U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Terrorists and the Internet (From Understanding Terrorism: Analysis of Sociological and Psychological Aspects, P 270-280, 2007, Suleyman Ozeren, Ismail Dincer Gunes, et al., eds. -- See NCJ-225410)

NCJ Number
225433
Author(s)
Ashlee Woods
Date Published
2007
Length
11 pages
Annotation
This chapter describes how terrorists are using the Internet to advance their causes.
Abstract
The hidden danger in cyberterrorism is cyber-techniques, that is, terrorist’ daily use of the Internet, which poses a greater threat to national security than a cyber attack. Gabriel Weimann, an expert in the field of cyberterrorism, has identified eight primary ways that modern terrorists use the Internet. One terrorist use of the Internet is for “psychological warfare.” Terrorists post general and specific threats and attack plans that may or may not be real, but still have the effect of cultivating fear that major terrorist attacks are imminent. Another terrorist use of the Internet is for propaganda that promotes terrorist causes and demonizes specific groups and nations. A third use of the Internet is for fundraising. The most prevalent fundraising tactic is the use of Web sites dedicated to humanitarian charities. A fourth use of the Internet by terrorists is for recruitment to their causes, as they make worldwide appeals to disenfranchised youth who are seeking to bond with a community that wants them and gives them an ideological framework for a meaningful life. A fifth use of the Internet by terrorists is for data “mining,” which involves obtaining critical information on important facilities being considered for potential terrorist attacks. Such information can include maps, diagrams, and operations. Other Internet uses by terrorists are for networking, sharing information, and coordination and planning of operations. The chapter offers suggestions for countering these terrorist uses of the Internet. 51 references