The Devil’s Long Tail: Religious and Other Radicals in the Internet Marketplace
September 18, 2023
This book is concerned with the links or relationships between religious radicalism, violent extremism and the Internet. ...
‘Bomb-Making for Beginners’: Inside al Al-Qaeda E-Learning Course
September 18, 2023
This study explores how terrorists utilise the Internet to learn bomb-making skills. Unlike previous studies, it does not focus on assessing the quality of online bomb recipes. Rather, it discusses the efforts being made by on-line jihadists to help others learn by providing so-called “e-learning courses.” As of today, such courses have few active participants ...
Social Networking Sites and the Surveillance Society: A Critical Case Study of the Usage of studiVZ, Facebook, and MySpace by Students in Salzburg in the Context of Electronic Surveillance
September 18, 2023
Advertising, business, community, privacy concerns, politics, sex, love – these are issues that are associated with the term social networking platforms in popular media clippings, such as the ones just cited. The examples, which certainly have differing depth, character, and quality, show that social networking sites (SNS) and what many term “Web 2.0” have become ...
Oversight of security-sensitive research material in UK universities: Guidance
September 18, 2023
Universities play a vital role in carrying out research on issues where security-sensitive material is relevant. This guidance document concerns the storage and circulation of security- sensitive research material. If circulated carelessly, such material is sometimes open to misinterpretation by the authorities, and can put authors in danger of arrest and prosecution under, for example, ...
Bastard Culture! How User Participation Transforms Cultural Production
September 18, 2023
On how participation via Internet and social media transform cultural production ...
Countering Militant Islamist Radicalisation on the Internet: A User Driven Strategy to Recover the Web
September 18, 2023
A strategy to counter violent radicalisation on the Internet must be user driven, empowering Internet users with “cultural intelligence”. Cultural intelligence is essentially shorthand for an understanding of the key pillars of, and vulnerabilities inherent in, militant Islamist rhetoric. What this report calls “Enabling Stakeholders”, such as schools, and religious and community organisations, can disseminate ...
Role Of Intelligence In Countering Terrorism on the Internet: Revisiting 3/11
September 18, 2023
In this paper we argue that understanding terrorism within the new cyber environment of the twenty-first century is paramount for the intelligence services in the dawn of the 21st century. We believe that the intelligence services will have to confront this new trend in terrorism tactics in years to come whether they are fully prepared ...
Youth Online and at Risk: Radicalisation Facilitated by the Internet
September 18, 2023
While the internet provides access to rich educational experiences, great entertainment, and the chance to connect with friends around the clock, it also creates a number of risks that young people, parents, and guardians need to be aware of. There are the commonly known concerns of identity theft, online predators, and cyber-bullying but there is ...
The Virtual Sanctuary of Al-Qaeda and Terrorism in an Age of Globalisation
September 18, 2023
Chapter in Johan Eriksson, Giampiero Giacomello, ‘International Relations and Security in the Digital Age’ – The fusion of globalisation and terrorism in the 21 century created a new, adaptable and complex form of ‘networked’ asymmetric adversary. For al-Qaeda and its successor affiliates Internet has become not just a virtual sanctuary, where every dimension of the ...
Network Technologies for Networked Terrorists: Assessing the Value of Information and Communication Technologies to Modern Terrorist Organizations
September 18, 2023
This report analyzes terrorist groups’ use of advanced information and communication technologies in efforts to plan, coordinate, and command their operations. It is one component of a larger study that examines terrorists’ use of technology, a critical arena in the war against terrorism. The goal of the investigation reported here is to identify which network ...