CYBERSECURITY – VIRTUAL SPACE AS AN AREA FOR COVERT TERRORIST ACTIVITIES OF RADICAL ISLAMISTS
Abstract
Over time, terrorism has evolved into different forms. One of the most dangerous is certainly cyber terrorism. There are many different motivations for terrorists to deploy cyber terrorism as a tool in their fight. Internet and computer networks are powerful resources on which contemporary society relies heavily. Terrorist groups have developed new tools and methods of the fight and they have become more effective, efficient, and unpredictable. Virtual, or cyberspace, is perfect and very safe ground for terrorist groups’ various activities, such are secret encrypted communication, file sharing, indoctrination and recruitment of vulnerable individuals, fundraising and promotions of their future actions and accomplishments spreading fear among common people. Are we adequately aware of these facts and prepared for countermeasures? The fact is that terrorists use mostly open-source tools (software) for their purposes, widely available and free of charge, as well as video games, popular social networks (mostly Twitter), and software developed by their programmers. The purpose of this paper is to point out some of the methods radical Islamic terrorist groups have been using and underline the importance of responding to this new security challenge.
Keywords
Full Text:
PDFReferences
Akhgar, B., Bayerl, P. S., & Sampson, F. (Eds.). (2016). Open Source Intelligence Investigation: From Strategy to Implementation. Cham: SpringerInternational Publishing.
Alkhouri, L., Kassirer, A., & Nixon, A. (2016). Hacking For ISIS: The Emergent Cyber Threat Landscape. Flashpoint.
Anonhq. (2015). Anonymous Finally Reveals How They Attack ISIS Militants|#opisis|ISIS|Available at Anonymous. http://anonhq.com/anonymous-finally-reveals-attack-isis-militants-opisis-isis-anonymous/ Retrieved 19.03.2017.
Anthony, F.,&Mekhenne, S. (2017). They’re young and lonely. The Islamic State thinks they’ll make perfect terrorists.‘What’s happening to our children? Washington Post. Available at: http://www.washingtonpost.com/sf/world/2017/02/11/theyre-young-and-lonely Retrieved 19.01.2019.
Arquilla, J., &Ronfeldt, D. (2001). Networks and netwars: The future of terror, crime, and militancy. Santa Monica, CA: National Defense Research Institute.
Axelrod, E. M. (2009). Violence goes to the Internet: Avoiding the snare of the Net. Illinois: Charles C Thomas Publisher.
Aydinli, E. (2016). Violent non-state actors: From Anarchists to Jihadists. London: Routledge.
Clauson, J. (2014). ISIS use grand theft auto mock-up to recruit and boost morale, Inquisitr, Available at www.inquisitr.com/1486558/isis-uses-grand-theft-auto-mock-up-to-recruit-and-boost-morale Retrieved 19.03.2017
Coker, M., Yadron, D., & Palette, D. (2015). Hacker killed by drone was Islamic State’s “secret weapon”. Wall Street Journal. Available at: http://www. wsj. com/articles/hacker-killed-by-drone-was-secret-weapon-1440718560Retrieved 19.03.2018
CyberWarzone. (2017). Anonymous Serbia identified jihadi groups in the Balkans #opIceISIS, Available at https://cyberwarzone.com/anonymous-serbia-identified-jihadi-groups-balkans-opiceisis/Retrieved 10.02.2019.
De Guttry, A., Capone, F., &Paulussen, C. (Eds.). (2016). Foreign fighters under international law and beyond. The Hague: TMC Asser Press.
Denning, D. (2000). Cyber terrorism. Testimony Before the Special Oversight Panel on Terrorism Committee on Armed Services U.S. House of Representatives. In E.V. Linden (Ed.), Focus on Terrorism (pp.71-76). New York: Nova Science Publishers.
European Union Agency for Fundamental Rights, Key migration issues: one year on from initial reporting, Available at http://fra.europa.eu/en/publication/2016/key-migration-issues-one-year-initial-reporting/main-findings Retrieved 19.03.2017.
Evans, M. (2014). Call of Duty being used to recruit British Muslims', father of Welsh Jihadists claims. Express. Available at:http://www.express.co.uk/news/uk/503094/Call-of-Duty-used-to-recruit-British-Muslims-father-of-Welsh-Jihadistsclaims Retrieved 19.03.2017
FranceschiBicchierai, L. (2015). How a Teenage Hacker Became the Target of a US Drone Strike. MotherBoard. Available at: https://motherboard.vice.com/en_us/article/junaid-hussain-isis-hacker-drone Retrieved 19.03.2017
Gallagher, S. (2012). Steganography: how al-Qaeda hid secret documents in a porn video. Available at:http://arstechnica.com/business/2012/05/steganography-how-al-qaeda-hid-secret-documentsin-a-porn-videoRetrieved 19.04.2018.
Gilbert, D. (2015). Anonymous #OpIsis: Hacktivists publish a how-to guide for identifying Islamic State Twitter accounts. International Business Times. Available at: http://www.ibtimes.co.uk/anonymous-opisis-hacktivists-publish-how-guide-identifying-islamic-state-twitter-accounts-1496378 Retrieved 19.03.2017
Guardian (2015a). Junaid Hussain: British hacker for Isis believed killed in US airstrike, The Guardian. Available at: https://www.theguardian.com/world/2015/aug/27/junaid-hussain-british-hacker-for-isis-believed-killed-in-us-airstrike Retrieved 19.03.2017
Guardian (2015a). US Central Command Twitter account hacked to read 'I love you Isis. The Guardian, Available at https://www.theguardian.com/us-news/2015/jan/12/us-central-command-twitter-account-hacked-isis-cyber-attack Retrieved 19.03.2017
Hall, A. (2017). Teenage female ISIS fanatic was 'radicalized at the age of seven and stabbed a German police officer because she was unable to make it to Syria, Mail Online. Available at: https://www.dailymail.co.uk/news/article-3476986/Teenage-female-ISIS-fanatic-radicalised-age-seven-stabbed-German-police-officer-unable-make-Syria.html Retrieved 19.03.2018.
Huggler, J. (2016). Syrian teenager arrested in Germany 'was planning Isil bomb attack. The Telegraph.Available at:http://www.telegraph.co.uk/news/2016/09/22/syrian-teenager-arrested-in-germany-was-planning-isil-bomb-attac/ Retrieved 19.03.2017
Iklody, G. (2010). The New Strategic Concept and the Fight Against Terrorism: Challenges&Opportunities. TerörizmleMücadeleDergisi, 3(2), 3-12.
Jevtic, M. (2007). Political Science and Religion. The Politics and Religion Journal. 1(1). 59-69.
Khandelwal, S. (2015). Anonymous has claimed to have taken down 20,000 ISIS-affiliated Twitter accounts, The Hacker News Available at http://thehackernews.com/2015/11/anonymous-hacker-isis_21.html Retrieved 19.03.2017
Kolata, G. (2001). Veiled messages of terrorists may lurk in cyberspace. New York Times. Available at: http://www.nytimes.com/2001/10/30/science/physical/30STEG.html Retrieved 19.03.2017
Lockhart, K (2015).#OpISIS: Why Anonymous has declared an online war against Isil - in 90 seconds. The Telegraph. Available at: http://www.telegraph.co.uk/news/worldnews/islamic-state/12003242/OpISIS-WhyAnonymous-has-declared-an-online-war-against-Isil-in-90-seconds.html Retrieved 19.03.2017
Mickolus, E. (2016). Terrorism, 2013–2015: A Worldwide Chronology. North Carolina, US: McFarland & Company Inc. Jefferson.
Murphy, L. (2015). The Curious Case Of The Jihadist Who Started Out As A Hacktivist. Vanity Far. Available at: http://www.vanityfair.com/news/2015/12/isis-hacker-junaid-hussain Retrieved 19.03.2017
Ogun, M. N. (Ed.). (2015). Terrorist Use of Cyberspace and Cyber Terrorism: New Challenges and Responses. Washington, DC: IOS Press.
Robertson, N., Cruickshank, P., & Lister, T. (2012). Documents reveal al Qaeda's plans for seizing cruise ships, the carnage in Europe. CNN: Assyrian International News Agency.
Spencer, R. (2015). The complete infidel's guide to ISIS. New York, NY: Simon and Schuster.
Stainer, M. (2015). Ghost Sec, an Anonymous affiliate, hacks ISIS site on the deep web with Viagra, Prozac ad. Washington Times. Available at: http://www.washingtontimes.com/news/2015/nov/26/ghost-sec-anonymous-affiliate-hacks-isis-site-deep/ Retrieved 19.03.2017
Szoldra, P. (2016). Here’s how the military tracked down and killed the top hacker for ISIS. Business Insider. Available at: http://www.businessinsider.com/isis-hacker-trick-found-2016-6?IR=T Retrieved 19.03.2017
Tafoya, W. L. (2011). Cyberterror. FBI Law Enforcement Bulletin(80)1. 1-16.
Trifunović, D. (2015). Digital steganography in terrorist networks, XLII International Symposium on Operations Research, Belgrade: Faculty of Mathematics.
Weimann, G. (2011). Cyberterrorism: How Real is the Threat? United States Institute of Peace Special Report No. 119. Special Report,https://www.usip.org/publications/2004/05/cyberterrorism-how-real-threat Retrieved 19.03.2017
DOI: https://doi.org/10.22190/TEME201119006T
Refbacks
- There are currently no refbacks.
© University of Niš, Serbia
Creative Commons licence CC BY-NC-ND
Print ISSN: 0353-7919
Online ISSN: 1820-7804