University of Oklahoma Graduate College
Total Page:16
File Type:pdf, Size:1020Kb
UNIVERSITY OF OKLAHOMA GRADUATE COLLEGE CYBERTERRORISM: A POSTMODERN VIEW OF NETWORKS OF TERROR AND HOW COMPUTER SECURITY EXPERTS AND LAW ENFORCEMENT OFFICIALS FIGHT THEM A Dissertation SUBMITTED TO THE GRADUATE FACULTY in partial fulfillment of the requirements for the degree of Doctor of Philosophy By JONATHAN A. MATUSITZ Norman, Oklahoma 2006 UMI Number: 3207541 Copyright 2006 by Matusitz, Jonathan A. All rights reserved. UMI Microform 3207541 Copyright 2006 by ProQuest Information and Learning Company. All rights reserved. This microform edition is protected against unauthorized copying under Title 17, United States Code. ProQuest Information and Learning Company 300 North Zeeb Road P.O. Box 1346 Ann Arbor, MI 48106-1346 CYBERTERRORISM: A POSTMODERN VIEW OF NETWORKS OF TERROR AND HOW COMPUTER SECURITY EXPERTS AND LAW ENFORCEMENT OFFICIALS FIGHT THEM A Dissertation APPROVED FOR THE DEPARTMENT OF COMMUNICATION BY ________________________ Dr. Eric M. Kramer ________________________ Dr. H. Dan O’Hair ________________________ Dr. Todd L. Sandel ________________________ Dr. Patrick C. Meirick ________________________ Dr. Edward J. Perkins © Copyright by JONATHAN A. MATUSITZ 2006 All Rights Reserved. ACKNOWLEDGEMENTS First and foremost, I dedicate this product of months of academic work to my doctoral advisor, Dr. Eric Kramer. Without his wisdom, direction, and valuable pieces of advice, this dissertation would not have been what it is today. Dr. Kramer has greatly exceeded the role of advisor in my four years of doctoral experience. This is what an ambitious graduate student needs. Equally supportive is my mother, Anne Matusitz. Her emotional assistance has contributed to the success of my life. Her fortitude, serenity, and attentiveness have made me a much stronger individual. I would like to thank Dr. Jin Brown and Dr. Pamela McWherter, both of whom teach at the University of Alaska Fairbanks. Dr. Brown was my advisor and Dr. McWherter was one of my major professors. They truly made me the qualitative scholar that I have become today. I am very thankful to Dr. Dan O’Hair for his support, thoughtful recommendations, and humor. I also express gratitude to Dr. Sandel for giving me suggestions on how to improve the quality of the data analysis in this doctoral dissertation. In addition, Dr. Meirick and Dr. Perkins, I thank you for your patience and for reading this long dissertation. Finally, I am grateful to those fellow graduate students in the Department of Communication at the University of Oklahoma who have strongly supported me. I want to thank you, too, Gerald-Mark Breen, for your faith in me and your encouragement to “not let completed papers sleep on my computer, but to send them off to peer-reviewed journals.” And it works. Now, I keep the pipeline running. Thank you all. iv TABLE OF CONTENTS ACKNOWLEDGEMENTS……………………………………………………………... iv ABSTRACT…………………………………………………………………………........ x I. INTRODUCTION……………………………………………………………….. 1 Purpose of the Study………………………………………………………………5 Research Questions………………………………………………………………..6 Methodological Approach………………………………………………………...8 Social Network Theory and Game Theory………………………………………..9 Rationale for Conducting this Study……………………………………………..10 This Study Breaks New ground………………………………………….11 New Theoretical Approaches…………………………………………….11 Importance for the Subfield of Organizational Communication………...13 Importance for the Subfield of New Communication Technology……...14 Importance for the Discipline of Communication at Large……………...15 II. LITERATURE REVIEW………………………………………………………..17 Cyberterrorism…………………………………………………………………...18 Cyberterrorism: Origin of the Word……………………………………..18 Difficulty of Defining Cyberterrorism…………………………………...19 Cybercrime Different from Cyberterrorism……………………………...20 Hacktivism Different from Cyberterrorism……………………………...21 Computer-Assisted Terrorism Different from Cyberterrorism…………..22 What Is Cyberterrorism?............................................................................22 Are Hackers Cyberterrorists?.....................................................................24 Cyberterrorism: A Communicative and Semiotic Perspective…………..25 Cyberterrorism: A Legal Perspective…………………………………….28 Cyberterrorists Come from All over the World………………………….30 What Tools Do Cyberterrorists Like to Use?............................................32 What Are the Tools against Cyberterrorism?............................................35 Other Cases of Cyberterrorism…………………………………………..36 Social Networks of Cyberterrorists………………………………………37 Social Network Theory…………………………………………………………..38 Social Network Theory: A Definition……………………………………39 What Are Social Networks?.......................................................................40 Nodes: Essential to Social Networks…………………………………….43 Origins of Social Network Theory……………………………………………….45 Social Network Theory in the Social Sciences…………………………..45 Social Network Theory Rooted in Systems Theory……………………..47 Social Network Theory and the Internet…………………………………………50 Social Network Theory Applied to the Internet………………………….50 Social Network Theory Applied to the Threats to Internet v and Computer Security…………………………………………..51 Social Network Theory Applied to Cyberterrorist Networks……………54 A Comparative Analysis of Terrorist Networks in Antiquity and Cyberterrorist Networks Today………………………….……………...57 Terrorist Networks in Antiquity………………………………………………….58 What Was a Terrorist in Antiquity?...........................................................59 What Did Terrorist Networks in Antiquity Look Like?............................61 The Boukoloi…………………………………………………………….64 The Comparative Analysis……………………………………………………….65 Similar Terrorist Motivations……………………………………………65 Similar Illegal Money-Making…………………………………………..72 Similar End Result: Fear…………………………………………………75 Similar Patterns of Communication……………………………………...79 Similar Connections and Kinship Webs…………………………………82 Similar Obstacles………………………………………………………...89 A Comparative Analysis of the Jewish Revolt and the Cyberterrorism Incident over Kosovo, Based on Social Network Theory………...……..93 The Jewish Revolt of 66-73 CE…………………………………………94 Applying Social Network Theory to the Jewish Revolt…………………96 The Kosovo War as an Incident of Cyberterrorism………………..…...101 Applying Social Network Theory to this Cyberterrorism Incident….....103 Discussion………………………………………………………………………106 Postmodernism and Networks of Cyberterrorists………………………………112 Definition of Postmodernism…………………………………………...112 Postmodernism and Cyberspace: Hyperreal vs. Real…………………..114 Postmodernism and Cyberspace: Fragmentation, Fluidity, and Decentralization of Self………………………………………...118 Postmodernism and Cyberspace: Cyberterrorism………………………121 Postmodernism and Cyberspace: An Organizational Challenge……….124 Postmodernism and Cyberspace: Where No Leadership Is Needed……127 A Postmodern Theory of Terrorism in Cyberspace: Game Theory…………….129 Rationale for Using Game Theory……………………………………...130 Origins of Game Theory………………………………………………..131 Description of Game Theory…………………………………………...132 Nash Equilibrium……………………………………………………….134 Zero-Sum Game………………………………………………………...135 Positive-Sum Game…………………………………………………….136 Negative-Sum Game……………………………………………………136 Cooperative vs. Non-Cooperative Game……………………………….136 The Role of Communication in Game Theory…………………………137 Applications of Game Theory in the Study of Terrorism………………137 Game Theory as Applied to Cyberterrorism: An Overview……………139 Game Theory as Applied to Cyberterrorism: A Postmodern View…….140 Intersection of Game Theory and Social Network Theory in the Study of Cyberterrorism………………………………………..144 It Takes Networks to Fight Networks…………………………………………..147 vi Lack of Cyber Forensics Expertise in Law Enforcement………………148 Cyber Forensics: An Area for Fighting Networks of Cyberterrorists…………………………………………………..149 Who Is Part of the Network Fighting Networks?....................................150 Social Networks among Law Enforcement Agencies…………….........152 Social Networks between Law Enforcement Agencies and Cyber Forensics Labs………………………………………153 University Cyber Forensics Labs……………………………………….154 Informal Social Networks………………………………………………156 Ethical Dilemmas for Cybersecurity Experts…………………………………..157 III. METHODS……………………………………………………………………..161 Qualitative Interviewing………………………………………………………..161 Methodology………………………………………………………...….162 Analysis of the Accounts……………………………………………….164 Member Checking………………………………………………………165 Research Questions……………………………………………………………..166 Theoretical Approaches to the Interpretation of the Data………………………167 The Social Network Theory Approach…………………………………167 The Game Theory Approach…………………………………………...168 Intersection of Social Network Theory and Game Theory……………..170 Interview Procedure…………………………………………………………….170 Interview Process……………………………………………………….170 Interview Questions…………………………………………………….172 Probing………………………………………………………………….176 Participants……………………………………………………………………...177 Who Were the Participants Interviewed?................................................177 Why Were these Participants Selected in this Study?.............................178 Where Were the Participants Interviewed?..............................................178 How Were these Participants Recruited?.................................................179 How Were these Participants Protected?.................................................180 Why Are Qualitative Interviewing Methods Best Suited to Answering My Research Questions?..............................................................181