Reading done on December 17 2017
"A Framework for Understanding Terrorist Use of the Internet"
- by the Canadian Centre for Intelligence and Security Studies, The Norman Paterson School of International Affairs, Carleton University - 2006
- Trends in Terrorism Series Volume 2006-2 presented by ITAC
“This brief outlines how the internet is being used by terrorists to more effectively recruit and fund and plan their activities. The brief outlines key concepts, current modes of activity and emerging issues” (Canadian Centre for Intelligence and Security Studies, The Norman Paterson School of International Affairs, and Carleton University 2006, 2).
The presence of dissident groups and violent organizations on the internet has been growing exponentially (Canadian Centre for Intelligence and Security Studies, The Norman Paterson School of International Affairs, and Carleton University 2006, 2). According to this brief, there is a consensus that the total number of websites has grown from under one hundred in 1996, to well over 5,000 in 2006 (the year this brief was written) (Canadian Centre for Intelligence and Security Studies, The Norman Paterson School of International Affairs, and Carleton University 2006, 2). The authors claim that officials and experts are aware that internet traffic use by terrorists and their associates peak prominently prior to attacks, therefore, they propose the need to monitor more effectively and analyze the use of the internet by violent groups such as Al Qaeda (Canadian Centre for Intelligence and Security Studies, The Norman Paterson School of International Affairs, and Carleton University 2006, 2). Having said this, the authors raise the question: “ What is the relationship between subversive groups and individuals (and more importantly terrorists) and the internet?” (Canadian Centre for Intelligence and Security Studies, The Norman Paterson School of International Affairs, and Carleton University 2006, 2). In order to decipher this question, the authors first seek to identify the advantages of the internet and how all individuals and organizations benefit from it (Canadian Centre for Intelligence and Security Studies, The Norman Paterson School of International Affairs, and Carleton University 2006, 2). These consist of:
- “easy access
- little or no regulation, censorship, or other forms of government control
- potentially huge audiences spread throughout the world
- anonymity of communication
- a rapid flow of information
- the inexpensive development and maintenance of a web presence
- a multimedia environment
- the ability to shape coverage of the traditional mass media, which increasingly uses the in- ternet as a source for its news coverage”
More broadly, there is a close alignment in the core values of the internet and democracy: openness, participation, and freedom of expression for all (Canadian Centre for Intelligence and Security Studies, The Norman Paterson School of International Affairs, and Carleton University 2006, 2)
Second, basing on Dorothy E. Denning’s perspective, the authors provide definitions of the three broad methods of activity by non-state actors: ‘activism, hacktivism, and cyberterrorism’, and claim that the boundaries between the three are sometimes blurry (Canadian Centre for Intelligence and Security Studies, The Norman Paterson School of International Affairs, and Carleton University 2006, 3). According to the institutions writing this paper, activism “refers to the normal, non-disruptive use of the internet in sup- port of an agenda or cause; for example browsing the web for information, constructing websites and posting materials on them, transmitting electronic publications and letters through e-mail, and using the internet to discuss is- sues, form coalitions, and plan and coordinate activities” (Canadian Centre for Intelligence and Security Studies, The Norman Paterson School of International Affairs, and Carleton University 2006, 3). Next, they define hacktivism, which they express as “the union of hacking and activism; for example, operations that use hacking techniques against a target’s internet site with the intent of disrupting normal operations but not causing serious damage. ‘Web sit-ins’ and virtual blockades, automated email bombs, web hacks, computer break- ins, and computer viruses and worms are all examples of hacktivism” (Canadian Centre for Intelligence and Security Studies, The Norman Paterson School of International Affairs, and Carleton University 2006, 3). And lastly, they defining cyberterrorism as “the convergence of cyberspace and terrorist activity; for example, politically motivated hacking operations intended to cause grave harm such as loss of life or severe economic damage. Concerns that terrorist groups or individuals may penetrate a nation’s electronic energy, transportation, financial or security grid or system and cause catastrophic damage (nuclear reactor or dam failure, multiple mid-air collisions or downed airliners, disrupting national economies through stock market interference, etc.) are all related to the phenomenon known as cyberterrorism” (Canadian Centre for Intelligence and Security Studies, The Norman Paterson School of International Affairs, and Carleton University 2006, 3).
Furthermore, the authors claim that terrorist group’s online activities include “psychological warfare, publicity and propaganda, data mining, fundraising, recruitment and mobilization, networking, information sharing, and planning and coordination” (Canadian Centre for Intelligence and Security Studies, The Norman Paterson School of International Affairs, and Carleton University 2006, 4).
Next, the authors attempt to explain the reasons why the internet has become the favourite medium for terrorism in 21st century (Canadian Centre for Intelligence and Security Studies, The Norman Paterson School of International Affairs, and Carleton University 2006, 4). The first reason stated is the fact that these groups have they lack the physical geographic space to operate effectively, consequently, they have found their virtual territories in the cyber world (Canadian Centre for Intelligence and Security Studies, The Norman Paterson School of International Affairs, and Carleton University 2006, 5). Additionally, this cyberspace has provided a decentralized system consisting of a virtual community created to networking that is guided through the association of believes to vitalize operations of basing, planning, coordinating, and carrying out the groups’ agendas (Canadian Centre for Intelligence and Security Studies, The Norman Paterson School of International Affairs, and Carleton University 2006, 5, 8).
“The activism of terrorist groups, the most prominent being Al Qaeda and its affiliates, demonstrates this trend. The use of the internet to spread disinformation, to deliver threats intended to instill fear and helplessness, and to disseminate horrific images of recent actions and attacks (videotaped executions of foreign nationals and aid worker hostages; attacks on US armed forces etc.) are all part of a deliberate campaign of psychological warfare, conducted openly and widely in cyber-space” (Canadian Centre for Intelligence and Security Studies, The Norman Paterson School of International Affairs, and Carleton University 2006, 6).
This paper claims that the internet is a medium that allows non-state actors to play an international role, influence public opinion, and foreign policy decisions (Canadian Centre for Intelligence and Security Studies, The Norman Paterson School of International Affairs, and Carleton University 2006, 6).
To add, along with psychological warfare, through the internet comes the ability to have a direct control over the publicity of the group and the spread of its propaganda without having to depend on traditional media (Canadian Centre for Intelligence and Security Studies, The Norman Paterson School of International Affairs, and Carleton University 2006, 6).
The internet also allows terrorist groups its usage for data-mining, through which terrorists gain valuable information about anything such as transportation facilities and how to make explosives (Canadian Centre for Intelligence and Security Studies, The Norman Paterson School of International Affairs, and Carleton University 2006, 6). And through data-mining, they can create manuals, instruction, and other useful materials (Canadian Centre for Intelligence and Security Studies, The Norman Paterson School of International Affairs, and Carleton University 2006, 6).
Additionally, according to authors, the cyberspace is essential to receiving funding for terrorist groups’ activities as it provides “secrecy” and “global reach” (Canadian Centre for Intelligence and Security Studies, The Norman Paterson School of International Affairs, and Carleton University 2006, 7). To support this, the authors give the example of Al Qaeda and its affiliates, who depend heavily on donations obtained through “a global fundraising network of charities, non-governmental organizations, and other financial institutions that actively canvass on the internet through websites, chat rooms, and forums. Groups make bank account numbers and banking information publicly available on their websites and those of their associates where sympathizers may anonymously show their support through monetary contributions” (Canadian Centre for Intelligence and Security Studies, The Norman Paterson School of International Affairs, and Carleton University 2006, 7). Furthermore the author institutions claim that terrorist groups use modern software in order to capture internet user demographics to identify sympathizers to a related cause or issue, then these people are individually contacted by email to make donations to organizations with no direct ties to the terrorist group itself, or for recruitment and mobilization purposes (Canadian Centre for Intelligence and Security Studies, The Norman Paterson School of International Affairs, and Carleton University 2006, 7-8). Moreover, there are online chat rooms and cybercafés, post messages on online bulletin boards, where recruiters look for receptive individuals and vulnerable youth to join a particular terrorist group (Canadian Centre for Intelligence and Security Studies, The Norman Paterson School of International Affairs, and Carleton University 2006, 8)
In their conclusion, Tombul and Akdogan (2016) claim that the law enforcements should be careful in keeping a balance between democratic rights and values and security without neglecting the rights of citizens such as freedom of press and freedom of the expression (13). And most importantly, they urge law enforcements to stand “one step ahead on the use of technology” in order to succeed against the fight on cyberterrorism (Tombul and Akdogan 2016, 10).