U.S. flag

An official website of the United States government

The .gov means it’s official. Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

The site is secure. The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

  • Publications
  • Account settings

Preview improvements coming to the PMC website in October 2024. Learn More or Try it out now .

  • Advanced Search
  • Journal List
  • HHS Author Manuscripts

Logo of nihpa

The psychological effects of cyber terrorism

When ordinary citizens think of cyber threats, most are probably worried about their passwords and banking details, not a terrorist attack. The thought of a shooting in a mall or a bombing at an airport is probably more frightening than a cyber breach. Yet terrorists aim for mental as well as physical destruction, and our research has found that, depending on who the attackers and the victims are, the psychological effects of cyber threats can rival those of traditional terrorism.

Cyber aggression has become a daily fact of life in the 21st century, yet for most people it’s still only a reality in the form of cyber crime—hackers targeting financial information or other personal details. Politically motivated attacks might threaten them as well, but they tend to be the concern of governments and corporations rather than ordinary citizens. The thought of a terrorist shooting in a mall or bombing in an airport probably seems far more frightening to the average person than Russian hackers disrupting government networks in Estonia or Anonymous breaking into the police department of Ferguson, Missouri. Cyber terrorists, after all, have yet to actually kill or injure anyone. Yet our research has found this perception of cyber aggression might not be entirely accurate. The aim of terrorism, after all, is not just physical destruction, and depending on who the attackers and the victims are, the psychological effects of cyber terrorism can be just as powerful as the real thing.

Defining cyber terrorism

People face cyber aggression on an almost daily basis. Hackers appropriate, erase, or ransom data, defraud bank customers, steal identities, or plant malevolent viruses. In many cases, hackers are criminals out for pecuniary gain. But sometimes their motives are political. Some are “hacktivists,” or cyber activist groups, like Anonymous, others are terror groups like Hamas or Islamic State, and still others are agents of national states like Iran, North Korea, or Russia. They are not usually after money but pursue a political agenda to foment for social change, gain political concessions, or cripple an enemy. Sometimes their means are peaceful but other times they are vicious and violent. The lines often blur. Anonymous will hack the Ferguson police department just as it will initiate an “electronic Holocaust” against Israel in support of the Palestinian cause ( Rogers 2014 ). Islamic activists will not only use the Internet to recruit members and raise funds for social welfare projects but also to steal money for terrorist activities or disseminate information to stoke fear and demoralize a civilian population. States will pursue online espionage but also wreak havoc by crashing multiple systems—as did the Russians, allegedly, in Estonia in 2007, with mass denial-of-service attacks on government sites, and in Ukraine in 2016, with cyber attacks on the airport and power grid ( Polityuk 2016 ).

Underlying many of these attacks is terrorism: an attempt to extract political concessions by instilling fear in the civilian population. In this way, cyber terrorism is no different from conventional terrorism. Yet cyber terrorism is far more subtle. To date, cyber terrorists have neither killed nor injured anyone. Nor have cyber terrorists successfully destroyed any critical infrastructures. Whether this is due to the offensive inadequacies of the terrorists or the superior defensive capabilities of the United States and its allies, experts have yet to decide.

But as the war on cyber terrorism continues, it is increasingly clear that protecting vital national interests is only half the battle. Security experts rightly worry about defending transportation networks, refineries, dams, military installations, hospitals, banks, and government offices from cyber attack just as they worry about defending the same facilities from terrorist bombs or ballistic missiles ( Lewis 2002 ). Yet lost in the haze of cyber warfare is the human dimension. While scholars and policy makers raise concerns about the dangers that cyber terrorism holds for national security, we know little about its effects on human security.

Human security emphasizes the conditions necessary for a vibrant civil society ( Tadjbakhsh 2014 ). At the most basic level, people must be able to live free of undue fear, anxiety, and trepidation. At a more developed level, civil society requires energetic public discourse, judicious public policy, and respect for human dignity. Following 9/11, we now recognize that conventional terrorism undermines human security even more than national security. It is a common truism that terrorists want a lot of people watching, not a lot of people dead ( Jenkins 1975 ; Lerner et al. 2003 ). The dead are few; it is the living whose daily lives are transformed by the constant fear of impending doom. Conventional terrorism exacerbates feelings of insecurity and perceptions of threat that prompt public cries for protective and militant government policies that can short-circuit public discourse, intensify intolerance for dissident views, and infringe on human rights ( Boggs 2002 ; Hirsch-Hoefler et al., 2014 ). Does cyber terrorism cause similar effects?

At first glance, it seems that it cannot. In their attempts to formulate the law of cyber warfare, the framers of the Tallinn Manual on the International Law Applicable to Cyber Warfare remain unconvinced that cyber attacks that block e-mail, deny service, employ economic coercion, undermine confidence in the government or economy, or, in their example, “cause panic by falsely indicating that a highly contagious and deadly disease is spreading through the population” cause sufficient mental suffering to rise to the level of a terrorist attack ( Schmitt 2013 , §11.2, 3; 30.12; 36.3; 59.9). Unfortunately, these assumptions are untested and in a series of field experiments we studied how cyber terrorism affects psychological well-being and political attitudes that impinge upon human security by causing stress, anxiety, and fear—all of which radicalize political attitudes and push people to exchange privacy for security to prevent cyber terror in the future.

Simulating cyber terrorism

In our field survey experiments, we first interviewed 522 individuals following Anonymous’s well-publicized attempt to perpetrate an “electronic Holocaust” in April 2015, when the hacktivist group promised to take down servers and “erase Israel from cyber space.” In a second study, in January 2016, 907 subjects viewed various film clips describing hypothetical Hamas attacks on Israel’s national water company. In one scenario, cyber terrorism was fatal; terrorists poisoned the water supply with an overdose of chlorine that killed two and injured many more. In other scenarios, cyber terrorism was not lethal; no one suffered physical harm but hackers appropriated the bank account numbers of the company’s customers and successfully transferred money to Hamas. A third group of subjects viewed a fatal but conventional mass-casualty terrorist attack, while a control group viewed a neutral film depicting the dedication of a water treatment plant. Following these screenings, we surveyed respondents on measures fundamental to human security. These included stress, anxiety, insecurity and threat perception, political militancy, and a willingness to relinquish privacy and civil liberties in favor of security.

In some ways, Israelis are a unique population for such a study. The ongoing conflict between Israelis and Palestinians (and Palestinian allies like Hezbollah and Iran) is a constant feature of everyday life. Terrorism, too, simmers beneath the surface. Since January 2015, terrorists have taken 23 civilian lives in Israel. Yet Israelis know their enemy, know what they want and can imagine the way to peace. This puts terrorism and cyber terrorism in the context of a political struggle that has, in many ways, fixed and acceptable costs. Like a couple of wary boxers, each side circles the other, constantly poking and provoking. This leaves Israelis, who score very high on the UN’s world happiness index, weary but resilient.

In contrast, the West’s confrontation with radical Islam is enigmatic and exceptionally violent. In the same period since the start of last year, 67 Americans and 197 Europeans have lost their lives in terrorist attacks. Unlike Israelis, Americans and Europeans don’t know their enemy, have no clear idea what they want or how to confront their demands. Islamic State attacks are brutally violent for their own sake. Americans and especially Europeans will find resilience elusive as terrorism and cyber terrorism fuel an inescapable cycle of fear. Learning from the Israeli case and understanding the effects of cyber terrorism for other Western nations is crucially important.

Measuring stress and insecurity

Not surprisingly, exposure to cyber terrorism is stressful. Figure 1 uses the State-Trait Anxiety Inventory (STAI) to show how stress and anxiety grow as attacks become more deadly. With a score of 4.00, conventional mass-casualty terrorism (e.g., suicide bombings) evokes a level of anxiety at the top of the scale. The stress scores for lethal and non-lethal cyber terrorism are not far behind, and all the scores significantly surpass the control group. But the interesting point is this: Individuals were equally disturbed by lethal and non-lethal cyber terrorism, meaning there is no significant difference between the two when it comes to stress. Both cause significant panic and anxiety and both, it seems, are equally capable of cracking the foundations of personal wellbeing and human security.

An external file that holds a picture, illustration, etc.
Object name is nihms817956f1.jpg

Anxiety in the Wake of Terrorism

CONTROL: No terrorism

CYBER TERRORISM, NON-LETHAL: Disclosure of account information, loss of funds

CYBER TERRORISM, LETHAL: Deaths and injuries

CONVENTIONAL TERRORISM, LETHAL: Deaths and injuries

Cyber terrorism also left individuals insecure and wary of future cyber terrorist attacks. These judgments are measures of threat perception and gauged by such questions as: “To what extent do cyber attacks undermine your sense of personal security?” and “To what extent do you feel threatened by cyber terrorism?” Like stress, threat perception increased steadily as attacks grew more severe ( Figure 2 ). But even in our control group, Israelis are on edge and exposure to non-lethal cyber terrorism did not appreciably increase perceptions of threat. Lethal attacks, on the other hand, did trigger a significant jump in threat perception and it didn’t matter much whether they were cyber or conventional terrorist attacks. These findings show how stress and threat perception are two different phenomena. Stress is emotional while threat perception is cognitive. And while lethal and non-lethal cyber attacks evoke feelings of stress, only terrorism accompanied by injury and loss of life nurtures a serious preoccupation about the next attack. If a person’s reaction to cyber terrorism has both an emotional and cognitive dimension, it is also sensitive to circumstance and the identity of the perpetrator. After it was clear that Anonymous’s threat of an “electronic Holocaust” was empty, threat perception fell by 10 percent. People were still fearful, but not so much. But many Israelis do fear Hamas. and when that group, rather than Anonymous, was the perpetrator, threat perceptions increased by 20 percent, from a mean score of 2.9 to a score of 3.5. Hamas is a far more frightening adversary than Anonymous, even as they perpetrate similar attacks.

An external file that holds a picture, illustration, etc.
Object name is nihms817956f2.jpg

Threat Perception and Insecurity

Stress, anxiety, insecurity, and perceptions of threat do not stand alone. Instead, we know that studies of conventional terrorism show how stress, anxiety, and heightened perceptions of threat radicalize political attitudes and draw individuals away from concerns about civil liberties to worries about national security ( Verton and Brownlow 2003 ). In the wake of mass-casualty terrorism, individuals turn inward, disparage outgroups, move to the right on security and privacy issues, and call upon their government to take strong military action ( Canetti et al. 2013 ; McDermott 2010 ). The effects can have a chilling effect on civil society and political discourse in many democratic nations, as debates about torture, rendition, due process, military belligerency, and surveillance show. We were not surprised to see similar effects from cyber terrorism.

Political reactions

Figures 3 and ​ and4 4 depict an array of political attitudes that harden in the wake of terrorism. As noted, individuals in our first survey confronted an ongoing cyber attack by Anonymous and in the second, a simulated attack by Hamas. In each case, we asked individuals about their support for internet surveillance, government regulation, and military retaliation in the context of an unspecified cyber terror attack. Questions centered on surveillance and civil liberties (“Should the government monitor emails and social networks for suspicious phrases?”; “Are you willing to let the government read emails to improve personal and national security?”), 1 government regulation (“Should the government require businesses to install cyber security systems?”), and military retaliation (“Following a cyber terrorism attack, should the government respond with a small-scale cyber attack against military targets, a large-scale cyber attack against military and civilian targets, a small-scale conventional (missiles, bombs, and artillery) attack against military targets, or a large-scale conventional attack attacks against military and civilian targets?”)

An external file that holds a picture, illustration, etc.
Object name is nihms817956f3.jpg

Percent Favoring Survelliance and Government Regulation

An external file that holds a picture, illustration, etc.
Object name is nihms817956f4.jpg

Percent Favoring Small-Scale and Large-Scale or Conventional Retaliation

CYBER RETALIATION SMALL SCALE: Cyber attacks against military targets

CYBER RETALIATION LARGE SCALE: Cyber attacks against military and civilian targets

CONVENTIONAL RETALIATION SMALL SCALE: Kinetic attacks against military targets

CONVENTIONAL RETALIATION LARGE SCALE: Kinetic attacks against military and civilian targets

Attitudes varied depending on the perpetrator. When Anonymous was the attacker, 54 percent of the respondents in our survey would allow the government to monitor e-mails for suspicious phrases, 48 percent would allow the government to monitor Facebook and Twitter, and 23 percent would allow the government to read e-mails. When the perpetrator was Hamas, support for government surveillance leaps to 67 percent in favor of monitoring e-mails, 46 percent in favor of monitoring social media, and 61 percent in favor of reading e-mails. Among Americans in general, by contrast, only 43% of the respondents would allow the US government to monitor the communications of US citizens ( Shelton et al. 2015 , 6). Among Israelis, support for surveillance depends on the identity of the perpetrator. And while the identity of the attacker did not affect calls for government regulation (74 percent of the respondents would require business to install cyber security software) fears of Islamic terrorism dominate the public’s demand for military responses. As Figure 4 demonstrates, individuals facing Hamas terrorism were considerably more militant and supported conventional retaliation by a margin of nearly 2:1 compared to those facing the hacktivist group Anonymous. One reason may be greater fear of Hamas but another may be the recognition that Hamas, like Islamic State, has infrastructures and territory vulnerable to conventional attack. On the other hand, it is fear of Hamas rather than its vulnerability that drives greater support for surveillance. These data highlight the public’s willingness to employ conventional military measures to quash cyber terrorism, strong attitudes that will no doubt influence political leaders as they weigh kinetic military responses to cyber threats ( Libicki 2014 ).

From a psychological perspective, the data offer a curious finding. We expected to find a clear connection between exposure to cyber terrorism and militant, hardline attitudes. The harsher the terrorist attack our subjects experienced, the greater their militancy. But this is not what we discovered. Instead, we found that the greater one’s perception of threat , the greater one’s militancy. The odds were more than twice as high that individuals with high levels of threat perception will support surveillance, government regulation, and military retaliation compared to those whose threat perception is lower. We cannot explain why some individuals are more fearful than others. Past exposure to cyber attacks explains only a small part of the variance. Other personality factors, beyond the scope of our study to examine, are also probably at work. Nevertheless, it is clear that the threat of terrorism and how one perceives it are better determinants of militancy and hardline attitudes than the experience of an actual attack. And, indeed, this is how terrorism works. One need not suffer direct harm to be terrorized; it is enough that one fear direct harm to suffer the ravages of contemporary terrorism, whether cyber terrorism or conventional terrorism.

From Anonymous and Hamas to Islamic State

These results offer tantalizing evidence that cyber terrorism mirrors conventional terrorism even when its victims do not suffer injury or loss of life. We found that cyber terrorism increases stress, anxiety, fear, hardline attitudes, and political militancy. But circumstances matter, because the identity of the perpetrator helps explain the political attitudes related to cyber terrorism. Hamas is more threatening than Anonymous. When Hamas is at the wheel, Israelis see a brutal terrorist organization and do not much distinguish between cyber and conventional terrorism. Anonymous, on the other hand, still carries some cachet as a rogue hacktivist group that is unwilling or unable to harm anyone physically. Hamas, for the most part, poses no threat to Americans and Europeans. But Islamic State certainly does, and it will not be long before the group gains the capabilities to mount cyber-terrorism attacks. And, as with Hamas, the fact that these attacks might cause little physical harm may be irrelevant. Islamic State, like Hamas, will trade on its ruthless terrorist image. Leveraging its success at conventional terrorism, it will move seamlessly and effectively to cyber terrorism to produce outsized fear and panic. Marrying conventional and cyber terrorism will have chilling effects: Islamic State and other terrorist groups will be able to achieve the dramatic effects of suicide attacks and mass casualties at the relatively low cost and risk of cyber terrorism. There will be no need for suicide cyber bombers. Cyber terrorism is a force multiplier that can magnify the effects of limited, sporadic, and even failed kinetic terrorist attacks. In tandem, conventional and cyber terrorism can undermine human security in a most fundamental way.

Restoring human security

Human security thrives when societies are open, tolerant, peaceful, and vibrant, and when they offer citizens the conditions necessary to flourish economically, intellectually, physically, and emotionally ( Tadjbakhsh and Chanoy 2007 ). Physical security is a necessary condition for human security but not sufficient if civil society fails to allow its members to thrive. To thrive, individuals must maintain tolerance and social discourse. By inducing stress and anxiety, cyber terrorism endangers psychological wellbeing and increases perceptions of threat even if individuals suffer no physical harm. Once cyber terrorism successfully breaches a critical infrastructure to kill and injure (as in our film clips), these effects are more pronounced. Threat perception is not all bad. Reasonable perceptions of threat are essential to protect individuals and their communities from dangerous surprises but become disabling when they foster insecurity and prompt visions of an inescapable cycle of violence ( Canetti-Nisim et al. 2009 ). It is the nature of cyber terrorism to target civilians ( Gross 2015 , 153–183). Some of this is mere efficiency: Civilian targets are softer than military targets or critical infrastructures, which states take great pains to protect. But part is strategic: Targeting civilians is a way to demoralize and terrorize. This is precisely what Anonymous, Hamas, and Islamic State promise to do.

In response, civilians are increasingly willing to jettison privacy and support military retaliation. Neither outcome bodes well for human security. Privacy embraces the right to keep secrets and preserves a domain for individuals to build their personal identities and communicate without interference or duress. Surveillance inhibits free speech, discourages political opposition, prevents dissenters from organizing or publishing anonymously, and disrupts the flow of information necessary for a well-functioning civil society. Surveillance threatens privacy but not without cause. Surveillance can strengthen physical security. Gaining access to the content of e-mails and social media may allow law enforcement authorities and intelligence agencies to co-opt and cripple hostile organizations. Physical security is as important for human security as privacy. Balancing the two will be exceptionally challenging in the shadow of cyber terrorism, and cyber security experts and policy makers cannot unilaterally fortify the former at the expense of the latter.

Political militancy is equally problematic. Facing cyber terrorism and the threat it poses to national and human security, governments consider a range of tempered policies that include criminal prosecution, counter espionage, and active cyber defenses. Because most offensive cyber attacks fall far short of war, each of these retaliatory responses is freighted with fears of escalation that the United States and other nations wish to avoid. Nations must be careful as they weigh their responses to hostile cyber operations ( Hathaway et al. 2012 ). Civilians, particularly those who already find themselves in the midst of an armed conflict, are less restrained and may push their governments in unwarranted and dangerous directions as they call for harsh military retaliation following cyber attacks. Human security does not demand pacifism but it thrives best in a society that is cautious about the use of armed force. Cyber terrorism, like conventional terrorism, upends judicious decision making.

Eliminating the toxic effects of cyber terrorism is not simply a matter of cyber security. It is not enough to thwart or reduce the incidence of cyber-terror attacks. Protecting facilities is only half the battle. Fear, insecurity, anxiety, and militancy are often the product of perceived, not actual, threats. Cyber terrorists lurk in the background, and individuals will not be mollified unless they are eliminated. Despite their best efforts, however, no government will ever eradicate cyber terrorism, and people will always be driven by their outsized fears. Mitigating these fears is as equally important as reducing the incidence of attack. But the means are entirely different. Perceptions depend crucially on information and, as a result, risk assessment and communication are of crucial importance is the war against cyber terrorism. Individuals who misunderstand the nature of cyber terrorism and the threat it poses are most likely inclined to greater fear, insecurity, and militancy than those whose assessment is sober. Experts, to be sure, remain divided over the risk of cyber terrorism. Nevertheless, the cyber security community must address the fears of everyday citizens by cogently assessing the danger of cyber terrorism and the protective measures necessary to maintain secure networks. Risk communication is sorely lacking; properly implemented, it can reduce insecurity and perceptions of threat. Finally, there is also room to think about psychological intervention and cognitive behavior therapy to treat cyber terrorism–induced anxieties, just as it is used to treat the effects of conventional terrorism. 2 Risk assessment and psychological treatment protocols address the human dimension of cyber terrorism and should not be neglected as nations work to fend off cyber terrorists of all stripes.

Cyber terrorism has many faces, as does the psychology of the masses. Our research demonstrates how even non-lethal, seemingly banal forms of cyber terrorism have a considerable impact on the attitudes of victimized populations. Our experiments show a “cyber terrorism effect” that enables terrorists to foster fears akin to kinetic terrorism and pursue similarly ideological goals. In this way, cyber terrorism pushes well beyond cyber crime even when its methods—identity theft, destruction of data, and disruption of service—are sometimes similar. When Anonymous threatens an electronic Holocaust by corrupting data or stealing identities, they are taking sides in violent, armed conflict, and their actions are far more than criminal. They are attacking innocent civilians, not bilking an easy mark. Victims know the difference. Under attack, they react with not only fear and trepidation, as do victims of crime, but with demands for protection from the enemies of the state via harsh military retaliation, surveillance, and strong government. This is the psychology of terrorism.

Acknowledgments

This research was made possible, in part, by grants awarded to Daphna Canetti from the US National Institute of Mental Health (R01 MH073687), from the Israel Science Foundation (594/15), and from the US-Israel Binational Science Foundation (2009460), and to Michael L. Gross from the Israel Science Foundation (156/13).

Biographies

Michael L. Gross is a professor in and the head of the School of Political Science at the University of Haifa, Israel. His recent books include The Ethics of Insurgency (Cambridge 2015) and Moral Dilemmas of Modern War (Cambridge 2010).

Daphna Canetti is a professor of political science at the University of Haifa and the director of the university’s graduate program in Democracy Studies. Canetti’s research examines the psychological challenges and policy implications of terrorism, warfare, and political violence. Her publications appear in political and psychological outlets including the Lancet , the American Journal of Political Science , the British Journal of Political Science , and Political Psychology . Her commentary has been featured in media outlets including NPR and the Washington Post .

Dana Vashdi is the head of the Division of Public Administration and Policy at the University of Haifa, Israel. Her research focuses on the well-being of citizens in general and of employees in particular as well as on teams in public organizations, organizational learning, and healthcare policy. She has published articles in a wide variety of academic journals including the Academy of Management Journal , the British Medical Journal, Human Resource Management , and Public Administration Review .

1 “Reading” and “monitoring” are different. “Monitoring” suggests either the collection of metadata or only reading e-mails that trigger security concerns, while “reading” suggest scrutinizing every e-mail.

2 For example, see Somer et al. 2005 .

Disclosure statement

No potential conflict of interest was reported by the authors.

  • Boggs C. Militarism and Terrorism: The Deadly Cycle. Democracy & Nature. 2002; 8 (2):241–259. [ Google Scholar ]
  • Canetti-Nisim D, Halperin E, Sharvit K, Hobfoll SE. A New Stress-Based Model of Political Extremism Personal Exposure to Terrorism, Psychological Distress, and Exclusionist Political Attitudes. Journal of Conflict Resolution. 2009; 53 (3):363–389. [ PMC free article ] [ PubMed ] [ Google Scholar ]
  • Canetti D, Hall BJ, Rapaport C, Wayne C. Exposure to political violence and political extremism: A stress-based process. European Psychologist. 2013; 18 (4):263. [ Google Scholar ]
  • Gross M. The Ethics of Insurgency: A Critical Guide to Just Guerrilla Warfare. Cambridge: Cambridge University Press; 2015. [ Google Scholar ]
  • Hathaway OA, Crootof R, Levitz P, Nix H, Nowlan A, Perdue W, Spiegel J. The Law of Cyber-Attack. California Law Review. 2012; 100 (4):817–885. [ Google Scholar ]
  • Hirsch-Hoefler S, Canetti D, Rapaport C, Hobfoll SE. Conflict will harden your heart: Exposure to violence, psychological distress and peace barriers in Israel and Palestine. British Journal of Political Science. 2014:1–15. [ Google Scholar ]
  • Jenkins BM. Will terrorists go nuclear? Santa Monica, CA: The RAND Corporation; 1975. (P-5541 in the RAND Paper Series) [ Google Scholar ]
  • Lerner JS, Gonzalez RM, Small DA, Fischhoff B. Effects of fear and anger on perceived risks of terrorism: A national field experiment. Psychological Science. 2003; 14 (2):144–150. [ PubMed ] [ Google Scholar ]
  • Lewis JA. Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats. Center for Strategic and International Studies. 2002 Dec [ Google Scholar ]
  • Libicki MC. Cyberspace in Peace and War. Chap. 32. Annapolis, MD: Naval Institute Press; 2014. From the Tallinn Manual to Las Vegas rules. 2016 (forthcoming) [ Google Scholar ]
  • McDermott R. Proceedings of a Workshop Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy, National Research Council. Washington, DC: The National Academies Press; 2010. Decision Making under Uncertainty; pp. 227–241. [ Google Scholar ]
  • Polityuk P. Ukraine Sees Russian Hand in Cyber Attacks on Power Grid. Reuters. 2016 Feb 12; http://www.reuters.com/article/us-ukraine-cybersecurity-idUSKCN0VL18E . [ Google Scholar ]
  • Schmitt MN, editor. Tallinn Manual on the International Law Applicable to Cyber Warfare. Cambridge: Cambridge University Press; 2013. [ Google Scholar ]
  • Somer E, Tamir E, Maguen S, Litz BT. Brief cognitive behavioral phone-based intervention targeting anxiety about the threat of an attack: A pilot study. Behaviour Research and Therapy. 2005; 43 (5):669–679. [ PubMed ] [ Google Scholar ]
  • Shelton M, Rainie L, Madden M. Americans’ Privacy Strategies Post-Snowden. Pew Research Center. 2015 Mar 15; http://www.pewinternet.org/files/2015/03/PI_AmericansPrivacyStrategies_0316151.pdf . [ Google Scholar ]
  • Rogers A. What Anonymous is Doing in Ferguson. Time. 2014 Aug 21; http://time.com/3148925/ferguson-michael-brown-anonymous/ [ Google Scholar ]
  • Tadjbakhsh S. Human security twenty years on. Norwegian Peacebuilding Resource Centre (NOREF) 2014 Jun; http://www.peacebuilding.no/var/ezflow_site/storage/original/application/540cb240aa84ac7133bce008adcde01f.pdf . [ Google Scholar ]
  • Tadjbakhsh S, Chanoy AM. Human Security: Concepts and Implications. Abingdon, UK: Routledge; 2007. [ Google Scholar ]
  • Verton D, Brownlow J, editors. Black Ice: The Invisible Threat of Cyber-Terrorism. Emeryville, CA: McGraw-Hill/Osborne; 2003. [ Google Scholar ]

A comprehensive review of Cyber Terrorism in the current scenario

Ieee account.

  • Change Username/Password
  • Update Address

Purchase Details

  • Payment Options
  • Order History
  • View Purchased Documents

Profile Information

  • Communications Preferences
  • Profession and Education
  • Technical Interests
  • US & Canada: +1 800 678 4333
  • Worldwide: +1 732 981 0060
  • Contact & Support
  • About IEEE Xplore
  • Accessibility
  • Terms of Use
  • Nondiscrimination Policy
  • Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

Advertisement

Advertisement

Computational techniques to counter terrorism: a systematic survey

  • Published: 03 June 2023
  • Volume 83 , pages 1189–1214, ( 2024 )

Cite this article

  • Jaspal Kaur Saini 1 &
  • Divya Bansal 2  

267 Accesses

2 Citations

Explore all metrics

Terrorist Network Analysis (TNA) is the field of analyzing and defining the scope of terrorism and researching the countermeasures in order to handle exponentially increasing threats due to ever growing terrorist based activities. This field constitutes several sub-domains such as crawling the data about terrorist attacks/groups, classification, behavioral, and predictive analysis. In this paper we present a systematic review of TNA which includes study of different terrorist groups and attack characteristics, use of online social networks, machine learning techniques and data mining tools in order to counter terrorism. Our survey is divided into three sections of TNA: Data Collection, Analysis Approaches and Future Directions. Each section highlights the major research achievements in order to present active use of research methodology to counter terrorism. Furthermore, the metrics used for TNA analysis have been thoroughly studied and identified. The paper has been written with an intent of providing all the necessary background to the researchers who plan to carry out similar studies in this emerging field of TNA. Our contributions to TNA field are with respect to effective utilization of computational techniques of data mining, machine learning, online social networks, and highlighting the research gaps and challenges in various sub domains.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price includes VAT (Russian Federation)

Instant access to the full article PDF.

Rent this article via DeepDyve

Institutional subscriptions

research papers on cyber terrorism

Similar content being viewed by others

research papers on cyber terrorism

Identifying Prominent Individuals or Groups in Terrorist Network Using Social Network Analysis and Investigative Data Mining

research papers on cyber terrorism

Complex Networks for Terrorist Target Prediction

research papers on cyber terrorism

Social Network Analysis: A Methodology for Studying Terrorism

Abbasi A, Chen H (2005) Analysis to extremist- messages. Intell Syst IEEE 20(5):67–75

Article   Google Scholar  

Agrawal R, Srikant R (1994) Fast algorithms for mining association rules. Proc 20th int conf very large data bases, VLDB. vol 1215

Allanach J, Tu H, Singh S, Willett P, Pattipati K (2004) Detecting, tracking, and counteracting terrorist networks via hidden markov models. In: IEEE Aerospace Conference, pp 3246–3257

Allister D, Ipung HP, Nugroho SA (2010) Text classification techniques used to faciliate cyber terrorism investigation. In: 2nd International conference on advances in computing, control, and telecommunication technologies

Apollo Social Sensing Toolkit (2020) [Online]. Available: http://apollo2.cs.illinois.edu/index.html

Archetti F, Djordjevic D, Giordani I, Sormani R, Tisato F (2014) A reasoning approach for modelling and predicting terroristic attacks in urban environments. In: Security Technology (ICCST), 2014, pp 1–6

Asongu SA, Orim S-MI, Nting RT (2019) Terrorism and social media: global evidence. J Global Inf Technol Manag 22.3:208–228

Google Scholar  

AutoMap: Project — CASOS (2016) [Online]. Available: http://www.casos.cs.cmu.edu/projects/automap/ . [Accessed: 08 May 2016]

Baraldi A, Blonda P (1999) A survey of fuzzy clustering algorithms for pattern recognition. IEEE Trans Syst Man Cybern Part B 29(6):778–785

Berzinji A, Abdullah FS, Kakei AH (2003) Analysis of terrorist groups on facebook. In: 2013 European intelligence and security informatics conference analysis, p 7695

Best DM, Northwest P (2015) Clique: Situational awareness. IT Prof 117(August):66–68

Bhattacharyya S, Jha S, Tharakunnel K, Westland JC (2011) Data mining for credit card fraud: A comparative study. Decis Support Syst 50(3):602–613

BioWar: Project — CASOS (2016) [Online]. Available: http://www.casos.cs.cmu.edu/projects/biowar/ . [Accessed: 08 May 2016]

Brajawidagda U, Reddick CG, Chatfield AT (2016) Social media and urban resilience: A case study of the 2016 Jakarta terror attack. In: Proceedings of the 17th International digital government research conference on digital government research

Brynielsson J, Sharma R (2015) Detectability of low-rate HTTP server DoS attacks using spectral analysis. In: 2015 IEEE/ACM International conference on advances in social networks analysis and mining, pp 954–961

Burke R, Mobasher B, williams C, Bhaumik R (2006) Classification features for attack detection in collaborative recommender systems. In: KDD ’06 Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining, pp 542–547

Cao L, Member S, Zhao Y (2008) Mining Impact-Targeted activity patterns in imbalanced data. IEEE Trans Knowl Data Eng 20(8):1053–1066

Chen J, Li B (2009) Random forest for relational classification with application to terrorist profiling. In: Granular computing, 2009, GRC ’09. IEEE International Conference, pp 630–633

Chen J, Xu J, Chen P, Ding G, Lax RF, Marx BD (2008) Fuzzy clustering and iterative relational classification for terrorist profiling. In: Granular Computing, 2008. GrC 2008. IEEE International Conference on, pp 142–147

Coffman TR, Suite JR, Marcus SE (2004) Dynamic classification of groups through social network analysis and HMMsl. 2. In: IEEE Aerospace conference proceedings dynamic classification of groups through social network analysis and HMMsl.2 Thayne R. Coffman 2 1” Century technologies, Inc. 11675 Jollyville Rd Suite 300 Austin, TX 78759 tcoffman@2 1 technologies.com 5 12-342-00 I , pp 1–9

Dark Web Forums (2016) [Online]. Available: http://www.azsecure-data.org/dark-web-forums.html . [Accessed: 08 May 2016]

Dark Web Project (2016) [Online]. Available: http://www.azsecure-data.org/about.html . [Accessed: 08 Feb 2016]

David Liben-Nowell JK (2013) The link prediction problem for social networks. Int Rev Res Open Distance Learn 14(4):90–103

Desmarais BA, Cranmer SJ, Hill C, Carolina N (2011) Forecasting the locational dynamics of transnational terrorism:, a network analytic approach. In: European intelligence and security informatics conference, pp 171–177

Deylami HA (2015) Link prediction in social networks using hierarchical community detection. In: IKT2015 7th International conference on information and knowledge technology, pp 1–5

Dhote Y, Mishra N (2013) Survey and analysis of temporal link prediction in online social networks. In: International Conference ondvances in Computing, Communications and Informatics (ICACCI), pp 1178–1183

Dickerson JP (2011) Dealing with Lashkar-e-Taiba: A multi-player game-theoretic perspective. In: 2011 European intelligence and security informatics conference, pp 354–359

Dimensions AT (2015) Security QoS profiling against cyber terrorism in airport network systems. In: 2015 International Conference on Cyberspace Governance (CYBER-ABUJA), pp 241–251

Duman E, Ozcelik MH (2011) Expert Systems with Applications Detecting credit card fraud by genetic algorithm and scatter search. Expert Syst Appl 38(10):13057–13063

Duo-yong S (2011). In: Intelligence and Security Informatics (ISI), 2011 IEEE International Conference on, no 70973138, pp 373–378

DyNetML— CASOS (2016) [Online]. Available: http://www.casos.cs.cmu.edu/projects/dynetml/ . [Accessed: 08 May 2016]

Engene JO (2006) The data set Terrorism in Western Europe: Events Data, or TWEED for short, was constructed and collected for the purpose of analysing patterns of terrorism in Western Europe as related to historical and structural preconditions (see Jan Oskar Engene: Eur. [Online]. Available: http://folk.uib.no/sspje/tweed.htm

Fire M, Tenenboim L, Lesser O, Puzis R, Rokach L, Elovici Y (2011) Link prediction in social networks using computationally efficient topological features. Proceedings - 2011 IEEE Int Conf Privacy, Secur Risk Trust IEEE Int Conf Soc Comput PASSAT/SocialCom 2011:73–80

Fu J, Sun D, Chai J (2012) Multi-factor analysis of terrorist activities based on social network. In: 2012 5th International conference on business intelligence and financial engineering multi-factor, pp 476–480

Goldstein BH (2006) Modeling, IEEE Spectr, no September, pp 26–34

Goyal T, Saini JK, Bansal D (2019) Analyzing behavior of ISIS and Al-Qaeda using association rule mining. In: Proceedings of 2nd International conference on communication, computing and networking, Springer, Singapore

Guohui LI, Song LU, Xudong C, Hui Y, Heping Z (2014) Study on correlation factors that influence terrorist attack fatalities using Global Terrorism Database. In: 2014 International symposium on safety science and technology study, pp 698–707

Haglich P, Rouff C (2010) Detecting emergence in social networks. In: IEEE international conference on social computing/IEEE international conference on privacy, security, risk and trust, pp 693–696

Hogan B (2011) Visualizing and interpreting facebook networks

Hsiao H, Lin CS, Chang S (2009) Constructing an ARP attack detection system with SNMP traffic data mining. In: Proceedings of the 11th international conference on electronic commerce. ACM, pp 341–345

Huang Z, Chen H, Yu T, Sheng H, Luo Z (2009) Semantic text mining with linked data. In: 2009 5th International joint conference on INC, IMS and IDC, pp 338–343

Huillier GL, Huillier GL, Alvarez H, Aguiler F, Aguilera F (2010) Topic-based social network analysis for virtual communities of interests in the dark web topic-based social network analysis for virtual communities interests in the dark web. In: ACM SIGKDD Workshop on intelligence and security informatics, p9, pp 66–73

International Terrorism: Attributes of Terrorist Events (ITERATE) (2016) [Online]. Available: http://www.icpsr.umich.edu/icpsrweb/DSDR/studies/07947#datasetsSection . [Accessed: 08 Feb 2016]

JDK (2016) [Online]. Available: http://www.oracle.com/technetwork/java/javase/downloads/index.html . [Accessed: 07 May 2016]

Jan G (2011) Visual investigation of similarities in global terrorism database by means of synthetic social networks. In: Computational Aspects of Social Networks (CASon), 2011 International Conference on, IEEE, 2011, pp 255–260

Jayaweera I, Sajeewa C, Liyanage S, Wijewardane T, Perera I, Wijayasiri A (2015) Crime analytics: Analysis of crimes through newspaper articles. In: 2015 Moratuwa Eng Res Conf, pp 277–282

Jin L, Diego S, Chen Y (2013) Understanding user behavior in online social networks: A survey, no September, pp 144–150

Johnson CW (2005) Applying the lessons of the attack on the world trade center, 11th september 2001, to the design and use of interactive evacuation simulations. In: Proceedings of the SIGCHI conference on Human factors in computing systems. ACM, 2005, pp 651–660

Katipally R, Cui X (2010) Multistage attack detection system for network administrators using data mining, pp 0–3

Kaur A, Saini JK, Bansal D (2019) Detecting radical text over online media using deep learning. arXiv: 1907.12368

Kengpol A, Neungrit P (2014) A decision support methodology with risk assessment on prediction of terrorism insurgency distribution range radius and elapsing time: An empirical case study in Thailand. Comput Ind Eng 75:55–67

Klausen J (2016) The role of social networks in the evolution of Al Qaeda-inspired violent extremism in the United States, 1990-2015 Brandeis University

Krause L, Lehman L, Wheeler A, Drive S (2003) A family of agent based models

Lautenschlager J, Ruvinsky A, Warfield I, Kettler B (2015) Group profiling automation for crime and terrorism (GPACT). Procedia Manuf 3(Ahfe):3933–3940

Liu Z, Xin L, Peng P (2011) Comparison of two mathematical models for predicting the fallout hazard from terrorist nuclear detonations. In: International conference on electronic & mechanical engineering and information technology, pp 4007–4009

Moon I, Carley KM (2007) Modeling and networks in social and Geospatial dimensions

Mannes A, Michael M, Pate A, Sliva A, Subrahmanian VS, Wilkenfeld J (2008) Stochastic opponent modeling agents: A case study with hezbollah, Soc Comput Behav Model Predict no. September 2002, pp 37–45

Mannes A, Shakarian J, Sliva A, Subrahmanian VS (2011) A computationally-enabled analysis of lashkar-e-taiba attacks in jammu & kashmir. In: 2011 European intelligence and security informatics conference, pp 224–229

Mason R, Mcinnis B, Dalal S (2012) Machine learning for the automatic identification of terrorist incidents in worldwide news media, pp 84–89

Mathieu B, Truong P, You W, Labs O (2012) Information-centric networking: A natural design for social network applications, no July, pp 44–51

McKerlich R, Ives C, McGreal R (2013) Uncovering the darkweb: A case study of jihad on theWeb. Int Rev Res Open Distance Learn 14(4):90–103

Miller RR (2002) Viewpoint Information Management in, vol 45, no 9, pp 31–33

Mitchell TM (1997) Machine learning, no 1

NODEXL (2007) [Online]. Available: http://www.smrfoundation.org/tools/

National Consortium for the Study of Terrorism and Responses to Terrorism (START) (2015) GTD Global terrorism database, START. p 63

Ngai EWT, Hu Y, Wong YH, Chen Y, Sun X (2011) The application of data mining techniques in financial fraud detection: A classification framework and an academic review of literature. Decis Support Syst 50(3):559–569

Nguyen LT, Wu P, Chan W, Field M (2012) Predicting collective sentiment dynamics from time-series social media. In: WISDOM ’12 Proceedings of the 1st international workshop on issues of sentiment discovery and opinion mining

ORA-LITE: Software — CASOS (2016) [Online]. Available: http://www.casos.cs.cmu.edu/projects/ora/software.php . [Accessed: 08 May 2016]

Ozgul F, Atzenbeck C, Erdem Z (2011) How much similar are terrorists networks of Istanbul?. In: 2011 International conference on advances in social networks analysis and mining how, pp 468–472

Ozgul F, Erdem Z, Bowerman C (2009) Prediction of past unsolved terrorist attacks, pp 37–42

PHP: Hypertext Preprocessor (2016) [Online]. Available: https://secure.php.net/ . [Accessed: 07 May 2016]

Pagán JV (2010) Improving the classification of terrorist attacks a study on data pre-processing for mining the global terrorism database. In: 2010 2nd International Conference on Software Technology and Engineering(ICSTE) Improving, pp 104–110

Pavel A (2005) Responding to terrorist attacks and natural disasters: a case study using simulation. In: Winter simulation conference, pp 886–894

Projects - Construct — CASOS (2016) [Online]. Available: http://www.casos.cs.cmu.edu/projects/construct/ . [Accessed: 08 May 2016]

Projects - OrgAhead — CASOS (2016) [Online]. Available: http://www.casos.cs.cmu.edu/projects/OrgAhead/ . [Accessed: 08 May 2016]

Python Programming Language (2016) [Online]. Available: https://www.python.org/ . [Accessed: 07 May 2016]

R (2016) The R project for statistical computing. [Online]. Available: https://www.r-project.org/ . [Accessed: 07 May 2016]

R. C., DARPA (2019) RDWTI — RAND [Online]. Available: http://www.rand.org/nsrd/projects/terrorism-incidents.html

Rejaie R, Torkjazi M, Valafar M, Willinger W (2010) Sizing up online social networks. Network, IEEE 24(5):32–37

START (2005) MAROB. [Online]. Available: http://www.cidcm.umd.edu/mar/mar_data.asp

START (2020) Global Terrorism Database. [Online]. Available: http://www.start.umd.edu/gtd/

Sang J, Deng Z, Lu D, Xu C (2015) Cross-OSN user modeling by homogeneous behavior quantification and local social regularization. IEEE Trans Multimed 17(12):2259–2270

Sardarnia K, Safizadeh R (2019) The internet and its potentials for networking and identity seeking: A study on ISIS. Terror Political Violence 31.6:1266–1283

Scanlon JR, Gerber MS (2014) Automatic detection of cyber-recruitment by violent extremists. Secur Inform 3(1):1–10

Schreck T, Keim D (2013) Visual analysis of social media data, pp 68–75

Serra E, Subrahmanian VS (2014) A survey of quantitative models of terror group behavior and an analysis of strategic disclosure of behavioral models. IEEE Trans Comput Soc Syst 1(1): 66–88

Shen H, Member S, Li Z, Liu J, Grant JE (2015) Knowledge sharing in the online social network of Yahoo! Answers and Its Implications. IEEE Trans Comput 64(6):1715–1728

MathSciNet   Google Scholar  

Siegrist D (2000) Advanced information technology to counter biological terrorism. ACM SIGBIO Newsletter 20.2:2–7

Skillicorn DB (2015) Empirical assessment of al qaeda, isis, and taliban propaganda. In: Intelligence and Security Informatics (ISI), 2015 IEEE International Conference on, pp 61–66

Skillicorn DB, Spezzano F, Subrahmanian VS (2014) Understanding south asian violent extremist group-group interactions, no Asonam, pp 687–694

South Asia Terrorism Portal (SATP) (2016) [Online]. Available: http://www.satp.org/ . [Accessed: 08 Feb 2016]

Spezzano F, Mannes A (2013) STONE: Shaping terrorist organizational network efficiency. In: 2013 IEEE/ACM International conference on advances in social networks analysis and mining STONE, pp 348–355

Su P, Mao W, Zeng D, Zhao H (2012) Mining actionable behavioral rules. Decis Support Syst 54(1):142–152

Subrahmanian EVS (2012) Handbook of computational approaches to counter terrorism, Springer Science & Business Media

Suicide Attack Database (SAD) (2016) [Online]. Available: https://cpostdata.uchicago.edu/search_new.php . [Accessed: 08 Feb 2016]

Taquechel E, Guard USC (2010) Layered defense: Modeling terrorist transfer threat networks and optimizing network risk reduction, no December, pp 30–35

The crawler4j Open Source Project on Open Hub (2016) [Online]. Available: https://www.openhub.net/p/crawler4j . [Accessed: 07 May 2016]

Thuraisingham B (2004) Data mining for counter-terrorism. Data Mining:, Next Generation Challenges and Future Directions, pp 157–183

UCINET Software (2016) [Online]. Available: https://sites.google.com/site/ucinetsoftware/home . [Accessed: 08 May 2016]

Valenzuela ML, Feng C, Momen F, Rozenblit JW (2010) A non-numerical predictive model for asymmetric analysis

Visualization AW, Lee J (2008) Exploring global terrorism data: A web-based visualization of temporal data, vol 15, no 2, pp 7–14

Wang P (2014) A tale of three social networks, pp 10–15

Wang J (2014) A novel method of centrality in terrorist network, pp 144–149

Wang T, Liao G (2014) A review of link prediction in social networks. In: International conference on management of e-commerce and e-government, pp 149–152

Weil T (2015) Happened to sony happen to us?, no April

Weinstein C, Campbell W, Delaney B, Leary GO, Street W (2009) Modeling and detection techniques for counter-terror social network analysis and intent recognition

Wiil UK, Gniadek J, Memon N (2010) Measuring link importance in terrorist networks. In: 2010 International conference on advances in social networks analysis and mining. IEEE, pp 225–232

Worldwide Incident Tracking System (WITS) (2004) [Online]. Available: https://esoc.princeton.edu/files/global-terrorism-database-worldwide-incident-tracking-system

Xiong H, Wu J, Chen J (2009) K-means clustering versus validation measures: a data-distribution perspective. IEEE Trans Syst, Man, Cybern Part B 39(2):318–331

Xu R, Wunsch D (2005) Survey of clustering algorithms. IEEE Trans Neural Netw 16(3):645–678. [Online]. Available: https://doi.org/10.1109/TNN.2005.845141

Ze L, Duo-yong S, Shu-quan G, Bo L (2014) Detecting Key Individuals in Terrorist Network Based on FANP Model. In: 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014), pp 724–727

Zhou Y, Qin J, Reid E, Lai G, Chen H (2005) Studying the presence of terrorism on the web: A knowledge portal approach. In: Proceedings of the 5th ACM/IEEE-CS joint conference on Digital libraries. ACM, 2005, p 402

(2017). https://www.start.umd.edu/gtd/images/START_GlobalTerrorismDatabase_TerroristAttacksConcentrationIntensityMap_45Years.png [Date Accessed 23 Nov 2017]

Download references

This work was partially supported by Cyber Security Research Centre, Punjab Engineering College (Deemed to be University), Chandigarh, India.The author Jaspal K Saini is grateful to Visvesvaraya PhD scheme for Electronics and IT for funding this research.

Author information

Authors and affiliations.

School of Computing, IIIT Una, Una, Himachal Pradesh, India

Jaspal Kaur Saini

Punjab Engineering College (Deemed To Be University), CSRC, Chandigarh, India

Divya Bansal

You can also search for this author in PubMed   Google Scholar

Corresponding author

Correspondence to Jaspal Kaur Saini .

Ethics declarations

Conflict of interests.

The authors declare that they have no conflict of interest.

Additional information

Publisher’s note.

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Saini, J.K., Bansal, D. Computational techniques to counter terrorism: a systematic survey. Multimed Tools Appl 83 , 1189–1214 (2024). https://doi.org/10.1007/s11042-023-15545-0

Download citation

Received : 29 October 2021

Revised : 18 November 2022

Accepted : 19 April 2023

Published : 03 June 2023

Issue Date : January 2024

DOI : https://doi.org/10.1007/s11042-023-15545-0

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Computational techniques
  • Data science
  • Data mining
  • Machine learning
  • Online social networks
  • Terrorist network
  • Find a journal
  • Publish with us
  • Track your research

Academia.edu no longer supports Internet Explorer.

To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to  upgrade your browser .

Enter the email address you signed up with and we'll email you a reset link.

  • We're Hiring!
  • Help Center

paper cover thumbnail

Research Paper On Cyber Terrorism-A Global Security Threat

Profile image of Sreoshi Sinha

Terrorism, one of the vilest crimes, faced by the human community has posed an immense challenge in the post Cold War period. It has existed since the emergence of human societies endangering innocent lives and jeopardizing human rights and fundamental freedoms. Though the conventional motives have remained the same, the traditional concepts and methods of terrorism have taken new dimensions that are more destructive 1 and deadly in nature. In the age of information technology the terrorists have acquired an expertise to produce the most deadly combination of weapons and technology, which are much more modern and scientific. This phenomenon where the cyber space is used to launch terror attacks is also known as cyber-terrorism. It has the potential to do indeterminable harm not only by paralyzing computer infrastructures but also comprehending the use of the cyberspace to support and organize traditional forms of terrorism, such as bombings and suicide attacks. It also poses a deadly threat on the national security of a state by offering a garb of anonymity to the perpetrators of terror. The increased dependency on information technology has dramatically increased the security risks. This new menace will be a severe challenge to global security unless there are appropriate security measures to help prevention. Hence, to understand cyber terrorism, and find out the ways in which the terrorist organizations are using the advantage of this new technology, a look at its background is necessary. This paper shall make an attempt to discuss the rising incidents of cyber terrorism across the globe, the meaning and concept of the term, the motives and methods behind an attack. It shall also discuss the regional and international mechanisms to prevent cyber terrorism, and recommend what more could be done.

Related Papers

: CONTEMPORARY MACEDONIAN DEFENCE - INTERNATIONAL SCIENTIFIC DEFENCE, SECURITY AND PEACE JOURNAL

Mitko Bogdanoski

It is more than obvious that the way of conducting terrorism with the time is becoming more sophisticated. The cyber terrorism is real threat to fast technology development. Potential targets are systems which control the nation’s defenses and critical infrastructure. The terrorist of the future will win the wars without firing a shot - just by destroying infrastructure that significantly relies on information technology. The fast growth of the Internet users and Internet dependence dramatically increased the security risks, unless there are appropriate security measures to help prevention. To understand cyber terrorism it is important to look at its background, to see how the terrorist organizations or individuals are using the advantage of new technology and what kind of measures governments and international organizations are taking to help the fight against cyber terrorism.

research papers on cyber terrorism

Andrew N Liaropoulos

Sania Arsalan

As the addiction of internet is increasing at a highly increasing rate from our mobile phones to our streets, from our streets to our colleges, from our colleges to our work places, from our work places to our hospitals and from our hospital to everywhere, the risks caused by cyber terrorism has also increased. During the past few decades, the threats posed by cyber terrorism have increased to a deadly rate. It has raised a question mark to the Government's security policies and agendas. This caused Government agencies to revise their security policies. It has raised awareness of the other channels that terrorists might be adopting to accomplish their ambitions. These attacks are planned to cause severe economic damage to someone and even in some cases it harms someone's life. This research is designed for a clear understanding of a layman what cyber terrorism exactly is

Advances in Digital Crime, Forensics, and Cyber Terrorism

Thanks to the internet, the distances between the countries are easily overcome and the communication network rapidly expands. This situation also affects the cyber security of the countries to a great extent. Attacks on critical infrastructures, companies, and public institutions can be magnitude that make great harms. These developments in cyber space bring new problems. One of them is cyber terror. Cyber terror does not have a certain and well-known definition. Cyber terror is the realization of terrorist acts in the field of cyber war. In addition, cyber space is a place of display for terrorist acts. The effects of cyber terror attacks have reached a level to scare all countries. There is not enough information about the definition, characteristics, methods used in cyber terror attacks and cyber terror groups. It is important for national administrators and staff to become conscious and to become informed about cyber terror. In this chapter, information will be presented, endea...

Journal of Social Sciences and Humanities

Zaheema Iqbal

In today’s postmodern world with the latest and top notch internet technologies in the market, if it has become easy and accessible for everyone to communicate with others sitting at the other corner of the world, it has also given rise to the cybercrimes including cyber terro rism which has not only provided grave threats to the whole world but also posed a question of whether with the manipulation of cyber space, cyber terrorists can damage or destroy the physical infrastructure of its target. Owing to easy access to everyone and strong damage done as compared to traditional terrorism, today terrorists are relying on cyber terrorism as well. The Islamic State (IS) has emerged as one of the brutal and violent terrorist organization s which hired cyber experts and manipulated cyber space to the extent that today they are most active and professional cyber users’ terrorist organization of the world. The main focus of the paper is to highlight the basic definition of cyber terrorism, ...

TERRORIST USE OF CYBER TECHNOLOGY

Assoc.Prof.Dr. Serdar Yurtsever

The risk posed by terrorist use of cyber technology and cyber terrorism have been of great concern to politicians, decision makers, security officials. This article studies terrorist use of cyber technology and cyber terrorism along with history of cyber-terrorism. Moreover some concepts such as between cyber-crime, cyber-terrorism, cyber-warfare and hactivism will be analysed. Furthermore, the challenges faced by international organisations in tackling cyber terrorism will be discussed; measures introduced in some countries to address cyber terrorism treats are presented as well as discussions on the present and the future treat posed by cyber terrorism and terrorist use of cyber technology.

Enver Buçaj PhD

International Journal of Sustainable Future for Human Security

Halimin Herjanto

Jasmin Kalac

The tremendous achievements and the development of the leading technology, sophisticaled computer systems opened new " cyberspace " that constantly destroys the old traditional forms of organization, behavior and belief. Cyber information led to cyber revolution and the emergence of the information society, which dominates the race for information and communication technologies, in parallel the global liberalization and free circulation of people, goods and ideas (Stern, Jessica, 1999). Today, thirty years after the introduction of the term, the concept of cybernetics, it inevitably became a primary component of many important terms: cyber society, cyber policy, cyber economy, cyber warefare, cyber terrorism, cyber crime, in which essentially the most precious crown represents cyber information. Cyber terrorism is an important cybersystem of cyber warefare, and is very difficult to detect and counter because it is almost impossible to determine the political affiliation or sponsors of its prepertators.

RELATED PAPERS

Potravinarstvo

Martin Melich

Yeinis Espinoza

American Psychologist

Marjorie Lindner Gunnoe

Maria Adelane Monteiro Silva

Revista da Micro e Pequena Empresa

Danielle Montenegro , Jose Elenilson Cruz

Environmental Toxicology

Mu-Rong Chao

Francisco Regis Vieira Alves (Teacher Digital Influencer)

Procedia - Social and Behavioral Sciences

Ianthi Tsimpli

Journal of the American Society of Echocardiography

Theresa Tacy

Diálogo Andino

Luciano Literas

Syariati : Jurnal Studi Al-Qur'an dan Hukum

Naqiyah Naqiyah

Marko Niemimaa

Grethe Sandstrak

Hacettepe University Journal of Education

J-Plantasimbiosa

Dulbari Dulbari

Krystyna Serafin

Steven Raaijmakers

Food Chemistry

walter santos

Narrare i Gruppi

maria luisa traina

European Journal of Public Health

THOMAS BORTOLOTTI

Massoumeh Farasat

Iranian Journal of Medical Education

Fakhrosadat mirhosseini

Intelligent Decision Technologies

Taketoshi Ushiama

Takahito Itoh

See More Documents Like This

RELATED TOPICS

  •   We're Hiring!
  •   Help Center
  • Find new research papers in:
  • Health Sciences
  • Earth Sciences
  • Cognitive Science
  • Mathematics
  • Computer Science
  • Academia ©2024
  • Follow us on Facebook
  • Follow us on Twitter
  • Criminal Justice
  • Environment
  • Politics & Government
  • Race & Gender

Expert Commentary

White supremacy: Research on cyber-racism and domestic terrorism

This updated collection of research aims to help journalists better understand and ask more probing questions about white supremacy and far-right organizations.

white supremacy research racism domestic terrorism

Republish this article

Creative Commons License

This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License .

by Denise-Marie Ordway, The Journalist's Resource May 18, 2022

This <a target="_blank" href="https://journalistsresource.org/race-and-gender/white-supremacy-research-cyber-racism/">article</a> first appeared on <a target="_blank" href="https://journalistsresource.org">The Journalist's Resource</a> and is republished here under a Creative Commons license.<img src="https://journalistsresource.org/wp-content/uploads/2020/11/cropped-jr-favicon-150x150.png" style="width:1em;height:1em;margin-left:10px;">

This roundup of research on white supremacy, originally published in July 2019, has been updated with new information and research to assist journalists covering the Buffalo mass shooting on May 14.

In his speech Tuesday in Buffalo, where 10 people died in a mass shooting in a majority-Black neighborhood, President Joe Biden called white supremacy a “poison” that has “been allowed to fester and grow right in front of our eyes.”

The May 14 massacre is among a string of mass shootings spurred by racial hatred in recent years. The lone suspect, an 18-year-old white man, allegedly shot and killed 10 people and injured three others at the Tops Friendly Market after researching New York communities with the biggest Black populations. Buffalo Police Commissioner Joseph Gramaglia has said the attack will be prosecuted as a hate crime .

The gunman livestreamed the killings from a helmet camera as he moved from the parking lot into the supermarket, armed with an AR-15-style rifle with the N-word painted on its barrel, according to officials .

“What happened here is simple and straightforward: terrorism. Terrorism. Domestic terrorism,” Biden told journalists, community leaders and others gathered at the Delavan Grider Community Center on May 17. “Violence inflicted in the service of hate and a vicious thirst for power that defines one group of people being inherently inferior to any other group.”

The killing spree in Buffalo in many ways resembles the mass shooting in the Texas border city of El Paso in 2019.  An armed gunman motivated by hate killed 23 people and injured about two dozen more at a local Walmart . The 21-year-old white man who confessed to the crime told police he had targeted Mexicans.

Like the El Paso shooter, it appears the Buffalo shooter published a racist screed online prior to the attack. Officials are trying to verify the authenticity of the 180-page document, which includes details about the planned supermarket killings.

“A document circulated widely online seemingly outlines [his] racist, anti-immigrant and antisemitic beliefs,” The Associated Press reports . “Among them was a desire to drive all people not of European descent from the U.S.”

Reporting on white supremacy and providing appropriate context is difficult but critical work. The Journalist’s Resource encourages news outlets to look to academic research as a necessary tool in covering complex topics such as domestic terrorism, the mainstreaming of white supremacy and their consequences. Research will help newsrooms ground their coverage and ask more probing questions.

Below, we’ve summarized a sampling of published studies and working papers that examine white supremacy and far-right organizations, including their online recruitment strategies and use of genetic ancestry tests to establish race. We also summarized a book chapter from the Handbook of Global Media Ethics , released late last year, that offers insights into how journalists can improve their coverage. We will update this collection as scholars publish new data and research on these topics.

At the bottom of this page, you’ll find additional resources we hope you’ll find helpful — for example, links to research organizations investigating these topics, an Anti-Defamation League database of hate symbols and 10 tips for covering white supremacy and far-right extremists .

—————–

Covering white supremacy and racism

News Coverage of Racism, White Supremacy, and Hate Speech Katherine M. Bell and Andrea Cervantez. Chapter in Handbook of Global Media Ethics, 2021.

In this chapter of a book on media ethics, researcher Katherine M. Bell looks at how journalistic norms help preserve racist ideas and maintain “an ideological privileging of whiteness.” One problem: Although research indicates right-wing extremists pose a bigger threat in the U.S. than radicalized Muslims, journalists often have portrayed this form of terrorism as a minor threat — isolated incidents involving troubled individuals, she writes.

Bell also argues that traditional journalism practices “such as objectivity, event-based news routines, and a slavish reliance on official sources” have facilitated populism and overt white supremacy. So do newsroom policies guiding word choice.

Many journalists do not use the term “terrorism” in their coverage unless official sources such as police investigators use it, explains Bell, an associate professor of communication at California State University, East Bay. This, she writes, “means that the media embed the motives and institutional biases of public officials into their coverage. These include racial profiling of suspects and a known contingent of white supremacists on police forces and other government agencies.”

She urges journalists to name racism and xenophobia when they encounter it and stop allowing politicians and others to define those terms. She also warns against propagating the myths that racism is an aberration and racism is rooted in ignorance that can be corrected with education.

“A mainstream media portrayal of Donald Trump as singularly foul malefactor or a mentally declining fool is an ethical choice,” she writes, adding that portraying actors such as Trump as “nuts” makes it easy for progressive-minded individuals to ridicule and brush off their behavior.

Factors influencing right-wing terrorism

The Determinants of Domestic Right-Wing Terrorism in the USA: Economic Grievance, Societal Change and Political Resentment Piazza, James A. Conflict Management and Peace Science , 2017.

In this study, James A. Piazza , a political science professor at Pennsylvania State University, looks at the impact of a variety of economic, social and political factors on domestic, right-wing terrorism over four decades. He focuses on three categories of possible predictors of terrorism: economic hardships and grievance; societal changes aimed at empowering and including women and racial minorities and reducing white male privilege; and resentment toward the U.S. government and political system.

The main findings: Rising abortion rates and female participation in the labor force precipitate right-wing terrorist attacks in the U.S., as does the election of a Democratic president. Meanwhile, there is not a statistically significant link between the growth of minority populations and domestic terrorism. Piazza finds that poverty, Democratic control of state government and increased federal income tax rates also are not predictors of domestic terrorism.

Piazza analyzed 578 incidents of right-wing terrorism in the U.S. between 1970 and 2011, which were documented by the Global Terrorism Database , maintained by the University of Maryland’s Center for the Study of Terrorism and Responses to Terrorism. Data for the year 1993 were unavailable, however, because that information was lost during an office move.

Piazza defines domestic terrorism as “attacks occurring within the boundaries of the 50 states, perpetrated by U.S. citizens or residents against other U.S. citizens or residents with the intention of influencing a primarily domestic, U.S. audience.” Almost one-quarter of terrorist attacks during this period were by people and organizations motivated by right-wing ideology.

He finds that for every one point increase in a state’s abortion rate, right-wing terrorist incidents rose by 7.5%. But women entering the workforce and the election of a Democratic president have a greater impact. “For every 1% increase in female participation in the workforce, right-wing terrorist incidents increase by 153.1%, and attacks increase by 241.2% in years when the President is a Democrat,” Piazza writes.

“The results clearly highlight the social factors driving right-wing terrorism,” he writes. “Right-wing extremist rhetoric squarely places the source of ills afflicting ‘traditional’ American society and the proscriptive dominance of white males on the new, more prominent and more empowered place carved out for women in American life. As it turns out, the empowerment of women directly boosts right-wing terrorism.”

The Rhetoric of White Supremacist Terror: Assessing the Attribution of Threat Blessing, Jason; Roberts, Elise. Working paper for Syracuse University’s Institute for National Security and Counterterrorism, 2018.

In this paper, researchers at Syracuse University look at who white supremacist terror groups portray as threats in their propaganda literature. They focus on three terror groups: the Ku Klux Klan, neo-Nazis and the Christian Identity movement. For this project, the researchers traveled to the Wilcox Collection of Contemporary Political Movements at the University of Kansas, which houses one of the largest collections of literature and media from right-wing political movements in the U.S.

The researchers examined documents circulated among the general public by leaders within these three groups. They note that the 1,297 pages they examined aren’t representative of the overall body of materials available, but offer insights into the kinds of themes presented in white supremacist propaganda.

The authors explain that two primary themes emerged from their analysis: “(1) African-Americans as a threat to conceptions of White self-identity; and (2) Jews as … the main political threat to the White Supremacist Movement.”

“Elites from the KKK, Neo-Nazi, and Christian Identity factions repeatedly call for whites to carry out violence against Blacks and Jews,” the authors write. “Rhetoric regarding other racial and ethnic populations, while present to some degree, pales in comparison to rhetoric regarding Jews and Blacks.”

The researchers explain that even as the country undergoes economic and demographic changes, white supremacists continue to focus on black and Jewish communities.

“This suggests that, despite the rhetoric devoted to immigrant communities and poor economic conditions, violent White Supremacist organizations may be mobilizing in response to what they see as traditional and long-standing threats/enemies to their goals,” the researchers write. “As such, the law enforcement community should remain focused on protecting the African-American and Jewish communities — communities that have been the dominant focus of calls to arms by White Supremacists.”

Cyber racism

Online Networks of Racial Hate: A Systematic Review of 10 Years of Research on Cyber-Racism Bliuc, Ana-Maria; et al. Computers in Human Behavior , 2018.

A team of researchers examines dozens of studies published between Jan. 1, 2005 and Dec. 31, 2015 to understand the goals and strategies of racists on the internet. The researchers point out that most of the 31 studies they examined involve text analyses of “online phenomena that involve racial hate, aggression and prejudice.”

The researchers find that cyber-racism tends to come from two groups: racist organizations and individuals who often act anonymously. Racist organizations tend to use websites to communicate racist messages and ideas. They also communicate via online games located on racist websites. The authors write: “Racist groups use these channels to reach, not only general, but also very specific audiences. For instance, the video games made available to the public from far-right groups’ sites are often used as hidden opportunities to present a more attractive image of racist groups to existing and potential members, particularly targeting a younger audience.”

Individuals acting independently post racist content on a wider array of channels, including news websites, blogs, discussion forums, chat rooms and social media platforms such as Facebook and YouTube. “The Internet allows racist messages to be communicated, not only by text, static images and symbols, but also by downloadable videos, music, and interactive online games,” the authors explain.

They find that racist organizations carefully plan out their communication to achieve three primary goals: to strengthen the group by increasing the commitment of existing members and recruiting new ones, to disseminate racist propaganda, and to create a sense of transnational identity. Individuals have a different aim — to validate their racist views and hurt the “outgroup,” typically racial, ethnic and religious minorities.

The authors find that the two categories of racists also have different strategies for achieving their goals. Organizations stress intergroup conflict, reframe racism as a natural response to white oppression and use humor to try to make racism mainstream. The strategies of individuals include trivializing racism, reframing the meaning of news coverage and creating “moral panic” about the outgroup.

Cyberhate: A Review and Content Analysis of Intervention Strategies Blaya, Catherine. Aggression and Violent Behavior , 2018.

In this research review, Catherine Blaya , president of the International Observatory of Violence in School at Nice Sophia Antipolis University in France, examines efforts to prevent or counter cyberhate in various countries. She looks specifically at efforts to fight cyberhate against children, teenagers and young adults who are racial, ethnic or religious minorities. A key takeaway: While many programs have been launched, none have been found to be effective. “Although intentions are good,” she writes, “we have no evidence that the steps that are undertaken are effective in preventing and reducing cyberhate.”

Blaya examined 18 academic papers and reports, including those from human rights-related organizations and think tanks. They focus on four types of interventions — new policies that regulate free expression online; the use of technology to filter, block or address aggressive or hateful content; programs that teach young people how to evaluate online hate speech and address it; and programs that encourage “counterspeech” and prompt young people to respond to it with “counter-narrative campaigns.”

Blaya stresses the need to “develop research and rigorous evaluation protocols for the evaluation of interventions to prevent and counter cyberhate.” She encourages international and inter-agency cooperation. “Hate online is a multifactorial issue that cannot be prevented or tackled unilaterally and locally,” she writes.

Use of genetic ancestry testing

Genetic Ancestry Testing Among White Nationalists: From Identity Repair to Citizen Science Panofsky, Aaron; Donovan, Joan. Social Studies of Science . 2019.

How do white supremacists react when their peers’ genetic ancestry tests show they have non-white ancestry? To find out, researchers examined conversations about genetic tests on the white supremacist website Stormfront.org. According to the study, the website’s users were more likely to critique the genetic test or testing company than support or shame the people who posted what they considered to be disappointing results.

The researchers — Aaron Panosky , a sociologist at the UCLA Institute for Society and Genetics, and Joan Donovan , director of the Technology and Social Change Research Project at Harvard Kennedy School’s Shorenstein Center on Media, Politics and Public Policy — examined 639 posts dated between 2004 and 2016 in which users disclosed the results of their genetic ancestry tests. The posts occurred within 70 different discussion threads.

“The main finding here is that there are vastly more reactions about the interpretation of GATs [genetic ancestry tests] themselves than reactions to the individuals posting the results,” the authors write. “The wide range of discussion suggests GATs don’t have a clear meaning and represent a problem to be worked through by Stormfront users. Furthermore, emotionally supportive responses roughly balance out responses that take the results literally (as opposed to suspiciously) and shame, exclude or denounce the poster as not white.”

The study offers insights into the ways the website’s users criticize and support one another and measure “whiteness.” The posts also offer insight into the conspiracy theories the website’s users share and discuss.

The researchers note that the ancestry tests have encouraged white supremacists to further educate themselves about racial genetics, including genetic markers. The researchers suggest the tests could change how white supremacists compare themselves to others. “Consumer genetic tests are increasingly offering genetic trait prediction — from hair and eye color to tasting preferences to IQ — which will soon provide white nationalists ample material for adding notions of ‘genetic quality’ to their evolving identities, boundaries and racial theories.”

Additional resources:

  • The National Consortium for the Study of Terrorism and Responses to Terrorism , commonly referred to as START, is a research center located at the University of Maryland that is “comprised of an international network of scholars committed to the scientific study of the causes and human consequences of terrorism in the United States and around the world.”
  • The Institute for National Security and Counterterrorism , located at Syracuse University, does research on national and international security and counterterrorism.
  • Data & Society is a New York-based research institute that examines technology and automation.
  • The Southern Poverty Law Center is an advocacy organization that tracks hate groups in the U.S.
  • The Center on Extremism at the Anti-Defamation League, an anti-hate organization founded in 1913, is “a clearinghouse of valuable, up-to-the minute information about extremism of all types — from white supremacists to Islamic extremists.” The Anti-Defamation League’s “ Hate on Display ” database identifies the more than 200 hate symbols used most often by white supremacists and other hate groups.
  • Joan Donovan is director of the Technology and Social Change Research Project at Harvard Kennedy School. She’s also the project lead on media manipulation at Data & Society.
  • Jessie Daniels is a sociologist at the City University of New York who has written two books on white supremacy, White Lies and Cyber Racism: White Supremacy Online and the New Attack on Civil Rights . Her new book, Tweet Storm: The Rise of the Far-Right, the Mainstreaming of White Supremacy, and How Tech & Media Helped, is forthcoming.
  • Harvard race and history scholar Khalil Gibran Muhammad offers advice on when journalists should use the term “racist.”

This image was obtained from the Flickr account of Joe Piette and is being used under a Creative Commons license . No changes were made.

About The Author

' src=

Denise-Marie Ordway

U.S. Department of the Treasury

U.s. department of the treasury releases report on managing artificial intelligence-specific cybersecurity risks in the financial sector.

WASHINGTON – Today, the U.S. Department of the Treasury released a report on  Managing Artificial Intelligence-Specific Cybersecurity Risks in the Financial Services Sector. The report was written at the direction of Presidential Executive Order 14110 on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence. Treasury’s Office of Cybersecurity and Critical Infrastructure Protection (OCCIP) led the development of the report. OCCIP executes the Treasury Department’s Sector Risk Management Agency responsibilities for the financial services sector.

“Artificial intelligence is redefining cybersecurity and fraud in the financial services sector, and the Biden Administration is committed to working with financial institutions to utilize emerging technologies while safeguarding against threats to operational resiliency and financial stability,” said Under Secretary for Domestic Finance Nellie Liang. “Treasury’s AI report builds on our successful public-private partnership for secure cloud adoption and lays out a clear vision for how financial institutions can safely map out their business lines and disrupt rapidly evolving AI-driven fraud.”

In the report, Treasury identifies significant opportunities and challenges that AI presents to the security and resiliency of the financial services sector. The report outlines a series of next steps to address immediate AI-related operational risk, cybersecurity, and fraud challenges: 

  • Addressing the growing capability gap. There is a widening gap between large and small financial institutions when it comes to in-house AI systems. Large institutions are developing their own AI systems, while smaller institutions may be unable to do so because they lack the internal data resources required to train large models. Additionally, financial institutions that have already migrated to the cloud may have an advantage when it comes to leveraging AI systems in a safe and secure manner.
  • Narrowing the fraud data divide.  As more firms deploy AI, a gap exists in the data available to financial institutions for training models. This gap is significant in the area of fraud prevention, where there is insufficient data sharing among firms. As financial institutions work with their internal data to develop these models, large institutions hold a significant advantage because they have far more historical data. Smaller institutions generally lack sufficient internal data and expertise to build their own anti-fraud AI models.
  • Regulatory coordination.  Financial institutions and regulators are collaborating on how best to resolve oversight concerns together in a rapidly changing AI environment. However, there are concerns about regulatory fragmentation, as different financial-sector regulators at the state and federal levels, and internationally, consider regulations for AI.
  • Expanding the NIST AI Risk Management Framework.  The National Institute of Standards and Technology (NIST) AI Risk Management Framework could be expanded and tailored to include more applicable content on AI governance and risk management related to the financial services sector.
  • Best practices for data supply chain mapping and “nutrition labels.”  Rapid advancements in generative AI have exposed the importance of carefully monitoring data supply chains to ensure that models are using accurate and reliable data, and that privacy and safety are considered. In addition, financial institutions should know where their data is and how it is being used. The financial sector would benefit from the development of best practices for data supply chain mapping. Additionally, the sector would benefit from a standardized description, similar to the food “nutrition label,” for vendor-provided AI systems and data providers. These “nutrition labels” would clearly identify what data was used to train the model, where the data originated, and how any data submitted to the model is being used.
  • Explainability for black box AI solutions.  Explainability of advanced machine learning models, particularly generative AI, continues to be a challenge for many financial institutions. The sector would benefit from additional research and development on explainability solutions for black-box systems like generative AI, considering the data used to train the models and the outputs and robust testing and auditing of these models. In the absence of these solutions, the financial sector should adopt best practices for using generative AI systems that lack explainability.
  • Gaps in human capital.  The rapid pace of AI development has exposed a substantial AI workforce talent gap for those skilled in both creating and maintaining AI models and AI users. A set of best practices for less-skilled practitioners on how to use AI systems safely would help manage this talent gap. In addition, a technical competency gap exists in teams managing AI risks, such as in legal and compliance fields. Role-specific AI training for employees outside of information technology can help educate these critical teams.
  • A need for a common AI lexicon.  There is a lack of consistency across the sector in defining what “artificial intelligence” is. Financial institutions, regulators, and consumers would all benefit greatly from a common AI-specific lexicon.
  • Untangling digital identity solutions.  Robust digital identity solutions can help financial institutions combat fraud and strengthen cybersecurity. However, these solutions differ in their technology, governance, and security, and offer varying levels of assurance. An emerging set of international, industry, and national digital identity technical standards is underway.
  • International coordination.  The path forward for regulation of AI in financial services remains an open question internationally. Treasury will continue to engage with foreign counterparts on the risks and benefits of AI in financial services.

As part of Treasury’s research for this report, Treasury conducted in-depth interviews with 42 financial services sector and technology related companies. Financial firms of all sizes, from global systemically important financial institutions to local banks and credit unions, provided input on how AI is used within their organizations. Additional stakeholders included major technology companies and data providers, financial sector trade associations, cybersecurity and anti-fraud service providers, and regulatory agencies. Treasury’s report provides an extensive overview of current AI use cases for cybersecurity and fraud prevention, as well as best practices and recommendations for AI use and adoption. The report does not impose any requirements and does not endorse or discourage the use of AI within the financial sector. 

In the coming months, Treasury will work with the private sector, other federal agencies, federal and state financial sector regulators, and international partners on key initiatives to address the challenges surrounding AI in the financial sector. While this report focuses on operational risk, cybersecurity, and fraud issues, Treasury will continue to examine a range of AI-related matters, including the impact of AI on consumers and marginalized communities.

Read Treasury’s AI Report here.

IMAGES

  1. (PDF) Cyber Terrorism: A Study of the Extent of Coverage in Computer

    research papers on cyber terrorism

  2. Research paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep…

    research papers on cyber terrorism

  3. Research Paper On Applications Of Cyber Security

    research papers on cyber terrorism

  4. Research on the Cyber Terrorist Attacks and its Impacts on Information

    research papers on cyber terrorism

  5. Cyber terrorism essay research paper. Research Papers About Cyber

    research papers on cyber terrorism

  6. Research paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep…

    research papers on cyber terrorism

COMMENTS

  1. Full article: Too Close for Comfort: Cyber Terrorism and Information

    Cyber terrorism is an elusive concept. Most definitions make a distinction between on the one hand politically motivated violent acts, or the threat thereof, using the internet, and on the other hand all the preparatory and supporting activities for terrorism done on or via the internet, such as recruitment, communication and financing.

  2. A comprehensive review study of cyber-attacks and cyber security

    In addition, five scenarios can be considered for cyber warfare: (1) Government-sponsored cyber espionage to gather information to plan future cyber-attacks, (2) a cyber-attack aimed at laying the groundwork for any unrest and popular uprising, (3) Cyber-attack aimed at disabling equipment and facilitating physical aggression, (4) Cyber-attack as a complement to physical aggression, and (5 ...

  3. 1081 PDFs

    Explore the latest full-text research PDFs, articles, conference papers, preprints and more on CYBER TERRORISM. Find methods information, sources, references or conduct a literature review on ...

  4. PDF Cyberwarfare and Cyberterrorism: In Brief

    Specialist in Terrorism and National Security March 27, 2015 Congressional Research Service 7-5700 www.crs.gov R43955 . Cyberwarfare and Cyberterrorism: In Brief Congressional Research Service ... Criminals, terrorists, and spies rely heavily on cyber-based technologies to support organizational objectives. Cyberterrorists are state-sponsored ...

  5. Cyber Terrorism: Research Review: Research Report of the ...

    The report has drawn on a broad range of sources including government documents (e.g. law enforcement and security agencies), web/blog posts, academic articles, information security websites and online news articles about cyber terrorism. The final chapter concludes with a discussion on the likelihood of a cyber terrorist attack.

  6. Cyber terrorism: Case studies

    Case Studies—Activities in Cyberspace Attributed to Terrorist Organizations. One of the first documented attacks by a terrorist organization against state computer systems was by the Tamil Tigers guerilla fighters in Sri Lanka in 1998. Sri Lankan embassies throughout the world were flooded for weeks by 800 e-mail messages a day bearing the ...

  7. An Explorative Study into the Importance of Defining and Classifying

    Overview of Research. For almost up to 2 decades, the search for defining cyber terrorism has been described as the 'Holy Grail' for scholars and policy makers [].This has been escalated during the recent COVID pandemic where life has made a remarkable shift towards online activity, placing individuals at a much higher risk of being vulnerable to cyber terrorist activities [].

  8. Systematic Literature Review and Assessment for Cyber Terrorism

    Terrorist Network Analysis has been one of the most commonly discussed ways for safeguarding Online Social Network accessing and transmission through decentralized, trustless, peer-to-peer networks since Gabriel Weimann's research paper on Cyberterrorism published in 2005. This study analyzes peer-reviewed literature attempting to use Terrorist Network Analysis for Cybercrime and gives a ...

  9. Cyber Attacks and Terrorism: A Twenty-First Century Conundrum

    Section "Empirical Examination of Terrorism and Cyber Attacks: Insights from Past Research" of the paper draws up information from different empirical studies carried out in the past that explore the conjunction between cyber attacks and terrorism. An empirical model to ascertain the level of risk is also presented based on some recent ...

  10. Demystifying Cyber terrorism: Causes, Costs & its impact on individuals

    Motivated to demystify the repercussions of the cyber terrorism, this paper analyzes the distinctive characteristics of the most significant cyberattacks, investigates the expenditures incurred by the industries as a result of these cyber events, and then examines the impact of these attacks on the psychological health of the populace and the ...

  11. Role of AI in Combating Cyber Terrorism

    Cyber terrorism is a growing concern around the globe. The role of AI in countering cyber terrorism is another concern and challenge for national security agencies around the globe. This research explores the role of artificial intelligence in combating cyber terrorism and its potential advantages. In order to identify, prevent and respond to cyberattacks, the role of AI is explored in this ...

  12. The psychological effects of cyber terrorism

    Not surprisingly, exposure to cyber terrorism is stressful. Figure 1 uses the State-Trait Anxiety Inventory (STAI) to show how stress and anxiety grow as attacks become more deadly. With a score of 4.00, conventional mass-casualty terrorism (e.g., suicide bombings) evokes a level of anxiety at the top of the scale.

  13. (PDF) Cyberterrorism

    This brings to the forefront a relatively new concept in the area of terrorism: cyberterrorism. This paper will look at the idea of cyberterrorism and analyze the preparedness of 12 North Carolina ...

  14. Cyber-attacks and Cyber -terrorism: a Weapon and Latest Threat to

    At the end of the research, this research will propose recommendations for providing a legal framework to address or minimize the threats related to cyber-attack and cyber-terrorism. Discover the ...

  15. Cyber-Terrorism A Wicked Problem by Ajay Chawla :: SSRN

    Abstract. This research was undertaken to elucidate the legal framework governing cyber terrorism from the perspective of organized transnational crime, alongside an analysis of the varied modus operandi employed by cyber terrorists. The research adopts a normative legal approach, employing qualitative methodologies to gather data through an ...

  16. A comprehensive review of Cyber Terrorism in the current scenario

    In this research paper we have discussed about the phenomenon of Cyber terrorism and its growing impact in the current scenario. We have reviewed the laws and acts in various countries like US, UK, Canada, Australia and in India. We have also tried to review the Cyber terrorism from the aspect of the Indian IT Act 2000. We have carried out a comparative review of the various laws made by these ...

  17. Cyber Terrorism: An Examination of the Critical Issues

    This paper profiles some of the more conventional cyber terrorist attacks and techniques. This paper advises that additional research is needed to more accurately quantify the threat to the United States' CII. Also, policies should be considered for the regulation of the Internet, which has become an instrument of "war." 36 references

  18. Computational techniques to counter terrorism: a systematic ...

    Terrorist Network Analysis (TNA) is the field of analyzing and defining the scope of terrorism and researching the countermeasures in order to handle exponentially increasing threats due to ever growing terrorist based activities. This field constitutes several sub-domains such as crawling the data about terrorist attacks/groups, classification, behavioral, and predictive analysis. In this ...

  19. Research Paper On Cyber Terrorism-A Global Security Threat

    Research Paper On Cyber Terrorism-A Global Security Threat. Terrorism, one of the vilest crimes, faced by the human community has posed an immense challenge in the post Cold War period. It has existed since the emergence of human societies endangering innocent lives and jeopardizing human rights and fundamental freedoms.

  20. (PDF) Cyber warfare: Issues and challenges

    Cyber W arfare: Issues and Challenges. Michael Robinson a, , Kevin Jones b, Helge Janicke. a De Montfort University, Leicester, UK. b Airbus Group Innovations, Newport, UK. Abstract. The topic of ...

  21. White supremacy: Research on cyber-racism and domestic terrorism

    Cyber racism. Online Networks of Racial Hate: A Systematic Review of 10 Years of Research on Cyber-Racism Bliuc, Ana-Maria; et al. Computers in Human Behavior, 2018. A team of researchers examines dozens of studies published between Jan. 1, 2005 and Dec. 31, 2015 to understand the goals and strategies of racists on the internet.

  22. U.S. Department of the Treasury Releases Report on Managing Artificial

    WASHINGTON - Today, the U.S. Department of the Treasury released a report on Managing Artificial Intelligence-Specific Cybersecurity Risks in the Financial Services Sector. The report was written at the direction of Presidential Executive Order 14110 on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence. Treasury's Office of Cybersecurity and Critical ...