Thursday, June 13, 2019
How Modern Terrorism Uses the internet Research Paper
How Modern Terrorism mathematical functions the internet - Research Paper ExampleThe profit provides terrorists with several advantages. For example, terrorists could run away in a clandestine manner from a distance. Such endeavors could be across national and continental borders, and could be conducted without fear of detection or regulation. The expending and risk involved in cyber attacks are significantly lower than a physical attack. Furthermore, cyber attacks tend to attract the attention of the media to a considerable extent (Why Terrorists Use the Internet, 2005). These advantages are off setted by several disadvantages. For instance, the intricacy and distributed nature of the Internet makes it very difficult to control a terrorist attack and achieve the sought for objectives. Terrorist attacks on the Internet chiefly cause economic deterioration, and there is very little scope for employing such attacks to cause physical harm (Why Terrorists Use the Internet, 2005). A s such, a terrorist attack that does not entail death and injury attracts less attention and is therefore less effective in spreading terror. Moreover, terrorists host websites that display marvelous videos of their brutal murders. One such video showed the brutal killing of an American journalist by the Islamic terrorists. The Islamic terrorist group, Al radical employs advanced discourse technology in conjunction with multimedia, in order to engage in a highly sophisticated form of psychological warfare (Weimann, 2004). The al Qaeda has unremittingly declared via its websites that its attack on the World Trade Center served to significantly damage the US economy, in addition to causing severe psychological damage to the populace. This contention has been borne out to some extent by the weakening of the dollar and the diffidence generated in the US economy, at the national and international level (Weimann, 2004). Moreover, the Internet provides a convenient means for raising fun ds for not only political organizations, but also terrorist groups. In addition, terrorist groups employ the Internet to recruit and tantalise cadres. Terrorist organizations not only use the various web technologies to enhance their allure, but they also collect information about the entities that browse through their websites (Weimann, 2004). In addition, technical foul information regarding the manufacture and use of explosives is readily available on the Internet. For instance, there are several websites that post The Anarchist Cookbook and The Terrorists Handbook. These are precise manuals for manufacturing a vast array of explosive devices (Weimann, 2004). A major use of the Internet made by terrorist groups is for planning and coordinating terrorist attacks. The September 11 attacks were proclaim to the large scale use of the Internet by the al Qaeda to mount its murderous attacks. A large number of encrypted messages were retrieved by federal officials from the ready rec koner of the al Qaeda terrorist Abu Zubaydah, the monster who had masterminded these iniquitous attacks (Weimann, 2004). Realizing the benefit being derived from the Internet, by the terrorists, the US Government embarked upon a counterterrorism strategy. This strategy was aimed at infiltrating the message boards of the Islamic terrorists. In addition, the staunch ally of the US, namely the UK was successful in hacking an English language online magazine of the al Qaeda (Ackerman, 2011). Moreover, in the UK, the Home Office had proposed that filtering software was
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.