Technology
This chapter considers factors that may afford non-state actors like terrorists or extremists in the cyber field an opportunity to access offensive cyber means and how this threat might be best managed. It acknowledges that other terrorism-related areas identify a risk in focusing too narrowly on the technology, rather than dealing with motivations and intentions effectively. Similarly, recommendations from law enforcement authorities include preventing criminals from becoming involved in the first place. The main thrust of this chapter is on solutions and minimizing opportunities for violence from occurring rather than countering extremism itself. The concept of so-called ‘cyber terrorism’ is examined, including current perceptions on the degree of terrorist access to offensive cyber means. Several factors that could affect, to varying degrees, such proliferation of tools and techniques include the following: 1. Rising complexity and vulnerabilities in the cyber domain; 2. Maturing skills; 3. The nexus with criminal groups and hacktivists; 4. Levels of resilience; 5. Media exposure; and 6. International negotiations on state behaviour vis-à-vis cyber weapon proliferation.