Cyber Intelligence Against Radicalisation and Violent Extremism
Society’s transition into an advanced technological state has facilitated the expansion of virtual communities, some of which support counter-violent extremism and radicalisation. This development has led to the ‘war on terrorism’ moving online, as more organisations have turned to virtual methods of recruitment and the dissemination of content on a global stage. The rise in this phenomenon has called for the restructuring of contemporary policies to incorporate online methodologies into their frameworks. This chapter aims to propose a cyber intelligence framework that incorporates an evidence-based, integral and multidisciplinary structure that aids in the production of effective policies and measures. The chapter provides a critical literature review and analysis of current models linked to cyber CVE to highlight the current gaps for development. The results from the analysis show that cybersecurity methods should be used to detect new online trends, which is fundamental to understanding the dynamic methods used by counter-violent extremists. From the results found, the chapter presents a model that will effectively aid decision-making processes through a six-step evaluation process. This guides the relevant stakeholders to maintaining and developing a well-structured set of measures and policies to tackle cyber CVE.
KeywordsTerrorism Radicalisation Cybersecurity Violent extremism
- Bermingham, A., et al. (2009). Combining social network analysis and sentiment analysis to explore the potential for online radicalisation. Paper presented at the Advances in Social Networks, Analysis and Mining Conference, Athens, Greece, 20–22 July 2009. Retrieved March 10, 2018, from https://pdfs.semanticscholar.org/f2cd/7582c93c90bd21344c90852e2a0892b1cb8a.pdf.
- Blanco, J. M., & Cohen, J. (2016). Knowledge, the great challenge to deal with terrorism. Revista de Estudios en Seguridad Internacional, 2(1), 43–62. Retrieved March 10, 2018, from http://www.seguridadinternacional.es/revista/?q=content/knowledge-great-challenge-deal-terrorism.CrossRefGoogle Scholar
- Boekhorst, A. (2013). MIL and its kind. In UNESCO, 2013: Media and information literacy for knowledge societies. Moscow: UNESCO. Retrieved March 10, 2018, from http://www.ifapcom.ru/files/News/Images/2013/mil_eng_web.pdf.Google Scholar
- Bouhana, N., & Wikström, P. H. (2011). Al Qa’ida-influenced radicalisation: A rapid evidence assessment guided by situational action theory. Research, development and statistics. London: Home Office. Retrieved March 10, 2018, from http://www.homeoffice.gov.uk/publications/science-research-statistics/research-statistics/counter-terrorism-statistics/occ97?view=Binary.Google Scholar
- Caltagirone, S., Pendergant, A., & Betz, C. (2013). Diamond model of intrusion analysis. Hanover, MD: Center for Cyber Threat Intelligence and Threat Research, Technical Report. Retrieved March 10, 2018, from http://www.activeresponse.org/wp-content/uploads/2013/07/diamond.pdf.Google Scholar
- Candau, J. (2017). Ciberinteligencia, complemento perfecto para la ciberseguridad. Red Seguridad 4° trimestre. Retrieved March 10, 2018, from http://www.redseguridad.com/especialidades-tic/inteligencia/ciberinteligencia-complemento-perfecto-para-la-ciberseguridad.
- Carnegie Mellon University. (2013). Cyber intelligence tradecraft project: Summary of key findings. SEI Emerging Technology Center. Retrieved March 10, 2018, from https://resources.sei.cmu.edu/library/asset-view.cfm?assetid=40201.
- Cohen, J., & Blanco, J. M. (2016). Media and information literacy to tackle social polarization in Europe. In J. Singh, P. Kerr, & E. Hamburger (Eds.), MILID yearbook 2016 media and information literacy: Reinforcing human rights, countering radicalization and extremism. UNESCO. Retrieved March 10, 2018, from http://unesdoc.unesco.org/images/0024/002463/246371e.pdf.
- Conway, M., & Courtney, M. (2018). Violent extremism and terrorism online in 2017. The year in review. Vox. Retrieved March 10, 2018, from http://www.voxpol.eu/download/vox-pol_publication/YiR-2017_Web-Version.pdf.
- De la Corte, L. (2015). Qué sabemos y qué ignoramos sobre la radicalización yihadista?, en Antón, Joan (Coord.), Islamismo yihadista, radicalización y contrarradicalización, Inteligencia y Seguridad, Tirant lo Blanch. 97-884-9086-0588.Google Scholar
- Demant F., & Beatrice de Graaf (2010). How to Counter Radical Narratives: Dutch Deradicalization Policy in the Case of Moluccan and Islamic Radicals’. Studies in conflict and terrorism, 33(5), 408–428.Google Scholar
- Department of Homeland Security. (2012). Cyber skills task force report. Washington, DC: Homeland Security Advisory Council.Google Scholar
- Gray, D. H., & Head, A. (2009). The importance of the internet to the post-modern terrorist and its role as a form of haven. European Journal of Scientific Research, 25(3), 396–404.Google Scholar
- ICSR. (ed.) (2009). Countering Online Radicalisation. A Strategy for Action. Retrieved April 16, 2018, from https://cst.org.uk/docs/countering_online_radicalisation1.pdf.
- iHLS. (2018). Artificial intelligence to fight online terrorism. Retrieved March 10, 2018, from https://i-hls.com/archives/81392.
- Intelligence and National Security Alliance (INSA). (2015). Cyber intelligence: Preparing today’s talent for tomorrow’s threats. Retrieved March 10, 2018, from https://www.insaonline.org/cyber-intelligence-preparing-todays-talents-for-tomorrows-threats/.
- Jarvis, L. (2014). How might we evaluate counterterrorism policy: The three W’s of counterterrorism. Eastminster. Retrieved April 16, 2018, from http://www.ueapolitics.org/2014/12/17/evaluate-counterterrorism-policy/.
- Lum, C., Kennedy, L. W., & Sherley, A. J. (2006). The effectiveness of counter-terrorism strategies. Campbell Systematic Reviews, 2(2).Google Scholar
- Radicalization Awareness Network (RAN) (2016). The role of education in preventing radicalisation. Retrieved March 10, 2018, from https://ec.europa.eu/home-affairs/sites/homeaffairs/files/what-we-do/networks/radicalisation_awareness_network/ran-papers/docs/role_education_preventing_radicalisation_12122016_en.pdf.
- RAND. (2013). 2013 RAND annual report. Retrieved March 10, 2018, from https://www.rand.org/pubs/corporate_pubs/CP1-2013.html.
- Rashid, M.I. (2016). Online radicalization: Bangladesh perspective. A thesis presented to the Faculty of the U.S. Army Command and General Staff College in partial fulfilment of the requirements for the degree Master of Military Art and Science, Bangladesh University of Professionals, Dhaka, Bangladesh. Retrieved March 10, 2018, from https://www.hsdl.org/?view&did=802928.
- Reinares, F., & García-Calvo, C. (2017). Dos factores que explican la radicalización yihadista en España. ARI 62/2017. Real Instituto Elcano. Retrieved March 10, 2018, from http://www.realinstitutoelcano.org/wps/wcm/connect/c0f6216d-fe2a-4667-8b11-a326220f9a22/ARI62-2017-Reinares-GarciaCalvo-Vicente-Dos-factores-explican-radicalizacion-yihadista-Espana.pdf?MOD=AJPERES&CACHEID=c0f6216d-fe2a-4667-8b11-a326220f9a22.
- Romaniuk, P. (2015). Does CVe work? Lessons learned from the global effort to counter violent extremism. New York: Global Center on Cooperative Security. Retrieved March 10, 2018, from http://www.globalcenter.org/wp-content/uploads/2015/09/Does-CVE-Work_2015.pdf.Google Scholar
- RSA. (2012). Getting ahead of advanced threats. The security division of EMC. Retrieved March 10, 2018, from https://www.rsashare.com/leadership/articles/getting-ahead-of-advanced-threats.htm.
- Schmid, A.P. (2013). Radicalisation, de-radicalisation, counter-radicalisation: A conceptual discussion and literature review. ICCT Research Paper. The Hague: International Centre for Counter-Terrorism. Retrieved March 10, 2018, from http://www.icct.nl/download/file/ICCT-Schmid-Radicalisation-De-Radicalisation-Counter-Radicalisation-March-2013.pdf.
- SCONUL. (2011). The SCONUL seven pillars of information literacy core model for higher education. Retrieved March 10, 2018, from https://www.sconul.ac.uk/sites/default/files/documents/coremodel.pdf.
- Spencer, A. (2006). The problems of evaluating counter-terrorism. UNISCI Discussion Papers, 12, 179–201.Google Scholar
- United Nations Office on Drugs and Crime UNODC. (2012). The use of the internet for terrorist purposes. Retrieved March 10, 2018, from https://www.unodc.org/documents/frontpage/Use_of_Internet_for_Terrorist_Purposes.pdf.