Professional Documents
Culture Documents
Book Reviews
Terrorism in Cyberspace: The Next actors in North America and Europe are
Generation wholly uncovered in this text. Weimann
notes in his introduction that he uses
Gabriel Weimann the U.S. Department of State’s list of
foreign terror organizations to establish
Columbia University Press, Kindle Edition,
his research scope. He does not further
2015
justify, either theoretically or practically,
Gabriel Weimann’s Terrorism in his exclusion of non-Islamic terror actors
Cyberspace: The Next Generation is a from his analysis, nor does he acknowl-
edge this limitation in his project’s scope.
thorough update to his 2006 book Terror
We are left with a text that declares
on the Internet. It summarizes Weimann’s
itself to be a general analysis, but that in
work since 2006, and the work of some
actuality is quite limited.
other major voices in the field. In a
Perhaps unsurprisingly, Weimann
review of the contents of over 10,000
cites uncritically a number of reports
terrorist websites, Weimann and his team
produced by either U.S. governmental
analyze the use of networked commu-
agencies or DC-based think tanks such
nications technology. The text draws
as MEMRI or the Middle East Policy
comparisons between current terrorist
Council. This in part explains this text’s
practices and marketing, political orga- marked pro-United States, progovern-
nizing, and hacktivist practice. While the ment perspective. This comes out most
book presents a comprehensive review clearly in Weimann’s chapter describ-
of an area of current security and terror ing the tradeoffs necessary between
studies, it is unfortunately hamstrung by civil liberties and security in the fight
apparent prejudices as to who counts as a against terror. Here Weimann interprets
terrorist and a marked lack of fluency in a number of Washington Post, ABC, and
the technological concepts at work. USA Today polls to claim that “in the
Terrorism in Cyberspace is unequivo- public’s view, the optimal level of civil
cally focused on Islamic terrorist groups. liberties, in practice, is not necessarily
There is no substantial coverage of always the fullest extent of those liberties:
other ideologically motivated terror Americans are willing to trade a degree
groups. A particularly notable lacunae of civil liberty for other valued benefits,
is White supremacist groups in North such as the prevention of terrorism”
America, whose use of message boards, (pp. 4347–4349). He goes further in
forums, and other networked communi- arguing that “We know that the Ameri-
cations technologies has been thoroughly can public supports the monitoring of the
researched. Besides a handful of offhand Internet, including private e-mail traffic,
citations, right-wing extremist terror but as in the case of TSA measures this
acceptance relies on known procedures, people these days, use the internet as
known agents, and agreed-upon lim- part of their daily lives. Weimann’s book
its” (pp. 4379–4381). These statements makes much of their use of e-mail, mes-
reflect a generous interpretation of both sage boards, websites, social networks,
the studies cited and of the current opin- mobile phones, and other common com-
ion regarding the massive surveillance munications technologies, but despite
regime uncovered by Edward Snowden Weimann’s occasionally dramatic lan-
and post-9/11 transportation security guage, the findings presented here should
and communication privacy. not be surprising to anyone who has
Weimann takes a curious approach studied the social use of networked
to the internet and networked commu- communication technologies and the
nication devices, describing them more modern web.
as a collection of discrete tools than as The text contains a number of tech-
environments and theaters of action. This nical glosses which, while not rising to
leads to him devoting substantial time the level of errors, indicate a tolerance
to, say, the description of “cyber-fatwas,” for a certain amount of sloppiness with
Islamic religious rulings notable, appar- specifics. The book describes Tor as a
ently, for being distributed online. Noting “proxy service,” which it technically is
mostly that online distribution makes not. Weimann devotes an entire subsec-
such teachings more accessible than tion to “data mining,” which describes
previously possible, Weimann does the use of tools like Google Earth and
not deliver a cogent argument for why publicly accessible databases like the
accessibility, in and of itself, alters the Wikileaks Cablegate trove by terrorist
form of the fatwa or otherwise justifies actors, without ever clearly distinguish-
the special “cyber” designation. The ing that type of basic online research
“internet-as-tool” perspective lends the from sophisticated tools like the NSA’s
observations on the use of networked Boundless Informant and XKeystore,
communications technologies by ter- both of which are also referred to as
rorist actors a freighted intentionality “data mining” tools. Terrorist organiza-
and a determinist slant that ignores the tions are said to “capture information
ubiquity of the technologies and practices about the users who browse their web-
in question. That these actors make use sites” (pp. 579–580) but absolutely no
of these technologies for political and information is given about how this is
ideological purposes is presented as an done. Is it through the use of cookies?
exotic nightmare scenario, rather than an Ad-trackers? Newsletter subscriptions?
expected outcome that could have been Geocities-style guestbooks? The reader is
predicted based on similar uses of the left to guess for themselves, and probably
same technology by other ideologically assume the worst.
motivated political actors, including The book frequently uses terms like
non-Islamic terror populations. Overall, “cyberattacks” and “hacking” with little
the text seems preoccupied with the fact further explanation, despite the fact
that Islamic terrorist organizations are that these are notoriously underdefined
made up of people who, like most other terms and can be used to describe a