Please use this identifier to cite or link to this item: http://bura.brunel.ac.uk/handle/2438/21169
Title: Bytes not waves: information communication technologies, global jihadism and counterterrorism
Authors: Chertoff, M
Bury, P
Richterova, D
Issue Date: 20-May-2020
Publisher: Oxford University Press on behalf of The Royal Institute of International Affairs
Citation: Michael Chertoff, Patrick Bury, Daniela Richterova, Bytes not waves: information communication technologies, global jihadism and counterterrorism, International Affairs, Volume 96, Issue 5, September 2020, Pages 1305–1325, https://doi.org/10.1093/ia/iiaa048
Abstract: © The Author(s) 2020. Rapoport's conceptualization of the last, religious wave of four global waves remains highly influential. But it, and other typologies, have placed too little emphasis on the influence of information and communication technologies (ICTs) on the evolution of global jihadist activities. This article makes two new contributions by developing both a new ICT-based typology for understanding jihadist evolutions, and by focusing on successful attacks. Our central argument is that ICTs' impact on global jihadism has facilitated dramatic transformations of its strategy, organization and tactics since the 1990s, and that these can be understood as four overlapping iterations. ‘Jihadism 1.0’ describes the hierarchical, top-down directed and overseas financed and trained terrorist organizations that conducted iconic attacks at the turn of the millennium. Jihadism has since evolved into ‘Jihadism 2.0’ and then ‘Jihadism 3.0’. Jihadism 2.0 recognizes that a number of smaller, coordinated attacks can have a global impact. Jihadism 3.0 is inspired terrorism that has no links to the central terror organization, utilizing individuals and crude tactics. Finally, jihadism is evolving toward ‘Jihadism 4.0’, or cyberterrorism. We argue this typology provides a useful basis for scholars and practitioners to conceptualize the ICT dynamics influencing global jihadism, and these may be applicable to other global terrorists. The conclusion analyses how counter-terrorism services can respond to these evolutions and charts areas for future research.
URI: https://bura.brunel.ac.uk/handle/2438/21169
DOI: https://doi.org/10.1093/ia/iiaa048
ISSN: 0020-5850
Appears in Collections:Brunel Law School Research Papers

Files in This Item:
File Description SizeFormat 
FullText.pdf177 kBAdobe PDFView/Open


This item is licensed under a Creative Commons License Creative Commons