.

Tuesday, April 30, 2019

How Modern Terrorism Uses the internet Research Paper

How Modern Terrorism Uses the earnings - Research Paper ExampleThe Internet provides terrorists with some(prenominal)(prenominal) advantages. For example, terrorists could operate in a clandestine dash from a distance. Such endeavors could be across national and continental borders, and could be conducted without fear of detection or regulation. The expenditure and risk involved in cyber attacks are significantly lower than a physical attack. Furthermore, cyber attacks tilt to attract the attention of the media to a considerable goal (Why Terrorists Use the Internet, 2005). These advantages are off setted by several disadvantages. For instance, the intricacy and distri onlyed nature of the Internet makes it very difficult to control a terrorist attack and achieve the sought-after(a) for objectives. Terrorist attacks on the Internet chiefly cause economic damage, and there is very little scope for employing much(prenominal) attacks to cause physical harm (Why Terrorists Use th e Internet, 2005). As such, a terrorist attack that does not entail remnant and injury attracts less attention and is therefore less effective in spreading terror. Moreover, terrorists host websites that unwrap terrifying videos of their brutal murders. One such video showed the brutal killing of an American journalist by the Moslem terrorists. The Islamic terrorist group, Al Qaeda employs advanced communication technology in conjunction with multimedia, in order to engage in a highly sophisticated form of psychological warfare (Weimann, 2004). The al Qaeda has unremittingly declared via its websites that its attack on the World Trade Center served to significantly damage the US economy, in addition to causing severe psychological damage to the populace. This contention has been borne out to some extent by the weakening of the dollar and the diffidence generated in the US economy, at the national and international take (Weimann, 2004). Moreover, the Internet provides a convenien t means for raising funds for not only political organizations, but also terrorist groups. In addition, terrorist groups employ the Internet to recruit and mobilize cadres. Terrorist organizations not only use the discordant web technologies to enhance their allure, but they also collect information about the entities that browse through their websites (Weimann, 2004). In addition, technical information regarding the manufacture and use of volatiles is readily available on the Internet. For instance, there are several websites that post The Anarchist Cookbook and The Terrorists Handbook. These are detailed manuals for manufacturing a vast array of explosive devices (Weimann, 2004). A major use of the Internet made by terrorist groups is for planning and coordinating terrorist attacks. The September 11 attacks were witness to the large scale use of the Internet by the al Qaeda to mount its murderous attacks. A large number of encrypted messages were retrieved by federal officials f rom the computer of the al Qaeda terrorist Abu Zubaydah, the monster who had masterminded these extraordinary attacks (Weimann, 2004). Realizing the benefit being derived from the Internet, by the terrorists, the US Government embarked upon a counterterrorism strategy. This strategy was aimed at infiltrating the message boards of the Islamic terrorists. In addition, the staunch ally of the US, namely the UK was successful in hacking an English language online magazine of the al Qaeda (Ackerman, 2011). Moreover, in the UK, the Home Office had proposed that filtering software was

No comments:

Post a Comment