TERRORISM IN THE DIGITAL ENVIRONMENT
Abstract
The spread of digital technologies and their power to connect billions of people around the world, has enabled modern society to communicate more efficiently, access information, do business, but also have fun. However, there are many examples in which this possibility is abused for cyber-criminal activities, among which is certainly cyber terrorism. Through the activities of traditional terrorism, terrorists try to provoke anxiety in the population, choosing targets randomly or selectively, against which violence is committed, with the intention of serving as an example to other members of society. Such incitement to fear is precisely the means of terrorist individuals and groups, who want to put pressure on the government and the general public to meet their demands. Recently, there are more and more examples in which such activities are moving (with more or less success) to the digital environment. Cyber terrorism is a means of spreading radical ideology, propaganda, recruiting like-minded people, but also organizing cyber terrorist attacks. The advantage that a terrorist activist sees in using such methods is certainly the possibility to remain anonymous and easily hide in the cyber world. Cybercriminals easily adapt and find new methods of committing cyberbullying, which must be a call to governments to regulate legislation in a synchronized effort, but also to form expert teams that will identify, prevent and adequately sanction such criminal activities and protect their population and critical infrastructure.
This paper seeks to bring closer and present information to the academic community, but also to experts in the field of cyber terrorism that can help them improve strategies for recognizing and defending against such cyber activities. The main goal of this paper is to analyze the collected information from the available scientific literature and to offer new guidelines in order to reduce such activities to a minimum in the near future.
References
Baltezarević, Baltezarević 2016: Vesna Baltezarevic & Radoslav Baltezarevic. “The internet and
virtual “reality”. In Proceedings International Conference, Technology + Society Future,
2016, Podgorica, Montenegro.Transition to a new society, Montenegrin Academy of
Sciences and Arts, World Academy of Art and Science, ALL European Academies
(ALLEA), European Academy of Sciences and Arts, Podgorica, Montenegro: Pro File,
pp. 193-200.ISBN 978-86-7215-384-2, COBISS.CG-ID 31080464.
Baltezarević, Baltezarević 2021: Ivana Baltezarević, Radoslav Baltezarević. “Sajber bezbednost:
izgradnja digitalnog poverenja.” Megatrend Revija, Vol. 18 (4). pp. 269-280 UDK 343.533: 004 DOI: 10.5937/MegRev2104269B
Baltezarević, Baltezarević 2021: Radoslav Baltezarevic & Ivana Baltezarevic. “The Dangers and
Threats that Digital Users Face in Cyberspace”. IPSI Transactions on Internet Research,
Vol. 17, No. 1, January 2021, pp. 46-52.
Broadhurst, Woodford-Smith, Maxim, Sabol, Orlando, Chapman-Schmidt, Alazab 2017: Roderic
Broadhurst, Hannah Woodford-Smith, Donald Maxim, Bianca Sabol, Stephanie Orlando,
Ben Chapman-Schmidt, Mamoun Alazab. “Cyber Terrorism: Research Review: Research Report of the Australian National University Cybercrime Observatory for the Korean Institute of Criminology (June 30, 2017).” SSRN: https://ssrn.com/abstract=2984101 or http://dx.doi.org/10.2139/ssrn.2984101
Brunst 2009: Phillip Brunst. “Use of the Internet by Terrorists – A Threat Analysis.” In Centre of
Excellence – Defence Against Terrorism (Ed.), Responses to Cyber Terrorism (pp. 34–60). Amsterdam: IOS Press.
Buchanan 2020: Ben Buchanan. “The Hacker and the State. Cyber Attacks and the New Normal
of Geopolitics”. Cambridge, MA: Harvard University Press
Chomsky 2001: Noam Chomsky. “US: A leading terrorist state.” Monthly Review 53: 10–19.
COE DAT Strategic Communications Workshop May 2009
https://www.tmmm.tsk.tr/wsreports.html (Приступљено: 06.05.2022)
Conway 2003: Maura Conway. “Terrorism and IT: Cyberterrorism and Terrorist Organisations”.
Online 6 (paper prepared for presentation at the International Studies Association
Annual International Convention in Portland, Oregon).
Conway 2014: Maura Conway. “Reality Check: assessing the (un)likelihood of cyberterrorism.”
In: Chen, Tom, Jarvis, Lee and Macdonald, Stuart, (eds.) Cyber Terrorism:
Understanding, Assessment and Response. Springer, New York, pp. 103-122. ISBN 978-1-4939-0962-9
Cooper 2001: H. H. A. Cooper. “Terrorism: The Problem of Definition Revisited”. American
Behavioral Scientist, 44: 881–93.
Crenshaw 2001: Martha Crenshaw. “Terrorism.” In: International Encyclopedia of the Social &
Behavioral Sciences. Amsterdam, the Netherlands: Elsevier, pp. 15604–15606.
Cristiano 2018: Fabio Cristiano. “From Simulations to Simulacra of War: From Simulations
to Simulacra of War: Game Scenarios in Cyberwar Exercises.” Journal of War & Culture
Studies 11, no. 1: 22–37.
Denning 2012: Dorothy E. Denning. “Stuxnet: What Has Changed?” Future Internet 4, no. 3:
672-687. https://doi.org/10.3390/fi4030672
Eijkman, Weggemans 2013: Quirine Eijkman, Daan Weggemans. “Open Source Intelligence
and Privacy Dilemmas: Is It Time to Reassess State Accountability?” Security and Human Rights 23, no. 4 (2013): 285–96.
Giacomello 2004: Giampiero Giacomello. “Bangs for the Buck: A Cost-Benefit Analysis of
Cyberterrorism.” Studies in Conflict & Terrorism, 27(5), 387–408.
Grosscup 2006: Beau Grosscup. “Strategic Terror: The Politics and Ethics of Aerial
Bombardment.” London: Zed Books.
Hoffman 1998: Bruce Hoffman. “Inside Terrorism.” New York: Columbia University Press.
Jackson 2008: Richard Jackson. “The Ghosts of State Terror: Knowledge, Politics and Terrorism
Studies.” Critical Studies on Terrorism, 1 (3): 377–92.
Kirichenko, Radivilova, Carlsson 2018: Lyudmyla Kirichenko, Tamara Radivilova, Anders
Carlsson. “Detecting cyber threats through social network analysis: short survey.” CoRR abs/1805.06680
Lee, Stuart 2015: Jarvis Lee and Macdonald Stuart. “What Is Cyberterrorism? Findings from a
Survey of Researchers.” Terrorism and Political Violence 27, no. 4 (2015): 657–78
Lewis 2005: James Lewis. “The Internet and Terrorism”. Proceedings of the ASIL Annual
Meeting, 99, 112-115. doi:10.1017/S0272503700071196
Primoratz 2004: Igor Primoratz. “What is terrorism”? In: I. Primoratz (ed.) Terrorism: The
Philosophical Issues. New York: Palgrave Macmillan, pp. 15–30
Pujari 2016: Amaresh Pujari. “Cyber Terrorism. World Wide Weponisation!” TN Police
Sesquicentennial Anniversary Souvenir.
Record 2003: Jeffrey Record. “Bounding the Global War on Terrorism.” Carlisle Barracks:
Strategic Studies Institute, US Army War College.
Rodin 2004: David Rodin. “Terrorism without intention.” Ethics 114: 752–771.
Ronen 2010: Yaël Ronen. “Incitement to Terrorist Acts and International Law”. 23 LEIDEN J. I
NT’ L L., 645, 654.
Rummel 1994: Rudolph Rummel. “Death by Government.” New Brunswick, NJ: Transaction
Books.
Sageman 2008: Marc Sageman. “Leaderless Jihad.” University of Pennsylvania Press,
Philadelphia, Pennsylvania
Schmid, Jongman 1988: Alex Peter Schmid, Albert J. Jongman. “Political Terrorism: A New
Guide to Actors, Authors, Concepts, Data Bases, Theories and Literature.” (revised from 1983 ed.) New Brunswick, NJ: Transaction.
Tilly 2004: Charles Tilly. “Terror, terrorism, terrorists.” Sociological Theory 22(1): 5–13.
United Nations Office on Drugs and Crime. 2022: Definitions of Terrorism.
https://www.unodc.org/unodc/en/terrorism/index.html (Приступљено: 06.05.2022)
US Code, Title 22, y 2656f(d)
Weimann 2004: Gabriel Weimann. “Cyberterrorism: How Real is the Threat?” [Electronic
Version]. Special Report (United States Institute of Peace), 119.
Weimann 2006: Gabriel Weimann. “Terror on the Internet: The New Arena, the New
Challenges,” US Institute of Peace Press, Washington, DC.