10.07.2015 Views

Historical Dictionary of Terrorism Third Edition

Historical Dictionary of Terrorism Third Edition

Historical Dictionary of Terrorism Third Edition

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

INTERNET • 277talist websites and chat rooms consists not so much <strong>of</strong> exchanges <strong>of</strong>tactical information but rather <strong>of</strong> arguments over which tactics andtargets are, or are not, “permissible” according to their own interpretation<strong>of</strong> Islamic law.The advantages for terrorists <strong>of</strong> using the Internet include thelack <strong>of</strong> effective censorship or control over the Internet by nationalor international authorities; the anonymity <strong>of</strong> its communications,which dovetails with the terrorist group’s requirement <strong>of</strong> clandestinityin order for it to evade <strong>of</strong>ficial repression; and the ability <strong>of</strong>otherwise isolated terrorist groups, individuals, and their supportersto achieve synergy through networking, pooling their resources, andcoordinating their actions and statements in campaigns <strong>of</strong> netwar.Another new peril <strong>of</strong> the Internet-enabled terrorist is that <strong>of</strong> an enhancedcontagion effect <strong>of</strong> terrorist ideas and technology: no longermust would-be jihadists or ethnonationalists physically contact aterrorist recruiter, travel to a training camp, and receive sophisticatedtraining in scouting, evasion, and bomb-making techniquesto become an active terrorist. The aspiring novice can now acquirebomb-making instructions via the Internet and then, by reading theblogs on successful and unsuccessful bombing operations as well asother coverage <strong>of</strong> effective counterterrorism measures, continuallyupgrade his terrorist skills. This process <strong>of</strong> learning and improvementthrough feedback using the information made availablethrough the mass media and the Internet is what intelligence analystsnow label “emergent intelligence,” in which all participants developmore sophisticated tactics and effective strategies. The sheer mass <strong>of</strong>Internet communications makes it much more difficult for nationalintelligence agencies to surveil as-yet unidentified terrorist Internetchannels. However, even in the case <strong>of</strong> known terrorist channels,encryption programs (for encoding text communications) and steganography(a means <strong>of</strong> hiding text messages within a graphic file)allow the terrorists to evade or reduce the effectiveness <strong>of</strong> externalsurveillance <strong>of</strong> their channels.A major advantage <strong>of</strong> the Internet for terrorists is that it enablesthem to bypass the regular mass media in order to contact their targetaudience, whether that is the enemy being attacked or the largerconstituency they claim to serve. In the 1990s, as the traditional massmedia and news agencies became more aware <strong>of</strong> the CNN syndrome,that is, their unwittingly allowing themselves to become co-opted by

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!