Skip to main content icon/video/no-internet

The term Internet terrorism refers to any use of the Internet and World Wide Web for the purpose of promoting and advocating radical ideas and practices, particularly for recruiting, training, planning, and executing a horrific act of violence, against individuals or institutions, causing major property damage and severe psychosocial trauma. In contrast, cyberterrorism refers to the use of dangerous viruses, complex information technology, and advanced digital coding to launch a lethal viral attack against a network of computers of other establishments, companies, institutions, banks, military, universities, governments, or sensitive developing programs. The goal of any cyberspace attack would be to infect the target in a major way and to disrupt (if not completely destroy) its main operation for an extended period.

There have been many definitions and conceptualizations of terrorism, and currently, there is debate about what actually constitute a cyberspace attack. Evidently, each party or agency defines terrorism, in general, and cyberterrorism, in particular, based on its own views, experiences, interests, perspectives, policies, and powers. Thus, this describes the wide variety of definitions available, ranging all the way from the more theoretical and objective ones to the more practical and subjective ones.

This entry discusses how the Internet is presently being used for destructive purposes, for promoting dangerous views and ideologies, and for installing strong anxieties and fears among the masses, all in a timely manner. Also, this article reviews the concepts of fundamentalism, militancy, and radicalization; further defines terrorism and cyber-attack; and describes ways radical organizations use networking and fundraising as well as some online tactics called asymmetric thinking, cyber-war, and cyber-fear.

The Global Village and its Hazards

In recent years, the Internet has created an unparalleled ability to link the world closely and to expand the concept of a universal community, or a global village. Information technology and wireless networking have an instant, effective, and international outreach—for some people, just by using a few mouse clicks. Physical boundaries or geographical borders are not as defined, protective, or relevant as they were before the electronic revolution. Telecommunications and digital data saving, including documents, voices, scripts, maps, live images, and diagrams, are being transmitted rapidly and accurately to all corners of the earth. However, people, agencies, and infrastructures have begun to feel extremely vulnerable in the face of possible intrusions by hackers and have anxiously attempted to update their protective measures by continually redesigning their security techniques. It seems that the war between the virus-attack campaigns and the antivirus fortifications is being waged endlessly. The enormous scope of the World Wide Web and the endless possibilities of its use and application have opened countless doors for equally monumental risks and global dangers.

Soon after the exponential growth of Internet technology, and following its utopian promises to make the world a much better place, severe hazards and serious challenges began to surface—aggressive and violent contents, lack of personal safety and security, the spread of extremist organizations, intrusive advertisements, blurred lines between personal opinions and professional resources, and the explosion of pornography, among others.

Among the timely and hot topics discussed recently, within political, social, cultural, military, and religious circles, is the subtle use of Internet by many overt and covert groups for the sake of spreading their fanatic, extreme, radical, and militant ideas. Any assembly or company can use the Internet as a platform to promote its own agenda or products. With the overwhelming number of websites and link pages available, however, it is almost impossible for readers to sort out such a magnitude of data and flood of information or to screen all the sources, contents, applications, and sites' legitimacy. Certain militant groups have relied on the approach called asymmetric thinking, using advanced computer technology to design, plan, and execute a big threat or a major attack of great magnitude, such as al-Qaeda's use of commercial airplanes as missiles, a tactic that had never been deployed before. Asymmetric warfare relies on untraditional and unconventional use of applied technology to interrupt the pace of contemporary modern life and reshape the flow of events in society.

...

  • Loading...
locked icon

Sign in to access this content

Get a 30 day FREE TRIAL

  • Watch videos from a variety of sources bringing classroom topics to life
  • Read modern, diverse business cases
  • Explore hundreds of books and reference titles

Sage Recommends

We found other relevant content for you on other Sage platforms.

Loading