Terrorism, counter-terrorism and the information revolution : the Islamic State (IS) versus the United States

Abstract

Abstract: Contemporary and future advancements in innovative technologies have revolutionized the way humans are able to consume and release information on an everyday basis. However, these advancements could be depicted as a double-edged sword, as these technologies could be used for the purpose of terrorist activity. Terrorist groups such as IS (Islamic State), have used the internet through sophisticated technologies as a tool to radicalize, recruit and plan terrorist attacks on a consistent basis signalling an evolution in tactics and strategy adopted by modern terrorist groups. Guided by David Rapoport’s theory on the evolution of modern terrorism through four waves, this dissertation attempts to provide evidence for the rise of a fifth wave of terrorism - a fifth wave that is catalysed and spurred on by the power of the internet and the Information Revolution. This dissertation has employed an exploratory and qualitative approach to uncover the evolution that terrorism has undertaken as a result of new and emerging technologies. This dissertation also provides evidence of strategies that have been employed to counter terrorist activity using innovative and emerging technologies. In summary, this dissertation assesses the following: Chapter 1 provides the purpose of the study as well as the research objectives that the study attempts to achieve. Chapter 2 provides the context for the study by discussing the origins, definitions and characteristics of modern terrorism, as well as introducing David Rapoport’s theory on the four waves of terrorism. Chapter 3 discusses the emergence of a fifth wave of terrorism through examining key characteristics, traits, and catalysts of terrorism, as tools in understanding previous waves. Chapter 3 also assesses other popular fifth wave theories that currently exist to draw on their relevancy. In Chapter 4, IS is used as a case study to assess their potential of being a fifth wave terrorist group by discussing how they have used the internet for propaganda, financing; training; planning and executing attacks. Chapter 5 examines the need for counterterrorism in the digital age and the change in approach by the US government in counter terrorism as a result of new technologies. This chapter also provides insight into what new emerging technologies are being used to assist in the fight against terrorism by other counterterrorism agencies. Chapter 6 serves as the conclusion for this study and provides a brief summary of the key findings in this study. This dissertation attempts to draw on the possible emergence of a fifth of terrorism and uses IS as a case study to substantiate why they can be considered as a fifth wave terrorist group coupled with key counterterrorist strategies being employed as further evidence of this. The consequences of the Information Revolution on terrorism are also explored.M.A. (Politics

    Similar works