Advertisement

The Internet of Things and Terrorism: A Cause for Concern

Chapter
  • 10 Downloads

Abstract

Over recent years, there have been rapid advances in information and communication technology. The Internet of Things (IoT), an instance of such technologies, has brought numerous benefits to societies, revolutionising the lifestyles of many individuals living in these societies. Whilst advances in the IoT undoubtedly offer numerous benefits, they simultaneously present a wide range of new security threats that can have devastating impacts on societies.

This chapter aims to examine security risks posed by or against the IoT ecosystem from a counterterrorism perspective. To this end, the chapter will briefly examine the potential implications of the IoT phenomenon this for terrorism and hence counterterrorism.

Keywords

The Internet of Things Cybersecurity Terrorism Network security Counterterrorism Security challenges Cyber threats 

References

  1. Benson, D. C. (2014). Why the Internet is not increasing terrorism. Security Studies, 23(2), 293–328.CrossRefGoogle Scholar
  2. Boeke, S. (2016). Al Qaeda in the Islamic Maghreb: Terrorism, insurgency, or organized crime? Small Wars & Insurgencies, 27(5), 914–936.CrossRefGoogle Scholar
  3. Conway, M. (2017). Determining the role of the internet in violent extremism and terrorism: Six suggestions for progressing research. Studies in Conflict & Terrorism, 40(1), 77–98.CrossRefGoogle Scholar
  4. Copeland, T. (2001). Is the “new terrorism” really new?: An analysis of the new paradigm for terrorism. Journal of Conflict Studies, 21(2), 7–27.Google Scholar
  5. Crawford, D., & Sherman, J. (2018). Gaps in United States federal government IoT security and privacy policies. Journal of Cyber Policy, 3(2), 187–200.CrossRefGoogle Scholar
  6. Crenshaw, M. (2003). Is today’s “new” terrorism qualitatively different from pre-September 11 “old” terrorism? Palestine-Israel Journal, 10(1).Google Scholar
  7. Dhar, S., & Bose, I. (2021). Securing IoT devices using zero trust and blockchain. Journal of Organizational Computing and Electronic Commerce, 31(1), 18–34.CrossRefGoogle Scholar
  8. English, R. (2010). Terrorism: How to respond. Oxford University Press.Google Scholar
  9. FBI. (2021). 9/11 Investigation. Retrieved July 17, 2021, from https://www.fbi.gov/history/famous-cases/911-investigation
  10. Field, A. (2009). The ‘new terrorism’: Revolution or evolution? Political Studies Review, 7(2), 195–207.CrossRefGoogle Scholar
  11. Fleming, M. (1980). Propaganda by the deed: Terrorism and anarchist theory in late nineteenth-century Europe. Studies in Conflict & Terrorism, 4(1–4), 1–23.Google Scholar
  12. Hoffman, B. (2010). The evolving nature of terrorism—Nine years after the 9/11 attacks. Retrieved July 15, 2021, from https://www.govinfo.gov/content/pkg/CHRG-111hhrg66029/html/CHRG-111hhrg66029.htm
  13. Horowitz, M. C. (2015). The rise and spread of suicide bombing. Annual Review of Political Science, 18, 69–84.CrossRefGoogle Scholar
  14. Jenkins, B. M. (2006). The new age of terrorism. In The McGraw-Hill homeland security handbook (pp. 117–130).Google Scholar
  15. Jensen, R. B. (2008). Nineteenth century anarchist terrorism: How comparable to the terrorism of Al-Qaeda? Terrorism and Political Violence, 20(4), 589–596.CrossRefGoogle Scholar
  16. Jensen, R. B. (2009). The international campaign against anarchist terrorism, 1880–1930s. Terrorism and Political Violence, 21(1), 89–109.CrossRefGoogle Scholar
  17. Khan, M. A., & Salah, K. (2018). IoT security: Review, blockchain solutions, and open challenges. Future Generation Computer Systems, 82, 395–411.CrossRefGoogle Scholar
  18. Koehler, D. (2014). The radical online: Individual radicalization processes and the role of the Internet. Journal for Deradicalization, 1, 116–134.Google Scholar
  19. Laqueur, W. (1998). The new face of terrorism. Washington Quarterly, 21(4), 167–178.CrossRefGoogle Scholar
  20. Lubrano, M. (2021). Stop the machines: How emerging technologies are fomenting the war on civilization. Terrorism and Political Violence, 1–17.Google Scholar
  21. Mendez Mena, D., Papapanagiotou, I., & Yang, B. (2018). Internet of things: Survey on security. Information Security Journal: A Global Perspective, 27(3), 162–182.Google Scholar
  22. Montasari, R., & Hill, R. (2019). Next-generation digital forensics: Challenges and future paradigms. In 2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3) (pp. 205–212). IEEE.CrossRefGoogle Scholar
  23. Morgan, M. J. (2004). The origins of the new terrorism. Military Intelligence BN (125th) Schofield Barracks HI. Retrieved July 17, 2021, from https://apps.dtic.mil/sti/citations/ADA597084
  24. Rapoport, D. C. (1983). Fear and trembling: Terrorism in three religious traditions. American Political Science Review, 78(3), 658–677.CrossRefGoogle Scholar
  25. Rapoport, D. C. (2001). The fourth wave: September 11 in the history of terrorism. Current History, 100(650), 419–424.CrossRefGoogle Scholar
  26. Sandler, T., & Enders, W. (2004). An economic perspective on transnational terrorism. European Journal of Political Economy, 20, 301–316.CrossRefGoogle Scholar
  27. Stoyanova, M., Nikoloudakis, Y., Panagiotakis, S., Pallis, E., & Markakis, E. K. (2020). A survey on the internet of things (IoT) forensics: Challenges, approaches, and open issues. IEEE Communications Surveys & Tutorials, 22(2), 1191–1221.CrossRefGoogle Scholar
  28. Torres-Soriano, M. R. (2021). Barriers to entry to Jihadist activism on the Internet. Studies in Conflict & Terrorism, 1–18.Google Scholar
  29. United States Government. (2004). The 9/11 Commission Report. Retrieved July 15, 2021, from https://www.9-11commission.gov/report/911Report.pdf
  30. Weimann, G. (2006). Terror on the Internet: The new arena, the new challenges. US Institute of Peace Press.Google Scholar

Copyright information

© The Author(s), under exclusive license to Springer Nature Switzerland AG 2022

Authors and Affiliations

  1. 1.Hillary Rodham Clinton School of LawSwansea UniversitySwanseaUK

Personalised recommendations