Hostname: page-component-f554764f5-nwwvg Total loading time: 0 Render date: 2025-04-21T02:44:24.275Z Has data issue: false hasContentIssue false

Assessing the Public Health Consequences of Terrorist Attacks on Telecommunications Infrastructure: A Global Analysis

Published online by Cambridge University Press:  10 December 2024

Zakaria Mani*
Affiliation:
Nursing College, Jazan University, Jazan, Saudi Arabia and
Krzysztof Goniewicz*
Affiliation:
Department of Security Studies, Polish Air Force University, Dęblin, Poland
*
Corresponding authors: Zakaria Mani and Krzysztof Goniewicz; Emails: [email protected]; [email protected]
Corresponding authors: Zakaria Mani and Krzysztof Goniewicz; Emails: [email protected]; [email protected]

Abstract

Objectives

This study investigates the public health implications of terrorist attacks on telecommunications infrastructure globally, assessing the direct and indirect impacts on emergency response and medical services.

Methods

Utilizing retrospective analysis, this research delves into incidents recorded in the Global Terrorism Database (GTD) from 1970 to 2020. The study employs descriptive statistical methods to identify patterns and examine the regional distribution and frequency of these attacks, alongside the types of weaponry used and the direct casualties involved.

Results

The analysis underscores a significant focus on telecommunications by terrorist groups, revealing a frequent use of high-impact weapons like explosives and incendiary devices aimed at maximizing disruption. The study highlights considerable regional variations in the frequency and nature of attacks, emphasizing the strategic importance of these infrastructures to public safety and health systems.

Conclusions

The findings demonstrate the critical need for robust security enhancements tailored to regional threats and the integration of advanced technologies in public safety strategies. The research advocates for enhanced international cooperation and policymaking to mitigate the impacts of these attacks, ensuring telecommunications resilience in the face of global terrorism.

Type
Original Research
Copyright
© The Author(s), 2024. Published by Cambridge University Press on behalf of Society for Disaster Medicine and Public Health, Inc.

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Article purchase

Temporarily unavailable

References

Lindert, J, Bilsen, J, McKee, M. Terrorist attacks: a public health issue. Eur J Public Health. 2018;28(6):986.CrossRefGoogle ScholarPubMed
Zhang, Z, Tang, J. Analysis of news dissemination path and impact of big data technology in public health emergencies. J Environ Public Health. 2022;2022.CrossRefGoogle Scholar
Alam, MM, Le Moullec, Y, Ahmad, R, et al. A primer on public safety communication in the context of terror attacks: the NATO sps “counter-terror” project. In: Advanced Technologies for Security Applications: Proceedings of the NATO Science for Peace and Security’Cluster Workshop on Advanced Technologies’, 17-18 September 2019, Leuven, Belgium. Springer Netherlands; 2020:1934.CrossRefGoogle Scholar
Stewart, MG, Mueller, J. Terrorism risks, chasing ghosts and infrastructure resilience. Sustain Resilient Infrastruct. 2020;5(1–2):7889.CrossRefGoogle Scholar
Cavaliere, GA, Alfalasi, R, Jasani, GN, et al. Terrorist attacks against healthcare facilities: a review. Health Security. 2021;19(5):546550.CrossRefGoogle ScholarPubMed
Roshanaei, M. Resilience at the core: critical infrastructure protection challenges, priorities and cybersecurity assessment strategies. J Comput Commun. 2021;9(8):80102.CrossRefGoogle Scholar
Khorram-Manesh, A, Goniewicz, K, Burkle, FM. Jr Unleashing the global potential of public health: a framework for future pandemic response. J Infect Public Health. 2024;17(1):8295.CrossRefGoogle ScholarPubMed
Torpan, S, Hansson, S, Rhinard, M, et al. Handling false information in emergency management: a cross-national comparative study of European practices. Int J Disaster Risk Reduct. 2021;57:102151.CrossRefGoogle Scholar
Barten, DG, Klokman, VW, Cleef, S, et al. When disasters strike the emergency department: a case series and narrative review. Int J Emerg Med. 2021;14:19.CrossRefGoogle ScholarPubMed
Global Terrorism Database (GTD). Information on Terrorist Events Around the World. 2023, START.umd.edu. Accessed Feb, 15, 2024.Google Scholar
Veerasamy, N. Cyberterrorism–the spectre that is the convergence of the physical and virtual worlds. In: Emerging Cyber Threats and Cognitive Vulnerabilities. Academic Press; 2020:2752.CrossRefGoogle Scholar
Adigwe, CS, Mayeke, NR, Olabanji, SO, et al. The evolution of terrorism in the digital age: investigating the adaptation of terrorist groups to cyber technologies for recruitment, propaganda, and cyberattacks. Asian J Bus Account. 2024;24(3):289306.Google Scholar
Gkeredakis, M, Lifshitz-Assaf, H, Barrett, M. Crisis as opportunity, disruption and exposure: exploring emergent responses to crisis through digital technology. Inf Organ. 2021;31(1):100344.CrossRefGoogle Scholar
Mahmood, R, Jetter M. Communications technology and terrorism. J Confl Resolut. 2020;64(1):127166.CrossRefGoogle Scholar
Santaspirt, M. Improvised explosive devices: assessing the global risk for use in terrorism. Doctoral dissertation, Rutgers University Graduate School: Newark, NJ; 2020.Google Scholar
Feltes, J. Weapons of Mass Destruction—Conceptual and Ethical Issues with Regard to terrorism. In: Counter-Terrorism, Ethics and Technology: Emerging Challenges at the Frontiers of Counter-Terrorism. Cham: Springer International Publishing; 2021:4969.CrossRefGoogle Scholar
Boyle, MJ. Weapon of choice: terrorist bombings in armed conflict. Stud Conflict Terrorism. 2022;45(9):778798.CrossRefGoogle Scholar
De Cauwer, H, Barten, DG, Tin, D, et al. Terrorist attacks against COVID-19-related targets during the pandemic year 2020: a review of 165 incidents in the Global Terrorism Database. Prehosp Disaster Med. 2023;38(1):4147.CrossRefGoogle ScholarPubMed
Zhu, Y, Li, N. Virtual and augmented reality technologies for emergency management in the built environments: a state-of-the-art review. J Saf Sci Resil. 2021;2(1):110.Google Scholar
Khorram-Manesh, A, Mortelmans, LJ, Robinson, Y, et al. Civilian-military collaboration before and during Covid-19 pandemic—a systematic review and a pilot survey among practitioners. Sustainability. 2022;14(2):624.CrossRefGoogle Scholar
Choudhary, SA, Khan, MA, Sheikh, AZ, et al. Role of information and communication technologies on the war against terrorism and on the development of tourism: evidence from a panel of 28 countries. Technol Soc. 2020;62:101296.CrossRefGoogle Scholar
Shortland, N, Forest, JJ. Tracking terrorism: the role of technology in risk assessment and monitoring of terrorist offenders. Science Informed Policing. 2020:5776.CrossRefGoogle Scholar
Kotsias, J, Ahmad, A, Scheepers, R. Adopting and integrating cyber-threat intelligence in a commercial organisation. Eur J Inf Syst. 2023;32(1):3551.CrossRefGoogle Scholar
Mani, ZA, Goniewicz, K. Transforming healthcare in Saudi Arabia: a comprehensive evaluation of Vision 2030’s impact. Sustainability. 2024;16(8):3277.CrossRefGoogle Scholar