Handbook of Terrorism and Counter Terrorism Post 9/11
Show Less

Handbook of Terrorism and Counter Terrorism Post 9/11

Edited by David Martin Jones, Paul Schulte, Carl Ungerer and M. L.R. Smith

Almost two decades after the events of 9/11, this Handbook offers a comprehensive insight into the evolution and development of terrorism and insurgency since then. Gathering contributions from a broad range of perspectives, it both identifies new technological developments in terrorism and insurgency, and addresses the distinct state responses to the threat of political, or religiously motivated violence; not only in the Middle East and Europe, but also in Africa, South and Southeast Asia, and North and South America.
Buy Book in Print
Show Summary Details
You do not have access to this content

Chapter 6: The Internet and cybersecurity: taking the virtual fight to cybercrime and cyberwarfare

Jonathan R. Woodier and Andreas Zingerle

Abstract

From Seoul to London, governments face an unprecedented rise in cybersecurity issues. South Korea has already declared a state of cyber emergency. The European Union has warned that its members are facing cyberattacks that are persistent, aggressive, increasingly dangerous and destructive, and undermining trust in Western democracies. Countries like the UK are increasing spending on their cyber defences, and looking to the private sector for new ideas. GCHQ, Britain’s surveillance agency, has launched a centre for cybersecurity start-ups near its headquarters in Cheltenham. The expansion marks a new approach from intelligence services, which have in the past refused to share information about cybercrime with private businesses. But it appears to be a losing battle. This chapter traces the dramatic escalation of aggressive cyberattacks by state and non-state actors, as new digital technologies enable the ‘Internet of Things’ and new levels of data capture and concludes that the international community seems to be floundering amidst discord and disagreement as to how to mount a coordinated response.

You are not authenticated to view the full text of this chapter or article.

Elgaronline requires a subscription or purchase to access the full text of books or journals. Please login through your library system or with your personal username and password on the homepage.

Non-subscribers can freely search the site, view abstracts/ extracts and download selected front matter and introductory chapters for personal use.

Your library may not have purchased all subject areas. If you are authenticated and think you should have access to this title, please contact your librarian.


Further information

or login to access all content.