Cyberterrorists – they're real and they're extremely tech savvy

Tuesday, May 14, 2019
 | 
J.M. Phelps (OneNewsNow.com)

cyber terrorismA researcher of cyberterrorism and online terrorism reveals that terrorists who were once believed to be lagging behind technologically have been using modern communication systems for quite some time to propagandize worldwide audiences and incite others to attack.

In one recent example, ISIS leader Abu Bakr al-Baghdadi reemerged for the first time since 2014 in a video that was heavily circulated online. One of the world's most wanted and reclusive terrorists, al-Baghdadi used the video – in part – to announce the group's participation in the execution of the recent attacks in Sri Lanka.

Dr. Gabriel Weimann is a senior researcher at the International Institute for Counter-Terrorism in Israel. According to Weimann, a few short decades ago many experts assumed "Third World people" were neither equipped nor sophisticated enough to conduct terrorist activities using the internet for this type of activity.But the researcher and author of Terrorism in Cyberspace: The Next Generation, tells OneNewsNow "online jihad" continues to be a growing threat and can currently be separated into four developmental stages.

Stages 1 through 3

The first stage emerged in the late 1990s and relied solely on the use of websites. These were "quite primitive" and generally written in one language, according to Weimann. The highly recognized terrorist organization, al-Qaeda, has had an online presence since 1998. Other groups with websites at the time, says Weimann, included Hamas, Hezbollah, the Tamil Tigers, and a number of others.

Weimann

According to Weimann, "terrorists realized [simplistic websites] were not enough," as they only allowed for "one-way communication." They wanted "interaction," he continues, and they wanted the ability to "talk" to their audiences and to exchange messages.

The researcher explains that led to the second stage, where terrorists began using interactive platforms like chatrooms and forums in addition to websites about 15 years ago. Then not only could the terrorists simply post material for others to view, Weimann says they could also interact with people interested in the organization, helping those on the terror side to identify potential recruits.

Social media launched the third stage – and Weimann says they quickly learned how to apply and use each them to benefit their cause. YouTube, Facebook, Twitter, Instagram, and other platforms are all being used by terrorist organizations today.

Then there's the Dark Web

A fourth stage, which has occurred more recently, implements the Dark Web. Weimann describes the Dark Web as "more encrypted" and "a secretive layer" of the internet. It allows terrorist to communicate, hide material, and feel safer on the internet.

"[The use of this platform] shows us [that terrorists] are more sophisticated than ever before," he states, making them "harder to find" and "harder to fight" than ever before.

"The migration of [some terrorists] to the use of the Dark Web only shows you that they are quite aware that counterterrorism agencies all over the world are monitoring their activities online and trying to find them online," Weimann shares – adding that he sees that as a growing challenge because "they are moving to more secretive and challenging layers of the internet."

A 'digital Pearl Harbor'

With the advancement in technology and the motives of terrorist organizations, some people are calling future threats "the digital Pearl Harbor or the digital 9/11," the author reveals. Some terrorists are moving away from physical attacks to a more sophisticated type of attack, involving cyberterrorism. He describes this as "an emerging threat," which could target – by hacking or virus attacks – computer information and security systems, critical command control centers, or the world's nuclear facilities.

In a recent announcement – and for the first time in history – a nation responded to a cyberterrorism attack in real time with military force. An Israeli Defense Force (IDF) airstrike targeted a building in the Gaza Strip to thwart an offensive cyber-operation conducted by Hamas hackers.

Objectives: Recruit, train … then attack

While terrorists are using every facet of the internet for nefarious and dangerous purposes, Weimann differentiates their uses into two main categories. The first he refers to as "the communicative one," such as the aforementioned Baghdadi video. And more recently, Yusef Al Qaradawi – spiritual leader of the Muslim brotherhood – is using a controversial app promoted by Apple store to share his messages to the masses.

"[This category allows the terrorists] to spread propaganda, launch field campaigns, conduct psychological warfare, communicate among themselves, and communicate with potential followers, contributors, or people they can recruit," he explains.

In addition to these communicative uses of the internet, a second category comprises "instrumental purposes," including the use of the internet "to teach others, seduce others, radicalize others, and launch people into action." Using this mode, terrorists can be shown how to make homemade bombs and can be incited to launch "lone wolf" attacks, Weimann discloses.

On that note, Weimann concludes by explaining that each supposed "lone wolf" terrorist is attached to a terrorist organization in some capacity. Having studied all the recent attacks, the terrorism expert offers the following advice:

"There are no lone wolves in nature, [thus] there are no lone wolves in terrorism. Behind every lone wolf terrorist … is a pack of virtual wolves."


Interested in participating in a voluntary, confidential online survey
on the topic of cyberterrorism? Click here

Consider Supporting Us?

The staff at Onenewsnow.com strives daily to bring you news from a biblical perspective. If you benefit from this platform and want others to know about it please consider a generous gift today.

MAKE A DONATION

Comments

We moderate all reader comments, usually within 24 hours of posting (longer on weekends). Please limit your comment to 300 words or less and ensure it addresses the article - NOT another reader's comments. Comments that contain a link (URL), an inordinate number of words in ALL CAPS, rude remarks directed at other readers, or profanity/vulgarity will not be approved. More details

SIGN UP FOR OUR DAILY NEWSBRIEF

SUBSCRIBE

VOTE IN OUR POLL

I agree with this HHS proposal reversing the Obamacare section benefiting transgenders primarily because …

CAST YOUR VOTE

GET PUSH NOTIFICATIONS

SUBSCRIBE

LATEST AP HEADLINES

Tornadoes rake 2 Oklahoma cities, killing 2 and injuring 29
Israeli president shocked by German kippa warning
Iraq offers to mediate in crisis between its allies Iran, US
Venezuela negotiators return to Norway for crisis talks
Mike Pence: West Point grads should expect to see combat
Flooding leads to Oklahoma and Arkansas evacuations
New candidates vie to succeed UK’s May with focus on Brexit
Bolton says N. Korea missile tests violated UN resolutions

LATEST FROM THE WEB

Gillette is at it again: This time featuring Samson, a transgender man shaving for the first time
French police hunt man who planted explosive device in Lyon, release surveillance photos
Tornado strikes El Reno, Oklahoma; at least 2 deaths confirmed: reports
Thousands march in Hong Kong to commemorate June 4 protests
Israelis protest moves to grant Netanyahu immunity, limit Supreme Court

CARTOON OF THE DAY

Cartoon of the Day
NEXT STORY
Time getting short for climate alarmists like Gore

Al Gore on CNN town hall meetA report warns European cities will be sunk beneath rising seas as Britain is plunged into a "Siberian" climate. It sounds like something one might read in the news today, except this is from 2004 – and the warning is for 2020.