view counter

ASIS International 2011ASIS 2011 -- combating cyber extremists

Published 20 September 2011

At this year’s ASIS International conference, security experts will explore the effect of the Internet on terrorism, how extremist organizations are using it, and what can be done to stop it; the web has largely proven to be a boon to society, but malicious actors like terrorists have used the Internet to disseminate their radical ideas, recruit new members, and share weapons and bomb building training manuals; terrorist websites have proven to be reliable sources for intelligence as well as dangerous meeting places, but shutting them down has proven to be more complicated than anticipated

ASIS 2011 in Orlando // Source: asispugetsound.com

With the proliferation of the Internet, individuals have been able to connect with others millions of miles away and share ideas, information, and experiences. While this has largely proven to be a boon to society, malicious actors like terrorists have used the Internet to disseminate their radical ideas, recruit new members, and share weapons and bomb building training manuals.

At this year’s ASIS International conference, security experts will explore the effect of the Internet on terrorism, how extremist organizations are using it, and what can be done to stop it.

Extremists are now able to communicate from remote like battlefields and take credit for attacks or an improvised explosive device detonation within minutes. In addition, with the aid of social networking tools like Facebook, Twitter, or YouTube, their messages, videos, documents, and plans can go viral, passing through the hands of hundreds of thousands within minutes.

Most notably, al Qaeda uses the Internet to publish Inspire, the organization’s own magazine. The group describes its publication as “Open Source Jihad,” writing that it is a “resource manual for those who loathe the tyrants; includes bomb making techniques, security measures, guerilla tactics, weapons training, and all other Jihad related activities.” They go on to say, “The open source Jihad is America’s worst nightmare; It allows Muslims to train at home instead of risking a dangerous travel abroad.”

Jeff Bardin, the chief security strategist of Treadstone 71, a presenter at this year’s ASIS conference on cyber jihad, argues in a report that “Cyber jihadist groups have adopted the power of modern communications technology for planning, recruiting, propaganda purposes, enhancing communications, command and control, fund raising and funds transfer, information gathering, and as a method for winning the hearts of minds of the global insurgency.”

Bardin also notes that the traditional radicalization lifecycle has been reduced from months to as little as a few days thanks to the Internet. As a result, the web has helped spawn several lone wolf terrorists in the United States. The video sermons of Anwar al Awlaki, which are widely available online, reportedly helped spur several notable attacks including the Fort Hood shooting, the attempted 2009 Christmas Day bombing, and the failed Times Square car bomb.

To combat the growing opportunities the Internet provides terrorists, Bardin argues that the United States must confront these groups on multiple levels – shutting down their websites, embedding viruses in their websites, counteracting their propaganda, and besting them psychologically,

view counter
view counter