Cyberterrorism: the latest crime against international public order

Author:Sandra Sophie-Elise Olanescu, Alexandru Vladimir Olanescu
Position:PhD Candidate, Faculty of Law, 'Nicolae Titulescu' University, Bucharest/PhD Candidate, Faculty of Law, 'Nicolae Titulescu' University, Bucharest
Sandra Sophie-Elise OLNESCU
Alexandru Vladimir OLNESCU
Cyberterror ism has become the latest globa l threat tha t highlights security leaks in the digital
world and its outcomes.
Nowadays economic and social context as well as the advances in the field of information
technology facilitated individuals, private entities and governments to become increasingly
interconnected through computer str uctures.
Cyber-attacks have seen an alarming development, a nd they have been successfully used in
para lyzing a ctivities, such as rail, naval and a ir traffic, being even used by some sta te entities in
military and economic espionage.
Moreover, cyber-a ttacks have been able to block activities of state in stitutions, corpora tions,
financial a nd banking institutions, cross-border trading companies, as well as individuals, viewed as
single end users of products or ser vices.
Thus, it would be an understatement to say that cyber terrorism has become a worldwide menace;
it is a live globa l phenomenon that spreads fear whilst being impressively effective in terms of
seriousness and widesprea d damages.
Given the significance of this global negative phenomenon with potentia l devastating effects,
depending on the severity with which it manifests, cyberterror ism has been chosen as the subject matter
of this paper.
The a im of the pap er is to go into the depth of this globa l phenomenon, starting from the
economic, political, social and technological factors that favored the emergence and hasty development
of cyber-terrorism.
Keywords: cyberterror ism, cybercrime, interna tional public order, Internet, victim.
1. Introduction
In the current social and econo mic
background and ta king into account th e
progress in the field of information
technology, individuals and p rivate and
governmental entities, in the course of their
current activities, are increasingly
interconnected by means of IT structures.
There were many cases when
cyberattacks have been able to block the
PhD Candidate, FacultвăoПăLaа,ă“NТМolaОăTТtulОsМu”ăUnТvОrsТtв, Bucharest (e-mail:
 PhD Candidate,ăFaМultвăoПăLaа,ă“NТМolaОăTТtulОsМu”ăUnТvОrsТtв, Bucharest (e-mail:
activities o f state institutions, corporations,
financial and banking institutions, cross-
border trading companies, by taking on
different proportions on individuals,
considered as ut singuli in the capacity of
final users of certain products or service.
Furthermore, in 2017, cyberattacks
increased alarmingly, being successfully
used in activities carried out in order to block
transportation means, respectively rail,
naval a nd air traffic, being used by certain

To continue reading

Request your trial