"Conventional" terrorism is important because cyberterrorism will remain, in the near future, subordinate to conventional terrorism. The implications of information warfare tactics and techniques for both terrorism and counterterrorism and summarized in this typology to highlight how terrorism and the response to terrorism may change in the future.
The following chart summarizes the key components of "conventional" terrorism, technoterrorism, and cyberterrorism.
Conventional Terrorism | Technoterrorism | Cyberterrorism |
Targets exist in "real' space
* Airlines * Buildings * High Profile individuals * Low Profile individuals |
Targets exist in "real" space with cyberspace and "real" space impact * Electric Grids * Computer Networks * Telecommunications |
Targets exist exclusively in cyberspace with "real' space impact * Telecommunications * Computer Networks * Control Networks |
Creates physical threat | Creates physical and "virtual" threat | Creates "virtual" and physical threat |
Weapons: * Explosives * Guns |
Weapons: * Explosives * Guns |
Weapons: * Malicious Software * EMP Weapons *(For data manipulation or destruction) |
Techniques: * Bombings * Kidnapping * Assassination |
Techniques: * Bombing * Physical Desctruction of Key Components |
Techniques: * "Virtual" destruction of targets in cyberspace * Disabling of system software * Overwhelming of control systems |
Size of Group: * Large Group=large potential impact * Small Group=small potential impact |
Size of Group: * Large Group=large potential impact * Small Group=smaller potential impact |
Size Group: * Large Group=large impact * Small Group=large impact |
Large amount of money required for large impact |
Moderate amount on money required for large impact |
Small amount of money required for large impact |
Physicl risk is high for terrorists | Physical risk is moderate for terrorists |
Physical risk is very low for terrorists |
Value ofstate sponsorship: * Money * Equipment * Training * Basing * Intelligence support * Transportation |
Value of state sponsorship: * Money * Intelligence * Training * Equipment * Transportation |
Value of state sponsorship: * Intelligence |
Role of the media: critical | Role of the media: critical | Role of the media: moderate |
Laws are clear | Laws are clear | Laws are nebulous |
Intel/Info requirements for success are low |
Intel/Info requirements for success are moderate |
Intel/Info requirements for success are vitally important |
Communications vital for success and a vulnerability |
Communications vital for success and a vulnerability |
Communications vital for success and normally secure. (encryption-global connectivity |
Disruption potential is moderate
* Coordinated/distributed attacks hard |
Disruption potential is large * Coordination/distributed attacks difficult |
Disruption potentia is immense * Coordination/distributed attacks relatively easy |
Type of Groups * Nationalists-separatist- * irredentist * Issue * Ideological * Exile * State/State-sponsored |
Type of Groups: Nationalists-separatists- irredentist * Issue * Ideological * Exile * State/State-sponsored |
Type of Groups: Nationalists-separartist- irredentist * Issue * Ideological * Exile * State/State-sponsored |
Physical presence required for attack to be succesf ul * Borders matter |
Physical presence required for attack to be successful * Borders matter |
Physical presence NOT required for attack to be successful * Borders nonexistent |
Attack has effects | Attack has diffuse effects | Attack can have either focused of diffuse effects |
Preventive/Response Measures
Conventional terrorism | Technoterrorism | Cyberterrorism |
Deter * Sponsoring State Military response Economic response * Legal mechanisms |
Deter * Sponsoring State Military response Economic response * Legal mechanism |
Deter Who? How? |
Defend * Physically "harden" targets (bulidings) * Prevent access to targets (airport security) * Increase intelligence gathering |
Defend * Physically "harden" targets (buildings/transformers/ pipelines) * Increase intelligence on potential targets |
Defend * "harden" computer systems increased training in security * Increased intelligence gathering |
Disrupt * Infiltrate groups * Discredit leadership * Communications |
Disrupt * Infiltrate groups (harder) * Discredit leadership (if identifiable) |
Disrupt * Take away comm channels * Prevent repeated access attempts |
Preempt * Stike groups before attacks |
Preempt * Strike groups before attacks |
Preempt * Strike computers with IW weapons * Physically destroy computers or attack group members |