APPENDIX A

TERRORISM TYPOLOGY

A. TYPOLOGY

"Conventional" terrorism is important because cyberterrorism will remain, in the near future, subordinate to conventional terrorism. The implications of information warfare tactics and techniques for both terrorism and counterterrorism and summarized in this typology to highlight how terrorism and the response to terrorism may change in the future.

1. From Conventional Terror to Cyberterror

The following chart summarizes the key components of "conventional" terrorism, technoterrorism, and cyberterrorism.  

Conventional Terrorism Technoterrorism Cyberterrorism
Targets exist in "real' space
* Airlines
* Buildings
* High Profile individuals
* Low Profile individuals

Targets exist in "real" space
with cyberspace and "real"
space impact
* Electric Grids

* Computer Networks
* Telecommunications
Targets exist exclusively in
cyberspace with "real'
space impact
* Telecommunications
* Computer Networks

* Control Networks
Creates physical threat Creates physical and "virtual" threat Creates "virtual" and physical
threat
Weapons:
* Explosives
* Guns
Weapons:
* Explosives
* Guns
Weapons:
* Malicious Software
* EMP Weapons
*(For data manipulation or destruction)
Techniques:
* Bombings
* Kidnapping

* Assassination
Techniques:
* Bombing
* Physical Desctruction of Key
Components
Techniques:
* "Virtual" destruction of
targets in cyberspace
* Disabling of system software

* Overwhelming of control
systems
Size of Group:
* Large Group=large potential
impact
* Small Group=small potential
impact
Size of Group:
* Large Group=large potential
impact
* Small Group=smaller potential
impact
Size Group:
* Large Group=large impact
* Small Group=large impact
Large amount of money required
for large impact
Moderate amount on money
required for large impact
Small amount of money
required for large impact
Physicl risk is high for terrorists Physical risk is moderate for
terrorists
Physical risk is very low for
terrorists
Value ofstate sponsorship:
* Money
* Equipment
* Training
* Basing
* Intelligence support
* Transportation
Value of state sponsorship:
* Money
* Intelligence
* Training
* Equipment
* Transportation
Value of state sponsorship:
* Intelligence
Role of the media: critical Role of the media: critical Role of the media: moderate
Laws are clear Laws are clear Laws are nebulous
Intel/Info requirements for
success are low
Intel/Info requirements for
success are moderate
Intel/Info requirements for
success are vitally important
Communications vital for success
and a vulnerability
Communications vital for
success and a vulnerability
Communications vital for success
and normally secure.
(encryption-global connectivity
Disruption potential is moderate
* Coordinated/distributed attacks
hard
Disruption potential is large
* Coordination/distributed
attacks difficult
Disruption potentia is immense
* Coordination/distributed
attacks relatively easy
Type of Groups
* Nationalists-separatist-
* irredentist
* Issue

* Ideological
* Exile
* State/State-sponsored
Type of Groups: Nationalists-separatists-
irredentist
* Issue
* Ideological

* Exile
* State/State-sponsored
Type of Groups: Nationalists-separartist-
irredentist

* Issue
* Ideological
* Exile
* State/State-sponsored
Physical presence required for
attack to be succesf ul

* Borders matter
Physical presence required for
attack to be successful

* Borders matter
Physical presence NOT required
for attack to be successful

* Borders nonexistent
Attack has effects Attack has diffuse effects Attack can have either focused
of diffuse effects

 

Preventive/Response Measures

Conventional terrorism Technoterrorism Cyberterrorism
Deter
* Sponsoring State
           Military response
           Economic response
* Legal mechanisms

Deter
* Sponsoring State
           Military response
           Economic response
* Legal mechanism
Deter
Who?
How?
Defend
* Physically "harden" targets (bulidings)
* Prevent access to targets
(airport security)

* Increase intelligence gathering
Defend
* Physically "harden" targets
(buildings/transformers/
pipelines)
* Increase intelligence on potential
targets
Defend
* "harden" computer systems increased training in security
* Increased intelligence gathering
Disrupt
* Infiltrate groups
* Discredit leadership

* Communications
Disrupt
* Infiltrate groups (harder)
* Discredit leadership (if identifiable)
Disrupt
* Take away comm channels
* Prevent repeated access attempts
Preempt
* Stike groups before attacks
Preempt
* Strike groups before attacks
Preempt
* Strike computers with IW weapons
* Physically destroy computers or attack group members

Previous

Next

Table of Contents