Abstract
This chapter critically analyses the impact of the Internet and associated technology on the rise in terrorist attacks across the US and Europe over the last two decades. To this end, the chapter will be focusing on jihadists’ use of the Internet, yet comparisons will also be made with the radical right. Although there exist certainly differences between the groups, there are also similarities between them, and, in turn, this chapter will address these movements as a collective. The jihadist terrorist organisations that will be analysed in this chapter will include Al-Qaeda and ISIS. The findings reveal that although the Internet has been linked to the preparation and execution of attacks, as this chapter will explore, it is difficult to establish direct cause and effect associations between the Internet and the rise in attacks in Europe and the US.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Abbate (2017) What and where is the Internet? (Re)defining Internet histories. Internet Hist 1(1–2):8–14
Acharya A (2009) Targeting terrorist financing: international cooperation and new regimes. Routledge, New York
Auger V (2020) Right-Wing terror: a fifth global wave? Perspect Terror 14(3):87–97. https://doi.org/10.2307/26918302
An J, Quercia D, Crowcroft J (2013) Fragmented social media: a look into selective exposure to political news. In: Proceedings of the 22nd international conference on world wide web, pp 51–52
Archetti C (2018) The unbearable thinness of strategic communication. In: Countering online propaganda and violent extremism: the dark side of digital diplomacy. Routledge, Abingdon-on-Thames
Baugut P, Neumann K (2020) Online propaganda use during Islamist radicalization. Inf Commun Soc 23(11):1570–1592
Beirich H (2014) White homicide worldwide. Southern Poverty Law Center. https://www.splcenter.org/sites/default/files/d6_legacy_files/downloads/publication/white-homicide-worldwide.pdf. Accessed 10 Jan 2021
Benson DC (2014) Why the Internet is not increasing terrorism. Secur Stud 23(2):293–328
Bergen PL (2002) Holy War, inc.: inside the secret world of Osama bin Laden. Simon and Schuster
Bloom M (2017) Constructing expertise: terrorist recruitment and “talent spotting” in the PIRA, Al Qaeda, and ISIS. Stud Confl Terror 40(7):603–623
Bodine-Baron E, Helmus TC, Magnuson M, Winkelman Z (2016) Examining ISIS support and opposition networks on Twitter. RAND Corporation Santa Monica United States
Bowman-Grieve L (2009) Exploring “stormfront”: a virtual community of the radical right. Stud Confl Terror 32(11):989–1007
Bouhana N, Malthaner S, Schuurman B, Lindekilde L, Thornton A, Gill P (2018) Lone-actor terrorism: radicalisation, attack planning and execution. Routledge handbook of terrorism and counterterrorism. Routledge, pp 112–124
Brachman JM (2006) High-tech terror: Al-Qaeda’s use of new technology. Fletcher Forum World Affairs 30:149
Byman D, Chalk C, Hoffman B, Rosenau W, Brannan D (2001) Trends in out-side support for insurgent movement. Rand Corporation, Santa Monica, California
Clifford B (2012) The global right wing and the clash of world politics. Cambridge University Press, Cambridge
Cuddy A (2019) EU struggles over law to tackle spread of terror online. https://www.bbc.co.uk/news/world-europe-47962394. Accessed 10 Jan 2021
Comer DE (2018) The internet book: everything you need to know about computer networking and how the internet works (2nd ed). Chapman and Hall/CRC, New York
Conway M (2017) Determining the role of the Internet in violent extremism and terrorism: six suggestions for progressing research. Stud Confl Terror 40(1):77–98
Counter Terrorism Police (2020) How were tackling online terrorism. https://www.counterterrorism.police.uk/together-were-tackling-online-terrorism/. Accessed 10 Jan 2021
Crenshaw M (1981) The causes of terrorism. Comp Polit 13(4):379–399
Crenshaw M (2003) New versus old terrorism: is today‘s ‘new’ terrorism qualitatively different from pre-September 11 old terrorism. Palest Israel J Polit Econ Cult 10(1):48–53
Cronin AK (2015) ISIS is not a terrorist group: why counterterrorism won’t stop the latest Jihadist threat. Foreign Aff 94(2):87–98
Dion-Schwarz C, Manheim D, Johnston PB (2019) Terrorist use of cryptocurrencies: technical and organizational barriers and future threats. Rand Corporation, Santa Monica, California
Douglas KM, McGarthy C, Bliuc A-M, Lala G (2005) Understanding cyberhate: social competition and social creativity in online white supremacist groups. Soc Sci Comput Rev 23(1):68–76
Europol (2020) EU terrorism situation & trend report (Te-Sat). https://www.europol.europa.eu/sites/default/files/documents/european_union_terrorism_situation_and_trend_report_te-sat_2020_0.pdf. Accessed 10 Jan 2021
Europa (2020) Digital economy and society statistics—a comparison of households and individuals. https://ec.europa.eu/eurostat/statistics-explained/index.php/Digital_economy_and_society_statistics_-_households_and_individuals#Internet_access. Accessed 10 Jan 2021
Europa (2016) The Internet organised crime threat assessment (IOCTA 2016). https://www.europol.europa.eu/activities-services/main-reports/internet-organised-crime-threat-assessment-iocta-2016#:~:text=The%202016%20Internet%20Organised%20Crime,exploitation%20online%20and%20payment%20fraud. Accessed 10 Jan 2021
European Parliament (2020) Terrorist content online: tackling online terrorist propaganda. https://www.europarl.europa.eu/RegData/etudes/BRIE/2020/649326/EPRS_BRI(2020)649326_EN.pdf. Accessed 10 Jan 2021
Forest JJF (2004) Training camps and other centers of learning. In: Forest JJF (ed) Teaching terror: strategic and tactical learning in the terrorist world. Rowman & Littlefield Publishers, Lanham, MD
Freeman M (2011) The sources of terrorist financing: theory and typology. Stud Confl Terror 34:461–475
Gerwehr S, Daly S (2006) Al-Qaida: terrorist selection and recruitment. RAND Corporation, California
Giraldo JK, Trinkunas HA (2007) Terrorism financing and state responses: a comparative perspective. Stanford University Press, California
Gruen M (2004) White ethnonationalist and political Islamist methods of fund raising and propaganda on the internet. In: Gunaratna R (ed) The changing face of terrorism. Marshall Cavendish, Singapore
Gaudette T, Scrivens R, Venkatesh V (2020) The role of the Internet in facilitating violent extremism: insights from former right-wing extremists. Terror Polit Violence 1–18. https://doi.org/10.1080/09546553.2020.1784147
Gruen M (2006) Innovative recruitment and indoctrination tactics by extremists: video games, hip-hop, and the world wide web. In: Forest JJF (ed) The making of a terrorist: recruitment, training, and root causes. Praeger, Westport, CT
Halopeau B (2014) Terrorist use of the Internet. In: Cyber crime and cyber terrorism investigator’s handbook. Syngress, pp 123–132
Gill P, Horgan J, Deckert P (2014) Bombing alone: tracing the motivations and antecedent behaviors of lone-actor terrorists. J Forensic Sci 59(2):425–435
Gill P, Corner E, Conway M, Thornton A, Bloom M, Horgan J (2017) Terrorist use of the Internet by the numbers: quantifying behaviors, patterns, and processes. Criminol Public Policy 16(1):99–117
Haigh T, Russell AL, Dutton WH (2015) Histories of the Internet. Inf Cult 50:143–159
Home Office. Policy paper, Proscribed terrorist groups or organisations. July 2020. https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/901434/20200717_Proscription.pdf. Accessed 6 Jan 2020
Hegghammer T (2010) Un-inspired. http://www.jihadica.com/un-inspired/. Accessed 10 Jan 2021
Hemmingby C, Bjørgo T (2015) The dynamics of a terrorist targeting process: Anders B. Breivik and the 22 July attacks in Norway. Springer, New York
Hui JY (2010) The Internet in Indonesia: development and impact of radical websites. Stud Confl Terror 33(2):171–191
Huey L, Peladeau H (2016) Cheering on the Jihad: an exploration of women’s participation in online Pro-Jihadist networks. TSAS The Canadian Network for Research on Terrorism, Security, and Society, pp 16–07
Hill KA, Hughes JE (1998) Cyberpolitics: citizen activism in the age of the Internet. Rowman & Littlefield Publishers Inc., Lanham
Hoffman B (2006) Inside terrorism: revised and, expanded. Columbia University Press, New York
Jacobson M (2010) Terrorist financing and the Internet. Stud Confl Terror 33(4):353–363
Jackall R (ed) (1995) Propaganda, vol 8. NYU Press, New York
Jenkins BM (1980) The study of terrorism: definitional problems (No. RAND/P-6563). RAND Corp Santa Monica CA
Jenkins BM (2006) The new age of terrorism. In: Kamen D (ed) The McGrawHill homeland security handbook. McGraw-Hill, New York, pp 117–130
Kenyon P (2010) Exploring the Taliban’s complex, shadowy finances. National Public Radio. https://www.npr.org/templates/story/story.php?storyId=124821049&t=1610968475311. Accessed 10 Jan 2021
Knop K (2007) The female Jihad: Al Qaeda’s women. Stud Confl Terror 30(5):397–414
Killough A (2013) CNN Blog. House Homeland Security chairman believes suspect trained in Russia. https://politicalticker.blogs.cnn.com/2013/04/21/house-homeland-security-chairman-believes-suspect-trained-in-russia/. Accessed 10 Jan 2021
Kirby A (2007) The London bombers as “self-starters”: a case study in indigenous radicalization and the emergence of autonomous cliques. Stud Confl Terror 30(5):415–428
Koehler D (2014) The radical online: individual radicalization processes and the role of the Internet. J Deradicalization 1:116–134
Lanning K (1992) Child molesters: a behavioural analysis. National Center for Missing and Exploited Children, Washington, DC
Lemieux AF, Brachman JM, Levitt J, Wood J (2014) Inspire magazine: a critical analysis of its significance and potential impact through the lens of the information, motivation, and behavioral skills model. Terror Polit Violence 26(2):354–371
Levy I, Yusuf A (2019) How do terrorist organizations make money? Terrorist funding and innovation in the case of al-Shabaab. Stud Confl Terror 1–23. https://doi.org/10.1080/1057610X.2019.1628622
Lieberman J, Collins S (2008) Homeland security and government affairs, violent Islamist extremism, the Internet, and the homegrown terrorist threat senate committee 110th congress
Macdonald S, Whittaker J (2019) Radicalization: online terrorist propaganda, recruitment, and radicalization. CRC Press, Boca Ratan
Mehran W, Al Bayati U, Mottet M, Lemieux AF (2020) Deep analysis of Taliban videos: differential use of multimodal, visual and sonic forms across strategic themes. Stud Confl Terror 1–21. https://doi.org/10.1080/1057610X.2020.1866739
Oftedal E (2015) The financing of Jihadi Terrorist cells in Europe. Norwegian Institute of International Affairs, Norway
O’Hara K, Stevens D (2015) Echo chambers and online radicalism: assessing the Internet’s complicity in violent extremism. Policy Internet 7(4):401–422
O’Neil A (2017) Right wing terrorism in the west: radicalization and decentralization. Пyти к миpy и бeзoпacнocти 1:125–137
Qin J, Xu JJ, Hu D, Sageman M, Chen H (2005) Analyzing terrorist networks: a case study of the global Salafi Jihad Network. In: International conference on intelligence and security informatics. Springer, Berlin, Heidelberg, pp 287–304
Rapoport DC (2004) The four waves of modern terrorism. Attacking terrorism: elements of a grand strategy. Georgetown University Press, Washington, DC
Roberts H (2016) Logics of Jihadi violence in North Africa. In: Jihadi terrorism and the radicalisation challenge. Routledge, pp 41–58
Sageman M (2008) The next generation of terror. Foreign Policy 165:37
Schuurman B, Bakker E, Gill P, Bouhana N (2018) Lone actor terrorist attack planning and preparation: a data-driven analysis. J Forensic Sci 63(4):1191–1200
Stenersen A (2008) The Internet: a virtual training camp? Terror Polit Violence 20(2):215–233
Tamimi A (2007) Hamas: a history. Olive Branch Press, Oslo
Thomas TL (2003) Al Qaeda and the Internet: the danger of ‘cyberplanning’. Foreign Military Studies Office (ARMY) Fort Leavenworth Ks
Tkacheva O (2013) Internet freedom and political space. Rand Corporation, California
Tsesis A (2017) Terrorist incitement on the Internet. Fordham Law Rev 86(2):367
Tufan E, Gul H, Manap Ö, Hamarat B (2019) ISIS, an artificial terrorist organisation and bitcoin. In: Proceedings of the international scientific and practical conference “Bulgaria of regions”, vol 2, no 1
Urman A, Katz S (2020) What they do in the shadows: examining the far-right networks on Telegram. Inf Commun Soc 1–20. https://doi.org/10.1080/1369118X.2020.1803946
Vogel L (2016) Why are doctors joining ISIS? Can Med Assoc J 188(3):177–178
Weimann G (2006) Terror on the internet: the new arena, the new challenges. US Institute of Peace Press, Washington
Weimann G (2005) How modern terrorism uses the Internet. J Int Secur Affairs (8) (unpaged)
Weimann G (2016) Terrorist migration to the dark web. Perspect Terror 10(3):40–44
Winter C, Neumann P, Meleagrou-Hitchens A, Ranstorp M, Vidino L, Fürst J (2020) Online extremism: research trends in internet activism, radicalization, and counter-strategies. Int J Confl Violence 14(2):1–20
World Bank (2020) Internet penetration rates by country. https://data.worldbank.org/indicator/IT.NET.USER.ZS?most_recent_year_desc=true. Accessed 28 Dec 2020
Woods J (2007) What we talk about when we talk about terrorism: elite press coverage of terrorism risk from 1997–2005. Int J Press/Politics 12(3):3–20
Wolfowicz M (2015) A social learning theory examination of the complicity of personalization algorithms in the creation of echo chambers of online radicalization to violent extremism
Wright M (2008) Technology and terrorism: how the internet facilitates radicalization. Forensic Exam 17(4)
Yayla AS, Speckhard A (2017) Telegram: the mighty application that ISIS loves. May, 9, 332-0
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Rees, J., Montasari, R. (2022). The Impact of the Internet and Cyberspace on the Rise in Terrorist Attacks Across the US and Europe. In: Adlakha-Hutcheon, G., Masys, A. (eds) Disruption, Ideation and Innovation for Defence and Security. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-031-06636-8_7
Download citation
DOI: https://doi.org/10.1007/978-3-031-06636-8_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-06635-1
Online ISBN: 978-3-031-06636-8
eBook Packages: Political Science and International StudiesPolitical Science and International Studies (R0)