Abstract
Globalization with advanced information technologies has changed the life of the people in the world. When something occurs in one part of the world, other part of the world can be informed easily within seconds. Current information technologies such as the internet, social media, blogs, and news channels have enabled people to create virtual groups all over the world and to disseminate information easily.
Most of the states, governments, public, and private institutions have been using the advantage of the information technologies to serve their citizens and customers. Concurrently, criminals are also using the advantage of information technologies while committing crime. In other words, everything including crime and criminals has changed their structures to be compatible with the advanced information technologies.
Recently, lots of terrorist organizations have erupted especially in the Middle East and their networks are spreading out with the use of technology. Most of the terrorist organizations have been using the technology for military training of their militants, preparation, and recruitment processes. Especially the internet is almost a virtual training slot for terrorist groups. Recent studies (Weimann, Stud Confl Terrori 29(7): 623–639, 2006; Rothenberger, Rom J Commun Public Relat 14(3):7–23, 2012) have revealed that the internet is served as the library for the terrorist groups to provide instruction manuals and videos on technical and tactical areas such as making a bomb, taking hostages, and guerilla combat. As it has an appropriate space for interaction activities, potential terrorists use the advantage of interaction face of the internet to learn how to make a bomb and send instant messages to the instructors teaching illegal issues.
Thus, security forces in the face of all these developments should take the necessary precautions to fight against the terrorist organizations by standing one step ahead on the use of technology. Standing one step ahead can only be achieved by understanding the phenomena and ceaselessly updating the knowledge. Otherwise, security forces will fail if they maintain the use of old technique and tactic to fight against the terrorist groups in this technology epoch.
Based on this point of view, this study focuses on understanding the use of technology to fight terrorism. Furthermore, the study investigates some of the terrorist organizations’ use of technology to commit crime. The study attempts to shed light on the fact that different technologies have been used against humanity by terrorist groups although most of the people are not aware of that reality.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Arquilla J, Ronfeldt D, Zanini M (1999) Networks, netwar, and information-age terrorism. John Arquilla, and David Ronfeldt, “Emergence and Influnence of the Zapatista Social Netwar,” in Networkds and Netwars, ed. John Arquilla and David Ronfeldt (California:rand, 2001)
Bakunin M (1870) Letters to a Frenchman on the present crisis. https://www.marxists.org/reference/archive/bakunin/works/1870/letter-frenchman.htm
Bockstette C (2008) Jihadist terrorist use of strategic communication management techniques. George C. Marshall Center, Garmisch-Partenkirchen
Brunst PW (2010) Terrorism and the internet: new threats posed by cyberterrorism and terrorist use of the internet. In: A war on terror? Springer, New York, pp 51–78
Conway M (2002). Reality bytes: cyberterrorism and terrorist ‘use’ of the internet. First Monday. 7(11). from http://firstmonday.org/ojs/index.php/fm/article/view/1001/922. Accessed 15 May 2015
Conway M (2006) Terrorist use of the internet and fighting back. Inf Secur 19:9–30
Duyvesteyn I (2004) How new is the new terrorism? Stud Confl Terror 27(5):439–454. doi:10.1080/10576100490483750
Giacomello G (2004) Bangs for the buck: a cost-benefit analysis of cyberterrorism. Stud Confl Terror 27(5):387–408
Gibson R, Ward S (2000) A proposed methodology for studying the function and effectiveness of party and candidate web sites. Soc Sci Comput Rev 18(3):301–319
Gleick PH (2006) Water and terrorism. Water Policy 8:481–503
Hinnen TM (2004) The cyber-front in the war on terrorism: curbing terrorist use of the internet. Columbia Sci Technol Law Rev 5(5):1–42
Jarvis L, Macdonald S, Nouri L (2014) The cyberterrorism threat: findings from a survey of researchers. Stud Confl Terror 37:68–90
Johnson B (2008) NATO says cyber warfare poses as great a threat as a missile attack. The Guardian. http://www.guardian.co.uk/technology/2008/mar/06/hitechcrime.uksecurity
Jones SG, Johnston PB (2013) The future of insurgency. Stud Confl Terror 36(1):1–25. doi:10.1080/1057610X.2013.739077
Klimburg A (2012). National cyber security framework manual. NATO CCD COE Publication, Tallinn. http://www.ccdcoe.org/369.html. Accessed 03 Apr 2013
Mackinlay J (2009) The insurgent archipelago. C Hurst & Co Publishers Ltd., London
National Commission on Terror Attacks (2004) The 9/11 commission report: final report of the national commission on terrorist attacks upon the United States. W. W. Norton, New York
National Counterterrorism Center (2006). Country report on terrorism 2005, Statistical Annex
Ogun MN (2012) Terrorist use of internet: possible suggestions to prevent the usage for terrorist purposes. J Appl Secur Res 7(2):203–217. doi:10.1080/19361610.2012.656252
Piper P (2008) Nets of terror: terrorist activity on the internet. Searcher 16(10):260–266
Qin J, Zhou Y, Reid E, Lai G, Chen H (2007) Analyzing terror campaigns on the internet: technical sophistication, content richness, and web interactivity. Int J Hum Comput Stud 65(1):71–84
Richards J (2009) Denial-of-service: The Estonian cyberwar and its implications for US national security. Int Aff Rev. 18(2)
Rothenberger L (2012) Terrorist groups: using internet and social media for disseminating ideas. New tools for promoting political change. Rom J Commun Public Relat 14(3):7–23
Sieber U, & Brunst PW (2007) Cyberterrorism and Other Use of the Internet for Terrorist Purposes–Threat Analysis and Evaluation of International Conventions. Cyberterrorism. The Use of the Internet for Terrorist Purposes. Hrsg. von Council of Europe/Counter-Terrorism Task-Force
Thomas TL (2003) Al Qaeda and the internet: the danger of cyberplanning. Parameters 33(1):112–123
Tsfati Y, Weimann G (2002) www. terrorism. com: Terror on the Internet. Stud Confl Terror 25(5):317–332
Veerasamy N, Grobler M (2011) Terrorist use of the internet: exploitation and support through ICT infrastructure. In: The Proceedings of the 6th International Conference on Information Warfare and Security, 260
Weimann G (2005a) The theater of terror: the psychology of terrorism and the mass media. J Aggress Maltreat Trauma 9(3–4):379–390
Weimann G (2005b) Cyberterrorism: the sum of all fears? Stud Confl Terror 28(2):129–149
Weimann G (2006) Virtual disputes: the use of the internet for terrorist debates. Stud Confl Terror 29(7):623–639
Weimann G (2007). How modern terrorism uses the internet. Asian Tribune, World Institute for Asian Studies. 9(342). http://asiantribune.com/index.php?q + node/4627
Weimann G (2009) Terror on facebook, twitter, and youtube. Spring 16(2):45–54
Whelpton J (2009) Psychology of cyber terrorism. In: Cyberterrorism 2009 Seminar. Ekwinox, South Africa
Zhao VH, Lin WS, Liu KJR (2011) Behavior dynamics in media-sharing social networks. Cambridge University Press, Cambridge
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Tombul, F., Akdoğan, H. (2016). How Do Terrorist Organizations Use Information Technologies? Understanding Cyberterrorism. In: Dawoody, A. (eds) Eradicating Terrorism from the Middle East. Public Administration, Governance and Globalization, vol 17. Springer, Cham. https://doi.org/10.1007/978-3-319-31018-3_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-31018-3_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-31016-9
Online ISBN: 978-3-319-31018-3
eBook Packages: Economics and FinanceEconomics and Finance (R0)