CLC – Cyberterrorism Life Cycle Model

The rise of technology has brought with it many benefits but also the potential for great dangers. In particular, Information Communication Technology (ICT) is involved in many facets of life-influencing systems, which range from power plants to airports. Terrorists are now realising the great possibilities of interfering with critical infrastructure. Remote access, reduced costs, automation, replication, speed, direct effect, varied targets and anonymity are all benefits that make attacking computers and networks in cyberspace an attractive solution. ICT could thus serve as a powerful instrument to advance political and ideological viewpoints. The ICT landscape now faces an emerging threat in the form of cyberterrorists. However, it is important not to incorrectly perceive ordinary cyber attacks as cyberterrorism. Cyberterrorism is different from cybercrime in that is has differing motives, attack goals, techniques and intended effects. The motivation for cyberterrorism largely stems from political and ideological views (religious, social activism, retributional). Cyber attacks are mainly driven by financial theft, fraud or espionage, whereas cyberterrorism aims to create publicity for a cause and leave a high impact. In this study, a Cyberterrorism Life Cycle (CLC) Model is developed in order to demonstrate the various factors that lead to the establishment and growth of cyberterrorism. The model depicts the various strategic and technical issues that are relevant to the field. Overall, this model aims to structure the dynamic interaction of the behavioural and technological factors that influence the development of cyberterrorism. Throughout the research, various factors that are influential to cyberterrorism are investigated. The research follows a systematic approach of revealing various underlying issues and thereafter compiling the holistic CLC model to depict these critical issues. Part 1 introduces cyberterrorism and provides the background to the field by discussing incidents and example groups. Initially, the concept of cyberterrorism is explored and the proposed definition tested. Part 2 looks at investigating cyberterrorism more deeply. A conceptual framework is presented that introduces the most pertinent factors in the field of cyberterrorism. Next, the traditional and innovative use of the Internet to carry out and support terrorism is explored. Then, the study addresses the determination of additional social factors using Partial Least Squares Path Modelling. In Part 3, the field of cyberterrorism is more intensely studied. Cyberterrorism is mapped to the Observe-Orient- Decide-Act (OODA) loop, which will form the basis of the CLC model. Thereafter, the most influential concepts essential to the field of cyberterrorism are applied in order to classify attacks as cyberterrorism using ontologies. Furthermore, in Part 3, countermeasures are discussed to look at ways to combat cyberterrorism. Part 4 forms the crux of the research. The CLC model is presented as a structured representation of the various influential factors relevant to cyberterrorism. Thereafter, the CLC model is simulated to show the field more dynamically. Overall, the CLC model presented in this study aims to show the interaction of the various strategic, behavioural and technical issues. The CLC model can help elucidate the reasons for attraction into extremist groups and how attacks are carried out.

x
Tags: Cyberterrorism