Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Entire DC Network

Tweeting Terror: Evaluating Changes To The Terror Recruitment And Radicalization Process In The Age Of Social Media, Jackson T. Grasz May 2021

Tweeting Terror: Evaluating Changes To The Terror Recruitment And Radicalization Process In The Age Of Social Media, Jackson T. Grasz

Pepperdine Policy Review

The 2019 terror attack in Christchurch, New Zealand shocked the world as a lone gunman claimed the lives of more than fifty Muslin men, women, and children. As the nation grieved and security experts searched for answers, old notions of how and why terrorism occurs began to crumble. It became clear that this attack, perpetrated by a white supremacist, was born of and carried out for a new digital age. What set this terror attack apart was the centrality of social media to the radicalization and motivation of the lone assailant. In light of this development, this paper evaluates the …


Much Ado About Cyber-Space: Cyber-Terrorism And The Reformation Of The Cyber-Security, Christian Pedersen Jan 2014

Much Ado About Cyber-Space: Cyber-Terrorism And The Reformation Of The Cyber-Security, Christian Pedersen

Pepperdine Policy Review

The threats residing in cyber-space are becoming well understood by policymakers and security experts alike. However, cyber-security defenses and strategies cannot solely be directed towards nation states, as non-governmental actors – such as transnational crime groups and terrorist organizations are becoming increasingly reliant upon internet technologies. Attacks on the digital components of the critical infrastructure, have the potential to unleash devastation on the United States. In a time when reliability and ethnicity of the National Security Administration, the Nation’s leading digital intelligence organization, are becoming increasingly questioned; defensive measures need to be improved to prevent future attacks and improve the …