Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Terrorism

Journal

Discipline
Institution
Publication Year
Publication

Articles 1 - 30 of 72

Full-Text Articles in Entire DC Network

Geopolitics Of Cyberspace And Expansion Of Terrorism In The Central Asia, Mohammad Amin Zabihi, Saeed Shokohi, Sajad Abed Mar 2024

Geopolitics Of Cyberspace And Expansion Of Terrorism In The Central Asia, Mohammad Amin Zabihi, Saeed Shokohi, Sajad Abed

The World Research of Political Science Journal

Abstract: Terrorism, like any other phenomenon has enjoyed evolution during the course of history and it has become a paramount, influential factor in almost every aspect of national and international equations. Nowadays, terrorists, like any other activist group, use modern technologies in almost evert aspect of their strategies; thus, one should consider the role of these modern technologies that contribute to the furtherance of their malicious deeds. Therefore, it is necessary to investigate the ways terrorists act through, and importantly, the tools and instruments they exploit in order to achieve their goals. Arguably, cyberspace and other related tools and materials …


Like Treating The Symptom Rather Than The Cause - The Omission Of Courses Over Terrorism In Nsa Designated Institutions, Ida L. Oesteraas Oct 2023

Like Treating The Symptom Rather Than The Cause - The Omission Of Courses Over Terrorism In Nsa Designated Institutions, Ida L. Oesteraas

Journal of Cybersecurity Education, Research and Practice

The National Security Agency (NSA) awards Center of Academic Excellence (CAE) designations to institutions that commit to producing cybersecurity professionals who will work in careers that reduce vulnerabilities in our national infrastructure. A review of the curricula in the 327 institutions and their degree programs reveal that only two programs offer a required course about terrorism. Given the fluid nature of terrorism and its threat to national infrastructure, the omission is concerning. It is recommended that NSA-certified cybersecurity programs begin implementing educational content that aim to teach about this emerging crime and justice issue. One suggestion is to embrace the …


Assessing Nuclear Security Risks In Pakistan, Sitara Noor Jun 2023

Assessing Nuclear Security Risks In Pakistan, Sitara Noor

International Journal of Nuclear Security

Pakistan’s nuclear program and perceived nuclear security concerns have attracted global attention. The varying concerns range from the potential theft of nuclear weapons or materials to the unauthorized use of a nuclear device to terrorist groups taking control of the Pakistani government. The enduring debate, however, has oscillated between these doomsday scenarios and some optimistic considerations, where various quarters have shared their satisfaction over Pakistan’s nuclear security regime and its ability to deal with the emerging challenges. To address the evolving nature of these threats, Pakistan is constantly improving its nuclear security infrastructure. It has established a comprehensive legislative and …


Typing A Terrorist Attack: Using Tools From The War On Terror To Fight The War On Ransomware, Jake C. Porath Jan 2023

Typing A Terrorist Attack: Using Tools From The War On Terror To Fight The War On Ransomware, Jake C. Porath

Pepperdine Law Review

The United States faces a grave challenge in its fight against cyberattacks from abroad. Chief among the foreign cyber threats comes from a finite number of “ransomware-as-a-service” gangs, which are responsible for extorting billions of dollars from American citizens and companies annually. Prosecuting these cybercriminals has proven exceedingly difficult. Law enforcement often struggles to forensically trace ransomware attacks, which makes identifying and prosecuting the perpetrators challenging. Moreover, even when prosecutors can identify the perpetrators of these attacks, the ransomware gangs are headquartered in foreign adversarial nations that do not extradite criminals to the United States. Finally, ransomware gangs are governed …


Shortcut To Terrorism: Self-Radicalization And Lone- Wolf Terror Acts: A Case Study Of Indonesia, Stanislaus Riyanta May 2022

Shortcut To Terrorism: Self-Radicalization And Lone- Wolf Terror Acts: A Case Study Of Indonesia, Stanislaus Riyanta

Journal of Terrorism Studies

A surprising phenomenon was observed in the lone-wolf terror terrorism that occurred in Indonesia. This is associated with the fact that the perpetrators of seven out of thirteen cases reported were exposed to radical information through social media and the internet without directly joining a terrorist group. The process involved the intensive exploration of the internet by people previously interested in radicalism content which eventually led to self-radicalization and the subsequent terror acts. Meanwhile, Fathali M Moghaddam proposed that the process of radicalization before a terror act is conducted involves six stages of action known as the staircase to terrorism. …


Impact Of Virtual Information On Social Sustainability, Behzodbek Soipov Jan 2022

Impact Of Virtual Information On Social Sustainability, Behzodbek Soipov

The Light of Islam

The article discusses the concept of information and its importance today, the use of information in Uzbekistan and the world, the measures taken to ensure information security. In this regard, the fact that virtual information poses a direct threat to the socio-political processes of society is also covered in detail. Places where the virtual threats are reflected and ways to eliminate them have been revealed. The article illustrates how effective the virtual world and virtual communication have become for individuals and society. It is emphasized that several terms (virtual life, virtual family, and virtual love) have emerged in connection with …


Let The Machines Do The Dirty Work: Social Media, Machine Learning Technology And The Iteration Of Racialized Surveillance, Subhah Wadhawan Jan 2022

Let The Machines Do The Dirty Work: Social Media, Machine Learning Technology And The Iteration Of Racialized Surveillance, Subhah Wadhawan

Canadian Journal of Law and Technology

Post 9/11, where the current social and cultural temperature has constructed Islam as interchangeable with terrorism, digital intermediaries have responded with increased censorship of speech related to, emerging from, or advocating Islamic ideology. At the heart of this paper is the argument that digital intermediaries have relied on the opaqueness of machine learning technology (‘‘MLT”) to realize racialized surveillance, whereby speech concerning Islamic content has been disproportionally censored. This paper maps out how inherent biases concerning the ideology of Islam have been interwoven into the coding and machine learning used by the major tech giants. As a result of the …


Fear, Loathing, And The Hemispheric Consequences Of Xenophobic Hate, Ernesto Sagás, Ediberto Román Dec 2021

Fear, Loathing, And The Hemispheric Consequences Of Xenophobic Hate, Ernesto Sagás, Ediberto Román

University of Miami International and Comparative Law Review

“When you have fifteen thousand people marching up . . . how do you stop these people?” “You shoot them” [crowd member shouts] [chuckling, Trump responds:] “[O]nly in the Panhandle can you get away with that thing.”1
President Donald Trump

“Thousands of criminal aliens. They’re pouring into our country.”2
President Donald Trump

“They’re not people, these are animals.”3
President Donald Trump

“Take a look at the death and destruction that’s been caused by people coming into this country caused by people that shouldn’t be here.”4
President Donald Trump

“ [We] have millions and millions of people …


National Security Policymaking In The Shadow Of International Law, Laura T. Dickinson Oct 2021

National Security Policymaking In The Shadow Of International Law, Laura T. Dickinson

Utah Law Review

Scholars have long debated whether and how international law impacts governmental behavior, even in the absence of coercive sanction. But this literature does not sufficiently address the possible impact of international law in the area of national security policymaking. Yet, policies that the executive branch purports to adopt as a wholly discretionary matter may still be heavily influenced by international legal norms, regardless of whether or not those norms are formally recognized as legally binding. And those policies can be surprisingly resilient, even in subsequent administrations. Moreover, because they are only seen as discretionary policies, they may be more easily …


Late Xx Century – Early Xxi Century Geopolitical View Of The Asian Region, Rano Almamatovna Tuychiyeva May 2021

Late Xx Century – Early Xxi Century Geopolitical View Of The Asian Region, Rano Almamatovna Tuychiyeva

Scientific reports of Bukhara State University

Introduction. Describe the geopolitical structure of the Asian region - to cover political, economic, social, cultural and ethnic issues in East Asia, Southeast Asia (the main part of the Asia-Pacific region), South Asia, the Indian Ocean region, Central Asia and the Middle East. The number of dedicated scientific publications is significantly exceeding the number and volume of similar texts being written about other regions of the world. A review of Asian security shows that security concerns have spread throughout Asia. At the same time, such problems also have a significant negative impact on mutual economic, trade and investment relations. Research …


Tweeting Terror: Evaluating Changes To The Terror Recruitment And Radicalization Process In The Age Of Social Media, Jackson T. Grasz May 2021

Tweeting Terror: Evaluating Changes To The Terror Recruitment And Radicalization Process In The Age Of Social Media, Jackson T. Grasz

Pepperdine Policy Review

The 2019 terror attack in Christchurch, New Zealand shocked the world as a lone gunman claimed the lives of more than fifty Muslin men, women, and children. As the nation grieved and security experts searched for answers, old notions of how and why terrorism occurs began to crumble. It became clear that this attack, perpetrated by a white supremacist, was born of and carried out for a new digital age. What set this terror attack apart was the centrality of social media to the radicalization and motivation of the lone assailant. In light of this development, this paper evaluates the …


“He Who Laughs Last!” Terrorists, Nihilists, And Jokers, William S. Chavez, Luke Mccracken Mar 2021

“He Who Laughs Last!” Terrorists, Nihilists, And Jokers, William S. Chavez, Luke Mccracken

Journal of Religion & Film

Since his debut in 1940, the Joker, famed adversary of the Batman, continues to permeate the American cultural mediascape not merely as an object of consumption but as an ongoing production of popular imagination. Joker mythmakers post-1986 have reimagined the character not as superhuman but as “depressingly ordinary,” inspiring audiences both to empathize with his existential plight and to fear his terroristic violence as an increasingly compelling model of reactionary resistance to institutionality. This article examines the recent history of modern terrorism in conjunction with the “pathological nihilism” diagnosed by Nietzsche in order to elucidate the stakes and implications of …


Terror Threat At Tokyo Olympics 2021, Daiju Wada Mar 2021

Terror Threat At Tokyo Olympics 2021, Daiju Wada

Japanese Society and Culture

While we witnessed collapse of Islamic State’s territorial control, Jihadists threat will continue for decades. But the real threat will not come from groups such as Al Qaeda and Islamic State but its Salafi Jihadism. Of course, the ideological threat is not visible and can never be eradicated by military actions. Cyberspace has facilitated the threat to be transnational pandemic phenomenon, as proved by inspired individuals. The backgrounds of those vary by person and this ideology performs as a detonator in driving individuals into violent terrorists.

Japan is located at the periphery of Jihadist’s interest. But Islamic State declared their …


Study On The Implementation Of The Regulations Of Terrorism Activities In Social Media, Angga Dewanto Basari, Muhammad Syauqillah, Asep Usman Ismail Jul 2020

Study On The Implementation Of The Regulations Of Terrorism Activities In Social Media, Angga Dewanto Basari, Muhammad Syauqillah, Asep Usman Ismail

Journal of Strategic and Global Studies

The legal scope of the Terrorism Law and the Information and Electronic Transactions Law in Indonesia is considered as lacking to cover the problem of cybercrime in social media. Aside from literature review, this paper is also supported by data from direct interview with the Head of Counterterrorism Special Detachment 88 (Densus 88 AT) of Indonesian National Police. The data found out that the Terrorism Law is a repressive response towards terrorism crimes that have already occured, but less preventive to future crimes. The existence of laws in Indonesia is often one step behind its crime. The difference of perception …


The Threat Of Terrorism To Power Grids: Effects Of Electromagnetic Pulses To The United States, Justin Van Dunk Jul 2020

The Threat Of Terrorism To Power Grids: Effects Of Electromagnetic Pulses To The United States, Justin Van Dunk

Liberty University Journal of Statesmanship & Public Policy

Terrorism’s roots can be traced back to the French Revolution.[1] Since 1789 terrorism has adopted many faces and its reach stretches throughout the world. Amidst the difficulty of defining terrorism, the FBI has given us the following definition, “…the unlawful use of…violence against persons…to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives.” (Gaines & Miller, 2013, p. 539).[2] Bombing, hijacking, arson, assault, kidnapping, and hostage-taking are just a few of the attack tactics utilized throughout terrorist organization. However, with continuing advancements in technology nations need to consider …


Analysis Identity Fusion And Psychosocial Development: How The Role Of Father, Mother And Son On Radicalization Within Family, Muhammad Luthfi Zuhdi, Muhamad Syauqillah Jul 2020

Analysis Identity Fusion And Psychosocial Development: How The Role Of Father, Mother And Son On Radicalization Within Family, Muhammad Luthfi Zuhdi, Muhamad Syauqillah

Journal of Strategic and Global Studies

One of crucial issues of radicalism lately is the involvement of family members in acts of terrorism. One of those interesting case is the case of Dita Oepriyanto’s family, the perpetrator of suicide bombing in one church in Surabaya, East Java. Family involvement in extremist acts and terrorism in Indonesia is not a new thing, the story of Dita Oeprianto is a historical cycle with different shifting actors. The story of the Leader of Darul Islam, RM. Kartosuwiryo who rebelled against the Indonesian republic accompanied by his wife and wife giving birth to children in the forest can be seen …


The Changing Face Of Terrorism And The Designation Of Foreign Terrorist Organizations, Patrick J. Keenan Jul 2020

The Changing Face Of Terrorism And The Designation Of Foreign Terrorist Organizations, Patrick J. Keenan

Indiana Law Journal

In this Article, I take up one slice of what should be a broad re-examination of

U.S. law and policy. I argue that the new attacks have been undertaken by entities

that can and should be designated as foreign terrorist organizations. Doing this would

permit prosecutors to target those who support these entities with tools that are not

currently available. This Article is both a doctrinal argument that directly addresses

the many legal hurdles that make designating groups, such as foreign hackers and

troll farms, terrorist organizations a complicated endeavor, and a policy argument

about how U.S. law and policy …


Teacher Educators’ Perceptions Of Terrorism And The Role Of Education: A Qualitative Inquiry, Muhammet Fatih Alkan, Fatih Yazıcı May 2020

Teacher Educators’ Perceptions Of Terrorism And The Role Of Education: A Qualitative Inquiry, Muhammet Fatih Alkan, Fatih Yazıcı

i.e.: inquiry in education

This qualitative study aimed at revealing terrorism perceptions held by teacher educators working in Ankara, the capital of Turkey, and their opinions regarding the role of education that may play in ending terrorism. A total of 30 teacher educators took part in the study. The data were collected using a questionnaire involving open-ended questions in addition to demographics. The data were analyzed using the content analysis technique. The findings were discussed in terms of relevant literature and the social and political context of Turkey, which yielded generalizable implications to other countries with a similar social construct.


The Definition Of Terrorism, Duncan Gaswaga Feb 2020

The Definition Of Terrorism, Duncan Gaswaga

The International Journal of Ethical Leadership

No abstract provided.


Political Extremism And Domestic Terrorism In America, Mark Potok Apr 2019

Political Extremism And Domestic Terrorism In America, Mark Potok

University of Miami National Security & Armed Conflict Law Review

No abstract provided.


Terrorism As Economic Warfare: America's Risky Business, Rodger A. Bates, Bryan Labrecque Jan 2019

Terrorism As Economic Warfare: America's Risky Business, Rodger A. Bates, Bryan Labrecque

The Journal of Public and Professional Sociology

Terrorism is a form of asymmetrical warfare. Terrorists employ a variety of tactics to threaten and intimidate a group or society. Technology is an important force multiplier which may allow them engage in cost-effective actions frequently directed at economic targets. As a means of economic warfare, terrorism can disrupt, demoralize and severely diminish the ability of a group to counter the threat of a terrorist group. It is America's risky business.


International Civil Individual Responsibility And The Security Council: Building The Foundations Of A General Regime, Vincent-Joël Proulx Jan 2019

International Civil Individual Responsibility And The Security Council: Building The Foundations Of A General Regime, Vincent-Joël Proulx

Michigan Journal of International Law

This Article focuses on a few tools at the disposal of the United Nations Security Council (“UNSC”) to enhance individual (read: civil) responsibility concerning nonstate terrorist actors with a view to opening other avenues of inquiry regarding other subversive nonstate actors (“NSAs”), for instance in the areas of transnational torts, human rights (“HR”) violations, and environmental damage caused by business entities. As discussed in Part V, recent developments surrounding the application of the Alien Tort Claims Act (“ATCA”) in the United States and the prospect of establishing a basis for universal civil jurisdiction further signal that no such solid basis …


Identifikasi Ancaman Pci (Positif Clandestine Intelligence) Berbentuk Cyber Terrorism Terhadap Keamanan Nasional, Yudha Fernando Jan 2019

Identifikasi Ancaman Pci (Positif Clandestine Intelligence) Berbentuk Cyber Terrorism Terhadap Keamanan Nasional, Yudha Fernando

Jurnal Kajian Stratejik Ketahanan Nasional

Penelitian ini dilatarbelakangi oleh kewaspadaan terhadap perkembangan teknologi dunia maya yang begitu cepat sehingga menyebabkan ketergantungan padanya di hampir semua bidang. Kondisi ini berpotensi menimbulkan ancaman terhadap kemeriahan nasional kita di berbagai bidang, terutama di sektor keamanan nasional. Para peneliti mencoba mengidentifikasi ancaman Positive Clandestin Intelligence (PCI) dalam bentuk terorisme cyber pada keamanan nasional, sehingga dapat membawa para pemangku kepentingan ke tingkat pengetahuan yang lebih baik. Beberapa teori dan konsep yang digunakan peneliti terkait dengan ancaman, keamanan nasional, intelijen klandestin positif, terorisme, dan terorisme cyber (CT). Pendekatan penelitian yang digunakan dalam penelitian ini adalah pendekatan kualitatif dan jenis penelitiannya adalah …


Are Illegal Direct Actions By Animal Rights Activists Ethically Vigilante?, Michael P. Allen, Erica Von Essen May 2018

Are Illegal Direct Actions By Animal Rights Activists Ethically Vigilante?, Michael P. Allen, Erica Von Essen

Between the Species

Constructed as terrorist, illegal direct actions by animal rights activists have become the subject of draconian law enforcement measures in the US and UK. Some scholars respond to this phenomenon by interpreting such actions to protect vulnerable animals not as terrorist but civilly disobedient. This approach highlights their ethical character, as a normatively relevant consideration in the state’s law enforcement response. Consistent with this approach, we argue that illegal direct actions by animal rights activists are not terrorist, although their motivations are sometimes anti-statist and anarchist. However, we also argue that civil disobedience is an awkward fit for many such …


The Future Of Nuclear Security: A Medical Physicist’S Perspective, Katharine E. Thomson Dec 2017

The Future Of Nuclear Security: A Medical Physicist’S Perspective, Katharine E. Thomson

International Journal of Nuclear Security

Planning for the future of nuclear security is a vital and complex task, requiring cooperation and contribution from many disciplines and industries. This diversity of expertise should include the medical sector, which faces many of the same challenges as the nuclear industry: controlling access to dangerous material, creating a strong security culture, cooperating with the wider world and engaging the public.

Medical physicists, of which the author is one, oversee all aspects of small-scale radiation use. This paper discusses three key areas increasingly important to both medical and nuclear uses of radioactive materials: public engagement, prevention of nuclear and radiological …


Sony, Cyber Security, And Free Speech: Preserving The First Amendment In The Modern World, Conrad Wilton Jun 2017

Sony, Cyber Security, And Free Speech: Preserving The First Amendment In The Modern World, Conrad Wilton

Pace Intellectual Property, Sports & Entertainment Law Forum

Reprinted from 16 U.C. Davis Bus. L.J. 309 (2016). This paper explores the Sony hack in 2014 allegedly launched by the North Korean government in retaliation over Sony’s production of The Interview and considers the hack’s chilling impact on speech in technology. One of the most devastating cyber attacks in history, the hack exposed approximately thirty- eight million files of sensitive data, including over 170,000 employee emails, thousands of employee social security numbers and unreleased footage of upcoming movies. The hack caused Sony to censor the film and prompted members of the entertainment industry at large to tailor their communication …


The International Business Risk Of Terrorism: A Pragmatic Framework For Assessing Its Impact On The U.S.-Based, Small- To Medium-Sized Enterprise’S Supply Chain Operations, Scott A. Lemons Jan 2017

The International Business Risk Of Terrorism: A Pragmatic Framework For Assessing Its Impact On The U.S.-Based, Small- To Medium-Sized Enterprise’S Supply Chain Operations, Scott A. Lemons

The Hilltop Review

Purpose - Subject paper examines the international business risk of terrorism’s impact on the focal firm’s supply chain operations, as proliferated by the acceleration of globalization, via a fundamental review of pertinent country- and firm-level considerations shaped by global environmental factors. Subsequently, a managerial risk assessment and mitigation planning framework is presented for the supply chain executive’s pragmatic use.

Design/methodology/approach – Broad evaluation of contemporary viewpoints precedes a risk assessment and mitigation planning framework from the supply chain executive’s point-of-view.

Findings – While observed research found the probability of the risk of terrorism to be low, the severity (impact) of …


Facebook V. Jefferson: How Our Emerging, Networked Society Undermines Ideas Of Security And Privacy, Roy Wyman Apr 2016

Facebook V. Jefferson: How Our Emerging, Networked Society Undermines Ideas Of Security And Privacy, Roy Wyman

South Carolina Law Review

No abstract provided.


Carrots And Sticks In Cyberspace: Addressing Key Issues In The Cybersecurity Information Sharing Act Of 2015, Jamil N. Jaffar Apr 2016

Carrots And Sticks In Cyberspace: Addressing Key Issues In The Cybersecurity Information Sharing Act Of 2015, Jamil N. Jaffar

South Carolina Law Review

No abstract provided.


Book Reviews, Usawc Press Dec 2015

Book Reviews, Usawc Press

The US Army War College Quarterly: Parameters

No abstract provided.