Terrorism and IT: Cyberterrorism and Terrorist Organisations Online
September 18, 2023
Chapter, “Terrorism and IT: cyberterrorism and terrorist organisations online” in book: Howard, Russell D. and Sawyer, Reid L., (eds.) Terrorism and counterterrorism: understanding the new security environment, readings and interpretations ...
Terrorism & Internet Governance: Core Issues
September 18, 2023
Both global governance and the sub-set of issues that may be termed ‘internet governance’ are vast and complex issue areas. The difficulties of trying to ‘legislate’ at the global level – efforts that must encompass the economic, cultural, developmental, legal, and political concerns of diverse states and other stakeholders – are further complicated by the ...
Cyberterrorism: Hype and Reality
September 18, 2023
Chapter “Cyberterrorism: hype and reality” in book: Armistead, Leigh, (ed.) Information warfare: separating hype from reality ...
Terrorism and New Media: the Cyber-Battlespace
September 18, 2023
Chapter, “Terrorism and new media: the cyber-battlespace”, in book: Forest, James F., (ed.) Countering terrorism and insurgency in the 21st Century. ...
Terrorism and the Internet: New Media – New Threat?
September 18, 2023
The Internet is a powerful political instrument, which is increasingly employed by terrorists to forward their goals. The five most prominent contemporary terrorist uses of the Net are information provision, financing, networking, recruitment, and information gathering. This article describes and explains each of these uses and follows up with examples. The final section of the ...
Cyberterrorism: Media Myth or Clear and Present Danger?
September 18, 2023
Chapter, “Cyberterrorism: media myth or clear and present danger?” in book: Irwin, Jones, (ed.) War and virtual war: the challenges to communities. ...
Hackers as Terrorists? Why it Doesn’t Compute
September 18, 2023
The bulk of this article is concerned with showing why computer hackers and terrorists are unlikely to form an unholy alliance to engage in so-called cyberterrorism. The remainder of the paper examines why neither hacktivists nor crackers fall easily into the cyberterrorist category either. ...
Code wars: Steganography, Signals Intelligence, and Terrorism
September 18, 2023
This paper describes and discusses the process of secret communication known as steganography. The argument advanced here is that terrorists are unlikely to be employing digital steganography to facilitate secret intra-group communication as has been claimed. This is because terrorist use of digital steganography is both technically and operationally implausible. The position adopted in this ...
Cyberterrorism: the story so far
September 18, 2023
This paper is concerned with the origins and development of the concept of cyberterrorism. It seeks to excavate the story of the concept through an analysis of both popular/media renditions of the term and scholarly attempts to define the borders of same. The contention here is not that cyberterrorism cannot happen or will not happen, ...
Media, Fear and the Hyperreal: the Construction of Cyberterrorism as the Ultimate Threat to Critical Infrastructures
September 18, 2023
Analysis of the construction of the cyberterrorist threat, with the core argument that US media outlets have been significant contributors not just to the dissemination, but to the actual discursive construction of the contemporary cyberterrorist threat and, further, that it is their emphasis on the (imagined) fatal connectivity between virtual networks and physical infrastructures that ...