Skip to Main Content
Cyber Operations
book

Cyber Operations

by Jerry M. Couretas
April 2024
Intermediate to advanced content levelIntermediate to advanced
320 pages
8h 58m
English
Wiley
Content preview from Cyber Operations

2ISIS and Web‐Based Insurgency

2.1 Introduction

In Chapter 1, we discussed the phased development of tactical and strategic operations on the Internet. These stages included

  • Stage I (late‐1990s to approximately 2010)(Communication)
    • Simple communication
    • Use of the Internet for proselytization and recruiting
  • Stage II (~2010–~2015) (Tactical)
    • Use of the Internet to achieve tactical effects (e.g., denial, crowd mobilization …)
  • Stage III (~2015 to Present)(Strategic)
    • Use of the Internet to provide strategic effects (e.g., influence election results)

Operations on the Internet began with hackers experimenting with new technology. Shortly after, however, Patriotic hacktivists used Internet technologies to act out, usually protesting a perceived slight.

Online networking grew as more people joined social media applications. This included the use of Facebook and Twitter for political activities (e.g., campaigning) and coordinating rallies. Trolls, and other bad actors, picked up on the use of social media to coordinate these rallies, including the pitting of hostile groups against one another to result in violence. Along with trolls, AQI, and then ISIS, used the Internet to raise funds, to recruit, and to command and control operations. In fact, ISIS was the first example of the use of the Internet to recruit, mobilize, and build a state on the Internet.

2.1.1 Terrorist Development of the Internet for Messaging

A recent “cyber” phenomenon is the non‐nation state, terrorist, ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Inside Cyber Warfare, 3rd Edition

Inside Cyber Warfare, 3rd Edition

Jeffrey Caruso
Cyber Threat Hunting

Cyber Threat Hunting

Nadhem AlFardan
Practical Cyber Intelligence

Practical Cyber Intelligence

Adam Tilmar Jakobsen

Publisher Resources

ISBN: 9781119712091Purchase Link