Welcome to VOX-Pol’s Online Library, a research and teaching resource, which collects in one place a large volume of publications related to various aspects of violent online political extremism.
Our searchable database contains material in a variety of different formats including downloadable PDFs, videos, and audio files comprising e-books, book chapters, journal articles, research reports, policy documents and reports, and theses.
All open access material collected in the Library is easy to download. Where the publications are only accessible through subscription, the Library will take you to the publisher’s page from where you can access the material.
We will continue to add more material as it becomes available with the aim of making it the most comprehensive online Library in this field.
If you have any material you think belongs in the Library—whether your own or another authors—please contact us at email@example.com and we will consider adding it to the Library. It is also our aim to make the Library a truly inclusive multilingual facility and we thus welcome contributions in all languages.
Historical Events And Supply Chain Disruption: chemical, biological, radiological and cyber events
|2003||Lensing, R. P.||MA Thesis|
|In the wake of the attacks of September 11, 2001, terrorism emerged as a legitimate threat not just to society, but to corporations as well. This new threat has challenged old business rules and prompted companies to rethink their supply chain operations. However, the events of September 11th were not the first or the only disruptions that the business world had experienced. This thesis reviews past historical events that simulate the effects of a terrorist attack and extracts lessons that can be applied by today's corporations to prepare for future attacks or disruptions. The types of events studied include Biological, Chemical, Radiological and Cyber disruptions. Through the analysis and synthesis of each event's impact, the following generalized recommendations emerged: Prior warnings and events should be acknowledged, studied and utilized. Government intervention may strain operations under disruptive stress. Alternate sourcing should be considered to ease supply issues. Disruptions should be approached in a comprehensive and forthright manner. A security and safety culture should be fostered to prevent disruptions and control their spread. Systems should be prepared to quickly operate in isolation during a disruption. Finally, impact is frequently less severe then initially predicted. Through the events described and these recommendations, this thesis aims to provide lessons for firms to manage their supply chains through future disruptions.|
Terrorism and IT: Cyberterrorism and Terrorist Organisations Online
|Chapter, "Terrorism and IT: cyberterrorism and terrorist organisations online" in book: Howard, Russell D. and Sawyer, Reid L., (eds.) Terrorism and counterterrorism: understanding the new security environment, readings and interpretations|
White Supremacist Networks on the Internet
|2000||Burris, V., Smith, E. and Strahm, A.||Article|
|In this paper we use methods of social network analysis to examine the inter-organizational structure of the white supremacist movement. Treating links between Internet websites as ties of affinity, communication, or potential coordination, we investigate the structural properties of connections among white supremacist groups. White supremacism appears to be a relatively decentralized movement with multiple centers of influence, but without sharp cleavages between factions. Interorganizational links are stronger among groups with a special interest in mutual affirmation of their intellectual legitimacy (Holocaust revisionists) or cultural identity (racist skinheads) and weaker among groups that compete for members (political parties) or customers (commercial enterprises). The network is relatively isolated from both mainstream conservatives and other extremist groups. Christian Identity theology appears ineffective as a unifying creed of the movement, while Nazi sympathies are pervasive. Recruitment is facilitated by links between youth and adult organizations and by the propaganda efforts of more covertly racist groups. Links connect groups in many countries, suggesting the potential of the Internet to facilitate a whitesupremacist “cyber-community” that transcends regional and national boundaries.|
Neo‐Nazis and Taliban On‐line: Anti‐Modern Political Movements and Modern Media
|Usually the Internet is seen as a new medium with great potential for enhancing citizenship and democracy. This essay will try to present and to reflect on some of the less well known sides of the world wide web. In this case the 'dark sides' of the Internet will not refer to web sites of sex and violence, which have attracted more attention, but rather to two political movements with a high presence in the Internet: on the one hand the neoNazis in Germany and elsewhere, and on the other hand the Taliban in Afghanistan. At first glance a topic like the 'neo-Nazis and Taliban on-line' seems to combine very disparate societal movements that are neither new (the Nazis) nor very active in a modern environment (the Taliban). This contribution will show that both the neo-Nazis and the Taliban have important similarities in their structural approaches to society as well as in their presence in the Internet, but there are also of course serious differences. Because of this unusual comparison it will be helpful to sketch some of the context for the activities of the neo-Nazis and Taliban before we turn to the main issue.|
Information Age Terrorism: Toward Cyberterror
|1995||Littleton, M.J.||MA Thesis|
|The growing ubiquity of computers and their associated networks are propelling the world into the information age. Computers may revolutionize terrorism in the same manner that they have revolutionized everyday life. Terrorism in the information age will consist of conventional terrorism, in which classic weapons (explosives, guns, etc.) will be used to destroy property and kill victims in the physical world; techno terrorism, in which classic weapons will be used to destroy infrastructure targets and cause a disruption in cyberspace; and cyberterrorism, where new weapons (malicious software, electromagnetic and microwave weapons) will operate to destroy data in cyberspace to cause a disruption in the physical world. The advent of cyberterrorism may force a shift in the definition of terrorism to include both disruption and violence in cyberspace in the same manner as physical destruction and violence. Through the use of new technology, terrorist groups may have fewer members, yet still, have a global reach. The increasing power of computers may lower the threshold of state sponsorship to a point where poor states can become sponsors and rich states are no longer necessary for terrorist groups to carry out complex attacks. This thesis explores the shift toward information warfare across the conflict spectrum and its implications for terrorism. By examining the similarities and differences with past conventional terrorism, policymakers will be able to place information age terrorism into a known framework and begin to address the problem.|
Cyberterrorism Cyber Prevention Vs Cyber Recovery
|1993||DiBiasi, J. R.||MA Thesis|
|The technological age has forced the U.S. to engage a new set of national security challenges. Several potential adversaries have cyberspace capabilities comparable to those of the U.S., and are constantly conducting surveillance, gathering technical information, and mapping critical nodes that could be exploited in future conflicts. How can the U.S. government best defend against future cyber attacks? Recent policy documents set out a strategy for securing all of cyberspace, which experts argue is impossible to implement, but also unnecessary. This thesis seeks to move the discussion beyond this stalemate by undertaking an analysis of the vulnerability of cyberspace to terrorist attacks. The first analysis examines the Code Red Worm and the Slammer Worm. These two worms were selected because they were highly destructive and spread faster than normal worms, making them well suited for assessing the existing security of computers and networks. The next analysis examines a staged cyber attack on critical infrastructure, entitled Attack Aurora. In the staged Aurora attack, researchers from the Department of Energy’s Idaho lab hacked into a replica of a power plant’s control system. This attack is the most recent staged attack and facilitates an analysis of vulnerabilities of critical infrastructures to cyberterrorism.|