Internet and terrorism
This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these template messages)(Learn how and when to remove this template message)
The Internet is an electronic media that has been used to foster terror related activities by assisting with the self-radicalization process of individuals. This medium allows information to be easily distributed to those seeking conversion to a particular ideology. The activities include promotion of terror manifestos and ideology, attracting recruitment, psychological warfare, deceptions, communication and networking, fundraising, and attacks on the networks of security authorities.
Publicity and propaganda
As stated by terrorism researcher Maura Conway:
"Every machine connected to the internet is potentially a printing press, a broadcasting station or place of assembly."
The Internet is an unparalleled media suite. Terrorists no longer have to have their messages diluted and edited by the media. Instead they can disseminate information of their choice to aid their causes. In most cases, this is achieved by the terrorists focusing on their grievances in order to justify why they are resorting to terrorist activities. This is usually achieved by the publication of various articles combined with pictures galleries, although this may be supplemented by video and audio files in which the terrorists themselves orally defend their actions. An example of this would be a gallery of atrocities against innocent civilians in Iraq supposedly carried out by foreign forces in order to generate local as well as international support for the terrorists.
Majority of terrorist websites don't celebrate their heinous acts or destruction, however they do focus on two issues: the restrictions placed on freedom of expression and the plight of comrades who are now political prisoners. They also employ three rhetorical structures that justify their reliance on violence: 1) Terrorists have no other choice than to turn violent, 2) Members, who are allegedly classified as being 'freedom fighters', are obligated to commit violence because of the ruthless aggression brought upon by their adversary, and 3) To make extensive use of the language of nonviolence.
The first type of cyber terrorism created by Al-Qaeda was the Al-Neda Center for Islamic Study and Research which was created by the former bodyguard of Bin Laden, Shaykh Youssef al-Ayyiri. He created an Al-Qaeda propaganda video on the internet which had several audio messages from al-Ayyiri in which he stated: “In the first stage, the stage of attrition and engaging the enemy in battle, you need to make your enemy tired more than you need to kill a large number of its members. You need to scatter the enemy, demoralize it, spread it out over a large area, and cause it to get tired. If the enemy is spread out, it will need supply armies and a lot of other things. You need to make the enemy reach this stage. In this stage, you should strike, run, and disappear. Strike at the weak points." (As-Sahab Media Foundation 2003) Also he wrote a book which was published on the Al-Neda Center for Islamic Study and Research site. Thus, Ayyiri, in creating the propaganda video and the book, did, in fact, cyber terrorism acts by trying to recruit more individuals for the cause, and giving instruction for potential terrorists on attacks.
The use of disinformation by terrorist groups is often used to incite fear, panic and hatred by sending threats, airing videos of brutal executions, creating psychological attacks through the use of threats of cyber-terrorism. Disinformation has been used successfully to incite violence by certain militant groups.
Disinformation may also be used to divert attention from an impending attack by releasing details of a hoax attack so that governmental and law enforcement agencies are side-tracked. However, this may not be wholly effective given the nature of current security climates; that is upon receiving information on a potential attack, the security level on all spectrums across a whole country is increased i.e. from black to black special or similar.
Terrorist groups have made full use of the Internet’s ability to create funds; whether legitimately or otherwise. The main methods that the terrorists achieve this is by:
Goods selling: merchandise that is directly related to the terrorist organisation, for example, CDs, DVDs and books from the LTTE.
Website and email based appeals: sending emails to sympathizers who registered interest on a group’s website, posting messages on newsgroups/forums and their own websites that give directions as to how and where donations can be made.
Deception: using seemingly legitimate charities or businesses that unknown to the donator, directs the funds to terrorist organisations.
Terrorist organisations are able to monitor users who browse their websites, capture their profile and information about them and if deemed possibly useful to their cause, are contacted. This grooming process starts from when the user begins to absorb the propaganda on the website, for example the often discussed "charismatic" style of delivery that Osama Bin Laden employs on his video messages. Perhaps motivated by this video, the user seeks answers to questions and goes to internet chat-rooms and discussion boards. Possible recruits are spotted by lurking recruiters who through gradual encouragement of discussion of religious issues to gradually including more political discussions. This grooming leads the recruits to become more and more entangled in terrorist related discussions and are led through a maze of private chat-room’s until personal indoctrination occurs which is often through the use of the secure software
With the proliferation of online platforms and access, terrorist organizations are also increasingly distributing propaganda aimed at encouraging extremists to "self-radicalize" and then providing them directions and suggestions for carrying out attacks in the West.
The audiences of the terrorist websites
The first group of people that will frequent these websites are current supporters and future supporters. The websites typically include information relative to their activities, their allies, and their competitors. In addition, many websites offer items for sale.
The second group of people that will enter these websites will be members of the outside community. In hopes of appealing to people all over the world, many terrorist organizations offer their websites in multiple languages. The websites typically include historical background information and general information about the organization itself.
Only some of the websites address the enemy or citizens of a country currently under attack by terrorists. The terrorists hope weaken public support within countries and in some cases will threaten attacks if the government fails to do as they ask.
Communication and networking
Terrorist groups have changed recently from having a clearly defined hierarchy in the organisations with designated leaders, to having multiple, semi-independent cells with no clear distinct leader in order to allow them to remain hidden. The Internet facilitates communication between cells which allows exchange of information and manuals. It has also helped terrorist groups gain notoriety from other groups such as 'jihadist' sites.
The Internet also assists with internal communication within a cell, particularly in relation to the planning of attacks. To avoid being detected and targeted by security forces, Messages are often sent by conspirators through emails which are often sent using public email systems such as Hotmail and Yahoo and may also be sent from public libraries and internet cafes. Chat rooms may also be used for this purpose.
In addition, steganography may be used to hide information embedded within graphic files on websites. Graphic files may also used to send very subtle messages, such as reversing the orientation of a gun graphic may indicate that the next stage of a plan is to proceed. Other methods of concealing instructions and messages may be through the use of coded language, such as that used by Mohamed Atta's final email to the other terrorists who carried out the attacks of 9/11 is reported to have read:
The semester begins in three more weeks. We've obtained 19 confirmations for studies in the faculty of law, the faculty of urban planning, the faculty of fine arts, and the faculty of engineering.
This is believed to be in reference to the four targets that the planes were planned to strike; 'architecture' being the World Trade Center, 'arts': the Pentagon, 'law': the Capitol and 'politics': the White House.
An even more secure method of communication is that which involves using one-time anonymous public email accounts; two terrorists who wish to communicate to open 30 anonymous email accounts whose usernames and passwords are known by each side. To communicate, one terrorist creates a web-based email and instead of sending it, saves it as a draft online. The "recipient" then logs onto this account, reads this message and deletes. The next day, a new account is used; this increases the difficulty of traceability of the users.
Website defacement and propaganda
Website defacement is used by a number of terror organizations to promote propaganda messages. Junaid Hussain, a British computer hacker who was jailed in 2012 for hacking Tony Blair's accounts, was suspected of masterminding the defacing of the Twitter pages of the U.S. Central Command, Newsweek and the International Business Times. Hussain was placed on the Pentagon's "kill list" and was taken out by a drone strike.
During the January 2015 Île-de-France attacks a number of French municipalities had their websites defaced with terrorist propaganda. The French TV network TV5Monde was targeted by a cyberattack that compromised their network in April 2015.
The American media has often run alarmist stories about large-scale cyber-terror attacks shutting down the whole internet.
Several academics that study terrorist groups argue that they utilize the Internet to communicate and collaborate, and therefore the terrorists have stronger reasons to keep it up and running. – see section entitled Disinformation. The United States Government used fears of cyber-terrorism to push though the USA Patriot Act, that expanded the government's ability to record electronic communications.
A large amount of public information is available on the internet, including publicly available maps and building details that could be searched for by a person planning a terror attack. U.S. Secretary of Defense Donald Rumsfeld said in 2003 that an al Qaeda training manual recovered in Afghanistan tells its readers that "Using public sources openly and without resorting to illegal means, it is possible to gather at least 80 percent of all information required about the enemy."
- Al-Qaeda § Internet
- Homegrown terrorism § Role of the internet
- Jihadist extremism in the United States § Internet
- Terrorism and social media
- Conway 2003: 271
- Www.terror.net: How Modern Terrorism Uses the Internet. DIANE Publishing. 2004. pp. 2–. ISBN 978-1-4379-0416-1.
- Evan F. Kohlmann, ""Homegrown" Terrorists: Theory and Cases in the War on Terror's Newest Front", American Academy of Political and Social Science (July 2008):618.
- "Mumbai riots: Inflammatory messages of Myanmar killings led to violence". Dainik Bhaskar. 8 October 2012. Retrieved 8 October 2012.
- "www.eelamstore.com". www.eelamstore.com. Retrieved 2009-12-13.
- Gruen 2003: 298
- "Terror's Server". Technology Review. Retrieved 2009-12-13.
- "Homegrown Islamic Extremism in 2013 The Perils of Online Recruitment & Self-Radicalization". ADL. Retrieved 8 April 2014.
- Weimann 2004: 12
- "Terrorism and the Internet: New Media—New Threat?" (PDF) – via Dublin City University.
- "ITAC Presents". Archived from the original on 13 July 2007.
- "ISIS "Cyber Caliphate" Hacks U.S. Military Command Accounts". TechCrunch. AOL. 12 January 2015.
- RFSID. "Cyber Caliphate: ISIS Plays Offense on the Web". Recorded Future.
- "DailyTech - Anonymous vs. the ISIS Cyber Caliphate -- War in the Middle East Goes Digital". dailytech.com.
- Thomas Halleck (14 January 2015). "Junaid Hussain: CyberCaliphate Leader And ISIS Member Was Behind CENTCOM Hack, Report Says". International Business Times.
- Emma Graham-Harrison. "Could Isis’s ‘cyber caliphate’ unleash a deadly attack on key targets?". the Guardian.
- Jamie Dettmer. "Digital jihad: ISIS, Al Qaeda seek a cyber caliphate to launch attacks on US". Fox News.
- "ISIS is ramping up efforts to mount a massive cyber attack". Security Affairs.
- Sam Biddle. "Investigators Think This UK ISIS Defector Is Behind the CENTCOM Hack". Weird Internet. Gawker Media.
- Tara Seals. "ISIS Likely Behind Cyber-attack Unmasking Syrian Rebels". Infosecurity Magazine.
- Tim Lister, CNN (7 May 2015). "Cheerleaders and freelancers: new actors in terrorism - CNN.com". CNN.
- "British hacker is No 3 on Pentagon 'kill list'". The Sunday Times. August 2, 2015. Retrieved September 1, 2015.
- "Junaid Hussain: How a Boy From Birmingham Became ISIS's Leading Hacker". Newsweek. August 27, 2015. Retrieved September 1, 2015.
- Michael Safi (August 12, 2015). "Isis 'hacking division' releases details of 1,400 Americans and urges attacks". The Guardian. Retrieved September 1, 2015.
- Charlotte Meredith (August 28, 2015). "The Islamic State's Top Hacker Was Killed in a US Drone Strike". VICE. Retrieved August 29, 2015.
- James Cartledge (September 16, 2015). "Isis terrorist Junaid Hussain killed in drone attack after boffins 'crack group's code'".
- "North African hackers infiltrate 100s of French websites". Middle East Eye. 13 Jan 2015.
- Johnlee Varghese (13 Jan 2015). "Hackers Target Websites of French Govt, Schools, Universities, Companies". International Business Times.
- "France hit by unprecedented wave of cyber attacks". CBS News. 15 Jan 2015.
- "French TV network TV5Monde 'hacked by cyber caliphate in unprecedented attack' that revealed personal details of French soldiers". The Independent. 9 April 2015. Retrieved 9 April 2015.
- "Americas | US warns of al-Qaeda cyber threat". BBC News. 2006-12-01. Retrieved 2009-12-13.
- Dawson, Maurice; Omar, Marwan; Abramson, Jonathan (2015). "Understanding the Methods behind Cyber Terrorism". In Khosrow-Pour, Mehdi. Encyclopedia of Information Science and Technology (Third ed.). Hershey, PA: Information Science Reference. pp. 1539–1549. doi:10.4018/978-1-4666-5888-2.ch147. Retrieved 2014-12-03.
- http://www.usdoj.gov/ag/manualpart1_1.pdf - see section entitled Networking
- Weimann 2004: 7
- Weinberg et al. (2004) “The Challenges of Conceptualizing Terrorism”, Terrorism and Political Violence, 16(4), 777 – 794.
- Arquilla et al. (1999), “Networks, Netwar, and Information-Age Terrorism” in Terrorism and Counterterrorism: Understanding the new security environment (2004) The McGraw-Hill Companies.
- Conway M. (2003), “Terrorism and IT: Cyberterrorism and Terrorist Organisations Online” in Terrorism and Counterterrorism: Understanding the new security environment (2005) ed. Rohan Gunaratna. Marshall Cavendish Academic
- Costigan S. (2007), "Terrorists and the Internet: Crashing or Cashing In?" in Terrornomics (2007) ed. Sean Costigan and David Gold. Ashgate.
- Gruen M. (2003) “White Ethnonationalist and Political Islamist Methods of Fundraising and Propaganda on the Internet in Terrorism and Counterterrorism: Understanding the new security environment (2005) ed. Rohan Gunaratna. Marshall Cavendish Academic.
- Weimann G. (2004) www.terror.net How Modern Terrorism Uses The Internet. United States Institute of Peace www.usip.org/pubs/specialreports/sr116.pdf Retrieved on 09/04/2007.
- Thomas T.L. (2003) Al-Qaeda and the Internet: The Danger of “Cyber-planning” www.carlisle.army.mil/usawc/Parameters/03spring/thomas.pdf Retrieved on 09/04/2007
- Hoffman. B (2006) The Use of the Internet by Islamic Extremists. RAND Cooperation. www.rand.org/pubs/testimonies/2006/RAND_CT262-1.pdf Retrieved on 03/04/2007
- Ducol. B (2012) Uncovering the French-speaking jihadisphere: An exploratory analysis. Media, War & Conflicts 5(1), 51-70.
- Kohlmann. E (2008) "Homegrown" Terrorists: Theory and Cases in the War on Terror's Newest Front, "American Academy of Political and Social Science", 618,p. 95-109
- Lewis, Jeff (2005) Language Wars: The Role of Media and Culture in Global Terror and Political Violence, Pluto / University of Michigan Press, London.
- Podesta & Goyle (2005) "Lost in Cyberspace? Finding American Liberties in a Dangerous Digital World", "Yale Law & Policy Review", 23 (2).
- Lewis, J (2005) "The Internet and Terrorism", "Proceedings of the Annual Meeting (American Society of International Law)", 99.