This is an outdated version published on 2024-07-01. Read the most recent version.

Cyberterrorism in Africa – Is This the Real Life, Is This Just Fantasy?

Authors

  • Alta Grobbelaar University of Free State, Bloemfontein, South Africa

DOI:

https://doi.org/10.59569/jceeas.2023.3.4.197

Keywords:

African security, cybersecurity, cyberterrorism, cyberthreats, terrorism

Abstract

This paper seeks to examine the relevance of the term ‘cyberterrorism’ within African spaces. Although the notion of cyberterrorism as a concept is contested by scholars such as Jason Burke and Marc Sageman, the application of the concept in an African context raises a number of concerns. Firstly, rather than focusing on the semantic and conceptual issues only, more attention should be paid to the material implications of such discourses for people and states on the continent who are on the receiving end of such conceptualisation. Discourses regarding fear are always very complex and shape the way in which reality is perceived, understood and how hegemonic power-relations are formed within certain contexts. Secondly, these discourses reflect a Eurocentric bias, because, as visible in the definition used and accepted by US defence analysts, cyberterrorism would refer to “Unlawful attacks and threats of attack against computers, networks, and the information stored therein when done to intimidate or coerce a government or its people in furtherance of political or social objectives.”. These types of discourses are largely state-centric or government-centric, created to operate in spheres where effective governance varies from what is accepted as such on the African continent. While connectivity and globalization are becoming increasingly important for Africa as a whole, it begs the question whether the term is not more appropriate for highly globalized, technologically advanced contexts of the global North. In contrast with countries in the global North, African countries’ limited use and penetration of information technology thus underline the need for a critical (re)examination of the discourses relating to cyberterrorism in the African context. What needs to be established is whether cyberthreats, specifically cyberterrorism, pose a real threat on the continent, or whether the concept has become a platitude or blanket term to describe any form of information-based hostility. The paper questions the application of concepts such as cyberthreats, cyberterrorism and cybersecurity in African-centered approaches.

References

African Union. (2014) African Union Convention on Cyber Security and Personal Data Protection. Available at https://au.int/sites/default/files/treaties/29560-treaty-0048_-_african_union_convention_on_cyber_security_and_personal_data_protection_e.pdf (Accessed: 28 May 2024)

Al Jazeera Staff (2016) ‘Q&A: Boko Haram’s Changing Tactics’, Al Jazeera, 11 February. Available at https://www.aljazeera.com/news/2016/02/qa-boko-haram-changing-tactics-160211045508486.html (Accessed: 28 May 2024)

Allen, K. (2022) ‘Weaponised Drones - the Latest Tech Threat to Reach Africa’, Institute for Security Studies, 11 October. Available at https://issafrica.org/iss-today/weaponised-drones-the-latest-tech-threat-to-reach-africa (Accessed: 28 May 2024)

Aly, A., Macdonald, S., Jarvis, L., and Chen, T. M. (2017) ‘Introduction to the Special Issue: Terrorist Online Propaganda and Radicalization’, Studies in Conflict & Terrorism, 40(1), pp. 1–9. DOI: https://doi.org/10.1080/1057610X.2016.1157402, ISSN 1057-610X

Archetti, C. (2015) Terrorism, Communication and New Media: Explaining Radicalization in the Digital Age. Perspectives on Terrorism, 9(1), pp. 49–59. ISSN 2334-3745

Baken, D., and Mantzikos, I. (2012) ‘The Cyber Terrorism Shadow Networks in Africa: AQIM and Boko Haram’, African Renaissance, 21(1), pp. 27-45. ISSN 1744-2532. Available at https://journals.co.za/content/aa_afren/9/1/EJC120521 (Accessed: 28 May 2024)

Chiluwa, I. (2012) ‘Social Media Networks and the Discourse of Resistance: A Sociolinguistic CDA of Biafra Online Discourses’, Discourse & Society, 23(3), pp. 217-244. DOI: https://doi.org/10.1177/0957926511433478, ISSN 0957-9265

Chiluwa, I. (2015) ‘Radicalist Discourse: A Study of the Stances of Nigeria’s Boko Haram and Somalia’s Al Shabaab on Twitter’, Journal of Multicultural Discourses, 10(2), pp. 214–235. https://doi.org/10.1080/17447143.2015.1041964, ISSN 1744-7143

Cohen, D. (2014) ‘Cyber Terrorism: Case studies’, in Akhgar, B., Staniforth, A. and Bosco, F. (eds.) Cyber Crime and Cyber Terrorism Investigator’s Handbook. Amsterdam, Boston, Heidelberg, London, New York, Oxford, Paris, San Diego, San Francisco, Singapore, Sydney, Tokyo: Elsevier, pp. 165–174. https://doi.org/10.1016/B978-0-12-800743-3.00013-X, ISBN 978-0-128-00811-9

Collin, B. (1996) ‘The Future of Cyberterrorism: Where the Physical and Virtual Worlds Converge’, Crime and Justice International, 13(2), pp. 15–18. ISSN 1096-8733

Conway, M. (2006) ‘Terrorism and the Internet: New Media—New Threat?’, Parliamentary Affairs, 59(2), pp. 283-298. DOI: https://doi.org/10.1093/pa/gsl009, ISSN 0031-2290

CSIS (2023) Significant Cyber Incidents. Centre for Strategic & International Studies. Available at https://csis-website-prod.s3.amazonaws.com/s3fs-public/2024-05/240515_Significant_Cyber_Events.pdf?VersionId=sdxfmetL1DY5GCan1EYIp2vTwsyrgjZw (Accessed: 28 May 2024)

Denning, D. E. (2006) ‘A View of Cyberterrorism Five Years Later’, in Himma, K. (ed.), Readings in Internet Security: Hacking, Counterhacking, and Society. Boston: Jones and Bartlett Publishers, pp. 1-18. ISBN 978-0-763-73536-4. Available at https://apps.dtic.mil/sti/tr/pdf/ADA484928.pdf (Accessed: 28 May 2024)

Digiwatch Team (2019) ‘AU Calls for Cyber Monitoring to Combat Terrorism’, Digiwatch, 11 July. Available at https://dig.watch/updates/au-calls-cyber-monitoring-combat-terrorism (Accessed: 28 May 2024)

Fairclough, N. (2013) Critical Discourse Analysis: The Critical Study of Language. London: Routledge. DOI: https://doi.org/10.4324/9781315834368, ISBN 978-1-315-83436-8

Freeman, C. (2019) ‘Boko Haram Adopts “Hearts and Minds” Strategy in Nigeria – Inspired by Isil’, The Telegraph, 22 May. https://www.telegraph.co.uk/global-health/terror-and-security/boko-haram-adopts-hearts-minds-strategy-nigeria-inspired-isil/ (Accessed: 28 May 2024)

Futter, A. (2018) ‘“Cyber” Semantics: Why We Should Retire the Latest Buzzword in Security Studies’, Journal of Cyber Policy, 3(2), pp. 201–216. DOI: https://doi.org/10.1080/23738871.2018.1514417, ISSN 2373-8898

Ganor, B. (2002) Defining Terrorism: Is One Man’s Terrorist Another Man’s Freedom Fighter?’, Police Practice and Reseach, 3(4), pp. 287–304. DOI https://doi.org/10.1080/1561426022000032060, ISSN 1561-4263

Giroux, H. A. (2016) Beyond the Spectacle of Terrorism Global Uncertainty and the Challenge of the New Media. New York: Routledge. 1st Edition. Radical Imagination Series. DOI: https://doi.org/10.4324/9781315635804, ISBN 978-1-317-26313-5

Goodman, S. E., Kirk, J. C. and Kirk, M. H. (2007) ‘Cyberspace as a Medium for Terrorists’, Technological Forecasting and Social Change, 74(2), pp. 193–210. https://doi.org/10.1016/j.techfore.2006.07.007, ISSN 1873-5509

Gordon, S. and Ford, R. (2002) ‘On the Definition and Classification of Cybercrime’, Computers & Security, 21(7), pp. 636–647. https://doi.org/10.1016/S0167-4048(02)01116-1, ISSN 0167-4048

Gore, A. (2004) ‘The Politics of Fear’, Social Research, 71(4), pp. 779–798. DOI: https://doi.org/10.1353/sor.2004.0040, ISSN 0037-783X

Holt, J. T. (2012) ‘Exploring the Intersections of Technology, Crime and Terror’, Terrorism and Political Violence, 24(2), pp. 337–354. DOI: https://doi.org/10.1080/09546553.2011.648350, ISSN 0954-6553

Horowitz, J. (2013) Counterterrorism and Human Rights Abuses in Kenya and Uganda: The World Cup Bombing and Beyond. New York: Open Society Foundations. ISBN 978-1-936133-77-2. Available at https://www.justiceinitiative.org/uploads/1b4cef46-0f2f-498a-a16c-cfcefd9897ae/counterterrorism-human-rights-abuses-kenya-uganda-20130403.pdf (Accessed: 28 May 2024)

Interpol (2021) African Cyberthreat Assessment Report. Available at https://www.interpol.int/content/download/16759/file/AfricanCyberthreatAssessment_ENGLISH.pdf (Accessed: 28 May 2024)

Correia, V. J. (2022) An Explorative Study into the Importance of Defining and Classifying Cyber Terrorism in the United Kingdom’, SN Computer Science, 3(1). DOI: https://doi.org/10.1007/S42979-021-00962-5, ISSN 2661-8907

Jarvis, L., Macdonald, S., and Whiting, A. (2016) ‘Analogy and Authority in Cyberterrorism Discourse: An Analysis of Global News Media Coverage’, Global Society, 30(4), pp. 605–623. DOI: https://doi.org/10.1080/13600826.2016.1158699, ISSN 1360-0826

Margariti, S. (2019) ‘Defining International Terrorism to Protect Human Rights in the Context of Counter-Terrorism’, Security and Human Rights, 29(1–4). DOI: https://doi.org/10.1163/18750230-02901004, ISSN 1875-0230

Murray, G., Albert, C. D., Davies, K., Griffith, C., Heslen, J., Hunter, L. Y., Jilany-Hyler, N. and Rathan, S. (2019) Toward Creating a New Research Tool: Operationally Defining Cyberterrorism. St. Augusta: OSF Preprints. DOI: https://doi.org/10.31219/osf.io/uk3z7

Nacos, B. L. (2016) Mass-Mediated Terrorism: Mainstream and Digital Media in Terrorism and Counterterrorism. Lenham: Rowman & Littlefield Publishers, Incorporated. ISBN 978-1-4422-4761-1

Nelson, B., Choi, R., Iacobucci, M., Mitchell, M., and Gagnon, G. (1999) Cyberterror: Prospects and Implications. Monterey: Center for the Study of Terrorism and Irregular Warfare. Available at https://apps.dtic.mil/sti/pdfs/ADA393147.pdf (Accessed: 28 May 2024)

Niglia, A., Sabaileh, A. Al, and Hammad, A. (eds.) (2017) Countering Terrorism, Preventing Radicalization and Protecting Cultural Heritage: The Role of Human Factors and Technology. Amsterdam, Berlin, Washington DC: IOS Press. NATO Science for Peace and Security Series - E: Human and Societal Dynamics, Vol. 133. ISBN 978-1-61499-754-2

Organization of African Unity. (1999) OAU Convention on the Prevention and Combating of Terrorism. https://au.int/en/treaties/oau-convention-prevention-and-combating-terrorism

Plotnek, J. J., and Slay, J. (2020) ‘Cyber Terrorism: A Homogenized Taxonomy’, Computers and Security, 102(2), pp. 1-9. DOI: https://doi.org/10.1016/j.cose.2020.102145, ISSN 0167-4048

Pollitt, M. M. (1998) ‘Cyberterrorism — Fact or Fancy?’, Computer Fraud & Security, 2, pp. 8–10. DOI: https://doi.org/10.1016/S1361-3723(00)87009-8, ISSN 1361-3723

SAPA-AFP (2012) ‘Boko Haram “Leader” Issues New Threats in Internet Message’, Time Live, 27 January. Available at https://www.timeslive.co.za/news/africa/2012-01-27-boko-haram-leader-issues-new-threats-in-internet-message/ (Accessed: 28 May 2024)

Saul, B. (2006) Defining Terrorism in International Law. Oxford: Oxford University Press. DOI: https://doi.org/10.1093/acprof:oso/9780199535477.001.0001, ISBN 978-0-199-29597-5

Schmid, A. P. (2023) ‘Defining Terrorism’, International Centre for Counter-Terrorism, March. DOI: https://doi.org/10.19165/2023.3.01, ISSN 2468-0486.

Schmidt, A. P. (1984) Political Terrorism: A Research Guide to Concepts, Theories, Data Bases and Literature. New Brunswick: Transaction Publishers. ISBN 0-444-85602-1

Stevens, T. (2009) ‘Regulating the ‘Dark Web’: How a Two-Fold Approach can Tackle Peer-to-Peer Radicalisation’, The RUSI Journal, 154(2), pp. 28–33. https://doi.org/10.1080/03071840902965687, ISSN 0307-1847

Symantec, & African Union Information Society (2016) Cyber Crime Security Trends in Africa. Mountain View: Symantec Corporation World Headquarters. Available https://securitydelta.nl/media/com_hsd/report/135/document/Cyber-security-trends-report-Africa-en.pdf (Accessed: 28 May 2024)

Thurlow, C., and Jaworski, A. (2017) ‘Introducing Elite Discourse: The Rhetorics of Status, Privilege, and Power’, Social Semiotics, 27(3), pp. 243–254. DOI: https://doi.org/10.1080/10350330.2017.1301789, ISSN 1035-0330

United Nations Office of Counter-Terrorism (2022) Cybersecurity and New Technologies. Available at https://www.un.org/counterterrorism/cybersecurity (Accessed: 28 May 2024)

United Nations Information Officer (2002) ‘Treaty on Suppression of Financing of Terrorism Comes into Force’, United Nations Human Rights Office of the High Commissioner, 8 April. Available at https://www.ohchr.org/en/press-releases/2009/10/treaty-suppression-financing-terrorism-comes-force (Accessed: 28 May 2024)

United Nations Security Council (2004) United Nations Security Council Resolution 1566. Available at https://digitallibrary.un.org/record/532676?ln=en&v=pdf (Accessed: 28 May 2024)

United Nations Security Council (2014) United Nations Security Council Resolution 2178. Available at https://www.un.org/securitycouncil/s/res/2178-%282014%29 (Accessed: 28 May 2024)

United Nations Security Council (2017) United Nations Security Council Resolution 2396. Available at https://www.un.org/securitycouncil/content/sres23962017 (Accessed: 28 May 2024)

Wall, D. S. (2007) Cybercrime: The Transformation of Crime in the Information Age. Cambridge Polity, 2nd Edition. Crime and Society Series. ISBN 0-7456-2736-6

Wall, D. S. (2008) ‘Cybercrime and the Culture of Fear: Social Science Fiction (s) and the Production of Knowledge about Cybercrime’, Information, Communication & Society, 11(6), pp. 861–884. DOI: https://doi.org/10.1080/13691180802007788, ISSN 1369-118X

Waxman, D. (2011) ‘Living with Terror, not Living in Terror: The Impact of Chronic Terrorism on Israeli Society’, Perspectives on Terrorism, 5(5–6), pp. 4-26. DOI: https://doi.org/10.4135/9781473917248.n14, ISSN 2334-3745

Worldometers.info (2024) Worldometer: Africa Population Live. Available at https://www.worldometers.info/world-population/africa-population/ (Accessed: 28 May 2024)

Xinhua (2019) ‘AU Calls for Online Monitoring to Combat Terrorist Activities’, New China, 11 July. Available at http://www.xinhuanet.com/english/2019-07/11/c_138218326.htm (Accessed: 28 May 2024)

Downloads

Published

2024-07-01

Versions

How to Cite

Grobbelaar, A. . (2024). Cyberterrorism in Africa – Is This the Real Life, Is This Just Fantasy?. Journal of Central and Eastern European African Studies, 3(4), 108–124. https://doi.org/10.59569/jceeas.2023.3.4.197