友情提示:如果本网页打开太慢或显示不完整,请尝试鼠标右键“刷新”本网页!阅读过程发现任何错误请告诉我们,谢谢!! 报告错误
飞读中文网 返回本书目录 我的书架 我的书签 TXT全本下载 进入书吧 加入书签

the.world.is.flat-第135章

按键盘上方向键 ← 或 → 可快速上下翻页,按键盘上的 Enter 键可回到本书目录页,按键盘上方向键 ↑ 可回到本页顶部!
————未阅读完?加入书签已便下次继续阅读!



threatening to behead an American…all brought to me courtesy of AOL's home page? The 
Internet is an enormously useful tool for the dissemination of propaganda; conspiracy 
theories; and plain old untruths; because it combines a huge reach with a patina of 
technology that makes anything onthe Internet somehow more believable。 How many times 
have you heard someone say; 〃But I read it on the Internet;〃 as if that should end 
the argument? In fact; the Internet can make things worse。 It often leads to more 
people being exposed to crazy conspiracy theories。 
〃The new system of diffusion…the Internet…is more likely to transmit irrationality 
than rationality;〃 said political theorist Yaron Ezrahi; who specializes in the 
interaction between media and politics。 〃Because irrationality is more emotionally 
loaded; it requires less knowledge; it explains more to more people; it goes down 
easier。〃 That is why conspiracy theories are so rife in the Arab…Muslim world 
today…and unfortunately are becoming so in many quarters of the Western world; for 


that matter。 Conspiracy theories are like a drug that goes right into your bloodstream; 
enabling you to see 〃the Light。〃 And the Internet is the needle。 Young people used 
to have to take LSD to escape。 Now they just go online。 Now you don't shoot up; you 
download。 You download the precise point of view that speaks to all your own biases。 
And the flat world makes it all so much easier。 
Gabriel Weimann; a professor of communication at Haifa University; Israel; did an 
incisive study of terrorists' use of the Internet and of what I call the flat world; 
which was published in March 2004by the United States Institute of Peace and excerpted 
on YaleGlobal Online on April 26; 2004。 He made the following points: 
433 
While the danger that cyber…terrorism poses to the Internet is frequently debated; 
surprisingly little is known about the threat posed by terrorists' use of the Internet。 
A recent six…year…long study shows that terrorist organizations and their supporters 
have been using all of the tools that the Internet offers to recruit supporters; raise 
funds; and launch a worldwide campaign of fear。 It is also clear that to combat 
terrorism effectively; mere suppression of their Internet tools is not enough。 Our 
scan of the Internet in 2003…04 revealed the existence of hundreds of websites serving 
terrorists in different; albeit sometimes overlapping; ways。 。 。 There are countless 
examples of how 'terrorists' use this uncensored medium to spread disinformation; 
to deliver threats intended to instill fear and helplessness; and to disseminate 
horrific images of recent actions。 Since September 11; 2001; al…Qaeda has festooned 
its websites with a string of announcements of an impending 〃large attack〃 on US 
targets。 These warnings have received considerable media coverage; which has helped 
to generate a widespread sense of dread and insecurity among audiences throughout 
the world and especially within the United States 。 。 。 
The Internet has significantly expanded the opportunities for terrorists to secure 
publicity。 Until the advent of the Internet; terrorists' hopes of winning publicity 
for their causes and activities depended on attracting the attention of television; 
radio; or the print media。 The fact that terrorists themselves have direct control 
over the content of their websites offers further opportunities to shape how they 
are perceived by different target audiences and to manipulate their image and the 
images of their enemies。 Most terrorist sites do not celebrate their violent 
activities。 Instead… regardless of their nature; motives; or location…most terrorist 
sites emphasize two issues: the restrictions placed on freedom of expression; and 
the plight of their comrades who are now political prisoners。 These issues resonate 
powerfully with their own supporters and are also calculated to elicit sympathy from 
Western audiences that cherish freedom of expression and frown on measures to silence 
political opposition 。 。 。 
434 
Terrorists have proven not only skillful at online marketing but also adept at mining 
the data offered by the billion…some pages of the World Wide Web。 They can learn from 
the Internet about the schedules and locations of targets such as transportation 
facilities; nuclear power plants; public buildings; airports and ports; and even 
counterterrorism measures。 According to Secretary of Defense Donald Rumsfeld; an 


al…Qaeda training manual recovered in Afghanistan tells its readers; 〃Using public 
sources openly and without resorting to illegal means; it is possible to gather at 
least 80 percent of all information required about the enemy。〃 One captured al…Qaeda 
computer contained engineering and structural architecture features of a dam; which 
had been downloaded from the Internet and which would enable al…Qaeda engineers and 
planners to simulate catastrophic failures。 In other captured computers; U。S。 
investigators found evidence that al…Qaeda operators spent time on sites that offer 
software and programming instructions for the digital switches that run power; water; 
transportation; and communications grids。 
Like many other political organizations; terrorist groups use the Internet to raise 
funds。 Al…Qaeda; for instance; has always depended heavily on donations; and its 
global fundraising network is built upon a foundation of charities; nongovernmental 
organizations; and other financial institutions that use websites and Internet…based 
chat rooms and forums。 The fighters in the Russian breakaway republic of Chechnya 
have likewise used the Internet to publicize the numbers of bank accounts to which 
sympathizers can contribute。 And in December 2001; the U。S。 government seized the 
assets of a Texas…based charity because of its ties to Hamas。 
In addition to soliciting financial aid online; terrorists recruit converts by using 
the full panoply of website technologies (audio; digital video; etc。) to enhance the 
presentation of their message。 And like commercial sites that track visitors to 
develop consumer profiles; terrorist organizations capture information about the 
users who browse their websites。 Visitors who seem most inter

ested in the organization's cause or well suited to carrying out its work are then 
contacted。 Recruiters may also use more interactive Internet technology to roam 
online chat rooms and cyber cafes; looking for receptive members of the public; 
particularly young people。 The SITE Institute; a Washington; D。C。…based terrorism 
research group that monitors al…Qaeda's Internet communications; has provided 
chilling details ofa high…tech recruitment drive launchedin 2003 to recruit fighters 
to travel to Iraq and attack U。S。 and coalition forces there。 The Internet also grants 
terrorists a cheap and efficient means of networking。 Many terrorist groups; among 
them Hamas and al…Qaeda; have undergone a transformation from strictly hierarchical 
organizations with designated leaders to affiliations of semi…independent cells that 
have no single commanding hierarchy。 Through the Internet; these loosely 
返回目录 上一页 下一页 回到顶部 0 0
未阅读完?加入书签已便下次继续阅读!
温馨提示: 温看小说的同时发表评论,说出自己的看法和其它小伙伴们分享也不错哦!发表书评还可以获得积分和经验奖励,认真写原创书评 被采纳为精评可以获得大量金币、积分和经验奖励哦!