Cyberterrorism
The Evolution of Terrorism in Digital Era: Cyberterrorism, Social Media, and Modern Extremism Chapter
December 19, 2024This study explores the significant impact of the internet on terrorism and extremism by focusing on three key areas: cyberterrorism, social media usage, and attack planning. Cyberterrorism has emerged as a major threat, with incidents such as the WannaCry ransomware attack highlighting its potential to disrupt critical infrastructures. The study reveals that the low cost ...
The use of cyberterrorism in the Israel-Hamas War
October 24, 2024On October 7, 2023, during the Jewish Sabbath and festival of Simchat Torah, Hamas shocked the world by invading Israel from Gaza across multiple entry points. The results were devastating: the single largest one-day total of murdered Jews since the Nazi Holocaust. Hamas targeted civilian families, assaulted and kidnapped hundreds of other civilians who were ...
Rule of law or not? A critical evaluation of legal responses to cyberterrorism in the UK
October 24, 2024Currently the UK does not have a specific anti-cyberterrorism law, instead relying on existing anti-terrorism laws to deal with cyberterrorism. This approach raises a number of problems insofar as it can lead to legislative uncertainty and unpredictability, as well as impacting on carrying risks of over-criminalisation, a lack of counterbalance, violation of principles of proportionality ...
Le Renforcement de la Résilience Chez les Chercheurs dans le Domaine du Terrorisme
August 7, 2024VOX-Pol Blog Post. ...
Exploring Cyberterrorism, Topic Models and Social Networks of Jihadists Dark Web Forums: A Computational Social Science Approach
September 18, 2023This three-article dissertation focuses on cyber-related topics on terrorist groups, specifically Jihadists’ use of technology, the application of natural language processing, and social networks in analyzing text data derived from terrorists’ Dark Web forums. The first article explores cybercrime and cyberterrorism. As technology progresses, it facilitates new forms of behavior, including tech-related crimes known as ...
The Use of the Internet and the Internet of Things in Modern Terrorism and Violent Extremism
September 18, 2023This chapter will examine the role of the Internet and associated technology such as the Internet of Things (IoT) and cloud computing (CC) in the process of radicalisation to terrorism and violent extremism. Particular emphasis will be placed upon the role of online environments in facilitating communication and the spread of extremist ideology, as opposed ...
Mapping Global Cyberterror Networks: An Empirical Study of Al-Qaeda and ISIS Cyberterrorism Events
September 18, 2023This study explores the internal dynamics and networks of terrorist groups in cyberspace—in particular, Al-Qaeda and the Islamic State of Iraq and al-Sham (ISIS). Using a “Global Cyberterrorism Dataset” that features data on cyberterror attacks between 2011 and 2016, this research analyzes these two terrorist groups through the lens of a cyber-conflict theory that integrates ...
Research Note: More Bucks, Still No Bangs? Why a Cost-Benefit Analysis of Cyberterrorism Still Holds True
September 18, 2023Taking as reference a cost-benefit analysis of cyberterrorism published in 2004 by Studies in Conflict and Terrorism, this article briefly reviews what happened in the last 15 years in cyberterrorism research, what was correctly forecast, what was wrong and what may happen in the future. Some of the analyses published in during this period have ...