terrorist use of internet the virtual battlefields
Download
Skip this Video
Download Presentation
Terrorist use of Internet : the virtual battlefields ?

Loading in 2 Seconds...

play fullscreen
1 / 17

Terrorist use of Internet : the virtual battlefields ? - PowerPoint PPT Presentation


  • 110 Views
  • Uploaded on

Terrorist use of Internet : the virtual battlefields ?. Contents and evolution of the use of Internet by extremist networks. Different use of the Internet (1). Spreading propaganda material (messages to the Umma, reviews : Al Somoud etc.)

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about ' Terrorist use of Internet : the virtual battlefields ?' - grover


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
terrorist use of internet the virtual battlefields

Terrorist use of Internet : the virtual battlefields ?

Contents and evolution of the use of Internet by extremist networks

different use of the internet 1
Different use of the Internet (1)
  • Spreading propaganda material (messages to the Umma, reviews : Al Somoud etc.)
  • Sending messages to the ennemy (communiqués) and challenging him (by sending videos of hostages e.g.)

Zone for proselytism and « horizontal » communication

different use of the internet 2
Different use of the Internet (2)
  • A remote « university of terrorism  » (counter-interview & counter-surveillance techniques, IED’s handbook etc.)
  • Means of communication for jihadi members (« vertical communication »)
  • Access to sensitive information(e.g. cartography by Google Earth etc.) in order to plan terrorist operations
different aspects of internet
Different aspects of Internet
  • Islamist Internet sites(ansar al haqq, minbar-sos, al mourabitoun etc.)as well as non specifically islamist web sites
  • Chat rooms and islamist fora with different levels of confidentiality(from low to high level of security : al hesbah, al ekhlaas etc.)
  • Use of encryption(« moudjahideen secret 1 & 2 »)
who are the activists on internet 1
Who are the activists on Internet (1)
  • Terrorists networks, through their « Emirs » and official spokemen

- Abdelmalek DROUKDAL & Abou Mohamed Salah for Al Qaeda in the Islamic Maghreb

- Oussama BEN LADEN, Ayman AL ZAWAHIRI & Abou Yahya Al Libi for Al Qaeda

- Abou Omar AL BAGDADI & Abou Hamza AL MOUJAHIR for Islamic State in Irak etc.

activists on the internet 2
Activists on the Internet (2)
  • Cheikhs
  • Fatwas
  • Advice to the muslim community on religious texts and islamic law (Chaaria)
activists on the internet 3
Activists on the Internet (3)

Islamic media groups :

As-Sahab, Global Islamic Media Front (GIMF), Al Furqan Media, Al Ansar Media etc.

Translation

Film production & editing

Broadcasting

activists on the internet 4
Activists on the Internet (4)
  • Web users with extremist views
  • On-line discussions on « jihad related matters »
  • Relay for propaganda (e.g translation of propaganda material etc.)
is internet a vector for radicalisation
Is Internet a vector for radicalisation ?
  • Internet : one facilitation tool for radicalisation among the global process of radicalisation
  • The crucial role of jihadi websites(links and the feeling of « belonging to a community »)
  • Islamic websites : a narrow one-sided point of view (the « information bubble » )
evolution of extremist propaganda
Evolution of extremist propaganda
  • Increasing number of communiqués, videos and audios posted
  • Improvement in the productionand editing of videos and propaganda material
  • Evolution of the message in itself(from a strong religious focus to more political and « environmental » messages)
counter measures
Counter-measures
  • Towards a common European legislation?
  • July 1881law and anti-terrorist act of Sept. 1986 : « public incitation to commit terrorist acts… »
  • Law of the 21st of June 2004 aimed at Internet : « communication to the public by electronic means… »
are counter propaganda efforts over the internet possible
Are counter propaganda efforts over the Internet possible ?
  • Radicalisation factors not all grounded in the religious field
  • Motivation of extremists can be more « revolutionary » than strictly related to religion
  • Counter-radicalisation methods in Western countries : what legitimacy ?
counter propaganda
Counter-propaganda
  • Issues :
  • The choice of religious texts
  • Understanting all the aspects of the doctrine
  • What do « defensive jihad », « offensive jihad », « excommunication » mean in our modern societies ?
  • Difficulties to counter-attack on extremism without attacking faith itself
cyberterrorism myth or reality
Cyberterrorism : myth or reality
  • A definition :

« to destabilize a country by trying to paralyse or disrupt parts of its critical infrastructures in a direct cyber-attack (e.g denial of services, viruses) or by exploiting its vulnerabilities (e.g wireless technology etc.) »

cyberterrorism 2
Cyberterrorism (2)
  • Objectives :

- vital national networks such as water supplies, electricity networks or communication means …

cyberterrorism 3
Cyberterrorism (3)
  • Need of a « long-term strategy » in order to identify targets and their vulnerabilities
  • The success of this kind of cyber-attacks may be uncertain and the impact on the population less important than the one of a more « conventional » terrorist attack (like bombings in urban transportation systems e.g)
conclusion
Conclusion
  • Al Qaeda and affiliated groups follow the evolution of the Internet and are using it in a quite efficient manner
  • Security services must be vigilant and not underestimate the capabilities of terrorist networks in this matter
ad