Cover Image




Abstract: Cyber attacks are now becoming more and more complex, more frequent and with increasing destructive effects. Regardless of the type or value of an organization, it affects information of public and private infrastructures. Moreover, private information may be struck by those who hold, even temporarily, various public or dignified functions in a state. In other words, it can hit the information profile of a target by affecting data about identity, about finance, can changing information from personal conversations and other private life activities.

In this context, the terrorism aims to execute actions, driven only once or in series, motivating as resistance to political, economic or social changes and producing global information effects. It is well known the development of terrorism is favored by the development of information technology. Through these, terrorist organizations seek to enhance the perception of terror, by capturing the attention of the global media and by transmitting apocalyptic messages. Last but not least, the social factor and the arms proliferation determine the adapt of objective aspect of terrorism, often the modeling of terrorist ideology based on issues of population discontent with the ease of acquisition of weapons, munitions and destructive materials through various forms of trade.

In this work we propose to determine the content of the concept of cyber terrorism, starting from the analysis of the main factors of public insecurity and social disorder that facilitate the development of modern forms of terrorism. In this order we propose to underline the base aspects to understand the ways of its application.

Full Text:



*** , Anders Breivik, autorul atacurilor din Norvegia, ar putea primi „impresionanta” pedeapsă de 30 de ani de închisoare!, at adresa

***, Cyber-attack: US and UK blame North Korea for WannaCry, at

***, Decret nr. 212 din 31 octombrie 1974 pentru ratificarea Pactului internațional cu privire la drepturile economice, sociale și culturale și Pactului internațional cu privire la drepturile civile și politice, in B.Of. nr. 146/20 noi. 1974, at

***, Efectul Breivik: Circa o sută de norvegieni vor să devină „terorişti solitari”, at

***, Facebook shares drop execs quit Christchurch live stream shooting stirs outrage, at

***, G7 Ministers call for sharing of battlefield data on terrorists via INTERPOL, at

***, Hacked: The Bangladesh Bank Heist, at

***, Noul cod penal, at

***, Threat Lens 2018 Annual Forecast, at

Bălan, George, Noua concepţie internaţională de acţiune doctrinară şi practică în combaterea terorismului, at

Bouchaud, Melodie, Belgium Condemned Over Unlawful Extradition of Terrorist to the US, at

Bumiller, Elisabeth , Thom Shanker, Panetta Warns of Dire Threat of Cyberattack on U.S., at

Fedotov, Yury, Taking action where we can to stop cybercrime, at

Flynn, Matthew J., Is There a Cyber War?, Excelsior College, National Cybersecurity Institute Journal, Vol . 1 Issue 2, 2014, p. 5­ 7.

Jacobson, Michael, Terrorist Financing and the Internet, in Conflict & Terrorism Studies, at

Jurj-Tudoran, Remus, Instigarea publică la săvârșirea unei infracțiuni de terorism și libertatea de exprimare în practica Curții Europene a Drepturilor Omului, at

Quintero, Timothy L., The Connected Black Market: How the Dark Web Has Empowered LatAm Organized Crime, at

Saiidi, Uptin, Inside Interpol’s Singapore cybercrime-fighting complex, at

Schmitt, Michael N. (general editor), Liis Vihul (managing editor), Tallinn Manual 2.0, On the International Law Applicable to Cyber Operations, Cambridge, University Press, 2017.

Soriano, Manuel R. Torres, Guerras por delegación en el ciberespacio -Proxy wars in cyberspace, at

Stevenson, Dru, Effect of the national security paradigm on criminal law, at

Tanasă, Remus, Benedict Anderson şi destinul „Comunităţilor imaginate”, at

Tung, Liam, Australia helps EU in latest crack down on money mules, at

Weimann, Gabriel, How modern terrorism uses the Internet, United States Institute of Peace, at


  • There are currently no refbacks.