Skip to main content
Log in

Similarities between terrorist networks in antiquity and present-day cyberterrorist networks

  • Published:
Trends in Organized Crime Aims and scope Submit manuscript

Abstract

This paper analyzes the similarities between terrorist networks in Antiquity and cyberterrorist networks today. By establishing comparisons between networks from two classes of terrorists whose actions were recorded 2,000 years apart, this paper adds substance to the understanding of the superiority of networks to archetypical organizational structures (i.e., with a hierarchically-based order). By identifying three major factors, many analogies can be drawn, based on empirical statements found throughout this analysis, between cyberterrorist networks in this day and age and terrorist networks in Antiquity. Those factors are (1) similar patterns of communication, (2) similar connections and kinship webs, and (3) similar obstacles.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  • Arquilla J, Ronfeldt D (2001) The advent of netwar (revisited): the future of terror, crime, and militancy. In: Arquilla J, Ronfeldt D (eds) Networks and netwars. RAND, Santa Monica, pp 1–28

    Google Scholar 

  • Baker FW III (2008) Captured al Qaeda documents detail shift in support. Am Forces Press Serv 1:10–15

    Google Scholar 

  • Baker WE, Faulkner RR (1993) The social organization of conspiracy: illegal networks in the heavy electrical equipment industry. Am Sociol Rev 58:837–860

    Article  Google Scholar 

  • Barabasi AL (2002) Linked: the new science of networks. Perseus, Cambridge, MA

    Google Scholar 

  • Bavelas A (1950) Communication patterns in task-oriented groups. J Acoust Soc Am 22:725–730

    Article  Google Scholar 

  • Ben-Yehuda N (1998) Where Masada’s defenders fell. Biblic Archaeol Rev 24(6):32–39

    Google Scholar 

  • Bilde P (1988) Flavius Josephus between Jerusalem and Rome: his life, his works, and their importance. Sheffield Academic, Sheffield

    Google Scholar 

  • Block A (1979) East-side–west-side: organizing crime in New York 1939–1959. Christopher Davis, Swansea, UK

    Google Scholar 

  • Brynjolfsson E, Mendelson H (1993) Information systems and the organization of modern enterprise. J Organ Comput 3:4

    Google Scholar 

  • Chaliand G, Blin A (2007) The history of terrorism: from Antiquity to al Qaeda. University of California Press, Berkeley

    Google Scholar 

  • Clem A, Galwankar S, Buck G (2003) Health implications of cyber-terrorism. Prehosp Disaster Med 18(3):272–275

    Google Scholar 

  • Davidson J (1997) Courtesans and fishcakes: the consuming passions of classical Athens. Fontana, London

    Google Scholar 

  • Degenne A, Forse M (1999) Introducing social networks. Sage, London

    Google Scholar 

  • Denning DE (1999) Cyberterrorism. Testimony before the special oversight panel on terrorism committee on Armed Services U.S. House of Representatives, Georgetown University, DC

  • Denning DE (2001) Activism, hacktivism, and cyberterrorism. The internet as a tool for influencing foreign policy. In: Arquilla J, Ronfeldt D (eds) Networks and netwars. RAND, Santa Monica, CA, pp 239–288

    Google Scholar 

  • Donath JS (1999) Identity and deception in the virtual community. In: Smith MA, Kollock P (eds) Communities in cyberspace. Routledge, New York, pp 29–59

    Google Scholar 

  • Dunnigan JF (2003) The next war zone: confronting the global threat of cyberterrorism. Citadel, New York

    Google Scholar 

  • Eco U (1986) Towards a semiological guerrilla warfare. In: Eco U (ed) Travels in hyperreality. Harcourt, San Diego, pp 135–144

    Google Scholar 

  • Feldman LH, Hata G (1987) Josephus, judaism, and christianity. Wayne State University Press, Detroit

    Google Scholar 

  • Fisher N (1998) Workshops of villains: was there much organised crime in classical Athens? In: Hopwood K (ed) Organised crime in Antiquity. Duckworth, London, pp 53–96

    Google Scholar 

  • Freeman LC (1981) Social networks: a beginner’s bookshelf. Soc Netw 4(2):6–10

    Google Scholar 

  • Gray R (1993) Prophetic figures in late second temple Jewish Palestine: the evidence from Josephus. Oxford University Press, Oxford

    Google Scholar 

  • Greenberg E (2003) Mission-critical security planner: when hackers won’t take no for an answer. Wiley, New York

    Google Scholar 

  • Heydebrand WV (1989) New organizational forms. Work Occup 16(3):323–357

    Article  Google Scholar 

  • Holmes L (2007) Terrorism, organised crime and corruption: networks and linkages. Edward Elgar, Northampton, MA

    Google Scholar 

  • Hopwood K (1998) Bandits between grandees and the state: the structure of order in Roman Rough Cilicia. In: Hopwood K (ed) Organised crime in Antiquity. Duckworth, London, pp 177–206

    Google Scholar 

  • Janczewski LJ, Colarik AM (2007) Cyber warfare and cyber terrorism. Idea Group, Hershey, PA

    Google Scholar 

  • Johnson G (2000) First cells, then species, now the web. New York Times, p. M1, December 26

  • Josephus F (1982) The Jewish war. Steimatzky, Israel

    Google Scholar 

  • Kenney M (2007) From Pablo to Osama: trafficking and terrorist networks, government bureaucracies, and competitive adaptation. Pennsylvania State University Press, Philadelphia

    Google Scholar 

  • Klein H, Myers M (1999) A set of principles for conducting and evaluating interpretive field studies in information systems. MIS Q 23(1):67–93

    Article  Google Scholar 

  • Laqueur W (1999a) Terrorism and history. Oxford University Press, Oxford

    Google Scholar 

  • Laqueur W (1999b) The new terrorism: fanaticism and the arms of mass destruction. Oxford University Press, Oxford

    Google Scholar 

  • Leavitt HJ (1951) Some effects of certain communication patterns on group performance. J Abnorm Soc Psychol 46:38–50

    Article  Google Scholar 

  • Lenzner R, Vardi N (2007) The next threat. Forbes 174(5):15–21

    Google Scholar 

  • Lipnack J, Stamps J (1986) The networking book: people connecting with people. Routledge and Kegan Paul, New York

    Google Scholar 

  • Madorsky Elman N, Kennedy-Moore E (2003) The unwritten rules of friendship: simple strategies to help your child make friends. Little, Brown, and Company, New York

    Google Scholar 

  • Maier P (1993) Flavius Josephus: the essential writings. Kregel, Grand Rapids, MI

    Google Scholar 

  • Mansfield R (2000) Hacker attack. Sybex, San Francisco

    Google Scholar 

  • Martin CA (2006) Understanding terrorism: challenges, perspectives, and issues. Sage, Thousand Oaks, CA

    Google Scholar 

  • Matusitz J (2005) Deception in the virtual world: a semiotic analysis of identity. J New Media Culture 3(1):54–63

    Google Scholar 

  • Matusitz J (2008) Postmodernism and networks of cyberterrorists. J Digital Forensic Practice 2:1–10

    Article  Google Scholar 

  • Matusitz J, O’Hair D (2007) The role of the Internet in terrorism. In: O’Hair D, Heath R, Ayotte K, Ledlow GR (eds) Terrorism: communication and rhetorical perspectives. Hampton, Cresskill, NJ

    Google Scholar 

  • McNamara J (2003) Secrets of computer espionage: tactics and countermeasures. Wiley, Indianapolis

    Google Scholar 

  • Mitchell S (1998) Native rebellion in the Pisidian Taurus. In: Hopwood K (ed) Organised crime in Antiquity. Duckworth, London, pp 155–175

    Google Scholar 

  • Mitnick KD, Simon WL (2002) The art of deception: controlling the human element of security. Wiley, Indianapolis

    Google Scholar 

  • Monge PR, Contractor NS (2001) Emergence of communication networks. In: Jablin FM, Putman LL (eds) The new handbook of organizational communication: advances in theory, research, and methods. Sage, Thousand Oaks, CA, pp 440–502

    Google Scholar 

  • Monge PR, Contractor NS (2003) Theories of communication networks. Oxford University Press, New York

    Google Scholar 

  • Monge PR, Fulk J (1999) Communication technology for global network organizations. In: Desanctis G, Fulk J (eds) Shaping organizational form: communication, connection, and community. Sage, Thousand Oaks, CA, pp 70–101

    Google Scholar 

  • Pillar PR (2001) Terrorism and U.S. foreign policy. Brookings Institution Press, Washington, DC

    Google Scholar 

  • Powell WW (1990) Neither market nor hierarchy: network forms of organization. Res Organ Behav 12:295–336

    Google Scholar 

  • Raab J, Milward HB (2003) Dark networks as problems. J Public Adm Res Theory 13(4):413–439

    Article  Google Scholar 

  • Rajak T (1984) Josephus: the historian and his society. Fortress, Philadelphia

    Google Scholar 

  • Ranstorp M (1994) Hizbollah’s command leadership: Its structure, decision-making and relationship with Iranian clergy and institutions. Terrorism Polit Violence 6(3):300–318

    Google Scholar 

  • Regan T (1999) Balkans war reaches our corner of the Web. Christ Sci Monit 91(97):15

    Google Scholar 

  • Report of the Defense Science Board Task Force on Information Warfare Defense (1996) Department of Defense, Washington, p. A3, November

  • Rosenthal U, Muller ER (2008) The evil of terrorism: diagnosis and countermeasures. Charles C., Thomas, Springfield, IL

    Google Scholar 

  • Schneier B (1996) Applied cryptography. Wiley, New York

    Google Scholar 

  • Schwartau W (2001) Cybershock: surviving hackers, phreakers, identity thieves, internet terrorists and weapons of mass disruption. Thunder’s Mouth, New York

    Google Scholar 

  • Schwartz J (1999) Used to be, the internet was a safe place to play. Washington Post, p. C01, June 15

  • Schweitzer GE (2002) A faceless enemy: the origins of modern terrorism. Perseus, Cambridge, MA

    Google Scholar 

  • Scott J (2000) Social network analysis: an introduction. Sage, New York

    Google Scholar 

  • Scott J (2004) Social network analysis: a handbook. Sage, Thousand Oaks, CA

    Google Scholar 

  • Shaw B (1990) Bandit highlands and lowland peace: the mountains of Isauria-Cilicia. J Econ Soc Hist Orient 33:199–233

    Article  Google Scholar 

  • Sheldon R (2005) Intelligence activities in Ancient Rome: trust the gods, but verify. Frank Cass, London, England

    Google Scholar 

  • Simon H (1973) The structure of ill-structured problems. Artif Intell 4:181–201

    Article  Google Scholar 

  • Smith M (1971) Zealots and Sicarii: their origins and relation. Harv Theol Rev 64:1–19

    Google Scholar 

  • Stallings W (1998) Cryptography and network security: principles and practice. Prentice Hall, New Jersey

    Google Scholar 

  • Thackeray J (1968) Josephus: the man and the historian. Ktav, New York

    Google Scholar 

  • Thornburgh N, Forney M, Bennett B, Burger TJ, Shannon E (2005) The invasion of the Chinese cyberspies (and the man who tried to stop them). Time 166(10):34–39

    Google Scholar 

  • Verton D (2003) Black ice: the invisible threat of cyber-terrorism. McGraw-Hill, New York

    Google Scholar 

  • Waits C, Shors D (1999) Unabomber: the secret life of Ted Kaczynski. Farcountry, Helena, MT

    Google Scholar 

  • Wasserman S, Faust K (1994) Social network analysis. Cambridge University Press, Cambridge, MA

    Google Scholar 

  • Watts DJ (2003) Six degrees: the science of a connected age. W. W. Norton & Company, New York

  • Wayner P (1996) Disappearing cryptography: setting up networks with hidden communications. AP Professional, Boston

    Google Scholar 

  • Weimann G (2005) Cyberterrorism: the sum of all fears? Stud Confl Terror 48(2):129–149

    Article  Google Scholar 

  • Wellman B, Berkowitz SD (eds) (1988) Social structures: a network approach. Cambridge University Press, Cambridge, MA

  • Willis C (2001) Mob: stories of death and betrayal from organized crime. Thunder’s Mouth, New York

    Google Scholar 

  • Zanini N, Edwards SJA (2001) The networking of terror in the information age. In: Arquilla J, Ronfeldt D (eds) Networks and netwars. RAND, Santa Monica, pp 29–60

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jonathan Matusitz.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Matusitz, J. Similarities between terrorist networks in antiquity and present-day cyberterrorist networks. Trends Organ Crim 11, 183–199 (2008). https://doi.org/10.1007/s12117-008-9034-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12117-008-9034-0

Keywords

Navigation