Abstract
Society’s transition into an advanced technological state has facilitated the expansion of virtual communities, some of which support counter-violent extremism and radicalisation. This development has led to the ‘war on terrorism’ moving online, as more organisations have turned to virtual methods of recruitment and the dissemination of content on a global stage. The rise in this phenomenon has called for the restructuring of contemporary policies to incorporate online methodologies into their frameworks. This chapter aims to propose a cyber intelligence framework that incorporates an evidence-based, integral and multidisciplinary structure that aids in the production of effective policies and measures. The chapter provides a critical literature review and analysis of current models linked to cyber CVE to highlight the current gaps for development. The results from the analysis show that cybersecurity methods should be used to detect new online trends, which is fundamental to understanding the dynamic methods used by counter-violent extremists. From the results found, the chapter presents a model that will effectively aid decision-making processes through a six-step evaluation process. This guides the relevant stakeholders to maintaining and developing a well-structured set of measures and policies to tackle cyber CVE.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
BBC Monitoring. (2017). Analysis: Islamic state media output goes into sharp decline. London: BBC Monitoring. Retrieved March 10, 2018, from https://monitoring.bbc.co.uk/product/c1dnnj2k.
Bermingham, A., et al. (2009). Combining social network analysis and sentiment analysis to explore the potential for online radicalisation. Paper presented at the Advances in Social Networks, Analysis and Mining Conference, Athens, Greece, 20–22 July 2009. Retrieved March 10, 2018, from https://pdfs.semanticscholar.org/f2cd/7582c93c90bd21344c90852e2a0892b1cb8a.pdf.
Blanco, J. M., & Cohen, J. (2014). The future of counter-terrorism in Europe. The need to be lost in the correct direction. European Journal of Future Research, 2(1), 50.
Blanco, J. M., & Cohen, J. (2016). Knowledge, the great challenge to deal with terrorism. Revista de Estudios en Seguridad Internacional, 2(1), 43–62. Retrieved March 10, 2018, from http://www.seguridadinternacional.es/revista/?q=content/knowledge-great-challenge-deal-terrorism.
Boekhorst, A. (2013). MIL and its kind. In UNESCO, 2013: Media and information literacy for knowledge societies. Moscow: UNESCO. Retrieved March 10, 2018, from http://www.ifapcom.ru/files/News/Images/2013/mil_eng_web.pdf.
Bouhana, N., & Wikström, P. H. (2011). Al Qa’ida-influenced radicalisation: A rapid evidence assessment guided by situational action theory. Research, development and statistics. London: Home Office. Retrieved March 10, 2018, from http://www.homeoffice.gov.uk/publications/science-research-statistics/research-statistics/counter-terrorism-statistics/occ97?view=Binary.
Caltagirone, S., Pendergant, A., & Betz, C. (2013). Diamond model of intrusion analysis. Hanover, MD: Center for Cyber Threat Intelligence and Threat Research, Technical Report. Retrieved March 10, 2018, from http://www.activeresponse.org/wp-content/uploads/2013/07/diamond.pdf.
Candau, J. (2017). Ciberinteligencia, complemento perfecto para la ciberseguridad. Red Seguridad 4° trimestre. Retrieved March 10, 2018, from http://www.redseguridad.com/especialidades-tic/inteligencia/ciberinteligencia-complemento-perfecto-para-la-ciberseguridad.
Carnegie Mellon University. (2013). Cyber intelligence tradecraft project: Summary of key findings. SEI Emerging Technology Center. Retrieved March 10, 2018, from https://resources.sei.cmu.edu/library/asset-view.cfm?assetid=40201.
Cohen, J., & Blanco, J. M. (2016). Media and information literacy to tackle social polarization in Europe. In J. Singh, P. Kerr, & E. Hamburger (Eds.), MILID yearbook 2016 media and information literacy: Reinforcing human rights, countering radicalization and extremism. UNESCO. Retrieved March 10, 2018, from http://unesdoc.unesco.org/images/0024/002463/246371e.pdf.
Conway, M., & Courtney, M. (2018). Violent extremism and terrorism online in 2017. The year in review. Vox. Retrieved March 10, 2018, from http://www.voxpol.eu/download/vox-pol_publication/YiR-2017_Web-Version.pdf.
De la Corte, L. (2015). Qué sabemos y qué ignoramos sobre la radicalización yihadista?, en Antón, Joan (Coord.), Islamismo yihadista, radicalización y contrarradicalización, Inteligencia y Seguridad, Tirant lo Blanch. 97-884-9086-0588.
Demant F., & Beatrice de Graaf (2010). How to Counter Radical Narratives: Dutch Deradicalization Policy in the Case of Moluccan and Islamic Radicals’. Studies in conflict and terrorism, 33(5), 408–428.
Department of Homeland Security. (2012). Cyber skills task force report. Washington, DC: Homeland Security Advisory Council.
Freese, R. (2014). Evidence-based counterterrorism or flying blind? How to understand and achieve what works. Perspectives on Terrorism, 8(1), 37–54.
Gray, D. H., & Head, A. (2009). The importance of the internet to the post-modern terrorist and its role as a form of haven. European Journal of Scientific Research, 25(3), 396–404.
ICSR. (ed.) (2009). Countering Online Radicalisation. A Strategy for Action. Retrieved April 16, 2018, from https://cst.org.uk/docs/countering_online_radicalisation1.pdf.
iHLS. (2018). Artificial intelligence to fight online terrorism. Retrieved March 10, 2018, from https://i-hls.com/archives/81392.
Intelligence and National Security Alliance (INSA). (2015). Cyber intelligence: Preparing today’s talent for tomorrow’s threats. Retrieved March 10, 2018, from https://www.insaonline.org/cyber-intelligence-preparing-todays-talents-for-tomorrows-threats/.
Jarvis, L. (2014). How might we evaluate counterterrorism policy: The three W’s of counterterrorism. Eastminster. Retrieved April 16, 2018, from http://www.ueapolitics.org/2014/12/17/evaluate-counterterrorism-policy/.
Kundnani, A. (2012). Radicalisation: The journey of a concept. Race & Class, 54(2), 3–25. https://doi.org/10.1177/0306396812454984.
Lum, C., Kennedy, L. W., & Sherley, A. J. (2006). The effectiveness of counter-terrorism strategies. Campbell Systematic Reviews, 2(2).
Martin, N., & Rice, J. (2011). Cybercrime: Understanding and addressing the concerns of stakeholders. Computers & Security, 30, 803–814.
Milliken, J. (1999). The study of discourse in international relations: A critique of research and methods. European Journal of International Relations, 5(2), 240.
Neumann, P. R. (2016). Radicalized: New jihadists and the threat to the west. London: I.B. Tauris & Co Ltd.
Radicalization Awareness Network (RAN) (2016). The role of education in preventing radicalisation. Retrieved March 10, 2018, from https://ec.europa.eu/home-affairs/sites/homeaffairs/files/what-we-do/networks/radicalisation_awareness_network/ran-papers/docs/role_education_preventing_radicalisation_12122016_en.pdf.
RAND. (2013). 2013 RAND annual report. Retrieved March 10, 2018, from https://www.rand.org/pubs/corporate_pubs/CP1-2013.html.
Rashid, M.I. (2016). Online radicalization: Bangladesh perspective. A thesis presented to the Faculty of the U.S. Army Command and General Staff College in partial fulfilment of the requirements for the degree Master of Military Art and Science, Bangladesh University of Professionals, Dhaka, Bangladesh. Retrieved March 10, 2018, from https://www.hsdl.org/?view&did=802928.
Reinares, F., & García-Calvo, C. (2017). Dos factores que explican la radicalización yihadista en España. ARI 62/2017. Real Instituto Elcano. Retrieved March 10, 2018, from http://www.realinstitutoelcano.org/wps/wcm/connect/c0f6216d-fe2a-4667-8b11-a326220f9a22/ARI62-2017-Reinares-GarciaCalvo-Vicente-Dos-factores-explican-radicalizacion-yihadista-Espana.pdf?MOD=AJPERES&CACHEID=c0f6216d-fe2a-4667-8b11-a326220f9a22.
Romaniuk, P. (2015). Does CVe work? Lessons learned from the global effort to counter violent extremism. New York: Global Center on Cooperative Security. Retrieved March 10, 2018, from http://www.globalcenter.org/wp-content/uploads/2015/09/Does-CVE-Work_2015.pdf.
RSA. (2012). Getting ahead of advanced threats. The security division of EMC. Retrieved March 10, 2018, from https://www.rsashare.com/leadership/articles/getting-ahead-of-advanced-threats.htm.
Schmid, A.P. (2013). Radicalisation, de-radicalisation, counter-radicalisation: A conceptual discussion and literature review. ICCT Research Paper. The Hague: International Centre for Counter-Terrorism. Retrieved March 10, 2018, from http://www.icct.nl/download/file/ICCT-Schmid-Radicalisation-De-Radicalisation-Counter-Radicalisation-March-2013.pdf.
SCONUL. (2011). The SCONUL seven pillars of information literacy core model for higher education. Retrieved March 10, 2018, from https://www.sconul.ac.uk/sites/default/files/documents/coremodel.pdf.
Spencer, A. (2006). The problems of evaluating counter-terrorism. UNISCI Discussion Papers, 12, 179–201.
United Nations Office on Drugs and Crime UNODC. (2012). The use of the internet for terrorist purposes. Retrieved March 10, 2018, from https://www.unodc.org/documents/frontpage/Use_of_Internet_for_Terrorist_Purposes.pdf.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Blanco, J.M., Cohen, J., Nitsch, H. (2020). Cyber Intelligence Against Radicalisation and Violent Extremism. In: Akhgar, B., Wells, D., Blanco, J. (eds) Investigating Radicalization Trends. Security Informatics and Law Enforcement. Springer, Cham. https://doi.org/10.1007/978-3-030-25436-0_5
Download citation
DOI: https://doi.org/10.1007/978-3-030-25436-0_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-25435-3
Online ISBN: 978-3-030-25436-0
eBook Packages: EngineeringEngineering (R0)