Advertisement

Cyber Intelligence Against Radicalisation and Violent Extremism

  • José María Blanco
  • Jéssica Cohen
  • Holger NitschEmail author
Chapter
Part of the Security Informatics and Law Enforcement book series (SILE)

Abstract

Society’s transition into an advanced technological state has facilitated the expansion of virtual communities, some of which support counter-violent extremism and radicalisation. This development has led to the ‘war on terrorism’ moving online, as more organisations have turned to virtual methods of recruitment and the dissemination of content on a global stage. The rise in this phenomenon has called for the restructuring of contemporary policies to incorporate online methodologies into their frameworks. This chapter aims to propose a cyber intelligence framework that incorporates an evidence-based, integral and multidisciplinary structure that aids in the production of effective policies and measures. The chapter provides a critical literature review and analysis of current models linked to cyber CVE to highlight the current gaps for development. The results from the analysis show that cybersecurity methods should be used to detect new online trends, which is fundamental to understanding the dynamic methods used by counter-violent extremists. From the results found, the chapter presents a model that will effectively aid decision-making processes through a six-step evaluation process. This guides the relevant stakeholders to maintaining and developing a well-structured set of measures and policies to tackle cyber CVE.

Keywords

Terrorism Radicalisation Cybersecurity Violent extremism 

References

  1. BBC Monitoring. (2017). Analysis: Islamic state media output goes into sharp decline. London: BBC Monitoring. Retrieved March 10, 2018, from https://monitoring.bbc.co.uk/product/c1dnnj2k.Google Scholar
  2. Bermingham, A., et al. (2009). Combining social network analysis and sentiment analysis to explore the potential for online radicalisation. Paper presented at the Advances in Social Networks, Analysis and Mining Conference, Athens, Greece, 20–22 July 2009. Retrieved March 10, 2018, from https://pdfs.semanticscholar.org/f2cd/7582c93c90bd21344c90852e2a0892b1cb8a.pdf.
  3. Blanco, J. M., & Cohen, J. (2014). The future of counter-terrorism in Europe. The need to be lost in the correct direction. European Journal of Future Research, 2(1), 50.CrossRefGoogle Scholar
  4. Blanco, J. M., & Cohen, J. (2016). Knowledge, the great challenge to deal with terrorism. Revista de Estudios en Seguridad Internacional, 2(1), 43–62. Retrieved March 10, 2018, from http://www.seguridadinternacional.es/revista/?q=content/knowledge-great-challenge-deal-terrorism.CrossRefGoogle Scholar
  5. Boekhorst, A. (2013). MIL and its kind. In UNESCO, 2013: Media and information literacy for knowledge societies. Moscow: UNESCO. Retrieved March 10, 2018, from http://www.ifapcom.ru/files/News/Images/2013/mil_eng_web.pdf.Google Scholar
  6. Bouhana, N., & Wikström, P. H. (2011). Al Qa’ida-influenced radicalisation: A rapid evidence assessment guided by situational action theory. Research, development and statistics. London: Home Office. Retrieved March 10, 2018, from http://www.homeoffice.gov.uk/publications/science-research-statistics/research-statistics/counter-terrorism-statistics/occ97?view=Binary.Google Scholar
  7. Caltagirone, S., Pendergant, A., & Betz, C. (2013). Diamond model of intrusion analysis. Hanover, MD: Center for Cyber Threat Intelligence and Threat Research, Technical Report. Retrieved March 10, 2018, from http://www.activeresponse.org/wp-content/uploads/2013/07/diamond.pdf.Google Scholar
  8. Candau, J. (2017). Ciberinteligencia, complemento perfecto para la ciberseguridad. Red Seguridad 4° trimestre. Retrieved March 10, 2018, from http://www.redseguridad.com/especialidades-tic/inteligencia/ciberinteligencia-complemento-perfecto-para-la-ciberseguridad.
  9. Carnegie Mellon University. (2013). Cyber intelligence tradecraft project: Summary of key findings. SEI Emerging Technology Center. Retrieved March 10, 2018, from https://resources.sei.cmu.edu/library/asset-view.cfm?assetid=40201.
  10. Cohen, J., & Blanco, J. M. (2016). Media and information literacy to tackle social polarization in Europe. In J. Singh, P. Kerr, & E. Hamburger (Eds.), MILID yearbook 2016 media and information literacy: Reinforcing human rights, countering radicalization and extremism. UNESCO. Retrieved March 10, 2018, from http://unesdoc.unesco.org/images/0024/002463/246371e.pdf.
  11. Conway, M., & Courtney, M. (2018). Violent extremism and terrorism online in 2017. The year in review. Vox. Retrieved March 10, 2018, from http://www.voxpol.eu/download/vox-pol_publication/YiR-2017_Web-Version.pdf.
  12. De la Corte, L. (2015). Qué sabemos y qué ignoramos sobre la radicalización yihadista?, en Antón, Joan (Coord.), Islamismo yihadista, radicalización y contrarradicalización, Inteligencia y Seguridad, Tirant lo Blanch. 97-884-9086-0588.Google Scholar
  13. Demant F., & Beatrice de Graaf (2010). How to Counter Radical Narratives: Dutch Deradicalization Policy in the Case of Moluccan and Islamic Radicals’. Studies in conflict and terrorism, 33(5), 408–428.Google Scholar
  14. Department of Homeland Security. (2012). Cyber skills task force report. Washington, DC: Homeland Security Advisory Council.Google Scholar
  15. Freese, R. (2014). Evidence-based counterterrorism or flying blind? How to understand and achieve what works. Perspectives on Terrorism, 8(1), 37–54.MathSciNetGoogle Scholar
  16. Gray, D. H., & Head, A. (2009). The importance of the internet to the post-modern terrorist and its role as a form of haven. European Journal of Scientific Research, 25(3), 396–404.Google Scholar
  17. ICSR. (ed.) (2009). Countering Online Radicalisation. A Strategy for Action. Retrieved April 16, 2018, from https://cst.org.uk/docs/countering_online_radicalisation1.pdf.
  18. iHLS. (2018). Artificial intelligence to fight online terrorism. Retrieved March 10, 2018, from https://i-hls.com/archives/81392.
  19. Intelligence and National Security Alliance (INSA). (2015). Cyber intelligence: Preparing today’s talent for tomorrow’s threats. Retrieved March 10, 2018, from https://www.insaonline.org/cyber-intelligence-preparing-todays-talents-for-tomorrows-threats/.
  20. Jarvis, L. (2014). How might we evaluate counterterrorism policy: The three W’s of counterterrorism. Eastminster. Retrieved April 16, 2018, from http://www.ueapolitics.org/2014/12/17/evaluate-counterterrorism-policy/.
  21. Kundnani, A. (2012). Radicalisation: The journey of a concept. Race & Class, 54(2), 3–25.  https://doi.org/10.1177/0306396812454984.CrossRefGoogle Scholar
  22. Lum, C., Kennedy, L. W., & Sherley, A. J. (2006). The effectiveness of counter-terrorism strategies. Campbell Systematic Reviews, 2(2).Google Scholar
  23. Martin, N., & Rice, J. (2011). Cybercrime: Understanding and addressing the concerns of stakeholders. Computers & Security, 30, 803–814.CrossRefGoogle Scholar
  24. Milliken, J. (1999). The study of discourse in international relations: A critique of research and methods. European Journal of International Relations, 5(2), 240.CrossRefGoogle Scholar
  25. Neumann, P. R. (2016). Radicalized: New jihadists and the threat to the west. London: I.B. Tauris & Co Ltd.CrossRefGoogle Scholar
  26. Radicalization Awareness Network (RAN) (2016). The role of education in preventing radicalisation. Retrieved March 10, 2018, from https://ec.europa.eu/home-affairs/sites/homeaffairs/files/what-we-do/networks/radicalisation_awareness_network/ran-papers/docs/role_education_preventing_radicalisation_12122016_en.pdf.
  27. RAND. (2013). 2013 RAND annual report. Retrieved March 10, 2018, from https://www.rand.org/pubs/corporate_pubs/CP1-2013.html.
  28. Rashid, M.I. (2016). Online radicalization: Bangladesh perspective. A thesis presented to the Faculty of the U.S. Army Command and General Staff College in partial fulfilment of the requirements for the degree Master of Military Art and Science, Bangladesh University of Professionals, Dhaka, Bangladesh. Retrieved March 10, 2018, from https://www.hsdl.org/?view&did=802928.
  29. Reinares, F., & García-Calvo, C. (2017). Dos factores que explican la radicalización yihadista en España. ARI 62/2017. Real Instituto Elcano. Retrieved March 10, 2018, from http://www.realinstitutoelcano.org/wps/wcm/connect/c0f6216d-fe2a-4667-8b11-a326220f9a22/ARI62-2017-Reinares-GarciaCalvo-Vicente-Dos-factores-explican-radicalizacion-yihadista-Espana.pdf?MOD=AJPERES&CACHEID=c0f6216d-fe2a-4667-8b11-a326220f9a22.
  30. Romaniuk, P. (2015). Does CVe work? Lessons learned from the global effort to counter violent extremism. New York: Global Center on Cooperative Security. Retrieved March 10, 2018, from http://www.globalcenter.org/wp-content/uploads/2015/09/Does-CVE-Work_2015.pdf.Google Scholar
  31. RSA. (2012). Getting ahead of advanced threats. The security division of EMC. Retrieved March 10, 2018, from https://www.rsashare.com/leadership/articles/getting-ahead-of-advanced-threats.htm.
  32. Schmid, A.P. (2013). Radicalisation, de-radicalisation, counter-radicalisation: A conceptual discussion and literature review. ICCT Research Paper. The Hague: International Centre for Counter-Terrorism. Retrieved March 10, 2018, from http://www.icct.nl/download/file/ICCT-Schmid-Radicalisation-De-Radicalisation-Counter-Radicalisation-March-2013.pdf.
  33. SCONUL. (2011). The SCONUL seven pillars of information literacy core model for higher education. Retrieved March 10, 2018, from https://www.sconul.ac.uk/sites/default/files/documents/coremodel.pdf.
  34. Spencer, A. (2006). The problems of evaluating counter-terrorism. UNISCI Discussion Papers, 12, 179–201.Google Scholar
  35. United Nations Office on Drugs and Crime UNODC. (2012). The use of the internet for terrorist purposes. Retrieved March 10, 2018, from https://www.unodc.org/documents/frontpage/Use_of_Internet_for_Terrorist_Purposes.pdf.

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • José María Blanco
    • 1
  • Jéssica Cohen
    • 2
  • Holger Nitsch
    • 3
    Email author
  1. 1.CIPHERProsegur CompanyMadridSpain
  2. 2.ProsegurMadridSpain
  3. 3.Department for PolicingUniversity for Applied Sciences in BavariaFürstenfeldbruckGermany

Personalised recommendations