fear-mongering or fact: the construction of 'cyber
TRANSCRIPT
Fear-mongering or fact: The construction of ‘cyber-terrorism’
in U.S., U.K, and Canadian news media
A paper presented at Safety and Security in a Networked World:
Balancing Cyber-Rights and Responsibilities sponsored by the Oxford Internet Institute
8-10 September, 2005 Oxford, England
Susan Keith, Ph.D. Assistant professor
Department of Journalism and Media Studies School of Communication, Information and Library Studies
Rutgers, the State University of New Jersey 4 Huntington Street
New Brunswick, New Jersey 08901, USA [email protected] (732) 932-7500, ext. 8235
Fear-mongering or fact 1
Introduction
The term “cyber-terrorism” continues to be a source of conflict for Internet
researchers, policy-makers, scholars of cyberlaw, and Internet security firms. Coined in the
1980s by Barry Collin, a senior research fellow at the Institute for Security and Intelligence
in California (Conway, 2002), and formed by the union of the words “cyberspace” and
“terrorism,” “cyberterrorism” would seem to refer, simply enough, to terrorism that occurs
online. Things become more complex, however, when one considers that “terrorism” has, as
one author observed nearly 20 years ago, “different meaning for different people” (Perlstein,
1986, p. 187) and that the cyberworld is still so young that meanings of all the words used to
describe it are evolving rapidly (Weimann, 2004).
As a result, some scholars, government officials, members of the military
establishment, and security firms argue that cyberterrorism attacks – alone or in conjunction
with physical attacks – are a serious and/or imminent threat (Hinde, 2001; Sofaer &
Goodman, 2001; Subcommittee on Cybersecurity, Science, and Research and Development,
2004; PITAC, 2005; Vatis, 2001; Verton, 2003). Meanwhile, other scholars counter that fears
of cyberterrorism are overblown (Giacomello, 2004; Ingles le-Noble, 1999), that serious
cyberterrorism is at least some years from being a reality (Denning, 2000), or that
cyberterrorism discussions tend not to provide a true picture of how the Internet is being used
by so-called “terrorist” groups (Kramer, 2003). Yet governments regularly issue reports on
cyberterrorism and newspapers run headlines like this one: “Cyberterrorism: Is your cash
safe from a nightmare on the net?” (Don, 2004).
Part of the reason for the struggle around terms used to describe cybercrimes, some
authors have asserted (Debrix, 2001; Embar-Seddon, 2002; Schell, 2002; Schell & Martin,
Fear-mongering or fact 2
2004), is their misuse by the news media. A few studies have attempted to document use of
cyber terms in the news media (e.g., Vegh, 2003), but little if any research has explored in
depth what meanings the media are building for the word “cyberterrorism” in the minds of
news consumers. This paper reports on research investigating how use of the term “cyber-
terrorism” has constructed meanings for audiences in the United Kingdom, the United States,
and Canada. It is based on a quantitative tracking of the use of “cyberterrorism” and a
qualitative content analysis of explicit and implicit definitions of “cyberterrorism” in news
magazine and newspaper stories published from 2001 through 2004.
The purpose of this study is not to take sides in the battle over whether cyberterrorism
is an immediate problem, a future threat, or an overhyped concept. Instead, this paper aims to
define the discourses around these concepts that are being built for citizens and policymakers
by the news media. This work is important because, for better or worse, “the mass media and
popular culture have altered how most Americans [and people of other nationalities] learn
about the world and how the world is run” (Altheide, 2004, p. 304). By laying out how one
portion of the mass media is defining cyberterrorism, this study provides an initial step
toward establishing a typology of terms that could help create a clearer picture of global
cyber crime. Because of legal and cultural differences among nations, it is already difficult
enough to respond to attacks on cyberspace. Disagreement on what is being targeted only
makes the problem more difficult. In addition, this study should provide information on
journalistic use of contested terms that could be of use to both scholars of media literacy and
journalism educators.
Fear-mongering or fact 3
Background: A definitional muddle
One difficulty with the term “cyberterrorism” is rooted in semantic struggles around
“terrorism.” The older word, believed to have been derived from the Latin terrere, “to
tremble” or “to frighten,” and given the French suffix “ism,” came into English as a
descriptor for the regime of bloodshed in the French revolution (Tuman, 2003, p. 2). Since
then, “terrorism” has been used to describe so many situations in which violence was used
for political ends in violation of social norms that “even the simple act of agreeing on a
definition has been politicized” (Ballard et al., 2002, p. 990).
This politicization was particularly evident in journalistic circles in the wake of the
attacks of September 11, 2001, when the Reuters news agency confirmed its longstanding
policy to “avoid the use of emotive terms” (Reuters, 2004, ¶5), including “terrorist,” except
in direct quotations and the BBC asserted that “terrorist” should be employed cautiously.
(Similar concerns have risen again since the July 7, 2005, London bombings.) Some in the
news media have criticized the policies – which would seem to owe more to the traditionally
U.S. journalistic ideal of objectivity (Schudson, 2003, pp. 84-85) than to the British tradition
of an at least somewhat partisan press – saying that they imply too much consideration for
promulgators of violence (LaRocque, 2001; Shying away, 2005; Worthington, 2005).
Reuters, however, has defended its policy as being necessary to protect journalists working
for an operation that reports on all sides of many conflicts (Campbell, 2001; Grande, 2002)
and even asked newspapers in the Canadian CanWest Global Communications group to
remove reporters’ bylines from Reuters stories into which CanWest editors had inserted the
word “terrorist” (Austen, 2004).
Fear-mongering or fact 4
Although no similar journalistic debate appears to have arisen around the word
“cyberterrorism,” neither has a consistent definition of that word emerged. Instead, Ballard et
al. (2002) write, the term generally has been conceptualized in one of three ways: vaguely, as
terrorism that occurs in cyberspace; legally, as those attacks against computers, networks, or
systems that governments have made unlawful; and specifically, incorporating accounts of
specific actions deemed to constitute cyberterrorism. There are several reasons, the authors
state, for this lack of consistency:
First, the operation definition of cyberterrorism changes over time. A generation in human terms may be 25 years, but in technological time, it may be only 3 years. The challenge … is not the same for general terrorism studies, in which for years, the most common tactic has been bombings … . Second, the choices of what will be included in the definitions, or even in the typology, are usually based on the personal perspectives of researchers. For example, if the author of a typology is an expert on hacking, the work he or she promotes will generally focus on varieties of this activity. (p. 993) Such explanations make the lack of a consistent definition of “cyberterrorism”
understandable, but they do not make it efficient – at least for those who believe that
cyberterrorism is an immediate threat that must be countered. As Debrix (2001) notes, unless
there is at least general agreement on what cyberterrorism is, there can be no effective
counter-cyberterrorism effort. This consideration would seem to be particularly important
because, as many scholars have pointed out, there is a communicative aspect to the politically
motivated violence commonly labeled “terrorism.” People who engage in such acts not only
seek to kill, maim, or disrupt; they also seek to let the world know that they have done so.
Research by media and peace studies scholars has demonstrated the efficacy of such tactics,
showing generally that media coverage of politically motivated violence can affect public
opinion about it perpetrators and can have an “agenda setting” function. (See, for example,
Weimann, 1990, 2000; Wanta & Hu, 1993.)
Fear-mongering or fact 5
Perhaps just as important, news media use of a hazy or overly broad definition of a
societal problem like cyberterrorism can contribute to the problem by feeding public fears of
the unknown. Debrix (2001) maintains that the media:
[T]errorize the public by shoving in their face images and discourses that hammer in the presence of an uncertain danger and the need to take desperate emergency measures. Perversely, the media use against the public the same type of cyberterrorist weapons they claim to be condemning: data swarming, information overload, security conspiracies on the Internet … Faced with such a regime of mediatic terror, there is only one thing the population can and is encouraged to do: be afraid, be very afraid. (p. 164)
Although most working journalists and some media scholars probably would say that Debrix
overstates the case, it is not unreasonable to assert that in news media coverage of a public
menace, imprecision in terms may tend to aggravate the public’s apprehension. Such fear,
Altheide has found, “plays an important role in the social construction of terrorism” (2004, p.
294), as do definitional issues. After researching mass media coverage of the September 11,
2001, attacks, Altheide concluded that “powerful news definitions and meanings of context
can be consequential if they are pervasive, constant, and, above all, not contradicted by
systematic discussion and debate” (p. 304).
Little work, however, has looked at how “cyberterrorism” has been conceptualized in
the media. The closest research has been a dissertation study (Vegh, 2003) of how the cyber
term “hacker” was used in 627 news articles published in The New York Times, The Wall
Street Journal, The Washington Post, USA Today, and the San Jose (California) Mercury
News between March 2001 and March 2002. Because the September 11, 2001, attacks
occurred in the middle of data collection for that study, the author concentrated on
differences found before and after that point, noting that the number of articles that
conceptualized hacking as an online security issue generally increased somewhat after the
Fear-mongering or fact 6
attacks (p. 257) but that the very small number of hacker stories that dealt with terrorism was
little changed (p. 270).
Research questions
Because of the lack of literature on the use of “cyberterrorism” in the news media,
three research questions were posed:
RQ1: How, if at all, has the frequency of use of “cyberterrorism” changed in the
mainstream U.S., UK, and Canadian print media?
RQ2: Do the mainstream U.S., UK, and Canadian print news media explicitly define
“cyberterrorism” for their audiences? If so, how?
RQ3: What implicit definitions of “cyberterrorism” are constructed by the contextual
use of the term by the mainstream U.S., UK, and Canadian print news media?
Method
This paper is based on a combination of quantitative and qualitative analyses of
articles published in mainstream U.S., UK, and Canadian English-language newspapers and
newsmagazines. First, to offer some evidence of how attention to “cyberterrorism” in the
news media has evolved, the frequency of usage of the word was traced, using the Lexis
Nexis Academic database. Then, a qualitative content analysis was conducted of uses of the
word “cyberterrorism” in 146 articles that appeared from 2001 through 2004 in sixty
mainstream, English-language U.S., U.K., and Canadian newspapers and newsmagazines.1
1 Publications from England, Scotland, Wales and Northern Ireland: Belfast News Letter, Belfast Telegraph, Birmingham Post, Bristol Evening Record, Financial Times, The Guardian, The Independent, Irish News, The (Newcastle) Journal, New Statesman, The Observer, Scotland on Sunday, The Scotsman, Sunday Herald (Glasgow), Sunday Times, Western Mail (Cardiff); U.S. publications: Atlanta Journal-Constitution, Boston Globe, Boston Herald, Chicago Sun-Times, Columbus (Ohio) Dispatch, Denver Post, Houston Chronicle, Milwaukee Journal-Sentinel, New York Daily News, The New York Times, Newsweek, Oregonian (Portland, Oregon), Pittsburgh (Pennsylvania) Post-Gazette, Rocky Mountain News (Denver, Colorado), Sacramento (California) Bee, San Antonio (Texas) Express-News, San Diego (California) Union-Tribune, San Francisco Chronicle, St. Louis (Missouri) Post-Dispatch, St. Petersburg (Florida) Times, Minneapolis
Fear-mongering or fact 7
The articles – all those containing “cyberterrorism,” or “cyber-terrorism,” or “cyber
terrorism” in their headlines, titles, or lead paragraphs2 – were located using the “guided
news search” function of the Lexis Nexis Academic electronic database.3 Searches for the
terms were first done in the general news/major papers and general news/journals and
magazines categories. Then, to increase the number of articles from United Kingdom and
Canadian publications obtained, a similar search was conducted among the world
news/European sources and world news/North American-South American sources. Entries
from publications published outside the United States, the United Kingdom, and Canada
were discarded, as were articles from non-news magazines and entries that consisted only of
photo captions, letters to the editor, corrections, or lists of events. Both news and opinion
articles, however, were included in the final sample.
For the quantitative part of the analysis, the numbers of articles from each year were
counted and those that contained explicit definitions of “cyberterrorism” were identified.
Then, in the qualitative analysis, individual uses of the word “cyberterrorism” were coded,
(Minnesota) Star-Tribune, U.S. News & World Report, USA Today, The Wall Street Journal, The Washington Post; Canadian publications: Brockville (Ontario) Recorder and Times, Calgary Herald, Daily Miner and News (Kenora, Ontario), Edmonton Journal, Montreal Gazette, Toronto Globe and Mail, The Guardian (Charlottetown, Prince Edward Island), Hamilton (Ontario) Spectator, Leader-Post (Regina, Saskatchewan), London (Ontario) Free Press, Ottawa Citizen, Ottawa Sun, St. John’s Telegram (Newfoundland), The Standard (St. Catherine’s, Ontario), Stratford (Ontario) Beacon Herald, The Toronto Star, Vancouver Province, Vancouver Sun, Windsor (Ontario) Star. 2 Articles that contained “cyberterrorism” in their lead paragraphs, headlines, or titles were considered more likely to actually focus substantively on cyberterrorism than articles that merely used the term somewhere in their text. 3 There are limitations to using electronic databases, such as Lexis Nexis Academic, for obtaining the articles used in a content analysis. First, additions of publications to the database may have occurred during any sampling period, which might skew results for a researcher interested in the frequency with which some particular type of article appeared in the database. In addition, it is impossible to know whether some publications failed to send some content to the database and/or whether articles produced by freelancers were excluded because of U.S. copyright rulings that say such stories cannot be used in electronic databases without the freelancers’ permission (Biskupic & Locy, 2001). In the absence of other free and easily obtainable sources of content, however, electronic databases have become a commonly used tool in content analyses in media studies (e.g., Shah & Nah, 2004).
Fear-mongering or fact 8
using the “microanalysis” process described by Strauss and Corbin (1998). “Open” and
“axial” coding and the constant comparative method were used to classify definitions and
usages of the term “cyberterrorism” and its orthographical variants. In keeping with the goals
of qualitative research, the aim of this part of the investigation was not to count or
quantitatively code particular usages of “cyberterrorism” but to locate, describe, and analyze
the discourses around cyberterrorism developed by the news media of the three countries.
Findings and discussion
RQ1: Cyberterrorism in the news A simple tally of the number of articles in mainstream, general-interest, U.S., U.K.,
and Canadian publications that used “cyberterrorism” in headlines or titles or the lead
paragraphs traced a curvelinear pattern. (See chart below.) Frequency rose sharply from
1996, when the Lexis Nexis A
headline, title, or lead
paragraphs of an
“major papers” newspap
index, peaking from 20
2002, then declining. The valu
of this finding is limited
because it is impossible to say how much of the pre-2000 increase in stories focusing o
cyberterrorism is the result not of growth of media coverage of the subject but of growth i
the number of publications contributing to Lexis Nexis Academic, which continues to add
new sources. However, it is useful to note that news media interest in cyberterrorism appea
to have been peaked before the attacks of September 11, 2001. That suggests that important
cademic database first recorded use of “cyberterrorism” in the
article in its
er
00 to
e
n
n
rs
Frequency of "cyberterrorism" articles
01020304050
1994 1996 1998 2000 2002 2004 2006
Year
Freq
uenc
y
Series1
Fear-mongering or fact 9
themes in the news media discourse on cyberterrorism were developing before physical
attacks on New York and Washington took place.
RQ2: Explicit definitions of “cyberterrorism”
Frequency of explicit definitions
Of the 146 articles examined, only seven, or about 5 percent, provided an explicit
definiti
d,
,
f
est several things. First, it may be
at mo
These
on of “cyberterrorism.” Definitions were missing even from articles that placed the
term in quotation marks, suggesting it might be a created word (Arthur, 2002), or referred to
its “meaning”: “‘Cyberterrorism has a different meaning now,’ says Ruth Wedgewood of the
School of Advanced International Studies at Johns Hopkins University” (Martin, 2001, p.
9A). Explicit definitions of “cyberterrorism” were more prevalent earlier in the study perio
when fewer news consumers could have been expected to have been exposed to news about
cyberterrorism. Five of the seven definitions found appeared in 2001 articles, all from U.S.
publications, with four of those being published between September 11 and the end of the
year. One definition was found in 2002, in Britain’s Guardian newspaper, and one in 2003
in the London (Ontario) Free Press. One of the seven definitions appeared in an unsigned
opinion editorial; one – the earliest – was written by an intern, a newcomer to the practice o
journalism; and one was included by a freelance writer.
The low number of explicit definitions could sugg
th st journalists did not include formal definitions of “cyberterrorism” because they
believed the word was too common to need defining. Or it could be that most journalists
were unable to concretely define the term and so avoided using formal definitions in their
stories. Finally, it could be that journalists purposively chose not to formally define
“cyberterrorism” because they thought that implicit definitions served readers better.
Fear-mongering or fact 10
possibilities will be explored further as the content of explicit and implict definitions are
analyzed.
Content of explicit definitions
f “cyberterrorism” found ranged from the short and
rather v
ion,
E).
d
es a
tion to
gree on what type of action constituted cyberterrorism. For
ts to
er
The seven explicit definitions o
ague phrase “the most insidious type of terrorism” (Wallace, 2001, p. A1), which
demands that the journalist and reader share a definition of “terrorism,” to a formal legal
definition used by the FBI: “a ‘premeditated, politically motivated attack against informat
computer systems, computer programs and data which results in violence against non-
combatant targets by subnational groups of clandestine agents’” (Canton, 2003, p. D11
Only that FBI definition and a definition offered in The Guardian, “using computers to
intimidate others to further political or social objectives” (Butcher, 2002, p. 1), mentione
political motivations, which are normally considered a key part of distinguishing terrorism
occurring outside cyberspace from other crimes. One definition, provided in the Boston
Globe by security consultant Peter Giannacopoulos, suggested that cyberterrorism requir
“hostile person or group” (Jiang, 2001, p. H2), but none of the other four definitions
mentioned characteristics or attitudes that must be possessed by perpetrators for an ac
be considered cyberterrorism.
Nor did the definitions a
The Guardian, it was enough that the cyber action “intimidate” others in a politically or
socially motivated way (Butcher, 2002, p. 1). For the San Diego Union-Tribune, “attemp
cripple critical electronic structures” were enough (Berdik, 2001, p. 6), and the St. Louis
Post-Dispatch required only that the actions be “designed” to “disrupt or disable” comput
networks (Web of Terror, 2001, p. B6). The definition offered by Giannacopoulos in the
Fear-mongering or fact 11
Boston Globe required the more active “use” of computers (Jiang, 2001, p. H2), and
Newsweek defined the actions that would constitute cyberterrorism as “assaults” (Now
weapons of mass disruption?, 2001, p. 76).
There was also considerable variation
,
in what the target of such actions would have to
be to co
, p. 6)
or directed
ich, with two
f
xt
nstitute cyberterrorism. Two of the definitions from U.S. publications offered
ethnocentric conceptions: “electronic infrastructure in the United States” (Berdik, 2001
and “the nation’s computer networks” (Web of Terror, 2001, p. B6). Giannacopoulos avoided
that ethnocentrism but focused only on the commercial, “disruption of business or theft of
intellectual property” (Jiang, 2001, p. H2), while Newsweek made the object of
cyberterrorism much more general, defining its target as “anything dependent on
by flows of information” (Now, weapons of mass disruption?, 2001, p. 76).
The clear distinctions among and limitations of these definitions – wh
exceptions,4 were created by journalists – suggest that the most likely reason for a paucity o
definitions of “cyberterrorism” is that the journalists who help shape citizens’ opinions on
cyber policy are not merely divided, as scholars are (Ballard et al., 2002), about what the
term constitutes but unsure or, perhaps, misinformed. This is worrisome because, as the ne
section will demonstrate, even when journalists avoid formal definitions of cyberspace terms,
they nonetheless construct meanings for their audiences through their choices of words and
examples.
4 The FBI definition of “cyberterrorism” cited by The Guardian and the definition offered in direction-quotation style by security consultant Peter Giannacopoulos in the Boston Globe.
Fear-mongering or fact 12
RQ3: Making meaning through implicit definitions
Qualitative analysis, using open and axial coding (Strauss & Corbin, 1998) of the
contexts in which “cyberterrorism” was used in the 146 news and opinion articles that
formed the sample for this study, revealed that news accounts of cyberterrorism construct
meaning implicitly in two major ways:
By associating cyberterrorism with or distinguishing it from other real-world
and cyber-world concepts
By locating cyberterrorism along a likelihood-of-occurrence continuum
These methods of meaning construction are explained in the following sections.
The power of association
Links in the articles between the word “cyberterrorism” and other online and offline
concepts created meanings that told two contrasting stories. The first discourse suggested that
cyberterrorism is linked to computer viruses, cybercrime, and “hackers,” a term that
encompasses people ranging from those who enjoy “learning the details of computer systems
and how to stretch their capabilities to a malicious or inquisitive meddler who tries to
discover information by deceptive or illegal means” (Schell & Martin, 2004, p. 1). In some
instances, these associations were open to interpretation. For example, when The Scotsman
reported in 2001 that Britain’s Terrorism Act would target “computer hackers who use
‘cyber-terrorism,’” (Percival, 2001, p. 2) it used a construction that might be read to suggest
that the act was aimed only at hackers who are also cyberterrorists, not also the so-called
“White Hat” hackers, who “maintain that they are motivated by created exploits … including
the quest for knowledge or the need to find intrusion flaws by breaking into a computer
system with authorization” (Schell & Martin, 2004, p. 2).
Fear-mongering or fact 13
Other associations were less ambiguous. In 2001, for example, The Guardian used
appositional sentence structure to equate “cyberterrorism” with hacking: “If you believe
Robin Cook, the main threat we face from computers is ‘hacking’. Cyber-terrorism, he
warned his parliamentary colleagues, can ‘cripple Britain faster than a military strike’”
(Sutherland, 2001, 9). The San Antonio (Texas) Express-News set up a similar association
between cyberterrorism and hacking in 2002 when it used the headline “Cyber terrorism:
another grave issue” over an editorial that began, “Attempts to hack into computer systems
on which the Express-News, UTSA [the University of Texas at San Antonio] and other
organizations and agencies rely are common” (p. 2G). That editorial conceded that such
efforts are “usually the work of so-called ‘script kiddies,’ young hackers with too much time
on their keyboard-friendly hands and too much mischief in their computer-savvy heads” (p.
2G) – hardly a description of cyberterrorists. Most bizarrely, perhaps, the Boston Herald
linked cyberterrorism with attacks resulting from an apparent fetish expressed online:
A New York assistant principal who posed as a Boston University coed obsessed with watching young men get tickled must serve six months in a halfway house for cyberterrorism, a federal judge ruled yesterday. David D’Amato, a balding, 40-year-old who begins law school next month at Fordham, stood and apologized in federal court to his parents and to the Internet users whom he attacked online after they refused to provide him with more videos of tickling. (‘Territickle’ gets 6 months, 2001, p. 17.)
Just the opposite story – that cyberterrorism is distinct from hacking and other kinds
of cybercrime – was also told. Often, these distinctions were subtle, as when the Calgary
(Alberta) Herald described a program to “combat the threat of cyberterrorism and other
cybercrime” (Gray, 2002, p. B5), The Washington Post wrote that an alert system would be
“a clearinghouse of information on hacking, viruses, worms and cyberterrorism” (Krim &
Musgrove, 2004, p. E5), and The Birmingham (England) Post noted that “the threat of cyber-
Fear-mongering or fact 14
terrorism [was] being added rapidly to the increasing impact of email viruses and hacker
intrusions” (E-business, 2003, p. 23). By mentioning each of these cyber problems separately
in a list that did not make any of the words appositives of or subordinate to another, the
newspapers emphasized the distinctions among the meanings of the words, rather than the
associations of the concepts. Other constructions, however, made the distinction even plainer,
as when a Minneapolis Star-Tribune reporter wrote, “what the world has seen instead of
cyberterrorism is a continuation of cybervandalism by hackers” (Alexander, 2003, p. 1D), a
phrase that separated the cybercrime of cyberterrorism from the cybermisdemeanor of
vandalism.
It is interesting to note that although discourses that emphasized distinctions among
cybercrime concepts were present in each of the years studied, associations between the word
“cyberterrorism” and “hackers” were not present in the twenty-two articles analyzed from
2004. This may indicate that journalists’ understandings of “cyberterrorism” are shifting to
see it as distinct from other types of cybercrime or online mischief making.
Likelihood-of-occurrence continuum
Authors of the articles analyzed also created implicit definitions of “cyberterrorism”
by giving readers four distinct types of cues about how likely cyberterrorism was to occur.
These could be arranged along what might be called a likelihood-of-occurrence continuum.
At what might be conceptualized as the far left-hand side of the continuum, some articles
asserted the existence of acts of cyberterrorism. For example, The Guardian reported in 2001
that 32 percent of senior personnel in the Communications Management Association
“admitted being the victim of cyber-terrorism” (Hopkins, p. 1), and The Gazette of Montreal
invited readers to “enter the world of cyberterrorism. And if you think it exists only in
Fear-mongering or fact 15
Hollywood or virtual reality, that by hitting the ‘off’ switch on your computer you can get rid
of it, think again” (Sevunts, 2002, p. C1).
The discourse of cyberterrorism existing in the past or present was far less
representative, however, of the discussion overall than the discourse built around the next
point on the likelihood-of-occurrence continuum: the notion that cyberterrorism was an
imminent or growing threat. Articles throughout this collection echoed the idea, saying that
cyberterrorism was “a growing threat” (Kosseff, 2001, p. C01) or “realistic possibility”
(Harnden, 2002, p. A9) “that could reach any company” (Sherman, 2001, p. 68C),
represented “potential devastation” (Gast, 2001, p. 7P), made the United States “highly
vulnerable” (Toner, 2001, 4A), had been “upgraded from a Hollywood-type futuristic
scenario to a real concern” (Sevunts, 2002, p. C1). It would “bring the Internet down for at
least a day or two in the coming year” (Jamieson, 2002, p. A82), “might prove attractive to
[Iraqi] extremist groups” (Rojas, 2003, p. 27), and could be “aimed at networks that control
energy, water and other critical services (Krim, 2004, p. E02).
This litany of possible threats created an implicit definition of “cyberterrorism” for
readers as something that, though not already among us, was so likely that fear was
warranted. In fact, the “cyber attack-as-imminent threat” discourse may have created a
scarier definition of “cyberterrorism” than was implicit in articles that suggested that
cyberterrorism had already occurred. Language used in connection with defining
cyberterrorism as a growing but not yet real threat – “devastating,” “aimed,” “vulnerable” –
may have left a more frightening impression than would have the suggestion that
cyberterrorism, though already a fact, is survivable.
Fear-mongering or fact 16
Moving further right on the cyberterrorism-occurrence continuum, one encountered a
discourse that defined “cyberterrorism” as something that has not (yet) occurred. Generally,
this discourse asserted that there had been no verifiable cyberterrorist attacks but left open
some possibility that such attacks might occur. For example, Alexander (2003) noted in the
Minneapolis Star-Tribune that “Symantec Corp., a computer security firm, won’t rule out
cyberterrorism, but say they’ve never seen anything remotely like it” (p. 1D).
At the far right of the likelihood-of-occurrence continuum was discourse that
suggested that not only had cyberterrorism not occurred but that concerns about it also had
been overhyped. Somewhat surprisingly, this line of thought was evident even before and
immediately after the physical attacks of September 11, 2001. In the 2001 articles analyzed,
however, assertions that concerns over cyberterrorism were overblown were always
attributed to experts, as in this sentence from the Denver Post: “ ‘All the hype in the media
about cyberterrorism and viruses is distracting network executives away from the real threat,
which is their own employees,’ said Bob Forbes, vice president at Authentor Systems Inc., a
security software firm in Denver” (Beauprez, 2001, p. E-01).
In 2002 through 2004, however, assertions that cyberterrorism fears may have been
overplayed moved into parts of articles that were not direct quotations from sources. For
example, the lead paragraph of a 2002 San Francisco Chronicle article asserted that many
experts were “skeptical about the overall menace of cyber-terrorism” (Wallace, 2002, p.
A11) – even though the author of the article had called cyberterrorism “the most insidious
type of terrorism” (Wallace, 2001, p. A1) less than a year earlier. A 2003 Globe and Mail
column went further, stating as fact – without reference to an expert source – that “there were
only 10 documented cyberattacks on U.S. and British targets on Feb. 17 [2003], the day of
Fear-mongering or fact 17
massive worldwide anti-war protests that many security people warned would also be a nice
day for cyberterrorism” (Kapica, 2003).
A model of cyberterrorism coverage
Development of the four discourses lying along the likelihood-of-occurrence
continuum described above – cyberterrorism is a reality, cyberterrorism is likely threat,
cyberterrorism has never happened (yet), or cyberterrorism concerns have been overblown –
was aided, in part, by what might be conceptualized as “supporting actors”: accounts of
specific threats, fears, protections, expertise, and characteristics associated with one of the
conceptions of cyberterrorism. For example, the creation of an implicit definition of
cyberterrorism as a growing and impending threat was aided by descriptions of fears of
cyberterrorism, defenses against cyberterrorism, and the need for experts to study how to
thwart terrorism. Not all of these supporting accounts were available in each article; in fact,
most articles contained only one, two, or a few characteristics associated with the article’s
particular conception of the likelihood of a cyber attack. However, close readings of all 146
articles in the sample together suggested that a model of cyberterrorism coverage (see Table
1) could be developed by looking at how the supporting themes emerging from the articles’
conceptualizations of cyberterrorism related to the larger issue of the likelihood of a cyber
attack.
Table 1 – Cyberterrorism coverage model
Reality Likely threat Never happened Overhyped Fear is expected and justified Terrorists lack the needed tech skills
Defense and protection are key concepts Cyberterrorism is less effective than bombs
Experts are needed Awareness is important Civil liberties should be preserved
Fear-mongering or fact 18
On the left side of the model, where one would find articles in which cyberterrorism
is implicitly defined as a reality or a likely threat, it is logical to also place articles that
contain fear appeals, such as descriptions of “growing fears about the threat of
cyberterrorism” (Hopkins, 2001, p. 1). To balance the fear appeals inherent in this discourse,
accounts of defense are important. So coverage includes battlefield language, such as “fight
against terrorism” (Miller, 2002, p. 4E) and “a strategy for combating cyberterrorism”
(Nairn, 2003, p. 10) and accounts of efforts to fight the threat, such as grants to universities
for anti-terrorism research (Spice, 2002, A-1; Argetsinger, 2002, A12).
On the near right side of the continuum, where articles implicitly define
cyberterrorism as something that has not occurred – and, thus, is not of imminent risk – or is
overhyped, there appears to be a need to offer justification for this stance. Two reasons were
most often offered in the articles considered here. First, there may be a “lack of technical
skill in potential terrorist nations” (Alexander, 2003, 1D). Second, cyberterrorism may not
appeal to the aims of those people whom we popularly call terrorists. As the Boston Globe
put it: “[C]yberterrorism lacks a certain something – namely, terror. ‘I know what terrorism
is,’ said Bruce Schneier of Counterpane Internet Security Inc. ‘It’s when a school bus blows
up or an airplane flies into a building. When I can’t get my e-mail, that’s not terrorism’”
(Bray, 2003, B11).
Underlying this two-sided model, but overlapping the division between the
reality/likely threat vs. never happened/overhyped sides, are descriptions from the articles of
about how news consumers should react to cyberterrorism. On the left side is represented the
need, in a threatening situation, to evoke expertise, which helped produce lead paragraphs
Fear-mongering or fact 19
like: “A Calgary computer security expert is helping Canadians protect themselves from
cyberterrorism while keeping an eye on electronic privacy” (Gray, 2002, p. B5). Awareness
extends underneath three of the topmost categories because it was invoked as important to
protect computer security whether cyberterrorism was a likely threat (Lessons to be learned,
2001, p. A10; Schwartz, 2002, C1) or only a dim prospect (Mackintosh, 2003, p. 4). As the
small amount of space given to civil liberties in the model indicates, the articles that
considered them (e.g., Butcher, 2002) were not representative of the collection overall.
However, inclusion in some stories of discussion of whether civil liberties might be trampled
in the rush to thwart an over-hyped cyberterrorism threat provides a counterweight to the left
side of the model, where relief from the “threat” of cyberterrorism is sought, in the form of
expert advice.
Because this model was derived from a particular collection of articles, it should not
be expected to be indicative of every group of articles on cyberterrorism, though the model
could very well prove useful in further study of diffusion of contested ideas in the
mainstream news media. It also offers a starting point for looking differently at
cyberterrorism. It suggests that the essential problem with using the word “cyberterrorism” is
bound up in whether cyberterrorism occurs – or occurs “enough” – to be seen as an important
problem.
Conclusions and ideas for future research
This work set out to determine how news media in Canada, the United Kingdom, and
the United States had conceptualized for news consumers and citizens the term
“cyberterrorism,” which is a source of conflict in industry, government, and the academy.
The research showed that definitions of “cyberterrorism,” already being developed in the
Fear-mongering or fact 20
news media before September 11, 2001, were rarely explicitly expressed and, when they
were, varied widely. In some ways, this is not surprising, given what Ballard et al. (2002)
pointed out about definitions of “cyberterrorism” among scholars: that they tended to lag
behind developments in the cyber world and reflect scholars’ particular areas of expertise.
Imagine how those factors might be multiplied for journalists. Any given journalist’s
coverage responsibilities may extend so far beyond cyberterrorism that he or she would be
very hard-pressed to notice the developments in a rapidly changing field that even scholars
might miss. Journalists might also find themselves grasping to use in defining
“cyberterrorism” the terms they know, just as scholars who are experts on hacking, Ballard et
al. (2002) say, tend to create typologies of cyberterrorism that are overly focused on hacking.
So the more important question became: How did the news media build implicit
definitions of “cyberterrorism,” those embedded in the contexts in which the term was used?
The answer is that implicit definitions mirrored the disagreement in the academy and
industry. Implicit definitions began by associating with “cyberterrorism” a variety of online
and physical-world concepts that produced oppositional meanings for the word, as either
related to or distinct from other types of cybercrime and cyber mischief. Implied definitions
also owed much to conceptualizations of how likely cyberterrorism was to occur. They took
that crucial area of disagreement, then crafted four conflicting stories about those threats,
weaving in supporting themes of fear, threats, the need for expert advice, calls for awareness,
and calls for the support of civil liberties.
This work shares the limitations of all content analysis: It can tell us what the mass
media appear to have done, but it can only guess at what the effect those choices might have
on audiences. Although there has been considerable research on the effect of media reports of
Fear-mongering or fact 21
terrorism on audiences, there has been little, if any, research on how audiences perceive
potential terrorism risks or how they respond to confusion of terminology in the news media.
Future research also might profitably consider a larger number of articles, starting with
earlier dates, to allow for tracing of the development of news media definitions of
“cyberterrorism.”
The research suggests that we are still far from universal agreement on the meaning
of “cyberterrorism,” and so are far from knowing how to respond to it or defend against it.
The limitations of the research tend to suggest that much more study needs to be done before
we know how disjointed the definitions and interpretations are, and thus how much progress
needs to be made toward an effective defense structure.
Fear-mongering or fact 22
References
Alexander, S. (2003, February 13). The cyberterror scare. Star Tribune, p. 1D. Altheide, D. (2002). Creating fear: News and the construction of crisis. New Brunswick, NJ:
Transaction. Altheide, D. (2002). Consuming terrorism. Symbolic Interaction 27 (3), 289-308. Argetsinger, A. (2002, May 15). Va. Colleges get funding to help fight cyber-terror; GMU
and JMU awarded $6.5 million U.S. grant. The Washington Post, p. A12. Arthur, C. (2002, December 21). DJ wrote virus that hit 27,000 computers. Financial Times,
no page number. Austen, I. (2004, September 20). Reuters asks a chain to remove its bylines. The New York
Times, p. 9. Ballard, J. D.; Hornik, J. G.; and McKenzie, D. (2002). Technological facilitation of
terrorism. American Behavioral Scientist 45 (6), 989-1016). Beauprez, J. (2001, November 5). Computer threats lurk inside and out; Layoffs raise
hacking fears. Denver Post, p. E-01. Berdik, C. (2001, August 28). Hacktivism: Hackers-activists push their causes using
technology. San Diego Union-Tribune, p. 6. Biskupic, J., & Locy, T. (2001, June 26). High court sides with writers Says publishers must
pay authors for articles put into databases. USA Today, p. 3A. Bray, H. (2003, March 24). Cutting through cyberterror hype. The Boston Globe, p. B11. Butcher, M. (2002, December 5). Online: Cyber hype: Cyberterrorism is giving governments
an opportunity to curb civil liberties, but is it really a lethal weapon? The Guardian, p. 1.
Campbell, K. (2001, September 27). When is ‘terrorist’ a subjective term? Christian Science
Monitor, p. 16. Canton, D. (2003, April 25). Cyber attacks a concern. London (Ontario) Free Press, p. D11E.
Conway, M. (2002, November). Reality bytes: Cyberterrorism and terrorist ‘use’ of the Internet. First Monday 7 (11) Retrieved August 5, 2005, from http://firstmonday.org/issues/issue7_11/conway/index.html
Fear-mongering or fact 23
Debrix, F. (2001). Cyberterror and media-induced fears: The production of emergency culture. Strategies: Journal of Theory, Culture & Politics 14 (1), 149-168.
Denning, D. E. (2000, May 23). Cyberterrorism: Testimony before the Special Oversight Panel on Terrorism Committee on Armed Services U.S. House of Representatives. Available at http://www.cs.georgetown.edu/~denning/infosec/cyberterror.html
Don, A. (2004, June 6). Cash: Cyberterrorism: Is your cash safe from a nightmare on the net? The Observer, p. 7.
Dunnigan, J. F. (2002). The next war zone: Confronting the global threat of cyberterrorism. New York: Kensington Publishing Corp.
E-business: Wake-up call over online security. (2003, February 4). Birmingham Post, p. 23.
Embar-Seddon, A. (2002). Cyberterrorism: Are we under siege? American Behavioral Scientist 45 (6), 1033-1043.
Gast, S. (2001, November 4). Q&A: As computers proliferate, terrorists find more targets. Atlanta Journal-Constitution, p. 7P.
Giacomello, G. (2004). Bangs for the buck: A cost-benefit analysis of cyberterrorism. Studies in Conflict & Terrorism 27, 387-408.
Grande, C. (2002, September 18). Reuters learns to face its public. Financial Times, p. 15.
Harnden, T. (2002, June 28). Al-Qaeda plans cyber attacks on dams: Terrorists studying switching systems for water, power grids. Ottawa Citizen, p. A9.
Hinde, S. (2001). Incalculable potential for damage by cyber-terrorism. Computers & Security 20, 568-572.
Hopkins, N. (2001, April 3). Cyber terror threatens UK’s biggest companies. The Guardian, p. 1.
Ingles le-Noble, J. J. (1999, October 21). Cyberterrorism hype. Jane’s Intelligence Review. Retrieved August 7, 2005, from http://212.111.49.124/cyberterror/resources/janes/jir0525.htm
Jamieson, J. (2002, December 26). Internet a terror target: Invasion of Iraq would galvanize malicious hackers, expert says. The Vancouver Province, p. A82.
Jiang, J. (2001, December 30). Job explainer: Security consultant. The Boston Globe, p. H2.
Kapica, J. (2003, March 6). Cyberwar, what is it good for? Virtually nuthin’. Globe and Mail, no page number available.
Fear-mongering or fact 24
Kramer, R. (2002/2003). Internet use by terrorists and content analysis of terrorist Websites. Master’s thesis, University College, London).
Kosseff, J. (2001, September 26). Experts raise cyberterrorism awareness. The Oregonian, p. C01.
Krim, J. (2004, April 2). U.S. goals solicited on software security; Task force suggests limited regulation. The Washington Post, p. E02.
Krim, J., and Musgrove, M. (2004, January 29). U.S. takes anti-virus role; Web site to track cyber-attacks, advise consumers. The Washington Post, p. E05.
LaRocque, P. (2001, December). Fighting the word war. Quill magazine, p. 46.
Mackintosh, H. (2003, February 20). Working it out: Dot bomb. The Guardian, 4.
Martin, S. T. (2001, September 23). Searching for terrorists? Check U.S., Canada. St. Petersburg Times, p. 9A.
Nairn, G. (2003, March 12). Seeking safety nets in an unsafe world. Financial Times, p. 10.
Nakashima, E. (2001, July 11). Specialist accuses Bush of ignoring ‘talent drain.’ The Washington Post, p. A17.
National Infrastructure Protection Center. (2001). Cyberprotests: The threat to the U.S. information infrastructure. Retrieved August 5, 2005, from http://permanent.access.gpo.gov/websites/unt/nipc/www.nipc.gov/publications/nipcpub/cyberprotests.html
Now, weapons of mass disruption? (2001, October 29). Newsweek, p. 76.
Percival, J. (2001, February 20). Straw defends extended anti-terror legislation. The Scotsman, p. 2.
Perlstein, G. R. (1986, November). The changing face of terrorism: From regicide to homicide. International Journal of Offender Therapy and Comparative Criminology 30 (3) 187-193.
President’s Information Technology Advisory Committee. (2005) Cybersecurity: A crisis of prioritization. Retrieved August 7, 2005, from http://www.nitrd.gov/pitac/reports/20050301_cybersecurity/cybersecurity.pdf
Reuters. (2004, October). Editorial policy. Retrieved August 15, 2005, from http://about.reuters.com/aboutus/editorial.
Rojas, P. (2003, April 24). Online: The paranoia paid off. The Guardian, p. 27.
Fear-mongering or fact 25
Schell, B. H. (2002). The hacking of America: Who’s doing it, why, and how. Westport, CT: Quorum.
Schell, B. H., & Martin, C. (2004). Cybercrime: A reference handbook. Santa Barbara, CA: ABC/CLIO.
Schudson, M. (2003). The sociology of news. New York: W.W. Norton.
Sevunts, L. (2002). Cause for concern: experts. The Gazette, p. C1.
Shah, H., & Nah, S. (2004). Long ago and far away. Journalism 5 (3), 259-278.
Sherman, E. (2001, October 15). Terror’s next target? Newsweek, 68C.
Shying away from the ‘T’ word. (2000, July 17). The Boston Herald, p. 22.
Sofaer, A., & Goodman, S. E. (2001). Cybercrime and security: The transnational dimension. In Sofaer, Abraham, & Goodman, Seymour E., Eds., The transnational dimension of cyber crime and terrorism, pp. 1-34. Stanford, CA: Hoover Institution Press.
Spice, B. (2002, October 8). CMU taking a leading role in war against cyberterrorism. Pittsburgh Post-Gazette, p. A-1.
Strauss, A., & Corbin, J. (1998). Basics of qualitative research: Techniques and procedures for developing grounded theory, 2nd ed. Thousand Oaks, CA: Sage.
Subcommittee on Cybersecurity, Science, and Research and Development of the U.S. House of Representatives Select Committee on Homeland Security. (2004, December). Cybersecurity for the homeland.
Sutherland, J. (2001, April 16). Forget pornography and hackers – gambling is the real danger on the net. The Guardian, p. 9.
‘Territickle’ gets 6 months. (2001, July 17). The Boston Herald, p. 17.
Toner, M. (2001, November 4). Cyberterrorism danger lurking. Atlanta Journal-Constitution, p. 4A.
Tuman, J. S. (2003). Communicating terror: The rhetorical dimensions of terrorism. Thousand Oaks, CA: Sage.
Vatis, M. A. (2001, September 22). Cyberattacks during the war on terrorism: A predictive analysis. Report issued by the Institute for Security Technology Studies at Dartmouth College. Retrieved August 7, 2005, from http://www.ists.dartmouth.edu/analysis/cyber_a1.pdf
Fear-mongering or fact 26
Vegh, S. (2003). Hacking for democracy: A study of the Internet as a political force and its representation in the mainstream media. Ph.D. dissertation, University of Maryland.
Verton, D. (2003). Black ice: The invisible threat of cyber- terrorism. New York: McGraw-Hill Osborne Media.
Wallace, B. (2001, November 12). Next major attack could be over Net. The San Francisco Chronicle, A1.
Wallace, B. (2002, June 30). Security analysts dismiss fears of terrorist hackers; electricity, water systems hard to damage online. San Francisco Chronicle, p. A11.
Wanta, W., & Hu, Y. (1993). The agenda-setting effects of international news coverage: An examination of differing news frames. International Journal of Public Opinion Research 5 (3), 250-262.
Web of terror. (2001, October 12). St. Louis Post-Dispatch, p. B6.
Weimann, G. (2000). Terrorism as theater: Mass media and redefinition of image. In Hanna Herzog and Eliezer Ben-Rafael, Eds., Language and communication in Israel, pp. 497-515. New Brunswick, NJ: Transaction Publishers.
Weimann, G. (2004, December). Cyberterrorism: How real is the threat? Washington: United States Institute of Peace. Retrieved August 5, 2005, from http://www.usip.org/pubs/specialreports/sr119.html
Worthington, P. (2005, July 25). This is war – so pick sides. The Toronto Star, p. 7.