MANIFESTATIONS OF CONTEMPORARY TERRORISM-CYBERTERRORISM
Corresponding author:
[email protected]
Accepted
28 March 2026
Available Online
15 March 2017
Abstract
THE ANALYSIS FOCUSES ON ONE OF THE MOST IMPORTANT THREATS TO WORLD SECURITY AND A NEW AND EMERGENT FORM OF TERRORISM THAT USES ADVANCED COMPUTING TECHNOLOGIES IN ORDER TO DISRUPT CRITICAL INFRASTRUCTURES. FIRST OF ALL, THIS PAPERACKNOWLEDGES THE IMPORTANCE OF TECHNOLOGICAL ADVANCEMENT AS BOTH FOR THE SECURITY AND FOR TERRORIST MEANS. AND SECONDLY, IT DISTINGUISHES BETWEEN WHAT CAN BE CONSIDER A CYERTERORIST ATACK FROM A THEORETICAL PERSPECTIVE ANALYZING THE BASIC ELEMENTS AND DISTRIBUTION OF CYBERTERORIST CAPACITIES. THIS RESEARCH ALSO PRESENTS THE POTENTIAL OF IMMINENT AND ONGOING ATTACKS AND HOW THIS TYPE OF TERRORISM COULD PROF TO BE MORE DISASTROUS AS ANY OTHER KIND. IN THE END OF THIS ANALYSIS WE WILL PROVIDE EVIDENCE OF SUCH ATTACKS AND WE DISCUSS SCENARIOS THAT ARE LIKELY TO HAPPEN IN THE NEXT DECADE AND THAT COULD AFFECT THE UNITED STATES THROUGH TEMPERING WITH THE POWER GRID.
Keywords
SECURITY
CYBERTERRORISM
INTERNET
AL -QAEDA
INTELLIGENCE
CRITICAL
Full Text
The body of this article is intentionally hidden on the public page. Please use the PDF reader or the PDF download for the complete text.
References
[1]
Acad. Mihai Drăgănescu , ” Societatea informaţională şi a cunoşterii. Victoria societăţii cunoaşterii”, published in ”Limba Română în Societatea Informaţională -Societatea Cunoşterii”, Editura Expert, 2002, p.441-442,
[2]
Christopher Harress, „ Obama Says Cyberterrorism Is Country's Bigg est Threat, U.S. Government Assembles Cyber Warriors”, accessed December 15, 2016, http://usa.kaspersky.com/about-us/press- center/in-the-news/obama-says-cyberterrorism-countrys-biggest-threat-us-government-as
[3]
Dobrinoiu, Maxim, ”Criminalitatea informatică, ed. Academiei Naţionale de Informaţii”, Bucureşti, 2009, p.174-176
[4]
Ionuţ Marius Chitoşca , ”Internetul ca agent de socializare a genereţiei „M”, Revista de Informatică Socială, numărul 5, iunie 2006, pag.61
[5]
Marius Lefter, ”Transformări ale războiului mondial împotriva terorismului internaţional”, Geopolitics.ro, published 02.02.2012, accessed December 15, 2015
[6]
Matthew J. Littleton , ”Information age terrorism: toward cyberterror”, Naval Postgraduate School, Chapter 2, accessed December 12, 2016, http://fas.org/irp/threat/cyber/docs/npgs/ch2.htm
[7]
Murat Dogrul, Adil Aslan, Eyyup Celik, ”Developing an International Cooperation on Cyber Defense and Deterrence against Cyber Terrorism” , Turkish Air War College, 2011 3rd International Conference on Cyber Conflict, p. 39, accessed December 15, 2016 as PDF, https://ccdcoe.org/ICCC/materials/proceedings/dogrul_aslan_celik.pdf
[8]
Nicole Perlroth, David E. Sanger , ” Cyberattacks Seem Meant to Destroy, Not Just Disrupt”, New York Times, published March 28, 2013, accessed December 15, 2016, http://www.nytimes.com/2013/03/29/technology/corporate-cyberattackers-possibly-state-backed-now-seek- to-destroy-data.html
[9]
Senate Select Committee on Intelligence, feb 2012, accessed December 15, 2016 as PDF, https://www.amnestyusa.org/pdfs/sscistudy1.pdf
[10]
Serge Krasavin , ”What is Cyber -terrorism?”, CCRC, accessed December 12, 2016, http://www.crime - research.org/library/Cyber-terrorism.htm
[11]
Serviciul Român de Informaţii, Protecţia Infrastructurilor Critice, pag.6, accessed May 5, 2016