Defining cyberterrorism

Autores/as

  • Laura Mayer Lux, Dra. Pontificia Universidad Católica de Valparaíso

Resumen

The aim of this article is to define cyberterrorism. With that in mind, the first part of this article analyzes the notion of terrorism, a broad category to which the species “cyberterrorism” belongs. The second part of this article, on the other hand, is fundamentally about determining the scope of the term cyberterrorism, and presenting the challenges that this creates in a global and interconnected world.

Palabras clave:

Terrorism, cybercrime, computer sabotage, critical infraestructures

Biografía del autor/a

Laura Mayer Lux, Dra., Pontificia Universidad Católica de Valparaíso

Abogada. Licenciada en Ciencias Jurídicas por la Pontificia Universidad Católica de Valparaíso, Chile. Doctora en Derecho por la Rheinische Friedrich Wilhelms-Universität Bonn, Alemania. Profesora de Derecho Penal de la Pontificia Universidad Católica de Valparaíso.

Referencias

Ambos, Kai (2015). “Responsabilidad penal internacional en el ciberespacio.” InDret, 2: 1-32. Available at https://bit.ly/2QNF1D5.

Ariely, Gil (2014). “Adaptive Responses to Cyberterrorism.” In Thomas M. Chen, Lee Jarvis & Stuart Macdonald (editors), Cyberterrorism, 175-195. New York: Springer. DOI: 10.1007/978-1-4939-0962-9_10.

Asúa Batarrita, Adela (2002). “Concepto jurídico de terrorismo y elementos subjetivos de finalidad: Fines políticos últimos y fines de terror instrumental.” In Juan Ignacio Echano Basaldua (coordinator), Estudios jurídicos en memoria de José María Lidón. Bilbao: Universidad de Deusto.

Berner, Sam (2003). “Cyber-Terrorism: Reality or Paranoia?” South African Journal of Information Management, 5 (1): 1-4. DOI: 10.4102/sajim.v5i1.208.

Boeckmann, Robert & Carolyn Turpin-Petrosino (2002). “Understanding the Harm of Hate Crime.” Journal of Social Issues, 58 (2): 207-225. DOI: 10.1111/1540-4560.00257.

Cancio Meliá, Manuel (2002). “‘Derecho penal’ del enemigo y delitos de terrorismo: Algunas consideraciones sobre la regulación de las infracciones en materia de terrorismo en el Código penal español después de la LO 7/2000.” Jueces para la democracia, 44: 19-26. Available at http://bit.ly/2EpZzvI.

Cancio Meliá, Manuel (2010). “El delito de pertenencia a una organización terrorista en el código penal español.” Revista de Estudios de la Justicia, 12: 147-164. DOI: 10.5354/0718-4735.2011.15233.

Cano Paños, Miguel Ángel (2008). “Internet y terrorismo islamista: Aspectos criminológicos y legales.” Eguzkilore, 22: 67-88. Available at https://addi.ehu.es/handle/10810/24994.

Cárdenas Aravena, Claudia (2008). “El lugar de comisión de los denominados ciberdelitos.” Política Criminal, 6: 1-14. Available at https://bit.ly/2RSKlSM.

Carnevali, Raúl (2010). “El derecho penal frente al terrorismo: Hacia un modelo punitivo particular y sobre el tratamiento de la tortura.” Revista de Derecho de la Pontificia Universidad Católica de Valparaíso, 35: 109-145. DOI: 10.4067/S0718-68512010000200004.

Choo, Kim-Kwang (2007). “Zombies and botnets.” Trends & Issues in Crime and Criminal Justice, 333: 1-6. Available at http://bit.ly/2Eqrwna.

Clough, Jonathan (2010). Principles of Cybercrime. New York: Cambridge University Press.

Cohen, Fred (2002). “Terrorism and Cyberspace.” Network Security, 5: 17-19. DOI: 10.1016/S1353-4858(02)05015-8.

Conway, Maura (2014). “Reality Check: Assessing the (Un)Likelihood of Cyberterrorism.” In Thomas M. Chen, Lee Jarvis & Stuart Macdonald (editors), Cyberterrorism, 103-121. New York: Springer. DOI: 10.1007/978-1-4939-0962-9_6.

Corcoy Bidasolo, Mirentxu (1999). Delitos de peligro y protección de bienes jurídico-penales supraindividuales. Valencia: Tirant Lo blanch.

Crenshaw, Martha (1981). “The Causes of Terrorism.” Comparative Politics, 13 (4), 379-399. DOI: 10.2307/421717.

D’Aiuto, Gianluca & Luigi Levita (2012). I reati informatici. Milan: Giuffrè.

Della Porta, Donatella (1995). Social movements, political violence, and the state: A comparative analysis of Italy and Germany. Cambridge: Cambridge University Press.

Denning, Dorothy E. (2000). “Cyberterrorism.” Testimony before the Special Oversight Panel on Terrorism Committee on Armed Services U.S. House of Representatives. Available at http://bit.ly/2Er9ZLt.

Denning, Dorothy E. (2011). “Whither Cyber Terror?” In 10 Years After September 11, A Social Science Research Council Essay Forum. Available at http://bit.ly/2EsnYkn.

Fletcher, George P. (2006). “The Indefinable Concept of Terrorism.” Journal of International Criminal Justice, 4 (5): 894-911. DOI: 10.1093/jicj/mql060.

Ganor, Boaz (2002). “Defining Terrorism: Is One Man’s Terrorist another Man’s Freedom Fighter?” Police Practice and Research, 3 (4): 287-304. DOI: 10.1080/1561426022000032060.

Gercke, Marco & Phillip W. Brunst (2009). Praxishandbuch Internetstrafrecht. Stuttgart: Kohlhammer.

Gibbs, Jack P. (1989). “Conceptualization of Terrorism.” American Sociological Review, 54 (3): 329-340. DOI: 10.2307/2095609.

Gillespie, Alisdair (2016). Cybercrime: Key Issues and Debates. London, New York: Routledge.

Gómez Martín, Víctor (2010). “Notas para un concepto funcional de terrorismo.” In José Ramón Serrano-Piedecasas Fernández & Eduardo Demetrio Crespo (coordinators), Terrorismo y Estado de derecho, 25-52. Madrid: Iustel.

González Calleja, Eduardo (2016). “Los estudios sobre terrorismo: Balance de los últimos 25 años.” Espacio Abierto, Cuaderno Venezolano de Sociología, 25 (4): 61-76. Available at http://bit.ly/2ErZnvH.

Goodman, Seymour E., Jessica C. Kirk & Megan H. Kirk (2007). “Cyberspace as a medium for terrorists.” Technological Forecasting & Social Change, 74 (2): 193-210. DOI: 10.1016/j.techfore.2006.07.007.

Gordon, Sarah & Richard Ford (2002). “Cyberterrorism?” Computers & Security, 21 (7): 636-647. DOI: 10.1016/S0167-4048(02)01116-1.

Grabosky, Peter (2009). “High Tech Crime: Information and Communication Related Crime.” In Hans Joachim Schneider (editor), Internationales Handbuch der Kriminologie, 73-101. Berlin: De Gruyter.

Guzmán Dalbora, José Luis (2017). “El terrorismo como delito común.” In Colectánea criminal: Estampas de la parte especial del derecho penal, 203-255. Montevideo: B de F.

Hampson, Noah (2012). “Hacktivism: A New Breed of Protest in a Networked World.” Boston College International and Comparative Law Review, 35 (2): 511-542. Available at http://bit.ly/2EqJKET.

Hardy, Keiran & George Williams (2014). “What is ‘Cyberterrorism’? Computer and Internet Technology in Legal Definitions of Terrorism.” In Thomas M. Chen, Lee Jarvis & Stuart Macdonald (editors), Cyberterrorism, 1-23. New York: Springer.

Hua, Jian & Sanjay Bapna (2013). “The Economic Impact of Cyber Terrorism.” The Journal of Strategic Information Systems, 22 (2): 175-186. DOI: 10.1016/j.jsis.2012.10.004.

Jakobs, Günther (2003). “Derecho penal del ciudadano y derecho penal del enemigo.” In Derecho penal del enemigo, 19-56. Madrid: Civitas.

Jijena, Renato (2008). “Delitos informáticos, internet y derecho.” In Delito, pena y proceso, 145-162. Santiago: Jurídica de Chile.

Jones, Andrew (2005). “Cyber Terrorism: Fact or Fiction.” Computer Fraud & Security, 6: 4-7. DOI: 10.1016/S1361-3723(05)70220-7.

Kindhäuser, Urs (1989). Gefährdung als Straftat. Frankfurt: Vittorio Klostermann.

Kochheim, Dieter (2015). Cybercrime und Strafrecht in der Informations- und Kommunikationstechnik. Munich: Beck.

Kraft, Ellen M. & Jinchang Wang (2009). “Effectiveness of Cyber bullying Prevention Strategies: A Study on Student’s Perspectives.” International Journal of Cyber Criminology, 3 (2): 513-535. Available at http://bit.ly/2EprLP7.

Lara, Juan Carlos, Manuel Martínez & Pablo Viollier (2014). “Hacia una regulación de los delitos informáticos basada en la evidencia.” Revista Chilena de Derecho y Tecnología, 3 (1): 101-137. DOI: 10.5354/0719-2584.2014.32222.

Lewis, James Andrew (2002). “Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats.” Center for Strategic & International Studies. Available at http://bit.ly/2Esfppx.

Madarie, Renushka (2017). “Hackers’ Motivations: Testing Schwartz’s Theory of Motivational Types of Values in a Sample of Hackers.” International Journal of Cyber Criminology, 11 (1): 78-97. DOI: 10.5281/zenodo.495773.

Mañalich, Juan (2015). “El terrorismo ante el derecho penal: la propuesta legislativa del gobierno como retroceso.” Anuario de Derecho Público UDP, 6: 154-171.

Mañalich, Juan (2017). “Terrorismo y organización.” Ius et Praxis, 23 (1): 367-418. Available at http://bit.ly/2ErilCW.

Marberth-Kubicki, Annette (2010). Computer- und Internetstrafrecht. Munich: Beck.

Meier, Bernd-Dieter (2015). “Kriminologie und Internet: ein ungeklärtes Verhältnis.” In Susanne Beck, Bernd-Dieter Meier, Carsten Momsen (editors), Cybercrime und Cyberinvestigations, 93-118. Baden-Baden: Nomos.

Melzer, Nils (2011). “Cyberwarfare and International Law.” Unidir Resources, 1-38. Available at https://bit.ly/2UxGmwV.

Milan, Stefania & Arne Hintz (2013). “Networked Collective Action and the Institutionalized Policy Debate: Bringing Cyberactivism to the Policy Arena?” Policy & Internet, 5 (1): 7-26. DOI: 10.1002/poi3.20.

Mir Puig, Santiago (2016). Derecho penal: Parte general. 10.ª ed. Barcelona: Reppertor.

Miró Llinares, Fernando (2012). El cibercrimen. Madrid: Marcial Pons.

Neubacher, Frank (2014). Kriminologie. Baden-Baden: Nomos.

Podhradsky, Ashley, Rob D’Ovidio & Cindy Casey (2012). “The Xbox 360 and Steganography: How criminals and terrorists could be ‘going dark’.” ADFSL Conference on Digital Forensics, Security and Law, 33-51. Available at https://bit.ly/2EpvHiR.

Poveda Criado, Miguel Ángel & Begoña Torrente Barredo (2016). “Redes sociales y ciberterrorismo: Las TIC como herramienta terrorista.” Opción, 32 (8): 509-518. Available at http://bit.ly/2EqqyqR.

Sorel, Jean-Marc (2003). “Some Questions About the Definition of Terrorism and the Fight Against its Financing.” European Journal of International Law, 14 (2): 365-378. Available at http://bit.ly/2EqPJJR.

Teixeira, Adriano (2013). “Was ist böse am Terrorismus? Zugleich Vorüberlegungen zu einer Definition des Terrorismus.” Zeitschrift für Rechtsphilosophie, 2: 57-76. Available at http://bit.ly/2EqrRWN.

Velásquez Velásquez, Fernando (2009). Derecho penal: Parte general. Volume 1. Santiago: Jurídica de Chile.

Villegas Díaz, Myrna (2016). “Contribuciones para un concepto de terrorismo en el derecho penal chileno.” Política Criminal, 11 (21): 140-172. DOI: 10.4067/S0718-33992016000100006.

Von Bubnoff, Eckhart (2003). “Krimineller Missbrauch der neuen Medien im Spiegel europäischer Gegensteuerung.” In Strafrecht und Kriminalität in Europa, 83-106. Baden-Baden: Nomos.

Von Hirsch, Andrew (1996). “Extending the Harm Principle: ‘Remote’ Harms and Fair Imputation.” In Andrew Simester & Tony Smith (editors), Harm and Culpability, 259-276. Oxford: Clarendon Press. DOI: 10.1093/acprof:oso/9780198260578.003.0020.

Warren, Matthew (2008). “Terrorism and the Internet.” In Lech J. Janczewsk & Andrew M. Colarik (editors), Cyber Warfare and Cyber Terrorism, 42-49. Hershey-New York: Information Science Reference.

Weimann, Gabriel (2005). “Cyberterrorism: The Sum of All Fears?” Studies in Conflict & Terrorism, 28 (2): 129-149. DOI: 10.1080/10576100590905110.

Wilson, Clay (2003). “Computer Attack and Cyber Terrorism: Vulnerabilities and Policy Issues for Congress.” CRS Report for Congress. Available at https://bit.ly/2DRECsW.

Yannakogeorgos, Panayotis A. (2014). “Rethinking the Threat of Cyberterrorism.” In Thomas M. Chen, Lee Jarvis & Stuart Macdonald (editors), Cyberterrorism, 43-62. New York: Springer.