Skip to main content
Log in

Tackling cyber-terrorism: Balancing surveillance with counter-communication

  • Original Article
  • Published:
Security Journal Aims and scope Submit manuscript

Abstract

Cyberspace has expanded the arena within which extremists and terrorists operate, posing a range of new challenges, many of which are still to be addressed. From propaganda through recruitment to financing and attack planning, the use of the Internet has been growing in size, subtlety and sophistication, often blurring the legal with the illegal. Its interconnectivity, anonymity and affordability have served Muslim extremists, white supremacists and neo-Nazis alike. The present article analyses the online challenges posed by such groups, pointing out how they might be potentially hampered by combining the currently dominant online surveillance with marginalized cyber (counter-) communication. It also highlights the mechanisms of decision making based on matters of principle and honour, the factors that typically drive terrorist actions, showing the inadequacy of the traditional economic models, on which the surveillance largely depends and risks scaring extremists off the radar.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Notes

  1. For the practical purposes of this work, the action-connoting term ‘terrorist’ and intention-connoting term ‘violent extremist’ will be used interchangeably.

  2. See Bandura (1990) for more information on the psychological processes and mechanisms of moral disengagement.

  3. Examples abound, including Arid Uka, who shot dead two US airmen at Frankfurt Airport in March 2011, and who claimed to have been radicalized by Jihadist propaganda videos online. Colleen Renee LaRose is an American citizen charged with terrorism-related crimes; Jamie Paulin-Ramirez, 31, was detained in Ireland in connection with an alleged conspiracy to kill a Swedish cartoonist. And most recently, Anders Behring Breivik carefully prepared an Internet-based media strategy to accompany his attacks in July 2011.

  4. See, for example, the essays of Louis Beam on the concept of ‘leaderless resistance’, a philosophy whereby individual and autonomous activity is encouraged.

  5. In much the same way as Cordes (1988) discusses propaganda and auto-propaganda, with auto-propaganda aimed internally, at those involved in the movement.

References

  • Allison, G. and Zelikow, P. (1999) Essence of Decision: Explaining the Cuban Missile Crisis. New York, NY: Longman.

    Google Scholar 

  • Amble, J.C. (2012) Combating terrorism in the new media environment. Studies in Conflict & Terrorism 35(5): 339–353.

    Article  Google Scholar 

  • Ariely, D. (2008) Predictably Irrational: The Hidden Forces That Shape Our Decisions. London: HarperCollins.

    Google Scholar 

  • Ashcroft, A. (1998) NF: Marching along the informative super-highway. The Nationalist, No. 2. London (October).

  • Atran, S. (2010) Talking to the Enemy: Faith, Brotherhood, and the (Un)Making of Terrorists. New York, NY: HarperCollins.

    Google Scholar 

  • Back, L., Keith, M. and Solomos, J. (1998) Nation and race: The developing Euro-American racist subculture. In: J. Kaplan and B. Tore (eds.) Racism on the Internet: Mapping Neo-Fascist Subcultures in Cyberspace. Boston, MA: Northeastern University Press, pp. 73–101.

    Google Scholar 

  • Bailey, T.D. and Grimaila, M.R. (2006) Running the blockade: Information technology, terrorism, and the transformation of Islamic mass culture. Terrorism and Political Violence 18(4): 523–543.

    Article  Google Scholar 

  • Bandura, A. (1990) Mechanisms of moral disengagement. In: W. Reich (ed.) Origins of Terrorism: Psychologies, Ideologies, Theologies, States of Mind. Cambridge, UK: Cambridge University Press, pp. 161–191.

    Google Scholar 

  • Becker, G.S. (1962) Irrational behavior and economic theory. The Journal of Political Economy 70(1): 1–13.

    Article  Google Scholar 

  • Beidleman, S.W. (2009) Defining and Deterring Cyber War. Carlisle Barracks, PA: Army War College.

    Google Scholar 

  • Bennis, W.M., Medin, D.L. and Bartels, D.M. (2010) The costs and benefits of calculations and moral rules. Perspectives on Psychological Science 5(2): 187–202.

    Article  Google Scholar 

  • Bowden, M. (2012) The death of Osama bin Laden: How the US finally got its man. The Guardian, October, p. 12, http://www.guardian.co.uk/world/2012/oct/12/death-osama-bin-laden-us, accessed 31 December 2012.

  • Bowman-Grieve, L. (2009a) Exploring ‘stormfront’: A virtual community of the radical right. Studies in Conflict & Terrorism 32(11): 989–1007.

    Article  Google Scholar 

  • Bowman-Grieve, L. (2009b) Anti-abortion extremism online. First Monday, 14(11), http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/2679/2352, accessed 31 December 2012.

  • Brown, I. and Korff, D. (2009) Terrorism and the proportionality of internet surveillance. European Journal of Criminology 6(2): 119–134.

    Article  Google Scholar 

  • Brown University (2013) Costs of War Project, http://news.brown.edu/pressreleases/2013/03/warcosts, accessed 13 April 2014.

  • Bullock, J., Haddow, G., Coppola, D. and Yeletaysi, S. (2009) Introduction to Homeland Security: Principles of all-Hazards Response, 3rd edn. Burlington, MA: Elsevier Inc.

    Google Scholar 

  • Casebeer, W.D. and Russell, J.A. (2005) Storytelling and terrorism: Towards a comprehensive ‘counter-narrative strategy’. Strategic Insights 4(3): 1–16.

    Google Scholar 

  • Chomsky, N. (2007) Failed States: The Abuse of Power and the Assault on Democracy. London: Penguin Books.

    Google Scholar 

  • Cooper, H.H.A. (2001) Terrorism: The problem of definition revisited. American Behavioral Scientist 44(6): 881–893.

    Article  Google Scholar 

  • Cordes, B. (1988) When terrorists do the talking: Reflections on terrorist literature. In: D.C. Rapoport (ed.) Inside Terrorist Organizations. New York: Columbia University Press, pp. 150–171.

    Google Scholar 

  • Corera, G. (2008) The world’s most wanted cyber-jihadist. BBC News 16 January.

  • Dawkins, R. (2006) The God Delusion. London: Bantam Press.

    Google Scholar 

  • deGraaf, B. (2009) Counter-narratives and the unrehearsed stories counter-terrorists unwittingly produce. Perspectives on Terrorism 3(2): 5–11.

    Google Scholar 

  • Dehghani, M., Atran, S., Iliev, R., Sachdeva, S., Medin, D. and Ginges, J. (2010) Sacred values and conflict over Iran’s nuclear program. Judgement and Decision Making 5(7): 540–546.

    Google Scholar 

  • Derks, D., Fischer, A.H. and Bos, A.E.R. (2008) The role of emotion in computer-mediated communication: A review. Computers in Human Behavior 24(3): 766–785.

    Article  Google Scholar 

  • Devost, M.G. and Pollard, N.A. (2002) Taking cyberterrorism seriously. http://www.terrorism.com, accessed 7 July 2003.

  • Fischoff, B. (2011) Communicating about the risks of terrorism (or anything else). American Psychologist 66(6): 520–531.

    Article  Google Scholar 

  • Gignes, J. (1997) Deterring the terrorist: A psychological evaluation of different strategies for deterring terrorism. Terrorism and Political Violence 9(1): 170–185.

    Article  Google Scholar 

  • Ginges, J. and Atran, S. (2011) War as a moral imperative (not just practical politics by other means). Proceedings of the Royal Society Series B: Biological Sciences, February, http://rspb.royalsocietypublishing.org/content/early/2011/02/08/rspb.2010.2384.full.pdf, accessed 31 December 2012.

  • Ginges, J., Atran, S., Sachdeva, S. and Medlin, D. (2011) Psychology out of the laboratory: The challenge of violent extremism. American Psychologist 66(6): 507–19.

    Article  Google Scholar 

  • Guadagno, R.E. and Cialdini, R. (2002) Online persuasion: An examination of gender differences in computer-mediated interpersonal influence. Group Dynamics: Theory, Research and Practice 6(1): 38–51.

    Article  Google Scholar 

  • Hancock, J.T. (2007) Digital deception: When, where and how people lie online. In: K. McKenna, T. Postmes, U. Reips and A.N. Joinson (eds.) Oxford Handbook of Internet Psychology. Oxford, UK: Oxford University Press, pp. 287–301.

    Google Scholar 

  • Harkins, S.G. and Petty, R.E. (1981) The multiple source effect in persuasion: The effects of distraction. Personality and Social Psychology Bulletin 7(4): 627–635.

    Article  Google Scholar 

  • Hinde, S. (2001) Incalculable potential for damage by cyberterrorism. Computers and Security 20(7): 568–572.

    Article  Google Scholar 

  • Hoffman, B. (1999) The mind of the terrorist: Perspectives from social psychology. Psychiatric Annuals 29(6): 337–340.

    Article  Google Scholar 

  • Holt, T.J. (2012) Exploring the intersections of technology, crime, and terror. Terrorism and Political Violence 24(2): 337–354.

    Article  Google Scholar 

  • Hui, J.Y. (2011) The Internet in Indonesia: Development and impact of radical websites. Studies in Conflict & Terrorism 33(2): 171–191.

    Article  Google Scholar 

  • Jacobson, M. (2009) Terrorist drop-outs: One way of promoting a counter-narrative. Perspectives on Terrorism 3(2): 12–17.

    Google Scholar 

  • Jacobson, M. (2010) Terrorist financing and the internet. Studies in Conflict & Terrorism 33(4): 353–363.

    Article  Google Scholar 

  • Kahneman, D. (2003) Maps of bounded rationality: Psychology for behavioral economics. American Economic Review 93(5): 1449–1475.

    Article  Google Scholar 

  • Kennedy, J. and Weimann, G. (2011) The strength of weak terrorist ties. Terrorism and Political Violence 23(2): 201–212.

    Article  Google Scholar 

  • Kenney, M. (2010) Beyond the internet: Mētis, Techne, and the limitations of online artifacts for Islamist terrorists. Terrorism and Political Violence 22(2): 177–197.

    Article  Google Scholar 

  • Levin, B. (2002) Cyberhate: A legal and historical analysis of extremists’ use of computer networks in America. American Behavioural Scientist 45(6): 958–989.

    Article  Google Scholar 

  • Li, C.Y. (2013) Persuasive messages on information system acceptance: A theoretical extension of elaboration likelihood model and social influence theory. Computers in Human Behavior 29(1): 264–275.

    Article  Google Scholar 

  • Lyon, D. (2003) Technology vs ‘terrorism’: Circuits of city surveillance since September 11th. International Journal of Urban and Regional Research 27(3): 666–678.

    Article  Google Scholar 

  • Merari, A. (2010) Driven to Death: Psychological and Social Aspects of Suicide Terrorism. New York, NY: Oxford University Press.

    Google Scholar 

  • Moghaddam, F.M. (2005) The staircase to terrorism. A psychological exploration. American Psychologist 60(2): 161–169.

    Article  Google Scholar 

  • NCSL (2008) Definition of cyberterrorism. National Conference for State Legislatures. http://www.ncsl.org/issues-research/justice/terrorism-and-criminal-justice.aspx, accessed 26 December 2012.

  • Nisbett, R. and Ross, L. (1980) Human Inference: Strategies and Shortcomings of Social Judgement. Englewood Cliffs, NJ: Prentice-Hall.

    Google Scholar 

  • Palasinski, M. (2012) Online security and cyberbystander relations in mobilizing sex abuse intervention. Cyberpsychology, Behavior, and Social Networking 15(10): 551–554.

    Article  Google Scholar 

  • Pape, R. (2005) Dying to Win: The Strategic Logic of Suicide Terrorism. New York: Random House.

    Google Scholar 

  • Pape, R. and Feldman, J. (2010) Cutting the Fuse: The Explosion of Global Terrorism and How to Stop it. Chicago, IL: University of Chicago Press.

    Book  Google Scholar 

  • Parti, K. (2010) Actual policing in virtual reality – a cause of moral panic or a justified need? In: J.-J. Kim (ed.) Virtual Reality, ISBN: 978-953-307-518-1, InTech, http://www.intechopen.com/books/virtual-reality/actual-policing-in-virtual-reality-a-cause-of-moral-panic-or-a-justified-need-, accessed 31 December 2012.

  • Post, J.M., Ruby, K.G. and Shaw, E.D. (2000) From car bombs to logic bombs: The growing threat from information terrorism. Terrorism and Political Violence 12(2): 97–122.

    Article  Google Scholar 

  • Postmes, T., Spears, R. and Lea, M. (1999) Social identity, normative context, and ‘deindividuation’ in computer-mediated groups. In: N. Ellemers and R. Spears (eds.) Social Identity: Context, Content, Commitment. Oxford, UK: Blackwell Science, pp. 164–183.

    Google Scholar 

  • Pynchon, M. and Borum, R. (1999) Assessing threats of targeted group violence: Contributions from social psychology. Behavioral Sciences and the Law 17(3): 339–355.

    Article  Google Scholar 

  • Reid, E.F. and Chen, H. (2007) Mapping the contemporary research domain. International Journal of Human Computer Studies 65(1): 42–56.

    Article  Google Scholar 

  • Rogers, M. (2008) The psychology of cyber-terrorism. In: A. Silke (ed.) Terrorists, Victims & Society: Psychological Perspectives on Terrorism and its Consequences. Chichester, UK: Wiley, pp. 77–92.

    Google Scholar 

  • Sageman, M. (2008) Leaderless Jihad. Philadelphia, PA: University of Pennsylvania Press.

    Book  Google Scholar 

  • Salem, A., Reid, E. and Chen, H. (2008) Multimedia content coding and analysis: Unraveling the content of jihadi extremist groups’ videos. Studies in Conflict & Terrorism 31(7): 605–626.

    Article  Google Scholar 

  • Sassenberg, K. and Jonas, K.J. (2007) Attitude change and social influence on the net. In: A. Joinson, K.A. McKenna, T. Postmes and U.-D. Reips (eds.) Oxford Handbook of Internet Psychology. Oxford, UK: Oxford University Press, pp. 273–288.

    Google Scholar 

  • Sassenberg, K., Boss, M. and Rabung, S. (2005) Attitude change in face-to-face and computer-mediated communication: Private self-awareness as mediator and moderator. European Journal of Social Psychology 35(3): 361–374.

    Article  Google Scholar 

  • Shelling, T. (1993) Bargaining, Communication, and Limited War. New York, NY: Irvington.

    Google Scholar 

  • Simon, H.A. (1959) Theories of decision-making in economics and behavioral science. American Economic Review 49(3): 253–283.

    Google Scholar 

  • Slater, M. et al (2013) Bystander responses to a violent incident in an immersive virtual environment. Plos One 8(1): e52766.

    Article  Google Scholar 

  • Soo Hoo, K., Goodman, S. and Greenberg, L. (1997) Information technology and the terrorist threat. Survival: Global Politics and Strategy 39(3): 135–155.

    Article  Google Scholar 

  • Soriano, M.R.T. (2012a) Between the pen and the sword: The global Islamic media front in the west. Terrorism and Political Violence 24(5): 769–786.

    Article  Google Scholar 

  • Soriano, M.R.T. (2012b) The vulnerabilities of online terrorism. Studies in Conflict & Terrorism 35(4): 263–277.

    Article  Google Scholar 

  • Spaaij, R. (2012) Understanding Lone-Wolf Terrorism. Global Patterns, Motivations and Prevention. London: Springer.

    Book  Google Scholar 

  • Spears, R., Postmes, T., Lea, M. and Watt, S.E. (2001) A side view of social influence. In: J.P. Forgas and K.D. Williams (eds.) Social Influence: Direct and Indirect Processes. New York: Psychology Press, pp. 331–350.

    Google Scholar 

  • Stenersen, A. (2008) The internet: A virtual training camp? Terrorism and Political Violence 20(2): 215–233.

    Article  Google Scholar 

  • Tanner, C. and Medin, D. (2004) Protected values: No omission bias and no framing effects. Psychonomic Bulletin & Review 11(1): 185–191.

    Article  Google Scholar 

  • Thaler, R.H. (1990) Anomalies: Saving, fungibility, and mental accounts. Journal of Economic Perspectives 4(1): 193–205.

    Article  Google Scholar 

  • Thaler, R.H. (1999) Mental accounting matters. Journal of Behavioral Decision Making 12(3): 183–206.

    Article  Google Scholar 

  • Tsfati, Y. and Weimann, G. (2002) www.terrorism.com: Terror on the Internet. Studies in Conflict & Terrorism 25(5): 317–332.

    Article  Google Scholar 

  • Turner, J.C., Hogg, M.A., Oakes, P.J., Reicher, S.D. and Wetherell, M.C. (1987) Rediscovering the Social Group: A Self-Categorization Theory. Oxford, UK: Basil Blackwell.

    Google Scholar 

  • Tversky, A. and Kahneman, D. (1974) Judgment under uncertainty: Heuristics and biases. Science 185(4157): 1124–1131.

    Article  Google Scholar 

  • Uda, R.T. (2012) Cybercrime, Cyberterrorism, and Cyberwarfare: Crime, Terror, and War without Conventional Weapons. Bloomington, IN: Xlibris.

    Google Scholar 

  • Urban, M. (2010) Task Force Black: The Explosive True Story of the SAS and the Secret War in Iraq. London: Abacus.

    Google Scholar 

  • Van Creveld, M. (1991) The Transformation of War. New York: Free Press.

    Google Scholar 

  • Van Vugt, M. and Hart, C.M. (2004) Social identity as social glue: The origins of group loyalty. Journal of Personality and Social Psychology 86(4): 585–98.

    Article  Google Scholar 

  • Wagner, A. (2007) Intelligence for counter‐terrorism: Technology and methods. Journal of Policing, Intelligence and Counter Terrorism 2(2): 48–61.

    Article  Google Scholar 

  • Walker, J.J. (2012) Cyber Security Concerns for Emergency Management. In: B. Eksioglu (ed.) Emergency Management. Rijeka, Croatia: InTech, http://www.intechopen.com/books/emergency-management/cyber-security-concerns-for-emergency-management, accessed 31 December 2012.

    Google Scholar 

  • Washington, L.D. (2007) Revealed: Saddam ‘ready to walk away for $1bn’. The Independent 29 September, http://www.independent.co.uk/news/world/middle-east/revealed-saddam-ready-to-walk-away-for-1bn-403862.html, accessed 31 December 2012.

  • Waterfield, B. (2011) Libya: Col Gaddafi still has quarter of chemical weapons stockpile. The Telegraph 28 April, http://www.telegraph.co.uk/news/worldnews/africaandindianocean/libya/8481250/Libya-Col-Gaddafi-still-has-quarter-of-chemical-weapons-stockpile.html, accessed 30 December 2012.

  • Weimann, G. (2006) Virtual disputes: The use of the internet for terrorist debates. Studies in Conflict & Terrorism 29(7): 623–639.

    Article  Google Scholar 

  • Weimann, G. (2008) The psychology of mass-mediated terrorism. American Behavioral Scientist 52(1): 69–86.

    Article  Google Scholar 

  • Weimann, G. (2011) Cyber-fatwas and terrorism. Studies in Conflict & Terrorism 34(10): 765–781.

    Article  Google Scholar 

  • Weimann, G. and Von Knop, K. (2008) Applying the notion of noise to countering online terrorism. Studies in Conflict & Terrorism 31(10): 883–902.

    Article  Google Scholar 

  • Whine, M. (2011) Cyberspace – a new medium for communication, command, and control by extremists. Studies in Conflict & Terrorism 22(3): 231–245.

    Article  Google Scholar 

  • Whitty, M.T. and Carville, S.E. (2008) Would I lie to you? Self-serving lies and other-oriented lies told across different media. Computersin Human Behavior 24(3): 1021–1031.

    Article  Google Scholar 

  • Whitty, M.T., Buchanan, T., Joinson, A.N. and Meredith, A. (2012) Not all lies are spontaneous: An examination of deception across different modes of communication. Journal of the American Society for Information Science and Technology 63(1): 208–216.

    Article  Google Scholar 

  • Williams, R. (2012) North Korea ‘has ability to fire a rocket that could hit the United States’, says South. Independent 23 December, http://www.independent.co.uk/news/world/asia/north-korea-has-ability-to-fire-a-rocket-that-could-hit-the-united-states-says-south-8430340.html?origin=internalSearch, accessed 30 December 2012.

  • Zhang, G.X. (2005) Analysis on the inclination of group polarization from subject of public opinion in the cyber space. Journal of Qingdao of Science and Technology, http://en.cnki.com.cn/Article_en/CJFDTOTAL-QDHS200504022.htm, accessed 24 January 2013.

  • Zimbardo, P. (2008) The Lucifer Effect: How Good People Turn Evil. New York: Random House.

    Google Scholar 

  • Zimbler, M. and Feldman, R.S. (2011) Liar, liar, hard drive on fire: How media context affects lying behavior. Journal of Applied Social Psychology 41(10): 2492–2507.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Additional information

Correction

This article has been corrected online to add the details of a contributing author. No other element has been changed.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Palasinski, M., Bowman-Grieve, L. Tackling cyber-terrorism: Balancing surveillance with counter-communication. Secur J 30, 556–568 (2017). https://doi.org/10.1057/sj.2014.19

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1057/sj.2014.19

Keywords

Navigation