You are on page 1of 3

Journal of Communication ISSN 0021-9916

Book Reviews

Terrorism in Cyberspace: The Next actors in North America and Europe are
Generation wholly uncovered in this text. Weimann
notes in his introduction that he uses
Gabriel Weimann the U.S. Department of State’s list of
foreign terror organizations to establish
Columbia University Press, Kindle Edition,
his research scope. He does not further
2015
justify, either theoretically or practically,
Gabriel Weimann’s Terrorism in his exclusion of non-Islamic terror actors
Cyberspace: The Next Generation is a from his analysis, nor does he acknowl-
edge this limitation in his project’s scope.
thorough update to his 2006 book Terror
We are left with a text that declares
on the Internet. It summarizes Weimann’s
itself to be a general analysis, but that in
work since 2006, and the work of some
actuality is quite limited.
other major voices in the field. In a
Perhaps unsurprisingly, Weimann
review of the contents of over 10,000
cites uncritically a number of reports
terrorist websites, Weimann and his team
produced by either U.S. governmental
analyze the use of networked commu-
agencies or DC-based think tanks such
nications technology. The text draws
as MEMRI or the Middle East Policy
comparisons between current terrorist
Council. This in part explains this text’s
practices and marketing, political orga- marked pro-United States, progovern-
nizing, and hacktivist practice. While the ment perspective. This comes out most
book presents a comprehensive review clearly in Weimann’s chapter describ-
of an area of current security and terror ing the tradeoffs necessary between
studies, it is unfortunately hamstrung by civil liberties and security in the fight
apparent prejudices as to who counts as a against terror. Here Weimann interprets
terrorist and a marked lack of fluency in a number of Washington Post, ABC, and
the technological concepts at work. USA Today polls to claim that “in the
Terrorism in Cyberspace is unequivo- public’s view, the optimal level of civil
cally focused on Islamic terrorist groups. liberties, in practice, is not necessarily
There is no substantial coverage of always the fullest extent of those liberties:
other ideologically motivated terror Americans are willing to trade a degree
groups. A particularly notable lacunae of civil liberty for other valued benefits,
is White supremacist groups in North such as the prevention of terrorism”
America, whose use of message boards, (pp. 4347–4349). He goes further in
forums, and other networked communi- arguing that “We know that the Ameri-
cations technologies has been thoroughly can public supports the monitoring of the
researched. Besides a handful of offhand Internet, including private e-mail traffic,
citations, right-wing extremist terror but as in the case of TSA measures this

Journal of Communication 65 (2015) E13–E15 © 2015 International Communication Association E13


Book Reviews Book Reviews

acceptance relies on known procedures, people these days, use the internet as
known agents, and agreed-upon lim- part of their daily lives. Weimann’s book
its” (pp. 4379–4381). These statements makes much of their use of e-mail, mes-
reflect a generous interpretation of both sage boards, websites, social networks,
the studies cited and of the current opin- mobile phones, and other common com-
ion regarding the massive surveillance munications technologies, but despite
regime uncovered by Edward Snowden Weimann’s occasionally dramatic lan-
and post-9/11 transportation security guage, the findings presented here should
and communication privacy. not be surprising to anyone who has
Weimann takes a curious approach studied the social use of networked
to the internet and networked commu- communication technologies and the
nication devices, describing them more modern web.
as a collection of discrete tools than as The text contains a number of tech-
environments and theaters of action. This nical glosses which, while not rising to
leads to him devoting substantial time the level of errors, indicate a tolerance
to, say, the description of “cyber-fatwas,” for a certain amount of sloppiness with
Islamic religious rulings notable, appar- specifics. The book describes Tor as a
ently, for being distributed online. Noting “proxy service,” which it technically is
mostly that online distribution makes not. Weimann devotes an entire subsec-
such teachings more accessible than tion to “data mining,” which describes
previously possible, Weimann does the use of tools like Google Earth and
not deliver a cogent argument for why publicly accessible databases like the
accessibility, in and of itself, alters the Wikileaks Cablegate trove by terrorist
form of the fatwa or otherwise justifies actors, without ever clearly distinguish-
the special “cyber” designation. The ing that type of basic online research
“internet-as-tool” perspective lends the from sophisticated tools like the NSA’s
observations on the use of networked Boundless Informant and XKeystore,
communications technologies by ter- both of which are also referred to as
rorist actors a freighted intentionality “data mining” tools. Terrorist organiza-
and a determinist slant that ignores the tions are said to “capture information
ubiquity of the technologies and practices about the users who browse their web-
in question. That these actors make use sites” (pp. 579–580) but absolutely no
of these technologies for political and information is given about how this is
ideological purposes is presented as an done. Is it through the use of cookies?
exotic nightmare scenario, rather than an Ad-trackers? Newsletter subscriptions?
expected outcome that could have been Geocities-style guestbooks? The reader is
predicted based on similar uses of the left to guess for themselves, and probably
same technology by other ideologically assume the worst.
motivated political actors, including The book frequently uses terms like
non-Islamic terror populations. Overall, “cyberattacks” and “hacking” with little
the text seems preoccupied with the fact further explanation, despite the fact
that Islamic terrorist organizations are that these are notoriously underdefined
made up of people who, like most other terms and can be used to describe a

E14 Journal of Communication 65 (2015) E13–E15 © 2015 International Communication Association


Book Reviews Book Reviews

wide manner of sins. Weimann cites a never been a documented incident of


2013 Daily Telegraph article to support hackers, terroristic or otherwise, “taking
his claim that “In 2012 alone, NATO over” air traffic control systems, subway
suffered around 2,500 cyberattacks on its control systems, or traffic lights outside
networks, according to the alliance’s sec- of controlled experiments. No one has
retary general” (Weimann 3051–3052) died from an act of “cyber terror.”
without noting what these “attacks” were With section titles like “What is
and what percentage were legitimate, Social Media?” it is apparent that the
malevolent threats to the integrity of intended audience for this text is not
NATO networks, as opposed to any anticipated to be particularly technolog-
number of the automated spiders, bots, ically sophisticated. As such, Weimann’s
and port scanners which are common glosses and overuses of intentionally
on today’s open web. Weimann lumps alarming hypotheticals and terms like
the August 2013 URL-jacking episode, “cyberattack,” “cyberterrorism,” “hack,”
wherein the URLs of The New York Times “cyber Pearl Harbor,” and “cyber 9/11”
and several other major media sites were are especially problematic. Weimann’s
temporarily redirected, under the label of handling of these concepts is unnu-
“terrorist hacker” attacks. anced and alarmist. This, combined with
In the chapter on “cyberterrorism,” his tunnel-vision focus on Islamic terror
Weimann makes particularly free use of actors to the exclusion of all others and his
inflammatory hypotheticals, framed as apparent faith in the justified trammeling
though they are an immanent possibility: of a lot of civil liberties in exchange for a
“Consider the following comparative little safety, leaves Terrorism in Cyberspace
scenario: A suicide bomber can enter an off-balance, but not entirely unex-
a bus, and if successful can manage to pected book. The text reflects current
kill all the passengers on the bus and prejudices about who is called a ter-
possibly harm bystanders and others in rorist, stokes preconceptions regarding
the immediate area. With cyberattacks, the apocalyptic potential of networked
a terrorist can take control of traffic communications technologies, and with
lights in a certain area, the air traffic a recommendation for a surveilled and
control systems of a busy airport, or the censored internet that might be safe from
computers controlling the underground the “abuses” of terrorist actors, but which
transport system in a major city—and would be effectively denuded of those
could cause hundreds or even thousands creative aspects which inspired such
of fatalities over a much wider area” defensive zeal in the first place.
(Weimann 2884–2887). Despite alarmist
news reporting and the fevered dreams Molly Sauter
of Hollywood filmmakers, there has McGill University

Journal of Communication 65 (2015) E13–E15 © 2015 International Communication Association E15

You might also like