Combating violent extremism and radicalization in the digital era:
"This book is an essential reference for the latest research on the utilization of online tools by terrorist organizations to communicate with and recruit potential extremists and examines effective countermeasures employed by law enforcement agencies to defend against such threats"...
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Hershey, PA
Information Science Reference, an imprint of IGI Global
2016
|
Schriftenreihe: | Advances in religious and cultural studies (ARCS) book series
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Zusammenfassung: | "This book is an essential reference for the latest research on the utilization of online tools by terrorist organizations to communicate with and recruit potential extremists and examines effective countermeasures employed by law enforcement agencies to defend against such threats"... |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | xxviii, 582 pages |
ISBN: | 9781522501565 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV043663059 | ||
003 | DE-604 | ||
005 | 20161116 | ||
007 | t | ||
008 | 160711s2016 xxu |||| 00||| eng d | ||
010 | |a 015051297 | ||
020 | |a 9781522501565 |c (hardcover) |9 978-1-5225-0156-5 | ||
035 | |a (OCoLC)950255961 | ||
035 | |a (DE-599)BVBBV043663059 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-12 | ||
050 | 0 | |a HV6773.15.C97 | |
082 | 0 | |a 363.325 |2 2 | |
245 | 1 | 0 | |a Combating violent extremism and radicalization in the digital era |c Majeed Khader, Loo Seng Neo, Gabriel Ong, Eunice Tan Mingyi, Jeffery Chin |
264 | 1 | |a Hershey, PA |b Information Science Reference, an imprint of IGI Global |c 2016 | |
300 | |a xxviii, 582 pages | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Advances in religious and cultural studies (ARCS) book series | |
500 | |a Includes bibliographical references and index | ||
520 | |a "This book is an essential reference for the latest research on the utilization of online tools by terrorist organizations to communicate with and recruit potential extremists and examines effective countermeasures employed by law enforcement agencies to defend against such threats"... | ||
650 | 4 | |a Radikalismus | |
650 | 4 | |a Terrorismus | |
650 | 4 | |a Cyberterrorism | |
650 | 4 | |a Internet and terrorism | |
650 | 4 | |a Extremist Web sites | |
650 | 4 | |a Terrorists |x Recruiting | |
650 | 4 | |a Radicalism | |
650 | 4 | |a Terrorism |x Prevention | |
650 | 0 | 7 | |a Terrorismus |0 (DE-588)4059534-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Radikalismus |0 (DE-588)4048171-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internetkriminalität |0 (DE-588)7864395-8 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Internetkriminalität |0 (DE-588)7864395-8 |D s |
689 | 0 | 1 | |a Radikalismus |0 (DE-588)4048171-2 |D s |
689 | 0 | 2 | |a Terrorismus |0 (DE-588)4059534-1 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Khader, Majeed |d 1966- |0 (DE-588)1109935552 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-1-5225-0157-2 |
856 | 4 | 2 | |m SWB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029076381&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-029076381 |
Datensatz im Suchindex
_version_ | 1804176418642329600 |
---|---|
adam_text | TABLE OF CONTENTS
FOREWORD XIX
PREFACE XX
ACKNOWLEDGMENT XXVII
SECTION 1
EXPLOITATION OF THE INTERNET BY VIOLENT EXTREMISTS
CHAPTER 1
UNDERSTANDING THE PSYCHOLOGY OF PERSUASIVE VIOLENT EXTREMIST ONLINE
PLATFORMS 1
LOO SENG NEO, HOME TEAM BEHAVIOURAL SCIENCES CENTRE, MINISTRY OF HOME
AFFAIRS,
SINGAPORE
LEEVIA DILLON, HOME TEAM BEHAVIOURAL SCIENCES CENTRE, MINISTRY OF HOME
AFFAIRS,
SINGAPORE
PRISCILLA SHI, HOME TEAM BEHAVIOURAL SCIENCES CENTRE, MINISTRY OF HOME
AFFAIRS, SINGAPORE
JETHRO TAN, HOME TEAM BEHAVIOURAL SCIENCES CENTRE, MINISTRY OF HOME
AFFAIRS, SINGAPORE
YINGMIN WANG, HOME TEAM BEHAVIOURAL SCIENCES CENTRE, MINISTRY OF HOME
AFFAIRS,
SINGAPORE
DANIELLE GOMES, HOME TEAM BEHAVIOURAL SCIENCES CENTRE, MINISTRY OF HOME
AFFAIRS,
SINGAPORE
CHAPTER 2
PERSUASION AND PROPAGANDA IN WAR AND TERRORISM 16
THOMAS STEINFATT, UNIVERSITY OF MIAMI, USA
DANA JANBEK, LASELL COLLEGE, USA
CHAPTER 3
SOCIAL MEDIA AND THE USE OF DISCURSIVE MARKERS OF ONLINE EXTREMISM AND
RECRUITMENT 39
ROBYN TOROK, EDITH COWAN UNIVERSITY, AUSTRALIA
CHAPTER 4
ISIS DISCOURSE IN RADICAL ISLAMIC ONLINE NEWS MEDIA IN INDONESIA:
SUPPORTER OR OPPONENT 70
FAJAR ERIKHA, UNIVERSITAS INDONESIA, INDONESIA
IDHAMSYAH EKA PUTRA, PERSADA INDONESIA UNIVERSITY, INDONESIA
SARLITO WIRAWAN SARWONO, UNIVERSITAS INDONESIA, INDONESIA & PERSADA
INDONESIA
UNIVERSITY, INDONESIA
CHAPTER 5
USING THE INTERNET TO PLAN FOR TERRORIST ATTACK 91
DAVID ROMYN, GRIFFITH UNIVERSITY, AUSTRALIA
MARK KEBBELL, GRIFFITH UNIVERSITY, AUSTRALIA
SECTION 2
UNDERSTANDING THE PERSON WITHIN ONLINE VIOLENT EXTREMISM
CHAPTER 6
UNDERSTANDING PERSONALITY AND PERSON-SPECIFIC PREDICTORS OF CYBER-BASED
INSIDER THREAT 107
JOYCE S. PANG, NANYANG TECHNOLOGICAL UNIVERSITY, SINGAPORE
CHAPTER 7
GETTING OUT OF THE ARMCHAIR: POTENTIAL TIPPING POINTS FOR ONLINE
RADICALISATION 129
OMERALI SAIFUDEEN, NATIONAL SECURITY COORDINATION SECRETARIAT, PRIME
MINISTER S OFFICE,
SINGAPORE
CHAPTER 8
WHY IS ISIS SO PSYCHOLOGICALLY ATTRACTIVE? 149
LOO SENG NEO, HOME TEAM BEHAVIOURAL SCIENCES CENTRE, MINISTRY OF HOME
AFFAIRS,
SINGAPORE
PRISCILLA SHI, HOME TEAM BEHAVIOURAL SCIENCES CENTRE, MINISTRY OF HOME
AFFAIRS, SINGAPORE
LEEVIA DILLON, HOME TEAM BEHAVIOURAL SCIENCES CENTRE, MINISTRY OF HOME
AFFAIRS,
SINGAPORE
JETHRO TAN, HOME TEAM BEHAVIOURAL SCIENCES CENTRE, MINISTRY OF HOME
AFFAIRS, SINGAPORE
YINGMIN WANG, HOME TEAM BEHAVIOURAL SCIENCES CENTRE, MINISTRY OF HOME
AFFAIRS,
SINGAPORE
DANIELLE GOMES, HOME TEAM BEHAVIOURAL SCIENCES CENTRE, MINISTRY OF HOME
AFFAIRS,
SINGAPORE
CHAPTER 9
PSYCHOLOGICAL EFFECTS OF THE THREAT OF ISIS: A PRELIMINARY INQUIRY OF
SINGAPORE CASE STUDIES 168
WEIYING HU, MINISTRY OF HOME AFFAIRS, SINGAPORE
CHAPTER 10
WESTERN FEMALE MIGRANTS TO ISIS: PROPAGANDA, RADICALISATION, AND
RECRUITMENT 174
ERIN MARIE SALTMAN, INSTITUTE FOR STRATEGIC DIALOGUE, UK
CHAPTER 11
AN INTERNET-MEDIATED PATHWAY FOR ONLINE RADICALISATION: RECRO 197
LOO SENG NEO, HOME TEAM BEHAVIOURAL SCIENCES CENTRE, MINISTRY OF HOME
AFFAIRS,
SINGAPORE
SECTION 3
COUNTERING VIOLENT EXTREMISM AND RADICALISATION
CHAPTER 12
FRAMING THE CHALLENGES OF ONLINE VIOLENT EXTREMISM:
POLICING-PUBLIC-POLICIES-POLITICS
FRAMEWORK 226
GEOFF DEAN, GRIFFITH UNIVERSITY, AUSTRALIA
CHAPTER 13
TOWARDS A COMPREHENSIVE APPROACH TO COMBATING VIOLENT EXTREMIST IDEOLOGY
IN THE DIGITAL
SPACE: THE COUNTER-IDEOLOGICAL RESPONSE (CIR) MODEL 260
KUMAR RAMAKRISHNA, NANYANG TECHNOLOGICAL UNIVERSITY, SINGAPORE
CHAPTER 14
COUNTERING ONLINE VIOLENT EXTREMISM: STATE ACTION AS STRATEGIC
COMMUNICATION 283
DAMIEN D. CHEONG, NANYANG TECHNOLOGICAL UNIVERSITY, SINGAPORE
CHAPTER 15
BUILDING NATIONAL RESILIENCE IN THE DIGITAL ERA OF VIOLENT EXTREMISM:
SYSTEMS AND PEOPLE 307
JETHRO TAN, HOME TEAM BEHAVIOURAL SCIENCES CENTRE, MINISTRY OF HOME
AFFAIRS, SINGAPORE
YINGMIN WANG, HOME TEAM BEHAVIOURAL SCIENCES CENTRE, MINISTRY OF HOME
AFFAIRS,
SINGAPORE
DANIELLE GOMES, HOME TEAM BEHAVIOURAL SCIENCES CENTRE, MINISTRY OF HOME
AFFAIRS,
SINGAPORE
CHAPTER 16
SOCIAL MEDIA ANALYTICS FOR INTELLIGENCE AND COUNTERING VIOLENT EXTREMISM
328
JENNIFER YANG HUI, NANYANG TECHNOLOGICAL UNIVERSITY, SINGAPORE
CHAPTER 17
ON THE INTERNET, NOBODY KNOWS YOU RE A DOG : THE ONLINE RISK ASSESSMENT
OF VIOLENT
EXTREMISTS 349
NEIL D. SHORTLAND, UNIVERSITY OF MASSACHUSETTS - LOWELL, USA
CHAPTER 18
DETECTING LINGUISTIC MARKERS OF VIOLENT EXTREMISM IN ONLINE ENVIRONMENTS
374
FREDRIK JOHANSSON, SWEDISH DEFENCE RESEARCH AGENCY (FOI), SWEDEN
LISA KAATI, UPPSALA UNIVERSITY, SWEDEN
MAGNUS SAHLGREN, GAVAGAI, SWEDEN
CHAPTER 19
INTERNET USE AND VIOLENT EXTREMISM: A CYBER-VERA RISK ASSESSMENT
PROTOCOL 391
D. ELAINE PRESSMAN, CARLETON UNIVERSITY, CANADA & INTERNATIONAL CENTRE
FOR COUNTER-
TERRORISM (ICCT) - THE HAGUE, THE NETHERLANDS
CRISTINA IVAN, MIHAI VITEAZUL NATIONAL INTELLIGENCE ACADEMY, ROMANIA
CHAPTER 20
A SUPPLEMENTARY INTERVENTION TO DERADICALISATION: CBT-BASED ONLINE FORUM
410
PRISCILLA SHI, HOME TEAM BEHAVIOURAL SCIENCES CENTRE, MINISTRY OF HOME
AFFAIRS, SINGAPORE
SECTION 4
EMERGING TRENDS
CHAPTER 21
CYBERTERRORISM: USING THE INTERNET AS A WEAPON OF DESTRUCTION 426
LEEVIA DILLON, HOME TEAM BEHAVIOURAL SCIENCES CENTRE, MINISTRY OF HOME
AFFAIRS,
SINGAPORE
CHAPTER 22
DEATH BY HACKING: THE EMERGING THREAT OF KINETIC CYBER 452
PENELOPE WANG, HOME TEAM BEHAVIOURAL SCIENCES CENTRE, MINISTRY OF HOME
AFFAIRS,
SINGAPORE
CHAPTER 23
SPEAR PHISHING: THE TIP OF THE SPEAR USED BY CYBER TERRORISTS 469
ARUN VISHWANATH, UNIVERSITY AT BUFFALO, USA
SECTION 5
SUMMARY AND FUTURE DIRECTIONS
CHAPTER 24
WHAT WE KNOW AND WHAT ELSE WE NEED TO DO TO ADDRESS THE PROBLEM OF
VIOLENT EXTREMISM
ONLINE: CONCLUDING CHAPTER 486
MAJEED KHADER, HOME TEAM BEHAVIOURAL SCIENCES CENTRE, MINISTRY OF HOME
AFFAIRS,
SINGAPORE
COMPILATION OF REFERENCES 496
ABOUT THE CONTRIBUTORS 571
INDEX 579
DETAILED TABLE OF CONTENTS
FOREWORD XIX
PREFACE XX
ACKNOWLEDGMENT XXVII
SECTION 1
EXPLOITATION OF THE INTERNET BY VIOLENT EXTREMISTS
CHAPTER 1
UNDERSTANDING THE PSYCHOLOGY OF PERSUASIVE VIOLENT EXTREMIST ONLINE
PLATFORMS 1
LOO SENG NEO, HOME TEAM BEHAVIOURAL SCIENCES CENTRE, MINISTRY OF HOME
AFFAIRS,
SINGAPORE
LEEVIA DILLON, HOME TEAM BEHAVIOURAL SCIENCES CENTRE, MINISTRY OF HOME
AFFAIRS,
SINGAPORE
PRISCILLA SHI, HOME TEAM BEHAVIOURAL SCIENCES CENTRE, MINISTRY OF HOME
AFFAIRS, SINGAPORE
JETHRO TAN, HOME TEAM BEHAVIOURAL SCIENCES CENTRE, MINISTRY OF HOME
AFFAIRS, SINGAPORE
YINGMIN WANG, HOME TEAM BEHAVIOURAL SCIENCES CENTRE, MINISTRY OF HOME
AFFAIRS,
SINGAPORE
DANIELLE GOMES, HOME TEAM BEHAVIOURAL SCIENCES CENTRE, MINISTRY OF HOME
AFFAIRS,
SINGAPORE
EXPLOITING THE BENEFITS AFFORDED BY THE INTERNET, VIOLENT EXTREMISTS
HAVE CREATED AND UTILISED A MYRIAD
OF ONLINE PLATFORMS (E.G., WEBSITES, FORUMS, BLOGS, SOCIAL MEDIA) THAT
HAVE ABETTED AND ENHANCED THEIR
RECRUITMENT CAMPAIGNS ACROSS THE WORLD. WHILE THE IDEA OF COUNTERING
VIOLENT EXTREMISTS ONLINE PRESENCE
IS A MATTER OF CONSIDERABLE SECURITY INTEREST, THE PAUCITY OF RESEARCH
ANALYSING THE PERSUASIVENESS OF
THEIR ONLINE PLATFORMS TO CERTAIN TARGET AUDIENCES IMPEDES LAW
ENFORCEMENT AGENCIES CAPABILITY TO DEAL
WITH THEM. THERE IS A NEED TO UNDERSTAND WHY THEIR ONLINE PLATFORMS ARE
SO PERSUASIVE TO CERTAIN TARGET
AUDIENCES. FOCUSING ON THESE ONLINE PLATFORMS, THIS CHAPTER WILL EXAMINE
THE FEATURES OF THESE PLATFORMS
THAT ENHANCE THE APPEAL OF VIOLENT EXTREMIST MESSAGES.
CHAPTER 2
PERSUASION AND PROPAGANDA IN WAR AND TERRORISM 16
THOMAS STEINFATT, UNIVERSITY OF MIAMI, USA
DANA JANBEK, LASELL COLLEGE, USA
THIS CHAPTER FOCUSES ON THE USE OF PROPAGANDA DURING TIMES OF WAR,
PREJUDICE, AND POLITICAL UNREST. PART
ONE DISTINGUISHES BETWEEN PERSUASION AND ONE OF ITS FORMS, PROPAGANDA.
THE MEANING-IN-USE OF THE
TERM PROPAGANDA IS ESSENTIAL TO UNDERSTANDING ITS USE OVER TIME. PART
TWO PRESENTS RELEVANT EXAMPLES
OF PROPAGANDA FROM THE PAST SEVERAL CENTURIES IN THE UNITED STATES AND
EUROPE. THESE EXAMPLES INCLUDE
EPISODES FROM WORLD WAR I AND II, AMONG OTHERS. PROPAGANDA IS NOT A NEW
TOOL OF PERSUASION, AND LEARNING
ABOUT ITS USE IN THE PAST PROVIDES A COMPARISON THAT HELPS IN
UNDERSTANDING ITS USE IN THE PRESENT AND
FUTURE. PART THREE LOOKS AT RECENT EXAMPLES OF HOW PROPAGANDA OCCURS IN
ACTUAL USE IN ONLINE TERRORIST
MEDIUMS BY AL-QAEDA AND BY THE ISLAMIC STATE IN IRAQ AND SYRIA (ISIS).
CHAPTER 3
SOCIAL MEDIA AND THE USE OF DISCURSIVE MARKERS OF ONLINE EXTREMISM AND
RECRUITMENT 39
ROBYN TOROK, EDITH COWAN UNIVERSITY, AUSTRALIA
THIS CHAPTER EXAMINES THE SHIFT TOWARD THE USE OF SOCIAL MEDIA TO FUEL
VIOLENT EXTREMISM, WHAT THE KEY
DISCURSIVE MARKERS ARE, AND HOW THESE KEY DISCURSIVE MARKERS ARE USED TO
FUEL VIOLENT EXTREMISM. THE
CHAPTER THEN ADDRESSES AND CRITIQUES A NUMBER OF RADICALISATION MODELS
INCLUDING BUT NOT LIMITED TO PHASE
BASED MODELS. DISCURSIVE MARKERS ARE COVERED UNDER THREE BROAD NARRATIVE
AREAS. NARRATIVES OF GRIEVANCE
ARE DESIGNED TO STIMULATE STRONG EMOTIVE RESPONSES TO PERCEIVED
INJUSTICES. BASED ON THESE GRIEVANCES,
ACTIVE AGENCY IS ADVOCATED IN THE FORM OF JIHAD AS A PATH THAT ONE
SHOULD FOLLOW. FINALLY, A COMMITMENT
TO MARTYRDOM IS SOUGHT AS THE GOAL OF THESE DISCURSIVE MARKERS.
CHAPTER 4
ISIS DISCOURSE IN RADICAL ISLAMIC ONLINE NEWS MEDIA IN INDONESIA:
SUPPORTER OR OPPONENT 70
FAJAR ERIKHA, UNIVERSITAS INDONESIA, INDONESIA
IDHAMSYAH EKA PUTRA, PERSADA INDONESIA UNIVERSITY, INDONESIA
SARLITO WIRAWAN SARWONO, UNIVERSITAS INDONESIA, INDONESIA & PERSADA
INDONESIA
UNIVERSITY, INDONESIA
THIS ARTICLE AIMS TO UNDERSTAND HOW DISCOURSES ABOUT ISLAMIC STATE IN
IRAQ AND SYRIA (ISIS) ARE SUPPORTED
AND/OR REJECTED BY RADICAL ISLAMIC GROUPS. DATA WERE COLLECTED FROM TWO
ISLAMIC NEWS WEBSITE: VOA-ISLAM
AND ARRAHMAH. BOTH WEBSITES ARE CATEGORISED AS RADICAL ISLAMIC SITES. BY
USING THE DISCURSIVE PSYCHOLOGY
APPROACH, IT WAS FOUND THAT WHEN ISIS IS VIEWED AS A GROUP THAT
ACTUALISED THE ESTABLISHMENT OF AN ISLAMIC
STATE, IT IS PRAISED AND SUPPORTED. HOWEVER, WHEN ISIS IS DEEMED TO HAVE
KILLED OTHER FELLOW MUSLIMS,
IT IS OPPOSED AND ITS MOVEMENT IS CONSIDERED TO BE OUT OF ISLAMIC
CORRIDORS . PRACTICAL IMPLICATIONS OF
THESE FINDINGS ARE IDENTIFIED AND DISCUSSED.
CHAPTER 5
USING THE INTERNET TO PLAN FOR TERRORIST ATTACK 91
DAVID ROMYN, GRIFFITH UNIVERSITY, AUSTRALIA
MARK KEBBELL, GRIFFITH UNIVERSITY, AUSTRALIA
IN THIS CHAPTER, WE DISCUSS HOW TERRORISTS CAN USE THE INTERNET AS A
SOURCE OF INFORMATION TO PLAN FOR TERRORIST
ATTACKS. ONLINE ANONYMITY SERVICES SUCH AS VIRTUAL PRIVATE NETWORK (VPN)
ARE DISCUSSED, ALONG WITH
ADVANTAGES AND DISADVANTAGES OF USING THESE SERVICES. WE ALSO DISCUSS
ONLINE BOMB-MAKING INSTRUCTIONS
AND HIGHLIGHT WAYS IN WHICH THESE CAN BE USED TO THE ADVANTAGE OF LAW
ENFORCEMENT. FINALLY, THE USE OF
THE INTERNET AS A RECONNAISSANCE TOOL FOR TARGET SELECTION IS DISCUSSED,
WITH DESCRIPTIONS OF CURRENT AND PAST
RESEARCH IN THIS FIELD TO IDENTIFY KEY INFORMATION THAT IS AVAILABLE TO
TERRORISTS, AND HOW THIS INFORMATION
CAN BE MANIPULATED TO REDUCE THE LIKELIHOOD OR SEVERITY OF A TERRORIST
ATTACK.
SECTION 2
UNDERSTANDING THE PERSON WITHIN ONLINE VIOLENT EXTREMISM
CHAPTER 6
UNDERSTANDING PERSONALITY AND PERSON-SPECIFIC PREDICTORS OF CYBER-BASED
INSIDER THREAT 107
JOYCE S. PANG, NANYANG TECHNOLOGICAL UNIVERSITY, SINGAPORE
THE CHAPTER AIMS TO PROVIDE AN OPINION ON MAJOR CHALLENGES FOR ONGOING
PERSONALITY RESEARCH ON CYBER
SECURITY, ESPECIALLY IN THE AREA OF INSIDER THREAT. WHILE RESEARCH ON
THE PREVENTION AND PERPETUATION OF
INSIDER THREAT ACTIVITY WITHIN CYBERSPACE HAS GROWN SUBSTANTIALLY IN THE
RECENT DECADE, THERE REMAIN MANY
UNANSWERED CHALLENGES AND UNCHARTERED TERRITORIES OF KNOWLEDGE IN THE
FIELD. SPECIFICALLY, COMPARED TO THE
AMOUNT OF WORK DONE ON ALGORITHMIC MODELLING APPROACHES, MUCH OF THE
PSYCHOLOGICAL DATA IS SCANT AND
FOCUSES ON CORRELATIONS BETWEEN THE SO-CALLED BIG FIVE PERSONALITY
TRAITS (I.E., EXTRAVERSION, OPENNESS TO
EXPERIENCE, AGREEABLENESS, EMOTIONAL STABILITY, CONSCIENTIOUSNESS) OR
DEMOGRAPHIC VARIABLES (E.G., GENDER,
AGE) WITH INSIDER THREAT ACTIVITY. THUS, THE FOCUS OF THIS ARTICLE IS TO
ARTICULATE THE MAJOR CHALLENGES FOR
UNDERSTANDING INSIDER THREAT IN THE CONTEXT OF CYBER SECURITY,
PARTICULARLY FROM A PERSONALITY AND PERSON-
SPECIFIC PERSPECTIVE THAT EMPHASISES INTERNAL CHARACTERISTICS OF THE
INDIVIDUAL ACTOR AS EXPLANATIONS OF
ACTIONS AND EVENTS.
CHAPTER 7
GETTING OUT OF THE ARMCHAIR: POTENTIAL TIPPING POINTS FOR ONLINE
RADICALISATION 129
OMERALI SAIFUDEEN, NATIONAL SECURITY COORDINATION SECRETARIAT, PRIME
MINISTER S OFFICE,
SINGAPORE
THIS CHAPTER WILL EXPLORE POSSIBLE FACTORS (BOTH ONLINE AND REAL WORLD)
THAT CAN TIP AN ARMCHAIR JIHADI
TOWARDS REAL WORLD EXTREMISM. THIS ENTAILS EXAMINING SOCIAL
PSYCHOLOGICAL RESEARCH ON TIPPING POINTS
THAT CAN BE TRANSLATED TO THE PROCESS OF RADICALISATION. PROMINENT CASES
OF JIHADISTS WILL THEN BE EXAMINED
TO ILLUSTRATE THE PHYSIOGNOMIES BEHIND THEIR TIPPING POINTS AND THE
APPLICABILITY OF SUCH THEORIES. FINALLY,
THIS CHAPTER EMPHASISES HOW THE KEY TO UNDERSTANDING TIPPING POINTS IN
EXTREMISM LIES IN UNDERSTANDING
THE COGNITIVE, SOCIAL AND EMOTIVE BARRIERS TO EXTREMIST THINKING AND
ACTION. THERE IS THUS AN IMPERATIVE
NEED FOR MORE RESEARCH AND EXPERIMENTATION ON PERSUASION TACTICS AND IN
PARTICULAR TIPPING POINTS.
EXTREMIST COUNTER-NARRATIVES CAN ONLY BE SUCCESSFUL IF THEY INCORPORATE
THE ENERGIES OF YOUTH AND OTHER
KEY INDIVIDUALS AT THE GRASSROOTS TOWARDS CRAFTING, SPREADING AND ADDING
CREDIBILITY TO COUNTER-NARRATIVES.
CHAPTER 8
WHY IS ISIS SO PSYCHOLOGICALLY ATTRACTIVE? 149
LOO SENG NEO, HOME TEAM BEHAVIOURAL SCIENCES CENTRE, MINISTRY OF HOME
AFFAIRS,
SINGAPORE
PRISCILLA SHI, HOME TEAM BEHAVIOURAL SCIENCES CENTRE, MINISTRY OF HOME
AFFAIRS, SINGAPORE
LEEVIA DILLON, HOME TEAM BEHAVIOURAL SCIENCES CENTRE, MINISTRY OF HOME
AFFAIRS,
SINGAPORE
JETHRO TAN, HOME TEAM BEHAVIOURAL SCIENCES CENTRE, MINISTRY OF HOME
AFFAIRS, SINGAPORE
YINGMIN WANG, HOME TEAM BEHAVIOURAL SCIENCES CENTRE, MINISTRY OF HOME
AFFAIRS,
SINGAPORE
DANIELLE GOMES, HOME TEAM BEHAVIOURAL SCIENCES CENTRE, MINISTRY OF HOME
AFFAIRS,
SINGAPORE
SINCE THE ISLAMIC STATE IN IRAQ AND SYRIA (ISIS) BECAME PROMINENT AFTER
THE RELEASE OF BEHEADING VIDEOS
OF ITS PRISONERS, MANY HAVE BEEN CONFUSED OVER HOW TO DESCRIBE THIS
DEVELOPMENT IN RELATION TO THE WAY
THE INTERNET IS EXPLOITED BY VIOLENT EXTREMISTS. WHILE THE ELEMENT OF
SURPRISE AND HORROR LINGERED ON THE
MINDS OF MANY OBSERVERS, A MORE PRESSING QUESTION FACING THE LAW
ENFORCEMENT IS: HOW DOES ISIS ATTRACT
FOREIGN FIGHTERS USING SUCH VIDEOS AND ONLINE PROPAGANDA? AS COUNTRIES
AROUND THE GLOBE GRAPPLE WITH
THE SECURITY THREAT POSED BY THEIR NATIONALS TRAVELLING TO JOIN ISIS,
THE NEED TO BE AU FAIT WITH THE APPEAL
OF ISIS AND ITS ABILITY TO USE THE INTERNET TO RECRUIT NEW MEMBERS AND
SYMPATHISERS BECOMES EVEN MORE
APPARENT. THIS CHAPTER USES A BEHAVIOURAL SCIENCES LENS TO EXPLICATE HOW
INDIVIDUAL AND ORGANISATIONAL
MOTIVATIONAL FACTORS MAY CONTRIBUTE TO THE OVERALL APPEAL OF JOINING
ISIS.
CHAPTER 9
PSYCHOLOGICAL EFFECTS OF THE THREAT OF ISIS: A PRELIMINARY INQUIRY OF
SINGAPORE CASE STUDIES 168
WEIYING HU, MINISTRY OF HOME AFFAIRS, SINGAPORE
THE THREAT OF VIOLENT EXTREMISM HAS BEEN CONSIDERABLY INFLUENCED BY THE
SELF-PROCLAIMED ISLAMIC STATE
IN IRAQ AND SYRIA (ISIS), ITS INHUMANE BRUTAL KILLINGS IN IRAQ AND
SYRIA, AND EXPLOITATION OF SOCIAL MEDIA
TO RECRUIT LARGE NUMBERS OF FOREIGN FIGHTERS IN A SCALE NEVER SEEN
BEFORE. THIS DEVELOPMENT HAS SERIOUS
IMPLICATIONS FOR SINGAPORE S SECURITY LANDSCAPE. THIS AGGRESSIVE
PROMOTION OF FIGHTING IN SYRIA HAS
RESONATED WITH A HANDFUL OF SINGAPOREANS, WHO WERE RADICALISED BY
RADICAL ONLINE PROPAGANDA. IN THIS
PSYCHOLOGICAL STUDY OF THE SINGAPORE CASES, THERE ARE FIVE PSYCHOLOGICAL
DRIVERS THAT HAVE CONTRIBUTED TO
THE RADICALISATION PROCESS OF THESE CASES. THEY ARE: (1) JUSTIFYING
VIOLENCE, (2) ROMANTICISING THE NOTION
OF A UTOPIAN STATE, (3) DESIRE TO BE A GOOD MUSLIM, (4) ESCAPING THE
UNBEARABLE PRESENT WORLD, AND (5)
EXISTENTIAL ANXIETY IN RELATION TO END TIMES PROPHECIES. THE PRELIMINARY
FINDINGS FURTHER INDICATE THAT
MOST OF THESE RADICALISED INDIVIDUALS HAVE ENGAGED IN NEGATIVE ACTIVISM.
CHAPTER 10
WESTERN FEMALE MIGRANTS TO ISIS: PROPAGANDA, RADICALISATION, AND
RECRUITMENT 174
ERIN MARIE SALTMAN, INSTITUTE FOR STRATEGIC DIALOGUE, UK
WOMEN HAVE LONG BEEN A BLIND SPOT FOR SECURITY, ACADEMIC AND THINK TANK
SECTORS IN RELATION TO THE
GROWING THREAT OF GLOBAL EXTREMISM. THE RECENT SPIKE IN FEMALE
RECRUITMENT TO THE TERRORIST ORGANISATION,
ISLAMIC STATE IN IRAQ AND SYRIA (ISIS), IS A STRONG INDICATOR OF THIS
DANGEROUS TREND. WHILE OFTEN ASSUMED
TO BE PASSIVE AGENTS, WOMEN CONTINUE TO PLAY STRONG ROLES IN ONLINE AND
OFFLINE RECRUITMENT TO VIOLENT
EXTREMIST ORGANISATIONS. HOWEVER, WOMEN CAN ALSO ACT AS STRONG
COUNTER-EXTREMISM AGENTS IN THE FIGHT
AGAINST RADICALISATION AND TERRORISM. LOOKING AT THE ISSUE OF GENDER,
THERE IS A NEW ABILITY THROUGH ONLINE
RESEARCH TO RETRIEVE VALUABLE INSIGHT INTO TERRORIST STRATEGIES AROUND
RECRUITMENT OF WOMEN FROM ONLINE
PROPAGANDA. THIS CHAPTER AIMS TO ADDRESS QUESTIONS OF GENDER WITHIN
CURRENT RADICALISATION TRENDS THROUGH
AN ANALYSIS OF ONLINE DATA, AND THROUGH TRACKING WESTERN FEMALES WHO ARE
MIGRATING TO TERRITORIES UNDER
THE CONTROL OF ISIS.
CHAPTER 11
AN INTERNET-MEDIATED PATHWAY FOR ONLINE RADICALISATION: RECRO 197
LOO SENG NEO, HOME TEAM BEHAVIOURAL SCIENCES CENTRE, MINISTRY OF HOME
AFFAIRS,
SINGAPORE
THIS CHAPTER PROPOSES AN INTERNET-MEDIATED RADICALISATION MODEL, RECRO.
IT CONSISTS OF FIVE PHASES: (1)
THE REFLECTION PHASE DETAILS THE TRIGGERS, NEEDS, AND VULNERABILITIES
THAT AN INDIVIDUAL MAY HAVE WHICH
INCREASE ONE S RECEPTIVENESS TOWARDS ALTERNATIVE BELIEF SYSTEMS; (2) THE
EXPLORATION PHASE DETAILS THE
PERIOD WHERE THE INDIVIDUAL BEGINS MAKING SENSE OF THE INFORMATION PUT
FORTH BY VIOLENT EXTREMISTS; (3)
THE CONNECTION PHASE DETAILS THE INFLUENCE OF LIKE-MINDED INDIVIDUALS
AND THE ONLINE COMMUNITY ON THE
INDIVIDUAL S NEW WORLDVIEW; (4) THE RESOLUTION PHASE DETAILS THE PERIOD
DURING WHICH THE INDIVIDUAL GAINS
THE MOMENTUM TO TRANSLATE ONE S RADICAL BELIEFS INTO ACTION; AND FINALLY
(5) THE OPERATIONAL PHASE DETAILS
THE PERIOD DURING WHICH THE INDIVIDUAL IS READY TO COMMIT VIOLENCE TO
FURTHER ONE S RADICAL OBJECTIVES.
THIS MODEL PROVIDES A BASIS FOR UNDERSTANDING AND INFORMING JUDGEMENTS
ABOUT AN INDIVIDUAL S LEVEL OF
INVOLVEMENT, AND PAVES THE WAY FOR FUTURE EMPIRICAL WORK.
SECTION 3
COUNTERING VIOLENT EXTREMISM AND RADICALISATION
CHAPTER 12
FRAMING THE CHALLENGES OF ONLINE VIOLENT EXTREMISM:
POLICING-PUBLIC-POLICIES-POLITICS
FRAMEWORK 226
GEOFF DEAN, GRIFFITH UNIVERSITY, AUSTRALIA
THIS CHAPTER ARGUES THAT FRAMING THE CHALLENGES POSED BY RADICALISED
INDIVIDUALS ONLINE WHERE THE PATH
TO VIOLENT EXTREMISM IS JUST A CLICK AWAY, IS AS MUCH ABOUT GETTING THE
FRAMING RIGHT AS IT IS ABOUT GETTING
THE OPERATIONAL PLANS RIGHT. A GENERAL FRAMEWORK BASED ON 4 P S
(POLICING-PUBLIC-POLICIES-POLITICS) IS
PROPOSED AS THE CONCEPTUAL FRAME FOR COMBATING VIOLENT EXTREMISM. THE
METAPHOR OF A COMPASS IS USED TO
EXAMINE THIS 4P S FRAMEWORK FROM THE PERSPECTIVE OF KNOWLEDGE
MANAGEMENT. THE KEY NOTIONS OF VIOLENT
EXTREMISM , RADICALISATION AND DIGITAL ERA ARE DECONSTRUCTED BEFORE
PRESENTING A NEUROCOGNITIVE-BASED
MODEL OF SELF-INDOCTRINATION BY THOSE WHO INSPIRE A VIOLENTLY
EXTREME NARRATIVE THROUGH SOCIAL MEDIA
TECHNOLOGIES USING THE DARK NET OF CYBERSPACE. LAW ENFORCEMENT S USE
OF COMMUNICATION INTERCEPTION
TECHNOLOGIES AND DATA RETENTION LAWS IS CRITICALLY EXAMINED. THE CHAPTER
CONCLUDES WITH OPERATIONAL
IMPLICATIONS FOR POLICING THE PUBLIC WITH POLICY TOOLS IN THE CONTEXT OF
POLITICAL REALITIES.
CHAPTER 13
TOWARDS A COMPREHENSIVE APPROACH TO COMBATING VIOLENT EXTREMIST IDEOLOGY
IN THE DIGITAL
SPACE: THE COUNTER-IDEOLOGICAL RESPONSE (CIR) MODEL 260
KUMAR RAMAKRISHNA, NANYANG TECHNOLOGICAL UNIVERSITY, SINGAPORE
BASED ON THE ASSUMPTION THAT IDEOLOGY IS THE CENTRE OF GRAVITY OF A
VIOLENT ISLAMIST TERRORIST NETWORK, THIS
CHAPTER PROPOSES A COUNTER-IDEOLOGICAL RESPONSE (CIR) MODEL FOR
COUNTERING VIOLENT EXTREMISM (CVE)
IN SOUTHEAST ASIA. THE MODEL SEEKS TO GRADUALLY DIMINISH THE APPEAL OF
VIOLENT EXTREMIST IDEOLOGY. IT
COMPRISES OF FIVE CONCEPTUAL SPACES OF SENDER, MESSAGE, MECHANISM,
RECIPIENT AND CONTEXT, WITHIN
WHICH IDEOLOGY-RELEVANT POLICY INTERVENTIONS MAY BE ATTEMPTED, SO AS TO
IMPACT THE OVERALL REACH AND
APPEAL OF THE VIOLENT EXTREMIST NARRATIVE VIS-A-VIS ANY COUNTERVAILING
NARRATIVE PUT OUT AGAINST IT. THE
MODEL IS APPLIED TO THE INDONESIAN CVE MILIEU IN THIS CHAPTER.
CHAPTER 14
COUNTERING ONLINE VIOLENT EXTREMISM: STATE ACTION AS STRATEGIC
COMMUNICATION 283
DAMIEN D. CHEONG, NANYANG TECHNOLOGICAL UNIVERSITY, SINGAPORE
STATE ACTION IS AN IMPORTANT FORM OF STRATEGIC COMMUNICATION AND
THEREFORE, SIGNIFICANT TO COUNTERING
VIOLENT EXTREMISM (CVE) INITIATIVES ON AND OFFLINE. WHILE NON-STATE
ACTORS OFTEN USE STATE ACTION (AND
SOMETIMES INACTION) TO INCITE AND LEGITIMISE VIOLENCE AGAINST THE STATE
AS WELL AS ITS CITIZENS, GENERATING
THIS SORT OF NEGATIVE SENTIMENT DOES NOT REQUIRE INSTIGATION. THIS IS
ESPECIALLY THE CASE WHEN THE ACTION(S)
OF A STATE ARE DEEMED SO UNACCEPTABLE AND REPULSIVE THAT A PUBLIC
BACKLASH AUTOMATICALLY ENSUES. AS
MANY VIOLENT EXTREMISTS (INCLUDING LONE WOLVES) HAVE BEEN RADICALISED AS
A RESULT OF SUCH CONTROVERSIES,
IT IS NECESSARY FOR POSITIVE STATE ACTION TO BE CARRIED OUT AS WELL AS
WIDELY PUBLICISED AT THE MACRO AND
MICRO LEVELS. THIS IS ENVISAGED TO COUNTER NEGATIVE NARRATIVES AS WELL
AS ADDRESS REAL WORLD ISSUES THAT
PUSH INDIVIDUALS TOWARDS VIOLENT EXTREMISM.
CHAPTER 15
BUILDING NATIONAL RESILIENCE IN THE DIGITAL ERA OF VIOLENT EXTREMISM:
SYSTEMS AND PEOPLE 307
JETHRO TAN, HOME TEAM BEHAVIOURAL SCIENCES CENTRE, MINISTRY OF HOME
AFFAIRS, SINGAPORE
YINGMIN WANG, HOME TEAM BEHAVIOURAL SCIENCES CENTRE, MINISTRY OF HOME
AFFAIRS,
SINGAPORE
DANIELLE GOMES, HOME TEAM BEHAVIOURAL SCIENCES CENTRE, MINISTRY OF HOME
AFFAIRS,
SINGAPORE
THE THREAT OF VIOLENT EXTREMISM IN THE INTERNET AGE HAS UNDOUBTEDLY
BECOME ONE IMPORTANT FOCUS OF
RESEARCH, POLICY, AND GOVERNMENT BODIES ALL OVER THE WORLD.
UNDERSTANDABLY, MANY RESOURCES HAVE BEEN
INVESTED INTO COUNTER VIOLENT EXTREMISM EFFORTS, SUCH AS THE
IDENTIFICATION OF POSSIBLE RADICALISED INDIVIDUALS,
AND UNDERSTANDING THE PSYCHOLOGY BEHIND VIOLENT EXTREMISM. THESE METHODS
ADOPT A RESISTANCE STANCE
AND ATTEMPT TO PREVENT VIOLENT EXTREMISM. HOWEVER, THIS CHAPTER ARGUES
THAT RESILIENCE IS EQUALLY, IF NOT
MORE IMPORTANT GIVEN THE UNPREDICTABLE NATURE OF VIOLENT EXTREMISM. THE
FIRST PART EXAMINES SYSTEMS
WITHIN A NATION SUCH AS CRITICAL INFRASTRUCTURE AND HOW CONCEPTS SUCH AS
RESILIENT-BY-DESIGN CAN BE
INCORPORATED TO ENSURE CONTINUITY IN TIMES OF ATTACKS. THE SECOND PART
WILL EXPLORE PERSON FACTORS OF
CRISIS COMMUNICATION, COHESION, AND SOCIAL CAPITAL, AND HOW THESE
FACTORS CAN AFFORD A COHESIVE SOCIETY
THAT CAN OVERCOME THE CRACKS IN SOCIAL ORDER AND HARMONY OFTEN CAUSED BY
VIOLENT EXTREMISM.
CHAPTER 16
SOCIAL MEDIA ANALYTICS FOR INTELLIGENCE AND COUNTERING VIOLENT EXTREMISM
328
JENNIFER YANG HUI, NANYANG TECHNOLOGICAL UNIVERSITY, SINGAPORE
SOCIAL MEDIA ANALYTICS ARE INCREASINGLY INCORPORATED INTO SECURITY
PRACTICES DUE TO THE RISE IN ONLINE
CRIMINAL AND EXTREMIST ACTIVITIES. SOCIAL MEDIA RESEARCH, HOWEVER, HAS
NOT BECOME ESTABLISHED IN EITHER
INTELLIGENCE PRACTICE OR ACADEMIC-BASED APPROACH. THIS CHAPTER AIMS TO
FILL THE GAP BY DISCUSSING COLLECTION
METHODS AND ANALYTICAL TOOLS FOR THE STUDY OF SOCIAL MEDIA DATA FOR
INTELLIGENCE AND COUNTERING VIOLENT
EXTREMISM: SOCIAL NETWORK ANALYSIS, SENTIMENT ANALYSIS, MULTILINGUAL
ANALYSIS, GEO-CODING, AUTOMATED
ENTITY EXTRACTION, SEMANTIC SEARCH, AND MULTIMEDIA ANALYSIS. WHILE
TECHNOLOGICAL CAPABILITIES OF SOCIAL
MEDIA ANALYTICS ARE IMPROVING RAPIDLY, IT NEEDS TO BE COMPLEMENTED WITH
NUANCED PERSPECTIVES FROM THE
SOCIAL SCIENCES. UNDERSTANDING OF THE EPISTEMOLOGY OF SOCIAL MEDIA AND
DYNAMICS BETWEEN THE ONLINE-
OFFLINE INTERACTION AS WELL AS DATA ACCESS WILL PUT PRACTITIONERS IN A
BETTER POSITION TO REAP THE BENEFITS OF
THE SOCIAL MEDIA. ATTENTION SHOULD BE GIVEN TO TRAIN PRACTITIONERS IN
RELEVANT TECHNOLOGICAL SKILLS WHILE
ALSO INCORPORATING SOCIAL SCIENCE KNOWLEDGE.
CHAPTER 17
ON THE INTERNET, NOBODY KNOWS YOU RE A DOG : THE ONLINE RISK ASSESSMENT
OF VIOLENT
EXTREMISTS 349
NEIL D. SHORTLAND, UNIVERSITY OF MASSACHUSETTS - LOWELL, USA
ONLINE BEHAVIOUR CAN PROVIDE A UNIQUE WINDOW FROM WHICH WE CAN GLEAN
INTENT. FROM AN INTELLIGENCE
STANDPOINT IT PROVIDES AN IMPORTANT SOURCE OF OPEN-SOURCE INFORMATION.
HOWEVER, MAKING INFERENCE OF
INTENT FROM ONLINE ACTIVITY IS INHERENTLY DIFFICULT. YET ELSEWHERE
PROGRESS IS BEING MADE IN INCORPORATING
INFORMATION ONLINE INTO DECISIONS REGARDING RISK AND OFFENDER
PRIORITISATION. THIS CHAPTER SYNTHESISES
LESSONS LEARNT FROM STUDIES OF RISK ASSESSMENT OF VIOLENT EXTREMISTS,
RISK ASSESSMENT ONLINE, AND THE FORM
AND FUNCTION OF EXTREMIST MATERIALS ONLINE IN ORDER TO BEGIN TO APPROACH
THE ISSUE OF ONLINE RISK ASSESSMENT
OF VIOLENT EXTREMISM. IN DOING SO IT HIGHLIGHTS ISSUES ASSOCIATED WITH
THE DIVERSITY OF ONLINE EXTREMIST
BEHAVIOUR, THE DIVERSITY OF OFFLINE EXTREMIST BEHAVIOUR AND THE GENERAL
LACK OF UNDERSTANDING RELATED TO
THE INTERACTION OF ONLINE AND OFFLINE EXPERIENCES, AND HOW THIS
CONTRIBUTES TO THE WIDER PSYCHOLOGICAL
PROCESS OF RADICALISATION . IMPLICATIONS FOR PRACTITIONERS ARE
DISCUSSED.
CHAPTER 18
DETECTING LINGUISTIC MARKERS OF VIOLENT EXTREMISM IN ONLINE ENVIRONMENTS
374
FREDRIK JOHANSSON, SWEDISH DEFENCE RESEARCH AGENCY (FOI), SWEDEN
LISA KAATI, UPPSALA UNIVERSITY, SWEDEN
MAGNUS SAHLGREN, GAVAGAI, SWEDEN
THE ABILITY TO DISSEMINATE INFORMATION INSTANTANEOUSLY OVER VAST
GEOGRAPHICAL REGIONS MAKES THE INTERNET
A KEY FACILITATOR IN THE RADICALISATION PROCESS AND PREPARATIONS FOR
TERRORIST ATTACKS. THIS CAN BE BOTH AN
ASSET AND A CHALLENGE FOR SECURITY AGENCIES. ONE OF THE MAIN CHALLENGES
FOR SECURITY AGENCIES IS THE SHEER
AMOUNT OF INFORMATION AVAILABLE ON THE INTERNET. IT IS IMPOSSIBLE FOR
HUMAN ANALYSTS TO READ THROUGH
EVERYTHING THAT IS WRITTEN ONLINE. IN THIS CHAPTER WE WILL DISCUSS THE
POSSIBILITY OF DETECTING VIOLENT
EXTREMISM BY IDENTIFYING SIGNS OF WARNING BEHAVIOURS IN WRITTEN TEXT -
WHAT WE CALL LINGUISTIC MARKERS
- USING COMPUTERS, OR MORE SPECIFICALLY, NATURAL LANGUAGE PROCESSING.
CHAPTER 19
INTERNET USE AND VIOLENT EXTREMISM: A CYBER-VERA RISK ASSESSMENT
PROTOCOL 391
D. ELAINE PRESSMAN, CARLETON UNIVERSITY, CANADA & INTERNATIONAL CENTRE
FOR COUNTER-
TERRORISM (ICCT) - THE HAGUE, THE NETHERLANDS
CRISTINA IVAN, MIHAI VITEAZUL NATIONAL INTELLIGENCE ACADEMY, ROMANIA
THIS CHAPTER INTRODUCES A NEW APPROACH TO THE RISK ASSESSMENT FOR
VIOLENT EXTREMISM THAT IS FOCUSED
ON CYBER-RELATED BEHAVIOUR AND CONTENT. THE VIOLENT EXTREMIST RISK
ASSESSMENT (VERA-2) PROTOCOL,
USED INTERNATIONALLY, IS AUGMENTED BY AN OPTIONAL CYBER-FOCUSED RISK
INDICATOR PROTOCOL REFERRED TO AS
CYBER A. THE RISK INDICATORS OF CYBERA ARE ELABORATED AND THE
APPLICATION OF CYBERA, CONJOINTLY
WITH THE VERA-2 RISK ASSESSMENT PROTOCOL, IS DESCRIBED. THE COMBINED USE
OF THE TWO TOOLS PROVIDES
(1) A ROBUST AND CYBER-FOCUSED RISK ASSESSMENT INTENDED TO PROVIDE EARLY
WARNING INDICATORS OF VIOLENT
EXTREMIST ACTION, (2) PROVIDES CONSISTENCY AND RELIABILITY IN RISK AND
THREAT ASSESSMENTS, (3) DETERMINES
RISK TRAJECTORIES OF INDIVIDUALS, AND (4) ASSISTS INTELLIGENCE AND LAW
ENFORCEMENT ANALYSTS IN THEIR NATIONAL
SECURITY INVESTIGATIONS. THE TOOLS ARE ALSO RELEVANT FOR USE BY
PSYCHOLOGISTS, PSYCHIATRISTS, COMMUNICATION
ANALYSTS AND PROVIDE RELEVANT INFORMATION THAT SUPPORTS TERRORISM
PREVENTION PROGRAMS (TPP) AND
COUNTERING VIOLENT EXTREMISM (CVE) INITIATIVES.
CHAPTER 20
A SUPPLEMENTARY INTERVENTION TO DERADICALISATION: CBT-BASED ONLINE FORUM
410
PRISCILLA SHI, HOME TEAM BEHAVIOURAL SCIENCES CENTRE, MINISTRY OF HOME
AFFAIRS, SINGAPORE
WITH TODAY S TECHNOLOGICAL ADVANCEMENTS, COMMON ONLINE PLATFORMS, SUCH
AS GMAIL, FORUM, WEBSITES,
FACEBOOK, TWITTER, INSTAGRAM AND YOUTUBE, ARE USED BY MILLIONS TO
COMMUNICATE AND SHARE INFORMATION
IN THE FORM OF TEXT, IMAGE OR BOTH WITH VARYING SYNCHRONICITY. IN A
SIMILAR WAY, VIOLENT EXTREMISTS ARE ALSO
BRINGING THEIR RADICAL AGENDA ONLINE. AS MORE INDIVIDUALS BECOME
RADICALISED BY ONLINE VIOLENT EXTREMIST
PROPAGANDA, THE NEED TO COUNTER SUCH PROPAGANDA AND MANAGE EXISTING
THREATS, SUCH AS INCARCERATED
DETAINEES WHO ARE MORE TECHNOLOGY-SAVVY, BECOMES INCREASINGLY URGENT.
THIS CHAPTER PROPOUNDS THE
IDEA OF ONLINE DERADICALISATION. FIRST, THE ONLINE MILIEU AND ITS
CONCOMITANT SOCIAL PHENOMENA WILL BE
DISCUSSED. SECOND, AN OVERVIEW OF EXISTING ELEMENTS OF DERADICALISATION
AND ITS TARGET AUDIENCE WILL
BE COVERED. THIRD, THE CHAPTER WILL DELVE INTO ONLINE PSYCHOTHERAPY AND
ITS POTENTIAL APPLICABILITY TO
DERADICALISATION. LAST, THE CHAPTER WILL CONCLUDE WITH RELEVANT
IMPLICATIONS AND FUTURE RESEARCH DIRECTIONS.
SECTION 4
EMERGING TRENDS
CHAPTER 21
CYBERTERRORISM: USING THE INTERNET AS A WEAPON OF DESTRUCTION 426
LEEVIA DILLON, HOME TEAM BEHAVIOURAL SCIENCES CENTRE, MINISTRY OF HOME
AFFAIRS,
SINGAPORE
THE CYBER THREAT LANDSCAPE HAS CONTINUED TO EVOLVE WITH TIME AND
ENHANCED TECHNOLOGY. WITH THE ADVENT OF
NEW BREEDS OF TERRORISTS AND CYBERCRIMINALS, THE CYBERTERRORISM DEBATE
HAS AGAIN WIELDED GLOBAL ATTENTION.
IN THIS CHAPTER, THE AUTHOR WILL ATTEMPT TO DELVE DEEPER INTO THE
CONCEPT OF CYBERTERRORISM. FIRSTLY, IT WILL
DISCUSS THE RELATED ISSUES WHICH INCLUDE THE DEFINITION CONSENSUS,
PERCEPTION, AND MEDIA ABUSE PROBLEMS.
THE NEXT SECTION DRAWS ON PARALLELS FROM RESEARCH ON CYBER THREATS AND
TERRORISM BASED ON SIX THEMES
(I.E., MODUS OPERANDI, DOMAIN, TARGETS, IMPACT, ANTAGONISTS AND
MOTIVATIONS) TO FORMULATE A CYBERTERRORISM
CONCEPTUAL FRAMEWORK. THE THIRD SECTION WILL PROVIDE A HYPOTHETICAL
FOUR-STEP CYBERTERRORISM ATTACK
SEQUENCE AND SUGGESTIONS FOR COUNTERING CYBERTERRORISM. THIS CHAPTER
WILL THEN CONCLUDE BY HIGHLIGHTING
SEVERAL IMPLICATIONS OF INTEREST.
CHAPTER 22
DEATH BY HACKING: THE EMERGING THREAT OF KINETIC CYBER 452
PENELOPE WANG, HOME TEAM BEHAVIOURAL SCIENCES CENTRE, MINISTRY OF HOME
AFFAIRS,
SINGAPORE
INNOVATION AND TECHNOLOGICAL ADVANCEMENTS HAVE SEEN MANY DEVICES AND
SYSTEMS BEING LINKED UP ON
TO THE INTERNET. SUCH DEVICES AND SYSTEMS INCLUDE PERSONAL MEDICAL
DEVICES LIKE INSULIN PUMPS AND
PACEMAKERS, CARS, AS WELL AS CRITICAL INFRASTRUCTURE LIKE POWER GRIDS
AND TRAFFIC LIGHT SYSTEMS. HOWEVER,
RECENT RESEARCH BY CYBER SECURITY EXPERTS HAS REVEALED THAT THESE
CRITICAL DEVICES AND SYSTEMS ARE HIGHLY
VULNERABLE TO BEING HACKED INTO AND MANIPULATED. SHOULD SUCH AN ATTACK
BE CARRIED OUT SUCCESSFULLY BY
BAD ACTORS, LIKE VIOLENT EXTREMISTS, THIS COULD RESULT IN PHYSICAL
INJURY OR EVEN DEATH. HENCE, THIS CHAPTER
AIMS TO BRING AWARENESS ON THE KINETIC CYBER THREAT BY HIGHLIGHTING
VARIOUS FORMS OF KINETIC CYBER, AND
THE VULNERABILITIES THAT MAKE THESE DEVICES AND SYSTEMS SUSCEPTIBLE. IN
ADDITION, THIS CHAPTER INTRODUCES
THE MOTIVATIONS AND CHARACTERISTICS OF VIOLENT EXTREMISTS WHO MIGHT
ENGAGE IN KINETIC CYBER, AND ENDS
OFF BY PROPOSING SOME RECOMMENDED DIRECTIONS TO COUNTER THIS THREAT.
CHAPTER 23
SPEAR PHISHING: THE TIP OF THE SPEAR USED BY CYBER TERRORISTS 469
ARUN VISHWANATH, UNIVERSITY AT BUFFALO, USA
THE UBIQUITOUS USE OF THE INTERNET HAS MADE IT POSSIBLE FOR TERRORIST
GROUPS TO REMOTELY FOMENT ATTACKS
WITH LITTLE RISK OF CAPTURE. AMONG THE NEWEST FORMS OF ATTACKS IS CYBER
HACKING, WHICH HAS SEEN INCREASED
USE BY TERRORIST GROUPS FOR ACTS RANGING FROM PINPOINTING TARGETS FOR
ASSASSINATION TO HOLDING ORGANISATIONS
HOSTAGE AND EMBARRASSING GOVERNMENTS. IN ALMOST ALL THESE ATTACKS, SPEAR
PHISHING IS THE VECTOR USED
TO GAIN ACCESS TO A COMPUTER NETWORK - MAKING IT IMPERATIVE THAT
POLICYMAKERS FIND WAYS TO STOP IT.
THIS CHAPTER PROVIDES AN OVERVIEW OF THE DIFFERENT TYPES OF SPEAR
PHISHING ATTACKS AND THE REASONS THEY
SUCCEED. THE CHAPTER THEN PROVIDES AN OVERVIEW OF THE DIFFERENT
STRATEGIES BEING USED TO COMBAT IT AND
THEIR RELATIVE EFFECTIVENESS. DRAWING FROM THE LATEST SOCIAL SCIENCE
RESEARCH AND FROM INITIATIVES THAT HAVE
WORKED AROUND THE WORLD, THE CHAPTER CULMINATES WITH SIX POLICY
SUGGESTIONS, WHICH COULD SIGNIFICANTLY
REDUCE THE EFFECTIVENESS OF SPEAR PHISHING AND PROTECT NATIONS FROM A
MAJOR CYBER ATTACK.
SECTION 5
SUMMARY AND FUTURE DIRECTIONS
CHAPTER 24
WHAT WE KNOW AND WHAT ELSE WE NEED TO DO TO ADDRESS THE PROBLEM OF
VIOLENT EXTREMISM
ONLINE: CONCLUDING CHAPTER 486
MAJEED KHADER, HOME TEAM BEHAVIOURAL SCIENCES CENTRE, MINISTRY OF HOME
AFFAIRS,
SINGAPORE
THIS CONCLUDING CHAPTER IS AN ATTEMPT MADE TO SUMMARISE AND ANALYSE THE
CHAPTERS PROVIDED BY THE
VARIOUS AUTHORS IN THIS BOOK. THE ANALYSIS USED IN THIS CHAPTER IS BASED
ON A PUBLIC HEALTH PREVENTION
MODEL. THE VALUE OF THIS APPROACH IS THE SYSTEMIC PREVENTION ANGLE THAT
IT UNDERTAKES TO EXAMINE PROBLEMS
AND SOLUTIONS.
COMPILATION OF REFERENCES 496
ABOUT THE CONTRIBUTORS 571
INDEX 579
|
any_adam_object | 1 |
author2 | Khader, Majeed 1966- |
author2_role | edt |
author2_variant | m k mk |
author_GND | (DE-588)1109935552 |
author_facet | Khader, Majeed 1966- |
building | Verbundindex |
bvnumber | BV043663059 |
callnumber-first | H - Social Science |
callnumber-label | HV6773 |
callnumber-raw | HV6773.15.C97 |
callnumber-search | HV6773.15.C97 |
callnumber-sort | HV 46773.15 C97 |
callnumber-subject | HV - Social Pathology, Criminology |
ctrlnum | (OCoLC)950255961 (DE-599)BVBBV043663059 |
dewey-full | 363.325 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.325 |
dewey-search | 363.325 |
dewey-sort | 3363.325 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02440nam a2200553 c 4500</leader><controlfield tag="001">BV043663059</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20161116 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">160711s2016 xxu |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">015051297</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781522501565</subfield><subfield code="c">(hardcover)</subfield><subfield code="9">978-1-5225-0156-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)950255961</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043663059</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">HV6773.15.C97</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">363.325</subfield><subfield code="2">2</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Combating violent extremism and radicalization in the digital era</subfield><subfield code="c">Majeed Khader, Loo Seng Neo, Gabriel Ong, Eunice Tan Mingyi, Jeffery Chin</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, PA</subfield><subfield code="b">Information Science Reference, an imprint of IGI Global</subfield><subfield code="c">2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xxviii, 582 pages</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Advances in religious and cultural studies (ARCS) book series</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book is an essential reference for the latest research on the utilization of online tools by terrorist organizations to communicate with and recruit potential extremists and examines effective countermeasures employed by law enforcement agencies to defend against such threats"...</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Radikalismus</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorismus</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet and terrorism</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Extremist Web sites</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorists</subfield><subfield code="x">Recruiting</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Radicalism</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorism</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Radikalismus</subfield><subfield code="0">(DE-588)4048171-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Radikalismus</subfield><subfield code="0">(DE-588)4048171-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Khader, Majeed</subfield><subfield code="d">1966-</subfield><subfield code="0">(DE-588)1109935552</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-1-5225-0157-2</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">SWB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029076381&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029076381</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV043663059 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:31:52Z |
institution | BVB |
isbn | 9781522501565 |
language | English |
lccn | 015051297 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029076381 |
oclc_num | 950255961 |
open_access_boolean | |
owner | DE-12 |
owner_facet | DE-12 |
physical | xxviii, 582 pages |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | Information Science Reference, an imprint of IGI Global |
record_format | marc |
series2 | Advances in religious and cultural studies (ARCS) book series |
spelling | Combating violent extremism and radicalization in the digital era Majeed Khader, Loo Seng Neo, Gabriel Ong, Eunice Tan Mingyi, Jeffery Chin Hershey, PA Information Science Reference, an imprint of IGI Global 2016 xxviii, 582 pages txt rdacontent n rdamedia nc rdacarrier Advances in religious and cultural studies (ARCS) book series Includes bibliographical references and index "This book is an essential reference for the latest research on the utilization of online tools by terrorist organizations to communicate with and recruit potential extremists and examines effective countermeasures employed by law enforcement agencies to defend against such threats"... Radikalismus Terrorismus Cyberterrorism Internet and terrorism Extremist Web sites Terrorists Recruiting Radicalism Terrorism Prevention Terrorismus (DE-588)4059534-1 gnd rswk-swf Radikalismus (DE-588)4048171-2 gnd rswk-swf Internetkriminalität (DE-588)7864395-8 gnd rswk-swf (DE-588)4143413-4 Aufsatzsammlung gnd-content Internetkriminalität (DE-588)7864395-8 s Radikalismus (DE-588)4048171-2 s Terrorismus (DE-588)4059534-1 s DE-604 Khader, Majeed 1966- (DE-588)1109935552 edt Erscheint auch als Online-Ausgabe 978-1-5225-0157-2 SWB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029076381&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Combating violent extremism and radicalization in the digital era Radikalismus Terrorismus Cyberterrorism Internet and terrorism Extremist Web sites Terrorists Recruiting Radicalism Terrorism Prevention Terrorismus (DE-588)4059534-1 gnd Radikalismus (DE-588)4048171-2 gnd Internetkriminalität (DE-588)7864395-8 gnd |
subject_GND | (DE-588)4059534-1 (DE-588)4048171-2 (DE-588)7864395-8 (DE-588)4143413-4 |
title | Combating violent extremism and radicalization in the digital era |
title_auth | Combating violent extremism and radicalization in the digital era |
title_exact_search | Combating violent extremism and radicalization in the digital era |
title_full | Combating violent extremism and radicalization in the digital era Majeed Khader, Loo Seng Neo, Gabriel Ong, Eunice Tan Mingyi, Jeffery Chin |
title_fullStr | Combating violent extremism and radicalization in the digital era Majeed Khader, Loo Seng Neo, Gabriel Ong, Eunice Tan Mingyi, Jeffery Chin |
title_full_unstemmed | Combating violent extremism and radicalization in the digital era Majeed Khader, Loo Seng Neo, Gabriel Ong, Eunice Tan Mingyi, Jeffery Chin |
title_short | Combating violent extremism and radicalization in the digital era |
title_sort | combating violent extremism and radicalization in the digital era |
topic | Radikalismus Terrorismus Cyberterrorism Internet and terrorism Extremist Web sites Terrorists Recruiting Radicalism Terrorism Prevention Terrorismus (DE-588)4059534-1 gnd Radikalismus (DE-588)4048171-2 gnd Internetkriminalität (DE-588)7864395-8 gnd |
topic_facet | Radikalismus Terrorismus Cyberterrorism Internet and terrorism Extremist Web sites Terrorists Recruiting Radicalism Terrorism Prevention Internetkriminalität Aufsatzsammlung |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029076381&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT khadermajeed combatingviolentextremismandradicalizationinthedigitalera |