Cyber Security
Hosting Hate
September 18, 2023Extreme online content from far-right organisations, including the website of a banned terrorist group, is accessible via hardware based in the UK, potentially in breach of the law, and in contrast with Theresa May’s call for technology companies to act to remove terrorist content from their platforms. ...
Digital Extremisms: Readings in Violence, Radicalisation and Extremism in the Online Space
September 18, 2023This book explores the use of the internet by (non-Islamic) extremist groups, drawing together research by scholars across the social sciences and humanities. It offers a broad overview of the best of research in this area, including research contributions that address far-right, (non-Islamic) religious, animal rights, and nationalist violence online, as well as a discussion ...
Extreme Digital Speech: Contexts, Responses and Solutions
September 18, 2023Extreme digital speech (EDS) is an emerging challenge that requires co-ordination between governments, civil society and the private sector. In this report, a range of experts on countering extremism consider the challenges that EDS presents to these stakeholders, the impact that EDS has and the responses taken by these actors to counter it. By focusing ...
Three Essays on International Cyber Threats: Target Nation Characteristics, International Rivalry, and Asymmetric Information Exchange
September 18, 2023As the Internet is progressively integrated into industrial and defense-related networks around the globe, it is becoming increasing important to understand how state and sub-state groups can use Internet vulnerabilities as a conduit of attack. The current social science literature on cyber threats is largely dominated by descriptive, U.S.-centric research. While this scholarship is important, ...
Cyber-security In The European Region: Anticipatory Governance And Practices
September 18, 2023This thesis explores the nature of cyber security at the beginning of the 21st century. In the current security paradigm, security strategies based on anticipatory governance have become essential in the management of the constantly changing cyber security environment. Thus, this thesis aims to understand security strategies and governance introduced in the European region. The ...
Terrorists And Cyberspace: The Digital Battleground
September 18, 2023This thesis asks why and how terrorist organizations use the Internet to achieve three strategic goals: 1) the dissemination of propaganda, 2) recruitment and 3) fundraising. It is immediately apparent that the Internet offers a number of advantages, including low cost, global reach, and anonymity. Nonetheless, terrorist organizations vary in their exploitation of these advantages ...
Halting Boko Haram / Islamic State’s West Africa Province Propaganda In Cyberspace With Cybersecurity Technologies
September 18, 2023Terrorists use cyberspace and social media technology to create fear and spread violent ideologies, which pose a significant threat to public security. Researchers have documented the importance of the application of law and regulation in dealing with the criminal activities in cyberspace. Using routine activity theory, this article assessed the effectiveness of technological approaches to ...
Terrorists’ Use of the Internet
September 18, 2023Terrorist use of the Internet has become a focus of media, policy, and scholarly attention in recent years. Terrorists use the Internet in a variety of ways, the most important being for propaganda purposes and operations-related content, but it is also potentially a means or target of attack. This book presents revised versions of a ...
“A View from the CT Foxhole: An Interview with Brian Fishman, Counterterrorism Policy Manager, Facebook”
September 18, 2023In our interview, Brian Fishman, Facebook’s Counterterrorism Policy Manager, provides a detailed description of how Facebook is using artificial intelligence and a dedicated team of counterterrorism specialists to remove terrorism content from its platform. Given the emergence of a new generation of leadership within al-Qa`ida, it is critical to understand the evolving threat from the ...
Steganography and Terrorist Communications
September 18, 2023Steganography is the art and science of hiding the fact that communication is taking place by hiding information in other information’ (Johnson). According to nameless “U.S. officials and experts” and “U.S. and foreign officials,” terrorist groups are “hiding maps and photographs of terrorist targets and posting instructions for terrorist activities on sports chat rooms, pornographic ...