Terrorism, Technology and Society in the 21st Century
Keywords:
terrorism, security, social networks, big data, algorithmsAbstract
In terms of security and criminal prevention, artificial intelligence and algorithmic data-processing have made it possible for a large part of the activities and communications carried out daily by millions of people to be recorded and analysed in real time in order to detect any sign of criminal activity. Among the advantages that this technology has brought to the social and political field, the safe and efficient handling of data and the fact that these processes are carried out without human interference are two of its main highlights. At the same time, terrorism, and particularly that one which arises from the very society it seeks to attack, came to deepen the debate on the need for a surveillance system aimed at recording and analyzing the activities of the population in order to safeguard general welfare and public security. In this article we will address the scope and implications for contemporary societies of the use of new technologies applied to the field of security and, in particular, to the fight against this frequent and particular type of terrorism.Downloads
References
Aaronson, T. (2019). Terrorism’s double standard: Violent far right extremists are rarely prosecuted as terrorists. The Intercept, 23 de marzo. Recuperado de: https://theintercept.com/2019/03/23/domestic-terrorism-fbi-prosecutions/
Acerbi, J. (2019). Metapolítica. Enemigo público, poder y muerte civil en la tradición republicana. Buenos Aires: Miño y Dávila.
Acerbi, J. (2020). La identidad del virus. Pensar la pandemia. La filosofía interpelada por el COVID-19. Buenos Aires: Miño y Dávila. Recuperado de: https://germyd.wixsite.com/bitacorabfv.
Adorno, T. (2001). Epistemología y Ciencias Sociales. Valencia: Cátedra.
Albrecht, G. (2003). Sociological Approaches to Individual Violence and their Empirical Evaluation. En W. Heitmeyer y J. Hagan (Eds.), International Handbook of Violence Research (611-656). Dordrecht, Boston y Londres: Kluwer Academic Publishers.
Alsaedi, N., Burnap, P. y Rana, O. (2017). Can we predict a riot? Disruptive event prediction using Twitter. Transactions on Internet Technology, 17(2), 1-26.
Alzahrani, A., et al. (2018). Countering Terrorism on Social Media Using Big Data. CS&IT, 35-42.
Andrejevic M. (2013). Infoglut. How too Much Information is Changing the Way We Think and Know. Nueva York: Routledge.
Anselmino, V. (2013). Las garantías constitucionales y la regla de exlcusión probatoria en el proceso penal. Anales, 42,106-119.
Aquaro, V. (2019). Prólogo. En J. G. Corvalán (Ed.), Prometea. Inteligencia Artificial para transformar organizaciones públicas. Buenos Aires: Astrea.
Battersby, J. y Rhys, B. (2019). Christchurch in the context of New Zealand terrorism and right wing extremism. Journal of Policing, Intelligence and Counter Terrorism,1-17.
Becker, H., Mor, N. y Gravano, L. (2011). Beyond trending topics: Real-world event identification on twitter. Proceedings of the 5th International AAAI Conference on Weblogs and Social Media (ICWSM’11), 1-4.
Benigni, M., Kenneth, J. y Carley, K. (2017). Online extremism and the communities that sustain it: Detecting the ISIS supporting community on Twitter. PloS one, diciembre, 1-23.
Beresñak, F. (2020). Comentario crítico sobre un posible nuevo orden jurídico-político: la unidimensionalidad de la norma y el uso de la tecnología. En J. G. González, Á. A. Lozano y G. M. Rodríguez (Dir.), El derecho público y privado ante las nuevas tecnologías (568-574). Madrid: Dykinson.
Berkebile, R. (2015). What Is Domestic Terrorism? A Method for Classifying Events From the Global Terrorism Database. Terrorism and Political Violence, 0, 1-26.
Bjørgo, T. (1997). Racist and right-wing violence in Scandinavia: Patterns, perpetrators and responses. Oslo: Tano Aschehoug.
Bjørgo, T. (2005). Root Causes of Terrorism. Myths, reality and ways forward. Londres: Routledge.
Bjørgo, T. (2013). Strategies for Preventing Terrorism, Basingstoke. Palgrave: Macmillan.
Bolin, G. y Andersson Schwarz, J. (2015). Heuristics of the algorithm: Big Data, user interpretation and institutional translation. Big Data & Society, julio–diciembre, 1-12.
Boyd, D. y Crawford, K. (2012). Critical Questions for Big Data, Information. Communication & Society, 15(5), 662-679.
Breivik, A. (2011). 2083: A European Declaration of Independence.
Cafferata Nores, J. I. (1988). La prueba obtenida por quebrantamientos constitucionales. En Temas de Derecho Procesal Penal. Buenos Aires: Depalma.
Cafferata Nores, J. I. (1998). La prueba en el proceso penal. Buenos Aires: Depalma.
Carrio, A. (1994). Garantías constitucionales en el proceso penal. Buenos Aires: Hammurabi.
Carvalho, C. (2016). The Importance of Web 2.0 for Jihad 3.0. Female Jihadists Coming to Grips with Religious Violence on Facebook. Online. Heidelberg Journal of Religions on the Internet, 11, 46-65.
Castelvecchi, D. (2016). Can we open the black box of AI? Nature News, 538(7623), 20-23.
Chichizola, M. (1983). El debido proceso como garantía constitucional. La Ley, Tomo Nro.1983.
Corvalán, J. G. (2017). La primera inteligencia artificial predictiva al servicio de la Justicia: Prometea. La Ley 2017-E-1.
Couture, E. (1979). Estudios de Derecho Procesal Civil. Tomo II. Buenos Aires: Ediciones Depalma.
Delanda M. (1991). War in the Age of Intelligent Machines. Nueva York: Zone.
Eubank, W. y Weinberg, L. (2001). Terrorism and Democracy: Perpetrators and Victims. Terrorism and Political Violence, 13(1), 155-164.
Facebook News Room (2018). Hard Questions: How Effective Is Technology in Keeping Terrorists off Facebook? Recuperado de: https://about.fb.com/news/2018/04/keeping-terrorists-off-facebook/-.
Falk, A., Kuhn, A. y Zweimüller, J. (2011). Unemployment and right-wing extremist crime. Scandinavian Journal of Economics, 113(2), 260-285.
Farzindar, A. y Khreich W. (2015). A survey of techniques for event detection in twitter. Comput. Intell., 31(1), 132-164.
Freilich, J. et al. (2018). Patterns of Fatal Extreme-Right Crime in the United States. Perspectives on Terrorism, 12(6), 38-51.
Greenfield, A. (2018). Radical Technologies: The Design of Every-day Life: Londres: Verso.
Gries, T., Meierrieks, D. y Redlin, M. (2015). Oppressive governments, dependence on the United States and anti-American terrorism. Oxford Economic Papers, 67, 83-103.
Groh, T. (2019). Proxy War. The Least Bad Option. California: Standford University.
Hamm, M. y Spaaij, R. (2017). The Age of Lone Wolf Terrorism. Columbia: Columbia University Press.
Hainsworth, P. (2018). The Extreme Right in Western Europe. Londres y Nueva York: Routledge.
Hamidreza, A., Soumajyoti, S. y Shakarian, P. (2019). Detection of Violent Extremists in Social Media. ArXiv:1902.01577, 1-5. Ithaca: Cornell University.
Hebberecht, P. y Baillergeau, E. (2012). Social Crime Prevention in Europe. Bruselas: Brussels University Press.
Heitmeyer, W. (1993). Hostility and violence towards foreigners in Germany. En T. Bjørgo y R. Witte (Eds.), Racist violence in Europe (17-28). Basingstoke: Palgrave Macmillan.
Heitmeyer, W. (2005). Right-Wing terrorism. En T. Bjørgo (Ed.), Root Causes of Terrorism. Myths, reality and ways forward (141-153), Londres: Routledge.
Hemmingby, C. y Bjørgo, T. (2016). The Dynamics of a Terrorist Targeting Process: Anders B. Breivik and the 22 July Attacks in Norway. Londres: Palgrave Macmillan.
Hemmingby, C. y Bjørgo, T. (2018). Terrorist Target Selection: The Case of Anders Behring Breivik. Perspectives on Terrorism, 12(6), 164-176.
Hilbert, M., Liu, B., Luu, J. y Fishbein, J. (2019). Behavioral Experiments With Social Algorithms: An Information Theoretic Approach to Input–Output Conversions. Communication Methods and Measures, 13, 267-286.
Horgan, J. (2005). The social and psychological characteristics of terrorism and terrorists. En T. Bjørgo (Ed.), Root Causes of Terrorism. Myths, reality and ways forward (44-53). Londres: Routledge.
Jurczak, J., Łachacz, T. y Nitsch, H. (2020). The So-Called ‘Lone Wolf’ Phenomenon. En B. Akhgar, D. Wells y J. M. Blanco (Eds.), Investigating Radicalization Trends. Case Studies in Europe and Asia. Suiza: Springer.
Kearns, E., Betus, A. y Lemieux, A. (2019). Why do some terrorist attacks receive more media attention than others? Justice Quarterly, 26 [online first], 985-1022.
Koehler, D. (2018). Recent Trends in German Right-Wing Violence and Terrorism: What are the Contextual Factors behind ‘Hive Terrorism’? Perspectives on Terrorism, 12(6), 72-88.
Koehler, D. (2017). Right-Wing Terrorism in the 21st Century. The “National Socialist Underground” and the history of terror from the Far-Right in Germany. Londres y Nueva York: Routledge.
Koehler, D. (2019). Violence and Terrorism from the Far-Right: Policy Options to Counter an Elusive Threat. The International Centre for Counter-Terrorism – The Hague, 10.
Latour, B. (2009). Tarde’s idea of quantification. En M. Candea (Ed.), The Social after Gabriel Tarde: Debates and Assessments. Londres: Routledge.
Lecun, Y., Bengio, Y. y Hinton, G. (2015). Deep learning. Nature, 521(7553), 436-444.
Levin, J. (2006). Domestic Terrorism. Reno: Chelsea House Publishers.
Levitt, M. (2018). Neither Remaining nor Expanding. The Decline of the Islamic State. Washington: The Washington Institute for Near East Policy.
Mager, A. (2012). Algorithmic Ideology. Information, Communication & Society, 15(5), 769-787.
Manch, T. (2019). Alarming’ increase in extreme-right genocide theory came before Christchurch terror attack – report, Stuff News. Recuperado de: https://www.stuff.co.nz/national/christchurch-shooting/114066106/alarming-increase-in-extremeright-genocide-theory-came-before-christchurch-terror-attack--report.
Medhurst, P. (2000). Global terrorism, a course produced by UNITAR. Nueva York: UNITAR.
Mohammad, A. (2005). Roots of terrorism in the Middle East. En T. Bjørgo (Ed.), Root Causes of Terrorism. Myths, reality and ways forward. Londres: Routledge.
Münkler, H. (2002). Die neuen Kriege. Hamburgo: Rowohlt Verlag.
Nesser, P. (2010). Joining jihadi terrorist cells in Europe: Exploring motivational aspects of recruitment and radicalisation. En M. Ranstorp (Ed.), Understanding Violent Radicalisation: Terrorist and Jihadist Movements in Europe (81-114). Londres: Taylor and Francis.
O’Neil, C. (2016). Weapons of Math Destruction. Londres: Penguin.
Pasquale, P. (2015). The black box society: The secret algorithms that control money and information. Cambridge: Harvard University Press.
Piazza, J. (2017). The determinants of domestic right-wing terrorism in the USA: Economic grievance, societal change and political resentment. Conflict Management and Peace Science, 34(I), 52-80.
Post, J. (2005). The socio-cultural underpinnings of terrorist psychology. En T. Bjørgo (Ed.), Root Causes of Terrorism. Myths, reality and ways forward (54-69). Londres: Routledge.
Powell, K. (2011). Framing Islam: An analysis of U.S. Media coverage of terrorism since 9/11. Communication Studies, 62(1), 90-112.
Raffaello, P. (2011). What Have We Learned about Lone Wolves from Anders Behring Breivik? Perspectives on Terrorism, 5(5/6), 27-42.
Ravndal, J. (2017). Explaining right-wing terrorism and violence in Western Europe: Grievances, opportunities and polarisation. European Journal of Political Research, 57(4), 845-866.
Sadin, É. (2018a). La humanidad aumentada. La administración digital del mundo. Buenos Aires: Caja Negra.
Sadin, É. (2018b). La silicolonización del mundo. La irresistible expansión del liberalismo digital. Buenos Aires: Caja Negra.
Sandler, T. (2015). Terrorism and Counterterrorism: An Overview. Oxford Economic Papers, 67(1), 1-20.
Savage, M. y Burrows, R. (2007). The coming crisis of empirical sociology. Sociology, 41(5), 885-899.
Schmid, A. et al. (1984). Political Terrorism: A Research Guide to Concepts, Theories, Data Bases and Literature. Amsterdam: North-Holland.
Schmid, A. (2001). The Routledge Handbook of Terrorism Research. Londres y Nueva York: Routledge.
Schmid, A. (2005). Preventing of terrorism. Towards a multi-pronged approach. En T. Bjørgo (Ed.), Root Causes of Terrorism. Myths, reality and ways forward. Londres: Routledge.
Seliktar, O. y Rezaei, F. (2020). Iran, Revolution and Proxy Wars. Suiza: Palgrave Macmillan.
Sikkens E., Van San, M., Sieckelinck, S., Boeije, H. y Winter, M. (2016). Participant Recruitment through Social Media: Lessons Learned from a Qualitative Radicalization Study Using Facebook. Sage Journals, 29(2),130-139.
Simon, J. D. (2013). Lone Wolf Terrorism: Understanding the Growing Threat. Amsterdam: Prometheus books.
Small, D. (2011). The uneasy relationship between national security and personal freedom: New Zealand and the ‘War on terror’. International Journal of Law in Context, 7(4), 467-486.
Srnicek, N. (2018). Capitalismo de plataformas. Buenos Aires: Caja Negra.
Steinbock, D. (2005). Data Matching, Data Mining, and Due Process. 40 Georgia Law Review, 1, 1-88.
Stohl, M. (2005). Expected utility and state terrorism. En T. Bjørgo (Ed.), Root Causes of Terrorism. Myths, reality and ways forward. Londres: Routledge.
Tarrant, B. (2019). The Great Replacement.
Taylor, H. (2019). Domestic terrorism and hate crimes: legal definitions and media framing of mass shootings in the United States. Journal of Policing, Intelligence and Counter Terrorism, 14(3), 227-244.
Van Dijck, J. (2014). Datafication, dataism and dataveillance: Big Data between scientific paradigm and ideology. Surveillance & Society, 12(2), 197-208.
Vieweg, S., Castillo, C. y Imran, M. (2014). Integrating social media communications into the rapid assessment of sudden onset disasters. Proceedings of the 6th International Conference on Social Informatics, 444–461.
Waldmann, P. (2005). Social-revolutionary terrorism in Latin America and Europe. En T. Bjørgo (Ed.), Root Causes of Terrorism. Myths, reality and ways forward. Londres: Routledge.
Downloads
Published
How to Cite
Issue
Section
License
All CTS's issues and academic articles are under a CC-BY license.
Since 2007, CTS has provided open and free access to all its contents, including the complete archive of its quarterly edition and the different products presented in its electronic platform. This decision is based on the belief that offering free access to published materials helps to build a greater and better exchange of knowledge.
In turn, for the quarterly edition, CTS allows institutional and thematic repositories, as well as personal web pages, to self-archive articles in their post-print or editorial version, immediately after the publication of the final version of each issue and under the condition that a link to the original source will be incorporated into the self-archive.