Islamic Extremists Love the Internet

reportActive / Technical Report | Accession Number: ADA530128 | Open PDF

Abstract:

Al-Qaeda and its network of followers have had great success during this decade with their efforts to influence the West. Which cyber tool have these terrorists used as their main weapon to achieve their objectives What effect is this having on Americas younger generation Since September 11, 2001, Islamic extremist terrorists have been exploiting the Internet to promote their radical ideology. They are targeting select youth, and developing them into home-grown terrorists who support their cause. A careful study of selected terrorist Web sites shows that jihadists are promoting their propaganda and highlighting successful operations directed against the U.S. Government and the U.S. military. What cyber techniques are being used for persuasion How are our leaders handling this threat Is there more that they could be doing This authors thesis is that Islamic extremists are exploiting the Internet, and that this is resulting in the development of home-grown terrorists, a serious vulnerability that the U.S. Government has inadequately addressed. Exploitation of the Internet also impacts the Department of Defense DoD and the Combatant Commanders mission. The author contends that terrorists are gathering sensitive information and valuable data points from the Internet and using these resources to plan combat operations against U.S. and coalition forces. Operational security OPSEC education is paramount for all DoD employees and military commands. The paper describes the OPSEC process and the potential consequences of OPSEC violations. It also recommends a strategic counterstrategy to the extremists web site influence.

Security Markings

DOCUMENT & CONTEXTUAL SUMMARY

Distribution:
Approved For Public Release
Distribution Statement:
Approved For Public Release; Distribution Is Unlimited.

RECORD

Collection: TR
Identifying Numbers
Subject Terms