Terrorists and the Internet

It is very trifling that policy prescriptions on this current threat of terrorism on the internets are not much adhered to. For this reason this paper is presented so that policy recommendations could be done even before the next generation of cyber angst comes. As of the moment Gabriel Weimann of Haifa University indicated that the numbers of terrorist sites are almost 4,800 in 2004.

They use the Internet as significant tool to communicate, plan and provide instructions, share information, even coordinate attacks and critical attacks against other terrorists, recruit people or new members, spread erroneous propaganda, raising funds, data mining, and research of possible targets. Terror in the Internet is sometimes magnified by the media since its impact can affect the wider public. Weimann examines how the internet was being exploited by terrorists group and establishes countermeasures on how to combat terrorism.

List of terrorist groups such as: “Hezbollah, Hamas, Ansal al-Islain, Al-Qaeda, Irish Republican Army, Revolution Armed Forces of Columbia, Japanese Aum Shinrikyo, and the insurgent groups of Iraq. “ Thru these websites, one could analyze the extent of the terrorists’ propaganda. Knowing that terrorism cannot be eradicated soon, he suggested that government must seek for compromise to prevent abuse in the use of the internet by its proactive presence and promoting peaceful use.

However, the threat that terrorist can launched an attack thru the internet is still not viable until the next generation since hacking devices are not that sophisticated yet. Hackers may have created their online mischief to post vast psychological fear among us but no instance that cyberterrorism was confirmed. The only thing they can do is distribute virus and hack into electrical grids security systems (2006) Kaplan. Likelihood of launching an attack via internet is still very remote although the Al Qaeda is known to be training on the hacking techniques.

Terrorist’s websites serves as training grounds or tutorials on how to build bombs, firing missiles or shooting a US soldier and, hosting propaganda videos. Internet also offers an encryption tool that makes correspondence efficient and secure which makes it accessible to anyone with a password. Terrorists can transmit graphic files or hide messages saved on email drafts. They can even accept donations via Paypal thru on line services. Government makes surveillance to such sites but is hampered by civil liberties and other factors.

For these, terrorists continue to use Internet as an effective and powerful means of communication with their fellow terrorists and with the world. They have increased in number since the Iraq war. Pentagon before Congress said that 100 of the 5,000 jihadi websites that they monitor are hostile. Some games it offers for young users are holy warriors killing U. S. soldiers. Terrorist disciples also have created Irhaby 007 of which through the web seminars like Hacking Seminar websites reached and expanded around the globe.

Another threat is a video of Juba, a well trained sniper who killed 143 soldiers in a year and posted those killings on the web. Hoax sites can also be proven as terrorist sites. All these online terrorists propaganda has proven effective and are widely viewed by a big part of our society and around the globe. When the September 11 happened the terrorists went into Cyber fraud. The bad guys use the Internet to get money from credit cards theft to pay for their operations. More often credit cards numbers are swiped by the use of hacking. They send fraudulent emails to get personal information’s.

During the past months these groups of cyber terrorists created many incidents of theft and money hijacked even on secured websites. Experts fears that these problems may create cyber strike. They are keener nowadays and victimizing many people and yet they are harder to find. Government stops terrorist’s online activities: A very quick reaction is to shut down the site but according to Kohlmann doing so will make us loose valuable information. It is the webmaster that must be stopped not the terrorist website since by doing so it will only be a temporary disruption.

Richard Clarke, the former White House head of counterterrorism called for the appointment of a cyber security czar in the White House to coordinate actions between the FBI, CIA and other government agencies (E. 2008). ” Officials have wanted to solve the problem by creating a phony terrorist websites. For instance giving instruction that there is a bomb in the building and that it may explode and kill the one who installed it, such misinformation could lead to confusions. However, it is not advisable to do it all the time to counter act cyber terrorism and is only recommended that this tactic must be used sparingly.

Reference