Javascript must be enabled to continue!
Information warfare: new battle fields Terrorists, propaganda and the Internet
View through CrossRef
Examines the use of the Internet by terrorists, extremists and activists. Analyses the methods employed by these various ideological groups and considers the advantages of using the Internet over traditional publishing and communication methods. Historically, extremists have used media of al kinds to as vehicles of propaganda, and have exploited new forms of communication over the years to put forward their views. Online extremists in the Internet age, perhaps was just a matter of course. Whatever the organisation, using the Internet has overcome the limitations of traditional publishing, offering a quick, inexpensive, and anonymous means of communication, and ideological information is reaching new audiences around the world. New threats of the twenty‐first century come from the extreme right wing environmentalists, neo‐nazis, animal rights groups and criminals who can exploit the technology and structure of the Internet. The term information warfare can mean the use of smart technology in a traditional war or the use of IT systems attacking a part of a country‘s infrastructure. The common fear appears to be the vulnerability of the latter. In some cases it appears the national laws cannot stem the tide of these emerging groups and governments are responding to this new threat with draconian measures by introducing electronic surveillance and interception to combat the increasing use of encryption favoured by terrorists and criminals alike. Governments have to strike a balance between freedom of speech on the other hand and the security of a country and its people on the other.
Title: Information warfare: new battle fields Terrorists, propaganda and the Internet
Description:
Examines the use of the Internet by terrorists, extremists and activists.
Analyses the methods employed by these various ideological groups and considers the advantages of using the Internet over traditional publishing and communication methods.
Historically, extremists have used media of al kinds to as vehicles of propaganda, and have exploited new forms of communication over the years to put forward their views.
Online extremists in the Internet age, perhaps was just a matter of course.
Whatever the organisation, using the Internet has overcome the limitations of traditional publishing, offering a quick, inexpensive, and anonymous means of communication, and ideological information is reaching new audiences around the world.
New threats of the twenty‐first century come from the extreme right wing environmentalists, neo‐nazis, animal rights groups and criminals who can exploit the technology and structure of the Internet.
The term information warfare can mean the use of smart technology in a traditional war or the use of IT systems attacking a part of a country‘s infrastructure.
The common fear appears to be the vulnerability of the latter.
In some cases it appears the national laws cannot stem the tide of these emerging groups and governments are responding to this new threat with draconian measures by introducing electronic surveillance and interception to combat the increasing use of encryption favoured by terrorists and criminals alike.
Governments have to strike a balance between freedom of speech on the other hand and the security of a country and its people on the other.
Related Results
Propaganda and Lone-Actor Terrorism
Propaganda and Lone-Actor Terrorism
There exists a critical symbiotic relationship between propaganda and lone-actor terrorism. Propaganda relies on the martyrdom of lone-actor terrorists as a symbolic factor in prom...
The Geography of Cyberspace
The Geography of Cyberspace
The Virtual and the Physical
The structure of virtual space is a product of the Internet’s geography and technology. Debates around the nature of the virtual — culture, s...
The Legal Aspects of Combating Terrorism
The Legal Aspects of Combating Terrorism
The legal challenges of the fight against terrorism involve a two-step process; the initial step is to prevent terrorist attacks through the timely identification and arrest of ter...
Tracing the Genesis of Hybrid Warfare
Tracing the Genesis of Hybrid Warfare
The literature on hybrid warfare is relatively new as the term was only coined in 2006 and the subject remains open for new findings and research. The combination of tactics used i...
Internet addiction among school children in the Western Province of Sri Lanka: A cross sectional analytical study (Preprint)
Internet addiction among school children in the Western Province of Sri Lanka: A cross sectional analytical study (Preprint)
BACKGROUND
The internet is widely used across the world and in Sri Lanka for many purposes. Though essential for everyday life there are many negative aspec...
(originally published in October 1997)
(originally published in October 1997)
This paper is included in the First Monday Special Issue #3: Internet banking, e-money, and Internet gift economies, published in December 2005. Special Issue editor Mark A. Fox as...
Review Essays
Review Essays
Book reviewed in this article:HOMOSEXUALITY, QUEER THEORY, AND CHRISTIAN THEOLOGY: THE LESBIAN AND GAY STUDIES READER Edited by Henry Abe love, Michèle Aina Barale, and David M. Ha...
The Role of Propaganda in Modern Society
The Role of Propaganda in Modern Society
Purpose: This study aimed to examine the historical development, theoretical foundation, and modern application of the propaganda system as a key mechanism for shaping public opini...

