Cyber-Terrorism in The Context of Proselytizing, Coordination, Security, and Mobility

Iqbal Ramadhan

Abstract


The simplicity and flexibility of information and technology have made human life much easier. Terrorist groups nowadays have been using these things to disseminate terror, recruit new members, fundraise, and mobilize their activities. Technology provides terrorist group a leverage to conduct its hideous activity. Globalization eventually gives the double-edge sword that needs to be addressed by state actor regarding terrorist issues. The author used James D. Kiras’ four concepts of cyber-terrorism such as proselytizing, coordination, security, and mobility. Those four concepts are harnessed by terrorist group in modern world to achieve their interest. On the other side, the author harnessed comprehensive security from the Copenhagen School of Security Studies to analyze the threat which came from cyber-terrorism activity. The aim of this article is to analyze terrorist groups in conducting their activity based on Kiras’ four concepts of cyber-terrorism. By using Kiras’ concept in Comprehensice Security from Copenhagen School, the author aims to analyze the impact of cyber terrorism both on state and society. The author also used qualitative method as analytical tools to analyze the research problem. The author concluded that the state had to establish a rigid counter-terrorism system holistically at the domestic level without neglecting international strategic cooperation among international actors to counter this threat.

 

Keywords: Cyber-terrorism, proselytizing, coordination, security, mobility.


Keywords


Cyber-terrorism, proselytizing, coordination, security, mobility.

Full Text:

PDF

References


Alff, Majid., Kaghazgaran, Parisa., Caverlee, James. (2018). Measuring the Impact of ISIS Social Media Strategy. Available at http://snap.stanford.edu/mis2/files/MIS2_paper_23.pdf. [Accessed, May 7th, 2019]

Aronso, D. Jonathan. (2005). Causes and consequences of the communication and Internet Revolution in John Baylis & Steve Smith (ed), The Globalization of World Politics: An Introduction to International Relations. London: Oxford University Press

Bertram, Luke. (2016). Terrorism, the Internet and the Social Media Advantage: Exploring How Terrorist Organizations Exploit Aspects of the Internet, Social Media and How These Same Platforms Could be Used to Counter-Violent Extremism in Journal for Deradicalization (7). ISSN: 2352-9849

Bieda, David & Halawi, Leila. (2015). Cyberspace: A Venue for Terrorism. Issues in Information Systems Volume 16, Issue III: Embry-Riddle Aeronautical University.

Bloom, Mia. (2017). Constructing Expertise: Terrorist Recruitment and “Talent Spotting” in the PIRA, Al Qaeda, and ISIS. Studies in Conflict & Terrorism, 40:7, 603-623. DOI: 10.1080/1057610X.2016.1237219

Bodin, Silvia., Echilley, Marc., & Quinard-Thibault, Odile. (2015). International cooperation in the face of cyber-terrorism: current responses and future issues. Available at http://www.ejtn.eu/Documents/THEMIS%202015/Written_Paper_France_1.pdf. [Accessed, May 10th, 2019]

Buzan, Barry. (1991). New Patterns of Global Security in The Twentieth First Century. International Affairs Vol. 67 (3): Wiley-Blackwell

Buzan, Barry et al. (1998). Security: A New Framework of Analysis. Colorado: Lynne Rienner

Cavelty, Myriam Dunn. (2014). Cyber Threats in Victor Mauer & Myriam Dunn Cavelty (ed), The Routledge Handbook of Security Studies. New York: Routledge

Cohn, Cindy & Gullo, Karen. (2019). Government Fights to Trap EFF’s NSA Spying Case in Catch-22. Available at https://www.eff.org/deeplinks/2019/04/government-fights- trap-effs-nsa-spying-case-catch-22. [Accessed, May 9th, 2019]

Dogrul, Murat., Aslan, Adil & Celik, Eyyup. (2011). Developing an International Cooperation on Cyber Defense and Deterrence against Cyber-terrorism. Available at https://ccdcoe.org/uploads/2018/10/DevelopingAnInternationalCooperation-Dogrul- Aslan-Celik.pdf. [Accessed, May 10th, 2019]

Federal Times. (2016). Hacker charged with cyber-terrorism gets 20 years. Available at https://www.federaltimes.com/2016/09/23/hacker-charged-with-cyber-terrorism-gets- 20-years/. [Accessed, November 25th, 2019]

Giantas, D & Stergiou, D. (2018). From Terrorism to Cyber-Terrorism: The Case of ISIS. SSRN Electronic Journal. DOI:10.2139/ssrn.3135927

Gilsinan, Kathy. (2018). If Terrorists Launch a Major Cyberattack, We Won’t See It Coming. Available at https://www.theatlantic.com/international/archive/2018/11/terrorist-cyberattack-midterm-elections/574504/. [Accessed, April 10th, 2019]

Gross, M., Canetti, D. & Vashdi, D. (2017). Cyberterrorism: Its Effect on Psychological Well- Being, Public Confidence, and Political Attitudes in Journal of Cyber Security No 3 (1). DOI: 10.1093/cybsec/tyw018

Hough, Peter. (2008). Understanding Global Security, 2nd Edition. London: Routledge Taylor and Francis Group.

Idahosa, Stephen. (2017). International Terrorism: The Influence of Social Media in Perspective in the Journal of Multidisciplinary Research and Development No. 3 [10]. e-ISSN: 2454-6615

ID-CERT. (2013). CATATAN Tahunan Insiden Siber 2013. Available at http://www.cert.or.id/index-berita/id/berita/41/. [Accessed, January 3rd, 2019].

Kshetri, Nir. (2014). Cybersecurity and International Relations: The U.S. Engagement with China and Russia. Accessed from Prosiding FLACSO-ISA 2014, University of Buenos Aires, School of Economics, Buenos Aires, Argentina, July 23-25

Kiras, James D. (2014). Terrorism and Globalization in John Bayliss et al. (ed), The Globalization of World Politics: An Introduction to International Relations 3rd Edition. London: Oxford University Press

Nye, Joseph S. (2011). The Future of Power. USA: Perseus Book Group

Otterbacher, Kaylee. (2016). A New Age of Terrorist Recruitment: Target Perceptions of the Islamic State’s Dabiq Magazine in UW-L Journal for Undergraduate Research

Pricewaterhouse Cooper. (2014). Managing Cyber Risk With Insurance

Press, Gil. (2018). 60 Cybersecurity Predictions For 2019. Available at https://www.forbes.com/sites/gilpress/2018/12/03/60-cybersecurity-predictions-for-2019/#48cf0bc94352. [Accessed, April 10th, 2019]

Ramadhan, Iqbal. (2017). Peran Institusi Internasional dalam Penanggulangan Ancaman Cyber dalam Jurnal Populis Vol 2 (4) 2017. ISSN: 2640-4208

Ranggasari, Ririe. (2019). Banks Invest in Cyber Security. Available at https://en.tempo.co/read/1194168/banks-invest-on-cyber-security. [Accessed, May 8th, 2019]

Rogers, Paul in Paul Williams. (2004). Terrorism in Security Studies: An Introduction. USA: Routledge

Samuel, Kuboye Oluwafemi & Osman, Wan Rozaini Sheik. (2014). Cyber-terrorism Attack of The Contemporary Information Technology Age: Issues, Consequences, and Panacea in JCSMC, Vol. 3, Issue. 5.

Tumber, Rajinder. (2019). 3 Compelling Reasons To Invest In Cyber Security – Conclusion. Available at https://www.forbes.com/sites/rajindertumber/2019/01/26/3-compelling-reasons-to-invest-in-cyber-security-conclusion/#76a9d30a6dee. [Accessed, May 8th, 2019]

Ward, Antonia. (2018). ISIS's Use of Social Media Still Poses a Threat to Stability in the Middle East and Africa. Available at https://www.rand.org/blog/2018/12/isiss-use-of-social-media-still-poses-a-threat-to-stability.html. [Accessed, May 7th, 2019]

Weimann, Gabriel. (2005). Cyberterrorism: The Sum of All Fears? Studies in Conflict & Terrorism, 28:2

Zerzri, Mayssa. (2017). The Threat of Cyber-terrorism and Recommendations for Countermeasures in the Center for Applied Policy Research.




DOI: https://doi.org/10.18196/jiwp.4252

Refbacks

  • There are currently no refbacks.


Journal JIWP Indexed by:

       

 

Office:

Journal of Islamic World and Politics, Magister Hubungan Internasional Universitas Muhammadiyah Yogyakarta, Jl. Brawijaya (Lingkar Selatan), Tamantirto, Kasihan, Bantul, Daerah Istimewa Yogyakarta. Whatsapp: +62823-2679-6566 Email: jiwp@umy.university

Creative Commons License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International (CC BY-SA 4.0) license.