2021
DOI: 10.1007/978-3-030-90221-6_5
|View full text |Cite
|
Sign up to set email alerts
|

Terrorism and the Internet of Things: Cyber-Terrorism as an Emergent Threat

Abstract: In this chapter I present an argument that cyber-terrorism will happen. This argument is premised on the development of a cluster of related technologies that create a direct causal link between the informational realm of cyberspace and the physical realm. These cyber-enabled physical systems fit under the umbrella of the ‘Internet of Things’ (IoT). While this informational/physical connection is a vitally important part of the claim, a more nuanced analysis reveals five further features are central to the IoT… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 40 publications
(60 reference statements)
0
4
0
Order By: Relevance
“…Cloud storage's benefits in data storage, accessibility, and efficiency are countered by unique challenges in counter-terrorism. Its strong encryption, vital for privacy and security, can also be exploited by terrorist groups to secure communications and planning documents from law enforcement, creating a barrier in tracking and accessing their data [54,55]. The decentralized nature of cloud storage, with data spread across multiple jurisdictions, further complicates legal and investigative processes, as pointed out by Henschke et al [54].…”
Section: Cloudmentioning
confidence: 99%
See 2 more Smart Citations
“…Cloud storage's benefits in data storage, accessibility, and efficiency are countered by unique challenges in counter-terrorism. Its strong encryption, vital for privacy and security, can also be exploited by terrorist groups to secure communications and planning documents from law enforcement, creating a barrier in tracking and accessing their data [54,55]. The decentralized nature of cloud storage, with data spread across multiple jurisdictions, further complicates legal and investigative processes, as pointed out by Henschke et al [54].…”
Section: Cloudmentioning
confidence: 99%
“…Its strong encryption, vital for privacy and security, can also be exploited by terrorist groups to secure communications and planning documents from law enforcement, creating a barrier in tracking and accessing their data [54,55]. The decentralized nature of cloud storage, with data spread across multiple jurisdictions, further complicates legal and investigative processes, as pointed out by Henschke et al [54]. Terrorist groups leverage cloud platforms for quick information sharing, using them to disseminate propaganda and communicate across networks, thereby evading continuous monitoring and requiring substantial counterterrorism resources and technology [56].…”
Section: Cloudmentioning
confidence: 99%
See 1 more Smart Citation
“…For example, adding a virtual reality component to training units could increase the capability of online actors once the technology has become more of a standard for wider populations of users. Further, developments such as the Internet of Things could provide novel forms of both radicalization and attacks ( Henschke, 2021 ; Sullivan and Montasari, 2022 ). These developments also extend to easily accessible attack equipment such as weaponry generated through 3D-printing and promoted on social media ( The Guardian, June, 2022 ).…”
Section: Current Limitations and Outlookmentioning
confidence: 99%