Skip to main content

How Do Terrorist Organizations Use Information Technologies? Understanding Cyberterrorism

  • Chapter
  • First Online:
Eradicating Terrorism from the Middle East

Part of the book series: Public Administration, Governance and Globalization ((PAGG,volume 17))

  • 947 Accesses

Abstract

Globalization with advanced information technologies has changed the life of the people in the world. When something occurs in one part of the world, other part of the world can be informed easily within seconds. Current information technologies such as the internet, social media, blogs, and news channels have enabled people to create virtual groups all over the world and to disseminate information easily.

Most of the states, governments, public, and private institutions have been using the advantage of the information technologies to serve their citizens and customers. Concurrently, criminals are also using the advantage of information technologies while committing crime. In other words, everything including crime and criminals has changed their structures to be compatible with the advanced information technologies.

Recently, lots of terrorist organizations have erupted especially in the Middle East and their networks are spreading out with the use of technology. Most of the terrorist organizations have been using the technology for military training of their militants, preparation, and recruitment processes. Especially the internet is almost a virtual training slot for terrorist groups. Recent studies (Weimann, Stud Confl Terrori 29(7): 623–639, 2006; Rothenberger, Rom J Commun Public Relat 14(3):7–23, 2012) have revealed that the internet is served as the library for the terrorist groups to provide instruction manuals and videos on technical and tactical areas such as making a bomb, taking hostages, and guerilla combat. As it has an appropriate space for interaction activities, potential terrorists use the advantage of interaction face of the internet to learn how to make a bomb and send instant messages to the instructors teaching illegal issues.

Thus, security forces in the face of all these developments should take the necessary precautions to fight against the terrorist organizations by standing one step ahead on the use of technology. Standing one step ahead can only be achieved by understanding the phenomena and ceaselessly updating the knowledge. Otherwise, security forces will fail if they maintain the use of old technique and tactic to fight against the terrorist groups in this technology epoch.

Based on this point of view, this study focuses on understanding the use of technology to fight terrorism. Furthermore, the study investigates some of the terrorist organizations’ use of technology to commit crime. The study attempts to shed light on the fact that different technologies have been used against humanity by terrorist groups although most of the people are not aware of that reality.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Arquilla J, Ronfeldt D, Zanini M (1999) Networks, netwar, and information-age terrorism. John Arquilla, and David Ronfeldt, “Emergence and Influnence of the Zapatista Social Netwar,” in Networkds and Netwars, ed. John Arquilla and David Ronfeldt (California:rand, 2001)

    Google Scholar 

  • Bakunin M (1870) Letters to a Frenchman on the present crisis. https://www.marxists.org/reference/archive/bakunin/works/1870/letter-frenchman.htm

  • Bockstette C (2008) Jihadist terrorist use of strategic communication management techniques. George C. Marshall Center, Garmisch-Partenkirchen

    Google Scholar 

  • Brunst PW (2010) Terrorism and the internet: new threats posed by cyberterrorism and terrorist use of the internet. In: A war on terror? Springer, New York, pp 51–78

    Chapter  Google Scholar 

  • Conway M (2002). Reality bytes: cyberterrorism and terrorist ‘use’ of the internet. First Monday. 7(11). from http://firstmonday.org/ojs/index.php/fm/article/view/1001/922. Accessed 15 May 2015

  • Conway M (2006) Terrorist use of the internet and fighting back. Inf Secur 19:9–30

    Google Scholar 

  • Duyvesteyn I (2004) How new is the new terrorism? Stud Confl Terror 27(5):439–454. doi:10.1080/10576100490483750

    Article  Google Scholar 

  • Giacomello G (2004) Bangs for the buck: a cost-benefit analysis of cyberterrorism. Stud Confl Terror 27(5):387–408

    Article  Google Scholar 

  • Gibson R, Ward S (2000) A proposed methodology for studying the function and effectiveness of party and candidate web sites. Soc Sci Comput Rev 18(3):301–319

    Article  Google Scholar 

  • Gleick PH (2006) Water and terrorism. Water Policy 8:481–503

    Article  Google Scholar 

  • Hinnen TM (2004) The cyber-front in the war on terrorism: curbing terrorist use of the internet. Columbia Sci Technol Law Rev 5(5):1–42

    Google Scholar 

  • Jarvis L, Macdonald S, Nouri L (2014) The cyberterrorism threat: findings from a survey of researchers. Stud Confl Terror 37:68–90

    Article  Google Scholar 

  • Johnson B (2008) NATO says cyber warfare poses as great a threat as a missile attack. The Guardian. http://www.guardian.co.uk/technology/2008/mar/06/hitechcrime.uksecurity

  • Jones SG, Johnston PB (2013) The future of insurgency. Stud Confl Terror 36(1):1–25. doi:10.1080/1057610X.2013.739077

    Article  Google Scholar 

  • Klimburg A (2012). National cyber security framework manual. NATO CCD COE Publication, Tallinn. http://www.ccdcoe.org/369.html. Accessed 03 Apr 2013

  • Mackinlay J (2009) The insurgent archipelago. C Hurst & Co Publishers Ltd., London

    Google Scholar 

  • National Commission on Terror Attacks (2004) The 9/11 commission report: final report of the national commission on terrorist attacks upon the United States. W. W. Norton, New York

    Google Scholar 

  • National Counterterrorism Center (2006). Country report on terrorism 2005, Statistical Annex

    Google Scholar 

  • Ogun MN (2012) Terrorist use of internet: possible suggestions to prevent the usage for terrorist purposes. J Appl Secur Res 7(2):203–217. doi:10.1080/19361610.2012.656252

    Article  Google Scholar 

  • Piper P (2008) Nets of terror: terrorist activity on the internet. Searcher 16(10):260–266

    Google Scholar 

  • Qin J, Zhou Y, Reid E, Lai G, Chen H (2007) Analyzing terror campaigns on the internet: technical sophistication, content richness, and web interactivity. Int J Hum Comput Stud 65(1):71–84

    Article  Google Scholar 

  • Richards J (2009) Denial-of-service: The Estonian cyberwar and its implications for US national security. Int Aff Rev. 18(2)

    Google Scholar 

  • Rothenberger L (2012) Terrorist groups: using internet and social media for disseminating ideas. New tools for promoting political change. Rom J Commun Public Relat 14(3):7–23

    Google Scholar 

  • Sieber U, & Brunst PW (2007) Cyberterrorism and Other Use of the Internet for Terrorist Purposes–Threat Analysis and Evaluation of International Conventions. Cyberterrorism. The Use of the Internet for Terrorist Purposes. Hrsg. von Council of Europe/Counter-Terrorism Task-Force

    Google Scholar 

  • Thomas TL (2003) Al Qaeda and the internet: the danger of cyberplanning. Parameters 33(1):112–123

    Google Scholar 

  • Tsfati Y, Weimann G (2002) www. terrorism. com: Terror on the Internet. Stud Confl Terror 25(5):317–332

    Article  Google Scholar 

  • Veerasamy N, Grobler M (2011) Terrorist use of the internet: exploitation and support through ICT infrastructure. In: The Proceedings of the 6th International Conference on Information Warfare and Security, 260

    Google Scholar 

  • Weimann G (2005a) The theater of terror: the psychology of terrorism and the mass media. J Aggress Maltreat Trauma 9(3–4):379–390

    Article  Google Scholar 

  • Weimann G (2005b) Cyberterrorism: the sum of all fears? Stud Confl Terror 28(2):129–149

    Article  Google Scholar 

  • Weimann G (2006) Virtual disputes: the use of the internet for terrorist debates. Stud Confl Terror 29(7):623–639

    Article  Google Scholar 

  • Weimann G (2007). How modern terrorism uses the internet. Asian Tribune, World Institute for Asian Studies. 9(342). http://asiantribune.com/index.php?q + node/4627

  • Weimann G (2009) Terror on facebook, twitter, and youtube. Spring 16(2):45–54

    Google Scholar 

  • Whelpton J (2009) Psychology of cyber terrorism. In: Cyberterrorism 2009 Seminar. Ekwinox, South Africa

    Google Scholar 

  • Zhao VH, Lin WS, Liu KJR (2011) Behavior dynamics in media-sharing social networks. Cambridge University Press, Cambridge

    Book  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fatih Tombul Ph.D. .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Tombul, F., Akdoğan, H. (2016). How Do Terrorist Organizations Use Information Technologies? Understanding Cyberterrorism. In: Dawoody, A. (eds) Eradicating Terrorism from the Middle East. Public Administration, Governance and Globalization, vol 17. Springer, Cham. https://doi.org/10.1007/978-3-319-31018-3_6

Download citation

Publish with us

Policies and ethics