Terrorism and the Internet

Terrorism and the Internet

Student’s Name

Institutional Affiliation

Terrorism and the Internet

By definition, terrorism refers to the indiscriminate use of violence to achieve political, social, or religious goals. Typically, terrorism differs from military action in that the former also targets non-combatant parties. Within the last decade, there has been an increase in terrorism cases around the globe. This phenomenon can be attributed to several factors that include globalization, integration among states, as well as diminishing security levels across borders. However, the internet has emerged as a dominant factor that has significantly contributed towards furthering the goals of many terror groups. The evolution of internet usage has contributed substantially towards facilitating easier execution of terror attacks and the dissemination of their achievements.

How Terrorists Use the Internet

            Terrorists have increased their preference to the Internet as the best way of circulating a multitude of information among themselves and with other actors across the globe. Almost all internet users have witnessed videos posted on terrorist sites that broadcast propaganda. Terrorists use online chat rooms to exchange information, strategize attacks, spread misinformation, raise funds, and increase their numbers (Aly, Macdonald, Jarvis, & Chen, 2016). Across the Internet, approximately 4,800 sites that are dedicated to terrorist activity have emerged in the span of a decade. Within these online terrorist forums, numerous illegal activities occur. Many individuals are recruited and inducted into the traditions as well as the agenda of the groups. In the various pages, the leaders take advantage of social media to disseminate propaganda that motivates existing members. Within the same networks, terrorists are also taught different aspects including the usage of weapons of mass destruction, disabling security infrastructure, and other training exercises. Apart from the actual terrorists, terrorism across the Internet also involves sympathizers, sponsors, fans, and other actors who are connected through social media. Apart from traditional physical methods of assault, terrorists also exploit the internet to deploy their attacks (Aly et al., 2016).

            This new mode of attack is referred to as cyber terrorism. The modern approach towards launching assaults focuses on destroying, compromising, or disabling an existing technological infrastructure. In most developed countries, almost all aspects of everyday life are automated, and therefore, this has become a prime target for new age terrorists (Aly et al., 2016). Terrorists have since attempted to hack into the power grids and security networks, as well as other information technology systems. In the recent past, Al-Qaeda members have intensified their research into hacking techniques. In 2007, for example, a terrorist group attempted to hack the security system at the Pentagon.

How Police Can Use the Internet to Thwart Terrorism

It is evident that terrorists have realized the true potential of the Internet in furthering their violent agendas. It is also clear that their activities on the web are bound to increase in the future. Law enforcement officers need to identify this new approach towards terrorism and come up with practical solutions to the security problem. Police officers can intensify their scrutiny of all social media sites for several reasons. Most of these sites can record the activity of its users with a high degree of accuracy (Taylor, Fritsch, & Liederbach, 2014). The police can monitor any suspicious activities and track down the people involved in any potential acts of aggression. Law enforcement agencies can also collaborate with Internet service providers and company owners to ensure that their investigations are concluded faster. When terrorists use social media to recruit new members, plan attacks, or spread propaganda, their IP addresses can be tracked efficiently, and this eases the work for the police. The process of social data mining is still under contention, but it has already displayed an impressive ability to narrow down terrorist activity over the Internet (Taylor et al., 2014). The privacy of social media users is still a significant impediment to the implementation of tighter security measures by security agencies.

Law enforcers can also collaborate with the numerous users of different social media sites in ensuring that they maximize their reach. Police officers are underrepresented when compared to the more significant population of civilians. Rather than increasing the number of specialists, police officers can engage with the public and develop a working relationship in which the latter can monitor the sites (Boer, 2015). On popular social media sites such as Facebook, Twitter, and YouTube, individual users can connect with millions of other individuals across the world. By learning the critical indicators of terrorist activity, civilians can identify and report suspicious users to the relevant authorities. Working together with the public is the best alternative for ensuring that the police can cover the most extensive reach.

Prediction of Internet Usage by Terrorists

            In the future, terrorists will most likely increase their usage of the Internet to propagate their violent attacks against different targets. This is because of the rapid rate of development in the technology infrastructure. Most of the primary functions within the house and the office are fully automated, and this makes it easier for terrorists to attack civilians. The inclusion of Wi-Fi capability in different devices and locations increases the number of attack points. It is also predicted that terrorists will narrow down their focus to cyber terrorism with the intention of maximizing their impact across states. Security officials will most likely strengthen their strategies in tracking down terrorist activities across social media sites.

References

Aly, A., Macdonald, S., Jarvis, L., & Chen, T. (Eds.). (2016). Violent extremism online: New perspectives on terrorism and the internet. Routledge.

Boer, M. D. (2015). Counter-terrorism, security, and intelligence in the EU: Governance challenges for collection, exchange, and analysis. Intelligence and National Security30(2-3), 402-419.

Taylor, R. W., Fritsch, E. J., & Liederbach, J. (2014). Digital crime and digital terrorism. Prentice Hall Press.

Calculate your order
275 words
Total price: $0.00

Top-quality papers guaranteed

54

100% original papers

We sell only unique pieces of writing completed according to your demands.

54

Confidential service

We use security encryption to keep your personal data protected.

54

Money-back guarantee

We can give your money back if something goes wrong with your order.

Enjoy the free features we offer to everyone

  1. Title page

    Get a free title page formatted according to the specifics of your particular style.

  2. Custom formatting

    Request us to use APA, MLA, Harvard, Chicago, or any other style for your essay.

  3. Bibliography page

    Don’t pay extra for a list of references that perfectly fits your academic needs.

  4. 24/7 support assistance

    Ask us a question anytime you need to—we don’t charge extra for supporting you!

Calculate how much your essay costs

Type of paper
Academic level
Deadline
550 words

How to place an order

  • Choose the number of pages, your academic level, and deadline
  • Push the orange button
  • Give instructions for your paper
  • Pay with PayPal or a credit card
  • Track the progress of your order
  • Approve and enjoy your custom paper

Ask experts to write you a cheap essay of excellent quality

Place an order