social Dynamics and the Future of Technology-Driven Crime,” in Corporate Hacking and Technology Driven Crime: Social Dynamics and Implications, ed.Thomas J. Holt and Bernadette Schell (Hershey PA: IGI-Global, 2010), 205–227. Kilger, “Social Dynamics and the Future of Technology-Driven Crime” (see note 58 above). Paul A. Taylor, Hackers: Crime in the Digital Sublime (New York: Routledge, 1999). Gordon R. Meyer, The Social Organization of the Computer Underground (Master's thesis, Northern Illinois University, 1989). Ibid. Taylor, Hackers (see note 60 above). Ibid. Taylor et al., Digital Crime and Digital Terrorism (see note 47 above). Bill Chu, Thomas J. Holt, and Gail Joon Ahn, Examining the Creation, Distribution, and Function of Malware On-Line (Washington, DC, National Institute of Justice, 2010), http://www.ncjrs.gov./pdffiles1/nij/grants/230112.pdf. Ibid. Ibid. Thomas J. Holt, “Examining the Origins of Malware,” Paper presented at the Department of Defense Cyber Crime Conference, Saint Louis, MO, January 2008. Ibid.; Thomas J. Holt, Joshua B. Soles, and Ludmilla Leslie, “Characterizing Malware Writers and Computer Attackers in Their Own Words,” Paper presented at the International Conference on Information Warfare and Security, Peter Kiewit Institute, University of Nebraska Omaha, April 2008. Thomas J. Holt, “The Attack Dynamics of Political and Religiously Motivated Hackers,” in Cyber Infrastructure Protection, ed. Tarek Saadawi and Louis Jordan (New York: Strategic Studies Institute, 2009), 161–182. Ibid. Denning, “Cyberconflict as an Emergent Social Phenomenon” (see note 3 above). Ibid.; Taylor, Hackers (see note 60 above). Ibid. Denning, “Cyberconflict as an Emergent Social Phenomenon” (see note 3 above). Sean Paul Correll, “An Interview with Anonymous,” PandaLabs Blog, 29 September, 2010, http://pandalabs.pandasecurity.com/an-interview-with-anonymous/. Taylor et al., Digital Crime and Digital Terrorism (see note 47 above); Denning, “Cyberconflict as an Emergent Social Phenomenon” (see note 3 above). Ibid.; Kilger, “Social Dynamics and the Future of Technology-Driven Crime” (see note 58 above). Denning, “Cyberconflict as an Emergent Social Phenomenon” (see note 3 above). Holt, “The Attack Dynamics of Political and Religiously Motivated Hackers” (see note 71 above); Michael Ward, “Anti-Cartoon Protests Go Online,” BBC News, 8 February 8, 2006, http://news.bbc.co.uk/2/hi/technology/4691518.stm. Ibid. Denning, “Cyber Conflict as an Emergent Social Phenomenon” (see note 3 above). Dorothy E. Denning, Information Warfare and Security (Reading, MA: Addison-Wesley, 1999). Ryan Naraine and Dancho Danchev, “Zero Day: Coordinated Russia vs Georgia cyber attack in progress,” ZDNet, 11 August 2008, http://www.zdnet.com/blog/security/coordinated-russia-vs-georgia-cyber-attack-in-progress/1670. Taylor et al., Digital Crime and Digital Terrorism (see note 47 above). Britz, “Terrorism and Technology” (see note 22 above); Denning, “Cyber Conflict as an Emergent Social Phenomenon” (see note 3 above); Lachow, “Cyber Terror” (see note 6 above). Ibid. Ibid. See Paul K. Kerr, John Rollins, and Catherine A. Theohary, The Stuxnet Computer Worm: Harbinger of an Emerging Warfare Capability (Washington, DC: Congressional Research Service, 2010). Mark Clayton, “Stuxnet Malware is ‘Weapon’ out to Destroy … Iran's Bushehr Nuclear Plant,” Christian Science Monitor, 21 September, 2010, http://www.csmonitor.com/USA/2010/0921/Stuxnet-malware-is-weapon-out-to-destroy-Iran-s-Bushehr-nuclear-plant. Brodscky and Radvanovsky, “Control Systems Security” (see note 3 above); Denning, “A View of Cyberterrorism Five Years Later” (see note 6 above). Clayton, “Stuxnet Malware is ‘Weapon’ out to Destroy … Iran's Bushehr Nuclear Plant” (see note 91 above). Ibid. Brodscky and Radvanovsky, “Control Systems Security” (see note 3 above); Kilger, “Social Dynamics and the Future of Technology-Driven Crime” (see note 58 above). Clayton, “Stuxnet Malware is ‘Weapon’ out to Destroy … Iran's Bushehr Nuclear Plant” (see note 91 above). Kim Zetter, “DHS Fears a Modified Stuxnet Could Attack US Infrastructure,” Wired Threat Level, 20 July, 2011, http://www.wired.com/threatlevel/2011/07/dhs-fears-stuxnet-attacks/. Brenner, Cyberthreats (see note 4 above). Clayton, “Stuxnet Malware is ‘Weapon’ out to Destroy … Iran's Bushehr Nuclear Plant” (see note 91 above); Kerr et al., The Stuxnet Computer Worm (see note 90 above). Brenner, Cyberthreats (see note 4 above); Chu et al., Examining the Creation, Distribution, and Function of Malware On-line (see note 66 above); Kilger, “Social Dynamics and the Future of Technology-Driven Crime” (see note 58 above). Chu et al., Examining the Creation, Distribution, and Function of Malware On-line (see note 66 above); Taylor et al., Digital Crime and Digital Terror (see note 47 above). Holt, “Examining the Origins of Malware” (see note 69 above). Brenner, Cyberthreats (see note 4 above); Kilger, “Social Dynamics and the Future of Technology-Driven Crime” (see note 58 above). Holt et al., “Characterizing Malware Writers and Computer Attackers in Their Own Words” (see note 70 above). Britz, “Terrorism and Technology” (see note 22 above). Brenner, Cyberthreats (see note 4 above). Correll, “An Interview with Anonymous” (see note 77 above); Kevin Poulsen, “In ‘Anonymous’ Raids, Feds Work From List of Top 1,000 Protesters,” Wired, 26 July, 2011, http://www.wired.com/threatlevel/2011/07/op_payback/. Brenner, Cyberthreats (see note 4 above); Taylor et al., Digital Crime and Digital Terror (see note 47 above). Department of Defense. Department of Defense Strategy for Operating in Cyberspace, (Washington DC: Department of Defense, 2011), http://www.defense.gov/news/d20110714cyber.pdf. Ibid. Ibid. Brodscky and Radvanovsky, “Control Systems Security” (see note 3 above); Kilger, “Social Dynamics and the Future of Technology-Driven Crime” (see note 58 above). Ibid. Ibid. Adam M. Bossler and Thomas J. Holt, “On-line Activities, Guardianship, and Malware Infection: An Examination of Routine Activities Theory,” International Journal of Cyber Criminology 3 (2010): 400–420; Chu et al., Examining the Creation, Distribution, and Function of Malware On-line (see note 66 above). Ibid. Taylor et al., Digital Crime and Digital Terrorism (see note 47 above). Bossler and Holt, “On-line Activities, Guardianship, and Malware Infection” (see note 115 above). Brenner, Cyberthreats (see note 4 above). Chu et al., Examining the Creation, Distribution, and Function of Malware On-line (see note 66 above). Joshua Sinai, “Using the Internet to Uncover Terrorism's Root Causes,” in Influence Warfare, ed. James J. F. Forest (Westport, CT: Praeger, 2009). Thomas J. Holt, “Exploring Strategies for Qualitative Criminological and Criminal Justice Inquiry Using Online Data,” Journal of Criminal Justice Education, 21 (2010): 300–321. Chu et al., Examining the Creation, Distribution, and Function of Malware On-line (see note 66 above); Thomas J. Holt and Eric Lampke, “Exploring Stolen Data Markets On-line: Products and Market Forces,” Criminal Justice Studies 23 (2010): 33–50. Brian Krebs, “Terror Webmaster Sentenced in Britain,” Washington Post, 5 July 2007; Kimberly Kiefer Peretti, “Data Breaches: What the Underground World of “Carding” Reveals,” Santa Clara Computer and High Technology Law Journal 25 (2009): 375–413. Additional informationNotes on contributorsThomas J. Holt Thomas J. Holt is an associate professor in the School of Criminal Justice at Michigan State University.
Publication Year: 2012
Publication Date: 2012-03-14
Language: en
Type: article
Indexed In: ['crossref']
Access and Citation
Cited By Count: 74
AI Researcher Chatbot
Get quick answers to your questions about the article from our AI researcher chatbot