ISIS’s digital Jihad Preparation

Eleni Kapsokoli
{"title":"ISIS’s digital Jihad Preparation","authors":"Eleni Kapsokoli","doi":"10.37458/nstf.24.3.2","DOIUrl":null,"url":null,"abstract":"The advent of the digital revolution has introduced several means for the collection, spread, and dissemination of information within the realm of communication, thus transcending geographical and time constraints. The swift digitization and transformation of contemporary societies have created an unusual security landscape, exerting its influence across every facet of human, societal, economic, and political life. Technology stands as a pivotal variable in the dynamic evolution of terrorism. Cyberspace has emerged as a fertile domain for the amplification and continuation of terrorist activities, representing a profound “transformation” at the operational level over recent decades. Terrorists have adeptly seized upon the potential of cyberspace, strategically imitating successful tactics employed by like-minded, assimilating lessons from past mistakes, and adapting to exigencies of both the present and future. The extensive deployment of information communication and technologies (ICTs) has substantially facilitated terrorists’ activities in a multitude of ways. This includes cost reduction, the generation of operational efficiencies, broader access to novel target demographics, the provision of anonymity, heightened security measures, the dissolution of organizational barriers, and the amplification of the scope and reach of their actions. The full spectrum of cyber activities conducted by terrorists can be comprehensively encapsulated within a model titled the “Digital Jihad”. This paper intends to apply this model in the context of examining the activities and strategies of the Islamic State of Iraq and Syria (ISIS).","PeriodicalId":475234,"journal":{"name":"National security and the future","volume":" 44","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"National security and the future","FirstCategoryId":"0","ListUrlMain":"https://doi.org/10.37458/nstf.24.3.2","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The advent of the digital revolution has introduced several means for the collection, spread, and dissemination of information within the realm of communication, thus transcending geographical and time constraints. The swift digitization and transformation of contemporary societies have created an unusual security landscape, exerting its influence across every facet of human, societal, economic, and political life. Technology stands as a pivotal variable in the dynamic evolution of terrorism. Cyberspace has emerged as a fertile domain for the amplification and continuation of terrorist activities, representing a profound “transformation” at the operational level over recent decades. Terrorists have adeptly seized upon the potential of cyberspace, strategically imitating successful tactics employed by like-minded, assimilating lessons from past mistakes, and adapting to exigencies of both the present and future. The extensive deployment of information communication and technologies (ICTs) has substantially facilitated terrorists’ activities in a multitude of ways. This includes cost reduction, the generation of operational efficiencies, broader access to novel target demographics, the provision of anonymity, heightened security measures, the dissolution of organizational barriers, and the amplification of the scope and reach of their actions. The full spectrum of cyber activities conducted by terrorists can be comprehensively encapsulated within a model titled the “Digital Jihad”. This paper intends to apply this model in the context of examining the activities and strategies of the Islamic State of Iraq and Syria (ISIS).
ISIS 的数字圣战准备工作
数字革命的到来为通信领域的信息收集、传播和扩散引入了多种手段,从而超越了地理和时间的限制。当代社会的迅速数字化和转型创造了一个不同寻常的安全环境,其影响遍及人类、社会、经济和政治生活的方方面面。技术是恐怖主义动态演变过程中的一个关键变量。网络空间已成为扩大和延续恐怖活动的沃土,代表着近几十年来行动层面的深刻 "转变"。恐怖分子巧妙地利用了网络空间的潜力,在战略上模仿志同道合者的成功战术,吸取过去错误的教训,适应当前和未来的迫切需要。信息通信技术(ICTs)的广泛应用以多种方式为恐怖分子的活动提供了极大的便利。这包括降低成本、提高行动效率、更广泛地接触新的目标人群、提供匿名性、加强安全措施、消除组织壁垒以及扩大其行动的范围和影响。恐怖分子开展的所有网络活动都可以用一个名为 "数字圣战 "的模式来全面概括。本文打算在研究伊拉克和叙利亚伊斯兰国(ISIS)的活动和战略时应用这一模式。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信