Advertisement

The Role of Social Network Sites in Security Risks and Crises: The Information Warfare of Terrorism

  • Ken Wewa-WekesaEmail author
Chapter
Part of the Advanced Sciences and Technologies for Security Applications book series (ASTSA)

Abstract

Social Network Sites (SNS) have in recent years received significant universal attention in the way they have changed lives socially, politically and economically through distinct components that enable people from all over the world to connect instantly. This work analyses the aggressive nature in which terrorists quickly adapt to these SNS vis-à-vis governments’ approach to risk communication and situational crisis communication using the same media. It additionally examines literature on the publics’ cumulative behaviour regarding the use of SNS in the context of terror attacks and the terrorists’ use of the same media to coordinate their operations in recruiting people to join their organisations, planning and execution of terror attacks. To achieve that, this chapter investigates the online cumulative behaviour which has been witnessed recently (e.g. during the Westgate Mall attack by Al-Shabaab in Nairobi, Kenya in 2013) and the terrorists taking advantage of these platforms [e.g. the Islamic State of Iraq and Syria (ISIS)] to stimulate crises of national security.

Keywords

SNS Terrorism ISIS Al-Shabaab 

References

  1. Al Jazeera (2013a) Al-Shabaab in long-running battle with Twitter. Available online at: http://www.aljazeera.com/indepth/features/2013/12/Al-Shabaab-long-running-battle-with-twitter-2013121711271555968.html. Accessed 5 July 2015
  2. Al Jazeera (2013b) Kenyans tell minister: Westgate facts don’t add up. Available online at: http://stream.aljazeera.com/story/201309302016-0023074. Accessed June 30 2015
  3. Beck U (1992) Risk society: towards a new modernity. SAGE Publications, LondonGoogle Scholar
  4. Berger JM (2013a) Terrorists on social media: arguments that don’t impress me, Intel wire. Availale online at: http://news.intelwire.com/2013/10/terrorists-on-social-media-arguments.html. Accessed 8 June 2015
  5. Berger JM (2013b) Twitter’s week of reckoning. Foreign Policy. Available online at: http://www.foreignpolicy.com/articles/2013/10/01/twitters_week_of_reckoning#sthash.aObyjqaY.dpbs. Accessed 8 June 2015
  6. Berube DM, Faber B, Scheufele DA, Cummings CL, Gardner GE, Martin KN, Martin MS, Temple NM (2010) Communicating risk in the 21st century: the case of nanotechnology. Available online at: http://www.nano.gov/sites/default/files/pub_resource/berube_risk_white_paper_feb_2010.pdf. Accessed 10 Aug 2015
  7. Borodzicz EP (1996) Security and risk: a theoretical approach to managing loss prevention. Int J Risk Secur Crime Prev 1(2):131–143Google Scholar
  8. Borodzicz EP (2005) Risk, crisis and security management. Wiley, West SussexGoogle Scholar
  9. Bronskill J (2001) CSIS on alert for cyber saboteurs: spy agency monitors threat to computer networks: report. Ottawa CitizenGoogle Scholar
  10. Business Daily (2015) Facebook eyes Kenya office after South Africa. Available online at: http://www.businessdailyafrica.com/Corporate-News/Facebook-eyes-Kenya-office-after-South-Africa-entry/-/539550/2770834/-/item/0/-/n8m28wz/-/index.html. Accessed 18 July 2015
  11. Business Insider (2015) The FBI claims technology promoted by Apple and WhatsApp is helping ISIS. Available online at: http://uk.businessinsider.com/fbi-encryption-going-dark-isis-apple-facebook-whatsapp-steinbach-lieu-2015-6. Accessed 2 Aug 2015
  12. CNN (2013) How terror can breed through social media. Available online at: http://edition.cnn.com/2013/04/27/world/rivers-social-media-terror/. Accessed 5 July 2015
  13. Communications Authority of Kenya (2015) Quarterly sector statistics report: third quarter of the financial year 2014/15. Available online at: http://www.ca.go.ke/images/downloads/STATISTICS/%20Sector%20Statistics%20Q3%202014-2015.pdf. Accessed 4 Aug 2015
  14. Coombs WT (1995) Choosing the right words: the development of guidelines for the selection of the “appropriate” crisis-response strategies. Manage Commun Quarter 8:447–476Google Scholar
  15. Coombs WT (1999) Ongoing crisis communication: planning, managing, and responding. Sage, Los AngelesGoogle Scholar
  16. Coombs WT (2000) Crisis management: advantages of a relational perspective. In: Ledingham JA, Bruning SD (red). Public relations as relationship managementGoogle Scholar
  17. Coombs WT (2007) Protecting organization reputations during a crisis: the development and application of situational crisis communication theory. Corp Reputation Rev 10(3):163–176CrossRefGoogle Scholar
  18. Coombs WT, Holladay SJ (1996) Communication and attributions in a crisis: an experimental study of crisis communication. J Publ Relat Res 8:279–295CrossRefGoogle Scholar
  19. Daily Mail (2015) Fanatics are using secret message apps says anti-terror Tsar: government set to do battle with web giants including WhatsApp and Facebook after warning in landmark report. Available online at: http://www.dailymail.co.uk/news/article-3119167/Fanatics-using-secret-message-apps-says-anti-terror-tsar-Government-set-battle-web-giants-including-WhatsApp-Facebook-warning-landmark-report.html. Accessed 2 Aug 2015
  20. Denning D (2000) Cyber terrorism special oversight panel on terrorism committee on armed services, U.S. House of representatives May 23, 2000. Available online at: http://www.stealth-iss.com/documents/pdf/CYBERTERRORISM.pdf. Accessed 3 June 2015
  21. Denning D (2010) Terror’s web: how the internet is transforming terrorism. In: Yar M, Jewkes Y Handbook of internet crime. Willan Publishers, London, pp 194–212Google Scholar
  22. Dewing M (2012) Social media: an introduction, Publication No. 2010-03-E. http://www.parl.gc.ca/content/lop/researchpublications/2010-03-e.pdf. Accessed 5 June 2015
  23. DiMaggio PJ, Powell WW (1991) Introduction. In: DiMaggio PJ, Powell W (eds) The new institutionalism and organizational analysis. University of Chicago Press, Chicago. pp 1–38Google Scholar
  24. Entman MR (2004) Projections of power: framing news, public opinion, and U.S. foreign policy. University of Chicago Press, ChicagoGoogle Scholar
  25. Facebook (undated) Community Standards. Available online at: https://www.facebook.com/communitystandards. Accessed 3 July 2015
  26. Fischhoff B (2002) Assessing and communicating the risks of terrorism. In: Teich A, Nelson S, Lita S, Hunt A (eds) Science and technology in a vulnerable world. DC, AAAS, WashingtonGoogle Scholar
  27. Fischhoff B (2006) Psychological perception of risk. In: Kamien D (ed) The McGraw-Hill homeland security handbook. McGraw Hill, New York, pp 463–492Google Scholar
  28. Fox RL, Gangl A (2011) “News You Can’t Use”: politics and democracy in the new media environment. In: Le Cheminant W, Parrish JM (eds) Manipulating democracy—democratic theory, political psychology, and mass media. RoutledgeGoogle Scholar
  29. Freberg K, Palenchar MJ (2013) Convergence of digital negotiation and risk challenges. In: Social media and strategic communications. pp 83–100, Palgrave Macmillan, UKGoogle Scholar
  30. Gertz B (2013) Islamist Terrorists shifting from web to social media. The Washington Free Beacon. Available online at: http://freebeacon.com/islamist-terrorists-shifting-from-web-to-social-media/. Accessed 21 July 2015
  31. GlobalWebIndex (2013) Twitter now the fastest growing social platform in the world. Available online at: http://blog.globalwebindex.net/twitter-now-the-fastest-growing-social-platform-in-the-world/. Accessed 10 July 2015
  32. Gray GM, Ropeik DP (2002) Dealing with the dangers of fear: the role of risk communication. Health Aff 21(6):106–116CrossRefGoogle Scholar
  33. Guardian (2014) WhatsApp adds end-to-end encryption using TextSecure. Available online at: http://www.theguardian.com/technology/2014/nov/19/whatsapp-messaging-encryption-android-ios. Accessed 2 Aug 2015
  34. Irwin A (1995) Citizen science: a study of people, expertise and sustainable development. Routledge, LondonGoogle Scholar
  35. Kasperson RE, Kasperson JX (1996) The social amplification and attenuation of risk. In: Hunreuther H, Slovic P (eds) Challenges in risk assessment and risk management. The Annals of the American Academy, vol 545, no 1, pp 95–105Google Scholar
  36. Kasperson RE, Palmlund I (2005) Evaluating risk communication. In: Kasperson JX, Kasperson RE (eds) The social contours of risk, vol 1., Publics, risk communication and the social amplification of risk earth scan, London, pp 51–67Google Scholar
  37. Kohlmann E (2010) Hacking Al-Qaida: social networking, technology and terrorism. International Conference on Cyber Security (ICCS). Available online at: http://www.fordham.edu/Campus_Resources/eNewsroom/topstories_1916.asp (undated) See also http://iccs.fordham.edu/program/iccs2010/. Accessed 14 July 2015
  38. Ledingham JA, Stephen DB (1998) Relationship management in public relations: dimensions of an organization-public relationship. Publ Relat Rev 24(1):55–65CrossRefGoogle Scholar
  39. Ledingham JA (2006) Relationship management: a general theory of public relations. In: Botan CH, Hazleton V (eds) Public relations theory IIGoogle Scholar
  40. Los Angeles Times (2013a) Twitter suspends account run by Al-Qaeda-linked Somali militants. Available online at: http://articles.latimes.com/2013/jan/25/world/la-fg-wn-twitter-suspends-shabab-20130125. Accessed 5 July 2015
  41. Los Angeles Times (2013b) Kenya mall attack: official accounts of siege differ. Los Angeles Times. Available online at: http://www.latimes.com/world/worldnow/la-fg-wn-kenya-mall-conflicting-reports-20130924,0,7905720.story#axzz2pSZ6HQnK. Accessed 5 July 2015
  42. Mag PC (2015) Definition of Twitter. Available online at: http://www.pcmag.com/encyclopedia/term/57880/twitter. Accessed 16 June 2015
  43. Massey JE (2001) Managing organizational legitimacy: communications strategies for organizations in crisis. J Bus Commun 38:153–183CrossRefGoogle Scholar
  44. Nahon K, Hemsley J (2013) Going viral. Polity Press Cambridge, CambridgeGoogle Scholar
  45. National Research Council (1989) ‘Improving Risk Communication’, National research committee on risk perceptions and communication. National Academies Press, WashingtonGoogle Scholar
  46. New Statesman (2013) The Twitter Jihadis: how terror groups have turned to social media, New Statesman. Available online at: http://www.newstatesman.com/2013/08/twitter-jihadis. Accessed 3 July 2015
  47. New York Times (1985) Thatcher urges the press to help ‘starve’ terrorists. Available online at: http://www.nytimes.com/1985/07/16/world/thatcher-urges-the-press-to-help-starve-terrorists.html. Accessed 30 May 2015
  48. New York Times (2007) Defense secretary urges more spending for U.S. diplomacy, The New York Times. Available online at: http://www.nytimes.com/2007/11/27/washington/27gates.html?pagewanted=print&_r=0. Accessed 14 July 2015
  49. O’Reilly T (2007) What is Web 2.0?—design patterns and business models for the next generation of soft ware. Available online at: http://yil5.inet-tr.org.tr/akgul/tmp/SSRN-id1008839.pdf. Accessed 30 May 2015
  50. Pearson CM, Mitroff I (1993) From crisis prone to crisis prepared: a framework for crisis management. Acad Manage Executive 7(1):49–59Google Scholar
  51. Perl RF (1997) Terrorism, the media and the government: perspectives trends and options for policy makers. Available online at: http://digital.library.unt.edu/ark:/67531/metacrs419/m1/1/high_res_d/97-960f_1997Oct22.htm. Accessed 3 June 2015
  52. Portland Communications (2012) How Africa Tweets. Available online at: http://www.portland-communications.com/wp-content/uploads/2013/05/Twitter_in_Africa_PPT.pdf. Accessed 3 Aug 2015
  53. Radio Free Europe (2013) How social networks are dealing with terrorists. Available online at: http://www.rferl.org/content/twitter-facebook-terrorists/24906583.html. Accessed 3 July 2015
  54. Rogers MB, Amlot R, Rubin GJ, Wessely S, Krieger K (2007) Mediating the social and psychological impacts of terrorist attacks: the role of risk perception and risk communication. Int Rev Psychiatry 19(3):279–288CrossRefGoogle Scholar
  55. Russell D (1982) The causal dimension scale: a measure of how Individuals perceive causes. J Pers Soc Psychol 42:1137–1145CrossRefGoogle Scholar
  56. Schultz F, Utz S, Göritz A (2011) Is the medium the message? Perceptions of and reactions to crisis communication via Twitter, blogs and traditional media. Publ Relat Rev 37:20–27CrossRefGoogle Scholar
  57. Shari RV, Tara B, Michael JP (2011) A work-in-process literature review: incorporating social media in risk and crisis communication. J Contingencies Crisis Manag 19(2):110–122CrossRefGoogle Scholar
  58. Simon T, Goldberg A, Aharonson-Daniel L, Leykin D, Adini B (2014) Twitter in the cross fire—the use of social media in the westgate mall terror attack in Kenya. Available online at: http://www.plosone.org/article/fetchObject.action?uri=info:doi/10.1371/journal.pone.0104136&representation=PDF. Accessed 2 Aug 2015
  59. Sky News (2013) Kenya siege: gunmen “Running and Hiding”. Available online at: http://news.sky.com/story/1145375/kenya-siege-gunmen-running-and-hiding. Accessed 6 July 2015
  60. Stewart DR, Coleman CA (2013) Legal and ethical use of social media for strategic communicators. In: Nor-Aldeen H, Hendricks JA (eds) Social media and strategic communication. Palgrave Macmillan, New York, pp 180–198Google Scholar
  61. Strecher VJ, Greenwood T, Wang C, Dumont D (1999) Interactive multimedia and risk communication. J National Cancer Inst Monogr 25(134–139):135Google Scholar
  62. Telegraph (2013) Twitter in numbers. Available online at: http://www.telegraph.co.uk/technology/twitter/9945505/Twitter-in-numbers.html. Accessed 10 July 2015
  63. Wales C, Mythen G (2002) Risky discourses: the politics of GM foods. Environ Politics 11(2):121–144CrossRefGoogle Scholar
  64. Weiner B (1986) An attributional theory of motivation and emotion. Springer, New YorkCrossRefGoogle Scholar
  65. Weiner B, Amirkan J, Folkes VS, Verette JA (1987) An attribution analysis of excuse giving: studies of a naïve theory of emotion. J Pers Soc Psychol 53:316–324CrossRefGoogle Scholar
  66. Weiner B, Perry RP, Magnusson J (1988) An attribution analysis of reactions to stigmas. J Pers Soc Psychol 55:738–748CrossRefGoogle Scholar
  67. WhatsApp (undated) How it works. Available online at: https://www.whatsapp.com/. Accessed 28 July 2015
  68. Wilson SR, Cruz MG, Marshall LJ, Rao N (1993) An attributional analysis of compliance-gaining interactions. Commun Monogr 60:352–372CrossRefGoogle Scholar
  69. World Economic Forum (2013) Global risks 2013. Insight report. Available online at: http://www3.weforum.org/docs/WEF_GlobalRisks_Report_2013.pdf. Accessed 22 July 2015
  70. Wright DK, Hinson MD (2009) Examining how public relations practitioners actually are using social media. Publ Relat J 3(3):2–32Google Scholar

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  1. 1.University of LeicesterLeicesterUK

Personalised recommendations