Abstract
Cyberspace has expanded the arena within which extremists and terrorists operate, posing a range of new challenges, many of which are still to be addressed. From propaganda through recruitment to financing and attack planning, the use of the Internet has been growing in size, subtlety and sophistication, often blurring the legal with the illegal. Its interconnectivity, anonymity and affordability have served Muslim extremists, white supremacists and neo-Nazis alike. The present article analyses the online challenges posed by such groups, pointing out how they might be potentially hampered by combining the currently dominant online surveillance with marginalized cyber (counter-) communication. It also highlights the mechanisms of decision making based on matters of principle and honour, the factors that typically drive terrorist actions, showing the inadequacy of the traditional economic models, on which the surveillance largely depends and risks scaring extremists off the radar.
Similar content being viewed by others
Notes
For the practical purposes of this work, the action-connoting term ‘terrorist’ and intention-connoting term ‘violent extremist’ will be used interchangeably.
See Bandura (1990) for more information on the psychological processes and mechanisms of moral disengagement.
Examples abound, including Arid Uka, who shot dead two US airmen at Frankfurt Airport in March 2011, and who claimed to have been radicalized by Jihadist propaganda videos online. Colleen Renee LaRose is an American citizen charged with terrorism-related crimes; Jamie Paulin-Ramirez, 31, was detained in Ireland in connection with an alleged conspiracy to kill a Swedish cartoonist. And most recently, Anders Behring Breivik carefully prepared an Internet-based media strategy to accompany his attacks in July 2011.
See, for example, the essays of Louis Beam on the concept of ‘leaderless resistance’, a philosophy whereby individual and autonomous activity is encouraged.
In much the same way as Cordes (1988) discusses propaganda and auto-propaganda, with auto-propaganda aimed internally, at those involved in the movement.
References
Allison, G. and Zelikow, P. (1999) Essence of Decision: Explaining the Cuban Missile Crisis. New York, NY: Longman.
Amble, J.C. (2012) Combating terrorism in the new media environment. Studies in Conflict & Terrorism 35(5): 339–353.
Ariely, D. (2008) Predictably Irrational: The Hidden Forces That Shape Our Decisions. London: HarperCollins.
Ashcroft, A. (1998) NF: Marching along the informative super-highway. The Nationalist, No. 2. London (October).
Atran, S. (2010) Talking to the Enemy: Faith, Brotherhood, and the (Un)Making of Terrorists. New York, NY: HarperCollins.
Back, L., Keith, M. and Solomos, J. (1998) Nation and race: The developing Euro-American racist subculture. In: J. Kaplan and B. Tore (eds.) Racism on the Internet: Mapping Neo-Fascist Subcultures in Cyberspace. Boston, MA: Northeastern University Press, pp. 73–101.
Bailey, T.D. and Grimaila, M.R. (2006) Running the blockade: Information technology, terrorism, and the transformation of Islamic mass culture. Terrorism and Political Violence 18(4): 523–543.
Bandura, A. (1990) Mechanisms of moral disengagement. In: W. Reich (ed.) Origins of Terrorism: Psychologies, Ideologies, Theologies, States of Mind. Cambridge, UK: Cambridge University Press, pp. 161–191.
Becker, G.S. (1962) Irrational behavior and economic theory. The Journal of Political Economy 70(1): 1–13.
Beidleman, S.W. (2009) Defining and Deterring Cyber War. Carlisle Barracks, PA: Army War College.
Bennis, W.M., Medin, D.L. and Bartels, D.M. (2010) The costs and benefits of calculations and moral rules. Perspectives on Psychological Science 5(2): 187–202.
Bowden, M. (2012) The death of Osama bin Laden: How the US finally got its man. The Guardian, October, p. 12, http://www.guardian.co.uk/world/2012/oct/12/death-osama-bin-laden-us, accessed 31 December 2012.
Bowman-Grieve, L. (2009a) Exploring ‘stormfront’: A virtual community of the radical right. Studies in Conflict & Terrorism 32(11): 989–1007.
Bowman-Grieve, L. (2009b) Anti-abortion extremism online. First Monday, 14(11), http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/2679/2352, accessed 31 December 2012.
Brown, I. and Korff, D. (2009) Terrorism and the proportionality of internet surveillance. European Journal of Criminology 6(2): 119–134.
Brown University (2013) Costs of War Project, http://news.brown.edu/pressreleases/2013/03/warcosts, accessed 13 April 2014.
Bullock, J., Haddow, G., Coppola, D. and Yeletaysi, S. (2009) Introduction to Homeland Security: Principles of all-Hazards Response, 3rd edn. Burlington, MA: Elsevier Inc.
Casebeer, W.D. and Russell, J.A. (2005) Storytelling and terrorism: Towards a comprehensive ‘counter-narrative strategy’. Strategic Insights 4(3): 1–16.
Chomsky, N. (2007) Failed States: The Abuse of Power and the Assault on Democracy. London: Penguin Books.
Cooper, H.H.A. (2001) Terrorism: The problem of definition revisited. American Behavioral Scientist 44(6): 881–893.
Cordes, B. (1988) When terrorists do the talking: Reflections on terrorist literature. In: D.C. Rapoport (ed.) Inside Terrorist Organizations. New York: Columbia University Press, pp. 150–171.
Corera, G. (2008) The world’s most wanted cyber-jihadist. BBC News 16 January.
Dawkins, R. (2006) The God Delusion. London: Bantam Press.
deGraaf, B. (2009) Counter-narratives and the unrehearsed stories counter-terrorists unwittingly produce. Perspectives on Terrorism 3(2): 5–11.
Dehghani, M., Atran, S., Iliev, R., Sachdeva, S., Medin, D. and Ginges, J. (2010) Sacred values and conflict over Iran’s nuclear program. Judgement and Decision Making 5(7): 540–546.
Derks, D., Fischer, A.H. and Bos, A.E.R. (2008) The role of emotion in computer-mediated communication: A review. Computers in Human Behavior 24(3): 766–785.
Devost, M.G. and Pollard, N.A. (2002) Taking cyberterrorism seriously. http://www.terrorism.com, accessed 7 July 2003.
Fischoff, B. (2011) Communicating about the risks of terrorism (or anything else). American Psychologist 66(6): 520–531.
Gignes, J. (1997) Deterring the terrorist: A psychological evaluation of different strategies for deterring terrorism. Terrorism and Political Violence 9(1): 170–185.
Ginges, J. and Atran, S. (2011) War as a moral imperative (not just practical politics by other means). Proceedings of the Royal Society Series B: Biological Sciences, February, http://rspb.royalsocietypublishing.org/content/early/2011/02/08/rspb.2010.2384.full.pdf, accessed 31 December 2012.
Ginges, J., Atran, S., Sachdeva, S. and Medlin, D. (2011) Psychology out of the laboratory: The challenge of violent extremism. American Psychologist 66(6): 507–19.
Guadagno, R.E. and Cialdini, R. (2002) Online persuasion: An examination of gender differences in computer-mediated interpersonal influence. Group Dynamics: Theory, Research and Practice 6(1): 38–51.
Hancock, J.T. (2007) Digital deception: When, where and how people lie online. In: K. McKenna, T. Postmes, U. Reips and A.N. Joinson (eds.) Oxford Handbook of Internet Psychology. Oxford, UK: Oxford University Press, pp. 287–301.
Harkins, S.G. and Petty, R.E. (1981) The multiple source effect in persuasion: The effects of distraction. Personality and Social Psychology Bulletin 7(4): 627–635.
Hinde, S. (2001) Incalculable potential for damage by cyberterrorism. Computers and Security 20(7): 568–572.
Hoffman, B. (1999) The mind of the terrorist: Perspectives from social psychology. Psychiatric Annuals 29(6): 337–340.
Holt, T.J. (2012) Exploring the intersections of technology, crime, and terror. Terrorism and Political Violence 24(2): 337–354.
Hui, J.Y. (2011) The Internet in Indonesia: Development and impact of radical websites. Studies in Conflict & Terrorism 33(2): 171–191.
Jacobson, M. (2009) Terrorist drop-outs: One way of promoting a counter-narrative. Perspectives on Terrorism 3(2): 12–17.
Jacobson, M. (2010) Terrorist financing and the internet. Studies in Conflict & Terrorism 33(4): 353–363.
Kahneman, D. (2003) Maps of bounded rationality: Psychology for behavioral economics. American Economic Review 93(5): 1449–1475.
Kennedy, J. and Weimann, G. (2011) The strength of weak terrorist ties. Terrorism and Political Violence 23(2): 201–212.
Kenney, M. (2010) Beyond the internet: Mētis, Techne, and the limitations of online artifacts for Islamist terrorists. Terrorism and Political Violence 22(2): 177–197.
Levin, B. (2002) Cyberhate: A legal and historical analysis of extremists’ use of computer networks in America. American Behavioural Scientist 45(6): 958–989.
Li, C.Y. (2013) Persuasive messages on information system acceptance: A theoretical extension of elaboration likelihood model and social influence theory. Computers in Human Behavior 29(1): 264–275.
Lyon, D. (2003) Technology vs ‘terrorism’: Circuits of city surveillance since September 11th. International Journal of Urban and Regional Research 27(3): 666–678.
Merari, A. (2010) Driven to Death: Psychological and Social Aspects of Suicide Terrorism. New York, NY: Oxford University Press.
Moghaddam, F.M. (2005) The staircase to terrorism. A psychological exploration. American Psychologist 60(2): 161–169.
NCSL (2008) Definition of cyberterrorism. National Conference for State Legislatures. http://www.ncsl.org/issues-research/justice/terrorism-and-criminal-justice.aspx, accessed 26 December 2012.
Nisbett, R. and Ross, L. (1980) Human Inference: Strategies and Shortcomings of Social Judgement. Englewood Cliffs, NJ: Prentice-Hall.
Palasinski, M. (2012) Online security and cyberbystander relations in mobilizing sex abuse intervention. Cyberpsychology, Behavior, and Social Networking 15(10): 551–554.
Pape, R. (2005) Dying to Win: The Strategic Logic of Suicide Terrorism. New York: Random House.
Pape, R. and Feldman, J. (2010) Cutting the Fuse: The Explosion of Global Terrorism and How to Stop it. Chicago, IL: University of Chicago Press.
Parti, K. (2010) Actual policing in virtual reality – a cause of moral panic or a justified need? In: J.-J. Kim (ed.) Virtual Reality, ISBN: 978-953-307-518-1, InTech, http://www.intechopen.com/books/virtual-reality/actual-policing-in-virtual-reality-a-cause-of-moral-panic-or-a-justified-need-, accessed 31 December 2012.
Post, J.M., Ruby, K.G. and Shaw, E.D. (2000) From car bombs to logic bombs: The growing threat from information terrorism. Terrorism and Political Violence 12(2): 97–122.
Postmes, T., Spears, R. and Lea, M. (1999) Social identity, normative context, and ‘deindividuation’ in computer-mediated groups. In: N. Ellemers and R. Spears (eds.) Social Identity: Context, Content, Commitment. Oxford, UK: Blackwell Science, pp. 164–183.
Pynchon, M. and Borum, R. (1999) Assessing threats of targeted group violence: Contributions from social psychology. Behavioral Sciences and the Law 17(3): 339–355.
Reid, E.F. and Chen, H. (2007) Mapping the contemporary research domain. International Journal of Human Computer Studies 65(1): 42–56.
Rogers, M. (2008) The psychology of cyber-terrorism. In: A. Silke (ed.) Terrorists, Victims & Society: Psychological Perspectives on Terrorism and its Consequences. Chichester, UK: Wiley, pp. 77–92.
Sageman, M. (2008) Leaderless Jihad. Philadelphia, PA: University of Pennsylvania Press.
Salem, A., Reid, E. and Chen, H. (2008) Multimedia content coding and analysis: Unraveling the content of jihadi extremist groups’ videos. Studies in Conflict & Terrorism 31(7): 605–626.
Sassenberg, K. and Jonas, K.J. (2007) Attitude change and social influence on the net. In: A. Joinson, K.A. McKenna, T. Postmes and U.-D. Reips (eds.) Oxford Handbook of Internet Psychology. Oxford, UK: Oxford University Press, pp. 273–288.
Sassenberg, K., Boss, M. and Rabung, S. (2005) Attitude change in face-to-face and computer-mediated communication: Private self-awareness as mediator and moderator. European Journal of Social Psychology 35(3): 361–374.
Shelling, T. (1993) Bargaining, Communication, and Limited War. New York, NY: Irvington.
Simon, H.A. (1959) Theories of decision-making in economics and behavioral science. American Economic Review 49(3): 253–283.
Slater, M. et al (2013) Bystander responses to a violent incident in an immersive virtual environment. Plos One 8(1): e52766.
Soo Hoo, K., Goodman, S. and Greenberg, L. (1997) Information technology and the terrorist threat. Survival: Global Politics and Strategy 39(3): 135–155.
Soriano, M.R.T. (2012a) Between the pen and the sword: The global Islamic media front in the west. Terrorism and Political Violence 24(5): 769–786.
Soriano, M.R.T. (2012b) The vulnerabilities of online terrorism. Studies in Conflict & Terrorism 35(4): 263–277.
Spaaij, R. (2012) Understanding Lone-Wolf Terrorism. Global Patterns, Motivations and Prevention. London: Springer.
Spears, R., Postmes, T., Lea, M. and Watt, S.E. (2001) A side view of social influence. In: J.P. Forgas and K.D. Williams (eds.) Social Influence: Direct and Indirect Processes. New York: Psychology Press, pp. 331–350.
Stenersen, A. (2008) The internet: A virtual training camp? Terrorism and Political Violence 20(2): 215–233.
Tanner, C. and Medin, D. (2004) Protected values: No omission bias and no framing effects. Psychonomic Bulletin & Review 11(1): 185–191.
Thaler, R.H. (1990) Anomalies: Saving, fungibility, and mental accounts. Journal of Economic Perspectives 4(1): 193–205.
Thaler, R.H. (1999) Mental accounting matters. Journal of Behavioral Decision Making 12(3): 183–206.
Tsfati, Y. and Weimann, G. (2002) www.terrorism.com: Terror on the Internet. Studies in Conflict & Terrorism 25(5): 317–332.
Turner, J.C., Hogg, M.A., Oakes, P.J., Reicher, S.D. and Wetherell, M.C. (1987) Rediscovering the Social Group: A Self-Categorization Theory. Oxford, UK: Basil Blackwell.
Tversky, A. and Kahneman, D. (1974) Judgment under uncertainty: Heuristics and biases. Science 185(4157): 1124–1131.
Uda, R.T. (2012) Cybercrime, Cyberterrorism, and Cyberwarfare: Crime, Terror, and War without Conventional Weapons. Bloomington, IN: Xlibris.
Urban, M. (2010) Task Force Black: The Explosive True Story of the SAS and the Secret War in Iraq. London: Abacus.
Van Creveld, M. (1991) The Transformation of War. New York: Free Press.
Van Vugt, M. and Hart, C.M. (2004) Social identity as social glue: The origins of group loyalty. Journal of Personality and Social Psychology 86(4): 585–98.
Wagner, A. (2007) Intelligence for counter‐terrorism: Technology and methods. Journal of Policing, Intelligence and Counter Terrorism 2(2): 48–61.
Walker, J.J. (2012) Cyber Security Concerns for Emergency Management. In: B. Eksioglu (ed.) Emergency Management. Rijeka, Croatia: InTech, http://www.intechopen.com/books/emergency-management/cyber-security-concerns-for-emergency-management, accessed 31 December 2012.
Washington, L.D. (2007) Revealed: Saddam ‘ready to walk away for $1bn’. The Independent 29 September, http://www.independent.co.uk/news/world/middle-east/revealed-saddam-ready-to-walk-away-for-1bn-403862.html, accessed 31 December 2012.
Waterfield, B. (2011) Libya: Col Gaddafi still has quarter of chemical weapons stockpile. The Telegraph 28 April, http://www.telegraph.co.uk/news/worldnews/africaandindianocean/libya/8481250/Libya-Col-Gaddafi-still-has-quarter-of-chemical-weapons-stockpile.html, accessed 30 December 2012.
Weimann, G. (2006) Virtual disputes: The use of the internet for terrorist debates. Studies in Conflict & Terrorism 29(7): 623–639.
Weimann, G. (2008) The psychology of mass-mediated terrorism. American Behavioral Scientist 52(1): 69–86.
Weimann, G. (2011) Cyber-fatwas and terrorism. Studies in Conflict & Terrorism 34(10): 765–781.
Weimann, G. and Von Knop, K. (2008) Applying the notion of noise to countering online terrorism. Studies in Conflict & Terrorism 31(10): 883–902.
Whine, M. (2011) Cyberspace – a new medium for communication, command, and control by extremists. Studies in Conflict & Terrorism 22(3): 231–245.
Whitty, M.T. and Carville, S.E. (2008) Would I lie to you? Self-serving lies and other-oriented lies told across different media. Computersin Human Behavior 24(3): 1021–1031.
Whitty, M.T., Buchanan, T., Joinson, A.N. and Meredith, A. (2012) Not all lies are spontaneous: An examination of deception across different modes of communication. Journal of the American Society for Information Science and Technology 63(1): 208–216.
Williams, R. (2012) North Korea ‘has ability to fire a rocket that could hit the United States’, says South. Independent 23 December, http://www.independent.co.uk/news/world/asia/north-korea-has-ability-to-fire-a-rocket-that-could-hit-the-united-states-says-south-8430340.html?origin=internalSearch, accessed 30 December 2012.
Zhang, G.X. (2005) Analysis on the inclination of group polarization from subject of public opinion in the cyber space. Journal of Qingdao of Science and Technology, http://en.cnki.com.cn/Article_en/CJFDTOTAL-QDHS200504022.htm, accessed 24 January 2013.
Zimbardo, P. (2008) The Lucifer Effect: How Good People Turn Evil. New York: Random House.
Zimbler, M. and Feldman, R.S. (2011) Liar, liar, hard drive on fire: How media context affects lying behavior. Journal of Applied Social Psychology 41(10): 2492–2507.
Author information
Authors and Affiliations
Additional information
Correction
This article has been corrected online to add the details of a contributing author. No other element has been changed.
Rights and permissions
About this article
Cite this article
Palasinski, M., Bowman-Grieve, L. Tackling cyber-terrorism: Balancing surveillance with counter-communication. Secur J 30, 556–568 (2017). https://doi.org/10.1057/sj.2014.19
Published:
Issue Date:
DOI: https://doi.org/10.1057/sj.2014.19