10.07.2015 Views

Historical Dictionary of Terrorism Third Edition

Historical Dictionary of Terrorism Third Edition

Historical Dictionary of Terrorism Third Edition

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

lxii • INTRODUCTIONTHE GROWING TERRORIST THEATER OF OPERATIONS:THE INTERNETPerhaps the most glaring gap in the introduction to our first editionwas the lack <strong>of</strong> any discussion <strong>of</strong> the role <strong>of</strong> the Internet in the changingface <strong>of</strong> terrorism. In the second edition we discussed the use <strong>of</strong> theInternet for recruitment and propaganda, for the waging <strong>of</strong> “netwar”campaigns, and also as a means for cyber-warfare attacks on targets. Inthis edition we note the interplay <strong>of</strong> Internet capabilities, intelligence,and “emergent intelligence,” both for terrorist actors and for counterterrorismpr<strong>of</strong>essionals.Certainly the Internet provides terrorists at the outset with an expandingcapability to engage in what could be called “electronic unarmed propaganda.”A web page, for example, gives a terrorist group <strong>of</strong> three, thirty,or three hundred the ability to publish its manifesto through the anonymity<strong>of</strong> cyberspace. Perhaps even more significant, the Internet provides themeans by which various terrorist groups can maintain their security via theanonymity <strong>of</strong> cyberspace but increasingly have the ability and opportunitiesto coordinate operations with highly diverse groups that may share ageneral strategic goal <strong>of</strong> destabilizing a city, a country, or a region.More significant is the fact that the Internet enables terrorists toengage in what is called “netwar.” In so doing they are now evolvinginto self-contained, “free-floating cells” that can engage in concerted attacks,but which may remain essentially free from the need for externalsupport, be it state or non–state sponsored. As such, groups will continueto be increasingly difficult to identify, since many may be smallwith no track record, and also difficult to penetrate, since they are notpart <strong>of</strong> a larger organization that can be placed under surveillance bytechnical intelligence or infiltrated by a hostile intelligence service. Inthe past it was understood that even the most sophisticated techniques<strong>of</strong> technical collection could not monitor the person-to-person discussion<strong>of</strong> two terrorists in a safe house in Beirut or Tokyo. It will continueto be a daunting technological task to separate “the noise from the signal”in the cacophony <strong>of</strong> cyberspace. Already the global war on terrorismhas raised controversies over the need <strong>of</strong> governments to eavesdropand to monitor Internet and telephone communications over the rights<strong>of</strong> privacy <strong>of</strong> ordinary individuals.While concerns have been voiced over the development <strong>of</strong> a socalledcyberterrorism, this term is too general for analysis. As was

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!