
148 Cyberpower
$
$
*9:"(.(-2"%
$
*9:"(.'+,-./%
$
$
$
*9:"(;#(%
$
$
$
$
"(,8,&-0$
",O,0,-&$
P6&?41-1'$-.16(4$
H'(.'&-(,'4$
H,0,1-(*$
=1-1'$-.16(4$
"*K'(?$
-L-.Q4$
67$(,*8$-9-:$;$(,*8$-&"#$%,$&<%*+"-/00%'/&4$,--
#6C-*$.*K'(.(,8,&-0,1*$,4$-K6O'$-00$-&$'.6&68,.$.(,8,&-0,1*$$
K>1$.*K'(-L-.Q4$-('$-046$16$K'$.6&4,C'('C$-4$.*K'(I'-56&4$
;6($6R'&4,O'$-&C$C';'&4,O'$.*K'(4'.>(,1*$41(-1'),'4$
Figure 6.3 New paradigms for crime, conict, terrorism and war.
Not every cybercriminal action corresponds to terrorism or war between
states. However, the Internet introduces new risks for states because it can
become a weapon. The Internet can support a political ...