Internet and terrorism

From Self-sufficiency
Jump to: navigation, search

The presence of terrorist groups on the internet is a relatively new phenomenon, the growth of which has exploded in the past decade. Accurate estimates on the number of active terrorist group’s websites vary due to difficulties measuring but, there is a general consensus that in 1996 there was just under 100 websites and to well over 5000 websites today. It is also widely accepted that all Foreign Terrorist Organisation’s listed by the U.S. Department of State website have established an online presence of some form.

Only after 9/11 has governmental and public interest really been focussed on terrorists and the internet shown by the large number of articles examining the issue in the media which primarily occurred due to evidence recovered from Al Qaeda computers in Afghanistan, that indicate the Internet was being used to collect intelligence and send encrypted messages.[1][2]

The definition of terrorism used in this document is that of the new academic consensus definition: that terrorism is “a politically motivated tactic involving the threat or use of force or violence in which the pursuit of publicity plays a significant role”.[3]

Terrorist groups use of the Internet

Growth in the use of the internet by terrorist groups is due to the key characteristics of the internet: ease of access which facilitates the possible massive worldwide audiences, few laws when compared to the physical world, little censorship, rapid and ‘always on’ flow of information, the low cost, anonymity of communication and a multimedia environment. The following is a breakdown of the main purposes that terrorist groups utilise the Internet for:

Cyberterrorism

Directly after 9/11, much was made of the possibilities of a large-scale cyber-terrorism attack by the media. However, several academics in the pending years published papers focussing on the terrorist groups utilize the Internet as it was designed to be; a means to communicate and collaborate, therefore the terrorists have stronger reasons to keep it up and online. Hence the apparently impending large scale cyber-terrorist attack that would cripple the internet has not materialised although Al Qaeda has taken full advantage of this fear[4] - see section entitled Disinformation.

Publicity and Propaganda

As stated by Dr Maura Conway, terrorism researcher:

“Every machine connected to the internet is potentially a printing press, a broadcasting station or place of assembly.” [5]

The internet is an un-paralleled media suite. Terrorists no longer have to have their messages diluted and edited by the media. Instead they can disseminate information of their choice to aid their causes. In most cases, this is achieved by the terrorists focusing on their grievances in order to justify why they are resorting to terrorist activities. This is usually achieved by the publication of various articles combined with pictures galleries, although this may be supplemented by video and audio files in which the terrorists themselves orally defend their actions. An example of this would be a gallery of atrocities against innocent civilians in Iraq supposedly carried out by foreign forces in order to generate local as well as international support for the terrorists.

In some cases, the terrorists choose to distribute information displaying their acts of violence or relating actions although this is not common. Again, these can be through written articles describing the violence, but are more often videos and pictures. Examples of these would be the pre-mission pictures published on the Tamil Tigers website of the Air Tiger squadron that a few days earlier had carried out its successful inaugural air attack on Sri Lankan governmental forces. A rather more extreme example was the distribution of the beheading of the journalist Daniel Pearl by the terrorist organisation ‘The National Movement for the Restoration of Pakistani Sovereignty’.

Data Mining

The Internet is a vast resource of information which anyone can tap into and terrorists are well aware of this. According to Secretary of Defence Donald Rumsfeld, speaking on January 15, 2003, an al Qaeda training manual recovered in Afghanistan tells its readers that:

“Using public sources openly and without resorting to illegal means, it is possible to gather at least 80 percent of all information required about the enemy.”[6]

The Internet allows access to highly detailed maps, schematics and various other sources of data that would allow terrorists gather information for potential targets. More importantly, once this data has been collated, it is compiled into volumes or “How to” manuals that are distributed between terrorist organisations [7] - see section entitled Networking.

Fund Raising

Terrorist groups have made full use of the Internet’s ability to create funds; whether legitimately or otherwise. The main methods that the terrorists achieve this is by:

Goods selling: merchandise that is directly related to the terrorist organisation, for example, CDs, DVDs and books from the LTTE.[8]

Website and email based appeals: sending emails to sympathizers who registered interest on a group’s website, posting messages on newsgroups/forums and their own websites that give directions as to how and where donations can be made.

Deception: using seemingly legitimate charities or businesses that unknown to the donator, directs the funds to terrorist organisations.[9]

Criminal activity: Illegitimate means of gaining funds that terrorist groups are known to use include credit card fraud, online brokering and gambling.[8][9]

Recruitment

This section is inherently tied-in with Propaganda. Terrorist organisations are able to monitor users who browse their websites, capture their profile and information about them and if deemed possibly useful to their cause, are contacted. This grooming process starts from when the user begins to absorb the propaganda on the website, for example the often discussed “charismatic” style of delivery that Osama Bin Laden employs on his video messages.[10] Perhaps motivated by this video, the user seeks answers to questions and goes to internet chat-rooms and discussion boards. Possible recruits are spotted by lurking recruiters who through gradual encouragement of discussion of religious issues to gradually including more political discussions. This grooming leads the recruits to become more and more entangled in terrorist related discussions and are led through a maze of private chat-room’s until personal indoctrination occurs which is often through the use of the secure software Paltalk.[10][11]

Communication & Networking

Terrorist groups have changed recently from having a clearly defined hierarchy in the organisations with designated leaders, to having multiple, semi-independent cells with no clear distinct leader in order to allow them to remain hidden. The Internet facilitates communication between cells which allows exchange of information and manuals.

The Internet also assists with internal communication within a cell particularly in relation to the planning of attacks. To avoid being detected and targeted by security forces, Messages are often sent by conspirators through emails which are often sent using public email systems such as Hotmail and Yahoo and may also be sent from public libraries and internet cafes. Chat rooms may also be used for this purpose.

In addition, steganography may be used to hide information embedded within graphic files on websites. Graphic files may also used to send very subtle messages, such as reversing the orientation of a gun graphic may indicate that the next stage of a plan is to proceed. Other methods of concealing instructions and messages may be through the use of coded language, such as that used by Mohamed Atta's final email to the other terrorists who carried out the attacks of 9/11 is reported to have read:

The semester begins in three more weeks. We’ve obtained 19 confirmations for studies in the faculty of law, the faculty of urban planning, the faculty of fine arts, and the faculty of engineering.

[1]

This is believed to be in reference to the four targets that the planes were planned to strike; ’architecture’ being the World Trade Center, ‘arts’: the Pentagon, ‘law’: the Capitol and ‘politics’: the White House.

An even more secure method of communication is that which involves using one-time anonymous public email accounts; two terrorists who wish to communicate to open 30 anonymous email accounts whose usernames and passwords are known by each side. To communicate, one terrorist creates a web-based email and instead of sending it, saves it as a draft online. The “recipient” then logs onto this account, reads this message and deletes. The next day, a new account is used; this increases the difficulty of traceability of the users.[12]

The audiences of the terrorist websites

The first group of people that will frequent these websites are current supporters and future supporters. The websites typically include information relative to their activities, their allies, and their competitors. In addition, many websites offer items for sale.

The second group of people that will enter these websites will be members of the outside community. In hopes of appealing to people all over the world, many terrorist organizations offer their websites in multiple languages. The websites typically include historical background information and general information about the organization itself.

Only some of the websites address the enemy or citizens of a country currently under attack by terrorists. The terrorists hope weaken public support within countries and in some cases will threaten attacks if the government fails to do as they ask.[1]

Disinformation

The use of disinformation by terrorist groups is often used to incite fear and panic by sending threats, airing videos of brutal executions, creating psychological attacks through the use of threats of cyber-terrorism.

Disinformation may also be used to divert attention from an impending attack by releasing details of a hoax attack so that governmental and law enforcement agencies are side-tracked. However, this may not be wholly effective given the nature of current security climates; that is upon receiving information on a potential attack, the security level on all spectrums across a whole country is increased i.e. from black to black special or similar.

References

Cite error: Invalid <references> tag; parameter "group" is allowed only.

Use <references />, or <references group="..." />

Further reading

  • Weinberg et al. (2004) “The Challenges of Conceptualizing Terrorism”, Terrorism and Political Violence, 16(4), 777 – 794.
  • Arquilla et al. (1999), “Networks, Netwar, and Information-Age Terrorism” in Terrorism and Counterterrorism: Understanding the new security environment (2004) The McGraw-Hill Companies.
  • Conway M. (2003), “Terrorism and IT: Cyberterrorism and Terrorist Organisations Online” in Terrorism and Counterterrorism: Understanding the new security environment (2004) The McGraw-Hill Companies.
  • Gruen M. (2003) “White Ethnonationalist and Political Islamist Methods of Fundraising and Propaganda on the Internet in Terrorism and Counterterrorism: Understanding the new security environment (2004) The McGraw-Hill Companies.
  • Weimann G. (2004) www.terror.net How Modern Terrorism Uses The Internet. United States Institute of Peace www.usip.org/pubs/specialreports/sr116.pdf Retrieved on 09/04/2007.
  • Thomas T.L. (2003) Al-Qaeda and the Internet: The Danger of “Cyber-planning” www.carlisle.army.mil/usawc/Parameters/03spring/thomas.pdf Retrieved on 09/04/2007
  • Hoffman. B (2006) The Use of the Internet by Islamic Extremists. RAND Cooperation. www.rand.org/pubs/testimonies/2006/RAND_CT262-1.pdf Retrieved on 03/04/2007

External links

The "Top Ten" list of Salafyist/Jihadist forums. Internet Haganah.

  • 1.0 1.1 1.2 Weimann 2004: 12
  • Thomas 2003: 1
  • Weinberg et al. 2004:786
  • "Americas | US warns of al-Qaeda cyber threat". BBC News. 2006-12-01. Retrieved 2009-12-13. 
  • Conway 2003: 271
  • Weimann 2004: 7
  • http://www.usdoj.gov/ag/manualpart1_1.pdf
  • 8.0 8.1 "www.eelamstore.com". www.eelamstore.com. Retrieved 2009-12-13. 
  • 9.0 9.1 Gruen 2003: 298
  • 10.0 10.1 "Terror's Server". Technology Review. Retrieved 2009-12-13. 
  • "Terrorists Take Recruitment Efforts Online - 60 Minutes". CBS News. 2007-03-04. Retrieved 2009-12-13. 
  • http://www.csis-scrs.gc.ca/en/itac/itacdocs/2006-2.asp