Cyberterrorism 2 0 or terrorist use of social media: the Islamic State case

Gills Vilar-Lopes, Marcelo de Almeida Medeiros

Resumo


Cyberspace has become a common source of international security threats, especially after September 11. The emergence and popularisation of so-called social media have enhanced the militancy of the most diverse groups, including terrorist ones. This article problematises international terrorism, pointing out the causes and effects of this 21st-century phenomenon that we name cyberterrorism 2.0. Thus, we focus on the cyberterrorism studies that analyse social media usage's inputs and outputs by terrorist groups. Through Webometrics and the framework Stakeholders, Activities and Motives in the realm of cybersecurity (SAM), we aim to explain, in the light of International Security Studies and through the Islamic State case study, how cyberterrorism 2.0 arises, develops and impacts national security.


Palavras-chave


Estado Islâmico; Mídias sociais; SAM Framework; Terrorismo Cibernético

Texto completo:

PDF (English)

Referências


Adl. 2011. “Al Shabab launches apparent Twitter campaign”. http://www.adl. org/combating-hate/international-extremism-terrorism/c/shabaab-launches- twitter.html.

_____. 2012. “Tweeting for terror”. http://www.adl.org/combating-hate/ international-extremism-terrorism/c/tweeting-for-terror.html.

_____. 2014a. “Hashtag Terror: how ISIS manipulates social media”. http://www. adl.org/combating-hate/international-extremism-terrorism/c/isis-islamic- state-social-media.html.

_____. 2014b. “ISIS faces resistance from social media companies”. https://www. adl.org/blog/isis-faces-resistance-from-social-media-companies.

_____. 2015. “Homegrown Islamic Extremism in 2014: the rise of ISIS & sus- tained online recruitment”. https://www.adl.org/sites/default/files/documents/ assets/pdf/combating-hate/homegrown-islamic-extremism-in-2014-the-rise-of- isis-and-sustained-online-recruitment.pdf.

Al Jazeera. 2015. “Report: At least 2,000 women abducted by Boko Haram”. http:// www.aljazeera.com/news/2015/04/nigeria-boko-haram-150414043301574. html.

Annan, Kofi. 2005. “Uma estratégia mundial de combate ao terrorismo.” Público, Lisboa, 12 Mar, http://www.publico.pt/espaco-publico/jornal/uma-estrategia- mundial-de-combate-ao-terrorismo-10842.

Barreto, Eduardo M. 2007. “Terrorismo Cibernético e cenários especulativos”.

Revista Brasileira de Inteligência 3, no. 4: 63–76.

Brazilian Institutional Security Office, GSI. 2019. “Glossário de Segurança da Informação.” Brazil’s Republic Presidency, https://www.in.gov.br/en/web/dou/-/ portaria-n-93-de-26-de-setembro-de-2019-219115663.

_____. 2020. “National Cybersecurity Strategy.” Brazil’s Republic Presidency, http://www.planalto.gov.br/ccivil_03/_ato2019-2022/2020/decreto/D10222. htm.

Cavelty, Myriam D. 2007. “Cyber-Terror — Looming Threat or Phantom Menace? The Framing of the US Cyber-Threat Debate”. Journal of Information Technology & Politics 4, no. 1: 19–36.

_____. 2010. “Cyberwar: concept, status quo, and limitations”. CSS Analysis in Security Policy 71: 1–3.

Costa, Carlos E. B. 2012. “Tendências mundiais e seus reflexos para a defesa bra- sileira”. Revista Brasileira de Inteligência 7: 53–66.

Crosston, M. 2014. “Phreak the speak: the flawed communications within cyber intelligentsia”. In Cyberspace and International Relations: theory, prospects and challen- ges, edited by J. Kremer and B. Müller, 253–67. Heidelberg: Springer.

Demchak, Chris C. 2014. “Foreword”. In Cyberspace and International Relations: theory, prospects and challenges, edited by J. Kremer and B. Müller, v–x. Heidelberg: Springer.

European Council. 2005. “Convention on the prevention of terrorism”. https:// www.coe.int/en/web/conventions/full-list/-/conventions/treaty/196.

Ferreira, Gonçalo C. 2011. “Redes sociais de informação: uma história e um estudo de caso.” Perspectivas em Ciência da Informação 16, no. 3: 208–31.

Folha de S. Paulo. 2015. “Estado Islâmico divulga vídeo que mostra a execu- ção de cristãos etíopes”. Folha de S. Paulo (Abr.). http://www1.folha.uol.com. br/mundo/2015/04/1618601-estado-islamico-divulga-video-que-mostra-a- execucao-de-cristaos-etiopes.shtml.

Ford, Peter.2020.“Combattingterroristpropaganda”.Journalof Policing,Intelligence and Counter-Terrorism 15, no. 2: 175–86. DOI: 10.1080/18335330.2020.1780298.

Gagnon, Benoît. 2008. “Cyberwars and cybercrimes”. In Technocrime: technolo- gy, crime and social control, edited by Stéphane Leman-Langlois: 46–65. London: Willan Publishing.

Garcia, Gabriel. 2015. “Estado Islâmico ameaça de morte fundador do Twitter”. Info (Mar.). https://exame.com/tecnologia/estado-islamico-ameaca-de-morte- fundador-do-twitter.

Gercke, Marco. 2009. Understanding cybercrime: a guide for developing countries. Geneva: UN/ITU.

Gonçalves, Joanisval Brito, and Marcus Vinícius Reis. 2017. Terrorismo: conheci- mento e combate. Niterói: Ímpetus.

Google. 2015. “Google Trends.” http://goo.gl/3fh9Wd.

Hoffman, Bruce. 2017. Inside terrorism. 3rd ed. New York: Columbia University Press.

Karlsrud, J. 2014. “Peacekeeping 4.0: harnessing the potential of Big Data, social media, and cyber technologies”. In Cyberspace and International Relations: theory, prospects and challenges, edited by J. Kremer and B. Müller, 141–60. Heidelberg: Springer.

Katz, Rita. 2015. “Follow ISIS on Twitter: a special report on the use of social media by jihadists”. SITE Intelligence Group. http://news.siteintelgroup.com/blog/index.php/entry/192-follow-isis-on-twitter-a-special-report-on-the-use- of-social-media-by-jihadists.

Kremer, J., and B. Müller. 2014. “SAM: a framework to understand emerging challenges to states in an interconnected world”. In Cyberspace and International Relations: theory, prospects and challenges, edited by J. Kremer and B. Müller: 41–58. Heidelberg: Springer.

Kuehl, Daniel T. 2014. “From cyberspace to cyberpower: defining the problem”. In Cyberspace and International Relations: theory, prospects and challenges, edited by J. Kremer and B. Müller: 24–42. Heidelberg: Springer.

Nicol, Mark. 2015. “We can’t find enough whizzkids, says British Army as it struggles to recruit technical experts for secret unit intended to combat ISIS”. Daily Mail (April). http://www.dailymail.co.uk/news/article-3035191/We-t- whizzkids-says-British-Army-struggles-recruit-technical-experts-secret-unit- intended-combat-ISIS.html.

Raposo, Álisson C. 2007. “Terrorismo e contraterrorismo: desafio do século XXI”.

Revista Brasileira de Inteligência 3, no. 4: 39–55.

Sterne, Jim. 2010. Social media metrics. New Jersey: John Wiley & Sons. Topsy. 2015. “Topsy Sentiment Score”. http://topsy.com.

United Nations. 1995. “A/RES/49/60”. http://www.un.org/ga/search/view_ doc.asp?symbol=A/RES/49/60.

Wendt, Emerson. 2011. “Ciberguerra, inteligência cibernética e segurança vir- tual: alguns aspectos.” Revista Brasileira de Inteligência 6: 15–26.




DOI: https://doi.org/10.26792/rbed.v7n2.2020.75210

Apontamentos

  • Não há apontamentos.


INDEXADORES