Rosenbach+ +Technology Enabled+Terrorism

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

Fighting Fear and the Future of Technology-Enabled Terrorism

Author(s): Alexander von Rosenbach


Source: Atlantisch Perspectief , 2021, Vol. 45, No. 3, 2001-2021 (2021), pp. 31-35
Published by: Stichting Atlantische Commissie

Stable URL: https://www.jstor.org/stable/10.2307/48638243

REFERENCES
Linked references are available on JSTOR for this article:
https://www.jstor.org/stable/10.2307/48638243?seq=1&cid=pdf-
reference#references_tab_contents
You may need to log in to JSTOR to access the linked references.

JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide
range of content in a trusted digital archive. We use information technology and tools to increase productivity and
facilitate new forms of scholarship. For more information about JSTOR, please contact support@jstor.org.

Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at
https://about.jstor.org/terms

Stichting Atlantische Commissie is collaborating with JSTOR to digitize, preserve and extend access
to Atlantisch Perspectief

This content downloaded from


132.174.249.175 on Mon, 23 Oct 2023 12:43:20 +00:00
All use subject to https://about.jstor.org/terms
ANALYSIS

Fighting Fear and the


Future of Technology-
Enabled Terrorism Alexander von Rosenbach

In May 2021, the largest fuel pipeline in the United States was forced offline for nearly a week following a devastating
cyberattack. The attackers, a criminal gang called DarkSide, collected a hefty $4.4 million ransom payout from the
pipeline owners before normal operations were gradually restored.1 But the hack had much wider consequences, trig-
gering gas shortages and economic disruption across the US Southeast while exposing the soft underbelly of critical
national infrastructure in digitally enabled societies.

Curiously, in the days following the attack, DarkSide re- extremists are difficult tasks considering how technolo-
leased a statement that said: “We are apolitical, we do gy is stitched into the fabric of our societies. It powers
not participate in geopolitics… Our goal is to make money, our smartphones, guides our cars and planes, manages
and not creating problems for society.”2 While the idea of our production lines and governs our energy networks.
a criminal gang with a moral compass is fascinating, the Smart speakers sitting innocently in our living room are
statement is also a warning. What if the attackers had dependent on artificial intelligence (AI) and machine-learn-
been pursuing a geopolitical aim and not a financial one? ing (ML) technology. The robot vacuum cleaners patrolling
What more damage could have been inflicted had fear and our dirty floors – and perhaps soon delivering pizzas and
social disruption been the intent rather than a byproduct other goods to our front doors – represent the cheap and
of the attack? How would the world have responded had plentiful nature of modern drone technology. The meat-
the headlines read: “ISIS launches devastating cyberat- free hamburgers we eat3 and the medications we take4 are
tack on US pipeline”? created using commercial synthetic biology technology.

As mentioned by other authors in this issue, extremists This explosion of technology-enabled modern conveni-
are well present online and in the cyber domain where they ences means that our attack surface – the number of
mobilize supporters who might even end up using violence potential vulnerabilities in our society – is expanding ex-
or engaging in acts of terrorism. This article is focused on ponentially. In parallel, many of these technologies are
how terrorist actors might use new technologies (or not). getting cheaper as they mature and move from servicing
niche markets into wider commercial application. In short,
AN EVER-EXPANDING ATTACK SURFACE the ubiquity of technology puts us more at risk.
For policymakers and practitioners working in the field of
counter-terrorism, these questions are more than just ab- PRIORITIZATION INFORMED BY PRAGMATISM
stract counterfactuals. No one wants to repeat the “failure The question for counter-terrorism professionals is, there-
of imagination” that haunts the post-9/11 national secu- fore, one of probability: how likely is it that terrorists and
rity landscape. extremists will act on one of these technology risks and
cause real harm? Moreover, given the myriad of dangers
To constantly assess technology trends and anticipate facing society, how should such threats be prioritized?
how new technologies might be exploited by terrorists and

Atlantisch perspectief 31
This content downloaded from
132.174.249.175 on Mon, 23 Oct 2023 12:43:20 +00:00
All use subject to https://about.jstor.org/terms
ANALYSIS

The largest fuel pipeline in the US was forced offline due to a cyberattack. The hackers asked for a 4.4 million dollar ransom payout. Depicted is a gas station in the US that
was out of gas and therefore had to close down due to the Colonial Pipeline cyberattack (photo Sharkshock / Shutterstock.com)

There is no easy answer, but it is perhaps helpful to eval- intentional effort to create an omnipresent environment
uate the threat of a terror attack against – or exploiting of fear, where terrorist violence is “seemingly able to take
– technology by first stepping back to recall the broader place anywhere, anytime, and to be carried out by virtually
aims of terrorism as a practice. anyone” and others can be easily encouraged to ‘follow
the example’.7
While no universally accepted definition of terrorism ex-
ists, there is an academic consensus that terrorism is a Taken together, these arguments suggest that while a
goal-driven activity, a “practice of calculated, demonstra- high-tech terror attack is certainly possible, the trend in
tive, direct violent action without legal or moral restraints, terrorist acts is towards a less sophisticated (and less
targeting mainly civilians and non-combatants, performed technologically enabled) practice that does not lose much
for its propagandistic and psychological effects on vari- in the way of effectiveness. Does this mean we can stand
ous audiences and conflict parties.”5 As a result, terrorism down – or at least scale down – our defense against high-
is often a pragmatic enterprise, with attackers willing to tech terrorists?
adapt and evolve their modus operandi as necessary in
pursuit of ‘demonstrative’ results. GRADING THREATS ON A CURVE
The rise in low-tech terrorism does not mean that terror-
The evidence suggests that in recent decades, despite ists refuse to experiment with advanced technology. It is
the tech boom, terrorists are not rapidly enhancing the therefore important for national security policymakers and
technical sophistication of their weaponry or targets. On practitioners to assess whether such experimentation
the contrary, a recent analysis of terror attacks in the West should be viewed as the precursor to a new wave of tech-
from 2004 to 2019 identifies a trend towards “democra- nologically enabled threats, or historical outliers soon to
tisation of violence” and “the rise of inspired, unlinked, be forgotten.
low-capacity attacks” that employ rudimentary weaponry
such as guns, knives and vehicles.6 This is a pragmat- Here, it may be helpful to apply the framework of a violent
ic choice, as these everyday objects are readily available non-state actor (VNSA) technology adoption curve, first put
and impossible to regulate, while still effective enough to forward in 2019 by Daveed Gartenstein-Ross, Matt Shear
garner shock headlines. Others view this evolution as an and David Jones.8 They argue that “VNSAs’ process of

32 Atlantisch perspectief
This content downloaded from
132.174.249.175 on Mon, 23 Oct 2023 12:43:20 +00:00
All use subject to https://about.jstor.org/terms
technological adoption typically follows an identifiable pat- thrust into the spotlight as possible terrorist threat vec-
tern,” marked by early adoption (experimentation), itera- tors. Notably, amidst a spiralling cycle of damaging cyber-
tion leading to breakthrough, and ultimately competition attacks, the fear of cyber-terrorism is escalating. Addition-
as countermeasures are developed (see Figure 1). ally, the COVID-19 pandemic has brought to life fears of
synthetic bioterrorism. How should these threats be as-
sessed?

CYBER-TERRORISM
The Colonial Pipeline ransomware attack mentioned ear-
lier demonstrates that sophisticated cyber threats can
cause real-world social and supply chain disruption. Sim-
ilarly, the SolarWinds cyberattack in 2020 – which affect-
ed a wide range of US government departments including
the Pentagon, National Security Agency and Department
of Homeland Security10 – shows that even highly sensitive
and well-defended digital networks can be compromised
by determined attackers.

Figure 1: the VNSA technology adaption curve. However, both of these major attacks also serve as a re-
minder that cyberattacks to date have not had a spectac-
This approach to organizational learning and technologi- ular psychological impact. Frontpage stories about wide-
cal innovation does not assume that every technological spread economic disruption or major leaks of sensitive
experiment will lead to a breakthrough act of terror. But it intelligence appear unable to generate the same ‘scare
does give security professionals a tool to assist with early factor’ as even a small-scale terror attack.
recognition of emerging risks, as well as a better under-
standing of the urgency and seriousness of a particular Several factors might explain this. Cyberattacks are often
technology threat. highly technical affairs and the details are not easily un-
derstood by the general population, making them seem
This framework can be used, for example, to contextualize more like “nerdy problems” than actual threats. Similarly,
the October 2019 terror attack in Halle, Germany in which as the (first order) effects of cyberattacks are generally
the perpetrator sought to prove the viability of “improvised non-kinetic – meaning no one is hurt, no buildings are de-
guns” by using weapons with components produced using stroyed, etc – they are perceived as more abstract threats
commercial 3D printing technology. The attack killed two when compared to the very real and graphic acts of vio-
people, but was generally considered a failure because the lence committed by terrorists. Finally, as the cyber defens-
attackers’ homemade weapons repeatedly jammed and es mounted by government and industry are invisible, indi-
prevented further loss of life. Nonetheless, the novelty of viduals going about their day-to-day business do not feel a
the use of 3D printing sparked widespread concern and security presence that reminds them to feel unsafe. We all
media speculation that the attack was “likely to spawn mindlessly complete two-factor authentication to access
a cottage industry of homemade weaponry disseminated our digital lives, yet when we walk through metal detec-
online. The technology will give terrorists easier access to tors at the airport or our favorite concert venue, we are
a spectrum of increasingly dangerous weaponry—and new confronted with a physical reminder that terrorists seek to
ways to evade government countermeasures.”9 harm us in the places where we live, work and play.

The VNSA technology adoption curve does not eliminate Whatever the reason, detailed analysis of the history of
this as a possible outcome, but serves as a reminder that cyberattacks by terrorist organizations like Al Qaeda and
while the underlying commercial technology is still maturing, ISIS shows that while such groups might have aspirations
we should actually expect would-be attackers to experience or even intent to launch destructive cyberattacks, they
similar high-profile failures more than we should anticipate have not acquired such capabilities despite decades of
high-profile successes. If the risk of failure acts as a prag- opportunity and an increasingly target-rich digital society.11
matic deterrent to an attacker looking to commit a ‘demon-
strative’ act of violence, so too should it act as a caution SYNTHETIC BIOTERRORISM
against public overreaction or overinvestment in counter- While state-sponsored biological warfare has always been
measures targeting the use of 3D printing by terrorists. of concern to the national security community, the rise of
Beyond 3D printing, other technologies have recently been (relatively) cheap and accessible gene-editing techniques

Atlantisch perspectief 33
This content downloaded from
132.174.249.175 on Mon, 23 Oct 2023 12:43:20 +00:00
All use subject to https://about.jstor.org/terms
ANALYSIS

Despite the tech boom, terrorists are not quick to enhance their weapons. Improvised explosive devices (IEDs) have been used as weapons in terrorist attacks for many years.
Depicted is a vehicle-borne improvised explosive device (VBIED), a weapon commonly used in terrorist attacks (photo: Flickr / Think Defence/ CC BY-NC 2.0)

has raised the possibility that we may be entering a new calized individuals have been readily experimenting with
age of bioterrorism. In this scenario, “smart terrorists” synthetic biology technology.
could use commercially available tools and services to
weaponize existing viruses or even design new biological In fact, the idea of the “smart terrorist” oversimplifies the
agents with the goal of unleashing them into the general level of technical sophistication and resources – think lab
population.12 The speed and scale of the COVID-19 global facilities, ingredients, storage facilities, etc – that are still
pandemic has only heightened concern about this threat, needed to produce a deadly pathogen, scale up produc-
making it appear less and less like science fiction. tion, and then marry it to a separate technology for mass
dissemination.14 These present pragmatic and practical
Research does affirm that biological weapons are becom- restrictions on the threat of synthetic bioterrorism. More-
ing “cheaper, easier to produce, more widely available, over, as COVID-19 has demonstrated, biological threats to
within the capabilities of an increasingly large number of humanity do not stay neatly within national, ideological or
people with access to minimal technical skills and equip- ethnic boundaries. As such, an act of synthetic bioterror-
ment, and more concealable dual-use technologies.”13 For ism is perhaps less appealing for those whose goal is to
example, the CRISPR gene-editing system has become so cause fear and disruption in specific populations.
accessible that do-it-yourself kits can be purchased online
by amateur scientists. PROPORTIONALITY IS KEY
The unifying lesson from the two case studies above is
Despite these advances, applying the VNSA technology that it is difficult for the counter-terrorism community to
adoption curve framework to this technology makes clear keep up with the imaginations of would-be terrorists, par-
that an important ingredient is still missing: terrorist ex- ticularly as innovative technologies continue to migrate
perimentation and adaptation. To be sure, bioterrorism is from niche uses to mainstream.
a real threat – the Japanese cult Aum Shinrikyo tried (un-
successfully) to weaponize botulinum toxin and anthrax Frameworks like the VSNA technology adoption curve can
in the 1990s, and in 2001 a bioterrorism attack using help assess the trajectory and probable threat posed by
anthrax killed five people in the US. However, there are no modern technology in the hands of terrorists. However, just
indications in open sources that terrorist groups or radi- as terrorists tend towards pragmatism, we also need to

34 Atlantisch perspectief
This content downloaded from
132.174.249.175 on Mon, 23 Oct 2023 12:43:20 +00:00
All use subject to https://about.jstor.org/terms
be pragmatic in acknowledging the
old adage that the defender needs
to be lucky always while the attack-
er needs to be lucky only once. If
we accept that experimentation is
a natural part of the evolving terror
threat, we must also accept that
no amount of prevention, prepared-
ness or countermeasures will elim-
inate the risk of cyberterrorism or
other technology-enabled attacks.

If terrorists do catch us off guard


by employing new or emerging
technologies, our challenge as a
society will be to avoid overreac-
tion. In such scenarios, it is easy
to foresee fiery debates about the
use of force against cyberterror- The framework of a VNSA technology adoption curve can be applied to the 2019 terror attack in Halle, Germany, where
ists operating with impunity from the attacker used 3D printing technology to fabricate his weapons. Depicted is the cemetery wall of the synagogue in
third countries, or the introduc- Halle, Germany, after the terrorist attack (photo: ArTono / Shutterstock.com)
tion of new legislation to regulate
commercial innovation in the biotechnology sector. Terror Thus, even when facing the technologically enabled terror-
attacks leveraging drones, funded by crypto-currencies, ists of the future, we have a responsibility to ensure our
or powered by some form of artificial intelligence – oth- legal, military and social responses are not only forceful
er emerging technologies not discussed in this article – but also proportionate to threat we face.
would spark similar confusion about how to respond.

Alexander von Rosenbach is the Interim Director of the International Centre


This will remain a difficult line to walk. But, over the last
for Counter-Terrorism – The Hague (ICCT)
20 years, we have learned the hard way that dispropor-
tionate reactions to terrorism do not make us safer over Would you like to react?
the longer term, as is also argued by Martijn Kitzen in his Mail the editor: redactie@atlcom.nl.
piece in this special issue on extremism and terrorism.

1. Wall Street Journal, ‘Colonial Pipeline CEO Tells Why He Paid 8. Gartenstein-Ross D, Shear M & Jones D.A., ‘Virtual Plotters.
Hackers a $4.4 Million Ransom’, (19 May, 2021). https://www. Drones. Weaponized AI?: Violent Non-State Actors as Deadly Early
wsj.com/articles/colonial-pipeline-ceo-tells-why-he-paid-hackers-a-4- Adopters’, Valens Global (2019). https://valensglobal.com/virtual-
4-million-ransom-11621435636 plotters-drones-weaponized-ai-violent-non-state-actors-as-deadly-
2. CNBC, ‘Here’s the hacking group responsible for the Colonial early-adopters/
Pipeline shutdown’, (10 May, 2021). https://www.cnbc. 9. Wall Street Journal, ‘3-D Printing the Future of Terrorism?’ (25 Oct,
com/2021/05/10/hacking-group-darkside-reportedly-responsible- 2019). https://www.wsj.com/articles/is-3-d-printing-the-future-of-
for-colonial-pipeline-shutdown.html terrorism-11572019769
3. Forbes, ‘Animal-Free Beef Was Just A Start. Synthetic Biology Is Set 10. New York Times, ‘As Understanding of Russian Hacking
To Bring Us Dairy, Egg Products And More’, (22 July 2019). https:// Grows, So Does Alarm’, (03 Jan, 2021). https://www.nytimes.
www.forbes.com/sites/johncumbers/2019/07/22/impossible-ice- com/2021/01/02/us/politics/russian-hacking-government.html
cream-anyone/?sh=19dad5647b02 11. Jayakumar, S ‘Cyber Attacks by Terrorists and other Malevolent
4. Trosset JY and Carbonell P, ‘Synthetic biology for pharmaceutical Actors: Prevention and Preparedness’, Handbook of Terrorism
drug discovery’, Drug Des Devel Ther 9 (2015), 6285–6302. Prevention and Preparedness (2021). https://icct.nl/app/
5. Schmid A, ‘The Revised Academic Consensus Definition of uploads/2021/05/Handbook-ch-29-Jayakumar-Cyber-Attacks-by-
Terrorism’, Perspectives on Terrorism, vol 6, no. 2 (2012). https:// Terrorists-and-other-Malevolent-Actors.pdf
www.universiteitleiden.nl/binaries/content/assets/customsites/ 12. Nature, ‘How machine learning could keep dangerous DNA out
perspectives-on-terrorism/2012/issue-2/the-revised-academic- of terrorists’ hands’, (31 Jan, 2019). https://www.nature.com/
consensus-definition-of-terrorism--alex-p.-schimid.pdf articles/d41586-019-00277-9
6. Bergema R & Kearney O, ‘An Analysis of the Democratization of the 13. Kosal M, ‘Emerging Life Sciences and Possible Threats to
Terrorist Threat in the West’, ICCT Journal (2020). https://icct.nl/ International Security’, Orbis, vol. 64 no. 4 (2020), 599–614.
app/uploads/2020/05/An-Analysis-of-the-Democratisation-of-the- https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7515815/
Terrorist-Threat-in-the-West.pdf 14. Jefferson C, Lentzos F & Marris C, ‘Synthetic biology and
7. Renard T, ‘Fear Not: A Critical Perspective on the Terrorist Threat biosecurity: challenging the “myths”’ Frontiers in Public Health
in Europe’, Egmont Institute (2016). http://aei.pitt.edu/86893/1/ (21 Aug 2014). https://www.frontiersin.org/articles/10.3389/
SPB77.pdf fpubh.2014.00115/

Atlantisch perspectief 35
This content downloaded from
132.174.249.175 on Mon, 23 Oct 2023 12:43:20 +00:00
All use subject to https://about.jstor.org/terms

You might also like