Unit 11 Terrorism Case Study

1196 Words5 Pages

1. For the purposes of the present publication, a functional approach has been adopted regarding the classification of the means by which the Internet is often utilized to promote and support acts of terrorism. This approach has resulted in the identification of six sometimes overlapping categories: propaganda (including recruitment, radicalization and incitement to terrorism); financing; training; planning (including through secret communication and open-source information); execution; and cyberattacks. a. One of the primary uses of the Internet by terrorists is for the dissemination of propaganda. Propaganda generally takes the form of multimedia communications providing ideological or practical instruction, explanations, justifications …show more content…

iiWebsites may also be used as online stores, offering books, audio and video recordings and other items to supporters. iiiOnline payment facilities may also be exploited through fraudulent means such as identity theft, credit card theft, wire fraud, stock fraud, intellectual property crimes and auction fraud. Some terrorist organizations have been known to establish shell corporations, disguised as philanthropic undertakings, to solicit online donations. C In recent years, terrorist organizations have increasingly turned to the Internet as an alternative training ground for terrorists. I There is a growing range of media that provide platforms for the dissemination of practical guides in the form of online manuals, audio and video clips, information and advice. These Internet platforms also …show more content…

In particular, planning an act of terrorism typically involves remote communication among several parties. I teps may also be taken via the Internet to identify a potential target of an attack and the most effective means of achieving the terrorist purpose. These preparatory steps may range from obtaining instructions on recommended methods of attack to collecting open-source and other information regarding a proposed target. IIThe most basic function of the Internet is to facilitate communication. Terrorists have become increasingly sophisticated at exploiting communications technologies for anonymous communication related to the planning of terrorist acts. A simple online e-mail account may be used by terrorists for electronic, or virtual, “dead dropping” of communications. This refers to the creation of a draft message, which remains unsent, and therefore leaves minimal electronic traces, but which may be accessed from any
Internet terminal worldwide by multiple individuals with the relevant password III
Organizations and individuals often publish extensive amounts of information