Skip to main content

The Terrorist Threat to the Critical Information Infrastructure in South East Europe

  • Conference paper
  • First Online:
Future Access Enablers for Ubiquitous and Intelligent Infrastructures (FABULOUS 2015)

Abstract

The rise of ICT (Information and Communication Technologies) in the age of globalization significantly affects SEE (South Eastern European) security. Although these technologies help the region of SEE to become more interconnected, interrelated and thus, boost the SEE countries’ commodity, prosperity and competitiveness put in security context, these technologies have increased unpredictability, complexity and the threats to the SEE security. In this line, as to the rest of the world, modern terrorism represents an inevitable burden of the SEE governments’ security. Today, it is more than clear that modern terrorist groups and individuals exploit cyberspace to achieve strategic advantage against the mightier enemies. Therefore, based on the recent experience the article explains how and in which way terrorist use of a cyberspace could affect CII (critical information infrastructure) in the region of SEE. Giving the specific dynamics in the region, article first explains how terrorists’ use of modern ICT and cyberspace serves to accomplish their strategic agenda. Then it explains how terrorist could affect CIIs in the region of SEE and thus affect the overall SEE regions’ security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    See the following sites for example: Websites such as the “Way of the Believer” (putvjernika.com), Way of Islam” (stazomislama.com), Ensarije Serijata (“Partisans of Sharia” http://www.geocities.ws/ensarije_seriata/index-2.html), and “News of the Community” (vijestiummeta.com), and the Sandžak Wahhabi website kelimetul-haqq.org.

References

  1. Bogdanoski, M., Petreski, D.: Cyber terrorism-global security threat. Contemp. Maced. Defense-Int. Sci. Defense, Secur. Peace J. 13(24), 59–73 (2013)

    Google Scholar 

  2. The United Nations Office on Drugs and Crime, The Use of the Internet for Terrorist Purposes, The United Nations New York (2012)

    Google Scholar 

  3. Rollins, J.: Al Qaeda and Affiliates: Historical Perspective, Global Presence, and Implications for U.S. Policy, CRS Report R41070 (2011)

    Google Scholar 

  4. Weimann, G.: How modern terrorism uses the Internet. United states institute of peace. Accessed 22 March 2015 (2004). http://www.terror.net, http://www.usip.org/pubs/specialreports/sr116.pdf

  5. House of Commons Intelligence and Security Committee. Report into the London Terrorist Attacks on 7 July 2005, May 2006

    Google Scholar 

  6. Sipress, A.: An Indonesian’s Prison Memoir Takes Holy War into Cyberspace. Washington Post, New York (2004). http://www.washingtonpost.com/wp-dyn/articles/A62095-2004Dec13.html. Accessed 14 December 2004

    Google Scholar 

  7. Krebs, B.: Three Worked the Web to Help Terrorists, p. D01. Washington Post, New York (2007)

    Google Scholar 

  8. Aaronson, M., Diessen, A., de Kermabon, Y., Long, M.B., Miklaucic, M.: NATO countering the hybrid threat. Prism 2(4), 111–124 (2012)

    Google Scholar 

  9. Amaruso, J.: Romania Global Center for Cyber Crime in USA, USA Toaday, 14 January 2014. http://guardianlv.com/2014/01/romania-global-center-for-cybercrime-in-u-s/. Accessed 22 March 2014

  10. FBI Arrested Young Hacker from Struga, Press 24, November 20 2012. http://star.press24.mk/story/poznato/foto-fbi-uapsi-mlad-haker-od-struga-sin-na-poznata-struzhanka. Accessed 22 September 2013

  11. 10 arrested in cyber-crime probe, Express UK, 13 December 2012. http://www.express.co.uk/news/world/364435/10-arrested-in-cyber-crime-probe. Accessed 24 March 2014

  12. Maja, D., Bojan, D.: Perception of cyber crime in slovenia. J. Crim. Justice Secur. 12(4), 378–396 (2010)

    Google Scholar 

  13. Oklopčić, Z., Brestovec, B., Dalibor, S., Njavro, B.: IT solution for gas supply management in open gas market conditions. http://www.koncar-ket.hr/docs/koncarketHR/documents/158/1_0/Original.pdf. Accessed 17 April 2014

  14. Kennedy, D., Besant-Jones, J.: World Bank Framework for Development of Regional Energy Trade in South East Europe, Energy and Mining Sector Board Discussion Paper, No.12, March 2004

    Google Scholar 

  15. Likmeta, B.: Al Qaeda Using Sical Media to find new Recruits, Global Post, 24 January 2014). http://www.globalpost.com/dispatch/news/regions/europe/140123/albania-isis-al-qaeda-social-media-europe. Accessed 22 April 2014

  16. Albanian Jihadists Recruit Fighters for Syria on Facebook, BalkanInsight. http://www.balkaninsight.com/en/article/albanian-jihadist-use-internet-to-recruit-fighters. Accessed 15 January 2014

  17. Theohary, C.A., Rollins, J.: Terrrorist Use of Internet: Information operations in Cyberspace, CRS Report, R41674 (2001)

    Google Scholar 

  18. Gerwehr, S., Daly, S.: Al-Qaida: terrorist selection and recruitment. In: Kamien, D., (ed.) The McGraw-Hill Homeland Security Handbook, McGraw-Hill. New York (2006)

    Google Scholar 

  19. European Commission, Expert Group on Violent Radicalisation, Radicalisation processes leading to acts of terrorism (2008). www.clingendael.nl/publications/2008/20080500_cscp_report_vries.pdf

  20. Associated press, Kosovan Albanian admits killing two US airmen in Frankfurt terror attack. http://www.theguardian.com/world/2011/aug/31/kosovan-albanian-admits-killing-airmen. Accessed 31 August 2011

  21. Tereshchenko, N.: Financing Terrorism: The European Nexus. In: Research Institute for European and American Studies, 25 March 2013. http://www.rieas.gr/research-areas/editorial/1939-financing-terrorism-the-european-nexus-.html. Accessed 23 April 2014

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Metodi Hadji-Janev .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Hadji-Janev, M., Bogdanoski, M. (2015). The Terrorist Threat to the Critical Information Infrastructure in South East Europe. In: Atanasovski, V., Leon-Garcia, A. (eds) Future Access Enablers for Ubiquitous and Intelligent Infrastructures. FABULOUS 2015. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 159. Springer, Cham. https://doi.org/10.1007/978-3-319-27072-2_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-27072-2_24

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-27071-5

  • Online ISBN: 978-3-319-27072-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics