<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.1d1 20130915//EN" "JATS-journalpublishing1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" article-type="research-article" xml:lang="en"><front><journal-meta><journal-id journal-id-type="publisher-id">SDQ</journal-id><journal-title-group><journal-title>Security &amp; Defence Quarterly</journal-title><abbrev-journal-title>SDQ</abbrev-journal-title></journal-title-group><issn pub-type="epub">2544-994X</issn><issn pub-type="ppub">2300-8741</issn><publisher><publisher-name>Akademia Sztuki Wojennej</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="publisher-id">SDQ-39-00217</article-id><article-id pub-id-type="doi">10.35467/sdq/152422</article-id><article-categories><subj-group subj-group-type="heading"><subject>RESEARCH PAPER</subject></subj-group></article-categories><title-group><article-title>Intelligent terrorism as a security threat to critical infrastructure</article-title></title-group><contrib-group content-type="authors"><contrib contrib-type="author"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0003-0818-3879</contrib-id><name><surname>Heino</surname><given-names>Ossi</given-names></name><email>ossi.heino@tuni.fi</email></contrib><aff id="aff1">Faculty of Social Sciences, Tampere University, Arvo Ylpön katu 34, FI-33520, Tampere, Finland</aff></contrib-group><pub-date pub-type="epub"><day>27</day><month>08</month><year>2022</year></pub-date><volume>39</volume><issue>3</issue><fpage>1</fpage><lpage>12</lpage><history><date date-type="received"><day>29</day><month>04</month><year>2022</year></date><date date-type="rev-recd"><day>14</day><month>06</month><year>2022</year></date><date date-type="accepted"><day>26</day><month>07</month><year>2022</year></date></history><permissions><copyright-statement>© 2022 O. Heino published by War Studies University, Poland.</copyright-statement><copyright-year>2022</copyright-year><license license-type="open-access" xlink:href="http://creativecommons.org/licenses/by/4.0"><license-p>This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (<ext-link ext-link-type="uri" xlink:href="http://creativecommons.org/licenses/by/4.0/">http://creativecommons.org/licenses/by/4.0/</ext-link>).</license-p></license></permissions><abstract><p>This paper considers terrorism as potentially ‘intelligent’, as a threat capable of abusing the critical infrastructures of societies and the related methods for knowledge production. Respectively, it sees critical infrastructures as attractive mediums for terrorist influence. The paper describes the contrast between the logic of providing security and certainty for critical infrastructures and the threat of terrorism, which is evolving in terms of its systemic capacities and intelligence. The way security is provided within critical infrastructures and the way intelligent terrorism could operate seem to separate from each other, thereby creating vulnerability. The paper seeks to enhance the conceptual understanding of this question by describing and closing the gap created by the intellectual separation. By doing so, the article will shed light on the conceptual dimension of the (in)security that has gone unnoticed in the interface between critical infrastructures and terrorism. It outlines the aforementioned dilemma and provides conceptual understanding that makes it easier to grasp and communicate further. The paper shows that the intellectual separation has weakened the possibilities for theoretically understanding and practically recognising terrorism as a phenomenon that is becoming systemically more conscious, more intelligent and potentially increasingly capable in a form of violence that exploits the basic structures of societies and the related knowledge methods for its own purposes. As a conclusion, the paper stresses the importance of profoundly critical tools. Such tools are often perceived as being undesirable or even counter-productive in figuring out the mechanism through the very means utilised in providing for security.</p></abstract><kwd-group><kwd>security</kwd><kwd>threat</kwd><kwd>critical infrastructures</kwd><kwd>intelligent terrorism</kwd><kwd>technical rationality</kwd></kwd-group></article-meta></front><body><sec id="S1"><title>Introduction</title><p>Security has been, is, and continues to be an ever-present concern in societies. The way states, institutions and organisations provide security also affects how it is perceived. Perceived insecurity can be extensive, even when many indicators show that life is more peaceful and secure than before. The interpretation frameworks through which security is grasped therefore play a key role. States, institutions and organisations not only produce information about their operations and operating environment, but also create frameworks for interpretation that determine how reliable, functional and strategically up-to-date these operators are perceived to be. This is a particularly important theme for systems that have a special role to play in the functioning and continuity of societies. It therefore deserves critical conceptual research.</p><p>Critical infrastructures (CIs) are the cornerstone of societies’ day-to-day functioning, safety and security (<xref ref-type="bibr" rid="ref7">Bennett, 2018</xref>; <xref ref-type="bibr" rid="ref59">Żaboklicka, 2020</xref>). CIs include, but are not limited to, sectors such as energy, water, transportation, information and communications technology, nuclear, financial services and government facilities.<sup><xref ref-type="fn" rid="fn1">1</xref></sup> As <xref ref-type="bibr" rid="ref28">Hellström (2007)</xref> explains, ‘[c]ritical infrastructures are “critical”, not because they are important in general, but because they are strategically connected in such a way that they focus society’s total vulnerability to a few particular points in the system.’ In this sense, CIs have the potential to cause adverse effects that go deep into societies’ functional ability (<xref ref-type="bibr" rid="ref25">Graham, 2010</xref>). They have become a security problem (<xref ref-type="bibr" rid="ref12">Collier and Lakoff, 2007</xref>).</p><p>Considering CIs as socio-technical systems, significant amounts of material and intellectual capital are tied to them, not to mention the professional capital needed to keep the systems safe to operate. This material and intellectual capital that has accumulated and cultivated over time has its well-established tracks and well-polished ways to focus on the essentials. It has enabled CIs to become more capable so that they can better serve changing needs. Moreover, it incorporates a knowledge structure that formulates the guidelines for development and frames how risks and threats should be managed, thereby assuring people about the reliability of CIs. Performing as expected, CIs become a set of self-evident structures upon which daily operations can be designed (<xref ref-type="bibr" rid="ref25">Graham, 2010</xref>).</p><p>It is interesting to consider CIs as systems in which technological assemblies are intertwined with the social processes of knowledge production. This paper grasps this through the concept of the black box, introduced by Latour (<xref ref-type="bibr" rid="ref36">1987</xref>, <xref ref-type="bibr" rid="ref35">1994</xref>, <xref ref-type="bibr" rid="ref34">1999</xref>). According to this theorisation, as the number of a system’s components and their management become increasingly complex and hence more difficult to understand, it is reasonable to describe it as a black box from which only inputs and outputs need to be known. The historical bifurcation points of the systems, unselected development paths, controversial choices, conflicting mindsets, different interests of actors, etc. are locked in a box, so that only its main function remains visible (<xref ref-type="bibr" rid="ref36">Latour, 1987</xref>, <xref ref-type="bibr" rid="ref34">1999</xref>; see also <xref ref-type="bibr" rid="ref54">Shindell, 2020</xref>). Blackboxing ‘obfuscates actions and inner workings due to stable and reliable functioning’ as <xref ref-type="bibr" rid="ref16">De Rosa (2018)</xref> explains.</p><p>Infrastructure systems can quite obviously be considered black boxes, as they are taken for granted and their internal mechanisms are not assumed to be understood by outsiders (<xref ref-type="bibr" rid="ref25">Graham, 2010</xref>; <xref ref-type="bibr" rid="ref35">Latour, 1994</xref>). Only their failure—when, for example, they become ‘transformed into weapons of mass disruption, destruction and often death’ (<xref ref-type="bibr" rid="ref24">Graham, 2005</xref>)—may reveal something about the functioning of the inner world of black boxes, whereas in ordinary times when they operate as expected, the underlying assumptions of their operations and security become blackboxed, faded out of the critical sight.</p><p>However, trust in CIs requires that they can show that they are aware of their operational security environment and that they can manage risks. It must be demonstrated in an evidence-based manner that CIs are in competent hands—the reliability of operations must be credibly reported (<xref ref-type="bibr" rid="ref7">Bennett, 2018</xref>). But what is classified as evidence and how conclusions about the reliability of CIs are drawn stay out of reach (<xref ref-type="bibr" rid="ref4">Aven and Guikema, 2011</xref>). In addition, what also remains hidden is the process in which non-knowledge is worn in the form of expert knowledge.<sup><xref ref-type="fn" rid="fn2">2</xref></sup> This is essential since knowledge and non-knowledge are both constitutive in the decision-making processes (<xref ref-type="bibr" rid="ref6">Beck, 2002</xref>; <xref ref-type="bibr" rid="ref15">Daase and Kessler, 2007</xref>). In line with <xref ref-type="bibr" rid="ref52">Rydin <italic>et al</italic>. (2018)</xref>, it can be argued that the question is how knowledge-claims are constructed in response to the uncertainty of the security environment. In fact, from the outside of a black box, it is impossible to see beyond the knowledge-claims presented from inside the box and assess their limitations and validity. That is, one only needs to trust CIs’ reliability and be interested only in inputs and outputs.</p><p>In this context, terrorism constitutes a particularly interesting security threat for CIs in its capacity for creativity, learning and intelligence<sup><xref ref-type="fn" rid="fn3">3</xref></sup> (<xref ref-type="bibr" rid="ref20">Gill <italic>et al</italic>., 2013</xref>). How the development potential of terrorism is interpreted—what is perceived as being possible for it—affects the interests of terrorism research, the counter-terrorism practices, and risk assessment work regarding vital functions of societies. New types of terrorist acts keep pushing the boundaries of seeing that potential, but that sight tends to come only after the effect. It can be said that the events of 9/11 caused long-term impacts precisely because they undermined the then-established ideas and assumptions of terrorism prevention: something happened that had been thought impossible, or not properly thought of or deemed as being beyond comprehension (<xref ref-type="bibr" rid="ref55">The 9/11 Commission Report, 2004</xref>).</p><p>Although a great deal has been learned from the 9/11 event, CIs as increasingly complex bundles of operations that extend into the daily functioning of societies continue to constitute a platform of opportunity for terrorism (<xref ref-type="bibr" rid="ref12">Collier and Lakoff, 2007</xref>; <xref ref-type="bibr" rid="ref13">Coward, 2009</xref>). Things that remain outside the established interpretative framework can become a reality in new and drastic ways, which may further shake the closely guarded contents of black boxes in addition to causing extensive and deep adverse impacts in other ways (<xref ref-type="bibr" rid="ref9">Botha, 2020</xref>). In this regard, harnessing such systems that have developed into increasingly complex bundles of critical societal functions and their interdependencies over time (<xref ref-type="bibr" rid="ref10">Cedergren <italic>et al</italic>., 2018</xref>; <xref ref-type="bibr" rid="ref29">Hempel <italic>et al</italic>., 2018</xref>; <xref ref-type="bibr" rid="ref43">Peerenboom and Fisher, 2010</xref>; <xref ref-type="bibr" rid="ref57">Wang <italic>et al</italic>., 2013</xref>) to serve terrorist purposes as a weapon would make 9/11 look like a short prelude.</p><p>Moreover, what is undoubtedly left unburied in black boxes concerns our understanding of the interconnections and dependencies in the CIs. Not only is our ability to manage complex systems limited, but also the ways in which security threats are examined and uncertainty is reduced are formulated and developed further in silos (<xref ref-type="bibr" rid="ref3">Aradau and van Munster, 2011</xref>). Our vulnerability to terrorism thus reflects the very nature of our systems and the way they have been organised (<xref ref-type="bibr" rid="ref37">Logan <italic>et al</italic>., 2019</xref>). It is therefore important to understand the dynamics of such a threat and the provision of security in the context of CIs in more diverse and critical ways.</p></sec><sec id="S2"><title>Aim and method</title><p>When terrorism is grasped as an active threat that proceeds intelligently in terms of its purpose and objectives, it appears to be capable of becoming aware of the vulnerabilities of CIs and adjusting its tactics to avoid the terrorism prevention measures (<xref ref-type="bibr" rid="ref27">Hausken, 2017</xref>; <xref ref-type="bibr" rid="ref45">Quijano <italic>et al</italic>., 2018</xref>). In this sense, the way security is provided within CIs and the way intelligent terrorism could operate form an interesting tension for closer examinations. They are separating from each other in a way that creates vulnerability, albeit it is not well understood how.</p><p>This article seeks to enhance the conceptual understanding by analysing this intellectual separation using the lens from the black box theorisation (<xref ref-type="bibr" rid="ref35">Latour 1994</xref>, <xref ref-type="bibr" rid="ref36">1987</xref>). By so doing, the article sheds light on the conceptual dimension of the (in)security that has gone unnoticed in the interface between CIs and terrorism (<xref ref-type="bibr" rid="ref47">Ranstorp and Normark, 2009</xref>). It aims to outline the aforementioned dilemma and provide conceptual understanding that makes it easier to grasp and communicate further. It is conducted in the following way: First, the rationality of creating security within the context of Cis is outlined (i.e., the logic of blackboxing). After that, terrorism targeted at CIs as a method capable of opening black boxes is scrutinised. Then, the potential next level of terrorism that could shake the content hidden in the box is discussed. Finally, conclusions are drawn, whose intention is to open new paths in thinking in unforeseen—but when it comes to terrorism—relevant and insightful ways.</p></sec><sec id="S3"><title>Results</title><sec id="S3_1"><title>Critical infrastructure and the logic of creating security</title><p>The security of CIs requires not only the effective assessment and management of threats and risks and proven reliability,4Measuring the security of CIs is an extraordinary complex task. However, various measures for assessing it have been developed, such as approved CI protection plans, audit of CI protection status, structural and budgetary changes, and exercises (<xref ref-type="bibr" rid="ref44">Piekarski and Wojtasik, 2022</xref>).<sup><xref ref-type="fn" rid="fn4">4</xref></sup> but also public trust in that reliability; the dependence of everyday activities on CI systems indicates and requires trust and certainty (<xref ref-type="bibr" rid="ref14">Critical Five, 2014</xref>). The interpretation frameworks through which certainty assessments are made and trust maintained reflect the way threats are perceived, prepared for and managed.</p><p>Increased connections and the formation of dependencies within CIs are essential features that reflect the level of modern societies’ development. However, the critical elements of the systems need to be protected, and external interference with the processes must be prevented—in terms of <italic>target hardening</italic>, for instance—to ensure the continuity of the respective operations, and also in exceptional times (<xref ref-type="bibr" rid="ref7">Bennett, 2018</xref>; <xref ref-type="bibr" rid="ref9">Botha, 2020</xref>; <xref ref-type="bibr" rid="ref33">Kahan, 2017</xref>; <xref ref-type="bibr" rid="ref57">Wang <italic>et al</italic>., 2013</xref>; <xref ref-type="bibr" rid="ref58">Wiśniewski, 2016</xref>). Such a solidification of protection is a way of making systems more robust and less susceptible to interference and harm (<xref ref-type="bibr" rid="ref2">Aradau, 2010</xref>). However, it is concurrently a method for blackboxing CI systems in a way that supports their main functional objectives and draws attention to their essential aspects. That is, they encapsulate not only in a technical sense but also in terms of knowledge production (<xref ref-type="bibr" rid="ref41">Moore <italic>et al</italic>., 2019</xref>). But what does this capsulation mean more specifically?</p><p>In modern societies, CIs consist of sheltered systems of this type, together with connections and dependencies between them. Due to such complexity, even if an individual function or process can be sheltered and controlled, this capacity is unavailable at the system level; security, reliability and the related knowledge within separate systems do not translate into a broader system-level capacity (<xref ref-type="bibr" rid="ref29">Hempel <italic>et al</italic>., 2018</xref>). Despite this, CIs must deliver on their promise of certainty and prove their ability to provide for security. But how does the mechanism behind this ‘providing for security’ work? In other words, how is blackboxing conducted so that CIs present themselves as systems performing their functions in a fool-proof manner?</p><p>As socio-technological systems, CIs rely on a concept of rationality that is linked to technical and engineering expertise, with their characteristic action ideals (<xref ref-type="bibr" rid="ref17">Delanty and Harris, 2021</xref>; <xref ref-type="bibr" rid="ref40">Mitcham, 2015</xref>; see also <xref ref-type="bibr" rid="ref53">Schön, 1983</xref>). As technical rationality aims to produce order and control capacity through data classification and calculation (<xref ref-type="bibr" rid="ref26">Gunderson <italic>et al</italic>., 2018</xref>), the provision for security builds on the concepts of risks and threats identified from previous events, as well as their management mechanisms, criticality and vulnerability analysis, and scenario models, among others (<xref ref-type="bibr" rid="ref11">Chen <italic>et al</italic>., 2019</xref>; <xref ref-type="bibr" rid="ref48">Reniers and Audenaert, 2014</xref>; <xref ref-type="bibr" rid="ref57">Wang <italic>et al</italic>., 2013</xref>; <xref ref-type="bibr" rid="ref60">Zio, 2016</xref>). Technical rationality brings efficiency to interpreting reality and turning what has been learned from previous events into better capability. It seldom expresses its selectivity, but instead represents itself as the only reasonable indicator of reality and provider of solutions, as is typical for black boxes.</p><p>Technical rationality recognises errors and imperfection as part of activity, so errors made and deficiencies identified can be turned into an ability to close gaps in security, learn from failures and strengthen management capacity (<xref ref-type="bibr" rid="ref23">Gómez, 2015</xref>). The internal logic of technical rationality determines what stands out as an error, an imperfect performance or a gap in security. The very idea that this logic could be defective or even harmful is absurd. It is impossible to scrutinise analytically within itself. Systems learn in a way that represents a stronger capacity to address an increasingly diverse range of security threats and an enhanced capability to manage them effectively. It builds trust in the capability of expertise to face uncertainty (<xref ref-type="bibr" rid="ref8">Bieder, 2017</xref>; <xref ref-type="bibr" rid="ref51">Runciman, 2006</xref>). In this way, technical rationality can ensure that the CIs are always the best possible ones considering the given situation, and that they are capable of evolving towards the next best possible condition.</p><p>Another key characteristic of technical rationality is its tendency to interpret reality as being composed of technical challenges calling for technical responses—since a black box is filled with technical content, engineering expertise represents the most advanced interpretation of the security of CIs (<xref ref-type="bibr" rid="ref26">Gunderson <italic>et al</italic>., 2018</xref>). It defines the most essential problems in the security environment, formulates them, and opens the vista to solutions deemed adequate, justified and sufficient (<xref ref-type="bibr" rid="ref32">Hubbard, 2009</xref>). It is legitimised as the correct, commonly approved knowledge method (<xref ref-type="bibr" rid="ref3">Aradau and van Munster 2011</xref>), which increases the distance between professionals and laypeople such as the ordinary users of infrastructure services, as it becomes increasingly sophisticated and strengthens its position (<xref ref-type="bibr" rid="ref23">Gómez, 2015</xref>). Laypeople are expected to trust and believe that the security of the systems is in expert hands (<xref ref-type="bibr" rid="ref50">Rodríguez, 2015</xref>).</p><p>However, it is worth asking whether these expert hands are tied to established habits of thinking (<xref ref-type="bibr" rid="ref4">Aven and Guikema, 2011</xref>), and hence have become an instrument for solving the problems tailored to it more and more precisely and subtly. That is, on what basis can the capacity to design, operate and manage well-defined technical problems be extended to apply for providing for security to CIs on a larger scale? Such a question usually remains unasked, as the basic assumption regarding technical rationality standardises, moves aside from criticism, and thus allows argumentation and operation to be built on these assumptions (<xref ref-type="bibr" rid="ref40">Mitcham, 2015</xref>). Paraphrasing <xref ref-type="bibr" rid="ref22">Goldman (2018)</xref>, it can be said that technical rationality gives an impression of the creation of security in a value-neutral, evidence-based manner, which is why it elicits trust and undermines sceptical arguments. However, why technical rationality is considered competent for determining the CIs’ security environment, and what knowledge is being excluded or ignored by its interpretation framework, remains unexplored. Such taken-for-granted gaps provide for potential security hazards. Therefore, it is important to approach them as possible means and mediums intelligent terrorism could utilise by weaponising them.</p></sec><sec id="S3_2"><title>Terrorism targeted at critical infrastructures</title><p>The unambiguous definition of the concept of terrorism has proved to be exceptionally challenging (<xref ref-type="bibr" rid="ref19">Feyyaz, 2019</xref>), yet attempts to define it precisely may also have hampered the grip of the phenomenon comprehensively (<xref ref-type="bibr" rid="ref46">Ramsay, 2015</xref>). Despite the lack of consensus, the general features of terrorism include the desire to cause feelings of terror and insecurity through violence or the threat of violence within a group larger than the actual target of the very attacks (<xref ref-type="bibr" rid="ref31">Horgan, 2005</xref>; <xref ref-type="bibr" rid="ref49">Richards, 2014</xref>). According to <xref ref-type="bibr" rid="ref49">Richards (2014)</xref>, ‘terrorism is best conceptualised as a particular method of political violence’, which can be interpreted so that the very meaning of terrorism cannot be reduced to the immediate impacts of a limited attack, but the real impacts arise from the fundamental values, structures and assumptions terrorism threatens (e.g., <xref ref-type="bibr" rid="ref18">Enders and Sandler, 2012</xref>). In other words, the core of the dynamics of terrorism consists of how terrorist activity is interpreted in the target society, and how these interpretations affect people’s sense of security. By attacking a piece of critical infrastructure, as <xref ref-type="bibr" rid="ref7">Bennett (2018)</xref> argues, terrorists may disrupt the standard of living and cause significant physical, psychological and financial damage. However, another question is how an attack would shake the joints of black boxes and undermine trust in CIs and their management in general.</p><p>Although CIs have been targets of terrorist attacks in recent history (on statistical analysis of this theme, see e.g. <xref ref-type="bibr" rid="ref39">Miller, 2016</xref>), the extent to which they have succeeded in causing the long-term impacts in the larger scales is highly questionable (<xref ref-type="bibr" rid="ref1">Abrahams and Gottfried, 2014</xref>; see also <xref ref-type="bibr" rid="ref42">Muro, 2019</xref>). Roughly speaking, the CI systems have so far proved their ability to return to normal operation quickly after the attacks, and communities have regained their trust in the security of the systems. It seems that the attacks have generally failed to communicate in ways that would profoundly undermine people’s trust in the technical systems and structures that underpin and maintain their daily lives. The acts have not disrupted the social fabric of societies by instilling distrust between people or caused them to question the basic assumptions on which everyday activities are built (<xref ref-type="bibr" rid="ref38">Maras, 2013</xref>; see also <xref ref-type="bibr" rid="ref42">Muro, 2019</xref>). In other words, people have sustained their sense that experts and administrations are capable of identifying and managing the respective threats as well as organising effective responses to attacks (cf., <xref ref-type="bibr" rid="ref56">Van Der Does <italic>et al</italic>., 2019</xref>). The knowledge strategy for maintaining the continuity and enhancing the security ex post facto of a CI has convinced the people of its capability and proven its reliability quite well (<xref ref-type="bibr" rid="ref30">Hoffman and Shelby, 2017</xref>).</p><p>In the light of technical rationality, this would imply that even devastating terrorist attacks have been interpreted in the framework of the security of systems, and eventually, dissolved into black boxes’ increased ability to recover from any incidents and to take necessary lessons from such experiences. It is possible to explain the attacks as external acts based on the sudden use of violence which, despite their unpredictability, have succeeded in remaining within the limits of security estimates, but which can be circumscribed even better in the future by learning from them. The acts are interpreted as having hit an area that can be explained in terms of limited resources, meaning that the identified gap can be closed through additional investments without the need for fundamental change in the scheme or its underpinning logic.</p><p>The acts have failed to put under question the form of expertise that provides for security and certainty and evolves around the related issues. Instead, the acts are grasped as isolated cases that mainly indicate the intellectual relevance and insufficient resources of the systems, but not fundamental deficiencies in the general framework. Thus accounted, terrorism operates appropriately for the technical rationality: although the attacks constitute a real, unpredictable and serious security threat in the short term, the longer-term capacity and reliability of CIs are not questioned. A terrorist attack comes as a surprise, reveals vulnerability, indicates a weak link and reveals the limitations of knowledge, but it is eventually interpreted in a way that can be managed and effectively addressed by investing in stronger systems and broader up-to-date coverage.</p><p>Confidence in the logic of security creation is not undermined because the general framework appears fully capable in terms of making sense of attacks, providing for their prevention in the future, and thus not requiring deeper reflection or scrutiny. In other words, terrorist attacks fail to abuse the trust and confidence in the structures on which people rely (<xref ref-type="bibr" rid="ref5">BaMaung <italic>et al</italic>., 2018</xref>). However, the fact that the black boxes’ internal logic has so far withstood them does not imply that it is free from vulnerabilities. To figure out the inherent vulnerability, it is necessary to delineate a trend in the development of terrorism that casts light on the need for alternative interpretation frameworks.</p></sec><sec id="S3_3"><title>The potential next level of terrorism</title><p>In view of the above, one may ask, what forms of terrorism would call into question the framework utilised in making sense of terrorist acts? To begin with, it can be said that creating and maintaining trust and certainty—even their ability to be taken for granted and blackboxed—are at the core of the security and credibility of CIs. Undermining trust and certainty requires systematic abuse of the systems, a deliberate effort to change the operational logic of the system qualitatively. This would call for sustained action to integrate the threat into the very methods and means upon which the maintenance of security of operations have been established. Terrorism would sneak in through the very operating methods that are perceived as being critical, continuously updated, effective, benevolent, field-tested and confirmed apparatus for identifying and solving problems. Terrorism could infiltrate a black box, settle in its inner world, and exploit it for its own purposes.</p><p>Such terrorism would cause systemic damage to society by affecting the various stages of designing, building, operating and managing protected and sheltered CI systems. The consequences would not be limited to isolated shocks or cascaded disturbances. Instead, they would reveal an innate vulnerability in how CIs are becoming increasingly complex, more critical and hence more and more capable in causing harm (<xref ref-type="bibr" rid="ref28">Hellström, 2007</xref>). This would question the assumptions about the method applied in the accumulation of knowledge, understanding and expertise on which the security of CI relies. Such an act would be reflected in the mechanisms through which people and societal functions have become and continuously are dependent on CI systems. Well-intentioned investments in system reliability would be questioned in a way that undermines the framework considered legitimate. It would destroy social trust by creating anticipatory fear about terrorism: As <xref ref-type="bibr" rid="ref21">Godefroidt and Langer (2018)</xref> showed, fearing terrorism destroys social trust, and this threat of terrorism does not even have to be real.</p><p>Such terrorism targeted at CIs would be less about a new tool in the terrorists’ toolbox, and more about a different logic of impact in which the vulnerability relates to intellectual foundations of certainty and security, not on the interruption or destruction of individual functions. When security and the ability to manage threats become thoroughly challenged, a shadow of doubt is also cast over systems operating with a similar logic. The essence and enormous size of black boxes would be revealed. It would be difficult for operators dependent on CIs to make informed decisions on the use of systems because the credibility of the information available would have been undermined. In this sense, the real impact of terrorism consists of the fact that the target group interprets the acts in ways that question the knowledge structure and the methods and means for strengthening it that have, in general, been sealed in a black box.</p></sec></sec><sec id="S4"><title>Conclusions</title><p>This paper discusses the contrast between the logic of providing for security and certainty for CIs and the intelligent development of terrorism as a major security threat to societies. The intellectual separation described above has weakened the possibilities for theoretically understanding and practically recognising terrorism as a phenomenon that is becoming systemically more conscious, more intelligent, and potentially increasingly capable in a form of violence that abuses the basic structures of societies and the related methods for knowledge production. The paper contributes to the research on terrorism by stressing the importance of profoundly critical tools that are often perceived as being undesirable or even counter-productive in figuring out the mechanism through the very means utilised in providing for security.</p><p>This article makes it clear that the threat of intelligent terrorism relates to perceptions of the capabilities in knowledge and control. Identifying threats, managing them and hardening the targets are essential functions that provide the desired certainty. Seeing the logic of producing certainty as blackboxing, this article shows how it can become a source of vulnerability and systematic blindness. Perhaps, therefore, the ‘known’ is less important than the means utilised in coming to know it. Perhaps the systems behind the identification of those who possess the very knowledge and the positions granted to them and the attached privileges in putting that knowledge into action deserve critical analysis. This paper concludes that the main practical challenge is to become aware of what threats are not being seen because of systematic blindfolds and blind spots. As can be seen, the formation of blind spots is linked to what is commonly seen as strength. However, threats beyond the field of vision will not cease to exist, even if the focus is increasingly on what is already in sight. The potential of the CIs’ context to prepare for the coming of intelligent terrorism lies in this realisation. The ways by which terrorism can infiltrate into the black boxes and the ways in which preparedness can be developed accordingly are both interesting areas for further research.</p></sec></body><back><sec id="S5" sec-type="financial-disclosure"><title>Funding</title><p>This work was supported by the Academy of Finland under Grant 315074.</p></sec><sec id="S6"><title>Data Availability Statement</title><p>Not applicable.</p></sec><sec id="S7" sec-type="COI-statement"><title>Disclosure statement</title><p>No potential conflict of interest was reported by the author. The author read and agreed to the published version of the manuscript.</p></sec><fn-group><fn id="fn1"><label>1</label><p><ext-link ext-link-type="uri" xlink:href="https://www.cisa.gov/critical-infrastructure-sectors">https://www.cisa.gov/critical-infrastructure-sectors</ext-link></p></fn><fn id="fn2"><label>2</label><p>For instance, what are the unknown knowns, ‘knowledge that is not known because it is not supposed to be known’ described by <xref ref-type="bibr" rid="ref15">Daase and Kessler (2007)</xref>.</p></fn><fn id="fn3"><label>3</label><p>In this article, intelligence is defined in line with the Merriam Webster dictionary as ‘the ability to learn or understand or to deal with new or trying situations’ and as ‘the ability to apply knowledge to manipulate one’s environment or to think abstractly as measured by objective criteria’. In this sense, intelligence is not a normative or ethical statement.</p></fn><fn id="fn4"><label>4</label><p>Measuring the security of CIs is an extraordinary complex task. However, various measures for assessing it have been developed, such as approved CI protection plans, audit of CI protection status, structural and budgetary changes, and exercises (<xref ref-type="bibr" rid="ref44">Piekarski and Wojtasik, 2022</xref>).</p></fn></fn-group><ref-list><ref id="ref1"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Abrahams</surname>, <given-names>M</given-names></string-name>. and <string-name><surname>Gottfried</surname>, <given-names>M.S</given-names></string-name></person-group>. (<year>2014</year>) <article-title>‘Does terrorism pay? An empirical analysis’</article-title>, <source>Terrorism and Political Violence</source>, <volume>28</volume>, pp. <fpage>72</fpage>–<lpage>89</lpage>. doi: <pub-id pub-id-type="doi">10.1080/09546553.2013.879057</pub-id>.</mixed-citation></ref><ref id="ref2"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Aradau</surname>, <given-names>C</given-names></string-name></person-group>. (<year>2010</year>) <article-title>‘Security that matters: critical infrastructure and objects of protection’</article-title>, <source>Security Dialogue</source>, <volume>41</volume>, pp. <fpage>491</fpage>–<lpage>514</lpage>. doi: <pub-id pub-id-type="doi">10.1177/0967010610382687</pub-id>.</mixed-citation></ref><ref id="ref3"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Aradau</surname>, <given-names>C</given-names></string-name>. and <string-name><surname>van Munster</surname>, <given-names>R</given-names></string-name></person-group>. (<year>2011</year>) <chapter-title><italic>Politics of catastrophe. Genealogies of the unknown</italic></chapter-title>. <publisher-loc>Oxon</publisher-loc>: <publisher-name>Routledge</publisher-name>.</mixed-citation></ref><ref id="ref4"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Aven</surname>, <given-names>T</given-names></string-name>. and <string-name><surname>Guikema</surname>, <given-names>S</given-names></string-name></person-group>. (<year>2011</year>) <article-title>‘Whose uncertainty assessments (probability distributions) does a risk assessment report: the analysts’ or the experts’?’</article-title>, <source>Reliability Engineering &amp; System Safety</source>, <volume>96</volume>, pp. <fpage>1257</fpage>–<lpage>1262</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.ress.2011.05.001</pub-id>.</mixed-citation></ref><ref id="ref5"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>BaMaung</surname>, <given-names>D</given-names></string-name>., <string-name><surname>McIlhatton</surname>, <given-names>D</given-names></string-name>., <string-name><surname>MacDonald</surname>, <given-names>M</given-names></string-name>. and <string-name><surname>Beattie</surname>, <given-names>R</given-names></string-name></person-group>. (<year>2018</year>) <article-title>‘The enemy within? The connection between insider threat and terrorism’</article-title>, <source>Studies in Conflict &amp; Terrorism</source>, <volume>41</volume>, pp. <fpage>133</fpage>–<lpage>150</lpage>. doi: <pub-id pub-id-type="doi">10.1080/1057610X.2016.1249776</pub-id>.</mixed-citation></ref><ref id="ref6"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Beck</surname>, <given-names>U</given-names></string-name></person-group>. (<year>2002</year>) <article-title>‘The terrorist threat: world risk society revisited’</article-title>, <source>Theory, Culture and Society</source>, <volume>19</volume>, pp. <fpage>39</fpage>–<lpage>55</lpage>. doi: <pub-id pub-id-type="doi">10.1177/0263276402019004003</pub-id>.</mixed-citation></ref><ref id="ref7"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Bennett</surname>, <given-names>B.T</given-names></string-name></person-group>. (<year>2018</year>) <chapter-title><italic>Understanding, assessing and responding to terrorism: protecting critical infrastructure and personnel</italic></chapter-title>. <edition>2</edition>nd ed. <publisher-loc>Hoboken, NJ</publisher-loc>: <publisher-name>Wiley</publisher-name>.</mixed-citation></ref><ref id="ref8"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Bieder</surname>, <given-names>C</given-names></string-name></person-group>. (<year>2017</year>) <article-title>‘Conclusion’</article-title>, in <person-group person-group-type="editor"><string-name><given-names>G.</given-names><surname>Motet</surname></string-name> and <string-name><given-names>C</given-names>. <surname>Bieder</surname></string-name></person-group> (eds.), <source>The illusion of risk control: what does it take to live with uncertainty?</source> <publisher-loc>Cham</publisher-loc>: <publisher-name>Springer</publisher-name>, pp. <fpage>107</fpage>–<lpage>112</lpage>.</mixed-citation></ref><ref id="ref9"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Botha</surname>, <given-names>A</given-names></string-name></person-group>. (<year>2020</year>) <chapter-title>‘Prevention of terrorist attacks on critical infrastructure’</chapter-title>, in <person-group person-group-type="editor"><string-name><given-names>A.P</given-names><surname>Schmid</surname></string-name></person-group> (ed.), <source>Handbook of terrorism prevention and preparedness</source>. <publisher-loc>The Hague</publisher-loc>: <publisher-name>ICCT Press Publication</publisher-name>, pp. <fpage>867</fpage>–<lpage>896</lpage>.</mixed-citation></ref><ref id="ref10"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Cedergren</surname>, <given-names>A</given-names></string-name>., <string-name><surname>Johansson</surname>, <given-names>J</given-names></string-name>. and <string-name><surname>Hassel</surname>, <given-names>H</given-names></string-name></person-group>. (<year>2018</year>) <article-title>‘Challenges to critical infrastructure resilience in an institutionally fragmented setting’</article-title>, <source>Safety Science</source>, <volume>110</volume>, pp. <fpage>51</fpage>–<lpage>58</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.ssci.2017.12.025</pub-id>.</mixed-citation></ref><ref id="ref11"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Chen</surname>, <given-names>C</given-names></string-name>., <string-name><surname>Reniers</surname>, <given-names>G</given-names></string-name>. and <string-name><surname>Khakzad</surname>, <given-names>N</given-names></string-name></person-group>. (<year>2019</year>) <article-title>‘Integrating safety and security resources to protect chemical industrial parks from man-made domino effects: a dynamic graph approach’</article-title>, <source>Reliability Engineering &amp; System Safety</source>, <volume>191</volume>, <fpage>106470</fpage>. doi: <pub-id pub-id-type="doi">10.1016/j.ress.2019.04.023</pub-id>.</mixed-citation></ref><ref id="ref12"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Collier</surname>, <given-names>S</given-names></string-name>. and <string-name><surname>Lakoff</surname>, <given-names>A</given-names></string-name></person-group>. (<year>2007</year>) <article-title>‘The vulnerability of vital systems: how “critical infrastructure” became a security problem’</article-title>, in <person-group person-group-type="editor"><string-name><given-names>M</given-names>. <surname>Dunn</surname></string-name> and <string-name><given-names>K.S</given-names>. <surname>Kristensen</surname></string-name></person-group> (eds.), <source>Securing ‘the homeland’: critical infrastructure, risk, and (in)security</source>. <publisher-loc>Abingdon</publisher-loc>: <publisher-name>Routledge</publisher-name>, pp. <fpage>17</fpage>–<lpage>39</lpage>.</mixed-citation></ref><ref id="ref13"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Coward</surname>, <given-names>M</given-names></string-name></person-group>. (<year>2009</year>) <article-title>‘Network-centric violence, critical infrastructure and the urbanization of security’</article-title>, <source>Security Dialogue</source>, <volume>40</volume>, pp. <fpage>399</fpage>–<lpage>418</lpage>. doi: <pub-id pub-id-type="doi">10.1177/0967010609342879</pub-id>.</mixed-citation></ref><ref id="ref14"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>Critical Five</collab></person-group>. (<year>2014</year>) <article-title>Forging a common understanding for critical infrastructure</article-title>. <source>Shared narrative</source>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.cisa.gov/publication/critical-five-shared-narrative-2014">https://www.cisa.gov/publication/critical-five-shared-narrative-2014</ext-link> (Accessed: 10 June 2022).</mixed-citation></ref><ref id="ref15"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Daase</surname>, <given-names>C</given-names></string-name>. and <string-name><surname>Kessler</surname>, <given-names>O</given-names></string-name></person-group>. (<year>2007</year>) <article-title>‘Knowns and unknowns in the “war on terror”: uncertainty and the political construction of danger’</article-title>, <source>Security Dialogue</source>, <volume>38</volume>, pp. <fpage>411</fpage>–<lpage>434</lpage>. doi: <pub-id pub-id-type="doi">10.1177/0967010607084994</pub-id>.</mixed-citation></ref><ref id="ref16"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>De Rosa</surname>, <given-names>M</given-names></string-name></person-group>. (<year>2018</year>) <article-title>‘Land use and land-use changes in life cycle assessment: green modelling or black boxing?’</article-title>, <source>Ecological Economics</source>, <volume>144</volume>, pp. <fpage>73</fpage>–<lpage>81</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.ecolecon.2017.07.017</pub-id>.</mixed-citation></ref><ref id="ref17"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Delanty</surname>, <given-names>G</given-names></string-name>. and <string-name><surname>Harris</surname>, <given-names>N</given-names></string-name></person-group>. (<year>2021</year>) <article-title>‘Critical theory and the question of technology: the Frankfurt School revisited’</article-title>, <source>Thesis Eleven</source>, <volume>166</volume>, pp. <fpage>88</fpage>–<lpage>108</lpage>. doi: <pub-id pub-id-type="doi">10.1177/07255136211002055</pub-id>.</mixed-citation></ref><ref id="ref18"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Enders</surname>, <given-names>W</given-names></string-name>. and <string-name><surname>Sandler</surname>, <given-names>T</given-names></string-name></person-group>. (<year>2012</year>) <chapter-title><italic>The political economy of terrorism</italic></chapter-title>. <edition>2</edition>nd ed. <publisher-loc>Cambridge, MA</publisher-loc>: <publisher-name>Cambridge University Press</publisher-name>.</mixed-citation></ref><ref id="ref19"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Feyyaz</surname>, <given-names>M</given-names></string-name></person-group>. (<year>2019</year>) <article-title>‘Terrorism can and should be defined. But how?’</article-title>, <source>Strategic Analysis</source>, <volume>43</volume>, pp. <fpage>310</fpage>–<lpage>327</lpage>. doi: <pub-id pub-id-type="doi">10.1080/09700161.2019.1626581</pub-id>.</mixed-citation></ref><ref id="ref20"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Gill</surname>, <given-names>P</given-names></string-name>., <string-name><surname>Horgan</surname>, <given-names>J</given-names></string-name>., <string-name><surname>Hunter</surname>, <given-names>S.T</given-names></string-name>. and <string-name><surname>Cushenbery</surname>, <given-names>L.D</given-names></string-name></person-group>. (<year>2013</year>) <article-title>‘Malevolent creativity in terrorist organizations’</article-title>, <source>Journal of Creative Behavior</source>, <volume>47</volume>, pp. <fpage>125</fpage>–<lpage>151</lpage>. doi: <pub-id pub-id-type="doi">10.1002/jocb.28</pub-id>.</mixed-citation></ref><ref id="ref21"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Godefroidt</surname>, <given-names>A</given-names></string-name>. and <string-name><surname>Langer</surname>, <given-names>A</given-names></string-name></person-group>. (<year>2018</year>) <article-title>‘How fear drives us apart: explaining the relationship between terrorism and social trust’</article-title>, <source>Terrorism and Political Violence</source>, <volume>32</volume>, pp. <fpage>1482</fpage>–<lpage>1505</lpage>. doi: <pub-id pub-id-type="doi">10.1080/09546553.2018.1482829</pub-id>.</mixed-citation></ref><ref id="ref22"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Goldman</surname>, <given-names>S.L</given-names></string-name></person-group>. (<year>2018</year>) <chapter-title>‘Compromised exactness and the rationality of engineering’</chapter-title>, in <person-group person-group-type="editor"><string-name><given-names>C.</given-names><surname>García-Díaz</surname></string-name> and <string-name><given-names>C.</given-names><surname>Olaya</surname></string-name></person-group> (eds.), <source>Social systems engineering: the design of complexity</source>. <publisher-loc>Hoboken, New Jersey</publisher-loc>: <publisher-name>John Wiley &amp; Sons, Inc</publisher-name>.</mixed-citation></ref><ref id="ref23"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Gómez</surname>, <given-names>A</given-names></string-name></person-group>. (<year>2015</year>) <article-title>‘Risk, uncertainty, and the dimensions of technological rationality’</article-title>, in <person-group person-group-type="editor"><string-name><given-names>W.J.</given-names><surname>Gonzalez</surname></string-name></person-group> (ed.), <source>New perspectives on technology, values, and ethics: theoretical and practical</source>. <publisher-loc>Cham</publisher-loc>: <publisher-name>Springer</publisher-name>, pp. <fpage>105</fpage>–<lpage>122</lpage>.</mixed-citation></ref><ref id="ref24"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Graham</surname>, <given-names>S</given-names></string-name></person-group>. (<year>2005</year>) <article-title>‘Switching cities off’</article-title>, <source>City</source>, <volume>9</volume>, pp. <fpage>169</fpage>–<lpage>194</lpage>. doi: <pub-id pub-id-type="doi">10.1080/13604810500196956</pub-id>.</mixed-citation></ref><ref id="ref25"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Graham</surname>, <given-names>S</given-names></string-name></person-group>. (<year>2010</year>) <chapter-title><italic>Disrupted cities: when infrastructure fails</italic></chapter-title>. <publisher-loc>New York, NY</publisher-loc>: <publisher-name>Routledge</publisher-name>.</mixed-citation></ref><ref id="ref26"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Gunderson</surname>, <given-names>R</given-names></string-name>., <string-name><surname>Petersen</surname>, <given-names>B</given-names></string-name>. and <string-name><surname>Stuart</surname>, <given-names>D</given-names></string-name></person-group>. (<year>2018</year>) <article-title>‘A critical examination of geoengineering: economic and technological rationality in social context’</article-title>, <source>Sustainability</source>, <volume>10</volume>, p. <fpage>269</fpage>. doi: <pub-id pub-id-type="doi">10.3390/su10010269</pub-id>.</mixed-citation></ref><ref id="ref27"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Hausken</surname>, <given-names>K</given-names></string-name></person-group>. (<year>2017</year>) <article-title>‘Special versus general protection and attack of parallel and series components’</article-title>, <source>Reliability Engineering &amp; System Safety</source>, <volume>165</volume>, pp. <fpage>239</fpage>–<lpage>256</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.ress.2017.03.027</pub-id>.</mixed-citation></ref><ref id="ref28"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Hellström</surname>, <given-names>T</given-names></string-name></person-group>. (<year>2007</year>) <article-title>‘Critical infrastructure and systemic vulnerability: towards a planning framework’</article-title>, <source>Safety Science</source>, <volume>45</volume>, pp. <fpage>415</fpage>–<lpage>430</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.ssci.2006.07.007</pub-id>.</mixed-citation></ref><ref id="ref29"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Hempel</surname>, <given-names>L</given-names></string-name>., <string-name><surname>Kraff</surname>, <given-names>B.D</given-names></string-name>. and <string-name><surname>Pelzer</surname>, <given-names>R</given-names></string-name></person-group>. (<year>2018</year>) <article-title>‘Dynamic interdependencies: problematising criticality assessment in the light of cascading effects’</article-title>, <source>International Journal of Disaster Risk Reduction</source>, <volume>30</volume>, pp. <fpage>257</fpage>–<lpage>268</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.ijdrr.2018.04.011</pub-id>.</mixed-citation></ref><ref id="ref30"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Hoffman</surname>, <given-names>A.M</given-names></string-name>. and <string-name><surname>Shelby</surname>, <given-names>W</given-names></string-name></person-group>. (<year>2017</year>) <article-title>‘When the “laws of fear” do not apply: effective counterterrorism and the sense of security from terrorism’</article-title>, <source>Political Research Quarterly</source>, <volume>70</volume>, pp. <fpage>618</fpage>–<lpage>631</lpage>. doi: <pub-id pub-id-type="doi">10.1177/1065912917709354</pub-id>.</mixed-citation></ref><ref id="ref31"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Horgan</surname>, <given-names>J</given-names></string-name></person-group>. (<year>2005</year>) <chapter-title><italic>The psychology of terrorism</italic></chapter-title>. <publisher-loc>London</publisher-loc>: <publisher-name>Routledge</publisher-name>.</mixed-citation></ref><ref id="ref32"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Hubbard</surname>, <given-names>G.W</given-names></string-name></person-group>. (<year>2009</year>) <chapter-title><italic>The failure of risk management: why it’s broken and how to fix it</italic></chapter-title>. <publisher-loc>Hoboken, New Jersey</publisher-loc>: <publisher-name>John Wiley &amp; Sons, Inc</publisher-name>.</mixed-citation></ref><ref id="ref33"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Kahan</surname>, <given-names>J</given-names></string-name></person-group>. (<year>2017</year>) <article-title>‘Critical infrastructure protection: can we defend against terrorism?’</article-title>, <source>Homeland Security Affairs</source>, <volume>13</volume>, pp. <fpage>1</fpage>–<lpage>41</lpage>.</mixed-citation></ref><ref id="ref34"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Latour</surname>, <given-names>B</given-names></string-name></person-group>. (<year>1999</year>) <chapter-title><italic>Pandora’s hope. Essays on the reality of science studies</italic></chapter-title>. <publisher-loc>Cambridge, MA</publisher-loc>: <publisher-name>Harvard University Press</publisher-name>.</mixed-citation></ref><ref id="ref35"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Latour</surname>, <given-names>B</given-names></string-name></person-group>. (<year>1994</year>) <article-title>‘On technical mediation: philosophy, sociology, genealogy’</article-title>, <source>Common Knowledge</source>, <volume>3</volume>, pp. <fpage>29</fpage>–<lpage>64</lpage>.</mixed-citation></ref><ref id="ref36"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Latour</surname>, <given-names>B</given-names></string-name></person-group>. (<year>1987</year>) <chapter-title><italic>Science in action: how to follow scientists and engineers through society</italic></chapter-title>. <publisher-loc>Cambridge, MA</publisher-loc>: <publisher-name>Harvard University Press</publisher-name>.</mixed-citation></ref><ref id="ref37"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Logan</surname>, <given-names>M.K</given-names></string-name>., <string-name><surname>Ligon</surname>, <given-names>G.S</given-names></string-name>. and <string-name><surname>Derrick</surname>, <given-names>D</given-names></string-name></person-group>. (<year>2019</year>) <article-title>‘Measuring tactical innovation in terrorist attacks’</article-title>, <source>Journal of Creative Behavior</source>, <volume>54</volume>, pp. <fpage>926</fpage>–<lpage>939</lpage>. doi: <pub-id pub-id-type="doi">10.1002/jocb.420</pub-id>.</mixed-citation></ref><ref id="ref38"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Maras</surname>, <given-names>M.-H</given-names></string-name></person-group>. (<year>2013</year>) <article-title>‘Risk perception, fear, and its consequences following the 2004 Madrid and 2005 London bombings’</article-title>, in <person-group person-group-type="editor"><string-name><given-names>S.J.</given-names><surname>Sinclair</surname></string-name> and <string-name><given-names>D.</given-names><surname>Antonius</surname></string-name></person-group> (eds.), <source>The political psychology of terrorism fears</source>. <publisher-loc>New York, NY</publisher-loc>: <publisher-name>Oxford University Press</publisher-name>, pp. <fpage>227</fpage>–<lpage>245</lpage>.</mixed-citation></ref><ref id="ref39"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Miller</surname>, <given-names>E</given-names></string-name></person-group>. (<year>2016</year>) <article-title><italic>Terrorist attacks targeting critical infrastructure in the United States, 1970–2015</italic></article-title>. <publisher-loc>College Park, MD</publisher-loc>: <publisher-name>START</publisher-name>.</mixed-citation></ref><ref id="ref40"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Mitcham</surname>, <given-names>C</given-names></string-name></person-group>. (<year>2015</year>) <article-title>‘Rationality in technology and in ethics’</article-title>, in <person-group person-group-type="editor"><string-name><given-names>W.J.</given-names><surname>Gonzalez</surname></string-name></person-group> (ed.), <source>New perspectives on technology, values, and ethics: theoretical and practical</source>. <publisher-loc>Cham</publisher-loc>: <publisher-name>Springer</publisher-name>, pp. <fpage>63</fpage>–<lpage>88</lpage>.</mixed-citation></ref><ref id="ref41"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Moore</surname>, <given-names>S.A</given-names></string-name>., <string-name><surname>Torrado</surname>, <given-names>M</given-names></string-name>. and <string-name><surname>Joslin</surname>, <given-names>N</given-names></string-name></person-group>. (<year>2019</year>) <article-title>‘Knowledge production for interdependent critical infrastructures: constructing context-rich relationships across ecosociotechnical boundaries’</article-title>, <source>Environmental Science &amp; Policy</source>, <volume>99</volume>, pp. <fpage>97</fpage>–<lpage>104</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.envsci.2019.05.018</pub-id>.</mixed-citation></ref><ref id="ref42"><mixed-citation publication-type="book"><person-group person-group-type="editor"><string-name><surname>Muro</surname>, <given-names>D</given-names>. (ed.)</string-name></person-group> (<year>2019</year>) <chapter-title><italic>When does terrorism work?</italic></chapter-title> <publisher-loc>London</publisher-loc>: <publisher-name>Routledge</publisher-name>.</mixed-citation></ref><ref id="ref43"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Peerenboom</surname>, <given-names>J.P</given-names></string-name>. and <string-name><surname>Fisher</surname>, <given-names>R.E</given-names></string-name></person-group>. (<year>2010</year>) <article-title>‘System and sector interdependencies: an overview’</article-title>, in <person-group person-group-type="editor"><string-name><given-names>J.G.</given-names><surname>Voeller</surname></string-name></person-group> (ed.), <source>Wiley handbook of science and technology for homeland security</source>. <publisher-loc>Hoboken, New Jersey</publisher-loc>: <publisher-name>John Wiley &amp; Sons, Inc</publisher-name>, pp. <fpage>1161</fpage>–<lpage>1171</lpage>.</mixed-citation></ref><ref id="ref44"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Piekarski</surname>, <given-names>M</given-names></string-name>. and <string-name><surname>Wojtasik</surname>, <given-names>K</given-names></string-name></person-group>. (<year>2022</year>) <article-title>‘Protection of polish critical infrastructure (CI) against air threats’</article-title>, <source>Security and Defence Quarterly</source>, <volume>39</volume>, pp. <fpage>1</fpage>–<lpage>12</lpage>. doi: <pub-id pub-id-type="doi">10.35467/sdq/14767</pub-id>.</mixed-citation></ref><ref id="ref45"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Quijano</surname>, <given-names>E</given-names></string-name>., <string-name><surname>Insua</surname>, <given-names>D.R</given-names></string-name>. and <string-name><surname>Cano</surname>, <given-names>J</given-names></string-name></person-group>. (<year>2018</year>) <article-title>‘Critical networked infrastructure protection from adversaries’</article-title>, <source>Reliability Engineering &amp; System Safety</source>, <volume>179</volume>, pp. <fpage>27</fpage>–<lpage>36</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.ress.2016.10.015</pub-id>.</mixed-citation></ref><ref id="ref46"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Ramsay</surname>, <given-names>G</given-names></string-name></person-group>. (<year>2015</year>) <article-title>‘Why terrorism can, but should not be defined’</article-title>, <source>Critical Studies on Terrorism</source>, <volume>8</volume>, pp. <fpage>211</fpage>–<lpage>228</lpage>. doi: <pub-id pub-id-type="doi">10.1080/17539153.2014.988452</pub-id>.</mixed-citation></ref><ref id="ref47"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Ranstorp</surname>, <given-names>M</given-names></string-name>. and <string-name><surname>Normark</surname>, <given-names>M</given-names></string-name></person-group>. (<year>2009</year>) <article-title>‘Detecting CBRN terrorism signatures–challenges and new approaches’</article-title>, in <person-group person-group-type="editor"><string-name><given-names>M.</given-names><surname>Ranstorp</surname></string-name> and <string-name><given-names>M.</given-names><surname>Normark</surname></string-name></person-group> (eds.), <source>Unconventional weapons and international terrorism. Challenges and new approaches</source>. <publisher-loc>New York, NY</publisher-loc>: <publisher-name>Routledge</publisher-name>, pp. <fpage>1</fpage>–<lpage>10</lpage>.</mixed-citation></ref><ref id="ref48"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Reniers</surname>, <given-names>G.L.L</given-names></string-name>. and <string-name><surname>Audenaert</surname>, <given-names>A</given-names></string-name></person-group>. (<year>2014</year>) <article-title>‘Preparing for major terrorist attacks against chemical clusters: intelligently planning protection measures w.r.t. domino effects’</article-title>, <source>Process Safety and Environmental Protection</source>, <volume>92</volume>, pp. <fpage>583</fpage>–<lpage>589</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.psep.2013.04.002</pub-id>.</mixed-citation></ref><ref id="ref49"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Richards</surname>, <given-names>A</given-names></string-name></person-group>. (<year>2014</year>) <article-title>‘Conceptualizing terrorism’</article-title>, <source>Studies in Conflict &amp; Terrorism</source>, <volume>37</volume>, pp. <fpage>213</fpage>–<lpage>236</lpage>. doi: <pub-id pub-id-type="doi">10.1080/1057610X.2014.872023</pub-id>.</mixed-citation></ref><ref id="ref50"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Rodríguez</surname>, <given-names>H</given-names></string-name></person-group>. (<year>2015</year>) <article-title>‘Risk and trust in institutions that regulate strategic technological innovations: challenges for a socially legitimate risk analysis’</article-title>, in <person-group person-group-type="editor"><string-name><given-names>W.J.</given-names><surname>Gonzalez</surname></string-name></person-group> (ed.), <source>New perspectives on technology, values, and ethics: theoretical and practical</source>. <publisher-loc>Cham</publisher-loc>: <publisher-name>Springer</publisher-name>, pp. <fpage>147</fpage>–<lpage>166</lpage>.</mixed-citation></ref><ref id="ref51"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Runciman</surname>, <given-names>D</given-names></string-name></person-group>. (<year>2006</year>) <chapter-title><italic>The politics of good intentions. History, fear and hypocrisy in the new world order</italic></chapter-title>. <publisher-loc>Princeton, NJ</publisher-loc>: <publisher-name>Princeton University Press</publisher-name>.</mixed-citation></ref><ref id="ref52"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Rydin</surname>, <given-names>Y</given-names></string-name>., <string-name><surname>Natarajan</surname>, <given-names>L</given-names></string-name>., <string-name><surname>Lee</surname>, <given-names>M</given-names></string-name>. and <string-name><surname>Lock</surname>, <given-names>S</given-names></string-name></person-group>. (<year>2018</year>) <article-title>‘Black-boxing the evidence: planning regulation and major renewable energy infrastructure projects in England and Wales’</article-title>, <source>Planning Theory &amp; Practice</source>, <volume>19</volume>, pp. <fpage>218</fpage>–<lpage>234</lpage>. doi: <pub-id pub-id-type="doi">10.1080/14649357.2018.1456080</pub-id>.</mixed-citation></ref><ref id="ref53"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Schön</surname>, <given-names>D</given-names></string-name></person-group>. (<year>1983</year>) <chapter-title><italic>The reflective practitioner: how professionals think in action</italic></chapter-title>. <publisher-loc>London</publisher-loc>: <publisher-name>Temple Smith</publisher-name>.</mixed-citation></ref><ref id="ref54"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Shindell</surname>, <given-names>M</given-names></string-name></person-group>. (<year>2020</year>) <article-title>‘Outlining the black box: an introduction to four papers’</article-title>, <source>Science, Technology, &amp; Human Values</source>, <volume>45</volume>, pp. <fpage>567</fpage>–<lpage>574</lpage>. doi: <pub-id pub-id-type="doi">10.1177/0162243919883414</pub-id>.</mixed-citation></ref><ref id="ref55"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>The 9/11 Commission Report</collab></person-group>. (<year>2004</year>) <article-title><italic>Final report of the national commission on terrorist attacks upon the United States</italic></article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.govinfo.gov/app/details/GPO-911REPORT">https://www.govinfo.gov/app/details/GPO-911REPORT</ext-link> (Accessed: 1 September 2021).</mixed-citation></ref><ref id="ref56"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Van Der Does</surname>, <given-names>R</given-names></string-name>., <string-name><surname>Kantorowicz</surname>, <given-names>J</given-names></string-name>., <string-name><surname>Kuipers</surname>, <given-names>S</given-names></string-name>. and <string-name><surname>Liem</surname>, <given-names>M</given-names></string-name></person-group>. (<year>2019</year>) <article-title>‘Does terrorism dominate citizens’ hearts or minds? The relationship between fear of terrorism and trust in government’</article-title>, <source>Terrorism and Political Violence</source>, <volume>33</volume>, pp. <fpage>1276</fpage>–<lpage>1294</lpage>. doi: <pub-id pub-id-type="doi">10.1080/09546553.2019.1608951</pub-id>.</mixed-citation></ref><ref id="ref57"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Wang</surname>, <given-names>S</given-names></string-name>., <string-name><surname>Hong</surname>, <given-names>L</given-names></string-name>., <string-name><surname>Ouyang</surname>, <given-names>M</given-names></string-name>., <string-name><surname>Zhang</surname>, <given-names>J</given-names></string-name>. and <string-name><surname>Chen</surname>, <given-names>X</given-names></string-name></person-group>. (<year>2013</year>) <article-title>‘Vulnerability analysis of interdependent infrastructure systems under edge attack strategies’</article-title>, <source>Safety Science</source>, <volume>51</volume>, pp. <fpage>328</fpage>–<lpage>337</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.ssci.2012.07.003</pub-id>.</mixed-citation></ref><ref id="ref58"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Wiśniewski</surname>, <given-names>M</given-names></string-name></person-group>. (<year>2016</year>) <article-title>‘Concept of situational management of safety critical infrastructure of state’</article-title>, <source>Foundations of Management</source>, <volume>8</volume>, pp. <fpage>297</fpage>–<lpage>310</lpage>. doi: <pub-id pub-id-type="doi">10.1515/fman-2016-0023</pub-id>.</mixed-citation></ref><ref id="ref59"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Żaboklicka</surname>, <given-names>E</given-names></string-name></person-group>. (<year>2020</year>) <article-title>‘Critical infrastructure in the shaping of national security’</article-title>, <source>Security and Defence Quarterly</source>, <volume>28</volume>(<issue>1</issue>), pp. <fpage>70</fpage>–<lpage>81</lpage>. doi: <pub-id pub-id-type="doi">10.35467/sdq/118585</pub-id>.</mixed-citation></ref><ref id="ref60"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Zio</surname>, <given-names>E</given-names></string-name></person-group>. (<year>2016</year>) <article-title>‘Critical infrastructures vulnerability and risk analysis’</article-title>, <source>European Journal for Security Research</source>, <volume>1</volume>, pp. <fpage>97</fpage>–<lpage>114</lpage>.</mixed-citation></ref></ref-list></back></article>
