Terrorist ‘Use’ of the Internet and Fighting Back
Source:
Information & Security: An International Journal,Volume: 19,
p.9-30
(2006)
Keywords:
Counter-terrorism, Internet, Terrorism, Terrorist Financing, Terrorist Networking, Terrorist RecruitmentAbstract:
The Internet is a powerful political instrument, which is increasingly employed by terrorists to forward their goals. The five most prominent contemporary terrorist uses of the Net are information provision, financing, networking, recruitment, and information gathering. This article describes and explains each of these uses and is illustrated with examples of each. The final section of the paper describes the responses of government, law enforcement, intelligence agencies, and others to the terrorism-Internet nexus.
92
Views
373
Downloads
International Journal of Research Publication and Reviews
5,
no. 10
(2024):
12-24.
Research Reports
(2023):
Journal of Turkish Social Sciences Research
8,
no. 1
(2023):
Third Sector Social Economic Review
(2022):
Norman Paterson School of International Affairs
Master of International Affairs
(2022):
Legal Readings, "A Platform for Learning"
(2021):
Mestrado Integrado em Ciências Policiais
(2022):
Humanities of the South of Russia
11 (54),
no. 2
(2022):
CEE e|Dem and e|Gov Days
(2017):
Journal of Applied Security Research
7,
no. 2
(2012):
203-217.
"A critical analysis of the role of the internet in the preparation and planning of acts of terrorism."
Dynamics of Asymmetric Conflict: Pathways toward Terrorism and Genocide
4,
no. 2
(2015):
121-133.
6th International Conference on Information Warfare and Security, ICIW 2011
(2011):
"Human rights, the global war on transnational terror, and the mixed roles of ICT: A meta-analysis."
Cyber Behavior: Concepts, Methodologies, Tools, and Applications
(2014):
1260-1294 .
Journal of South India Medicolegal Association
2,
no. 2
(2010):
60-63.
Cyberterrorism: Understanding, Assessment, and Response
(2014):
155-173.
Cambridge Review of International Affairs
27,
no. 2
(2014):
226-245.
Jurnal Komunikasi: Malaysian Journal of Communication
34,
no. 2
(2018):
137-151.
(2017):
(2017):
Computer Law & Security Review
29,
no. 3
(2013):
207-215.
Journal for Deradicalization
1
(2014):
Cambridge Review of International Affair
27,
no. 2
(2014):
Violence and Gender in the Globalized World: The Intimate and the Extimate
(2015):
"Apport des théories de la gouvernance des entreprises pour définir une gouvernance du cyberespace."
(2011):
"Terroristen 2.0. Het gebruik van internet door terroristische groepen in het sociale media-tijdperk."
Faculty of Humanities Theses
Master thesis
(2015):
Social Networks, Terrorism and Counter-terrorism
(2015):
"The supremacy of online white supremacists – an analysis of online discussions by white supremacists."
Information & Communications Technology Law
24,
no. 1
(2015):
"An Easy-Using Evaluation System Model in Terrorism Based on Individual Risk Index and Classification."
International Journal of Science and Engineering Applications
5,
no. 6
(2016):
Dual degree program
Political Science & European Affairs
(2016):
Fight, Flight, Mimic: Identity Signalling in Armed Con icts, forthcoming
(2014):
Comprehensive Approach as "Sine Qua Non" for Critical Infrastructure Protection
(2014):
2016 International Conference on Social Media & Society
(2016):