In Internet’s Way: Radical, Terrorist Islamists on the Free Highway

The article is opened with definitions of terms utilized throughout the article. Terrorism is defined as the threat or employment of violence against noncombatant targets for political, religious, or ideological purposes by sub-national groups and/or clandestine individuals who are willing to justify all means to achieve their goals. Terrorist conduct is designed to attract attention to the terrorist’s cause and to spread fear and anxiety among wide circles of the targeted population. Subsequently I analyse how terrorists use the Internet, and what can be done to counter their activities. The Internet is used to disseminate information, for propaganda, indoctrination, networking, psychological warfare, socialization, motivation, fund raising, spreading tactics, recruitment, planning activities and coordination. As the Internet became a major arena for modern terrorists, we need to devise appropriate methods to forestall their activities and establish security.

[1]  Marcel Machill,et al.  Protecting Our Children on the Internet: Towards a New Culture of Responsibility , 2000 .

[2]  A. Schmid The Definition of Terrorism , 2011 .

[3]  M. Conway TERRORIST 'USE' OF THE INTERNET AND FIGHTING BACK , 2006 .

[4]  Richard A. Spinello,et al.  Cyberethics: Morality and Law in Cyberspace , 2001 .

[5]  Abdel Bari Atwan The secret history of al-Qa'ida , 2006 .

[6]  Hsinchun Chen,et al.  Content Analysis of Jihadi Extremist Groups' Videos , 2006, ISI.

[7]  J. Rollins,et al.  International Terrorism and Transnational Crime: Security Threats, U.S. Policy, and Considerations for Congress , 2010 .

[8]  R. Cohen-Almagor The Scope of Tolerance: Studies on the Costs of Free Expression and Freedom of the Press , 2005 .

[9]  Michael K. Reiter,et al.  Homeland Security , 2004, IEEE Internet Comput..

[10]  Marc Sageman,et al.  Leaderless Jihad , 2011 .

[11]  Raphael Cohen-Almagor,et al.  Responsibility of and Trust in ISPs , 2010 .

[12]  Marc Sageman,et al.  Understanding terror networks. , 2004, International journal of emergency mental health.

[13]  M. Conway Terrorism and the Internet: New Media—New Threat? , 2006 .

[14]  Michael Jacobson,et al.  Terrorist Financing and the Internet , 2010 .

[15]  C. Ruby The Definition of Terrorism , 2002 .

[16]  Raphael Cohen-Almagor,et al.  Fighting Hate and Bigotry on the Internet , 2011 .

[17]  P. Bobbitt Terror and Consent , 2008 .

[18]  Alan Sipress,et al.  An Indonesian’s Prison Memoir Takes Holy War into Cyberspace , 2004 .

[19]  Richard A. Clarke,et al.  Against All Enemies: Inside America's War on Terror , 2004 .

[20]  R. Cohen-Almagor Media Coverage of Acts of Terrorism: Troubling Episodes and Suggested Guidelines , 2005 .

[21]  Telecommunications Board,et al.  Global networks and local values : a comparative look at Germany and the United States , 2001 .

[22]  M. Levitt Hezbollah: Party of Fraud , 2011 .

[23]  R. Cohen-Almagor Media Coverage of Terror: Troubling Episodes and Suggested Guidelines , 2005 .

[24]  Susan Currie Sivek Packaging Inspiration: Al Qaeda's Digital Magazine Inspire in the Self-Radicalization Process , 2013 .

[25]  Alireza Jafarzadeh The Iran Threat: President Ahmadinejad and the Coming Nuclear Crisis , 2007 .

[26]  Raphael Cohen-Almagor,et al.  Online Child Sex Offenders: Challenges and Counter‐Measures , 2013, SSRN Electronic Journal.

[27]  Gabriel Weimann,et al.  Terror on the Internet: The New Arena, the New Challenges , 2006 .

[28]  R. Gunaratna The changing face of terrorism , 2004 .

[29]  Phillip Brunst Terrorism and the Internet: New Threats Posed by Cyberterrorism and Terrorist Use of the Internet , 2010 .