Upload
kevin-daly
View
345
Download
0
Tags:
Embed Size (px)
DESCRIPTION
The Internet enhances global collaboration and communication, but this technology can be considered a double edge weapon. If these uses are plausible, the same can be said for terrorist and other criminal networks. Terrorist use the Internet for multiple purposes in furtherance of their political or religious goals. This is only the beginning and unfortunately as long as technology keeps advancing, terrorism will as well.
Citation preview
How Does the Internet
Impact Terrorism?
By: Kevin Daly
What is Terrorism?
Not new
Has many different definitions depending on Culture / Countries
One mutual definition is “not an accident”
Attack is often very choreographed
Propaganda: Media
Very unique relationship
Both trying to increase view
Media dramatizes and increase intentions of Terrorist
Giving the terrorists more publicity and attention
Propaganda: Importance
Provides growth and longevity
Distribution of ideology, intentions, instructions, and justify actions
Target?
Propaganda: Importance
Uploading virtual
messages, presentations,
magazines, etc.
Propaganda: Justification1) “No choice”
Document from UN declaring unfair human rights
2) Demonizing
Gov’t are MONSTERS! Powerless!
3) Peaceful nonviolent
Hide their true intentions, really are violent
4) Religious
Do not hide at all, promote human suffering
Propaganda: Recruitment
Online Communities
Echo effect
Target vulnerable populations
College dropouts, youths
Desensitize them though video games, cartoons
Selling behind the counter videos
Propaganda: Recruitment/Radicalization
Financing: Donations and Marketing
On websites, donations buttons
For those recruited and those who wish to stay hidden
Selling merchandise
Shirts, coffee cups, etc.
Financing: illegally
Though fraudulent means
Credit card theft, identity theft
Shell Companies
Laundering money though a company not related to terrorism at all (undetectable)
Ex/ Aum Shinrikyo- Chemical Weapons shell
Drug Trafficking Both trying to be financially stable
Different final goals
Financing: illegally
Training
Use Internet
Cheaper, reach more people
Provide online tutorials in
Short films, documents, outlines, and even checklists
Bomb making, border jumping, suicide vests
Online Help?
Magazine called “Inspire” (AQAP) Bomb making article “MAKE A BOMB IN THE KITCHEN OF YOUR MOM”
Turn your car into a 4-WHEEL DRIVE for a quick get away!
Training
Training
Terrorist organizations stress importance on improving tactics
Build and redesign (IED’s) (Weapons)
Training camp in Muzaffarabad in Mumbai
Much more effective to have trainings online, less risk of exposure
Planning: Two Techniques
Dead DroppingEmail is constructed, not sent, Saved as a draft
American and British can not hack into an email
Steganographyhiding messages in graphic files
Planning: Material
Terrorists use an assortment of online material
Satellite images, military deployments, engineering schematics
Google Maps and blue prints
Entrances, exit ways
Find best way to explode and collapse the building
Less risk exposure
Planning: Social Networking
Use Facebook, Twitter, and MySpace
Orkut: developed by a Google employee, similar to Facebook
Police arrested Kamel Daoudi
Countering: Techniques
Shut down Webmaster Can be used for valuable
intelligence
Spread disinformation or phony terrorist sites
Posting a how to make a bomb “phony”
Deglamorize terrorists creating a wedge between
Show victims faces
Use false military movements as a trap
Countering: Difficulties
Main reason is:
Fundamental Human Rights
Freedom of privacy
Freedom of speech and expression
Not absolute right
Real Examples
Right wing radicals gaming website:
www.resist.com/racistgames/
Social Networking example:
https://www.facebook.com/hezbolah.pakistan.official
Questions?