Handbook of Terrorism and Counter Terrorism Post 9/11
Show Less

Handbook of Terrorism and Counter Terrorism Post 9/11

Edited by David Martin Jones, Paul Schulte, Carl Ungerer and M. L.R. Smith

Almost two decades after the events of 9/11, this Handbook offers a comprehensive insight into the evolution and development of terrorism and insurgency since then. Gathering contributions from a broad range of perspectives, it both identifies new technological developments in terrorism and insurgency, and addresses the distinct state responses to the threat of political, or religiously motivated violence; not only in the Middle East and Europe, but also in Africa, South and Southeast Asia, and North and South America.
Buy Book in Print
Show Summary Details
You do not have access to this content

Chapter 8: The media and terror: undermining information asymmetry

Jonathan R. Woodier


Terror is a tactic in war used by both state and non-state actors, and it is always a communicative act. Thus, terrorism is innately media related. What is clear is the asymmetric nature of such a conflict and how the digital media world is being leveraged by smart users of new technologies to augment their power and influence. In this chapter, by way of a situational analysis, I will explore how the Internet and, in particular, the digital media have done more than just provide new channels for groups to spread their messages and deliver a global audience for their performance but have also become an amplifying force multiplier. In this way, it might be possible to begin to outline possible remedies to these pathologies of the Internet.

You are not authenticated to view the full text of this chapter or article.

Elgaronline requires a subscription or purchase to access the full text of books or journals. Please login through your library system or with your personal username and password on the homepage.

Non-subscribers can freely search the site, view abstracts/ extracts and download selected front matter and introductory chapters for personal use.

Your library may not have purchased all subject areas. If you are authenticated and think you should have access to this title, please contact your librarian.

Further information

or login to access all content.