Monday, November 25, 2019

Essay on Cyber TerrorismEssay Writing Service

Essay on Cyber TerrorismEssay Writing Service Essay on Cyber Terrorism Essay on Cyber TerrorismThe use of the Internet by terrorist groups will continue to become more sophisticated.   As an effective tool used daily in the world of business and pleasure, the Internet is widely used in the murky world of terrorism. It is used not just for the practice of recruiting, but all forms of terrorist logistics. According to Lachow Richardson (2007), â€Å"cyberterrorism conjures images of infrastructure failures, economic disasters, and even large-scale loss of life†(p. 1). It has been widely discussed in the mass media sources and the academic literature. The real threat of cyberterrorism is real attracts attention of millions of people, who realize that â€Å"terrorist organizations effectively using the Internet to stymie U.S. efforts to win the Long War† (Lachow Richardson, 2007, p.1). The Internet allows terrorists to operate as both decentralized franchises and freelancers. The use of the Internet and new communication technologies facili tates the major operations of terrorist organizations.   According to researchers, â€Å"as information and communication technologies improve over time, terrorist groups might utilize these improvements more powerfully for offensive uses† (Pekgozlu et al., 2007, p. 281). Terrorists use the Internet and communication technologies for several aims: â€Å"propaganda, indoctrination, recruitment, psychological warfare, and fundraising† (Pekgozlu et al., 2007, p. 282). The latest information and communication technologies selected by terrorist include not only the Internet, such as World Wide Websites, e-mails and video conferencing, but also cell phones, smartphones, fax machines. It has been found that one of the major goals of modern day terrorism in to produce and enhance publicity, drawing public attention to terrorist organizations, their causes and outcomes. In other words, terrorist organizations are focused on advancing their political, ideological and religious agendas. The Internet completely changed the way terrorists launder money, recruit men and communicate their ideology.The major goal of this paper is to discuss the Internet Jihad and Cyber Jihad, placing emphasis on the major aims of terrorists’ use of the Internet and communication technologies, including fundraising, money laundering, communications and recruitment. Moreover, it is necessary to explain how the use of the Internet helps to radicalize and inspire Jihad.The use of the Internet for FundraisingSome terrorist organizations use the Internet as a source of fundraising. These terrorist organizations sell DVDs, CDs, book, magazines, flags and other items over the Internet. According to researchers, â€Å"the Internet has become a popular fundraising tool for terrorist organizations†(McClellan Dorn, 2008, p. 23). The global use of the Internet provides unlimited opportunities for financiers. Many terrorist organizations may openly raise funds on their Web si tes, using popular and widely accepted pay services, such as PayPal (Pekgozlu et al., 2007).  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   In addition, terrorists not only establish fundraising practices via the Internet, but also they â€Å"increasingly conduct identity theft of ordinary Web users, including the stealing of credit card information, to help them finance terrorist attacks† (McClellan Dorn, 2008, p. 23). Fundraising plays an important role in the development of terrorist organizations because this practice is used to identify the profiles of potential financial supporter of terrorism. Terrorists use not only the profiles of visitors of the websites that promote terrorist activity, but also they use the posts found in chat rooms, bulletin boards and encourage the use of mass e-mailing to encourage donations (Acharya, 2009). There is much evidence that many terrorists attacks were funded by the money received from credit card frauds via the Internet (Acharya, 2009 ; Pekgozlu et al., 2007).The use of the Internet for Money LaunderingTerrorists use the Internet for money laundering. According to Arabinda Acharya (2009), â€Å"cyber-laundering is about using the Internet and electronic cash to turn illegally obtained money into untraceable funds†(p.68).Terrorists use e-cash as an effective tool to launder money.   It is known that radical ideologies produced by the leaders of terrorism, such as Osama bin Laden and Ayman al-Zawahiri, were posted via the Internet in the form of appeals for money. These appeals were found in speeches and statement placed on web sites. The leaders of terrorist organizations recognize the powerful role of the Internet in money laundering, encouraging all Muslims and supported of terrorism to contribute money for the growth of jihad. In Osama ben Laden’s message, there was an appeal to all Muslims to provide support to â€Å"their bothers in Iraq with money and men† (Acharya, 2009, p. 68).In add ition, many jihadist leaders state that monetary contribution provided my all Muslims and terrorism supporters is similar to physical engagement in jihad’s operations. There have already been many calls for donations on the Internet. For example, the website developed by Harkat ul-Mujahidin, terrorist group from Pakistan, argues that â€Å"Allah gives an opportunity to take part in the struggle for Muslim rights – jihad† (qtd. in Acharya, 2009, p. 68). Undoubtedly, these appeals for jihad donations can be assessed as extremely influential because of the widespread anti-West politics (Acharya, 2009).The use of the Internet for CommunicationsToday terrorists use the Internet for different forms of communication. According to researchers, â€Å"the jihad terrorism web infrastructure websites suddenly emerge, frequently modify their formats, swiftly disappear or change their online address†(Bockstette, 2010, p. 18). The communication strategy developed by ter rorists promoted the ideas of jihadist leaders. The first online terrorist magazine was published in 2003. Although the number of jihadist websites was reduced due to the work of law enforcement agencies, terrorists continue to use different strategies for the promotion of their Internet communication. They use forums and blogs to disseminating their ideas as propaganda of their activity. As a rule, these forums and blogs offer access to the proper files, which are stored on free storage sites. According to researchers, â€Å"since this material is spread over numerous web servers located all-round the globe, blocking access to these files becomes virtually impossible† (Bockstette, 2010, p.18).In fact, terrorist are focused on a particular target groups in their communications. As a result, the messages and the channels selected for these messages are tailored to the needs and requirement of the target groups, e.g. the use of different languages, the age, race and ethnicity o f the representatives of the target groups, etc. (Acharya, 2009). According to researchers, terrorists â€Å"determine the location and timing of their actions to satisfy media criteria for news worthiness that fit in with the media’s deadlines and news cycles in order to effectively reach the desired audience† (Bockstette, 2010, p.18). Thus, many jihadist leaders prefer to use the Internet communication because it provides an opportunity to communicate in real time.In addition, the Internet communication provides an opportunity to promote terrorist knowledge in the form of educational sessions specially developed for the followers of terrorists. Researchers believe that terrorists use online communication to gather intelligence and distribute the required information.   Online communication allows terrorists to â€Å"operate like decentralized franchises or freelancers† (Bockstette, 2010, p.18). Due to decentralized terrorist networks, online communication al lows terrorist groups to function as the so-called virtual international organizations, which have the ability to reach the audiences in different parts of the world. According to researchers, â€Å"terrorists can also use the Internet communication as a tool of psychological warfare through spreading disinformation, delivering threats and disseminating horrific images†(Conway, 2006, p. 283).The use of the Internet for Recruitment  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The Internet is used by terrorist groups for recruitment of jihadists, including suicide bombers for committing attacks, the killers, the kidnappers, the engineers and the soldiers. It has been found that the groups of jihadists do not always participate in training of recruits via the Internet. They try to use different approaches (Acharya, 2009).   However, in 2004, the groups of Al-Qaeda located in the Arabian Peninsula used the Internet to promote training practices of recruits. According to research ers, Al-Qaeda launched a specially developed magazine Muaskar Al-Battar to enhance the process of training and preparation of recruits and â€Å"attempted to instigate current and potential jihadists to use this knowledge to create additional camps and cells† (McClellan Dorn, 2008, p. 25).  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Moreover, recruitment of soldiers by jihad groups via the Internet offers terrorists massive opportunities for successful operations. Without recruitment, terrorism cannot exist. Terrorist recruitment via the Internet provides a number of advantages: easy access to the proper information, the global reach and interactive communication (McClellan Dorn, 2008).The role of the Internet and communication technologies in promoting, inspiring and radicalizing JihadThe Internet helps to radicalize and inspire Jihad. According to researchers, â€Å"the Internet is not merely used by Salafi-Jihadist operatives as a tool to stage terrorist attacks but als o fulfills several important needs for the rank and file† (McClellan Dorn, 2008, p. 23). The Internet has become an important tool for those who want to participate in the so-called larger Muslim umma† promoting a sense of identity, empowerment and solidarity. The Internet is used by terrorists to â€Å"generate forum where individuals who feel humiliated and jilted can regain a sense of community, solidarity, brotherhood and new identity† (McClellan Dorn, p. 26). Globalization helped terrorists to solidify the establishment of Muslim identity and promote solidarity, uniting many terrorists by means of new technologies.In addition, the Internet can be viewed as an influential tool for the activities of jihadists because it â€Å"helps them to celebrate such victories as the attacks of 9/11, thus humiliating their enemies, while undoing their own humiliation, which they claim to have endured through centuries of perceived anti-Muslim policies and Western subjuga tion† (McClellan Dorn, 2008, p. 26). For example, in 2006, terrorists published propaganda to celebrate their victory. The video clip was called Attack on Manhattan. It provided much information on the event 9/11 from terrorists’ perspective, including the interviews with two suicide hijackers.In general, jihadists are interested in continual usage of the Internet, although they â€Å"seek to overcome in cyberspace specific obstacles they face from armies and police forces in the physical world† (Coll Glasser, 2005, p.1).   In the process of planning terrorist attacks, radical operatives, involved in the spread of terrorism, find themselves at high risk while crossing the border with false documents. Undoubtedly, they feel themselves much safer when they are working on the Web. Terrorists understand that â€Å"both time and space have in many ways been conquered by the Internet† (Coll Glasser, 2005, p.1). As a result, the number of active jihadist-rel ated Web sites has been increased since September 11, 2001. There were more than 5000 Web sites in 2005. Today these numbers are even more dramatic.   Furthermore, terrorist organizations â€Å"have become expert at using the Internet to manipulate both public opinion and media coverage in ways that undermine American interests† (Lachow Richardson, 2007, p.1).ConclusionThus, it is necessary to conclude that terrorist groups use the Internet and communication technologies to present their goals, disseminate propaganda and recruit new followers and supporters.   The anonymous nature of the opportunities provided by the Internet attracts attention of terrorists. Although the Internet protects the privacy and confidentiality of its users, at the same time, it makes it difficult to identify those users who are engaged in illegal activities.   Online communication allows jihad organizations to maintain and promote group identity, radical ideology and indoctrination. Terroris ts use the Internet communication as a tool of psychological warfare through spreading disinformation, which inspires fear in people that is caused by delivering threats and publicizing horrific images of victims of terrorism. The Web sites created by jihad organizations are linked indirectly through association of belief and ideology, belonging to some community, which tend to connect them all into the virtual jihad community.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.