The Internet enhances global collaboration and communication, but this technology can be considered a double edge weapon. If these uses are plausible, the same can be said for terrorist and other criminal networks. Terrorist use the Internet for multiple purposes in furtherance of their political or religious goals. This is only the beginning and unfortunately as long as technology keeps advancing, terrorism will as well.
2. What is Terrorism?
Not new
Has many different definitions depending on Culture /
Countries
One mutual definition is “not an accident”
Attack is often very choreographed
3. Propaganda:
Media
Very unique relationship
Both trying to increase view
Media dramatizes and
increase intentions of
Terrorist
Giving the terrorists
more publicity and
attention
4. Propaganda: Importance
Provides growth and longevity
Distribution of ideology, intentions,
instructions, and justify actions
Target?
6. Propaganda: Justification
1) “No choice”
Document from UN declaring unfair human rights
2) Demonizing
Gov’t are MONSTERS! Powerless!
3) Peaceful nonviolent
Hide their true intentions, really are violent
4) Religious
Do not hide at all, promote human suffering
7. Propaganda: Recruitment
Online Communities
Echo effect
Target vulnerable populations
College dropouts, youths
Desensitize them though video games, cartoons
Selling behind the counter videos
9. Financing: Donations and
Marketing
On websites, donations buttons
For those recruited and those who wish to stay hidden
Selling merchandise
Shirts, coffee cups, etc.
10. Financing: illegally
Though fraudulent means
Credit card theft, identity theft
Shell Companies
Laundering money though a company not related to
terrorism at all (undetectable)
Ex/ Aum Shinrikyo- Chemical Weapons shell
12. Training
Use Internet
Cheaper, reach more people
Provide online tutorials in
Short films, documents, outlines, and even checklists
Bomb making, border jumping, suicide vests
Online Help?
13. Training
Magazine called “Inspire” (AQAP)
Bomb making article “MAKE A BOMB IN THE KITCHEN OF YOUR MOM”
Turn your car into a 4-WHEEL DRIVE for a quick get away!
14. Training
Terrorist organizations stress importance on
improving tactics
Build and redesign (IED’s) (Weapons)
Training camp in Muzaffarabad in Mumbai
Much more effective to have trainings online, less
risk of exposure
15. Planning: Two
Techniques
Dead Dropping
Email is constructed, not
sent, Saved as a draft
American and British can not
hack into an email
Steganography
hiding messages in graphic
files
16. Planning: Material
Terrorists use an assortment of online material
Satellite images, military deployments, engineering
schematics
Google Maps and blue prints
Entrances, exit ways
Find best way to explode and collapse the building
Less risk exposure
17. Planning: Social Networking
Use Facebook, Twitter, and MySpace
Orkut: developed by a Google employee, similar to
Facebook
Police arrested Kamel Daoudi
18. Countering:
Techniques
Shut down Webmaster
Can be used for valuable
intelligence
Spread disinformation or
phony terrorist sites
Posting a how to make a bomb
“phony”
Deglamorize terrorists
creating a wedge between
Show victims faces
Use false military movements
as a trap
19. Countering: Difficulties
Main reason is:
Fundamental Human Rights
Freedom of privacy
Freedom of speech and expression
Not absolute right
20. Real Examples
Right wing radicals gaming
website:
www.resist.com/racistgames/
Social Networking example:
https://www.facebook.com/hezbola
h.pakistan.official
Not a new phenomenon
1st documentation was the Greeks and Romans, plotted to kill Julius Caesar
Attract most amount of attention, audience
Media needs to increase views, Terrorist need to too
With the Internet and New technology Much easier
Target? = fascinating people that are drawn to gruesome rhetoric and images on the Internet
Echo effect: encouragement to talk about and express extremists ideas
Video Games: puts users as the “holy Warrior” killing US troops
Donations: accept paypal and other forms of it
Ironic they don’t use credit cards, lack of trust?
Online help: Experts are online ready for any questions!!!
Kamel Daodi= computer engineer for al Qaeda, seized a code book with him
Change codes frequently (too late)
Webmaster= can shut down website over and over but it will just keep returning.
“Phony”= bomb blows while making it
Victims= to show how its not a “faceless victim”
Absolute= one incites discrimination, hostility, or violence, their right maybe restricted