Abstract
The rise of ICT (Information and Communication Technologies) in the age of globalization significantly affects SEE (South Eastern European) security. Although these technologies help the region of SEE to become more interconnected, interrelated and thus, boost the SEE countries’ commodity, prosperity and competitiveness put in security context, these technologies have increased unpredictability, complexity and the threats to the SEE security. In this line, as to the rest of the world, modern terrorism represents an inevitable burden of the SEE governments’ security. Today, it is more than clear that modern terrorist groups and individuals exploit cyberspace to achieve strategic advantage against the mightier enemies. Therefore, based on the recent experience the article explains how and in which way terrorist use of a cyberspace could affect CII (critical information infrastructure) in the region of SEE. Giving the specific dynamics in the region, article first explains how terrorists’ use of modern ICT and cyberspace serves to accomplish their strategic agenda. Then it explains how terrorist could affect CIIs in the region of SEE and thus affect the overall SEE regions’ security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
See the following sites for example: Websites such as the “Way of the Believer” (putvjernika.com), Way of Islam” (stazomislama.com), Ensarije Serijata (“Partisans of Sharia” http://www.geocities.ws/ensarije_seriata/index-2.html), and “News of the Community” (vijestiummeta.com), and the Sandžak Wahhabi website kelimetul-haqq.org.
References
Bogdanoski, M., Petreski, D.: Cyber terrorism-global security threat. Contemp. Maced. Defense-Int. Sci. Defense, Secur. Peace J. 13(24), 59–73 (2013)
The United Nations Office on Drugs and Crime, The Use of the Internet for Terrorist Purposes, The United Nations New York (2012)
Rollins, J.: Al Qaeda and Affiliates: Historical Perspective, Global Presence, and Implications for U.S. Policy, CRS Report R41070 (2011)
Weimann, G.: How modern terrorism uses the Internet. United states institute of peace. Accessed 22 March 2015 (2004). http://www.terror.net, http://www.usip.org/pubs/specialreports/sr116.pdf
House of Commons Intelligence and Security Committee. Report into the London Terrorist Attacks on 7 July 2005, May 2006
Sipress, A.: An Indonesian’s Prison Memoir Takes Holy War into Cyberspace. Washington Post, New York (2004). http://www.washingtonpost.com/wp-dyn/articles/A62095-2004Dec13.html. Accessed 14 December 2004
Krebs, B.: Three Worked the Web to Help Terrorists, p. D01. Washington Post, New York (2007)
Aaronson, M., Diessen, A., de Kermabon, Y., Long, M.B., Miklaucic, M.: NATO countering the hybrid threat. Prism 2(4), 111–124 (2012)
Amaruso, J.: Romania Global Center for Cyber Crime in USA, USA Toaday, 14 January 2014. http://guardianlv.com/2014/01/romania-global-center-for-cybercrime-in-u-s/. Accessed 22 March 2014
FBI Arrested Young Hacker from Struga, Press 24, November 20 2012. http://star.press24.mk/story/poznato/foto-fbi-uapsi-mlad-haker-od-struga-sin-na-poznata-struzhanka. Accessed 22 September 2013
10 arrested in cyber-crime probe, Express UK, 13 December 2012. http://www.express.co.uk/news/world/364435/10-arrested-in-cyber-crime-probe. Accessed 24 March 2014
Maja, D., Bojan, D.: Perception of cyber crime in slovenia. J. Crim. Justice Secur. 12(4), 378–396 (2010)
Oklopčić, Z., Brestovec, B., Dalibor, S., Njavro, B.: IT solution for gas supply management in open gas market conditions. http://www.koncar-ket.hr/docs/koncarketHR/documents/158/1_0/Original.pdf. Accessed 17 April 2014
Kennedy, D., Besant-Jones, J.: World Bank Framework for Development of Regional Energy Trade in South East Europe, Energy and Mining Sector Board Discussion Paper, No.12, March 2004
Likmeta, B.: Al Qaeda Using Sical Media to find new Recruits, Global Post, 24 January 2014). http://www.globalpost.com/dispatch/news/regions/europe/140123/albania-isis-al-qaeda-social-media-europe. Accessed 22 April 2014
Albanian Jihadists Recruit Fighters for Syria on Facebook, BalkanInsight. http://www.balkaninsight.com/en/article/albanian-jihadist-use-internet-to-recruit-fighters. Accessed 15 January 2014
Theohary, C.A., Rollins, J.: Terrrorist Use of Internet: Information operations in Cyberspace, CRS Report, R41674 (2001)
Gerwehr, S., Daly, S.: Al-Qaida: terrorist selection and recruitment. In: Kamien, D., (ed.) The McGraw-Hill Homeland Security Handbook, McGraw-Hill. New York (2006)
European Commission, Expert Group on Violent Radicalisation, Radicalisation processes leading to acts of terrorism (2008). www.clingendael.nl/publications/2008/20080500_cscp_report_vries.pdf
Associated press, Kosovan Albanian admits killing two US airmen in Frankfurt terror attack. http://www.theguardian.com/world/2011/aug/31/kosovan-albanian-admits-killing-airmen. Accessed 31 August 2011
Tereshchenko, N.: Financing Terrorism: The European Nexus. In: Research Institute for European and American Studies, 25 March 2013. http://www.rieas.gr/research-areas/editorial/1939-financing-terrorism-the-european-nexus-.html. Accessed 23 April 2014
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Hadji-Janev, M., Bogdanoski, M. (2015). The Terrorist Threat to the Critical Information Infrastructure in South East Europe. In: Atanasovski, V., Leon-Garcia, A. (eds) Future Access Enablers for Ubiquitous and Intelligent Infrastructures. FABULOUS 2015. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 159. Springer, Cham. https://doi.org/10.1007/978-3-319-27072-2_24
Download citation
DOI: https://doi.org/10.1007/978-3-319-27072-2_24
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-27071-5
Online ISBN: 978-3-319-27072-2
eBook Packages: Computer ScienceComputer Science (R0)