2006 | XXVIII | 345-365
Article title

Cyberterroryzm – nowe zagrożenie dla bezpieczeństwa

Title variants
Cyberterrorism – a New Security Threat
Languages of publication
The face of terrorism is changing. Even the motivations do not remain the same as 10–20 years ago. Now, we are facing the emergence of a new category of an offensive gear unknown before. Intelligent networks, telecommunications infrastructure, security procedures and computer equipment once designed and expected to serve and protect people have become terrorist weapons. States and nations are currently almost powerless against this new and destructive phenomenon. The procedures and methods of countering terrorism, which world's specialists have created and perfected over the past decades, are ineffective against this enemy. That is because this enemy does not attack us with trucks loaded with explosives, neither with dynamite strapped to the bodies of fanatics, nor gas canisters. This enemy attacks us with ones and zeros using our own infrastructure. Nowadays, cyberspace is constantly under assault. Cyber spies, saboteurs, and thrill seekers hack into computer systems, sabotage data and applications, launch computer viruses and worms, steal and trade secrets, conduct fraudulent transactions and what is worse, remotely influence the physical world around us. Unfortunately, the cases where operations of waste dump management system, power grid or telecommunication services were affected, are no longer political fiction. Moreover, these attacks are being facilitated with increasingly powerful and easy-to-use software tools, which are available from many FTP servers in the Internet. The existing threat to water dams, land and air traffic control systems, electric power distribution structure and many other hidden but vulnerabte points of the western civilisation is the nightmare of our times. This paper aims at outlining the main trends of terrorism in our technologically-dependent society. It also presents both the known and potential ways the Internet may serve as a weapon for the next generation of terrorists.
Physical description
  • Alexander Y., Cyber Terrorism and Information Warfare. Threats and Responses, Proceedings report of seminar, The Institute, Arlington 1998.
  • Alexander Y., Terrorism in the twenty-first century. Threats and responses, „DePaul Business Law Journal” 1999/2000, nr 12.
  • Arquilla J., Ronfeldt D., Zanini M., Networks, Netwar and Information-Age Terrorism in Countering the New Terrorism. Dostęp online:
  • Ashle D., Crisis in Yugoslavia; Battle spilling over onto the Internet, „Los Angeles Times” 3 kwietnia 1999.
  • Barkham J., Information warfare and international law on the use of force, „New York University Journal of International Law and Politics” 2001, t. 34, nr 1.
  • Becker E., Pentagon sets up new center for waging cyberwarfare, „New York Times” 8 października 1999.
  • Berinato S., Debunking the Threat to Water Utililties, „CIO Magazine” 2002. Dostęp online:
  • Berinato S., The truth about cyberterrorism, „CIO Magazine” 2002. Dostęp online:
  • Bodansky Y., Bin Laden. The Man Who Declared War on America, Prima Publishing Co., Rocklin 1999.
  • Bógdał-Brzezińska A., Gawrycki M.F., Cyberterroryzm i problemy bezpieczeństwa informacyjnego we współczesnym świecie, Oficyna Wydawnicza Aspra-Jr., Warszawa 2003.
  • Brenner S.W., Goodman M.D., In defense of cyberterrorism: An argument for anticipating cyber-attacks, „University of Illinois Journal of Law, Technology and Policy” 2002, wiosna.
  • Collin B., The Future of CyberTerrorism, Proceedings of 11th Annual International Symposium on Criminal Justice Issues, The University of Illinois at Chicago, Chicago 1996.
  • Denning D.E., Cyberterrorism Testimony before the Special Oversight Panel on Terrorism Committee on Armed Services U.S. House of Representatives by Georgetown University, 23 maja 2000.
  • Denning D.E., Hacktivism: An Emerging Threat to Diplomacy, 2000. Dostęp online:
  • Dobrowolski G., Technologie agentowe w zdecentralizowanych systemach informacyjno-decyzyjnych, AGH. Uczelniane Wydawnictwo Naukowo-Dydaktyczne, Kraków 2002.
  • Ganeles Ch. (2002). Technological advancements and the evolution of terrorism, „ILSA Journal of International and Comparative Law ” 2002, t. 8, nr 2.
  • Gawrycka I., Cyberporachunki, „Życie Warszawy” z 18–19 października 2001.
  • Hoffman B., Oblicza terroryzmu, Bertelsmann Media, Warszawa 1999.
  • Jakubski K.J., Przestępczość komputerowa – zarys problematyki, „Prokuratura i Prawo” 1996, nr 12.
  • Johnson K., Hijackers’ Emails Sifted for Clues Computers messages were sent uncoded, „USA Today” 2001. Dostęp online:
  • Kelly J., Statement for the Record of Ronald L. Dick, Director National Infrastructure Protection Center Federal Bureau of Investigation on the Issue of Intrusions into Government Computer Networks Before the House Energy and Commerce Committee, Oversight and Investigation Subcommittee Washington DC, 5 kwietnia 2001.
  • Kelly J., Terror groups hide behind Web encryption, „USA Today” 5 lutego 2001.
  • Krasavin S., What is Cyber-terrorism. Dostęp online [27 lipca 2000].
  • Laris M., Chinese Web Warriors; Hackers in Taiwan, China, Trade Shots In Internet Skirmish, „The Washington Post” z 11 września 1999.
  • Lawson S.M., Information Warfare. An analysis of the Threat of Cyberterrorism Towards the US Critical Infrastructure, SANS Institute 2002.
  • Milone M.G., Hacktivism. Securing the national infrastructure, „Business Lawyer” 2002, listopad.
  • Noble R.K., The links between intellectual property crime and terrorist financing, „Before the United States House of Representatives Committee on International Relations” 16 lipca 2003.
  • Organised Crime Situation Report 2004, Focus on the threat of cybercrime, Council of Europe Strasburg, 23 grudnia 2003 r.
  • Parker D.B., Sieciowi piraci, „Świat Nauki” 1994, maj.
  • Ścibek E., Prawne i organizacyjne aspekty typowania obiektów szczególnie ważnych dla bezpieczeństwa i obronności państwa [w:] E.W. Pływaczewski (red.), Przestępczość zorganizowana, świadek koronny, terroryzm w ujęciu praktycznym, Kantor Wydawniczy Zakamycze, Kraków 2005.
  • Shahtman N., Israel Blocks Palestinian ISP. Dostęp online:,1283,53873,00.html [16 lipca 2001].
  • Sieber U., Legal Aspects of Computer Related Crime in the Information Society, COMCRIME-Study, 1 stycznia 1998.
  • US Foreign Policy Agenda (2001). Terrorism. Threat Assessment, Countermeasures and Policy, „An Electronic Journal of the U.S. Department of State” 2001, t. VI, nr 3.
  • Weimann G., – How Modern Terrorism Uses the Internet, United States Institute of Peace, Washington 2004. Dostęp online:
Document Type
Publication order reference
YADDA identifier
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.