08.11.2014 Views

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

of the SITE Institute, a nonprofit group in the District monitoring terrorist sites<br />

for the federal government, believes that Abu Musab al Zarqawi, Iraq’s most<br />

wanted guerilla leader, is revered due to the Internet. 100 Journalist Ariana<br />

Eunjung Cha summarized how these attributes of the Internet work for the<br />

terrorist:<br />

He calls himself Abu Maysara al Iraqi, or father of Maysara the Iraqi,<br />

and he’s a master at being everywhere and nowhere in the virtual<br />

world, constantly switching his online accounts and taking advantage<br />

of new technologies to issue his communiqués to the world. Acting as a<br />

spokesman for Abu Musab al Zarqawi …his words and images reach<br />

millions of people when they open their newspapers, turn on their TVs<br />

or go online in search of news. …Abu Maysara declared in a Sept. 19<br />

posting that he issues his reports so that his perspective “does not<br />

become lost in the media blackout that America imposes in order to<br />

deceive its people and its allies.” …With more than 1 billion linked<br />

computers, …technology allows users to mask their identities and<br />

change them on a whim by throwing away old email accounts and<br />

creating new ones. …A message that appears to come from Australia,<br />

for instance, may actually come from someone who has accessed the<br />

Australian computer by going through the Netherlands via South Korea<br />

(news - websites) after originating in Jordan. 101<br />

What are some other advantages that the Internet offers to the insurgent<br />

to mobilize the masses? The Internet offers flexible identity, the transmission of<br />

altered perceptions, equalized status, recordability, and control from a distance<br />

almost instantaneously. The outlets to communicate these methods were not<br />

available earlier, which limited the spread of an ideology’s mass appeal. Now<br />

insurgents can use the Internet to conduct one-sided story telling. It also allows<br />

for the means to promote intent, actions, counterreactions, and is often quoted<br />

by the “real press” even in the West during a crisis. While civilized nations<br />

worry about a mixture of technical, diplomatic, and legal actions to be effective,<br />

terrorists worry about none of this. Finally, the insurgent is no longer confined<br />

to defensive, offensive, and stalemate operations as US army doctrine states.<br />

The forms or types of Internet actions are radically different. Insurgents can<br />

conduct command and control operations, recruit new members, develop<br />

profiles, raise funds for their cause, develop means to hide messages in photos<br />

or files, conduct counterpropaganda, and conduct ideological mobilization and<br />

manipulation, among other actions.<br />

100 Ariana Eunjung Cha, “From a Virtual Shadow, Messages of Terror, Washington<br />

Post, 2 October 2004, Internet version.<br />

101 Ibid.<br />

52

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!