Cyberterrorism 2 0 or terrorist use of social media: the Islamic State case

Autores

DOI:

https://doi.org/10.26792/rbed.v7n2.2020.75210

Palavras-chave:

Estado Islâmico, Mídias sociais, SAM Framework, Terrorismo Cibernético

Resumo

Cyberspace has become a common source of international security threats, especially after September 11. The emergence and popularisation of so-called social media have enhanced the militancy of the most diverse groups, including terrorist ones. This article problematises international terrorism, pointing out the causes and effects of this 21st-century phenomenon that we name cyberterrorism 2.0. Thus, we focus on the cyberterrorism studies that analyse social media usage's inputs and outputs by terrorist groups. Through Webometrics and the framework Stakeholders, Activities and Motives in the realm of cybersecurity (SAM), we aim to explain, in the light of International Security Studies and through the Islamic State case study, how cyberterrorism 2.0 arises, develops and impacts national security.

Downloads

Não há dados estatísticos.

Biografia do Autor

Gills Vilar-Lopes, Universidade da Força Aérea (UNIFA)

Doutor em Ciência Política -- Área de Concentração: Relações Internacionais (RI) -- pela Universidade Federal de Pernambuco (UFPE, 2016), com bolsa do Programa de Apoio ao Ensino e à Pesquisa Científica e Tecnológica em Assuntos Estratégicos de Interesse Nacional - Pró-Estratégia (CAPES & Secretaria de Assuntos Estratégicos da Presidência da República). Mestre, com distinção, em Ciência Política/RI pela UFPE (2013), com bolsa do CNPq e período-sanduíche no Institut Québécois des Hautes Études Internationales (HEI) da Université Laval, no Canadá (2012-2013). Specialized Course em Cybersecurity: Issues in National and International Security pela National Defense University (NDU), em Washington DC (2013). Especialista em MBA Executivo em Gestão Pública pela Universidade Candido Mendes (UCAM, 2017). Bacharel em RI pela Universidade Estadual da Paraíba (UEPB, 2010).

Marcelo de Almeida Medeiros, Universidade Federal de Pernambuco (UFPE) Federal University of Pernambuco, UFPE

Professor Titular de Política Internacional Comparada do Departamento de Ciência Política da Universidade Federal de Pernambuco - UFPE e Bolsista de Produtividade em Pesquisa - Nível 1C do Conselho Nacional de Desenvolvimento Científico e Tecnológico - CNPq onde, atualmente, é membro do Comitê de Assessoramento da Coordenação do Programa de Pesquisa em Ciências Sociais Aplicadas e Educação - COSAE (CA-CS).

Referências

Adl. 2011. “Al Shabab launches apparent Twitter campaign”. http://www.adl. org/combating-hate/international-extremism-terrorism/c/shabaab-launches- twitter.html.

_____. 2012. “Tweeting for terror”. http://www.adl.org/combating-hate/ international-extremism-terrorism/c/tweeting-for-terror.html.

_____. 2014a. “Hashtag Terror: how ISIS manipulates social media”. http://www. adl.org/combating-hate/international-extremism-terrorism/c/isis-islamic- state-social-media.html.

_____. 2014b. “ISIS faces resistance from social media companies”. https://www. adl.org/blog/isis-faces-resistance-from-social-media-companies.

_____. 2015. “Homegrown Islamic Extremism in 2014: the rise of ISIS & sus- tained online recruitment”. https://www.adl.org/sites/default/files/documents/ assets/pdf/combating-hate/homegrown-islamic-extremism-in-2014-the-rise-of- isis-and-sustained-online-recruitment.pdf.

Al Jazeera. 2015. “Report: At least 2,000 women abducted by Boko Haram”. http:// www.aljazeera.com/news/2015/04/nigeria-boko-haram-150414043301574. html.

Annan, Kofi. 2005. “Uma estratégia mundial de combate ao terrorismo.” Público, Lisboa, 12 Mar, http://www.publico.pt/espaco-publico/jornal/uma-estrategia- mundial-de-combate-ao-terrorismo-10842.

Barreto, Eduardo M. 2007. “Terrorismo Cibernético e cenários especulativos”.

Revista Brasileira de Inteligência 3, no. 4: 63–76.

Brazilian Institutional Security Office, GSI. 2019. “Glossário de Segurança da Informação.” Brazil’s Republic Presidency, https://www.in.gov.br/en/web/dou/-/ portaria-n-93-de-26-de-setembro-de-2019-219115663.

_____. 2020. “National Cybersecurity Strategy.” Brazil’s Republic Presidency, http://www.planalto.gov.br/ccivil_03/_ato2019-2022/2020/decreto/D10222. htm.

Cavelty, Myriam D. 2007. “Cyber-Terror — Looming Threat or Phantom Menace? The Framing of the US Cyber-Threat Debate”. Journal of Information Technology & Politics 4, no. 1: 19–36.

_____. 2010. “Cyberwar: concept, status quo, and limitations”. CSS Analysis in Security Policy 71: 1–3.

Costa, Carlos E. B. 2012. “Tendências mundiais e seus reflexos para a defesa bra- sileira”. Revista Brasileira de Inteligência 7: 53–66.

Crosston, M. 2014. “Phreak the speak: the flawed communications within cyber intelligentsia”. In Cyberspace and International Relations: theory, prospects and challen- ges, edited by J. Kremer and B. Müller, 253–67. Heidelberg: Springer.

Demchak, Chris C. 2014. “Foreword”. In Cyberspace and International Relations: theory, prospects and challenges, edited by J. Kremer and B. Müller, v–x. Heidelberg: Springer.

European Council. 2005. “Convention on the prevention of terrorism”. https:// www.coe.int/en/web/conventions/full-list/-/conventions/treaty/196.

Ferreira, Gonçalo C. 2011. “Redes sociais de informação: uma história e um estudo de caso.” Perspectivas em Ciência da Informação 16, no. 3: 208–31.

Folha de S. Paulo. 2015. “Estado Islâmico divulga vídeo que mostra a execu- ção de cristãos etíopes”. Folha de S. Paulo (Abr.). http://www1.folha.uol.com. br/mundo/2015/04/1618601-estado-islamico-divulga-video-que-mostra-a- execucao-de-cristaos-etiopes.shtml.

Ford, Peter.2020.“Combattingterroristpropaganda”.Journalof Policing,Intelligence and Counter-Terrorism 15, no. 2: 175–86. DOI: 10.1080/18335330.2020.1780298.

Gagnon, Benoît. 2008. “Cyberwars and cybercrimes”. In Technocrime: technolo- gy, crime and social control, edited by Stéphane Leman-Langlois: 46–65. London: Willan Publishing.

Garcia, Gabriel. 2015. “Estado Islâmico ameaça de morte fundador do Twitter”. Info (Mar.). https://exame.com/tecnologia/estado-islamico-ameaca-de-morte- fundador-do-twitter.

Gercke, Marco. 2009. Understanding cybercrime: a guide for developing countries. Geneva: UN/ITU.

Gonçalves, Joanisval Brito, and Marcus Vinícius Reis. 2017. Terrorismo: conheci- mento e combate. Niterói: Ímpetus.

Google. 2015. “Google Trends.” http://goo.gl/3fh9Wd.

Hoffman, Bruce. 2017. Inside terrorism. 3rd ed. New York: Columbia University Press.

Karlsrud, J. 2014. “Peacekeeping 4.0: harnessing the potential of Big Data, social media, and cyber technologies”. In Cyberspace and International Relations: theory, prospects and challenges, edited by J. Kremer and B. Müller, 141–60. Heidelberg: Springer.

Katz, Rita. 2015. “Follow ISIS on Twitter: a special report on the use of social media by jihadists”. SITE Intelligence Group. http://news.siteintelgroup.com/blog/index.php/entry/192-follow-isis-on-twitter-a-special-report-on-the-use- of-social-media-by-jihadists.

Kremer, J., and B. Müller. 2014. “SAM: a framework to understand emerging challenges to states in an interconnected world”. In Cyberspace and International Relations: theory, prospects and challenges, edited by J. Kremer and B. Müller: 41–58. Heidelberg: Springer.

Kuehl, Daniel T. 2014. “From cyberspace to cyberpower: defining the problem”. In Cyberspace and International Relations: theory, prospects and challenges, edited by J. Kremer and B. Müller: 24–42. Heidelberg: Springer.

Nicol, Mark. 2015. “We can’t find enough whizzkids, says British Army as it struggles to recruit technical experts for secret unit intended to combat ISIS”. Daily Mail (April). http://www.dailymail.co.uk/news/article-3035191/We-t- whizzkids-says-British-Army-struggles-recruit-technical-experts-secret-unit- intended-combat-ISIS.html.

Raposo, Álisson C. 2007. “Terrorismo e contraterrorismo: desafio do século XXI”.

Revista Brasileira de Inteligência 3, no. 4: 39–55.

Sterne, Jim. 2010. Social media metrics. New Jersey: John Wiley & Sons. Topsy. 2015. “Topsy Sentiment Score”. http://topsy.com.

United Nations. 1995. “A/RES/49/60”. http://www.un.org/ga/search/view_ doc.asp?symbol=A/RES/49/60.

Wendt, Emerson. 2011. “Ciberguerra, inteligência cibernética e segurança vir- tual: alguns aspectos.” Revista Brasileira de Inteligência 6: 15–26.

Downloads

Publicado

2021-07-12

Como Citar

Vilar-Lopes, G., & Medeiros, M. de A. (2021). Cyberterrorism 2 0 or terrorist use of social media: the Islamic State case. Revista Brasileira De Estudos De Defesa, 7(2). https://doi.org/10.26792/rbed.v7n2.2020.75210

Edição

Seção

Dossiê Ciber