Cyberterrorism: Its Effects On Psychological Well-Being, Public Confidence and Political Attitudes
Cyberterrorism: Its Effects On Psychological Well-Being, Public Confidence and Political Attitudes
Cyberterrorism: Its Effects On Psychological Well-Being, Public Confidence and Political Attitudes
doi: 10.1093/cybsec/tyw018
Advance Access Publication Date: 15 February 2017
Research paper
Research paper
Abstract
Does exposure to lethal and non-lethal cyberterrorism affect psychological well-being, public
confidence and political attitudes? By what mechanisms do they do so? While cyberterrorism
most often raises concerns about national security, its effects on individuals’ psyche and cogni-
tion are overlooked. To address these questions we carried out three studies between 2013 and
2016 (n ¼ 1124, 909 and 592). Utilizing experimental manipulations (video clips) subjects were
exposed to simulated lethal and non-lethal cyberterrorism. Our findings demonstrate a stress-
based ‘cyber terrorism effect’. Exposure to cyberterrorism is not benign and shares many traits
with conventional terrorism: stress, anxiety, insecurity, a preference for security over liberty, a
reevaluation of confidence in public institutions, a heightened perception of risk and support for
forceful government policies. In the cyber realm, this translates into support for such policies as
Internet surveillance, government regulation of the Internet and a forceful military response to
cyberterrorism (including conventional, kinetic retaliation). These attitudes may impinge upon
the tolerance and confidence necessary for a vibrant civil society. This effect is associated with
non-lethal cyberterrorism that causes economic loss as well as with cyberterrorism that causes
death and injury.
Key words: cyberterrorism; cyberwar; cybersecurity; threat perception; stress; exposure; public confidence
present the details of our findings and discuss their implications operations that block email throughout the country (section 30.12),
for public policy. involve ‘mere economic coercion’ (section 11.2), transmit tweets to
cause panic by ‘falsely indicating that a highly contagious and
deadly disease is spreading through the population’ (section 36.3) or
Conventional and cyber terror: mirror images? comprise cyber psychological operations intended solely to under-
Conventional terrorism employs kinetic means (e.g. suicide bombers mine confidence in a government or economy (section 11.3) as insuf-
or improvised explosive devices) and works in many ways. ficiently severe to constitute terror. We ask whether current events
Accompanied by death, injury and property destruction, terrorism do not belie this equanimity. Claiming, ‘The internet is not indis-
generates fear and anxiety in the target population. Terrorists may, pensable to the survival of the civilian population’ (section 81.5) the
therefore, use terrorism to demoralize a civilian population to pres- framers of the Tallinn Manual seem unaware of the effects cyberter-
sure their government to undertake or refrain from a specific policy. rorism may pose. As cyberattacks grow in frequency and intensity,
Sometimes terrorists are effective. Witness the sudden departure of they push beyond criminal acts to concerted attempts to disrupt air-
data and theft of funds (n ¼ 1124). In neither case was the perpetra- ‘I feel upset’, ‘I feel nervous’) and the other half represent positive
tor identified. feelings and emotions (e.g. ‘I feel relaxed’, ‘I feel comfortable’).
Because we were interested in negative affect, we created a variable
Study 2 (January 2016) constituting only the three negative emotions.
This was also an online survey. Here, subjects were randomly as- In addition to stress, perceptions of threat play a significant
signed to a news report describing a cyberattack on Israel’s water role in our understanding of the psychology of terrorism.
purification network by terrorists (Hamas). The news reports were Perceptions of threat reflect the extent to which thinking about a
identical with the exception of the losses suffered. In one clip, two cyberattack undermines ones sense of personal security. Threat
people died and many were injured after terrorists released deadly perception is an appraisal of the danger that an out-group poses to
amounts of chlorine into the water system. In the second clip, an individual and/or his/her political community [22–26, 56, 57,
Hamas retrieved the financial information of the company’s cus- 58, 59]. To gauge threat perception in all three studies we asked
tomers and successfully transferred substantial funds to its coffers ‘To what extent do cyberattacks undermine your sense of personal
Table 1. Stress/anxiety measures following experimental cyberter- Table 2. Threat perception measures following experimental
ror attacks. Scale: 1 (low) to 4 (high) cyberterror attacks. Scale 1 (low) to 5 (high)
State/trait anxiety measure STAI Experiment Study 1a, n ¼ 1027 Study 2b, n ¼ 907
Perpetrator treatment group Unidentified Hamas
Study 1a, n ¼ 1027 Study 2a, n ¼ 907
Control: no terrorism 2.9 3.1
PerpetratorTreatment group Unidentified Hamas Cyberterrorism, non-lethal: 3.4
Control: no terrorism 2.3 2.7 disclosure of account
Cyberterrorism, non-lethal: 3.5 3.4 information and loss of
asset and data loss (Study 1); funds
disclosure Cyberterrorism, non-lethal: 3.4
of account information, loss asset and data loss
of funds (Study 2) Cyberterrorism, lethal: deaths 3.5 3.6
Table 3. Confidence measures, Study 2 (Hamas). Scale 1 (not confident) to 6 (extremely confident) n ¼ 907
Confidence in government to protect infrastructures (water, electric, 4.1 4.1 4.2 4.2 NS
transportation, stock exchange, classified military data)
Confident in government to protect personal data 3.6 3.6 3.5 3.5 NS
Confidence in public/private institutions (army, scientific community, 4.4 4.6 4.5 4.5 NS
high-tech sector, government, police) to prevent a serious cyberterror
attack
Confidence in those responsible for cybersecurity to know what they are 4.8 5.1 5.0 5.0 0.01
doing F3,904 ¼ 2.68a
financial loss alone, its effects on threat perception were not statis-
tically different than among those in the control group (see notes,
Table 4. Political action following cyberattack on selected facilities,
Table 2). Further data are necessary to substantiate the relation-
n ¼ 907
ship between perceptions of threat and non-lethal cyber-terrorist
attacks. Response (% agreeing) Electric Co. HMO Bank
The data in Tables 1 and 2 clearly suggest that cyberattacks,
Complain to the facility 30 25 22
whether lethal or non-lethal, cause stress, anxiety and insecurity. In
Find a different HMO/bank 7 15
their wake, threat perception rises to a level very close to conven- File a lawsuit 12 14 18
tional terrorism when cyberterrorism turns deadly. These data dem- Complain to the city 4
onstrate how cyberterrorism, like conventional terrorism, impairs Turn to the press 4 3 3
psychological well-being and increase perceptions of threat. The fear Participate in a demonstration 14 4 4
stemming from threat perception may lead to incorrect assessments File a complaint with the ombudsman 10 7
of risk and risk-averse attitudes that, in turn, impinge upon confi- Complain to the police 12 11
dence in government institutions. Other or none 37 24 18
a
% who agree, very much agree or absolutely agree
to cyberattacks. In all three studies, we asked subjects to consider violence) grows, individuals demand greater security from their gov-
government surveillance of the Internet and emails, government ernment. Here, the odds were 1.3–2.2 times higher that individuals
regulation of the businesses and military retaliation in the wake of with high levels of threat perception will support surveillance, gov-
cyberattacks. These results appear in Table 5. ernment regulation and military retaliation compared to those with
Overall, the high percentages of support reflect widespread back- lower perceptions of threat.
ing for these policies. Well over 50% support government monitor- Our data also suggest that the identity of the perpetrator matters.
ing of emails for suspicious expressions and roughly 50% are Note how support for government surveillance and, in particular,
willing to give up privacy for security and allow the government to retaliatory ‘military’ strikes is appreciably greater when the manipu-
monitor social media (Facebook, Twitter). At the same time, 23% lation focused on a known terrorist group, Hamas, (Study 2) rather
will permit the government to read emails, a figure that doubles to than on a hacktivist group, Anonymous (Study 3). Our question was
46% when the perpetrator is Hamas. These numbers are higher framed generally and asked whether subjects would support military
than in the USA where, in a recent PEW Survey [32] in the USA, retaliation following a cyberattack. We did not ask whether they
43% of the subjects said it is acceptable for the government to moni- would support an attack against Hamas or Anonymous or their
tor the communications of US citizens (compare 48–67% in our sponsors. Nevertheless, and as Table 5 demonstrates, subjects par-
survey). ticipating in the Hamas experiment favoured government surveil-
Looking beyond surveillance to retaliatory policy we see how mili- lance far more than those in Study 3 (Anonymous) and supported
tary strikes, particularly cybernetic but also kinetic, command signifi- conventional military attacks of either sort (limited or large scale) by
cant support from the public. In response to cyberterrorism, the vast a margin of nearly 2:1. One reason may be that the manipulation
majority (69–89%) support retaliatory cyberattacks against military triggered fears of Hamas and burgeoning Islamic radicalism.
and civilian targets while a significant number (31–65%) support con- Another reason may be the recognition that Hamas, like ISIS, has in-
ventional, ‘kinetic’ counter attacks. These attitudes remain unstudied frastructures and territory vulnerable to conventional attack.
in the USA, but there is little doubt that they will play a significant Because our study found a relationship between threat perceptions
role as public officials and scholars weigh the merit of responding to and support for surveillance and military retaliation it seems that it
cyberwar and cyberterrorism with kinetic force [33, 34]. is not Hamas’ material vulnerability but the fear related to threat
To explain why individuals hold different attitudes about sur- perception that better explains why those exposed to Hamas
veillance and military retaliation, we looked at a number of factors. cyberterrorism are more likely to support surveillance and military
The experimental manipulations within each study had no direct ef- retaliation than those facing Anonymous. Nevertheless, this may
fect on political attitudes as they did on anxiety and did not affect change. In a phenomenon, George Lucas [35] describes as ‘state
the extent to which individuals supported different types of retali- sponsored hacktivism’, nations recruit hacktivist groups to mount
ation. That is, support for surveillance, regulation or military action cyberattacks on their behalf. As they do, fears of such groups may
was not affected by exposure to a simulated cyberattack (With the grow accordingly as might the willingness to retaliate against their
exception of Study 1, (unidentified perpetrator), where the willing- sponsors.
ness to give up privacy increased as the manipulation grew more se-
vere.). Similarly, self-reported exposure to cyberattacks did not
affect attitudes towards these policies. Instead, variables that explain Cyberterrorism and risk perception
greater support for government interference include political and re-
Researchers of risk perception have long noted how individuals’ per-
ligious conservatism, threat perception and the identity of the per-
ceptions of the risk of common hazards [27] or disease [36] are often
petrator. Support from right-wing religious conservatives is
markedly different from the assessments of experts. The result is to
consistent with the right’s traditional demand for security and their
make it more difficult to manage risk effectively. How, then, does
support for the current right-wing government. Among our subjects,
the public understand the risk of cyberterrorism? If cyberterrorism,
the odds that right-wing conservatives would support militant poli-
unlike conventional terrorism, disease or natural disasters, has yet to
cies were up to two times higher than those on the left. Beyond the
harm anyone, there is good reason to suspect that the public does
role of political orientation, however, lie the effects of threat percep-
not understand the risk it poses. Experts are themselves divided
tion. As threat perception (in contrast to direct exposure to cyber
[37]. Some remain sceptical about the capabilities of terrorist groups
Journal of Cybersecurity, 2017, Vol. 3, No. 1 55
Table 6. Risk Assessment, Study 2(Hamas). Scale 1 (very low) to 6 (very high).
What are the chances of a cyberattack causing: Control Cyber terror Cyber terror Conventional Sig. ANOVA Total
non-lethal lethal terrorism averagea
a
A repeated measures ANOVA with a Greenhouse-Geisser correction was statistically significant (F2.908, 2640.671 ¼ 904.457, P < 0.001). All the mean
government without unease. Supporters of intrusive government Threat perception, not an actual attack is sufficient to unsettle indi-
regulation and surveillance must be confident that the authorities viduals to the extent many terrorists desire. As a result, authorities
will do their jobs effectively and without abusing the greater author- will need to recognize that they cannot reduce fears of cyberterror-
ity they now enjoy. ism and its pervasive effects solely by eliminating cyberattacks that
This does not mean governments can remain quiescent. This is will, quite possibly, only grow more severe. Rather, policymakers
true for governments in Israel, whose population was the subject of must think about ways to enhance resilience in much the way they
these studies, and just as important for governments in the USA, have in the context of kinetic terrorism and other disasters.
Europe and elsewhere. Just as 20th-century studies of the psych- Lessons gleaned from successful (and unsuccessful) efforts to im-
ology of terrorism in Israel informed post 9/11 research, the effects prove disaster preparedness [49–53] suggest that the government,
of cyberterrorism in Israel are equally relevant. Cyberterrorism is a the private sector and the academic community should effectively
transnational phenomenon and we see that agents like Anonymous communicate the risks of cyberterrorism and take steps that will
are as equally prepared to disrupt American networks (as they did in help instill effective cybersecurity practices. Furthermore, if individ-
5. De Mesquita EB. Conciliation, counterterrorism, and patterns of terrorist 30. Getmansky A, Zeitzoff T. Terrorism and Voting: the effect of rocket
violence. International Organization 2005; 59:145–76. threat on voting in Israeli elections. Am Polit Sci Rev 2014;108:588–604.
6. Gross ML. The Ethics of Insurgency: A Critical Guide to just Guerrilla 31. Lerner JS, Gonzalez RM, Small DA et al. Effects of fear and anger on per-
Warfare. Cambridge: Cambridge University Press, 2015. ceived risks of terrorism a national field experiment. Psychol Sci
7. Goodrich JN. September 11, 2001 attack on America: a record of the im- 2003;14:144–50.
mediate impacts and reactions in the USA travel and tourism industry. 32. PEW American’s Privacy Strategies Post Snowden, 2015 http://www.
Tourism Manage 2002;23:573–80. pewinternet.org/files/2015/03/PI_AmericansPrivacyStrategies_0316151.
8. Fierke KM. Terrorism and trust in Northern Ireland. Critic Stud Terror pdf
2009;2:497–511. 33. Libicki, C. From the Tallinn Manual to Las Vegas rules. In: Cyberspace in
9. Gross K, Brewer PR, Aday S. Confidence in government and emotional re- Peace and War. Annapolis MD: Naval Institute Press, 2016, chapter 32,
sponses to terrorism after September 11, 2001. Am Polit Res forthcoming.
2009;37:107–28. 34. Farell H, Glaser CL. An effects-based approach to escalation and deter-
10. Smith TW, Rasinski KA, Toce M. America Rebounds: A National Study rence in cyberspace. In: Stanford Cyber Policy Program Workshop on
55. Canetti D, Hall BJ, Rapaport C et al. Exposure to terrorism and political 58. Huddy L, Feldman S. Americans respond politically to 9/11: understand-
extremism: a stress-based process. Eur Psychol 2013;18:263–72. ing the impact of the terrorist attacks and their aftermath. Am Psychol
56. Canetti-Nisim D, Halperin E, Sharvit K et al. A new stress-based model 2011;66:455–67.
of political extremism personal exposure to terrorism, psychological 59. Rubin GJ, Brewin CR, Greenberg N et al. Enduring consequences of ter-
distress, and exclusionist political attitudes. J Confl Resolut rorism: 7-month follow-up survey of reactions to the bombings in London
2009;53:363–89. on 7 July 2005. Brit J Psychiat 2007;190:350–56.
57. Hirsch-Hoefler S, Canetti D, Rapaport C et al. Conflict will harden your 60. Slovic P. The perception of risk. In: Sternberg RJ, Fiske ST, Foss DJ (eds),
heart: exposure to violence, psychological distress and peace barriers in Scientists Making a Difference, Cambridge: Cambridge University Press,
Israel and Palestine. Brit J Polit Sci 2014;44:1–15. 2016, 179–82.