Journal of Criminology and Forensic Studies ISSN: 2640-6578
Research Article
Cyber-Terrorism A Wicked Problem
Published: 2025-07-25

Abstract

This research was undertaken to elucidate the legal framework governing cyber terrorism from the perspective of organized transnational crime, alongside an analysis of the varied modus operandi employed by cyber terrorists. The research adopts a normative legal approach, employing qualitative methodologies to gather data through an exhaustive examination of pertinent laws and regulations concerning cyber terrorism. As a normative legal study, secondary data sources serve as the foundation for the research. The research findings unveiled several international conventions capable of serving as legal instruments to address cyber terrorism. Additionally, the study identified diverse methods employed by terrorists to perpetrate cyber terrorism, including hacking, propaganda dissemination, fraudulent activities, Distributed Denial of Service (DDoS) attacks, and the distribution of viruses, worms, and malware. The research outcomes underscore that although a dedicated legal instrument specifically governing cyber terrorism is absent, several existing international conventions hold relevance and potential utility as resources for cyber terrorism law. It is noteworthy that a spectrum of modus operandi is utilized by cyber terrorists in their activities. Combating cyber terrorism and cyber-crime requires understanding how cyber terrorists act, what motivates them, and how to prevent their attacks. This guide looks at the evolution of cyber terrorism, highlights examples of cyber terrorism and cyberattacks, and offers tips for thwarting cyberattacks

Keywords

Cyber Security; Cyber Crime; Cyber Terrorism; Terrorist; Hacking; Offense; Crime; Unethical; Guidelines