Abstract
New technologies have created a new battlefield, with new targets to fight. In cyberspace, the answers of local and international authorities, have been different, being specially important the counterterrorist policies, as well as the scanning and infiltration of intelligence services, of activities and communications, in order to prevent terrorist acts and get physical evidence to be used in front of a court, by creating special units, like the Spanish Command of Cyberdefense. In light of this, different policies have been implemented focused on cybersecurity, like the creation of specialized centers like the European Cybercrime Center or the US Threat Intelligence Integration Center. This chapter offers some analytics about the use that ISIS is giving to cyberspace, from recruitment purposes, to propaganda, financial support or even psycho-war. We will also analyze the tools used for these purposes, like the Deep Web, Social networking, including Facebook, Instagram or Twitter, as well as other social networks created by themselves or their own media group.
Submitted: 15.10.16; Accepted: 6.12.16.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Aznar F (2014) El papel de la narrativa en el terrorismo. In Aznar F, Baca E, Lázaro J (eds) La guerra contra la violencia. Triacastela, Madrid
Bamford J (2008) The shadow factory (The Ultra Secret NSA from 9/11 to the Eavesdropping on America). The Echelon Program. Doubleday
Baños P (2014) Medios y modos de comunicación de los grupos extremistas. Retrieved from https://www.esglobal.org/los-medios-que-mas-le-gustan-a-los-yihadistas/
Barrancos Larráyoz D (2014) Los community managers del terror: la propaganda online de ISIS y su ofensiva sobre Irak. Instituto Español de Estudios Estratégicos. Retrieved from: www.ieee.es/…/2014/DIEEEO82bis-2014_ISS_DavidBarrancos.pdf
Castells M (1999) La Era de la Información: Economía, Sociedad y Cultura La Sociedad Red. Siglo XXI, México
De La Corte Ibáñez L (2015) Al shabaab en el cuerno de África. Instituto Español de Estudios Estratégicos. Retrieved from: http://www.uma.es/foroparalapazenelmediterraneo/?page_id=18
De La Fuente P (2016) La propaganda de reclutamiento del Daesh a través de sus videos. Documento de opinión. Instituto Español de Estudios Estratégicos. Retrieved from www.ieee.es/Galerias/fichero/BoletinesIEEE3/2016/boletinieee1.pdf
Echevarría J (2014) El desafío terrorista de Boko Harama en Nigeria. Colección: “Grupos militantes de ideología radical y carácter violento”. Instituto Español de Estudios Estratégicos. Retrieved from http://docplayer.es/18482742-El-desafio-terrorista-de-boko-haram-en-nigeria.html
Estallares y López JC (2011) Los medios de comunicación de Al Qaeda y su evolución estratégica. Instituto Español de Estudios Estratégicos. Retrieved from https://publicaciones.unirioja.es/catalogo/…/131_BorregoSevillano.pdf
Jordán J (2013) Manual de Estudios Estratégicos y Seguridad Internacional. Plaza y Valdes, Madrid
Kaplan RD (1994) The coming anarchy. The Atlantic Monthly. February
Kaldor M (2001) Las nuevas guerras. Violencia organizada en la era global. Tusquets, Barcelona
Marshall A (2015) How Isis got its anthem. The Guardian, 09-11-2014, vol. 2015, NYE
Nye Jr JS (2011) Nuclear lessons for cyber security? Strategic Studies Quarterly, Invierno, pp 18–38
Orellana J (2013) Fundamentos de narrativa audiovisual. CEU Ediciones, Madrid
Patterson LV (2002) Information operations and asymmetric warfare…are we ready?. US Army War College, Pennsylvania
Porth JS (2007) U.S. Ship To Host Multinational Experts off African Coast: Maritime safety and security are focus of African training mission. U.S. Department of State. America.gov November 2007. Retrieved from http://www.america.gov/st/washfileenglish/2007/November/20071109095818sjhtrop0.1391107.html
Sánchez Medero G (2010) La nueva estrategia comunicativa de los grupos terroristas. Revista EnfoquesVIII(12)
Seck HH (2016) ISIS may try to launch cyberattacks against US, NSA Chief Warns. Defensetech magazine. Retrieved from: http://www.defensetech.org/2016/04/05/isis-may-try-to-launch-cyberattacks-nsa-chief-warns/
Symantec (2013). Norton Security Report. Retrieved from: http://www.symantec.com/about/news/resources/press_kits/detail.jsp?pkid=norton-report-2013
The Global Information Technology Report 2015. World Economic Forum. 2015. Geneva www.weforum.org/gitr. ISBN: 978-92-95044-48-7
Torres Soriano MR (2015) ¿Es el yihadismo una ciber-amenaza? Revista de Occidente, No. 406, marzo 2015, pp 20–34
Weiman G (2004) www.Terror.Net: How modern terrorism uses the Internet. United States Institute of Peace. Retrieved from https://www.usip.org/sites/default/files/sr116.pdf
Zenn J (2014) Boko Haram’s mass-kidnapping in Chibok: Shekau’s gains and objectives. Retrieved from http://www.ecoi.net/local_link/276855/406124_de.html
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this chapter
Cite this chapter
Payá-Santos, C.A., Delgado-Morán, J.J. (2017). Use of Cyberspace for Terrorist Purposes. In: Ramírez, J., García-Segura, L. (eds) Cyberspace. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-319-54975-0_12
Download citation
DOI: https://doi.org/10.1007/978-3-319-54975-0_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-54974-3
Online ISBN: 978-3-319-54975-0
eBook Packages: Law and CriminologyLaw and Criminology (R0)