The Internet of Things and Terrorism: A Cause for Concern
Chapter
First Online:
- 10 Downloads
Abstract
Over recent years, there have been rapid advances in information and communication technology. The Internet of Things (IoT), an instance of such technologies, has brought numerous benefits to societies, revolutionising the lifestyles of many individuals living in these societies. Whilst advances in the IoT undoubtedly offer numerous benefits, they simultaneously present a wide range of new security threats that can have devastating impacts on societies.
This chapter aims to examine security risks posed by or against the IoT ecosystem from a counterterrorism perspective. To this end, the chapter will briefly examine the potential implications of the IoT phenomenon this for terrorism and hence counterterrorism.
Keywords
The Internet of Things Cybersecurity Terrorism Network security Counterterrorism Security challenges Cyber threatsReferences
- Benson, D. C. (2014). Why the Internet is not increasing terrorism. Security Studies, 23(2), 293–328.CrossRefGoogle Scholar
- Boeke, S. (2016). Al Qaeda in the Islamic Maghreb: Terrorism, insurgency, or organized crime? Small Wars & Insurgencies, 27(5), 914–936.CrossRefGoogle Scholar
- Conway, M. (2017). Determining the role of the internet in violent extremism and terrorism: Six suggestions for progressing research. Studies in Conflict & Terrorism, 40(1), 77–98.CrossRefGoogle Scholar
- Copeland, T. (2001). Is the “new terrorism” really new?: An analysis of the new paradigm for terrorism. Journal of Conflict Studies, 21(2), 7–27.Google Scholar
- Crawford, D., & Sherman, J. (2018). Gaps in United States federal government IoT security and privacy policies. Journal of Cyber Policy, 3(2), 187–200.CrossRefGoogle Scholar
- Crenshaw, M. (2003). Is today’s “new” terrorism qualitatively different from pre-September 11 “old” terrorism? Palestine-Israel Journal, 10(1).Google Scholar
- Dhar, S., & Bose, I. (2021). Securing IoT devices using zero trust and blockchain. Journal of Organizational Computing and Electronic Commerce, 31(1), 18–34.CrossRefGoogle Scholar
- English, R. (2010). Terrorism: How to respond. Oxford University Press.Google Scholar
- FBI. (2021). 9/11 Investigation. Retrieved July 17, 2021, from https://www.fbi.gov/history/famous-cases/911-investigation
- Field, A. (2009). The ‘new terrorism’: Revolution or evolution? Political Studies Review, 7(2), 195–207.CrossRefGoogle Scholar
- Fleming, M. (1980). Propaganda by the deed: Terrorism and anarchist theory in late nineteenth-century Europe. Studies in Conflict & Terrorism, 4(1–4), 1–23.Google Scholar
- Hoffman, B. (2010). The evolving nature of terrorism—Nine years after the 9/11 attacks. Retrieved July 15, 2021, from https://www.govinfo.gov/content/pkg/CHRG-111hhrg66029/html/CHRG-111hhrg66029.htm
- Horowitz, M. C. (2015). The rise and spread of suicide bombing. Annual Review of Political Science, 18, 69–84.CrossRefGoogle Scholar
- Jenkins, B. M. (2006). The new age of terrorism. In The McGraw-Hill homeland security handbook (pp. 117–130).Google Scholar
- Jensen, R. B. (2008). Nineteenth century anarchist terrorism: How comparable to the terrorism of Al-Qaeda? Terrorism and Political Violence, 20(4), 589–596.CrossRefGoogle Scholar
- Jensen, R. B. (2009). The international campaign against anarchist terrorism, 1880–1930s. Terrorism and Political Violence, 21(1), 89–109.CrossRefGoogle Scholar
- Khan, M. A., & Salah, K. (2018). IoT security: Review, blockchain solutions, and open challenges. Future Generation Computer Systems, 82, 395–411.CrossRefGoogle Scholar
- Koehler, D. (2014). The radical online: Individual radicalization processes and the role of the Internet. Journal for Deradicalization, 1, 116–134.Google Scholar
- Laqueur, W. (1998). The new face of terrorism. Washington Quarterly, 21(4), 167–178.CrossRefGoogle Scholar
- Lubrano, M. (2021). Stop the machines: How emerging technologies are fomenting the war on civilization. Terrorism and Political Violence, 1–17.Google Scholar
- Mendez Mena, D., Papapanagiotou, I., & Yang, B. (2018). Internet of things: Survey on security. Information Security Journal: A Global Perspective, 27(3), 162–182.Google Scholar
- Montasari, R., & Hill, R. (2019). Next-generation digital forensics: Challenges and future paradigms. In 2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3) (pp. 205–212). IEEE.CrossRefGoogle Scholar
- Morgan, M. J. (2004). The origins of the new terrorism. Military Intelligence BN (125th) Schofield Barracks HI. Retrieved July 17, 2021, from https://apps.dtic.mil/sti/citations/ADA597084
- Rapoport, D. C. (1983). Fear and trembling: Terrorism in three religious traditions. American Political Science Review, 78(3), 658–677.CrossRefGoogle Scholar
- Rapoport, D. C. (2001). The fourth wave: September 11 in the history of terrorism. Current History, 100(650), 419–424.CrossRefGoogle Scholar
- Sandler, T., & Enders, W. (2004). An economic perspective on transnational terrorism. European Journal of Political Economy, 20, 301–316.CrossRefGoogle Scholar
- Stoyanova, M., Nikoloudakis, Y., Panagiotakis, S., Pallis, E., & Markakis, E. K. (2020). A survey on the internet of things (IoT) forensics: Challenges, approaches, and open issues. IEEE Communications Surveys & Tutorials, 22(2), 1191–1221.CrossRefGoogle Scholar
- Torres-Soriano, M. R. (2021). Barriers to entry to Jihadist activism on the Internet. Studies in Conflict & Terrorism, 1–18.Google Scholar
- United States Government. (2004). The 9/11 Commission Report. Retrieved July 15, 2021, from https://www.9-11commission.gov/report/911Report.pdf
- Weimann, G. (2006). Terror on the Internet: The new arena, the new challenges. US Institute of Peace Press.Google Scholar
Copyright information
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2022