Essay on the Use of Internet by Terrorist Organizations

Topics:
Words:
2674
Pages:
6
This essay sample was donated by a student to help the academic community. Papers provided by EduBirdie writers usually outdo students' samples.

Cite this essay cite-image

The Internet has demonstrated to be a powerful means of communication that reaches people worldwide. The improvement of progressively advanced technologies has made a network with a worldwide reach, and generally low hindrances to entry. Internet innovation makes it simple to speak with relative obscurity, rapidly and adequately across borders, to a great gathering of people. The advantages of Internet innovation are various, beginning with its remarkable suitability for sharing information and thoughts, which is perceived as a human right (UNODC, 2012, p. 3). Although the advancements of the Internet have massive downsides as well since it has become an important source of communication for terrorist groups. Practically, all terrorist organizations are misusing the Internet for their terrorist purposes and broadcasting propaganda through their Web sites. From 2005 to 2006, Al Qaeda quadrupled its creation of videos and utilized an expected 4500 jihadist sites to spread its messages. These online media crusades have just kept on developing (Guadagno, Lankford, Muscanell, Okdie, & McCallum, 2010, p. 28). Terrorist organizations are using social media in order to recruit, train, incite their individuals, and to finance their organization. Therefore, increasing involvements of terrorist groups with social media networks are expanding the danger of terrorist operations worldwide.

In general, terrorism is seen as a multidimensional and complex phenomenon. However, this does not preclude the need for defining it. First of all, most authors agree on the fact that terrorism is a violent act. Furthermore, many scholars argue that there is a psychological aspect of terrorism. The aim of terrorism is to create fear and spread panic among individuals within a population. Additionally, political terrorism includes achieving a certain political objective. These objectives differ among terrorist organizations, groups or individuals (MOZAFFARI, 1988, p. 181). Terrorism exists for centuries, however, the contemporary globalized world changes it. For example, globalization created a fast and international infrastructure of open markets, societies, and technologies. This simplified the work of terrorist groups, such as al Qaeda. With the rise of a globalized world, it has become easier for terrorist organizations to spread their criticisms on a global stage, to act cheaply on a world-wide scope, to commit a larger amount of casualties by using easily accessible technologies, and to create more fear among individuals by using social media that shows their actions (Cusimano, 2012, p. 66).

First of all, terrorist groups are focused on communicating with their followers and updating their activities through various social media platforms. The fundamental motivation behind terrorist groups on social media networks is to fortify the group's solidarity and spread purposeful propaganda among people. Propaganda may have a positive or negative effect on groups and is more concerned about the control and deliberation of thoughts. Propaganda is intentional, endeavour to shape thoughts, control knowledge, and direct actions to accomplish a reaction that advances the ideal aim of the propagandist (Mahood and Halim, 2017, p. 17). For example, ISIS is utilizing video content to broadcast propaganda and cruel activities, such as decapitation. Besides, altering of the Internet platforms encourages the terror groups to proceed with their operational discourses on any terrorist attack over the world. In numerous videos ISIS shares its arms, arms stockpiles and different weapons so as to show its qualities and forces to the international community, which likewise rouses its supporters and followers (Hossain, 2015, p. 142). Another example, is the magazine ‘Dabiq’ established by ISIS, which is an online magazine published in English. One issue emphasized in the magazine was the call-up for foreign fighters by showing ISIS’s political and military achievements to show the trustworthiness of their agenda and the duty of all ‘real’ Muslims to migrate to the Caliphate (Haroro, N.D., p. 12).

Additionally, recruiting people is one of the most critical objectives of terrorist groups. For example, a terrorist group in Kashmir, has recruited 50 youngsters, and the Internet was of large importance in this procedure. Individuals are utilizing Facebook to connect with others and possibly recruit them into their terrorist groups. Possible members are signing up for joining a terrorist group and then they would be trained locally (Hossain, 2015, p. 145). Terrorist groups are capitalizing on an individual's grievances, such as political discrimination or exclusion. Furthermore, propaganda for recruitment will be adapted to different demographic factors based on gender or age, as well as the feeling of greed. Additionally, targeting minors will be done by mixing cartoons and stories including massages that promote acts of terrorism, such as suicide attacks. Similar to this, is the design of online video games intended for the utilization of recruiting and training future members. These games may endorse violence against the state (UNODC, 2012, p. 5). Online recruitment material is frequently converted into English, French, and other languages, with an end goal to enlist supporters in Western countries with simple access to critical targets. For example, Al Qaeda's utilization of such techniques has been compelling, and the terrorist organization has completely changed numerous ordinary individuals into obedient operators who carry out attacks on command (Guadagno, Lankford, Muscanell, Okdie, & McCallum, 2010, p. 28).

Furthermore, terrorist organizations progressively focus on the use of the Internet as an alternative training ground for terrorists. For example, according to Clayton (2018), multiple perpetrators are researching the Internet in order to gather information or inspiration. As a consequence, they will combine these with practice in an attempt to learn the abilities essential for an attack (Clayton, 2018, p. 44). Clayton mentions that none of these perpetrators has been to any training camp or received any military training, they were skilled through online self-directed training through websites and online videos (Clayton, 2018, p. 45). Such websites and social media posts can guarantee guidance and instructions on how to plan and prepare for terror operations. On the other hand, online indoctrination will call up recruits to travel to their training camps, for example, to the Islamic State and the Al Nusra Front. These training camps consist of physical training such as; fitness, utilization of weapons armed assault techniques and instructions in bomb-making. Furthermore, recruits are guided in order to avoid coming to the attention of authorities (SecurityService, N.D.).

An important goal for terrorist organizations is their appearance in popular social media networks in order to increase their fame that will lead to more supporters and fans. Since, by spreading their actions and intents that they achieved or wish to achieve by social media, terrorist organizations gain a larger potential in order to achieve their desired effects on political change. Also, media companies receive large amounts of profits of the appearance of terrorist groups on social media, since this raises great public attention. For example, kidnappings and hostages is a source of news that is seen as dramatic and interesting among the public. Media companies are profiting of tens of millions of pounds on these broadcasts, even when they are not even aware of the effect it has on politics (Perešin, N.D., p. 7). Research shows that media exposure to terrorism enlarges the fears of terrorism among populations and that terrorist groups are attacking more frequently when news coverage is high (Jetter, 2017, p. 1). According to Jetter (2017), “Each minute of Al-Qaeda coverage in a 30-minute news program encourages approximately one additional attack in the next seven days, on average” (p. 34).

Second, terrorist organizations and supporters may also use the Internet to finance acts of terrorism. For example, terrorist organizations are abusing crowdfunding services in order to finance their organization. Such as, financing travel expenses to conflict zones, supporting local terrorist activities, purchasing of propaganda materials, and the training of members (Asia/Pacific Group, 2019, p. 11). These financial supplies are mostly high for large terrorist organizations, particularly those that control a specific zone. On the other hand, the financial supplies of single terrorists are much lower. Funds for single terrorists are mostly used to carry out attacks (Asia/Pacific Group, 2019, p. 4).

Save your time!
We can take care of your essay
  • Proper editing and formatting
  • Free revision, title page, and bibliography
  • Flexible prices and money-back guarantee
Place Order
document

Individuals are persuaded in order to donate to terrorist organizations. Websites that support these organizations mention that every ‘real’ Muslim is obliged to provide financial aid for these organizations. If an individual is not able to fight with the terrorist groups, they should at least provide financial aid as an obligation of religious means. These websites spread the message that this is the best a Muslim can do in the western world and to raise funds among their family members as well (Jacobson, 2010, p. 354).

Besides, non-governmental organizations (NGOs) and charities are problematic in financing terrorists. Jacobson points out that (2009), “the misuse of non-profit organizations for the financing of terrorism is coming to be recognized as a crucial weak point in the global struggle to stop such funding at its source” (p. 2). Charities are particularly vulnerable to maltreatment by terrorist groups and their supporters for whom humanitarian associations are especially alluring front aid associations. Several aid associations are established with the express reason for financing terrorism, whereas other associations are invaded by supporters of terrorist organizations from inside. It is challenging for governments, charity officials and other authorities to screen finances disseminated in terrorist zones, which can be effectively diverted from the actual reason. Another test for governments that makes aid NGOs and charities an alluring vehicle for terrorist organizations is that prohibited charities attached to terrorism means can close down, and revive easily under another name. This strategy is frequently utilized by terrorist organizations (Jacobson, 2009, p. 2).

Furthermore, personnel from within terrorist groups are exploiting online financial facilities through fraud such as, credit card theft, identity theft, and auction fraud. A case in the United Kingdom can be used as an example, where Younis Tsouli committed illegal acts to finance terrorism. Tsouli gained profits, used for the terrorist organization Al Qaida, from stolen credit cards, these profits were utilized in order to route the funds through different countries before they actually arrived in the country they wished for. Profits made by Tsouli were used to fund the 180 websites of Al Qaida used for propaganda purposed and to provide financial assistance for terrorist acts in multiple countries. Research shows that 1,400 credit cards were stolen and used for around 1.6 million to finance terrorist acts (UNODC, 2012, p. 5).

On the other hand, the use of the Internet provides opportunities for the gathering of intelligence in order to prevent and counter acts of terrorism. The Internet utilization by terrorist organizations leads to increased availability of electronic data which may be collected and investigated for counter-terrorism reasons. Law enforcement and other authorities are emerging tools to prevent and identify terrorist activities through the use of the Internet (UNODC, 2012, p. 12). However, non-compliance with the universal law against terrorism obliges states to enact laws against terrorist use of the Internet. Therefore, authorities also have to rely on other criminal offences in order to prosecute offenders (UNODC, 2012, p. 6). Nevertheless, some regions have established standards for the criminalization of terrorist acts committed over the Internet. For example, the Council of Europe created the Council of Europe Convention on Cybercrime. This Convention legislates the penalization of certain offences via the Internet (EuropeWatchdog, N.D.).

On the other hand, online terrorist incitement is unlawful in multiple States, neither is propaganda prohibited. A multifaceted issue is the extent to which states can censor radical Internet activities that target individuals and target them for future terrorist operations. According to Blaker (2015) radicalization does not happen in mosques, rather in secret on the Internet (Blaker, 2015, p. 4). The Internet varies from direct communications as of the boundless distances that regularly exist between online conversations to its audiences. Statements posted online will rarely be interpreted as a threat. Except in unusual situations in which the target of incitement comments is closed to the reciter, as if, for illustration, a message was sent to someone in the immediate area of the reciter (Tsesis, 2017, p. 369).

Furthermore, the International Covenant on Civil and Political Rights enshrines the right to freedom of expression, rights of freedom of thoughts, conscience and religion, belief, and opinion, this is stated in article 19 of the International Covenant on Civil and Political Rights. (UN, 1966, p. 178). Additionally, the Human Rights Council resolution of July 2016 states that the same human rights enshrined offline must also apply online (OSCE, 2018, p. 12). Nonetheless, terrorism has a large impact on multiple fundamental human rights, therefore, States have not a right but a duty to take effective counter-terrorism measures in order to protect these rights, especially the rights to liberty, life, and the security of States (OHCHR, N.D., p. 19). It is difficult for governments to find the right balance between protecting the rights to life, applying criminal laws that indicate incitement to acts of terrorism, and maintaining the right to freedom of opinion, belief, thoughts and their free expression.

Social networking networks in a globalized world are a new phenomenon. Despite all the benefits, it is a daunting task for authorities to protect citizens and governments from acts of terrorism incited through the Internet. The use of the Internet is an important tool for terrorist organizations in order to spread propaganda, recruit and train their personnel, and finance their organization. Although, the Internet made it easier for authorities to track terrorist incited messages and propaganda it is a difficult task to protect governments and individuals since, online terrorist incitement and propaganda is not specifically legislated in International Law and the freedom of expression, opinion and thought shaves been enshrined in the International Covenant on Civil and Political Rights.

References

  1. Haroro , I. (N.D.). Islamic State’s English-language magazines, 2014-2017: Trends & implications for CT-CVE strategic communications. Retrieved on May 26, 2019, from https://icct.nl/wp-content/uploads/2018/03/ICCT-Ingram-Islamic-State-English-Language-Magazines-March2018.pdf
  2. Asia/Pacific Group. (2019, January). Social Media and Terrorism Financing. Retrieved on May 27, 2019, from http://www.apgml.org/includes/handlers/get-document.ashx?d=2446bd89-b2cc-4c3c-b378-5f03658dc906
  3. Blaker, L. (2015). The Islamic State’s Use of Online Social Media. Retrieved on May 26, 2019, from https://scholarcommons.usf.edu/cgi/viewcontent.cgi?article=1004&context=mca
  4. Clayton, A. N. (2018, Maart). Retrieved on May 30, 2019, from https://scholarworks.lib.csusb.edu/cgi/viewcontent.cgi?referer=&httpsredir=1&article=1692&context=etd
  5. Cusimano, M. (2012, January 1). ARE U.S. BASED 'JIHADI' INSPIRED TERRORISTS TRANSITIONING AWAY FROM PHYSICAL TRAINING CAMPS TO ONLINE TRAINING CAMPS? Retrieved on June 3, 2019, from https://scholarship.law.nd.edu/cgi/viewcontent.cgi?article=1281&context=ndjlepp
  6. EuropeWatchdog. (N.D.). Fight against Cybercrime. Retrieved on June 4, 2019, from https://www.europewatchdog.info/en/internationaltreaties/treaties_and_monitoring/cybercrime/
  7. Guadagno, Lankford, Muscanell, Okdie, & McCallum. (2010). Social Influence in the online Recruitment of terrorists and terrorist Sympathizers: Implications for Social Psychology Research. Retrieved on May 27, 2019, from https://www.cairn.info/revue-internationale-de-psychologie-sociale-2010-1-page-25.htm
  8. Hossain, M. S. (2015). Social Media and Terrorism: Threats and Challenges to the Modern Era. Retrieved on May 3, 2019, from Sage Journals: https://journals.sagepub.com/doi/abs/10.1177/0971523117753280
  9. Jacobson, M. (2009, June). Terrorist Financing on the Internet. Retrieved on June 5, 2019, from https://ctc.usma.edu/app/uploads/2010/06/Vol2Iss6-Art6.pdf
  10. Jacobson, M. (2010, March 9). Terrorist Financing and the Internet. Retrieved on June 3, 2019, from https://www.tandfonline.com/doi/pdf/10.1080/10576101003587184?needAccess=true
  11. Jetter, M. (2017, April). Terrorism and the Media:The Effect of US Television Coverage on Al-Qaeda Attacks Retrieved on June 5, 2019, from http://ftp.iza.org/dp10708.pdf
  12. Mahood, S., & Halim, R. (2017, January). Islamist narratives in ISIS recruitment propaganda . Retrieved on May 03, 2019, from https://journals.scholarsportal.info/pdf/13216597/v23i0001/15_iniirp.xml
  13. MOZAFFARI, M. (1988). Islamist narratives in ISIS recruitment propaganda. Retrieved on June 3, 2019, from https://journals.scholarsportal.info/pdf/00108367/v23i0004/179_tneotaat.xml
  14. OHCHR. (N.D.). Human Rights, Terrorism and Counter-terrorism. Retrieved on June 4, 2019, from https://www.ohchr.org/Documents/Publications/Factsheet32EN.pdf
  15. OSCE. (2018, January). International Standards and Comparative Approaches on Freedom of Expression and Blocking of Terrorist or Extremist Content Online. Retrieved on June 4, 2019, from https://www.osce.org/representative-on-freedom-of-media/384564?download=true
  16. Perešin, A. (N.D.). Retrieved on May 26, 2019, from https://journals.scholarsportal.info/
  17. SecurityService. (N.D.). TERRORIST TRAINING AND INDOCTRINATION. Retrieved on June 3, 2019, from https://www.mi5.gov.uk/terrorist-training-and-indoctrination
  18. Tsesis, A. (2017). Terrorist Incitement on the Internet . Retrieved on May 26, 2019, from; https://ir.lawnet.fordham.edu/cgi/viewcontent.cgi?referer=https://www.google.com/&httpsredir=1&article=5433&context=flr
  19. UN. (1966, December). International Covenant on Civil and Political Rights. Retrieved on June 4, 2019, from https://treaties.un.org/doc/publication/unts/volume%20999/volume-999-i-14668-english.pdf
  20. UNODC. (2012, September). The use of the Internet for terrorist purposes. Retrieved on May 26, 2019, from UNODC: https://www.unodc.org/documents/frontpage/Use_of_Internet_for_Terrorist_Purposes.pdf
Make sure you submit a unique essay

Our writers will provide you with an essay sample written from scratch: any topic, any deadline, any instructions.

Cite this paper

Essay on the Use of Internet by Terrorist Organizations. (2022, October 28). Edubirdie. Retrieved April 16, 2024, from https://edubirdie.com/examples/essay-on-the-use-of-internet-by-terrorist-organizations/
“Essay on the Use of Internet by Terrorist Organizations.” Edubirdie, 28 Oct. 2022, edubirdie.com/examples/essay-on-the-use-of-internet-by-terrorist-organizations/
Essay on the Use of Internet by Terrorist Organizations. [online]. Available at: <https://edubirdie.com/examples/essay-on-the-use-of-internet-by-terrorist-organizations/> [Accessed 16 Apr. 2024].
Essay on the Use of Internet by Terrorist Organizations [Internet]. Edubirdie. 2022 Oct 28 [cited 2024 Apr 16]. Available from: https://edubirdie.com/examples/essay-on-the-use-of-internet-by-terrorist-organizations/
copy

Join our 150k of happy users

  • Get original paper written according to your instructions
  • Save time for what matters most
Place an order

Fair Use Policy

EduBirdie considers academic integrity to be the essential part of the learning process and does not support any violation of the academic standards. Should you have any questions regarding our Fair Use Policy or become aware of any violations, please do not hesitate to contact us via support@edubirdie.com.

Check it out!
close
search Stuck on your essay?

We are here 24/7 to write your paper in as fast as 3 hours.