Cyberterrorism – An Overview
The Internet can easily be used for terrorist purposes!
This includes:
- propaganda (including recruitment, radicalization and incitement to terrorism)
- terrorist financing (through online scams and direct fundraising)
- terrorist training
- planning of terrorist attacks (including through secret communication and open-source information)
- execution of terrorist attacks
- cyberattacks & cybercrime
The term cyberterrorism has been applied by some to describe the use of the Internet for terrorist purposes.
Online Terrorism Connection
Information and communication technology (ICT) can be used to facilitate the commission of terrorist-related offenses (a form of cyber-enabled terrorism) or can be the target of terrorists (a form of cyber-dependent terrorism).
Specifically, ICT can be used to promote, support, facilitate, and/or engage in acts of terrorism.
Particularly, the Internet can be used for terrorist purposes such as the spreading of “propaganda (including recruitment, radicalization and incitement to terrorism); [terrorist] financing; [terrorist] training; planning [of terrorist attacks] (including through secret communication and open-source information); execution [of terrorist attacks]; and cyberattacks” (UNODC, 2012, p. 3).
Just as there is no universal consensus on a definition of cybercrime, there is no universally accepted definition of terrorism nor of cyberterrorism.
Conceptions of cyberterrorism have ranged from “more expansive conceptions; including any form of online terrorist activity; and narrower understandings of this concept.”
The narrow understanding of cyberterrorism has been described as “pure cyberterrorism” by some. This narrow definition considers cyberterrorism as a cyber-dependent crime perpetrated for political objectives to provoke fear, intimidate and/or coerce a target government or population, and cause or threaten to cause harm (e.g., sabotage). Examples of this narrow conception of cyberterrorism include “attacks that lead to death or bodily injury, explosions, plane crashes, water contamination, or severe economic loss. Serious attacks against critical infrastructures could be acts of cyberterrorism, depending on their impact. Attacks that disrupt nonessential services or that are mainly a costly nuisance would not” according to some sources. It is important to note that this limitation of cyberterrorism to cybercrimes committed against critical infrastructure (or pure cyberterrorism) is not widely held.
Some cyberterrorism laws have been criticized for being overly broad and being used by governments to prosecute activists and dissidents. In view of that, more expansive conceptions of cyberterrorism in law lead to disproportionate limitations of human rights.
While certain countries have national cyberterrorism laws (e.g., India, Section 66-F, Information Technology Act of 2000; Pakistan, Section 10, Prevention of Electronic Crimes Act of 2016; and Kenya, Section 33, Computer Misuse and Cybercrimes Act of 2018), cyberterrorism is not explicitly prohibited under international law up to the present.
Even though there is no universally accepted definition of cyberterrorism and international law does not explicitly criminalize cyberterrorism, “most laws contain offense-creating provisions directly targeting malicious acts aimed at destroying or interfering with the functioning of” critical infrastructure. Specifically, acts of terrorism against critical infrastructure sectors, such as the transportation (e.g., aviation and maritime), nuclear, and government sectors, are prohibited under certain provisions of United Nations international conventions and protocols, such as:
- 1963 Convention on Offences and Certain Other Acts Committed on Board Aircraft, and its supplementary Protocol of 2014;
- 1970 Convention for the Suppression of Unlawful Seizure of Aircraft, and its supplementary Protocol of 2010;
- 1971 Convention for the Suppression of Unlawful Acts against the Safety of Civil Aviation;
- 1973 Convention on the Prevention and Punishment of Crimes Against Internationally Protected Persons;
- 1980 Convention on the Physical Protection of Nuclear Material;
- 1988 Convention for the Suppression of Unlawful Acts Against the Safety of Maritime Navigation;
- 1988 Protocol for the Suppression of Unlawful Acts Against the Safety of Fixed Platforms Located on the Continental Shelf;
- 1988 Protocol for the Suppression of Unlawful Acts of Violence at Airports Serving International Civil Aviation, supplementary to the Convention for the Suppression of Unlawful Acts against the Safety of Civil Aviation;
- 1997 International Convention for the Suppression of Terrorist Bombings;
- 2005 Amendments to the Convention on the Physical Protection of Nuclear Material;
- 2005 International Convention for the Suppression of Acts of Nuclear Terrorism;
- 2005 Protocol for the Suppression of Unlawful Acts Against the Safety of Fixed Platforms located on the Continental Shelf;
- 2005 Protocol to the Convention for the Suppression of Unlawful Acts Against the Safety of Maritime Navigation;
- 2010 Convention on the Suppression of Unlawful Acts Relating to International Civil Aviation.
Countries that are parties to these conventions and protocols are obliged to harmonize their domestic legal frameworks with the provisions of these instruments, whereas those “that are not parties to some of the conventions and protocols are encouraged to ratify or accede them” pursuant to United Nations Security Council Resolution 1373 (2001). Countries are further required to comply with UNSC Chapter VII binding resolutions in the fight against terrorism. UNSC Resolution 2370 (2017) “urges the Member States to act cooperatively to prevent terrorists from acquiring weapons, including through information and communications technologies, while respecting human rights and fundamental freedoms and in compliance with obligations under international law, and stresses the importance of cooperation with civil society and the private sector in this endeavor, including through establishing public-private partnerships.”
Countries, who are not parties frequently have equivalent, or in some cases stronger laws – such as the United States.
Ultimately, what is considered cyberterrorism depends on the country that is labeling the act. Nonetheless, the mislabeling of acts as cyberterrorism can have detrimental consequences, resulting in disproportionate sentences for those prosecuted for this cybercrime. In this vein, in the United Nation’s view: all counterterrorism laws “must be limited to the countering of offenses within the scope of, and as defined in, the international conventions and protocols relating to terrorism, or the countering of associated conduct called for within resolutions of the Security Council, when combined with the intention and purpose elements identified in Security Council resolution 1566 (2001)” ( E/CN.4/2006/98, para. 39). Conversely, “[c]rimes not having the quality of terrorism, regardless of how serious, should not be the subject of counter-terrorism legislation” ( E/CN.4/2006/98, para. 47).
Reality
Terrorism, wherever it is located, relies on the Internet for communications and functions.
Much of cybercrime serves to fund terrorism in all its forms. Prior to 9/11, Al Qaeda generated billions of dollars by its connection to African, Middle Eastern, and Asian online scams & fraud.
When both experiencing cybercrime or combatting it, it is important to remember that still today that much of it is funding groups like Boko Haram, Abu Nidal, and other Al Qaeda or Islamic State affiliates.
This is particularly important for vigilante victims to insist on rushing into territories and situations where they have no business going. While not all scammers are violent, they are all capable of violence when pushed. Some estimates are that dozens (possibly hundreds) of scam victims are killed or disappear each year while trying to track down and get revenge against cybercriminals.
Even if cyber criminals were not connected to terrorism, they remain dangerous in their home territories.
Fortunately, this terrorism connection is considered a major priority for global anti-terrorism and national law enforcement agencies around the world.
TAGS: SCARS, Cyberterrorism, Cyberterrorists, Terrorists, Terrorist funding, scams & terrorism, Information About Scams, Anti-Scam, Scams, Scammers, Fraudsters, Cybercrime, Crybercriminals, Romance Scams, Scam Victims, Online Fraud, Online Crime Is Real Crime, Scam Avoidance
SCARS™ Team
Society of Citizens Against Relationship Scams Inc.
A Worldwide Crime Victims Assistance Nonprofit Organization
Visit: www.AgainstScams.org
Contact Us: Contact@AgainstScams.org
PLEASE SHARE OUR ARTICLES WITH YOUR FRIENDS & FAMILY
HELP OTHERS STAY SAFE ONLINE – YOUR KNOWLEDGE CAN MAKE THE DIFFERENCE!
-/ 30 /-
What do you think about this?
Please share your thoughts in a comment below!
Article Rating
Table of Contents
- The Internet can easily be used for terrorist purposes!
- Specifically, ICT can be used to promote, support, facilitate, and/or engage in acts of terrorism.
- Elicitation – A Scammer’s Manipulation Technique – 2025
- SCARS Institute’s New Survivor Community – www.SCARScommunity.org – 2025
- WARNING: AI-Enabled Browsers Pose a Cybersecurity Risk – 2025
- New United Nations UNODC Report on Corruption and Cybercrime – 2025
- SCARS Institute – 12 Years of Service to Scam Victims/Survivors – 2025/2026
- Protecting the People: The Role that Governments are or are not taking in Combating Cybercrime – 2025
- FIND MORE SCAM NEWS
SCAMCRIME.COM - FIND SCAMMER PHOTOS ON
SCARSONLINE.ORG - JOIN US ON FACEBOOK
CLICK HERE
RATE THIS ARTICLE?
LEAVE A COMMENT?
Recent Comments
On Other Articles
- Taci Fernuik on How You Think & Talk About Your Scam Affects Your Recovery: “I have hung on to the scams for far too long. With the intervention of an all-merciful God, I have…” Nov 6, 22:13
- on Disengaging From A Fake Scam Relationship: “Taci, you may want to join our new support community at www.SCARScommunity.org” Nov 6, 03:01
- on Disengaging From A Fake Scam Relationship: “This particular article helped me discover the many things I did wrong the first time I was scammed. I should…” Nov 5, 22:49
- on About the SCARS RomanceScamsNOW.com Website – 24 Years Published: “It was unavailable for a few days, but it is available again. If he would be interested, he is welcome…” Nov 5, 00:59
- on About the SCARS RomanceScamsNOW.com Website – 24 Years Published: “My husband has been scammed and your classes have been helping him but now he can’t seem to access them.…” Oct 26, 14:57
- on Talia Shepard – Impersonation Victim – Stolen Photos – 2024: “Hi, I’m Patrick from Belgium and I found this site by chance, so I just got to know it, and…” Oct 17, 23:46
- on Talia Shepard – Impersonation Victim – Stolen Photos – 2024: “Hallo ik ben Patrick uit Belgie en het is in verband over PayPal. Ik heb het dit jaar spijtig genoeg…” Oct 17, 23:08
- on Debt Relief Scams – Catalog of Scams – 2024 UPDATED 2025: “Before you make any decision, stop, think, and ask someone you trust for advice. No matter how difficult your situation…” Oct 9, 07:06
- on Shemar Moore – Stolen Photos – Impersonation Victim – 2024: “KM, sadly, this was available 5 years ago. The is a 25 year old website. Of course, new content is…” Oct 6, 13:27
- on Shemar Moore – Stolen Photos – Impersonation Victim – 2024: “Me too, since 2020. I’ve dealt with a lot of them till now. They’ve completely manipulated me and put me…” Oct 6, 00:48
ARTICLE META
Important Information for New Scam Victims
- Please visit www.ScamVictimsSupport.org – a SCARS Website for New Scam Victims & Sextortion Victims
- Enroll in FREE SCARS Scam Survivor’s School now at www.SCARSeducation.org
- Please visit www.ScamPsychology.org – to more fully understand the psychological concepts involved in scams and scam victim recovery
If you are looking for local trauma counselors please visit counseling.AgainstScams.org or join SCARS for our counseling/therapy benefit: membership.AgainstScams.org
If you need to speak with someone now, you can dial 988 or find phone numbers for crisis hotlines all around the world here: www.opencounseling.com/suicide-hotlines
A Note About Labeling!
We often use the term ‘scam victim’ in our articles, but this is a convenience to help those searching for information in search engines like Google. It is just a convenience and has no deeper meaning. If you have come through such an experience, YOU are a Survivor! It was not your fault. You are not alone! Axios!
A Question of Trust
At the SCARS Institute, we invite you to do your own research on the topics we speak about and publish, Our team investigates the subject being discussed, especially when it comes to understanding the scam victims-survivors experience. You can do Google searches but in many cases, you will have to wade through scientific papers and studies. However, remember that biases and perspectives matter and influence the outcome. Regardless, we encourage you to explore these topics as thoroughly as you can for your own awareness.
Statement About Victim Blaming
Some of our articles discuss various aspects of victims. This is both about better understanding victims (the science of victimology) and their behaviors and psychology. This helps us to educate victims/survivors about why these crimes happened and to not blame themselves, better develop recovery programs, and to help victims avoid scams in the future. At times this may sound like blaming the victim, but it does not blame scam victims, we are simply explaining the hows and whys of the experience victims have.
These articles, about the Psychology of Scams or Victim Psychology – meaning that all humans have psychological or cognitive characteristics in common that can either be exploited or work against us – help us all to understand the unique challenges victims face before, during, and after scams, fraud, or cybercrimes. These sometimes talk about some of the vulnerabilities the scammers exploit. Victims rarely have control of them or are even aware of them, until something like a scam happens and then they can learn how their mind works and how to overcome these mechanisms.
Articles like these help victims and others understand these processes and how to help prevent them from being exploited again or to help them recover more easily by understanding their post-scam behaviors. Learn more about the Psychology of Scams at www.ScamPsychology.org
Psychology Disclaimer:
All articles about psychology and the human brain on this website are for information & education only
The information provided in this article is intended for educational and self-help purposes only and should not be construed as a substitute for professional therapy or counseling.
While any self-help techniques outlined herein may be beneficial for scam victims seeking to recover from their experience and move towards recovery, it is important to consult with a qualified mental health professional before initiating any course of action. Each individual’s experience and needs are unique, and what works for one person may not be suitable for another.
Additionally, any approach may not be appropriate for individuals with certain pre-existing mental health conditions or trauma histories. It is advisable to seek guidance from a licensed therapist or counselor who can provide personalized support, guidance, and treatment tailored to your specific needs.
If you are experiencing significant distress or emotional difficulties related to a scam or other traumatic event, please consult your doctor or mental health provider for appropriate care and support.
Also read our SCARS Institute Statement about Professional Care for Scam Victims – click here to go to our ScamsNOW.com website.












Thank you for your comment. You may receive an email to follow up. We never share your data with marketers.