按键盘上方向键 ← 或 → 可快速上下翻页,按键盘上的 Enter 键可回到本书目录页,按键盘上方向键 ↑ 可回到本页顶部!
————未阅读完?加入书签已便下次继续阅读!
threatening to behead an American…all brought to me courtesy of AOL's home page? The
Internet is an enormously useful tool for the dissemination of propaganda; conspiracy
theories; and plain old untruths; because it combines a huge reach with a patina of
technology that makes anything onthe Internet somehow more believable。 How many times
have you heard someone say; 〃But I read it on the Internet;〃 as if that should end
the argument? In fact; the Internet can make things worse。 It often leads to more
people being exposed to crazy conspiracy theories。
〃The new system of diffusion…the Internet…is more likely to transmit irrationality
than rationality;〃 said political theorist Yaron Ezrahi; who specializes in the
interaction between media and politics。 〃Because irrationality is more emotionally
loaded; it requires less knowledge; it explains more to more people; it goes down
easier。〃 That is why conspiracy theories are so rife in the Arab…Muslim world
today…and unfortunately are becoming so in many quarters of the Western world; for
that matter。 Conspiracy theories are like a drug that goes right into your bloodstream;
enabling you to see 〃the Light。〃 And the Internet is the needle。 Young people used
to have to take LSD to escape。 Now they just go online。 Now you don't shoot up; you
download。 You download the precise point of view that speaks to all your own biases。
And the flat world makes it all so much easier。
Gabriel Weimann; a professor of communication at Haifa University; Israel; did an
incisive study of terrorists' use of the Internet and of what I call the flat world;
which was published in March 2004by the United States Institute of Peace and excerpted
on YaleGlobal Online on April 26; 2004。 He made the following points:
433
While the danger that cyber…terrorism poses to the Internet is frequently debated;
surprisingly little is known about the threat posed by terrorists' use of the Internet。
A recent six…year…long study shows that terrorist organizations and their supporters
have been using all of the tools that the Internet offers to recruit supporters; raise
funds; and launch a worldwide campaign of fear。 It is also clear that to combat
terrorism effectively; mere suppression of their Internet tools is not enough。 Our
scan of the Internet in 2003…04 revealed the existence of hundreds of websites serving
terrorists in different; albeit sometimes overlapping; ways。 。 。 There are countless
examples of how 'terrorists' use this uncensored medium to spread disinformation;
to deliver threats intended to instill fear and helplessness; and to disseminate
horrific images of recent actions。 Since September 11; 2001; al…Qaeda has festooned
its websites with a string of announcements of an impending 〃large attack〃 on US
targets。 These warnings have received considerable media coverage; which has helped
to generate a widespread sense of dread and insecurity among audiences throughout
the world and especially within the United States 。 。 。
The Internet has significantly expanded the opportunities for terrorists to secure
publicity。 Until the advent of the Internet; terrorists' hopes of winning publicity
for their causes and activities depended on attracting the attention of television;
radio; or the print media。 The fact that terrorists themselves have direct control
over the content of their websites offers further opportunities to shape how they
are perceived by different target audiences and to manipulate their image and the
images of their enemies。 Most terrorist sites do not celebrate their violent
activities。 Instead… regardless of their nature; motives; or location…most terrorist
sites emphasize two issues: the restrictions placed on freedom of expression; and
the plight of their comrades who are now political prisoners。 These issues resonate
powerfully with their own supporters and are also calculated to elicit sympathy from
Western audiences that cherish freedom of expression and frown on measures to silence
political opposition 。 。 。
434
Terrorists have proven not only skillful at online marketing but also adept at mining
the data offered by the billion…some pages of the World Wide Web。 They can learn from
the Internet about the schedules and locations of targets such as transportation
facilities; nuclear power plants; public buildings; airports and ports; and even
counterterrorism measures。 According to Secretary of Defense Donald Rumsfeld; an
al…Qaeda training manual recovered in Afghanistan tells its readers; 〃Using public
sources openly and without resorting to illegal means; it is possible to gather at
least 80 percent of all information required about the enemy。〃 One captured al…Qaeda
computer contained engineering and structural architecture features of a dam; which
had been downloaded from the Internet and which would enable al…Qaeda engineers and
planners to simulate catastrophic failures。 In other captured computers; U。S。
investigators found evidence that al…Qaeda operators spent time on sites that offer
software and programming instructions for the digital switches that run power; water;
transportation; and communications grids。
Like many other political organizations; terrorist groups use the Internet to raise
funds。 Al…Qaeda; for instance; has always depended heavily on donations; and its
global fundraising network is built upon a foundation of charities; nongovernmental
organizations; and other financial institutions that use websites and Internet…based
chat rooms and forums。 The fighters in the Russian breakaway republic of Chechnya
have likewise used the Internet to publicize the numbers of bank accounts to which
sympathizers can contribute。 And in December 2001; the U。S。 government seized the
assets of a Texas…based charity because of its ties to Hamas。
In addition to soliciting financial aid online; terrorists recruit converts by using
the full panoply of website technologies (audio; digital video; etc。) to enhance the
presentation of their message。 And like commercial sites that track visitors to
develop consumer profiles; terrorist organizations capture information about the
users who browse their websites。 Visitors who seem most inter
ested in the organization's cause or well suited to carrying out its work are then
contacted。 Recruiters may also use more interactive Internet technology to roam
online chat rooms and cyber cafes; looking for receptive members of the public;
particularly young people。 The SITE Institute; a Washington; D。C。…based terrorism
research group that monitors al…Qaeda's Internet communications; has provided
chilling details ofa high…tech recruitment drive launchedin 2003 to recruit fighters
to travel to Iraq and attack U。S。 and coalition forces there。 The Internet also grants
terrorists a cheap and efficient means of networking。 Many terrorist groups; among
them Hamas and al…Qaeda; have undergone a transformation from strictly hierarchical
organizations with designated leaders to affiliations of semi…independent cells that
have no single commanding hierarchy。 Through the Internet; these loosely