Hackers in duty of cyberterrorism

Robert Bartko, Roland Kelemen

Article ID: 10979
Vol 9, Issue 2, 2025


Abstract


The fight against terrorism has been at the heart of the international security policy for decades. The latest forms of terrorism are now being committed in cyberspace, making detection even more difficult. Alongside traditional forms of terrorism cyberterrorism have appeared as an element of the so-called ABC-Terrorism, exploiting the potential of cyberspace. The perpetrators of cyberspace operations, some of whom are hackers, are difficult to detect. Therefore, for an effective investigation it is very important to identify—in a scientific way—hackers and types of hackers who could become perpetrators of a terrorist attack. The opportunities afforded by globalisation and the revolution of the Internet make terrorists able to exploit the possibilities offered by the industrial and internet-based society. It shall be emphasized that the internet has become an integral part of our life, rendering us and the potential terrorist targets more vulnerable. Therefore, the paper aims to identify the concept of cyberterrorism on a scientific bases and to place it in the system of cybercrimes. Furthermore, identifying potential perpetrators by describing the different types of hackers is also an aim of the article. The result of the study may contribute to more effective prevention and response by the authorities. The paper concentrates only on criminal legal perspectives and avoid the political, military legal or ethical approaches.

Keywords


terrorism; cyberspace; ABC-Terrorism; hacker; cybercrime

Full Text:

PDF


References


Allahrakha, Naeem (2024): Global Perspectives on Cybercrime Legislation. Journal of Infrastructure, Policy and Development Vol. 8. Issue 10., 1-20.

Atkinson, Sean (2015): Psychology and the hacker – Psychological Incident Handling. SANS Whitepaper, 2015 4–9.

Barber, Richard (2001): Hackers Profiled – Who are they and what are their motivations? Computer Fraud&Security, Vol. 2 15.

Bartkó, Róbert – SÁNTHA, Ferenc (2023): A kibertér műveletek büntetőjogi értelmezésének lehetőségei. Military and Intelligence Cyber Security Research Paper Vol. 2. 1-30.

Brenner, Susan, W. (2006): Cybercrime, Cyberterrorism and Cyberwarfare. Revue internationale de droit pénal Vol. 3. 453-471.

Brenner, Susan, W. (2007): Re-thinking crime control strategies. In. Jewkes, Yvonne (ed.) Crime Online. Willan Publishing: Cullompton, UK 12-28.

Chang, Samuel – HAN YU, Lu – AYUSH, Kumar – DAVID, Yau (2022): Hacker types, motivations, and strategies: A comprehensive framework. Computers in Human Behavior Reports, Vol. 5., 3.

Chiesa, Raoul – DUCCI, Stefania – CIAPPI, Silvio (2009): Profiling Hackers - The Science of Criminal Profiling as Applied to the World of Hacking. Boca Raton, Taylor & Francis Group: London EN

Choi, Kyung-schick; LEE, Claire Seungeun (2018): The Present and Future of Cybercrime, Cyberterrorism, and Cybersecurity. International Journal of Cybersecurity Intelligence and Cybercrime Vol. 1. Issue 1., 1-4.CSÍKSZENTMIHÁLYI, Mihály (2008): Flow: The Psychology of Optimal Experience. Harper Perennial: New York, London, USA-EN

CSIS Significant Cyber Incidents since 2006 (https://csis-website-prod.s3.amazonaws.com/s3fs-public/2024-12/241210_Significant_Cyber_Events.pdf?VersionId=6M4z53qCe64xZ4cFQd7nkkTFPrQmeLPB)

Director General Ken McCallum gives latest threat update (2024) Available online: https://www.mi5.gov.uk/director-general-ken-mccallum-gives-latest-threat-update (accessed on 28 December 2024),

Esmailzadeh, Yaser – MOTAGHI, Ebrahim (2024): International Terrorism and Social Threats of Artificial Intelligence. Journal of Globalization Studies Vol. 15. Issue 1. 168-179.

Farkas, Ádám (2018): Gondolatok a 21. századi biztonságról, államról, védelemről. Hadtudomány, Special Issue, 241-256.

Federa Bureau of Investigation Internet Crime Report 2021. Internet Crime Complaint Center Available online: https://www.ic3.gov/Media/PDF/AnnualReport/2021_IC3Report.pdf (accessed on 28 December 2024),

Federa Bureau of Investigation Internet Crime Report 2023. Internet Crime Complaint Center Available online: https://www.ic3.gov/AnnualReport/Reports/2023_IC3Report.pdf (accessed on 28 December 2024),

Gillespie, Alisdair A. (2016): Cybercrime – Key Issues and Debates. Routledge 107-111. New York NY US

Gordon, Sarah – FORD, Richard (2006): On the Definition and Classification of Cybercrime. Journal of Computer Virology, 2(1) 13-20.

Hutchings, Alice (2013): A Qualitative Analysis of Online Offending and Victimisation, In. Karuppannan Jaishankar – Natti Ronel (ed.): Global Criminology: Crime and Victimization in a Globalized Era, CRC Press: London EN 95.

Kazári, Csaba (2003): Hacker, cracker, warez. A számítógépes alvilág titkai. Panorama: Budapest, HU, 18.

Kelemen, Roland (2023): Hacker – Az egyén mint a kibertér aktív szereplője. In: FARKAS, Ádám & KELEMEN, Roland: Nemzeti biztonság és kibertér. Médiatudományi Intézet. pp. 59-69.

Kelemen, Roland (2023): The Impact of the Russian-Ukrainian Hybrid War on the European Union’s Cybersecurity Policies and Regulations. Connections: The Quarterly Journal Vol. 22. Issue 2., 75-90.

Khalaf, Tahat, MOHAMMED, Habes, AHMED, Mansoori, NOURA, Naqbi, NAIJA, Al Ketbi, IHSAN, Maysari, DINA, Tahat, ABDULAZIZ Altawil (2024): Social media algorithms in countering cyber extremism: A systematic review. Journal of Infrastructure, Policy, and Development 8(8) 1-12 KILGER, Max (2015): Integrating Human Behavior into the Development of Future Cyberterrorism Scenarios, In. 10th International Conference on Availability, Reliability and Security

Kunos, Imre (1999): A számítógépes bűnözés. Belügyi Szemle, Vol. 11. 28-42.LOBACH, Dmitriy (2022): Cyberterrorism as an Atypical Manifestation (form) of Terrorism in the Modern World. Advances in Law Studies Vol 10. No. 3., 36-40.

Kwaku, Thimothy (2022): Securing Critical National Infrastructure Against Hacktivist. Advances in Multidisciplinary and scientific Research Journal Publication Vol. 10. Issue 4., 33-42.

Long, Larissa April: (2012): Profiling Hackers, Sans Institute Reading Room, 26th January 2012, 4–6.

Okpa, J. T., Ugwuoke, C. U., Ajah, B. O., et al. (2022). Cyberspace, Black-Hat Hacking and Economic Sustainability of Corporate Organizations in Cross-River State, Sage Open: Nigeria, 12(3). https://doi.org/10.1177/21582440221122739.PHILLIPS, Kirsty – DAVIDSON, Julia, C. – FARR, Ruby, R. – BURKHARDT, Christine – CANEPPELE, Stefano – AIKEN, Mary, P. (2022): Conceptualizing Cybercrime: Definitions, Typologies and Taxonomies. Forensic Sciences, 2(2) 379-398.

Panda mediacenter. 14 Types of Hackers to Watch Out For. Panda/mediacenter, 2021 (https://www.pandasecurity.com/en/mediacenter/security/14-types-of-hackers-to-watch-out-for/)

Sarre, Rick – LAU, Yiu-Chung – CHANG, Lennon, Y. C. (2018): Responding to cybercrime: Current trends. Police Practice and Research, 19(6), 515–518.

Shea, Sharon: Types of hackers: Black hat, white hat, red hat and more, TechTarget, SearchSecurity (https://www.techtarget.com/searchsecurity/answer/What-is-red-and-white-hat-hacking)

Taken Smith, Katherine – SMITH, Lawrence Murphy – BURGER, Marcus – BOYLE, Erik S. (2023): Cyber Terrorism Cases and Stock Market Valuation Effects. Information and Computer Security Vol. 31. Issue 4., 385-403.

Terrorism Financing in Australia – National Risk Assessment. Available (2024) online: https://www.austrac.gov.au/sites/default/files/2024-07/2024%20AUSTRAC%20Terrorism%20Financing%20NRA.pdf (accessed on 28 December 2024),

Terrorism Situation and Trend Report 2024 -EUROPOL (https://www.europol.europa.eu/cms/sites/default/files/documents/TE-SAT%202024.pdf)

Turovszkij, Danyil (2020): Orosz hekkerek – Így lettek lázadókból Putyin katonái. Athenaeum: Budapest, HU

Van Beveren, John (2001): A conceptual model of hacker development and motivations. Journal of E-Business, Vol. 2.

Wall, David, S. (2001): Introduction: Cybercrime and the Internet. In. Wall, David, S. (ed.) Crime and the Internet. Routledge: New York, NY, USA, 2.

Xiong, Zhang – ALEX, Tsang – T. WEI, Yue – MICHAEL, Chau (2015): The classification of hackers by knowledge exchange behaviours, Information Systems Frontiers, Vol. 6, 1245.

Xu, Joy – AARON, Lio – HARSHDEEP, Dhaliwal – SORINA, Andrei – SHAKTHIKA, Balakrishnan – UZHMA, Nagani – SUDIPTA, Samadder (2021): Psychological interventions of virtual gamification within academic intrinsic motivation: A systematic review. Journal of Affective Disorders, 21(10)., 444–465.




DOI: https://doi.org/10.24294/jipd10979

Refbacks

  • There are currently no refbacks.


Copyright (c) 2025 Author(s)

License URL: https://creativecommons.org/licenses/by/4.0/

This site is licensed under a Creative Commons Attribution 4.0 International License.