ArticlePDF Available

State Cyberterrorism: A Contradiction in Terms?

Authors:

Abstract

This article explores findings from a global survey of the terrorism research community to explore whether states may be deemed capable of conducting cyberterrorism. The article begins with a brief review of recent literature on state terrorism, identifying empirical and analytical justifications for greater use of this concept. Following a discussion of our research methodology we make two arguments. First, that there exists considerable ‘expert’ support for the validity of the proposition that states can indeed engage in cyberterrorism. Second, that whether states are deemed capable of cyberterrorism has implications for subsidiary debates, including around the threat that cyberterrorism poses.
62JTR, Volume 6, Issue 3–September 2015
State Cyberterrorism: A Contradiction in Terms?
by Lee Jarvis, Stuart Macdonald and Lella Nouri
is work is licensed under a Creative Commons Attribution 3.0 License.
is article explores ndings from a global survey of the terrorism research community to explore whether states
may be deemed capable of conducting cyberterrorism. e article begins with a brief review of recent literature
on state terrorism, identifying empirical and analytical justications for greater engagement with this concept.
Following a discussion of our research methodology we then make two arguments. First, that there exists
considerable ‘expert’ support for the validity of the proposition that states can indeed engage in cyberterrorism.
Second, that whether states are deemed capable of cyberterrorism has implications for subsidiary debates,
including around the threat that cyberterrorism poses.
Keywords: State terrorism, Cyberterrorism; Terrorism; Internet; reat; Security; Survey
Introduction
Violence conducted in cyberspace presents important challenges for academic disciplines such as
International Relations and Law which traditionally work with a state-centric ontology. Two of the most
obvious of these challenges are the reduced signicance of national boundaries within cyberspace – which
encourages a rethinking of the importance of territorial entities – and the anonymity this oers would-
be belligerents, which requires new forms of knowledge about security threats. is article contributes to
contemporary debate on a particular category of violence in cyberspace – ‘cyberterrorism’ – asking about the
signicance of actor and non-actor based denitions of this phenomenon. In so doing, it aims to connect
these debates to the recent upsurge of interest in the concept of ‘state terrorism’ in order to ask whether or not
states may be deemed capable of committing cyberterrorism, and what might be gained (and indeed lost) in
such judgements.
In order to do this, the article introduces original empirical data drawn from a survey of the global research
community on cyberterrorism. e survey was designed to chart areas of disagreement, consensus and
ambiguity in relation to this term, and received responses from 118 researchers working across 24 dierent
countries. In this article we report on ndings relating specically to the question of whether or not
states can engage in cyberterrorism. ese are then connected to researcher views on the threat posed by
cyberterrorism, and accounts of whether or not cyberterrorism has ever taken place that were given within
the same survey.
Our engagement with this research question is driven by two dynamics. e rst is the continuing
contestability of the term ‘cyberterrorism’ within academic, legal and other debate (Jarvis and Macdonald
2014). Establishing – or enquiring into – who can commit cyberterrorism here oers potential for taking
stock of the state of current opinion on an important generative characteristic of this term. e second driver
is the rise of recent scholarly research on the nature of ‘state terrorism’ more broadly. Exploring whether
researchers believe states can commit cyberterrorism might, we suggest, tell us something important about
the distinctiveness of this phenomenon.
63JTR, Volume 6, Issue 3–September 2015
e article begins with a review of relevant academic literature on state terrorism. Here, we identify two
arguments for taking the notion of state terrorism more seriously than is sometimes the case. First, is a
relatively straightforward empirical argument which justies increased attention to state terrorism due to
the higher human costs that result from state based violences. Second, is an analytical argument which
insists that greater attention should be paid to state violence in order to achieve greater consistency in the
application of existing denitions of terrorism. ese arguments, this article suggests constitute a powerful
attempt to broaden the agenda of terrorism studies. e article’s second section then details our research
methodology, reecting on the sampling strategy, distribution of respondents and formulation of our
questions. A third section introduces qualitative and quantitative data from answers to the three questions
on which we here focus. e article concludes by pointing to the importance of these ndings for the state
terrorism debate, and more specically for a (re)thinking of the rationale behind the state/non-state actor
divide in terrorism studies.
State Terrorism: Issues and Debates
Recent years have witnessed a fairly dramatic growth of interest in the concept of state terrorism. is has
been driven, in part, by a series of explicit and powerful critiques of the historical disengagement with the
state within terrorism studies; a eld of research which, for many, has too long prioritised the violences
of non-state actors (see, for example, Blakeley 2007; Jackson et al 2010). ese arguments have drawn
stimulation from two contemporary developments in particular. e rst is the recent ‘critical turn’ in
terrorism studies (see, for example, Gunning 2007; Jackson 2007; Egerton 2009; Jackson et al 2009; Jackson
et al 2011) and its attempt to deconstruct this eld’s established theoretical and methodological assumptions.
e second is a concerted hostility toward contemporary counter-terrorism practices associated with the
post-9/11 ‘war on terrorism’ and its violent excesses. Although this momentum within state terrorism
research is, therefore, comparatively recent, such work builds on a small number of important earlier
attempts to re-centre the study of terrorism around the violences of states (see, for example, George 1991;
Claridge 1996; Chomsky 2001; Chomsky 2002). For new and old alike there are at least two powerful reasons
for so doing.
e rst, and perhaps most common, justication is a simple empirical calculation of the human costs
of state and non-state violence. State or ‘wholesale’ terrorism, in this line of argument, has brought far
greater harm to humanity than have the activities of non-state groups; a trend widely acknowledged, if
not necessarily prioritised, within scholarship on terrorism (for comparison, see Blakeley 2008; Horgan
and Boyle 2008). As Michael Stohl notes, “the number of victims produced by state terror is on a scale
exponentially larger than that of insurgent terrorists” (Stohl 2008: 6). Goodin, similarly, in a discussion
of ‘revolutionary terrorism, argues that, “…state terrorism is an enormously important subject; it is
incontestable, for example that state terrorism has claimed many more victims than has terrorism as I dene
it here” (Goodin 2006: 2027). What is important to note, however, is that – for these authors – the liberal
democracies of the ‘global North’ have been as culpable as the totalitarian regimes of the twentieth-century to
which we might instinctively turn upon hearing the phrase ‘state terrorism’ (see, for example, Blakeley 2007;
Blakeley 2009; Primoratz 2004; Gareau 2004). In short, there is, for some, a tremendous disconnect between
research priorities and empirical realities within scholarship on terrorism.
A second set of arguments for taking state terrorism more seriously are more strictly analytical. In the rst
instance, there are arguments for greater consistency in the application of existing denitions of terrorism
64JTR, Volume 6, Issue 3–September 2015
(see, for example, Chomsky 1991; Jaggar 2005; Blakeley 2007). Such denitions, approached from this
perspective, are, in essence, adequate for the capture of a multitude of violences. It is their usage in practice
– by policymakers and ‘terrorologists’ alike – that limits discussion of state violences within the language
of terrorism. Here there is much to be gained – in analytical as well as political terms – for refusing the
temptation toward denitional exibility (for contrasting perspectives see Richardson 2006; Crenshaw
and Robinson 2010). In Chomsky’s description of what he terms the ‘literal’ approach to the study of
terrorism, for example, “…we begin by determining what constitutes terrorism. We then seek instances of
the phenomenon – concentrating on the major examples, if we are serious – and try to determine causes and
remedies” (Chomsky 1991: 12; see also Chomsky 2001).is argument for greater consistency is pertinent to
many, perhaps most, understandings of terrorist violence. A strategy favoured by many working in this area,
indeed, is to juxtapose ocial US denitions of the term with its historical engagements in Nicaragua, Chile,
Cuba and beyond. e argument’s value is more limited, however, where actor-specic clauses are built into
particular denitions of terrorism such as that employed by the US State Department in which terrorism is
approached as, “…premeditated, politically motivated violence perpetuated against noncombatant targets
by subnational groups or clandestine agents, usually intended to inuence an audience” (cited in Whittaker
2003: 3; see also Stohl 2006). In response to actor-specic understandings of terrorism such as these, an
alternative argument is oen made on behaviouralist grounds: one that suggests that terrorism is a form of
violence which is separable from its practitioner. Hence, for Jackson et al, for example:
To suggest when state agents engage in the very same strategies as non-state terrorists, such as when
they blow up civilian airliners (the Lockerbie bombing) or a protest ship (the Rainbow Warrior
bombing) or plant a series of bombs in public places (the Lavon aair), it ceases to be terrorism is
eectively the abandonment of scholarly research principles (Jackson et al 2010: 3).
For Teichman, similarly:
….we have to acknowledge that governments oen do things, both to their own people, and against
enemies in peace and war, which share the features of the worst types of revolutionary terrorism.
State terrorism is characterized by such actions as the kidnapping and assassination of political oppo-
nents of the government by the police or the secret service or the army; imprisonment without trial;
torture; massacres of racial or religious minorities or of certain social classes; incarceration of citizens
in concentration camps; and generally speaking government by fear (Teichman 1989: 509).
If we take them together, these arguments constitute a powerful (if still nascent) attempt to broaden the
agenda of terrorism studies (Jarvis 2009). Minimally, the aim is to extend the study of terrorism beyond
its traditional, narrow, parameters in order to facilitate the analysis of certain state violences under this
rubric (for example Gunning 2007). Maximally, where articulated most ambitiously, the ultimate aim is the
advancement of emancipatory political projects predicated on a refusal to remain silent in the face of any
(terrorist) violences, whoever their authors (see Blakeley 2008; McDonald 2009; Toros and Gunning 2009).
us, for Jackson et al, for example:
…there are important ethical-normative reasons for retaining the term ‘state terrorism’. For example,
due to the powerful connotations of the ‘terrorism’ label, its retention as a descriptor of certain forms
of state violence could be an important means of advancing a progressive political project aimed at
protecting marginalized and vulnerable populations from indiscriminate and oppressive forms of
state violence, whether they occur under the rubric of war or counter-terrorism (Jackson et al 2010:
5).
65JTR, Volume 6, Issue 3–September 2015
With the ground thus prepared for greater engagement with state terrorism, the research agenda of this
literature to date has focused on attempting to dene and typologise this form of violence (Jarvis and Lister
2014). Engagements with denitional issues oen lead to reection on the core characteristics of state
terrorism, with the following themes particularly dominant therein: the involvement of state representatives
in the commission or practice of violence; instrumental or purposive behaviour where acts of violence and
their victims function as means to future ends; an identiably communicative or symbolic function; and,
the experience of terror in a broader population (compare Blakeley 2010 and Raphael 2010). Such reection
leads some to dene state terrorism as a distinctive form of violence, for example:
…the intentional use or threat of violence by state agents or their proxies against individuals or
groups who are victimised for the purpose of intimidating or frightening a broader audience (Jackson
et al 2010: 3).
Or:
Terrorism by states is characterized by ocial support for policies of violence, repression, and intimi-
dation. is violence and coercion is directed against perceived enemies that the state has determined
threaten its interests or security. Although the perpetrators of state terrorist campaigns are
frequently government personnel, and directives do originate from government ocials, those who
carry out the violence are also quite oen unocial agents of the government (Martin, cited in Jack-
son et al 2011: 178).
Others prefer instead to dene ‘terrorism’ more inclusively before applying this understanding to the actions
of states as appropriate. e following, for instance, is the denition employed in Gareau’s account of US
involvement in state terrorism:
Terrorism consists of deliberate acts of a physical and/or psychological nature perpetrated on select
groups of victims. Its intent is to mould the thinking and behaviour not only of those targeted groups,
but more importantly, of larger sections of society that identify or share the views and aspirations
of the targeted groups or who might easily be led to do so. e intent is to intimidate or coerce both
groups by causing them intense fear, anxiety, apprehension, panic, dread, and/or horror (Gareau
2004: 14).
Typologies of state terrorism seek to dierentiate the various forms that this phenomenon can take. Michael
Stohl, for example, distinguishes between overt engagements in coercive diplomacy; covert participation in
assassinations, coups, and the like; and, surrogate activities, whereby assistance is oered to a secondary state
or insurgent organisation engaging in terrorist violence (Stohl 1984). Blakeley, more recently, separates state
perpetration and state sponsorship of terrorism (Blakeley 2009). She also, moreover, distinguishes “limited
state terrorism” which is targeted at a specic, narrow audience, from “generalised” state terrorism, which
works to target entire populations (Blakeley 2009: 44). Although (as we might expect) no single, universally
accepted typology of state terrorism exists (Primoratz 2002), these discussions do remind us that the
terrorism of states can take myriad forms, and use myriad techniques and technologies. With this in mind,
we proceed now to our discussion of whether states can commit cyberterrorism and what responses to this
may mean for the literature discussed in this section. First, however this article outlines the methodology
used to collect the empirical data on ‘expert’ opinion on cyberterrorism.
66JTR, Volume 6, Issue 3–September 2015
Methodology
Our attempt to contribute to these ongoing discussions around the phenomenon of state terrorism draws
from a recent empirical research project on cyberterrorism. is research made use of an ‘expert survey’,
which was distributed to over six hundred members of the global research community between June and
November 2012. Respondents to the survey were identied using a purposive – hence non-probabilistic
– sampling strategy with four primary strands. e rst of these was a targeted literature review search to
identify researchers who have published on cyberterrorism within peer-reviewed journals, monographs,
edited books, or other literature. is was completed using the main catalogue of the British Library, as well
as 47 other online databases[1]. Our search was limited to outputs that had been published on or aer 1
January 2004.
e second strand was to target active researchers within the terrorism research community more widely.
Whilst these individuals may not have published on cyberterrorism specically, their knowledge of the
major debates around terrorism meant they would be well-positioned to contribute to this research. us,
individuals that had published in any of the following four journals since January 1st 2009 were added to the
sample: Studies in Conict and Terrorism, Terrorism and Political Violence, Critical Studies on Terrorism, and,
Perspectives on Terrorism. Members of the editorial boards of these journals (as of August 1st 2012) were also
added, given their similarly prominent standing within terrorism research.
e third strategy was a ‘snowball method’ in which we contacted potential respondents who were explicitly
identied to us by individuals who had already completed the survey. e fourth was via two mailing lists
maintained by British academic associations: the Terrorism and Political Violence Association[2], and the
British International Studies Association Critical Terrorism Studies Working Group[3]. Although there was,
of course, overlap in the individuals identied in our four strategies, these latter two methods engendered far
fewer responses than did our initial literature review searches.
e use of a purposive, non-probabilistic, sampling strategy was, we argue, appropriate to the survey’s
ambitions. Whilst it involves sacricing any strict claim to statistical representativeness, this may be defended
given the nature of the population in whom we were interested: the terrorism research community. Where
the boundaries of this community lie, and who may be considered a legitimate member of it, are, of course,
entirely contestable. Moreover, as with any epistemic community – indeed, perhaps more than many – the
eld of terrorism research is, by its nature, uid and porous. Individuals enter and leave according to their
evolving research interests, and any eort to capture opinion therein can oer only a brief and temporary
snapshot of a dynamic enterprise. In this sense, the sacrice of strict representativeness in our study of
researchers is justied given that no discernible, denitive, population could reasonably be said objectively to
exist.
A total of 118 responses from researchers working in 24 countries across six continents were generated
by our survey. Of the 117 responses that provided geographical information to us, our sample had a
majority of respondents working in the United States of America and the United Kingdom: 41 (35% of the
total) and 32 (27%) respectively. e next largest sites were Australia (7 respondents, 6%) and Canada (4
respondents, 3%). is weighting toward anglophonic countries is unfortunate, but unsurprising, given the
traditional anglocentricism of terrorism research (Stump and Dixit 2013). In terms of professional status,
the distribution of our respondents was skewed toward permanent and temporary academic sta as follows:
Academic Sta (Permanent): 75 (64%); Academic Sta (Temporary): 16 (14%); Research Student: 9 (8%);
Independent Researcher: 11 (9%); Retired: 2 (2%); and, None of the Above: 5(4%). In terms of disciplinary
67JTR, Volume 6, Issue 3–September 2015
background, nally, our sample described themselves in the following way, with several researchers self-
identifying with more than one academic discipline: Political Science/International Relations: 69 (50%);
Psychology/Anthropology: 20 (15%); Engineering/Computer Science/Cyber 17(12%); Law/Criminology: 15
(11%); Literature/Arts/History: 9 (7%); Independent Researchers/Analysts: 5 (4%); and, Economics/Business:
2 (1%).
Our survey employed a combination of open-ended and closed questions designed to generate quantitative
and qualitative data. Twenty questions were included in total. ese focused on the following: demographic
information; denitional issues around terrorism and cyberterrorism; the cyberterrorism threat; countering
cyberterrorism; and, views of current research on this phenomenon, including the major challenges facing
contemporary scholars. To encourage as high a completion rate as possible, the questionnaire was made
available in two formats: an online survey and a word processing document. In the following section, this
article turns to the ndings of the survey in relation to the concept of state cyberterrorism and the impact
this has on responses to questions on the signicance and existence of the cyberterrorism threat.
Findings and Analysis
e rst question of relevance from our survey – numbered Question 13 – asked respondents, ‘In your
view, can states engage in cyberterrorism?’ A free text box was provided for responses, in order to allow
respondents to develop and explain their answers. In total, the question was answered by 109 respondents
(response rate: 92%). Answers were subsequently analysed and coded using the following ve categories: yes
(unqualied); yes (qualied); other; no (qualied); and, no (unqualied). As chart 1 demonstrates, a total of
83% of respondents agreed that states can potentially engage in cyberterrorism. Moreover, the vast majority
of these respondents oered unqualied agreement.
Chart 1: Can states engage in cyberterrorism?
When explaining their view that states can engage in cyberterrorism, several respondents explicitly rejected
any attempt to distinguish between state and non-state actors. One respondent, for example, argued that: ‘Any
social actor with sucient knowledge, means and intent can utilise any particular tactic, be it cyberterrorism
or anything else, be they states or any other social entity’[4]. Another, drawing on similarly behaviouralist
reasoning, stated: ‘By denition all forms of terrorism are a tactic open to all and therefore no individual
or entity is exempt from the option of using this tactic’[5]. Others still drew analogy with alternative forms
68JTR, Volume 6, Issue 3–September 2015
of terrorism, arguing that since states can engage in oine terrorism there is no reason why states cannot
also engage in cyberterrorism[6]. In fact, one respondent went so far as to suggest that, without state
involvement, the technological complexities render cyberterrorism impossible[7]. By contrast, there were
other respondents who – whilst agreeing that states can engage in cyberterrorism – described states’ potential
involvement in more limited terms. In their opinion, a cyber-attack would only constitute cyberterrorism
if state actors played no more than a supporting or facilitative role. For example, one respondent answered:
‘Only as state sponsors of terrorist groups’[8], whilst others referred to the role of the state as a place to
‘harbour’[9] or ‘support’[10] non-state actors who launch cyberterrorist attacks.
ere were other respondents who answered armatively to this survey question, yet qualied their answer
by querying whether cyberterrorism is the most appropriate label for cyber-attacks perpetrated by state
actors. Like some of the respondents mentioned in the previous paragraph, some of these individuals drew
an analogy with traditional forms of terrorism. But unlike those mentioned above, these respondents asserted
that oine terrorists are conventionally regarded as non-state actors. Hence one respondent answered: ‘Yes
[states can engage in cyberterrorism], although the standard denition of terrorism rules out state action
(so Hiroshima isn’t formally an act of terrorism)’[11]. Similarly, another answered: ‘Yes, just like states can
engage in terrorism, however the standard denition of terrorism does focus on non-state armed groups
only, leaving terrorist behaviour of states out of the equation’[12]. is respondent went on to suggest that
state cyberterrorism should instead be labelled as a crime against humanity. Others also suggested alternative
labels. One commented: ‘In eect [states can engage in cyberterrorism], even if it should be more carefully
labelled as espionage/sabotage’[13], whilst another observed that: ‘States can engage in the act of terrorism,
including cyberterrorism (though we still call them states, not terrorists)’[14].
A further signicant nding from our survey is that a number of respondents drew on empirical reasoning
similar to that discussed in the above literature review to argue that there exists a greater threat of state
cyberterrorism than non-state cyberterrorism. One went so far as to suggest that: ‘[state cyberterrorists]
are the greatest threat, and make non-government sources of this threat nearly inconsequential in
comparison’[15]. e most common reason respondents oered for this view was that states have access
to far greater resources and capabilities than non-state actors[16]. Others pointed out that cyberterrorism
is likely to prove attractive to states because of the diculties of attribution and concomitant potential
for anonymity. As one respondent remarked, states engage in cyberterrorism ‘because of the ease with
which a state operator can mask itself online’[17]. In fact, several respondents claimed that states already
engage in cyberterrorism[18], with a number of examples being oered in support of this assertion. e
most commonly cited of these was Stuxnet[19] with other suggested examples including the cyber-attacks
on Estonia[20] and Georgia,[21] attempted attacks on the US by China and North Korea[22] and ‘acts
perpetrated by Russia and China’[23].
As chart 1 showed, there were a total of 17 respondents (15%) who said that states cannot engage in
cyberterrorism. In the opinion of a number of these respondents, the concept of state cyberterrorism is
simply a misnomer. Dierent reasons were oered in support of this view. e most common reason was that
terrorism is, by its very nature, a non-state activity[24]. If the perpetrator is a state actor, then the conduct
is cyberwarfare[25] or cyber espionage[26], not cyberterrorism. Second, one respondent suggested that
cyber-attacks orchestrated by state actors may not be terroristic in nature. Using Stuxnet as an example,
this respondent argued that it ‘was not used in a way that appears intended to create terror. ese acts are
probably best thought of as politically or strategically motivated sabotage’[27]. Lastly, one respondent argued
that it is mistaken to talk of state cyberterrorism because cyberterrorism itself is a misnomer, despite the
69JTR, Volume 6, Issue 3–September 2015
fact that, ‘Cyberattacks and espionage which originate from states certainly do exist’[28]. Meanwhile, there
were other respondents that were willing to accept the concept of state cyberterrorism in principle, but who
nonetheless answered no to the survey question on the basis that it is preferable to use a dierent label[29].
As one explained, ‘actions by states are best viewed in terms of warfare/coercive foreign policy. Reserving the
term [cyberterrorism] for non-state actors (even if sponsored by states) aords a certain degree of analytical
clarity’[30].
Finally, it is important to note that respondents’ views on the state cyberterrorism question had a discernible
impact on their answers to other important questions, particularly surrounding the signicance of
the cyberterrorist threat. Chart 2 shows the answers to question 10 of our survey – ‘In your view, does
cyberterrorism constitute a signicant threat?’ – for three groups: all respondents; those respondents for
whom states can engage in cyberterrorism; and, those respondents who argued that states cannot engage
in cyberterrorism. 60% of researchers who said that states can engage in cyberterrorism also believed that
cyberterrorism poses a signicant threat. is gure was considerably lower for those who said that states
cannot engage in cyberterrorism, at 47%. Similarly, only 15% of those who said that states can engage in
cyberterrorism opined that cyberterrorism is not a signicant threat, compared to 41% of those who said that
states cannot engage in cyberterrorism.
Chart 2: Does cyberterrorism pose a signicant threat?
A similar pattern is evident in chart 3, which shows the answers of the same three groups of respondents to
question 11 of our survey: ‘do you consider that a cyberterrorism attack has ever taken place?’. 69% of those
who said that states cannot engage in cyberterrorism believed that no cyberterrorist attack has ever occurred
– compared to 44% of those who said that states can engage in cyberterrorism.
70JTR, Volume 6, Issue 3–September 2015
Chart 3: Do you consider that a cyberterrorist attack has ever taken place?
So, just as an individual’s view on whether cyberterrorism should be conceived in narrow terms (as a terrorist
attack which has computers as its means and/or target) or broad terms (as any form of online terrorist
activity) aects that individual’s assessment of the cyberterrorism threat (Jarvis et al 2014), so too does an
individual’s view of whether states can engage in cyberterrorism.
Concluding Remarks
Our survey revealed general agreement that states have perpetrated cyberattacks, with respondents
oering a number of examples including Stuxnet and the attacks on Estonia and Georgia. is article has
raised the question of how we should conceive of these attacks. Should they be understood as instances of
cyberterrorism perpetrated by state actors? Or should we employ a dierent label, and reserve the term
cyberterrorism for non-state actors? Answering these questions requires consideration of two issues. First, is
it possible to speak of state cyberterrorism, or is the term oxymoronic? And, second, if it is possible to speak
of state cyberterrorism, should we do so?
As explained previously, perhaps the most common justication for employing the term state terrorism in
discussions of oine violences is the empirical claim that historically states have inicted more harm than
non-state actors. e same appears to hold true in the cyber realm, in that a number of our respondents
pointed out that most or all of the large-scale cyberattacks to date have been perpetrated by state actors. In
fact, it has been argued that from a cost-benet perspective it is unlikely that non-state terrorists will attempt
to launch Stuxnet-like cyberattacks at any point in the foreseeable future (Conway 2014; Al-Garni and Chen
2015). But whilst the majority of our respondents suggested that states can commit acts of cyberterrorism,
there were also dissenting voices. In fact, even some of those that said that states can commit acts of
cyberterrorism qualied their answers by suggesting that another label might be more apt.
71JTR, Volume 6, Issue 3–September 2015
e second set of arguments that we outlined previously for engaging with the concept of state terrorism
were analytical in nature. Our ndings suggest that, as noted above, the argument that existing denitions
of terrorism should be applied with greater consistency is of limited utility. e argument presupposes that
denitions of terrorism are not actor-specic. But whilst a number of our respondents explicitly rejected any
attempt to distinguish between state and non-state actors, there were others who insisted on the importance
of this distinction, claiming that terrorism is by denition a non-state activity. For the same reason, the
alternative argument – that terrorism is a form of violence which has nothing to do with its practitioner – is,
for these respondents at least, equally problematic.
In summary, the diversity of opinions oered by our respondents demonstrates that there is nothing
inherent in the concept of terrorism that requires a particular answer to the question of whether states can
commit terrorist acts. e choice of denition, and of typology, is a political one. Our ndings do suggest,
however, that the dominant view within the research community at present is that states can commit acts
of cyberterrorism. e cyber realm thus presents a challenge to the traditional view that emphasises the
distinction between state and non-state actors and lends weight to the growing interest in the concept of state
terrorism.
About the authors
Lee Jarvis is a Reader in International Security and a member of the Critical Global Politics research group
at the University of East Anglia. His work has been published in journals including Millennium: Journal of
International Studies, Security Dialogue and Political Studies, and recent books include Security: A Critical
Introduction (with Jack Holland, Palgrave: 2015) and Anti-Terrorism, Citizenship and Security (with Michael
Lister, Manchester University Press, 2015).
Stuart Macdonald is Associate Professor in Law and Deputy Director of the Centre for Criminal Justice and
Criminology at Swansea University. He is co-editor of Cyberterrorism: Understanding, Assessment and Response
(New York: Springer, 2014) (with Lee Jarvis and omas Chen) and Terrorism Online: Politics, Law and
Technology (Abingdon: Routledge, 2015) (with Lee Jarvis and omas Chen). His research has been published
in journals including Cornell Journal of Law and Public Policy, Studies in Conict and Terrorism, Terrorism
and Political Violence, Criminal Law and Philosophy and Sydney Law Review. He has held visiting scholarships
at Columbia University Law School, New York, the Institute of Criminology at the University of Sydney and the
Faculté de Droit at the Université de Grenoble.
Lella Nouri lectures in the Department of Criminology at Swansea University. She is currently completing her
PhD which investigates the construction of cyberterrorism as an issue of national security within US political
discourse. Since undertaking her doctorate she has had work published on a range of topics that reect her
research interests including: terrorism, cyberterrorism and online radicalisation.
Notes
[1] e complete list is as follows: ACM Digital Library; Anthropoligical Index Online; Applied Social
Sciences Index and Abstracts; Bibliography of British & Irish History; BioMed Central Journals; British
Humanities Index (CSA); British Periodicals (XML); Business Source Complete (EBSCO); CINAHL Plus
(EBSCO); Cochrane Database of Systematic Reviews (Wiley); Education Resources Information Centre;
Emerald; HeinOnline; HMIC (Ovid); IEEE Xplore; INSPEC (Ovid); International Bibliography of the
72JTR, Volume 6, Issue 3–September 2015
Social Sciences; IOP Journals Z39; JISC Journals Archives; JSTOR; Kluwer Law Journals; Lecture Notes in
Computer Science (Springer Link); Lexis Library; MathSciNet (AMS); Medline (EBSCO); MLA International
Bibliography; Oxford Journals; Periodicals Archive online; Philosopher’s Index (Ovid); Project Muse;
Proquest Business Collection; PsycARTICLES (Ovid); PsycINFO (Ovid); PubMed; Royal Society Journals;
SAGE Journals Online; Scopus (Elsevier); Social Care Online (SCIE); Springer Link (Metapress); Taylor &
Francis Online; Web of Knowledge (Cross Search); Web of Knowledge (ISI); Web of Science (Cross Search);
Web of Science (ISI); Westlaw; Wiley Interscience; and, Zetoc.
[2] For further information on the association, please see: http://tapva.com/.
[3]For further information on this working group, see: http://www.bisa.ac.uk/index.php?option=com_
content&view=article&id=93&catid=37&Itemid=68.
[4] R65.
[5] R8.
[6] R6, R62.
[7] R31.
[8] R49. Similarly, R90 stated: ‘If states sponsor non-state groups to do cyberattacks, then that could easily be
described as states (indirectly) engaging in cyberterrorism.
[9] R59.
[10] R33.
[11] R75.
[12] R106.
[13] R99.
[14] R78.
[15] R15.
[16] R30, R45.
[17] R20. R10 also commented, ‘Of course [states can engage in cyberterrorism], but they are likely to have
their participation hidden.
[8] In response to the survey question, R111 wrote ‘Most terrorism, including cyberterrorism, is conducted
by states, whilst R102 simply wrote ‘ey already do.
[9] R16, R27, R45, R80.
[20] R51, R69.
[21] R69.
[22] R85.
[23] R37.
[24] R3, R9, R52, R55, R71, R83, R87, R108.
[25] R3, R9, R52, R71, R83.
[26] R26, R83, R87.
73JTR, Volume 6, Issue 3–September 2015
[27] R87.
[28] R26.
[29] R1, R63, R64, R73.
[30] R1.
References
Al-Garni, T. and Chen, T. (2015). An Updated Cost-Benet View of Cyber Terrorism. In: Jarvis, L.,
Macdonald, S. & Chen, T. eds., Terrorism Online: Politics, Law and Technology. Abingdon: Routledge, pp.72-
85.
Blakeley, R. (2007).Bringing the State Back Into Terrorism Studies. European Political Science. 6(3), pp.228-
235.
Blakeley, R. (2008). e Elephant in the Room: a Response to John Horgan and Michael J. Boyle. Critical
Studies on Terrorism. 1(2), pp.151-165.
Blakeley, R. (2009). State Terrorism and Neoliberalism: e North in the South. Abingdon: Routledge.
Blakeley, R. (2010). State Terrorism in the Social Sciences: eories, Methods and Concepts. In: Jackson, R.,
Murphy, E. and Poynting, S. eds., Contemporary State Terrorism: eory and Practice. Abingdon: Routledge,
pp.12-27
Burnett, J. and Whyte, D. (2005). Embedded Expertise and the New Terrorism. Journal for Crime, Conict
and the Media. 1(4), pp.1-18.
Chomsky, N. (1991). International Terrorism: Image and Reality. In: George, A. ed., Western State Terrorism.
Cambridge: Polity Press, pp12-38.
Chomsky, N. (2001). 9-11. New York, NY: Seven Stories Press.
Chomsky, N. (2002). Pirates and Emperors, Old and New: International Terrorism in the Real World. London:
Pluto Press.
Claridge, D. (1996). State Terrorism? Applying a Denitional Model. Terrorism & Political Violence. 8(3),
pp.47-63.
Conway, M. (2014). Reality Check: Assessing the (Un)Likelihood of Cyberterrorism. In: Chen, T., Jarvis, L.
and Macdonald, S. eds., Cyberterrorism: Understanding, Assessment, and Response. New York, NY: Springer,
pp.103-121.
Crenshaw, E. and Robinson, K. (2010). Political Violence as an Object of Study: e Need for Taxonomic
Clarity. In: Leicht, K. T. and Jenkins, J.C. eds., Handbook of Politics: State and Society in Contemporary
Perspective. New York, NY: Springer, pp.235-246.
Egerton, F. (2009). A Case for a Critical Approach to Terrorism. European Political Science. 8(1), pp.57-67.
Gareau, F. H. (2004). State Terrorism and the United States: From Counterinsurgency to the War on Terrorism.
London: Zed Books.
George, A. ed. (1991). Western State Terrorism. Cambridge: Polity Press.
Goodin, J. (2006). A eory of Categorical Terrorism. Social Forces. 84(4), pp.2027-2046.
74JTR, Volume 6, Issue 3–September 2015
Gunning, J. (2007). A Case for Critical Terrorism Studies. Government and Opposition. 42(3), pp.363-393.
Halkides, M. (1995). How Not to Study Terrorism. Peace Review. 7(3-4), pp.253-260.
Halperin, S. and Heath, O. (2012). Political Research: Methods and Practical Skills. Oxford: Oxford University
Press.
Herman, E. S. (2002). Wholesale Terrorism Escalates: e reat of Genocide. Arab Studies Quarterly. 24(2-
3), pp.119-128.
Herman, E. and O’Sullivan, G. (1989). e ‘Terrorism’ Industry: e Experts and Institutions at Shape Our
View of Terrorism. New York, NY: Pantheon Books.
Horgan, J. and Boyle. M. J. (2008). A Case against Critical Terrorism Studies. Critical Studies on Terrorism.
1(1), pp.51-64.
Jackson, R. (2007). e Core Commitments of Critical Terrorism Studies. European Political Science. 6(3),
pp.244-251.
Jackson, R., Breen Smyth, M. and Gunning, J. eds. (2009). Critical Terrorism Studies: A New Research Agenda.
Abingdon: Routledge.
Jackson, R., Jarvis, L., Gunning, J., and Breen Smyth, M. (2011). Terrorism: A Critical Introduction.
Basingstoke: Palgrave.
Jackson, R., Murphy, E. & Poynting, S. (2010). Introduction: Terrorism, the State and the Study of Political
Terror. In: Jackson, R., Murphy, E. and Poynting, S. eds., Contemporary State Terrorism: eory and Practice.
Abingdon: Routledge, pp.1-11.
Jaggar, A. M. (2005). What Is Terrorism, Why Is It Wrong, and Could It Ever Be Morally Permissible? Journal
of Social Philosophy. 36(2), pp.202-217.
Jarvis, L. (2009). e Spaces and Faces of Critical Terrorism Studies. Security Dialogue. 40(1), pp.5-27.
Jarvis, L. and Lister, M. (2014). State Terrorism Research and Critical Terrorism Studies: an Assessment.
Critical Studies on Terrorism. 7(1), pp.43-61.
Jarvis, L., and Macdonald, S. (2014). What is Cyberterrorism? Findings from a Survey of Researchers.
Terrorism and Political Violence. Available at: http://www.tandfonline.com/doi/full/10.1080/09546553.2013.8
47827 (last accessed 2 June 2015).
Jarvis, L., Macdonald, S. and Nouri, L. (2014). e Cyberterrorism reat: Findings from a Survey of
Researchers. Studies in Conict & Terrorism. 37(1), pp.68-90.
McDonald, M. (2009). Emancipation and Critical Terrorism Studies. In: Jackson, R., Breen Smyth, M. and
Gunning, J. eds. Critical Terrorism Studies: A New Research Agenda. Abingdon: Routledge, pp.109-124.
Mueller, J. (2008). e Terrorism Industry: e Prots of Doom. In: Kassimeris, G. ed., Playing Politics with
Terrorism: A User’s Guide. New York, NY: Columbia University Press, pp.301-320.
Primoratz, I. (2004). What is Terrorism? In: Primoratz, I. ed. Terrorism: e Philosophical Issues. Basingstoke:
Palgrave, pp.15-30.
Primoratz, I. (2002). State Terrorism. In: Coady, T. and O’Keefe, M.eds., Terrorism and Justice: Moral
Argument in a reatened World. Carlton, Victoria: Melbourne University Press, pp.31-42.
75JTR, Volume 6, Issue 3–September 2015
Raphael, S. (2010). Paramilitarism and State Terror in Colombia. In: Jackson, R., Murphy, E. and Poynting, S.
eds., Contemporary State Terrorism: eory and Practice. Abingdon: Routledge, pp.163-180.
Richardson, L. (2006). What Terrorists Want: Understanding the Terrorist reat. London: John Murray.
Stohl, M. (1984). International Dimensions of State Terrorism. In: Stohl, M. and Lopez, G., A. eds., e State
as Terrorist: e Dynamics of Governmental Violence and Repression. Westport, CT: Greenwood Press, pp.43-
58.
Stohl, M. (2006). e State as Terrorist: Insights and Implications. Democracy and Security. 2(1), pp.1-25.
Stohl, M. (2008). Old Myths, New Fantasies, and the Enduring Realities of Terrorism. Critical Studies on
Terrorism. 1(1), pp.5-16.
Stump, J. L. and Dixit, P. (2013). Critical Terrorism Studies: An Introduction to Research Methods. Abingdon:
Routledge.
Teichman, J. (1989). How to Dene Terrorism. Philosophy. 64(250), pp.505-517.
Toros, H. and Gunning, J. (2009). Exploring a Critical eory Approach to Terrorism Studies. In: Jackson,
R., Breen Smyth, M. and Gunning, J. eds., Critical Terrorism Studies: A New Research Agenda Abingdon:
Routledge, pp.87-108.
Whittaker, D. (2003). e Terrorism Reader. 2nd ed. Abingdon: Routledge.
Wilkinson, P. (2001). Terrorism Versus Democracy: e Liberal State Response . London: Frank Cass.
... This reality of publicly obscured cyber antagonists can be viewed in the timelines of several famous cyber incidents. It took between six months and three years for authorities and private actors to publicly reveal the actors be-hind the 2017 WannaCry attacks, the 2016 cyber intrusion into the Democratic National Committee's networks, and the 2016 cyberattack against the Bowman Dam in New York [45][46][47]. While each of these incidents were eventually attributed to an attack source, and the authorities may well have known the identity of the attacker from an early date, we can see that from the perspective of the public, there was a time lag of several months or years before a name was attached to any attack. ...
Article
Full-text available
Does exposure to cyberattacks influence public support for intrusive cybersecurity policies? How do perceptions of cyber threats mediate this relationship? While past research has demonstrated how exposure to cyberattacks affects political attitudes, the mediating role played by threat perception has been overlooked. This study employs a controlled randomized survey experiment design to test the effect of exposure to lethal and nonlethal cyberattacks on support for different types of cybersecurity policies. One thousand twenty-two Israeli participants are exposed to scripted and simulated television reports of lethal or nonlethal cyberattacks against national infrastructure. Findings suggest that exposure to cyberattacks leads to greater support for stringent cybersecurity regulations, through a mechanism of threat perception. Results also indicate that different types of exposure relate to heightened support for different types of regulatory policies. People exposed to lethal cyberattacks tend to support cybersecurity policies that compel the government to alert citizens about cyberattacks. People who were exposed to nonlethal attacks, on the other hand, tend to support oversight policies at higher levels. More broadly, our research suggests that peoples’ willingness to accept government cybersecurity policies that limit personal civil liberties and privacy depends on the type of cyberattacks to which they were exposed and the perceptions associated with such exposure.
... The response rate was 74.2%. There was a total of four different threat referents identified by ten or more respondents: governments/states (28 respondents); critical infrastructures/computer networks As Figure 4 shows, respondents not only implicitly recognized that states may engage in cyberterrorism -something explicitly addressed in the 2012 survey 46 less than half (47.5%) of respondents believed that terrorist organizations pose a high threat of cyberterrorism. The lowest threat levels were associated with criminal organizations (where the most common response was medium threat (43.3%)) and individuals (most common response: low threat (46.2%)). ...
Article
This article reports on a survey of researchers designed to capture current perspectives on core questions around cyberterrorism. The survey—conducted in 2017 as a follow-on to an initial, 2012, exercise—focused on questions of definition, threat and response. By documenting our findings in each of these areas—and highlighting developments in the years between our surveys—we identify three particularly important trends. First, an increasing convergence around the core characteristics of cyberterrorism, albeit with continuing conceptual disagreements at the concept’s penumbra. Second, increasing researcher concern with the threat posed by cyberterrorism, underpinned by a widespread view that this threat has increased, and a growing feeling that cyberterrorist attacks have now taken place. Third, support for a diversity of counter-measures to this threat, although perhaps counter-intuitively little suggestion that resort to exceptional or draconian measures is needed. In order to inform future research, the article concludes by detailing some of the major limitations, gaps and weaknesses within academic research to date as identified by our respondents.
Article
The Cambridge Handbook of Political Psychology provides a comprehensive review of the psychology of political behaviour from an international perspective. Its coverage spans from foundational approaches to political psychology, including the evolutionary, personality and developmental roots of political attitudes, to contemporary challenges to governance, including populism, hate speech, conspiracy beliefs, inequality, climate change and cyberterrorism. Each chapter features cutting-edge research from internationally renowned scholars who offer their unique insights into how people think, feel and act in different political contexts. By taking a distinctively international approach, this handbook highlights the nuances of political behaviour across cultures and geographical regions, as well as the truisms of political psychology that transcend context. Academics, graduate students and practitioners alike, as well as those generally interested in politics and human behaviour, will benefit from this definitive overview of how people shape – and are shaped by – their political environment in a rapidly changing twenty-first century.
Chapter
Full-text available
This chapter examines the phenomenon of cyber-terrorism through the lens of political psychology. The emergence of cyber-terrorism as a novel threat has roiled international security and given rise to a new wave of research that seeks to understand how exposure to cyber-terrorism influences political attitudes and behavior. In this chapter, we review the leading empirical studies that have emerged as part of this new research focus. We begin by presenting a consolidated political psychology model of exposure to cyber-terrorism that guides our analysis throughout the chapter. We then apply this model to the two predominant political outcomes that recur in the empirical literature - public confidence and trust in institutions, and foreign policy attitudes. Finally, we pinpoint the key gaps in our understanding of the psycho-political effects of cyber-terrorism exposure and propose a research agenda that accounts for the evolving nature of the field.
Book
Political Research: Methods and Practical Skills provides a practical and relevant guide to the research process for students. It equips readers with the knowledge and skills needed to evaluate research findings and successfully carry out independent study and research. Taking a helpful step-by-step approach, the chapters guide the reader through the process of asking and answering research questions and the different methods used in political research, providing practical advice on how to be critical and rigorous in both evaluating and conducting research. Topics include research design, surveys, interviewing and focus groups, ethnography and participant observation, textual analysis, quantitative analysis, bivariate analysis, and multivariate analysis. With an emphasis throughout on how research can impact important political questions and policy issues, the book equips readers with the skills to formulate significant questions and develop meaningful and persuasive answers.
Book
The first comprehensive discussion of all the main philosophical issues raised by terrorism against the background of its past and recent developments. Prominent philosophers discuss definitions of terrorism, various approaches to its moral evaluation, and the contentious subject of state terrorism. Also included are four case studies, showing how the concepts and arguments philosophers deploy in discussing violence, war and terrorism apply to particular instances of both insurgent and state terrorism, ranging from World War II to September 11, 2001.
Article
'No one understands terrorism better than Paul Wilkinson...if policy makers read this book they will understand the problems better. If terrorists read it they will understand themselves a lot better.' - Michael Clarke, King's College London, University of London, UK This acclaimed study examines both the new terror networks and those that have been around for decades. This new edition brings it up-to-date with the dramatic opening of the twenty-first century, with new chapters on the 9/11 attacks, the growth of international terrorism, the Al Qaeda network and the War on Terror. This text provides us with some much needed criteria for distinguishing between terrorists and freedom fighters and an explanation of the uses of terrorism as a political, social, religious and criminal weapon. Wilkinson also links the use of terrorism to a wider repertoire of struggle. He proposes a variety of possible counter-measures and valuable principles carefully distilled from the recent past to help design a response that is compatible with democratic principles, the rule of law and respect for human rights. This book is essential reading for undergraduate and postgraduate students of terrorism studies, political science and international relations, as well as for policy makers and journalists.
Article
This book explores the complicity of democratic states from the global North in state terrorism in the global South. It evaluates the relationship between the use of state terrorism by Northern liberal democracies and efforts by those states to further incorporate the South into the global political economy and to entrench neoliberalism. Most scholarship on terrorism tends to ignore state terrorism by Northern democracies, focusing instead on terrorist threats to Northern interests from illiberal actors. The book accounts for the absence of Northern state terrorism from terrorism studies, and provides a detailed conceptualisation of state terrorism in relation to other forms of state violence. The book explores state terrorism as used by European and early American imperialists to secure territory, to coerce slave and forced wage labour, and to defeat national liberation movements during the process of decolonisation. It examines the use of state terrorism by the US throughout the Cold War to defeat political movements that would threaten US elite interests. Finally, it assesses the practices of Northern liberal democratic states in the 'War on Terror' and shows that many Northern liberal democracies have been active in state terrorism, including through extraordinary rendition. This book will be of much interest to students of critical terrorism studies, security studies, South American politics, US foreign policy and IR in general.
Article
This book is an introduction to critical approaches to terrorism studies. While there is a growing body of Critical Terrorism Studies (CTS) literature devoted to empirical examples and conceptual development, very little has been written about how to systematically carry out this kind of research. Critical Terrorism Studies fills this gap by addressing three key themes: 1. The position of terrorism studies and critical terrorism studies in the discipline of International Relations (IR). 2. Theoretical and methodological elaborations of critical approaches to the study of terrorism. 3. Empirical illustrations of those approaches. Drawing upon a range of engaging material, the volume reviews a series of non-variable based methodological approaches. It then goes on to provide empirical examples that illustrate how these approaches have been and can be utilized by students, teachers, and postgraduate researchers alike to critically and rigorously study terrorism. This textbook will be of much interest to students of terrorism studies, sociology, critical security studies, and IR in general.
Article
Chapter Overview: This chapter argues that debates around the threat posed by cyberterrorism have been dominated by a focus on issues relating to technological potentialities. To balance this, it focuses on the 'terrorism' aspect of cyberterrorism, arguing that it is important to situate cyber attacks within an analysis of terrorist interests and options. Doing so, it argues, leads to a far more optimistic forecast of the likelihood of cyberterrorism than is common, for four reasons. First, the costs of cyber attacks-although difficult to estimate-are vastly higher than those of non-cyber equivalents, such as car bombings. Second, terrorist groups typically lack the mastery to carry out successful cyber attacks which are exponentially more difficult than non-cyber terrorism. Third, the destructive potential of non-cyber attacks can be far more readily materialised than that of cyber attacks. And, fourth, cyberterrorism lacks the theatricality of more conventional attacks and therefore is likely to be less desirable to terrorist groups. Taken together, these four arguments indicate that cyberterrorism remains far less likely than is frequently supposed. © 2014 Springer Science+Business Media New York. All rights reserved.
Article
This article explores the value of scholarship on state terrorism for the critical study of terrorist violences. The article begins by identifying four primary contributions of this scholarship: first, a rethinking of the status and significance of terrorism; second, an unsettling of broader assumptions within International Relations (IR) and terrorism research; third, an ability to locate state violences within pertinent, but potentially camouflaged, contexts; and, fourth, a prioritisation of critique as a responsibility of scholarship. The article’s second section then argues that the purchase of this work could be further extended by greater conceptual engagement with the state itself. In particular, we point to the value of contemporary approaches to the state as a terrain and outcome of social and political struggle, rather than as a singular actor of unitary purpose. Rethinking the state in this way has value, we argue, first, for moving research beyond the identification and typologising of state terrorisms; and, second, for circumventing the perennial problem of identifying intentionality in efforts to designate violences as (state) terrorism.