3,836 research outputs found

    Reality bytes: cyberterrorism and terrorist 'use' of the Internet

    Get PDF
    This paper examines the concept of cyberterrorism. Fringe activity on the Internet ranges from non-violent 'Use' at one end to 'Cyberterrorism' at the other. Rejecting the idea that cyberterrorism is widespread, the focus here is on terrorist groups' 'use' of the Internet, in particular the content of their Web sites, and their 'misuse' of the medium, as in hacking wars, for example. Terrorist groups' use of the Internet for the purpose of inter-group communication is also surveyed, partly because of its importance for the inter-networked forms of organisation apparently being adopted by these groups, but also due to the part played by the Internet in the events of September 11 and their aftermath

    Blurred Intersections: The Anti-Black, Islamophobic Dimensions of CVE Surveillance

    Get PDF
    Modern mechanisms of state surveillance reinforce gendered, raced, classed and sexed power hierarchies. Forms of control and regulation of problem bodies are framed as neutral or benign forms of bureaucratic bookkeeping (Dubrofsky and Magnet, 2015). This thesis explores the possible Islamophobic and Anti-Black dimensions of Counter Violent Extremism (CVE) program, a counterterrorism community outreach program initiated by the federal government in the Minneapolis-St. Paul area, which targets the Somali community. I will be evaluating whether CVE programs, initiated by state agencies, transform into a site of surveillance. This thesis will examine declassified state documents from sources such as Homeland Security and the FBI relating to CVE programs, which detail program rationale, function, and implantation. My research will examine the presence of Anti-Black racism and Islamophobia in the purpose and deployment CVE programs. Additionally, I will be analyzing how mechanisms of surveillance operate at the intersections of Anti-Black racism and Islamophobia and how do CVE programs impact and shape the lived realities of Somali Muslims. This study of CVE programs is, by necessity, an analysis of power relations, and relies on an intersectional feminist approach to surveillance studies. Through this, I will produce a coherent understanding of how surveillance mechanisms build on the criminalization and over-policing of Black communities to surveil, mark and easily monitor Somali Muslims in Minnesota. The recent election of Donald Trump and the looming threat to activate a Muslim registry makes this research more relevant and necessary

    Facing Catastrophe - Risk and Response: The 9-11 and 11-M Commissions' Blind Sides

    Get PDF
    Background thinking for the upcoming Madrid terrorism summit stems partly from the 9/11 Commission and Spain's Comisión 11-M. Their presentations fall short on pinpointing the sources of attacks that carry the most risk and how best to respond. Terrorist attacks over the last decades follow a power-law distribution, which anticipates future terrorist events with ever broader effects. Intelligence estimates based on models keyed to frequency and recency of past occurrences make us less secure even if they predict most terrorist events. Evolution, complex adaptive systems, and WWII experience from British intelligence provide salutary lessons for thinking “outside the box” with decentralized expertise. History shows that people do not readily panic in surprise attacks and that local actors may be best able to organize response efforts. Proposals to centralize intelligence and unify command and control are not promising given recent transformations in terrorist networks in the wake of Al-Qaeda's operational demise.

    Non-Contact Warfare: A Strategy for Future

    Get PDF
    Examining events after World War II shows that the emerging technological environment is shaping the future. The shift in operational doctrine from ‘massing of forces’ to ‘massing of effects’ with a quantum reduction in physical contact between adversarial forces has been scripted. Future conflict trends are likely to be diffused, diverse and disruptive. Expanding security-arena from traditional to non-traditional domains necessitates a nuanced doctrinal approach. The escalation levers are looking at non-military and military means of contestation.   &nbsp

    Non-Contact Warfare: A Strategy for Future

    Get PDF
    Examining events after World War II shows that the emerging technological environment is shaping the future. The shift in operational doctrine from ‘massing of forces’ to ‘massing of effects’ with a quantum reduction in physical contact between adversarial forces has been scripted. Future conflict trends are likely to be diffused, diverse and disruptive. Expanding security-arena from traditional to non-traditional domains necessitates a nuanced doctrinal approach. The escalation levers are looking at non-military and military means of contestation.   &nbsp

    Information Terrorism in the New Security Environment

    Get PDF
    Over the years there have been many interpretations of what constitutes Information Terrorism. This paper examines the correlation/relationship between Information Warfare and Terrorism, and describes what is considered to be Information Terrorism now. It achieves this by outlining the threat’s impact, advantage and capability. It then examines the positives that can be derived from such and, based on the literature available on the subject, provides a deduced interpretation of what Information Terrorism is. The paper concludes with remarks supporting the assertion that Information Terrorism is a major dynamic and asymmetric threat contributing to a new national security environment

    Fighting the Hydra: Combatting Vulnerabilities in Online Leaderless Resistance Networks

    Get PDF
    Why do contemporary Racially-Motivated Violent Extremist (RMVE) movements champion “leaderless resistance,” and how can practitioners combat this organizational strategy? To answer this question, we draw on insights from military planning to identify why this online network structure provides the RMVE community its primary source of power, or “center of gravity.” We then use this information to deconstruct the movement’s operational activities including its critical capabilities and critical requirements to perpetrate these actions. Based on these requirements, we identify key vulnerabilities to undercut the movement’s resilience and growth. Leaderless resistance is an organizational strategy “that allows for and encourages individuals or small cells to engage in acts of political violence entirely independent of any hierarchy of leadership or network of support.” Fueled by a growing virtual reach, leaderless movements and groups based in the United States have flourished in the last decade. These entities can largely be divided into two categories: those that deliberately adopted a leaderless structure for its strategic benefits (e.g., Atomwaffen, the Base), and those that are organically leaderless due to the highly fluid nature of their network of followers (e.g., Boogaloo Bois, Groypers). The online RMVE leaderless resistance network relies on three critical requirements to achieve their desired end goals: (1) common doctrine, (2) shared narrative, and (3) dense communication networks. Online communication networks, in particular, are critical to spread information, share key doctrinal concepts through common texts, mobilize followers, and radicalize individuals to take actions. Given these requirements, we identify at least three vulnerabilities in these network structures: 1. Poor organizational cohesion and control, 2. Limited visibility of ideological narratives/influencers, and 3. Barriers to communication and coordination. These challenges can undercut the perceived legitimacy, momentum, and growth of the movement. To exploit these vulnerabilities, we assess the effectiveness of several previously tested policy interventions including: • Law Enforcement-Based Interventions: Proscription, Arrests, and Litigation • Community-Based Interventions: Inoculation Theory, Counter-Messaging, Disengagement, De- Radicalization • Industry-Based Interventions: De-platforming, Content Moderation, Redirect, and Hash-Sharing Directories We assess that community-based and industry-based interventions are more likely to succeed than law enforcement-based interventions because the profound distrust of government in these communities limits the potential effectiveness of government-backed interventions and also creates a high potential for unanticipated, counterproductive effects
    corecore