Terrorist use of Internet : the virtual battlefields ? Contents and evolution of the use of Internet by extremist networks.

Slides:



Advertisements
Similar presentations
On-line media tools for strategic communications purposes When using media tools for communication we try to use the latest technologies such us blogging,
Advertisements

United Nations Security Council Resolution 1624 (2005) Countering Incitement to Commit Terrorist Acts.
4th Poverty Reduction Strategies Forum Athens, June 27 th, 2007 Regional Energy market in Southeast Europe: Prospects and challenges for the SEE countries.
IAEA International Atomic Energy Agency EPR-Public Communications L-09 Audiences and Communication Channels.
TACKLING EXTREMISM: A MUSLIM PERSPECTIVE TAALIB ALEXANDER Director, Alhambra Educational Initiative.
Al-Qaeda The Threat Today Chuck Feer Criminal Justice Dept. Bakersfield College.
AL-QAEDA Translates to ‘the base’. Goals and Objectives To establish a pan-Islamic Caliphate throughout the world by working with allied Islamist extremist.
Chapter 2 Digital Terrorism.
GISE April, 2014 Tran, Thi Thuy Vuong I35028.
DoD and Cyber-Terrorism Eric Fritch CPSC 620. What is cyber-terrorism? "The premeditated, politically motivated attack against information, computer systems,
Al-Qaeda. Islamic fundamentalism is a construction based on the proclaimed primacy of religious identity Political Islamism is a political ideology, based.
Modern Day Terrorism. Three Perspectives “This is not a battle between the United States of America and terrorism, but between the free and democratic.
Internet Vulnerabilities & Criminal Activity Cyber Terrorism and Cyber Warfare November 14, 2011 Cyber Terrorism and Cyber Warfare November 14, 2011.
Preventing Violent Extremism: ASB in relation to the policing of security Dr Basia Spalek Institute of Applied Social Studies University of Birmingham.
Network Security of The United States of America By: Jeffery T. Pelletier.
Report 4 Appropriate forms and modes of communication Denis Bouget MSH Nantes Conference, How does research integration work? Tuesday, 17 June 2008, Brussels.
Terrorism and Globalization. Defining Terrorism Globalization is not responsible for terrorism, but it allows terrorism to exist on a global level Debatable.
Mehnaaz Asad IB2-3. Why do they use the Internet?  Easy access to the Internet's resources  Little or no regulation, censorship, or other forms of government.
Al-Qaeda & Twin Towers Al-Qaeda is a global militant Islamist organization founded by Osama bin Laden, and several other militants The radical Islamist.
Submitted by: Abhashree Pradhan CA (1)
Motivation. Motivation - Requirements Keys to achieve motivations: 1.Intrinsic (internal causes) is more effective than extrinsic (external causes) 2.Autonomy.
1 Agenda – 10.20: Registration and coffee – 10.25: Opening remarks (plenary) 10.25– 11.25: Sector sessions –11.40: Opening remarks (plenary)
 What is the role of the media and the Internet in facilitating terrorist radicalization?
CYBER TERRORISM BY: ASHLEIGH AUSTIN AND HUNTER BURKETT.
INTERNATIONAL SECURITY AND PEACE WAR FOR THE NEW WORLD ORDER AND WAR ON TERRORISM Arifah Raja Falency (I34014)
Networking Technologies for Collective Action: Two Opposing Models of Activism Presentation to the Greek Politics Specialist Group Conference Athens, 4-5.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #33 Information Warfare November 19, 2007.
Isdefe ISXXXX XX Your best ally Panel: Future scenarios for European critical infrastructures protection Carlos Martí Sempere. Essen.
Animating CVE: Online Animation as a Form of Counter-Narrative Orla PhD School of Law and Government Dublin.
The role of private security in the protection of critical infrastructures Veerle Pashley Free University of Brussels Department of Criminology.
Web-Based GIS and the Future of Participatory GIS Applications within Local and Indigenous Communities By Dr. Peter A. Kyem, GISP. (Professor of Geography)
© GMV, 2010 Propiedad de GMV Todos los derechos reservados EUROPEAN GNSS EGNOS AND GALILEO. CHARACTERISTICS AND ADVANTAGES OF BRUSSELS. OCTOBER 1 st, 2010.
Chapter 8 Notes “Today’s Issues” The United States and Canada.
EU responses to international terrorism. Definition of terrorism Schmit & Jongman: ‘an anxiety-inspiring method of repeated violent action, employed by.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Fahimeh Tabatabaei, Reza Naserzadeh, Simeon Yates, Babak Akhgar, Eleanor Lockley, David Fortune Chapter 8.
Moral, Social and Ethical issues associated with the Internet
Susan Scholefield CMG Director General Cohesion and Resilience.
Today we will be talking about September 11 th for the entire class period. To begin, get a worksheet from the front and answer the “Warm-Up Questions”
BELLWORK 1.Brainstorm a list of facts, terms, people relating to the September 11 th attacks. (Try to get at least 5!) You will be broken up into groups.
Using Technology to Meet the Needs of a Multi-level Classroom Todd W. Jorns Senior Director for Educational Technology Illinois Community College Board.
What is…? Strategic communication is a planned series of sustained and coherent activities that develop and promote ideas and opinions with the objective.
CYBER CRIMES PREVENTIONS AND PROTECTIONS Presenters: Masroor Manzoor Chandio Hira Farooq Qureshi Submitted to SIR ABDUL MALIK ABBASI SINDH MADRESA TUL.
NEW TECHNOLOGIES Irma Astrauskaitė Latvia–Lithuania Programme 16 June 2009 Brussels New Technologies INTRODUCTION.
Safeguarding Update October 2015.
Copyright © 2012 Knowledge Point digital world architecture of evolution Resources:
ENAR project “Forgotten women: the impact of Islamophobia on Muslim women”
Terrorism – 21 st century risks. Terrorism What is terrorism? What do terrorists hope to achieve? Are all terrorist the same? How long has terrorism been.
Countering Terrorist Use of the Internet – a perspective from the United Nations (Lomonosov Moscow State University) 11 November 2010.
Sociology of Terrorism Kyra Waring. Understanding To understand the sociology of terrorism one must think of: The social construction Terrorism as a political.
BELLWORK 1.Brainstorm a list of facts, terms, people relating to the September 11 th attacks. (Try to get at least 5!) You will be broken up into groups.
Ayman Irziqat Katarzyna Kosarska Sergio Pradel 1.
What can lead young children to become radicalised? Political and religious groups can provide a sense of family or support that children may feel is lacking.
The Peculiarities Of Russian Attitudes Towards Terrorism Muravyova Anna Saratov State University Sociological department.
 To increase the awareness of young people around the process of radicalisation of individuals.  To enable young people to identify and discuss factors/indicators.
Islam “Submission to the will of God”. Islam:Past and Present.
Online Communications This is about different ways that people & businesses communicate online You will already be very familar with most ways.
Prevent Duty Briefing.
NANDHA ENGINEERING COLLEGE ERODE-52. CYBER WAR-A NEW FACE OF TERRORISM Guided byGuided by E.Kanimozhi,M.EE.Kanimozhi,M.E AP/Dept of ITAP/Dept of IT PRESENTED.
ISSUES OF RADICALIZATION AND EXTREME BEHAVIOURS IN PAKISTAN
Dr. Maria Chr. Alvanou Criminologist-Terrorism Expert Rome 20/10/2016
PREVENT 2015 The Prevent Strategy “Stopping people becoming
Cyberwar Becomes a Reality
Age of Terror World History.
Why the youths choose radicaliSation or migration
Stopping people becoming terrorists or supporting terrorism.
Chapter 17 Risks, Security and Disaster Recovery
DO NOW – Reading Quiz How does the U.S. State department define terrorism? Politically motivated violence directed at governments Religiously motivated.
“Today’s Issues” The United States and Canada
Terrorism in the Middle East
Presentation transcript:

Terrorist use of Internet : the virtual battlefields ? Contents and evolution of the use of Internet by extremist networks

Different use of the Internet (1) Spreading propaganda material (messages to the Umma, reviews : Al Somoud etc.) Sending messages to the ennemy (communiqués) and challenging him (by sending videos of hostages e.g.) Zone for proselytism and « horizontal » communication

Different use of the Internet (2) A remote « university of terrorism » (counter-interview & counter-surveillance techniques, IED’s handbook etc.) Means of communication for jihadi members (« vertical communication ») Access to sensitive information (e.g. cartography by Google Earth etc.) in order to plan terrorist operations

Different aspects of Internet Islamist Internet sites (ansar al haqq, minbar- sos, al mourabitoun etc.) as well as non specifically islamist web sites Chat rooms and islamist fora with different levels of confidentiality (from low to high level of security : al hesbah, al ekhlaas etc.) Use of encryption (« moudjahideen secret 1 & 2 »)

Who are the activists on Internet (1) Terrorists networks, through their « Emirs » and official spokemen - Abdelmalek DROUKDAL & Abou Mohamed Salah for Al Qaeda in the Islamic Maghreb - Oussama BEN LADEN, Ayman AL ZAWAHIRI & Abou Yahya Al Libi for Al Qaeda - Abou Omar AL BAGDADI & Abou Hamza AL MOUJAHIR for Islamic State in Irak etc.

Activists on the Internet (2) Cheikhs -Fatwas -Advice to the muslim community on religious texts and islamic law (Chaaria)

Activists on the Internet (3) Islamic media groups : As-Sahab, Global Islamic Media Front (GIMF), Al Furqan Media, Al Ansar Media etc. Translation Film production & editing Broadcasting

Activists on the Internet (4) Web users with extremist views -On-line discussions on « jihad related matters » -Relay for propaganda (e.g translation of propaganda material etc.)

Is Internet a vector for radicalisation ? Internet : one facilitation tool for radicalisation among the global process of radicalisation The crucial role of jihadi websites (links and the feeling of « belonging to a community ») Islamic websites : a narrow one-sided point of view (the « information bubble » )

Evolution of extremist propaganda Increasing number of communiqués, videos and audios posted Improvement in the production and editing of videos and propaganda material Evolution of the message in itself (from a strong religious focus to more political and « environmental » messages)

Counter-measures Towards a common European legislation? July 1881 law and anti-terrorist act of Sept : « public incitation to commit terrorist acts… » Law of the 21st of June 2004 aimed at Internet : « communication to the public by electronic means… »

Are counter propaganda efforts over the Internet possible ? Radicalisation factors not all grounded in the religious field Motivation of extremists can be more « revolutionary » than strictly related to religion Counter-radicalisation methods in Western countries : what legitimacy ?

Counter-propaganda Issues : -The choice of religious texts -Understanting all the aspects of the doctrine -What do « defensive jihad », « offensive jihad », « excommunication » mean in our modern societies ? -Difficulties to counter-attack on extremism without attacking faith itself

Cyberterrorism : myth or reality A definition : « to destabilize a country by trying to paralyse or disrupt parts of its critical infrastructures in a direct cyber-attack (e.g denial of services, viruses) or by exploiting its vulnerabilities (e.g wireless technology etc.) »

Cyberterrorism (2) Objectives : - vital national networks such as water supplies, electricity networks or communication means …

Cyberterrorism (3) Need of a « long-term strategy » in order to identify targets and their vulnerabilities The success of this kind of cyber-attacks may be uncertain and the impact on the population less important than the one of a more « conventional » terrorist attack (like bombings in urban transportation systems e.g)

Conclusion Al Qaeda and affiliated groups follow the evolution of the Internet and are using it in a quite efficient manner Security services must be vigilant and not underestimate the capabilities of terrorist networks in this matter