Cyberterrorism: A Postmodern View Of Networks Of Terror And How Computer Security Experts And Law Enforcement Officials Fight Them
September 18, 2023
The purpose of this study is to investigate how cyberterrorists create networks in order to engage in malicious activities against the Internet and computers. The purpose of the study is also to understand how computer security labs (i.e., in universities) and various agencies (that is, law enforcement agencies such as police departments and the FBI) ...
A Storm On The Horizon? ‘Twister’ And The Implications Of The Blockchain And Peer To Peer Social Networks For Online Violent Extremism
September 18, 2023
“Twister,” developed by Miguel Freitas, is a social network platform centered around micro-blogging, much like Twitter. However, rather than relying on centralized servers owned and maintained by a single firm, Twister users operate a block chain combined with distributed hash table (DHT)–like and BitTorrent-like protocols to both make posts and send private messages, and also ...
Mujahideen Mobilization: Examining The Evolution Of The Global Jihadist Movement’s Communicative Action Repertoire
September 18, 2023
Drawing on Tilly’s notion of “repertoire of action,” this article shows how the evolution of the global jihadist movement’s communicative action repertoire has increased the potential resonance of its discourse. It foresees the construction of the global jihadist movement’s discourse of mobilization as the result of the evolution of its network of actors, the context ...