Sunday, April 28, 2013

How terror can breed through social media

How terror can breed through social media

By Dan Rivers, CNN

April 27, 2013 -- Updated 1500 GMT (2300 HKT)

http://edition.cnn.com/2013/04/27/world/rivers-social-media-terror/index.html?hpt=hp_c1

 

 

Terrorists use Twitter as a tool

STORY HIGHLIGHTS

 

    Social media forums can provide sources for would-be terrorists

    British security services monitor social media sites to track groups and

individuals

    Some experts think terrorists have "self radicalized" through social

media

    Others believe that ultimately there is almost always a terrorist

"mentor"

 

London (CNN) -- The days of would-be terrorists needing to travel to far-off

camps to make contacts and learn how to build bombs is rapidly receding.

Social media forums like Twitter and Facebook provide a ready made Rolodex

of sources -- dig further online, mine those contacts further, gain

admission to private chat forums and eventually you will find instructions

for bomb making.

 

Last month al Qaeda in the Islamic Magreb (AQIM) launched a Twitter account

that has already gained more than 5,500 followers, and AQIM's account is

following seven people including the Somali terrorist group Al Shabaab's

official twitter handle and the al Nusra front in Syria, which in turn is

following another rebel group in Aleppo.

 

You can see how rapidly the connections start to multiply and how easy it is

for a budding terrorist to build up global contacts. Of course, it is

impossible to prove any of these accounts are authentic, but many of their

followers think they are, which is worrying in itself.

 

The British security service MI5 and its sister spy organizations GCHQ and

MI6 all monitor social media, noting who is following whom on sites like

Twitter, and providing vital information about alliances being forged

between different groups and individuals.

 

But Professor Peter Neumann from King's College London points out that it's

not without its challenges.

Suspect's possible Instagram posts found

 

"This is the big problem because Web 2.0, the social media generates so much

'stuff' and there are so many people involved in chatting with radicals on

the internet and to monitor that would require really huge resources and no

intelligence service has completely figured out how to separate the

'chatter' from the 'real,' significant stuff," he said.

 

"You don't know, for example, if someone who chats online a lot is very

dangerous or whether it's the opposite -- someone who doesn't chat at all

and is just listening is actually more dangerous because that person maybe

more likely to be operational. There's a lot of the online environment that

we don't know yet."

 

Jean Paul Rouiller from the Geneva Centre for the Training and Analysis of

Terrorism says social media is vital to modern terrorist organizations.

 

"They would not have been able survive, they would not be able to recruit

people. The human touch always needed, but social media is their shop-

window," he said.

 

Behind the shop-window of Twitter and Facebook accounts are more limited

private chat-rooms where terrorist leaders from around the world exchange

information and tactics.

 

Rouiller claims that documents recovered during the killing of Osama bin

Laden in Abbottabad suggest that bin Laden himself may have posted messages

on this forum. The dead al Qaeda chief was very careful to stay away from

electronic devices himself, but it is thought he wrote down messages on

pieces of paper which a trusted lieutenant would then type and save on to a

USB stick, finally passing this to someone else to post on the forum.

 

READ MORE: Who really killed bin Laden?

 

Some experts think there are examples of terrorists who have immersed

themselves in this online world of extremism and have "self radicalized"

without ever having met another terrorist in real life.

 

Major Nidal Hasan, who allegedly shot dead 13 people and injured 30 others

at Fort Hood in 2009, is an example cited by analysts like Neumann, as a

"self-radicalizing" terrorist . Authorities say he was in email contact with

the Yemen-based preacher Anwar al-Awlaki in the months prior to the

shootings, but because of the lack of a wider "plot" or conspirators, the

Department of Defense has categorized the killings not as terrorism, but as

workplace violence.

 

READ MORE: Dead cleric inspiring new terrorists

 

Others though, like Rouiller, say that while online material can put an

individual onto the wrong track, ultimately there is almost always a

terrorist "mentor" who plays a key role in pushing someone towards violence

and that mentoring almost always takes place face-to-face, in somewhere like

a mosque, high school or university.

 

The big question in light of the Boston bombings is whether the Tsarnaev

brothers, suspected of setting the bombs, were also "home-grown",

radicalizing solely online, or whether there was in fact a terrorist

"mentor" that capitalized on their discontent and steered them towards

violence. And crucially, if they are guilty, did they learn their bomb

making skills from the Internet, rather than in a terrorist classroom in

Dagestan?

 

==========================================

(F)AIR USE NOTICE: All original content and/or articles and graphics in this

message are copyrighted, unless specifically noted otherwise. All rights to

these copyrighted items are reserved. Articles and graphics have been placed

within for educational and discussion purposes only, in compliance with

"Fair Use" criteria established in Section 107 of the Copyright Act of 1976.

The principle of "Fair Use" was established as law by Section 107 of The

Copyright Act of 1976. "Fair Use" legally eliminates the need to obtain

permission or pay royalties for the use of previously copyrighted materials

if the purposes of display include "criticism, comment, news reporting,

teaching, scholarship, and research." Section 107 establishes four criteria

for determining whether the use of a work in any particular case qualifies

as a "fair use". A work used does not necessarily have to satisfy all four

criteria to qualify as an instance of "fair use". Rather, "fair use" is

determined by the overall extent to which the cited work does or does not

substantially satisfy the criteria in their totality. If you wish to use

copyrighted material for purposes of your own that go beyond 'fair use,' you

must obtain permission from the copyright owner. For more information go to:

http://www.law.cornell.edu/uscode/17/107.shtml

 

THIS DOCUMENT MAY CONTAIN COPYRIGHTED MATERIAL. COPYING AND DISSEMINATION IS

PROHIBITED WITHOUT PERMISSION OF THE COPYRIGHT OWNERS.

 

 

 

 

 

 

 

No comments:

Post a Comment