Читаем The World Is Flat полностью

While the danger that cyber-terrorism poses to the Internet is frequently debated, surprisingly little is known about the threat posed by terrorists' use of the Internet. A recent six-year-long study shows that terrorist organizations and their supporters have been using all of the tools that the Internet offers to recruit supporters, raise funds, and launch a worldwide campaign of fear. It is also clear that to combat terrorism effectively, mere suppression of their Internet tools is not enough. Our scan of the Internet in 2003-04 revealed the existence of hundreds of websites serving terrorists in different, albeit sometimes overlapping, ways... There are countless examples of how [terrorists] use this uncensored medium to spread disinformation, to deliver threats intended to instill fear and helplessness, and to disseminate horrific images of recent actions. Since September 11, 2001, al-Qaeda has festooned its websites with a string of announcements of an impending “large attack” on US targets. These warnings have received considerable media coverage, which has helped to generate a widespread sense of dread and insecurity among audiences throughout the world and especially within the United States...

The Internet has significantly expanded the opportunities for terrorists to secure publicity. Until the advent of the Internet, terrorists' hopes of winning publicity for their causes and activities depended on attracting the attention of television, radio, or the print media. The fact that terrorists themselves have direct control over the content of their websites offers further opportunities to shape how they are perceived by different target audiences and to manipulate their image and the images of their enemies. Most terrorist sites do not celebrate their violent activities. Instead– regardless of their nature, motives, or location-most terrorist sites emphasize two issues: the restrictions placed on freedom of expression; and the plight of their comrades who are now political prisoners. These issues resonate powerfully with their own supporters and are also calculated to elicit sympathy from Western audiences that cherish freedom of expression and frown on measures to silence political opposition...

Terrorists have proven not only skillful at online marketing but also adept at mining the data offered by the billion-some pages of the World Wide Web. They can learn from the Internet about the schedules and locations of targets such as transportation facilities, nuclear power plants, public buildings, airports and ports, and even counterterrorism measures. According to Secretary of Defense Donald Rumsfeld, an al-Qaeda training manual recovered in Afghanistan tells its readers, “Using public sources openly and without resorting to illegal means, it is possible to gather at least 80 percent of all information required about the enemy.” One captured al-Qaeda computer contained engineering and structural architecture features of a dam, which had been downloaded from the Internet and which would enable al-Qaeda engineers and planners to simulate catastrophic failures. In other captured computers, U.S. investigators found evidence that al-Qaeda operators spent time on sites that offer software and programming instructions for the digital switches that run power, water, transportation, and communications grids.

Like many other political organizations, terrorist groups use the Internet to raise funds. Al-Qaeda, for instance, has always depended heavily on donations, and its global fundraising network is built upon a foundation of charities, nongovernmental organizations, and other financial institutions that use websites and Internet-based chat rooms and forums. The fighters in the Russian breakaway republic of Chechnya have likewise used the Internet to publicize the numbers of bank accounts to which sympathizers can contribute. And in December 2001, the U.S. government seized the assets of a Texas-based charity because of its ties to Hamas.

Перейти на страницу:
Нет соединения с сервером, попробуйте зайти чуть позже