This paper examines the phenomenon of terrorism in the Sahel/Saharan regions of Africa by focusing on the principal terrorist organisation in that turbulent region – Al-Qaeda in the Islamic Maghreb or AQIM. The paper examines the origins of this murky organisation in Algeria in the 1990s, focusing on its development and its relationships with other militant organisations like that of Ansar Dine in Mali. The paper examines the development of AQIM from the perspective of Critical Terrorism Studies. As such the paper also examines the context in which the organisation has mutated. Finally, the paper concludes with some specific policy recommendations.
It is no surprise to come across information or video on social or mainstream media that was posted by a terrorist organisation like Al-Shabaab. In this regard, researchers have attempted to answer the question of what terrorist organisations aim to achieve by gaining a strong foothold in cyberspace. This article explores the evolution of Al-Shabaab in terms of their media usage and presence—from a local insurgency using magazines and radio stations, to what can be described as a media mogul in Africa. The author explores how and why this group chooses to pursue a strong cyber presence, and what, if anything, Africa and the international community can do about it.
For many decades, the validity of the concept of cyberterrorism has been questioned. Academics have pondered whether this idea should be regarded as “fact or fancy”. Over time, development, globalization and connectivity have led one to veer towards the thought that this should be fact. However, various challenges are posed: The standalone concept of terrorism is in itself highly contested, and academics have yet to agree on a single definition of the term. Secondly, almost any form of modern threat can in the current age be studied with the added prefix “cyber-”. This raises the question of strategic approaches when combating things like cyberterrorism. The question arises: In how many ways do, and should, these approaches differ from the counterterrorism measures taken against traditional, physical terrorism, and where is a line drawn in the proverbial sand between terrorism, cyberterrorism, crime and cybercrime? In an effort to demarcate the scope and labelling of attacks as cyberterrorism and not necessarily cybercrime, academics have added the element of political motivation and fear to the young and already contested definition of cyberterrorism. This would mean that one of the only aspects differentiating cyberterrorism from terrorism is the use of information technology. This paper questions the validity of the term and threat of cyberterrorism – especially in an African context. With Africa’s limited use and penetration of information technology, the question arises whether this is really a new threat, or simply a natural evolution of the age-old threat of terrorism. Terrorists will always use the latest and best technology and means to their disposal; this research paper aims to understand whether that justifies a completely new concept in African security research.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.