Terrorism and IT: Cyberterrorism and Terrorist Organisations Online
September 18, 2023
Chapter, “Terrorism and IT: cyberterrorism and terrorist organisations online” in book: Howard, Russell D. and Sawyer, Reid L., (eds.) Terrorism and counterterrorism: understanding the new security environment, readings and interpretations ...
Cyberterrorism: the story so far
September 18, 2023
This paper is concerned with the origins and development of the concept of cyberterrorism. It seeks to excavate the story of the concept through an analysis of both popular/media renditions of the term and scholarly attempts to define the borders of same. The contention here is not that cyberterrorism cannot happen or will not happen, ...
Code wars: Steganography, Signals Intelligence, and Terrorism
September 18, 2023
This paper describes and discusses the process of secret communication known as steganography. The argument advanced here is that terrorists are unlikely to be employing digital steganography to facilitate secret intra-group communication as has been claimed. This is because terrorist use of digital steganography is both technically and operationally implausible. The position adopted in this ...
Hackers as Terrorists? Why it Doesn’t Compute
September 18, 2023
The bulk of this article is concerned with showing why computer hackers and terrorists are unlikely to form an unholy alliance to engage in so-called cyberterrorism. The remainder of the paper examines why neither hacktivists nor crackers fall easily into the cyberterrorist category either. ...
Cyberterrorism: Media Myth or Clear and Present Danger?
September 18, 2023
Chapter, “Cyberterrorism: media myth or clear and present danger?” in book: Irwin, Jones, (ed.) War and virtual war: the challenges to communities. ...
Terrorism and (Mass) Communication: From Nitro to the Net
September 18, 2023
In their seminal contribution to the study of terrorism and the media, Violence as Communication (1982), Alex Schmid and Jenny De Graaf point out that before technology made possible the amplification and multiplication of speech, the maximum number of people that could be reached simultaneously was determined by the range of the human voice and ...
The Dark Net
September 18, 2023
Beyond the familiar online world that most of us inhabit lies a vast network of sites, communities and cultures where freedom is pushed to its limits. A world that is as creative and complex as it is dangerous and disturbing. A world that is much closer than you think. The Dark Net is a revelatory ...
Terrorism and the Internet: New Media – New Threat?
September 18, 2023
The Internet is a powerful political instrument, which is increasingly employed by terrorists to forward their goals. The five most prominent contemporary terrorist uses of the Net are information provision, financing, networking, recruitment, and information gathering. This article describes and explains each of these uses and follows up with examples. The final section of the ...
Terrorism and the Making of the ‘New Middle East’: New Media Strategies of Hizbollah and al Qaeda
September 18, 2023
Chapter, “Terrorism and the making of the ‘New Middle East'”, in book: Seib, Philip, (ed.) New media and the new Middle East ...
Terrorism and New Media: the Cyber-Battlespace
September 18, 2023
Chapter, “Terrorism and new media: the cyber-battlespace”, in book: Forest, James F., (ed.) Countering terrorism and insurgency in the 21st Century. ...