Technological Facilitation of Terrorism

This article notes the difficulty in defining cyberterrorism and several problems associated with identifying the potential misuses of the Internet and the World Wide Web by terrorist groups. In particular, the use of digital steganography has recently been identified as an emerging and alarming trend by law enforcement and intelligence agencies. This technological innovation is used as a case study of the complexities surrounding cyberterrorism, its definition, and how democracies can deal with these advances in communication technology. Supplementing this discussion is a review of the various social, regulatory, and legal forms of social intervention related to controlling electronic communications. The conclusion of this article includes an analytical framework from which additional research into these issues could be conducted and suggests how policy solutions for said complexities could be formulated.

[1]  Frederic M. Thrasher,et al.  The gang : a study of 1,313 gangs in Chicago. , 1936 .

[2]  Bruce Schneier,et al.  Applied cryptography : protocols, algorithms, and source codein C , 1996 .

[3]  John Arquilla,et al.  The Zapatista Social Netwar in Mexico , 1999 .

[4]  Jennifer Seberry,et al.  Cryptography - an introduction to computer security , 1991, Advances in computer science series.

[5]  Gerard Van der Leun,et al.  Rules of the Net: On-Line Operating Instructions for Human Beings , 1996 .

[6]  Bruce Schneier,et al.  The Electronic Privacy Papers: Documents on the Battle for Privacy in the Age of Surveillance , 1997 .

[7]  B. Hoffman,et al.  The RAND-St. Andrews chronology of international terrorism, 1994 , 1995 .

[8]  Peter J. Denning,et al.  Internet Besieged: Countering Cyberspace Scofflaws , 1997 .

[9]  H. Cooper Terrorism : The Problem of Definition Revisited , 2001 .

[10]  R. R. Caldwell,et al.  A phantom menace? Cosmological consequences of a dark energy component with super-negative equation of state , 1999, astro-ph/9908168.

[11]  P. Currie,et al.  Encyclopedia of dinosaurs , 1997 .

[12]  Peter Wayner Disappearing cryptography - being and nothingness on the net , 1996 .

[13]  Thomas Beth,et al.  Public-Key Cryptography: State of the Art and Future Directions , 1992, Lecture Notes in Computer Science.

[14]  Markus G. Kuhn,et al.  Attacks on Copyright Marking Systems , 1998, Information Hiding.

[15]  B. Hoffman Terrorism in the United States during 1985 , 1986 .

[16]  Charles H. Shireman : Punishment and Modern Society: A Study in Social Theory , 1991 .

[17]  A. Schmid,et al.  Political terrorism: A research guide to concepts, theories, data bases, and literature , 1984, American Political Science Review.

[18]  Nobelstiftelsen,et al.  Nobel : the man and his prizes , 1950 .

[19]  Charles P. Pfleeger,et al.  Security in computing , 1988 .

[20]  John Arquilla,et al.  COUNTERING NEW TERRORISM , 1998 .

[21]  Paul Davern,et al.  Steganography: Its History and Its Application to Computer Based Data Files , 1995 .

[22]  Hideki Imai,et al.  Public Key Cryptography , 2004, Lecture Notes in Computer Science.

[23]  John Arquilla,et al.  The Advent Of Netwar , 1996 .

[24]  M Comay,et al.  Political terrorism. , 1976, Mental health and society.

[25]  Stephan Katzenbeisser,et al.  Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .

[26]  Frank Tannenbaum Crime and the community , 1938 .

[27]  Gilles Brassard,et al.  Modern Cryptology: A Tutorial , 1989 .

[28]  J. D. Ballard Terrorism and political policy: Crisis and *policy making indicators in the media during legislative action , 1999 .

[29]  R. Crelinsten,et al.  A Time of Terror: How Democratic Societies Respond to Revolutionary Violence.@@@Terrorism and Criminal Justice.@@@Repression and Repressive Violence. , 1978 .

[30]  B. Werble Outsiders Studies in the Sociology of Deviance. , 1966 .

[31]  D. Kahn The codebreakers : the story of secret writing , 1968 .

[32]  Noam Chomsky,et al.  Manufacturing Consent: The Political Economy of the Mass Media , 1988 .

[33]  William Warner Fowler Terrorism Data Bases: A Comparison of Missions, Methods, and Systems, , 1981 .

[34]  Jeffrey Pope,et al.  State of the art and future directions , 2001 .

[35]  Sushil Jajodia,et al.  Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures , 2000, IH 2012.

[36]  David Garland,et al.  Punishment and modern society : a study in social theory , 1991 .

[37]  Bruce Hoffman,et al.  The Rand‐St Andrews chronology of international terrorist incidents, 1995 , 1996 .

[38]  C. Moler,et al.  Advances in Cryptology , 2000, Lecture Notes in Computer Science.

[39]  Walter M. Lioen,et al.  Factorization of RSA-140 Using the Number Field Sieve , 1999, CRYPTO 1999.

[40]  Jonathan R. White,et al.  Terrorism: An Introduction , 1990 .

[41]  Sushil Jajodia,et al.  Steganalysis: the investigation of hidden information , 1998, 1998 IEEE Information Technology Conference, Information Environment for the Future (Cat. No.98EX228).

[42]  A. Romer,et al.  The dinosaur dictionary , 1972 .

[43]  M. Wieviorka The Making of Terrorism , 1993 .

[44]  Larry Scheuermann,et al.  Netiquette , 2018, Internet Res..

[45]  Jian Zhao,et al.  In business today and tomorrow , 1998, CACM.

[46]  Ross Anderson,et al.  Information Hiding: an Annotated Bibliography , 1999 .