Abstract
The Internet has a significant impact on both the process and planning behind cyber and physical acts and attempts to mitigate these threats. This paper aims to highlight the ways in which the Internet is used in both of these processes by drawing upon the attractiveness of the Internet to terrorist organisations and how they, therefore, use it to their advantage. Instances where the Internet has been used for threats or acts of terrorism and extremism are elaborated with examples. The paper also aims to explore how the Internet and intelligence can be used in the process of countering these online threats. Artificial Intelligence (AI) is one of the most discussed phenomenon in relation to cyber security and countering cyberterrorism due to the increased technological advancements in this field. To this end, the paper briefly draws upon this use of AI in organisations such as the Global Terrorism Database (GTD) and the Institute of Strategic Dialogue (ISD) and outlines how this should be the focus of many governments in protecting their national security. The discussion of this paper revolves around the potential issues and impacts of the Internet in both the methods of conducting these attacks and in countering them.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
LaFree G (2017) Terrorism and the Internet. Criminol Public Policy 16(1):93–98
Aly A, Macdonald S, Jarvis L, Chen T (2016) Violent extremism online: new perspectives on terrorism and the Internet. Routledge, Abingdon
Warf B, Grimes J (1997) Counterhegemonic discourses and the Internet. Geogr Rev 87(2):259–274
Gill P, Corner E, Conway M, Thornton A, Bloom M, Horgan J (2017) Terrorist use of the Internet by the numbers. Criminol Public Policy 16(1):99–117
GCHQ (2019) The cyber threat. GCHQ: Information. https://www.gchq.gov.uk/information/cyber-threat. Accessed 25 Apr 2022
Lowe D (2017) Prevent strategies: the problems associated in defining extremism: the case of the United Kingdom. Stud Confl Terror 40(11):917–933. https://doi.org/10.1080/1057610X.2016.1253941
Awan I (2017) Cyber-extremism: Isis and the power of social media. Society 54(2):138–149
Chen H (2007) Exploring extremism and terrorism on the web: the dark web project. In: Pacific-Asia workshop on intelligence and security informatics. Springer, Berlin, pp 1–20
Marsili M (2019) The war on cyberterrorism. Democr Secur 15(2):172–199. https://doi.org/10.1080/17419166.2018.1496826
Pollitt M (1991) Cyberterrorism—fact or fancy? Comput Fraud Secur 2:8–10
Grabosky P (2015) Organized cybercrime and national security. In: Cybercrime risks and responses, pp 67–80
Lewis JA (2002) Assessing the risks of cyber terrorism, cyber war and other cyber threats. Center for Strategic & International Studies, Washington, DC, pp 1–12
Weimann G (2004) Cyberterrorism: how real is the threat? United States Institute of Peace, Special Report 119, vol 31. https://www.ethz.ch
Denning D (2001) Activism, hacktivism, and cyberterrorism: the Internet as a tool for influencing foreign policy. In: Networks and netwars: the future of terror, crime and militancy, pp 239–288
United Nations Office on Drugs and Crime (UNODC) (2012) The use of the Internet for terrorist purposes. United Nations, Vienna
Yu S, Carroll F (2021) Implication of AI in national security: understanding the security issues and ethical challenges. In: Montasari R, Jahankhani H (eds) Artificial intelligence in cyber security: impact and implications: security challenges, technical and ethical issues, forensic investigative challenges. Springer, Cham
Rowe M, Saif H (2016) Mining Pro-ISIS radicalisation signals from social media users. In: ICWSM. Association for the Advancement of Artificial Intelligence, pp 329–338
Freiburger T, Crane JS (2008) A systematic examination of terrorist use of the Internet. Int J Cyber Criminol 2(1)
Orsini A, Vecchioni M (2019) How does one become a terrorist and why: theories of radicalization. Department of Political Science. Luiss. https://tesi.luiss.it/id/eprint/24388
Verhelst HM, Stannat AW, Mecacci G (2020) Machine learning against terrorism: how big data collection and analysis influences the privacy-security dilemma. Sci Eng Ethics 26:2975–2984. https://doi.org/10.1007/s11948-020-00254-w
Tidy J (2022) Lapsus$: Oxford teen accused of being multi-millionaire cyber-criminal. BBC NEWS. https://www.bbc.co.uk/news/technology-60864283
House of Commons Committee of Public Accounts (HCCPA) (2018) Cyber-attack on the NHS: thirty-second report of session 2017–2019. House of Commons
Corera G (2022) No 10 network targeted with spyware, says group. BBC NEWS. https://www.bbc.co.uk/news/uk-61142687
Ministry of Defence (MOD) (2011) Combating cyber attacks. Defence and armed forces. GOV.UK. https://www.gov.uk/government/news/combating-cyber-attacks
Gupta P, Varshney P, Bhatia MPS (2017) Identifying radical social media posts using machine learning. Tech Rep. https://doi.org/10.13140/RG.2.2.15311.53926
Kitrum (2020) How to use machine learning in cybersecurity? Blog. https://www.kitrum.com
Jackson P (2017) If you want to understand anti-fascist movements, you need to know this history. HuffPost. https://www.huffpost.com/entry/anti-fascist-movements_b_599b11b8e4b04c532f4348f4. Accessed 29 Mar 22
START (2022) Global terrorism database. National Consortium for the Study of Terrorism and Responses to Terrorism. https://www.start.umd.edu/gtd/about/. Accessed 12 Apr 2022
Institute for Strategic Dialogue (IDS) (2022) Institute for Strategic Dialogue. https://www.isdglobal.org/about/
Brey P (1998) Ethical aspects of information security and privacy. In: Petkovic M, Jonker W (eds) Security, privacy, and trust in modern data management. Springer, New York
Hussain Z (2017) The ABCs of machine learning: privacy and other legal concerns. Law Practices Today. https://www.lawpracticetoday.org/article/machine-learning-privacy-legal-concerns/#:~:text=%20The%20ABCs%20of%20Machine%20Learning%3A%20Privacy%20and,officer%2C%20has%20said%20that%20%E2%80%9CAI%20will...%20More%20?msclkid=5604c6d8b8c811ec94d09eb8666f6e67
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Butler, G., Montasari, R. (2023). The Impact of the Internet on Terrorism and Violent Extremism. In: Jahankhani, H. (eds) Cybersecurity in the Age of Smart Societies. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-031-20160-8_24
Download citation
DOI: https://doi.org/10.1007/978-3-031-20160-8_24
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-20159-2
Online ISBN: 978-3-031-20160-8
eBook Packages: Computer ScienceComputer Science (R0)