Post Type Description
A Content Analysis of Persuasion Techniques Used on White Supremacist Websites
September 18, 2023The Internet has made it possible for people to access just about any information they could possibly want. Conversely, it has given organizations a vehicle through which they can get their message out to a large audience. Hate groups have found the Internet particularly appealing, because they are able to get their uncensored message out ...
From ‘Martyrdom’ Videos to Jihadi Journalism in Somalia
September 18, 2023An analysis of Harakat al-Shabab’s multimedia releases and the rapid evolution in their production quality and design over a period of two to three years. Sound quality, animation, syncing sound with visuals, and narrative structures have all improved from the group’s multimedia releases from 2007 and 2008 when its videos were relatively simple, often just ...
Media, Fear and the Hyperreal: the Construction of Cyberterrorism as the Ultimate Threat to Critical Infrastructures
September 18, 2023Analysis of the construction of the cyberterrorist threat, with the core argument that US media outlets have been significant contributors not just to the dissemination, but to the actual discursive construction of the contemporary cyberterrorist threat and, further, that it is their emphasis on the (imagined) fatal connectivity between virtual networks and physical infrastructures that ...
Terrorism and IT: Cyberterrorism and Terrorist Organisations Online
September 18, 2023Chapter, “Terrorism and IT: cyberterrorism and terrorist organisations online” in book: Howard, Russell D. and Sawyer, Reid L., (eds.) Terrorism and counterterrorism: understanding the new security environment, readings and interpretations ...
Cyberterrorism: the story so far
September 18, 2023This paper is concerned with the origins and development of the concept of cyberterrorism. It seeks to excavate the story of the concept through an analysis of both popular/media renditions of the term and scholarly attempts to define the borders of same. The contention here is not that cyberterrorism cannot happen or will not happen, ...
Code wars: Steganography, Signals Intelligence, and Terrorism
September 18, 2023This paper describes and discusses the process of secret communication known as steganography. The argument advanced here is that terrorists are unlikely to be employing digital steganography to facilitate secret intra-group communication as has been claimed. This is because terrorist use of digital steganography is both technically and operationally implausible. The position adopted in this ...
Hackers as Terrorists? Why it Doesn’t Compute
September 18, 2023The bulk of this article is concerned with showing why computer hackers and terrorists are unlikely to form an unholy alliance to engage in so-called cyberterrorism. The remainder of the paper examines why neither hacktivists nor crackers fall easily into the cyberterrorist category either. ...
Cyberterrorism: Media Myth or Clear and Present Danger?
September 18, 2023Chapter, “Cyberterrorism: media myth or clear and present danger?” in book: Irwin, Jones, (ed.) War and virtual war: the challenges to communities. ...
Terrorism and (Mass) Communication: From Nitro to the Net
September 18, 2023In their seminal contribution to the study of terrorism and the media, Violence as Communication (1982), Alex Schmid and Jenny De Graaf point out that before technology made possible the amplification and multiplication of speech, the maximum number of people that could be reached simultaneously was determined by the range of the human voice and ...
The Dark Net
September 18, 2023Beyond the familiar online world that most of us inhabit lies a vast network of sites, communities and cultures where freedom is pushed to its limits. A world that is as creative and complex as it is dangerous and disturbing. A world that is much closer than you think. The Dark Net is a revelatory ...