Lone actor terrorist use of the internet and behavioural correlates

Paul Gill*, Emily Corner

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

36 Citations (Scopus)

Abstract

Cyber technology is likely to become an essential terrorist tool. However, to implement rules on the use of force may entail certain difficulties in view of the specific characteristics of cyber technology. This section shows that, given the rapid and anonymous character of a cyberattack, it may be difficult to attribute it to its originator. There are two exceptions to the prohibition on the use of armed force between states: the use of force enshrined within the right to self-defence in response to an armed attack; the use of force as authorised by UN Security Council. The UN Security Council is the principal organ of the United Nations responsible for maintenance of international peace and security. The analysis has demonstrated that current international law on the use of force offers an incomplete and ineffective response to international cyberterrorism, in particular because it does not allow reaction in self-defence against those non-state actors who are expected to be the principal cyberterrorists.
Original languageEnglish
Title of host publicationTerrorism Online
Subtitle of host publicationPolitics, Law and Technology
PublisherTaylor and Francis Inc.
Pages35-53
Number of pages19
ISBN (Electronic)9781317908029
ISBN (Print)9780415732888
DOIs
Publication statusPublished - 24 Mar 2015
Externally publishedYes

Fingerprint

Dive into the research topics of 'Lone actor terrorist use of the internet and behavioural correlates'. Together they form a unique fingerprint.

Cite this