Skip to main content

The Impact of the Internet on Terrorism and Violent Extremism

  • Conference paper
  • First Online:
Cybersecurity in the Age of Smart Societies

Abstract

The Internet has a significant impact on both the process and planning behind cyber and physical acts and attempts to mitigate these threats. This paper aims to highlight the ways in which the Internet is used in both of these processes by drawing upon the attractiveness of the Internet to terrorist organisations and how they, therefore, use it to their advantage. Instances where the Internet has been used for threats or acts of terrorism and extremism are elaborated with examples. The paper also aims to explore how the Internet and intelligence can be used in the process of countering these online threats. Artificial Intelligence (AI) is one of the most discussed phenomenon in relation to cyber security and countering cyberterrorism due to the increased technological advancements in this field. To this end, the paper briefly draws upon this use of AI in organisations such as the Global Terrorism Database (GTD) and the Institute of Strategic Dialogue (ISD) and outlines how this should be the focus of many governments in protecting their national security. The discussion of this paper revolves around the potential issues and impacts of the Internet in both the methods of conducting these attacks and in countering them.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 179.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. LaFree G (2017) Terrorism and the Internet. Criminol Public Policy 16(1):93–98

    Article  Google Scholar 

  2. Aly A, Macdonald S, Jarvis L, Chen T (2016) Violent extremism online: new perspectives on terrorism and the Internet. Routledge, Abingdon

    Book  Google Scholar 

  3. Warf B, Grimes J (1997) Counterhegemonic discourses and the Internet. Geogr Rev 87(2):259–274

    Article  Google Scholar 

  4. Gill P, Corner E, Conway M, Thornton A, Bloom M, Horgan J (2017) Terrorist use of the Internet by the numbers. Criminol Public Policy 16(1):99–117

    Article  Google Scholar 

  5. GCHQ (2019) The cyber threat. GCHQ: Information. https://www.gchq.gov.uk/information/cyber-threat. Accessed 25 Apr 2022

  6. Lowe D (2017) Prevent strategies: the problems associated in defining extremism: the case of the United Kingdom. Stud Confl Terror 40(11):917–933. https://doi.org/10.1080/1057610X.2016.1253941

    Article  Google Scholar 

  7. Awan I (2017) Cyber-extremism: Isis and the power of social media. Society 54(2):138–149

    Google Scholar 

  8. Chen H (2007) Exploring extremism and terrorism on the web: the dark web project. In: Pacific-Asia workshop on intelligence and security informatics. Springer, Berlin, pp 1–20

    Google Scholar 

  9. Marsili M (2019) The war on cyberterrorism. Democr Secur 15(2):172–199. https://doi.org/10.1080/17419166.2018.1496826

    Article  Google Scholar 

  10. Pollitt M (1991) Cyberterrorism—fact or fancy? Comput Fraud Secur 2:8–10

    Google Scholar 

  11. Grabosky P (2015) Organized cybercrime and national security. In: Cybercrime risks and responses, pp 67–80

    Google Scholar 

  12. Lewis JA (2002) Assessing the risks of cyber terrorism, cyber war and other cyber threats. Center for Strategic & International Studies, Washington, DC, pp 1–12

    Google Scholar 

  13. Weimann G (2004) Cyberterrorism: how real is the threat? United States Institute of Peace, Special Report 119, vol 31. https://www.ethz.ch

  14. Denning D (2001) Activism, hacktivism, and cyberterrorism: the Internet as a tool for influencing foreign policy. In: Networks and netwars: the future of terror, crime and militancy, pp 239–288

    Google Scholar 

  15. United Nations Office on Drugs and Crime (UNODC) (2012) The use of the Internet for terrorist purposes. United Nations, Vienna

    Google Scholar 

  16. Yu S, Carroll F (2021) Implication of AI in national security: understanding the security issues and ethical challenges. In: Montasari R, Jahankhani H (eds) Artificial intelligence in cyber security: impact and implications: security challenges, technical and ethical issues, forensic investigative challenges. Springer, Cham

    Google Scholar 

  17. Rowe M, Saif H (2016) Mining Pro-ISIS radicalisation signals from social media users. In: ICWSM. Association for the Advancement of Artificial Intelligence, pp 329–338

    Google Scholar 

  18. Freiburger T, Crane JS (2008) A systematic examination of terrorist use of the Internet. Int J Cyber Criminol 2(1)

    Google Scholar 

  19. Orsini A, Vecchioni M (2019) How does one become a terrorist and why: theories of radicalization. Department of Political Science. Luiss. https://tesi.luiss.it/id/eprint/24388

  20. Verhelst HM, Stannat AW, Mecacci G (2020) Machine learning against terrorism: how big data collection and analysis influences the privacy-security dilemma. Sci Eng Ethics 26:2975–2984. https://doi.org/10.1007/s11948-020-00254-w

    Article  Google Scholar 

  21. Tidy J (2022) Lapsus$: Oxford teen accused of being multi-millionaire cyber-criminal. BBC NEWS. https://www.bbc.co.uk/news/technology-60864283

  22. House of Commons Committee of Public Accounts (HCCPA) (2018) Cyber-attack on the NHS: thirty-second report of session 2017–2019. House of Commons

    Google Scholar 

  23. Corera G (2022) No 10 network targeted with spyware, says group. BBC NEWS. https://www.bbc.co.uk/news/uk-61142687

  24. Ministry of Defence (MOD) (2011) Combating cyber attacks. Defence and armed forces. GOV.UK. https://www.gov.uk/government/news/combating-cyber-attacks

  25. Gupta P, Varshney P, Bhatia MPS (2017) Identifying radical social media posts using machine learning. Tech Rep. https://doi.org/10.13140/RG.2.2.15311.53926

    Article  Google Scholar 

  26. Kitrum (2020) How to use machine learning in cybersecurity? Blog. https://www.kitrum.com

  27. Jackson P (2017) If you want to understand anti-fascist movements, you need to know this history. HuffPost. https://www.huffpost.com/entry/anti-fascist-movements_b_599b11b8e4b04c532f4348f4. Accessed 29 Mar 22

  28. START (2022) Global terrorism database. National Consortium for the Study of Terrorism and Responses to Terrorism. https://www.start.umd.edu/gtd/about/. Accessed 12 Apr 2022

  29. Institute for Strategic Dialogue (IDS) (2022) Institute for Strategic Dialogue. https://www.isdglobal.org/about/

  30. Brey P (1998) Ethical aspects of information security and privacy. In: Petkovic M, Jonker W (eds) Security, privacy, and trust in modern data management. Springer, New York

    Google Scholar 

  31. Hussain Z (2017) The ABCs of machine learning: privacy and other legal concerns. Law Practices Today. https://www.lawpracticetoday.org/article/machine-learning-privacy-legal-concerns/#:~:text=%20The%20ABCs%20of%20Machine%20Learning%3A%20Privacy%20and,officer%2C%20has%20said%20that%20%E2%80%9CAI%20will...%20More%20?msclkid=5604c6d8b8c811ec94d09eb8666f6e67

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Georgina Butler .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Butler, G., Montasari, R. (2023). The Impact of the Internet on Terrorism and Violent Extremism. In: Jahankhani, H. (eds) Cybersecurity in the Age of Smart Societies. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-031-20160-8_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-20160-8_24

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-20159-2

  • Online ISBN: 978-3-031-20160-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics