The Internet can be seen as one of the most likely tool for communication for an activist for any cause, especially to those without the access to mass media attention. Political activists are one of the most common on the internet and use the platform that the internet gives minor parties to express their opinions and recruit members. In summary it is now possible with the internets capabilities for individuals and groups to connect virtually with millions of people who share their attitudes, values and ideas. Unlike the traditional mass media, Rob Kitchin argues, "cyber space is not a broadcast medium with a few producers and many customers, but rather a decentralised communication system where individuals are both the consumer and the producers... cyber-space is interactive; users can choose what information they receive and send" (Griset and Mahan, 2007). The main advantage for Internet for political activists when compared to more traditional media is its interactive nature. However, this type of activism can have disadvantages of sites offering online responses, communication from vast distances and discussing privately ideas and suggestions is that it can aid terror plots and spread violent groups with their political views. Terrorist organisations such as ISIS are using online forums and sites to express their extremist views and also to recruit members from all over the world to execute acts of destruction to their own countries or to join the fight in Syria. This should come as no surprise, as the more the interests of an extremist group have been disregarded, the more attractive the benefits of the Internet would be. In 1994 Conrad Winn used the metaphor of the "theatre of terror" to illustrate and analyse the terrorists' use of the Internet motivated by their need to stage violent events to attract the mass media and therefore strike fear and shock to the public of the enemy (Dunn Cavelty, 2007). The Internet can be used as a catalyst or tool for terrorists in two ways. Firstly, the Internet is a useful tool for communication, joining terrorists and their followers, spreading hateful propaganda and instructions, distributing psychological scare campaigns and the networking terrorist groups and organisations. Secondly, opposing to using the Internet, terrorists can be seen to attack, in a tactic that has been called cyber terrorism (Janczewski and Colarik, 2008). At present, terrorist organisation are preferring to using the Internet to benefit from instead of attacking it. The main advantages of the Internet for modern terrorism is that the network of computer-meditated communication (CMC), is perfect for terrorists as a communicator as it is; not censored, decentralised, it cannot be controlled or restriction, and it allows access to anyone in particular who wants to access information. Furthermore, the modern terrorist organisations structure in a considerable amount of ways is compatible with the structure of the Internet. It is argued that the loosely knit network cells and subgroups that are typical of modern terrorist groups uses the Internet for intergroup and intragroup networking to its full advantage (Stohl, 2007). For example, Al Qaeda has shown it is a remarkably adaptive entity, due its decentralised structure. Cyber-fear is generated using the Internet and a prominent example of terrorists using the internet for such, is the violence towards hostages such as the beheading of James Foley. Many more have been staged to strike fear into the opposition and spark a retaliation. Experts argue that this method of cyber fear allows a potential impotent group to seem entirely large and powerful with their messages and threats, in essence this creates an illusion they are more important and threatening than they really are (Griset and Mahan, 2003).
Reference list-
Dunn Cavelty, M. (2007). Cyber-security and threat politics. Milton Park, Abingdon, Oxon: Routledge.
Griset, P. and Mahan, S. (2003). Terrorism in perspective. Thousand Oaks: Sage Publications.
Janczewski, L. and Colarik, A. (2008). Cyber warfare and cyber terrorism. Hershey: Information Science Reference.
Stohl, M. (2007). Cyber terrorism: a clear and present danger, the sum of all fears, breaking point or patriot games?. Crime Law Soc Change, 46(4-5), pp.223-238.
No comments:
Post a Comment