Mapping Global Cyberterror Networks: An Empirical Study of Al-Qaeda and ISIS Cyberterrorism Events

2021 ◽  
pp. 104398622110016
Author(s):  
Claire Seungeun Lee ◽  
Kyung-Shick Choi ◽  
Ryan Shandler ◽  
Chris Kayser

This study explores the internal dynamics and networks of terrorist groups in cyberspace—in particular, Al-Qaeda and the Islamic State of Iraq and al-Sham (ISIS). Using a “Global Cyberterrorism Dataset” that features data on cyberterror attacks between 2011 and 2016, this research analyzes these two terrorist groups through the lens of a cyber-conflict theory that integrates conflict theory with Jaishankar’s space transition theory. Through a network analysis methodology, we examine the invisible relationships and connections between the national origins and target countries of cyberterror attacks. The analysis focuses on the networks of national origins of terrorists and victims, network structures of Al-Qaeda and ISIS actors, and clustering networks of Al-Qaeda and ISIS cyberterrorists. Results indicate that terror in cyberspace is ubiquitous, more flexible than traditional terrorism, and that cyberattacks mostly occurred within the countries of origin. We conclude by discussing the complex features of cyberterror networks and identify some of the geostrategic implications of the divergent cyber strategies adopted by Al-Qaeda and ISIS.

2020 ◽  
Vol 17 (2) ◽  
pp. 97-114
Author(s):  
Johannes Ulrich Siebert ◽  
Detlof von Winterfeldt

To develop effective counterterrorism strategies, it is important to understand the capabilities and objectives of terrorist groups. Much of the understanding of these groups comes from intelligence collection and analysis of their capabilities. In contrast, the objectives of terrorists are less well understood. In this article, we describe a decision analysis methodology to identify and structure the objectives of terrorists based on the statements and writings of their leaders. This methodology was applied in three case studies, resulting in the three objectives hierarchies of al-Qaeda, Islamic State of Iraq and the Levant (ISIL), and Hezbollah. In this article, we propose a method to compare the three objectives hierarchies, highlight their key differences, and draw conclusions about effective counterterrorism strategies. We find that all three terrorist groups have a wide range of objectives going far beyond the objective of killing and terrorizing people in the non-Muslim world. Among the shared objectives are destroying Israel and expelling Western powers from the Middle East. All three groups share the ambition to become a leader in the Islamic world. Key distinctions are the territorial ambitions of ISIL and Hezbollah versus the large-scale attack objectives of al-Qaeda. Objectives specific to ISIL are the establishment of a caliphate in Iraq and Syria and the re-creation of the power of Sunni Islam. Hezbollah has unique objectives related to the establishment of a Palestine State and to maintain the relationship with and support of Iran and Syria. Al-Qaeda’s objectives remain focused on large-scale attacks in the West. We also note a recent shift to provide support for small-scale attacks in the West by both al-Qaeda and ISIL. Our method can be used for comparing objectives hierarchies of different organizations as well as for comparing objectives hierarchies over time of one organization.


2021 ◽  
pp. 1-31
Author(s):  
Kasaija Phillip Apuuli

Abstract Since the end of the revolution that toppled the rule of Muammar Qaddafi in October 2011, Libya has never known peace. The country descended into civil war with different factions contending for control. In this milieu, the United Nations attempted to mediate an end to the crisis but its efforts have failed to gain traction partly as a result of other mediation initiatives undertaken by several European actors. Sub-regional and continental organizations, including the Arab Maghreb Union (AMU) and the African Union (AU) respectively, that should have taken the lead in the mediation have been absent. Meanwhile, continued fighting has hampered a mediated settlement, and terrorist groups such as the Islamic State (IS) and al-Qaeda have taken advantage of the situation to establish a presence in the country. In the end, rather than ending the crisis, Libya has provided the ground for competing mediation processes which have prolonged the crisis.


2019 ◽  
Vol 15 (3) ◽  
pp. 1
Author(s):  
O. Ike Okoro ◽  
Nduka Lucas Oluka

The hazard of biological, chemical and nuclear materials, regarded as Weapons of Mass Destruction (WMD), intercalating the arsenal of terrorists is the biggest crime and challenge against humanity. Every such crime and challenge ought to be named appropriately; and state actors experiencing such owe it to their citizens to act speedily and with certainty against terrorists. Even with the on-going war on terrorism, there has been a surge in terrorist activities in some parts of the world. Terrorists in our contemporary age have also embraced startling trends in their operational mode since the 11 September 2001 fanatic attacks in New York and Washington D. C. The devastating effect of these twin attacks has raised global concern about the potential use of WMD by Al-Qaeda, the Islamic State of Iran and Syria (ISIS), and their affiliate groups. One major issue of great concern in recent times, apart from the propensity of the terrorist organizations to acquire WMD, is the involvement of state actors that secretly acquire or claim to have acquired them for the purposes of electricity generation. Notably, too, is the trend in modern scientific and technological improvement which has increased the nature of, and access to, WMD. This research, therefore, attempts to access the implication and impact of WMD as terrorists put them to use. The study also examines the concept of terrorism and WMD. Also examined is the general implication of the use of WMD and the challenges this might pose to the international community, considering the current trends in their acquisition by some states and non-state actors. The investigation suggests appropriate counter-measures to thwart terrorists’ effort to acquire WMD. The study also adopted the qualitative approach of research to analyse the sophistication adopted by new terrorist groups particularly by the ISIS terrorist network; the al-Qaeda group and other splinter groups. Thus, historical research is most appropriate for this study, and secondary source of data was adopted as its methodology.


2019 ◽  
pp. 100-122
Author(s):  
Marco Pinfari

This chapter continues with the analysis of the terrorist “actor” by highlighting how the establishment of a “revolutionary atmosphere” through the use of political violence has been a goal of several insurgent and “terrorist” groups in the Middle East, from the Palestine Liberation Organization (PLO) to al-Qaeda in Iraq to the Islamic State. First, it focuses on the reception of European left-wing “terrorism” and third-worldism in the Middle East, especially within the Palestinian nationalist movement. Then, it explains why, in the aftermath of the invasion of Iraq in 2003, several ideologues affiliated with al-Qaeda (including Abu Musab al-Suri) have recommended the use of brutal fighting techniques for establishing what al-Suri described as a “jihadi revolutionary atmosphere.” Finally, it considers the extent to which the impersonation of the prototype of monstrosity (either in its entirety or in its individual components) can help explain the modus operandi of the Islamic State.


2019 ◽  
pp. 53-76
Author(s):  
Marco Pinfari

This chapter continues with the line of argument presented in chapter 2 about the role of monster images in framing “terrorist” actors and about the recurrence of monster metaphors that not only convey their “otherness” but also, more forcefully, their resilience and unmanageability. The first paragraph presents the pseudo-scientific framing of anarchists in the late nineteenth century as half-human, half-feral uncontrollable brutes. The following section reviews the resort to religious and “cosmic war” imagery in framing “terrorist” groups as part of ethnonationalist conflicts, including the biblical “beasts” cited by Ian Paisley, the unmanageable yakku of Sinhalese folklore, and the resilient people of Amalek who fought the Israelites throughout most of their ancient history. The final paragraph introduces the concept of global jihad and discusses the reasons why Frankenstein’s monster and the hydra proved to be the most popular metaphors for describing both al-Qaeda and the Islamic State.


2018 ◽  
Vol 6 (1) ◽  
pp. 79-106 ◽  
Author(s):  
Nuria Lorenzo-Dus ◽  
Stuart Macdonald

Abstract This paper examines how the jihadist terrorist groups Al Qaeda and the so-called Islamic State discursively construct ‘the West’ as an alien, aberrant ‘other’ in their respective online propaganda magazines Inspire and Dabiq over a 5 year period (2010–2015). The analysis integrates insights from the field of Terrorism Studies into a Corpus Assisted Discourse Studies approach, working centrally with the notions of othering and conventionalised impoliteness. Our findings reveal not only that othering is a key discursive process in the groups’ online propaganda machinery but that it is discursively realised via homogenisation, suppression (stereotyping) and pejoration strategies. The latter are further examined via the notion of conventional impoliteness. Pointed criticism emerges as the most frequent conventionalised impoliteness strategy in both magazines. Threats, condescension and exclusion strategies are also saliently used, albeit with different relative frequencies within each magazine. The findings show the value of Discourse Analysis to research into (jihadist) terrorism, including the possibility of drawing upon its findings to develop tailored counter-messages to those advanced by (jihadist) terrorist groups.


2018 ◽  
Vol 37 (5) ◽  
pp. 523-540 ◽  
Author(s):  
Matteo Vergani ◽  
Ana-Maria Bliuc

We investigate differences in the psychological aspects underpinning Western mobilisation of two terrorist groups by analysing their English-language propaganda. Based on a computerised analysis of the language used in two English-language online magazines circulated by Islamic State of Iraq and Syria (ISIS) and al-Qaeda (i.e., Dabiq and Inspire), we found significant differences in their language—the ISIS’ language being higher in authoritarianism and its level of religiousness. In a follow-up experimental study, we found that being high in religiousness and authoritarianism predicts more positive attitudes towards the language used by ISIS, but not towards the language used by al-Qaeda. The results suggest that ISIS’ propaganda may be more effective in mobilising individuals who are more authoritarian and more focused on religion than that of al-Qaeda. These findings are consistent with the behaviour observed in recent homegrown terrorist attacks in the United States and Europe.


2017 ◽  
Vol 56 (2) ◽  
pp. 13-21
Author(s):  
Muhammad Azeem ◽  
Naeem `Ahmed

For the last three decades or so, Pakistan has been a severe victim of sectarian violence. Although the roots of sectarian violence in the Pakistani society could be traced to various political developments in the country and the region, such as, Zia-ul-Haq’s Islamization process, Iranian Revolution and the anti-Soviet Afghan war, during the late 1970s, the dangerous phase of sectarian menace began after the 9/11 incident when the domestic sectarian militant organizations established their links with international terrorist groups, e.g., Al-Qaeda and then the self-styled Islamic State (IS), and started playing the role of a facilitator as well as becoming the part of global Jihadism. Against this background, the paper analyzes the origins of sectarianism in Pakistan and threats which it poses to the integrity of the country. In the concluding analysis, the paper argues that the violent extremist ideology that creates ideologically-motivated committed terrorists may be countered if Pakistan reorients its strategic policies vis-à-vis its eastern and western neighbors – India and Afghanistan – by discouraging the use of proxies for pursuing its strategic interests in the region.


2020 ◽  
Vol 7 (2) ◽  
pp. 123-151
Author(s):  
Denis Sokolov

In the 2000s, Al-Qaeda, represented by the Caucasus Emirate, took over the first Chechen resistance, as well as local Islamist armed groups in Dagestan and other republics of the North Caucasus. However, a decade later, the Islamic State won the competition with Al-Qaeda, by including the involvement of women in its project. Hundreds of Russian-speaking Muslim women followed men to live by the rules of Islam. Some joined their husbands or children. Others travelled to the Islamic State in pursuit of love and romance with future husbands they had met on the internet. Based on exclusive interviews done with women detained in the Roj detention camp in the Kurdish territories in northeastern Syria near the Iraqi border, this article analyzes some of the trajectories that has pushed young North Caucasian women to the Syrian war theater in the name of love.


2017 ◽  
Author(s):  
Matteo Vergani ◽  
Ana-Maria Bliuc

We investigate differences in the psychological aspects underpinning Western mobilisation of two terrorist groups by analysing their English-language propaganda. Based on a computerized analysis of the language used in two English-language online magazines circulated by ISIS and al-Qaeda (i.e., Dabiq and Inspire), we found significant differences in their language - the ISIS’ language being higher in authoritarianism and its level of religiousness. In a follow-up experimental study, we found that being high in religiousness and authoritarianism predicts more positive attitudes towards the language used by ISIS, but not towards the language used by al-Qaeda. The results suggest that ISIS’ propaganda may be more effective in mobilising individuals who are more authoritarian and more focused on religion than that of al-Qaeda. These findings are consistent with the behaviour observed in recent homegrown terrorist attacks in the USA and Europe.


Sign in / Sign up

Export Citation Format

Share Document