Araştırma Makalesi
BibTex RIS Kaynak Göster

Terör Örgütlerinin İnternet Kullanımı

Yıl 2019, Cilt: 1 Sayı: 2, 243 - 267, 31.12.2019

Öz

Terör örgütleri interneti birçok amaç için kullanmaktadır. Bunların başında, terör propagandası yapmak, insanları radikalleştirmek, internet aracılığı ile uzaklardaki insanlara ulaşarak yeni üyeler devşirmek, terör saldırılarında kullanılmak üzere çeşitli patlayıcıların evde yapımını kolaylaştırıcı nitelikte bilgi içeren materyalleri internet üzerinden üyelerine ulaştırmak ve terör örgütlerinin internet aracılığı ile finanse edilmesi gelmektedir. Bu makale, terör örgütlerinin interneti hangi amaçlarla ve nasıl kullandığını inceleyerek internetin teröristlerin amacını gerçekleştirmede ne ölçüde etkili bir araç olduğunu tartışmayı amaçlamaktadır

Kaynakça

  • Aly, Anne, Stuart Macdonald, Lee Jarvis, and Thomas M. Chen. “Introduction to the Special Issue: Terrorist Online Propaganda and Radicalization.” Studies in Conflict & Terrorism 40, no. 1 (2017): 1–9. https://doi.org/10.1080/1057610X.2016.1157402.
  • Awan, Akil N. “The Virtual Jihad: An Increasingly Legitimate Form of Warfare.” CTC Sentinel 3, no. 5 (2010): 10-13.
  • BBC News. “Islamic terrorist propaganda student Mohammed Gul jailed.” Accessed March 25, 2019. http://www.bbc.co.uk/news/uk-england-london-12576973.
  • BBC News. “Texas Walmart Shooting: El Paso Attack ‘Domestic Terrorism’.” Accessed September 12, 2019. https://www.bbc.co.uk/news/world-us-canada-49226573.
  • BBC News. “What is 8chan?.” Accessed October 01, 2019. https://www.bbc.co.uk/news/blogs-trending-49233767.
  • Benson, David C. “Why the Internet Is Not Increasing Terrorism.” Security Studies 23, no. 2, (2014):293–328.
  • Conway, Maura and Joseph Dillon. “Future Trends: Live-Streaming Terrorist Attacks?.” VOX-Pol. Accessed October 8, 2019. https://www.voxpol.eu/download/vox-pol_publication/Live-streaming_FINAL.pdf.
  • Conway, Maura. “Terrorism and the Internet: New Media - New Threat?.” Parliamentary Affairs 59, no. 2 (2006): 283–298.
  • Cowan, Jill. “What to Know About the Poway Synagogue Shooting.” The New York Times. Accessed September 12, 2019. https://www.nytimes.com/2019/04/29/us/synagogue-shooting.html.
  • Cox, Kate, William Marcellino, Jacopo Bellasio, Antonia Ward, Katerina Galai, Sofia Meranto, and Giacomo Persi Paoli. Social Media in Africa: A Double-edged Sword for Security and Development. UNDP, 2018. https://www.undp.org/content/dam/rba/docs/Reports/UNDP-RAND-Social-Media-Africa-Research-Report_final_3%20Oct.pdf.
  • Davis, Benjamin R. “Ending the Cyber Jihad: Combating Terrorist Exploitation of the Internet with the Rule of Law and Improved Tools for Cyber Governance.” Commlaw Conspectus 15, no. 1 (2006): 119-135.
  • Denning, Dorothy E. “Cyberterrorism: Testimony before the Special Oversight Panel on Terrorism Committee on Armed Services US House of Representatives.” May 23, 2000. https://faculty.nps.edu/dedennin/publications/Testimony-Cyberterrorism2000.htm.
  • Dutton, William H., Grant Blank, and Darja Groselj. “Cultures of the Internet: The Internet in Britain, Oxford Internet Survey 2013 Report.” Oxford Internet Surveys. Accessed September 24, 2019. http://oxis.oii.ox.ac.uk/wp-content/uploads/2014/11/OxIS-2013.pdf.
  • Edwards, Charlie and Luke Gribbon. “Pathways to Violent Extremism in the Digital Era.” The RUSI Journal 158, no. 5 (2013): 40–47.
  • Evans, Robert. “Ignore The Poway Synagogue Shooter’s Manifesto: Pay Attention To 8chan’s /pol/ Board.” Bellingcat. Accessed October 01, 2019. https://www.bellingcat.com/news/americas/2019/04/28/ignore-the-poway-synagogue-shooters-manifesto-pay-attention-to-8chans-pol-board/.
  • Fisher-Birch, Joshua. “Users of 8chan’s /Pol Board Move to Other Websites.” Counter Extremism Project. Accessed September 10, 2019. https://www.counterextremism.com/blog/users-8chan%E2%80%99s-pol-board-move-other-websites.
  • Frieburger, Tina and Jeffrey S. Crane. “A Systematic Explanation of Terrorist Use of the Internet.” International Journal of Cyber Criminology 2, no. 1 (2008): 309-319.
  • Gill Paul, Emily Corner, Maura Conway, Amy Thornton, Mia Bloom, and John Horgan. “Terrorist Use of the Internet by the Numbers: Quantifying Behaviors, Patterns, and Processes.” Criminology & Public Policy 16, no. 1 (2017): 99-117. https://doi.org/10.1111/1745-9133.12249.
  • Gilsinan, Kathy. “How White-Supremacist Violence Echoes Other Forms of Terrorism.” The Atlantic. Accessed October 1, 2019. https://www.theatlantic.com/international/archive/2019/03/violence-new-zealand-echoes-past-terrorist-patterns/585043/.
  • Holbrook, Donald. “A Critical Analysis of the Role of the Internet in the Preparation and Planning of Acts of Terrorism.” Dynamics of Asymmetric Conflict 8, no. 2 (2015): 121–133.
  • Holt, Tom, Joshua D. Freilich, Steven Chermak, and Clark McCauley. “Political Radicalization on the Internet: Extremist Content, Government Control, and the Power of Victim and Jihad Videos.” Dynamics of Asymmetric Conflict 8, no. 2 (2015): 107–120.
  • Hurriyet Daily News. “AKP Warns on PKK Activities on Internet.” Accessed September 14, 2019. http://www.hurriyetdailynews.com/akp-warns-on-pkk-activities-on-internet-37572.
  • Jacobson, Michael. “Terrorist Financing on the Internet.” CTC Sentinel 2, no. 6 (2009): 17-20.
  • Janbek, Dana and Valerie Williams. “The Role of the Internet Post-9/11 in Terrorism and Counterterrorism.” Brown Journal of World Affair 20, no. 2 (2014): 297–309.
  • Jarvis, Lee and Stuart Macdonald. “What Is Cyberterrorism? Findings from a Survey of Researchers.” Terrorism and Political Violence 27, no. 4, (2015): 657-678. https://doi.org/10.1080/09546553.2013.847827.
  • Jarvis, Lee, Stuart Macdonald, and Andrew Whiting. “Unpacking Cyberterrorism Discourse: Specificity, Status, and Scale in News Media Constructions of Threat.” European Journal of International Security 2, no. 1 (2017): 64-87. https://doi.org/10.1017/eis.2016.14.
  • Keatinge, Tom and Florence Keen. Social Media and Terrorist Financing: What are the Vulnerabilities and how Could Public and Private Sectors Collaborate Better?. Royal United Services Institute for Defence and Security Studies, 2019. https://rusi.org/sites/default/files/20190802_grntt_paper_10.pdf.
  • Keene Shima D. “Terrorism and the Internet: A Double‐edged Sword.” Journal of Money Laundering Control 14, no. 4 (2011): 359–370.
  • Kenney, Michael. “Beyond the Internet: Mētis, Techne, and the Limitations of Online Artifacts for Islamist Terrorists.” Terrorism and Political Violence 22, no. 2 (2010): 177–197.
  • Klausen, Jytte. “Tweeting the Jihad: Social Media Networks of Western Foreign Fighters in Syria and Iraq.” Studies in Conflict & Terrorism 38, no. 1 (2015): 1-22.
  • Macdonald, Stuart and David Mair. “Terrorism Online: A New Strategic Environment.” in Terrorism Online: Politics, Law and Technology, edited by Lee Jarvis, Stuart MacDonald, and Thomas M. Chen, 10-34. Abingdon: Routledge, 2015.
  • Mair, David. “#Westgate: A Case Study: How al-Shabaab used Twitter during an Ongoing Attack.” Studies in Conflict & Terrorism 40, no. 1 (2017): 24-43. https://doi.org/10.1080/1057610X.2016.1157404.
  • Netherlands: General Intelligence and Security Service (AIVD). Jihadism on the Web: A Breeding Ground for Jihad in the Modern Age. The Hague, 2012.
  • Pantucci, Raffaello. “A Typology of Lone Wolves: Preliminary Analysis of Lone Islamist Terrorists.” Developments in Radicalisation and Political Violence, International Centre for the Study of Radicalisation and Political Violence (ICSR) (2011): 1–39.
  • Peterson, Jillian and James Densley. “Op-Ed: We have Studied every Mass Shooting since 1966. Here’s what we’ve Learned about the Shooters.” Los Angeles Times. Accessed September 22, 2019. https://www.latimes.com/opinion/story/2019-08-04/el-paso-dayton-gilroy-mass-shooters-data.
  • Ramsay, Gilbert. “Relocating the Virtual War.” Defence against Terrorism Review 2, no. 1 (2009): 31-50.
  • Rudner, Martin. “‘Electronic Jihad’: The Internet as Al-Qaeda’s Catalyst for Global Terror.” Studies in Conflict & Terrorism 40, no. 1 (2017): 10-23.
  • Sageman, Marc. Leaderless Jihad: Terror Networks in the Twenty-First Century. Philadelphia: University of Pennsylvania Press, 2008.
  • Saymaz, İsmail. “ByLock use is an evidence of Gülen network links: Owner.” Hurriyet Daily News. Accessed September 3, 2019. http://www.hurriyetdailynews.com/bylock-use-is-an-evidence-of-gulen-network-links-owner-105284.
  • Siegel, Rachel. “8chan Is Back Online, This Time as 8kun.” The Washington Post. Accessed November 18, 2019. https://www.washingtonpost.com/technology/2019/11/04/chan-is-back-online-this-time-kun/.
  • Spaaij, Ramón. “The Enigma of Lone Wolf Terrorism: An Assessment.” Studies in Conflict & Terrorism 33, no. 9 (2010): 854–870.
  • Stanley-Becker, Isaac, Eli Rosenberg, Alex Horton, and Michael Brice-Saddler. “Primary Suspect, One Alleged Accomplice Identified in Terrorist Attack That Killed 49 in New Zealand.” The Washington Post. Accessed May 10, 2019. https://www.washingtonpost.com/nation/2019/03/15/shootings-reported-mosques-christchurch-new-zealand/.
  • Statista. “Number of social Media users worldwide from 2010 to 2021 (in billions).” Accessed March 20, 2019. https://www.statista.com/statistics/278414/number-of-worldwide-social-network-users.
  • Stenersen, Anne. “The Internet: A Virtual Training Camp?.” Terrorism and Political Violence 20, no. 2 (2008): 215–233.
  • The Telegraph. “Al-Qaeda urges followers to bomb the Savoy.” Accessed September 29, 2019. http://www.telegraph.co.uk/news/worldnews/al-qaeda/10704708/Al-Qaeda-urges-followers-to-bomb-the-Savoy.html.
  • The Telegraph. “Terrorists use Google maps to hit UK troops.” Accessed September 15, 2019. http://www.telegraph.co.uk/news/worldnews/1539401/Terrorists-use-Google-maps-to-hit-UK-troops.html.
  • The United States Department of Justice: Office of Public Affairs. “Charges Unsealed Against Five Alleged Members of Al-Qaeda Plot to Attack the United States and United Kingdom.” The United States Department of Justice. Accessed September 28, 2019. https://www.justice.gov/opa/pr/charges-unsealed-against-five-alleged-members-al-qaeda-plot-attack-united-states-and-united.
  • The World Bank. “Individuals using the Internet (% of population).” Accessed September 20, 2019. https://data.worldbank.org/indicator/IT.NET.USER.ZS?end=2017&start=1960&view=chart.
  • United Nations Office on Drugs and Crime. The Use of the Internet for Terrorist Purposes. UNODC, 2012. https://www.unodc.org/documents/frontpage/Use_of_Internet_for_Terrorist_Purposes.pdf.
  • Vidino, Lorenzo. “The Evolution of Jihadism in Italy: Rise in Homegrown Radicals.” CTC Sentinel 6, no. 11 (2013): 17-20.
  • Weimann, Gabriel. “www.terror.net - How Modern Terrorism Uses the Internet.” USIP Special Report, no. 116 (2004): 1–12.
  • Weimann, Gabriel. “Lone Wolves in Cyberspace.” Journal of Terrorism Research 3, no. 2 (2012): 75–90.
  • Weimann, Gabriel. Terror on the Internet: The New Arena, the New Challenges. Washington, D.C.: United States Institute of Peace, 2006.
  • Wong, Julia Carrie. “8chan: the far-right website linked to the rise in hate crimes.” The Guardian. Accessed October 01, 2019. https://www.theguardian.com/technology/2019/aug/04/mass-shootings-el-paso-texas-dayton-ohio-8chan-far-right-website.

TERRORIST USE OF THE INTERNET

Yıl 2019, Cilt: 1 Sayı: 2, 243 - 267, 31.12.2019

Öz

This paper offers a brief overview of how and for what purposes the Internet is utilised by terrorists, and discusses whether it plays a vital role for today’s terrorist organisations. For this aim, the paper examines how terrorists use the Internet for the purposes of disseminating their propaganda, of achieving the radicalisation of
people and the recruitment of new supporters, and of providing online training for their supporters to carry out terrorist attacks as well as terrorist financing. It argues that the Internet is very important for today’s terrorist groups for a variety of reasons.

Kaynakça

  • Aly, Anne, Stuart Macdonald, Lee Jarvis, and Thomas M. Chen. “Introduction to the Special Issue: Terrorist Online Propaganda and Radicalization.” Studies in Conflict & Terrorism 40, no. 1 (2017): 1–9. https://doi.org/10.1080/1057610X.2016.1157402.
  • Awan, Akil N. “The Virtual Jihad: An Increasingly Legitimate Form of Warfare.” CTC Sentinel 3, no. 5 (2010): 10-13.
  • BBC News. “Islamic terrorist propaganda student Mohammed Gul jailed.” Accessed March 25, 2019. http://www.bbc.co.uk/news/uk-england-london-12576973.
  • BBC News. “Texas Walmart Shooting: El Paso Attack ‘Domestic Terrorism’.” Accessed September 12, 2019. https://www.bbc.co.uk/news/world-us-canada-49226573.
  • BBC News. “What is 8chan?.” Accessed October 01, 2019. https://www.bbc.co.uk/news/blogs-trending-49233767.
  • Benson, David C. “Why the Internet Is Not Increasing Terrorism.” Security Studies 23, no. 2, (2014):293–328.
  • Conway, Maura and Joseph Dillon. “Future Trends: Live-Streaming Terrorist Attacks?.” VOX-Pol. Accessed October 8, 2019. https://www.voxpol.eu/download/vox-pol_publication/Live-streaming_FINAL.pdf.
  • Conway, Maura. “Terrorism and the Internet: New Media - New Threat?.” Parliamentary Affairs 59, no. 2 (2006): 283–298.
  • Cowan, Jill. “What to Know About the Poway Synagogue Shooting.” The New York Times. Accessed September 12, 2019. https://www.nytimes.com/2019/04/29/us/synagogue-shooting.html.
  • Cox, Kate, William Marcellino, Jacopo Bellasio, Antonia Ward, Katerina Galai, Sofia Meranto, and Giacomo Persi Paoli. Social Media in Africa: A Double-edged Sword for Security and Development. UNDP, 2018. https://www.undp.org/content/dam/rba/docs/Reports/UNDP-RAND-Social-Media-Africa-Research-Report_final_3%20Oct.pdf.
  • Davis, Benjamin R. “Ending the Cyber Jihad: Combating Terrorist Exploitation of the Internet with the Rule of Law and Improved Tools for Cyber Governance.” Commlaw Conspectus 15, no. 1 (2006): 119-135.
  • Denning, Dorothy E. “Cyberterrorism: Testimony before the Special Oversight Panel on Terrorism Committee on Armed Services US House of Representatives.” May 23, 2000. https://faculty.nps.edu/dedennin/publications/Testimony-Cyberterrorism2000.htm.
  • Dutton, William H., Grant Blank, and Darja Groselj. “Cultures of the Internet: The Internet in Britain, Oxford Internet Survey 2013 Report.” Oxford Internet Surveys. Accessed September 24, 2019. http://oxis.oii.ox.ac.uk/wp-content/uploads/2014/11/OxIS-2013.pdf.
  • Edwards, Charlie and Luke Gribbon. “Pathways to Violent Extremism in the Digital Era.” The RUSI Journal 158, no. 5 (2013): 40–47.
  • Evans, Robert. “Ignore The Poway Synagogue Shooter’s Manifesto: Pay Attention To 8chan’s /pol/ Board.” Bellingcat. Accessed October 01, 2019. https://www.bellingcat.com/news/americas/2019/04/28/ignore-the-poway-synagogue-shooters-manifesto-pay-attention-to-8chans-pol-board/.
  • Fisher-Birch, Joshua. “Users of 8chan’s /Pol Board Move to Other Websites.” Counter Extremism Project. Accessed September 10, 2019. https://www.counterextremism.com/blog/users-8chan%E2%80%99s-pol-board-move-other-websites.
  • Frieburger, Tina and Jeffrey S. Crane. “A Systematic Explanation of Terrorist Use of the Internet.” International Journal of Cyber Criminology 2, no. 1 (2008): 309-319.
  • Gill Paul, Emily Corner, Maura Conway, Amy Thornton, Mia Bloom, and John Horgan. “Terrorist Use of the Internet by the Numbers: Quantifying Behaviors, Patterns, and Processes.” Criminology & Public Policy 16, no. 1 (2017): 99-117. https://doi.org/10.1111/1745-9133.12249.
  • Gilsinan, Kathy. “How White-Supremacist Violence Echoes Other Forms of Terrorism.” The Atlantic. Accessed October 1, 2019. https://www.theatlantic.com/international/archive/2019/03/violence-new-zealand-echoes-past-terrorist-patterns/585043/.
  • Holbrook, Donald. “A Critical Analysis of the Role of the Internet in the Preparation and Planning of Acts of Terrorism.” Dynamics of Asymmetric Conflict 8, no. 2 (2015): 121–133.
  • Holt, Tom, Joshua D. Freilich, Steven Chermak, and Clark McCauley. “Political Radicalization on the Internet: Extremist Content, Government Control, and the Power of Victim and Jihad Videos.” Dynamics of Asymmetric Conflict 8, no. 2 (2015): 107–120.
  • Hurriyet Daily News. “AKP Warns on PKK Activities on Internet.” Accessed September 14, 2019. http://www.hurriyetdailynews.com/akp-warns-on-pkk-activities-on-internet-37572.
  • Jacobson, Michael. “Terrorist Financing on the Internet.” CTC Sentinel 2, no. 6 (2009): 17-20.
  • Janbek, Dana and Valerie Williams. “The Role of the Internet Post-9/11 in Terrorism and Counterterrorism.” Brown Journal of World Affair 20, no. 2 (2014): 297–309.
  • Jarvis, Lee and Stuart Macdonald. “What Is Cyberterrorism? Findings from a Survey of Researchers.” Terrorism and Political Violence 27, no. 4, (2015): 657-678. https://doi.org/10.1080/09546553.2013.847827.
  • Jarvis, Lee, Stuart Macdonald, and Andrew Whiting. “Unpacking Cyberterrorism Discourse: Specificity, Status, and Scale in News Media Constructions of Threat.” European Journal of International Security 2, no. 1 (2017): 64-87. https://doi.org/10.1017/eis.2016.14.
  • Keatinge, Tom and Florence Keen. Social Media and Terrorist Financing: What are the Vulnerabilities and how Could Public and Private Sectors Collaborate Better?. Royal United Services Institute for Defence and Security Studies, 2019. https://rusi.org/sites/default/files/20190802_grntt_paper_10.pdf.
  • Keene Shima D. “Terrorism and the Internet: A Double‐edged Sword.” Journal of Money Laundering Control 14, no. 4 (2011): 359–370.
  • Kenney, Michael. “Beyond the Internet: Mētis, Techne, and the Limitations of Online Artifacts for Islamist Terrorists.” Terrorism and Political Violence 22, no. 2 (2010): 177–197.
  • Klausen, Jytte. “Tweeting the Jihad: Social Media Networks of Western Foreign Fighters in Syria and Iraq.” Studies in Conflict & Terrorism 38, no. 1 (2015): 1-22.
  • Macdonald, Stuart and David Mair. “Terrorism Online: A New Strategic Environment.” in Terrorism Online: Politics, Law and Technology, edited by Lee Jarvis, Stuart MacDonald, and Thomas M. Chen, 10-34. Abingdon: Routledge, 2015.
  • Mair, David. “#Westgate: A Case Study: How al-Shabaab used Twitter during an Ongoing Attack.” Studies in Conflict & Terrorism 40, no. 1 (2017): 24-43. https://doi.org/10.1080/1057610X.2016.1157404.
  • Netherlands: General Intelligence and Security Service (AIVD). Jihadism on the Web: A Breeding Ground for Jihad in the Modern Age. The Hague, 2012.
  • Pantucci, Raffaello. “A Typology of Lone Wolves: Preliminary Analysis of Lone Islamist Terrorists.” Developments in Radicalisation and Political Violence, International Centre for the Study of Radicalisation and Political Violence (ICSR) (2011): 1–39.
  • Peterson, Jillian and James Densley. “Op-Ed: We have Studied every Mass Shooting since 1966. Here’s what we’ve Learned about the Shooters.” Los Angeles Times. Accessed September 22, 2019. https://www.latimes.com/opinion/story/2019-08-04/el-paso-dayton-gilroy-mass-shooters-data.
  • Ramsay, Gilbert. “Relocating the Virtual War.” Defence against Terrorism Review 2, no. 1 (2009): 31-50.
  • Rudner, Martin. “‘Electronic Jihad’: The Internet as Al-Qaeda’s Catalyst for Global Terror.” Studies in Conflict & Terrorism 40, no. 1 (2017): 10-23.
  • Sageman, Marc. Leaderless Jihad: Terror Networks in the Twenty-First Century. Philadelphia: University of Pennsylvania Press, 2008.
  • Saymaz, İsmail. “ByLock use is an evidence of Gülen network links: Owner.” Hurriyet Daily News. Accessed September 3, 2019. http://www.hurriyetdailynews.com/bylock-use-is-an-evidence-of-gulen-network-links-owner-105284.
  • Siegel, Rachel. “8chan Is Back Online, This Time as 8kun.” The Washington Post. Accessed November 18, 2019. https://www.washingtonpost.com/technology/2019/11/04/chan-is-back-online-this-time-kun/.
  • Spaaij, Ramón. “The Enigma of Lone Wolf Terrorism: An Assessment.” Studies in Conflict & Terrorism 33, no. 9 (2010): 854–870.
  • Stanley-Becker, Isaac, Eli Rosenberg, Alex Horton, and Michael Brice-Saddler. “Primary Suspect, One Alleged Accomplice Identified in Terrorist Attack That Killed 49 in New Zealand.” The Washington Post. Accessed May 10, 2019. https://www.washingtonpost.com/nation/2019/03/15/shootings-reported-mosques-christchurch-new-zealand/.
  • Statista. “Number of social Media users worldwide from 2010 to 2021 (in billions).” Accessed March 20, 2019. https://www.statista.com/statistics/278414/number-of-worldwide-social-network-users.
  • Stenersen, Anne. “The Internet: A Virtual Training Camp?.” Terrorism and Political Violence 20, no. 2 (2008): 215–233.
  • The Telegraph. “Al-Qaeda urges followers to bomb the Savoy.” Accessed September 29, 2019. http://www.telegraph.co.uk/news/worldnews/al-qaeda/10704708/Al-Qaeda-urges-followers-to-bomb-the-Savoy.html.
  • The Telegraph. “Terrorists use Google maps to hit UK troops.” Accessed September 15, 2019. http://www.telegraph.co.uk/news/worldnews/1539401/Terrorists-use-Google-maps-to-hit-UK-troops.html.
  • The United States Department of Justice: Office of Public Affairs. “Charges Unsealed Against Five Alleged Members of Al-Qaeda Plot to Attack the United States and United Kingdom.” The United States Department of Justice. Accessed September 28, 2019. https://www.justice.gov/opa/pr/charges-unsealed-against-five-alleged-members-al-qaeda-plot-attack-united-states-and-united.
  • The World Bank. “Individuals using the Internet (% of population).” Accessed September 20, 2019. https://data.worldbank.org/indicator/IT.NET.USER.ZS?end=2017&start=1960&view=chart.
  • United Nations Office on Drugs and Crime. The Use of the Internet for Terrorist Purposes. UNODC, 2012. https://www.unodc.org/documents/frontpage/Use_of_Internet_for_Terrorist_Purposes.pdf.
  • Vidino, Lorenzo. “The Evolution of Jihadism in Italy: Rise in Homegrown Radicals.” CTC Sentinel 6, no. 11 (2013): 17-20.
  • Weimann, Gabriel. “www.terror.net - How Modern Terrorism Uses the Internet.” USIP Special Report, no. 116 (2004): 1–12.
  • Weimann, Gabriel. “Lone Wolves in Cyberspace.” Journal of Terrorism Research 3, no. 2 (2012): 75–90.
  • Weimann, Gabriel. Terror on the Internet: The New Arena, the New Challenges. Washington, D.C.: United States Institute of Peace, 2006.
  • Wong, Julia Carrie. “8chan: the far-right website linked to the rise in hate crimes.” The Guardian. Accessed October 01, 2019. https://www.theguardian.com/technology/2019/aug/04/mass-shootings-el-paso-texas-dayton-ohio-8chan-far-right-website.
Toplam 54 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Konular Hukuk
Bölüm Araştırma Makaleleri
Yazarlar

Ergül Çeliksoy Bu kişi benim 0000-0003-2980-710X

Smith Ouma Bu kişi benim 0000-0002-0469-333X

Yayımlanma Tarihi 31 Aralık 2019
Kabul Tarihi 16 Aralık 2019
Yayımlandığı Sayı Yıl 2019 Cilt: 1 Sayı: 2

Kaynak Göster

Chicago Çeliksoy, Ergül, ve Smith Ouma. “TERRORIST USE OF THE INTERNET”. Bilişim Hukuku Dergisi 1, sy. 2 (Aralık 2019): 243-67.

23439

Bilişim Hukuku Dergisi Creative Commons Atıf-GayriTicari 4.0 Uluslararası Lisansı ile lisanslanmıştır.