Networks or Non-State Actors

User Generated

xvggraxvggra

Humanities

American Military University

Description

Enhanced communication has allowed for the growth of “networks” of organizations. What are the pros and cons of these new actors on the international stage? Refer to both civil and uncivil networks- use specific examples that are different than the ones mentioned in the lesson notes. Support your responses with references to the course material - be sure to read and reference the articles by Arquilla and Weimann. Instructions: Your initial post should be at least 350 words. Please respond to more than 2 other students. Responses should be a minimum of 150 words and include direct questions, evidence from the literature, alternative points of view or additional insight. For more information, please review the forum discussion rubric attached below. This is the rubric that will be used for all of the forums in this class.

Resources:

Unformatted Attachment Preview

Copyright @ 2007. Oxford University Press. All rights reserved. May not be reproduced in any form without permission from the publisher, except fair uses permitted under U.S. or applicable copyright law. Chapter 2 Non-states Religions It would be a great mistake to assume that people everywhere define their identity primarily in terms of the state in which they reside. For millions of people, especially those who live within the borders of multi-religious and multi-ethnic states, their primary identity will be defined by their religion, or by a mixture of their religion and their ethnicity. All the world’s major religions originated before the emergence of the modern state. In our secular age, when many of us in Western countries take it for granted that there should be a clear separation between religious institutions and the state, it is quite often overlooked that religion has been the single most powerful influence not only on societal values, morality, and the norms and practices of family and community life: it has also had a major impact on the nature of the state itself, its laws and institutions and processes of government. For example, Christianity was the major influence in the shaping of the European nation-state and the state system generally. The moral foundations of international law and the concept of international society are to be found in Christianity. This is most clearly seen in the masterwork of international law by Hugo Grotius (1583–1645), De Jure Belli ac Pacis (On the Law of 58 EBSCO : eBook Collection (EBSCOhost) - printed on 9/22/2018 5:38 PM via AMERICAN PUBLIC UNIV SYSTEM AN: 208528 ; Wilkinson, Paul.; International Relations : A Very Short Introduction Account: s7348467.main.ehost To sum up briefly, the impact of religious movements and institutions has been decidedly mixed. On the one hand, Christianity, Islam, and Judaism have all inspired humanitarian activities by both the rulers and the ruled, including the movement to abolish slavery, the International Red Cross movement, and Christian socialism aimed at ameliorating the conditions of the working classes. On the other, religions have motivated and inspired some of the most brutal inter-state and internal wars and terrorist campaigns. Yet the long-term influence of religion in helping to inspire and establish movements for the protection and enhancement of human rights for aid and development in the world’s poorest countries has been a hugely positive contribution to the betterment of humanity. However, we would be making a great mistake if we thought this was the only way in which religion can influence international relations. Religious institutions and movements have intervened directly in politics with quite dramatic effects. One example from recent history would be the way in which the Catholic Church acted as a focus of resistance to Communism. The ultimate success of the Solidarity movement in bringing Polish liberation from Communist rule owed a great deal to the determined support of both the Catholic Church in Poland and 59 EBSCO : eBook Collection (EBSCOhost) - printed on 9/22/2018 5:38 PM via AMERICAN PUBLIC UNIV SYSTEM AN: 208528 ; Wilkinson, Paul.; International Relations : A Very Short Introduction Account: s7348467.main.ehost Non-states Copyright @ 2007. Oxford University Press. All rights reserved. May not be reproduced in any form without permission from the publisher, except fair uses permitted under U.S. or applicable copyright law. War and Peace) (1625). Grotius posits the key idea of a society of states sharing sufficient solidarity on the common principles that should govern inter-state relations, even in times of conflict, so that international law would not only be respected, it would be enforced. According to the rules of Grotian international law the rights of states to go to war are strictly limited and military force should only be used for the benefit of the whole international society. Sadly these principles remain idealistic aspirations: today one could hardly argue that Grotian ideas of the basic norms of international society and humanitarian restraints in the course of inter-state and internal warfare are respected and implemented by nation-states generally. International Relations Copyright @ 2007. Oxford University Press. All rights reserved. May not be reproduced in any form without permission from the publisher, except fair uses permitted under U.S. or applicable copyright law. 8. Pope John Paul II (1920–2005), born in Poland, was the first nonItalian to be elected Pope since 1522, and is credited with helping to hasten the collapse of communism in Eastern Europe and generally. the Polish-born Pope John Paul II. In Iran the overthrow of the Shah of Iran (1979) was led by Ayatollah Khomeini, the architect of the revolution which brought a militant Islamic fundamentalist regime to power and changed the balance of power in the Gulf and the wider Middle East. The former would be viewed by liberal-minded people as a good example of religion serving as a powerful ally in the struggle for political freedom and democracy, but the religious revolution in Iran, which put an authoritarian theocracy into power, can be seen as a regressive step both for the Iranian people and for the future of Iran’s international relations. This negative aspect of the influence of religion on international relations is of course by no means confined to the Islamic world. Jewish extremists in Israel, for example, have bitterly opposed any proposals for handing back lands in Gaza and the West Bank on the grounds that these are part of ‘Biblical Israel’ and must be defended at all costs. Note that it was a Jewish religious extremist 60 EBSCO : eBook Collection (EBSCOhost) - printed on 9/22/2018 5:38 PM via AMERICAN PUBLIC UNIV SYSTEM AN: 208528 ; Wilkinson, Paul.; International Relations : A Very Short Introduction Account: s7348467.main.ehost Our new US Secretary of State should be briefed in considerable detail about the influence of religious extremists not only in the Middle East but worldwide. She should be advised to take a close interest in inter-faith dialogue, to be fully aware of the extent to which Islamist extremists are involved in the Al Qaeda network, the most dangerous form of international terrorism faced by the international community today. If this ruthless fanaticism is to be opposed effectively, the Secretary of State will need to work with her opposite numbers around the world to enlist moderate religious leaders everywhere to combine their efforts to dissuade angry alienated young Muslims from being recruited into the Al Qaeda or jihadi networks. Non-state religious movements, institutions, and leaders would not have been part of a Secretary of State’s briefing during the cold war. Today it is as important that she knows about these as it is that she knows about the policies of major states, for these non-state networks pose a threat to the security not only of the US and its allies, but also to many medium and small states in the international community who may well have supposed that they were immune from such attacks. Why should Kenya and Tanzania, for example, have been chosen as venues for attacks on US embassies in August 1998? The attacks came like a bolt out of the blue, killing over 240, most of whom were citizens of Nairobi going about their daily business. I shall return to the challenge posted by terrorist groups in a later section, but first we must consider a second major category of non-state phenomena with an enduring and massive influence on international relations: nationalist movements. Nationalism Medieval Europe was innocent of modern doctrines of nationalism. Linked by the concept (if not by the reality) of a united Christendom and by the common language of the Catholic 61 EBSCO : eBook Collection (EBSCOhost) - printed on 9/22/2018 5:38 PM via AMERICAN PUBLIC UNIV SYSTEM AN: 208528 ; Wilkinson, Paul.; International Relations : A Very Short Introduction Account: s7348467.main.ehost Non-states Copyright @ 2007. Oxford University Press. All rights reserved. May not be reproduced in any form without permission from the publisher, except fair uses permitted under U.S. or applicable copyright law. who assassinated Prime Minister Yitzhak Rabin in 1995, thereby dealing a major blow to the Oslo peace accords. International Relations Copyright @ 2007. Oxford University Press. All rights reserved. May not be reproduced in any form without permission from the publisher, except fair uses permitted under U.S. or applicable copyright law. Church, the states of medieval Europe constituted parcels of dynastic inheritance. The boundaries of these empires, kingdoms, and principalities were often ill-defended, and were drawn without regard for ethnic, linguistic, or religious homogeneity. The kingdom was what the king could hold against the military and diplomatic rivalry of his competitors and the king’s subjects therefore maintained a kind of tripartite structure of loyalties: duty to the church (which was conceived as separate from, and transcending, temporal rulers), duty to the king, and loyalty and service to the lord of their locality. Often the sovereign and the lord had to resort to coercion when loyalty or service was withheld. The term ‘nations’ therefore had no political significance until the late 18th century. It simply meant, as Kedourie puts it, ‘groups belonging together by similarity of birth, larger than a family but smaller than a clan or a people or places of provenance’. The origins of modern political nationalism lie in the historical movements or trends in evidence in the Western European states of the 16th and 17th centuries, whereby the loyalty to the king and king’s government became identified with, if not equated with, the overall interests of the ruler, his officials, and the entire population. Most important of all, when raison d’état and increasing cultural linguistic identification were reinforced by the economically maximizing potential of mercantilist, centralized, state government, the nation-state clearly emerged as the predominant and most viable European political unit. The modern European political doctrines and movements of nationalism did not crystallize, however, until the French Revolution. It is primarily in the writings of Rousseau that we find the most powerful source of the recharging of the nation-state concept and the basis of nationalism as political doctrine. Rousseau and the Jacobins asserted the claims of the whole population to sovereignty over their state, for the first time proposing that the model state was synonymous with the nation. 62 EBSCO : eBook Collection (EBSCOhost) - printed on 9/22/2018 5:38 PM via AMERICAN PUBLIC UNIV SYSTEM AN: 208528 ; Wilkinson, Paul.; International Relations : A Very Short Introduction Account: s7348467.main.ehost The nationalist doctrine has been attacked very effectively on three main fronts. The first practical point raised is that there Non-states Copyright @ 2007. Oxford University Press. All rights reserved. May not be reproduced in any form without permission from the publisher, except fair uses permitted under U.S. or applicable copyright law. Principles of national solidarity, universal citizenship, equal rights to civic participation and equal treatment under the law, all underpin the modern doctrine of nationalism. Once defined in terms of the entire population within a given territory, or a whole ethnic or linguistic group, nationalism asserts that the nation should become the fundamental and universal unit of political organization. Human society becomes a world of nation-states. The inevitable corollary (revolutionary, of course, in the context of 19th-century Europe) was that any nation that was oppressed by another had the right to be emancipated and made fully politically self-determining so that it could enjoy ‘full nationhood’. 9. The Paris Peace Conference redrew the map of Europe after the First World War. Critics argue that the Treaty of Versailles contained the seeds of the Second World War. 63 EBSCO : eBook Collection (EBSCOhost) - printed on 9/22/2018 5:38 PM via AMERICAN PUBLIC UNIV SYSTEM AN: 208528 ; Wilkinson, Paul.; International Relations : A Very Short Introduction Account: s7348467.main.ehost International Relations Copyright @ 2007. Oxford University Press. All rights reserved. May not be reproduced in any form without permission from the publisher, except fair uses permitted under U.S. or applicable copyright law. is no clear agreement about how the nation should be defined. Linguistic, ethnic, and cultural-historical differences have an unfortunate habit of cross-cutting. The national determinationists in the Versailles settlement, for example, confronted ultimately insoluble difficulties in following this principle to its logical conclusions. Far from creating a new map of watertight ‘pure’ national units, the 1919 frontiers created fresh problems for the national minorities inconveniently trapped on the wrong sides of the new state boundaries. Secondly, as Kedourie forcefully argues in Nationalism, the insistence of nationalists upon the right of national self-determination has often been mistaken by well-meaning Anglo-American liberals for a preference for constitutional democracy as a form of national self-government. Successive newly independent nation-states of the Middle East, Africa, and Asia have shown that independence in no way guarantees the adoption and maintenance of democratic free elections, parliamentary government, and independent judiciary or the protection of basic civil liberties in the state concerned. The third point, which is the burden of E. H. Carr’s brilliant short essay Nationalism and After (1945), is that the spread of nationalist doctrines and movements has, far from creating a happy family of nations, exacerbated international conflict. Indeed, nationalist doctrines have provided additional justification for revolution and war, have formed the basis for a popular commitment to, and involvement in, national struggles, and have provided a powerful political rationalization and propaganda instrument for indoctrinating mass armies and waging ‘total war’. On the other hand, nationalist doctrines are clearly not wholly responsible for the parlous state of international relations. Whatever Johann Gottlieb Fichte (1762–1814, German philosopher), Ernest Renan (1823–92, French theorist), and the 64 EBSCO : eBook Collection (EBSCOhost) - printed on 9/22/2018 5:38 PM via AMERICAN PUBLIC UNIV SYSTEM AN: 208528 ; Wilkinson, Paul.; International Relations : A Very Short Introduction Account: s7348467.main.ehost Copyright @ 2007. Oxford University Press. All rights reserved. May not be reproduced in any form without permission from the publisher, except fair uses permitted under U.S. or applicable copyright law. Major forms of nationalist movements Cultural-linguistic nationalism Many of the pioneers of Slav, Western European, Middle Eastern, and African political nationalisms were literati who used their writings to project their consciousness of national distinctiveness and develop their initial claim for political independence. Nationalist leaders and intellectuals, once independence is achieved, may be displaced by other revolutionary political forces. Nevertheless, the newly independent nations, like their 65 EBSCO : eBook Collection (EBSCOhost) - printed on 9/22/2018 5:38 PM via AMERICAN PUBLIC UNIV SYSTEM AN: 208528 ; Wilkinson, Paul.; International Relations : A Very Short Introduction Account: s7348467.main.ehost Non-states sillier romantic dreams of nationalist propagandists in the 19th century may have claimed, most nationalist political leaders have shown realism in appreciating that the achievement of national political self-determination can neither eradicate all external dependence and obligations nor provide a universal elixir for world peace. When critics castigate nationalist doctrines for their aggressiveness and propensity for inducing political violence, they are generally confusing nationalism in its pure form with doctrines of racial supremacy or ideologies of imperial aggrandizement. Given the conjunction of the rise of the nation-state with the collapse of the absolute monarchy and the rise of republican democracy, was it not inevitable that the people of Europe should look to national identity and solidarity to provide a legitimation for political autonomy? Were Gladstone, Asquith, and Lloyd George (and Woodrow Wilson for that matter) so wrong to concede to Irishmen or Czechs or Poles the right to self-determination, freedom from an alien rule which their people had never endorsed or accepted? Surely it is natural justice that people who feel themselves part of a homogeneous national community should enjoy the dignity and status of national political autonomy, so long as it is admitted that such autonomy does not in itself resolve the pressing problems of internal political and economic justice, or the problem of creating a stable international order? International Relations Copyright @ 2007. Oxford University Press. All rights reserved. May not be reproduced in any form without permission from the publisher, except fair uses permitted under U.S. or applicable copyright law. long-established ex-imperial rulers, rapidly appreciate the importance of cultural nationalism (‘the battle of the books’) for the intensification of their own people’s national commitments. In cases of long-standing imperial control or attempted elimination of political nationalism, cultural nationalism stubbornly survives. As the former Soviet Union found, it is almost impossible, in practice, to eliminate the linguistic identity and solidarity of an ethnic group. Indeed there is strong evidence, in Ireland and Wales in the 19th century for example, that the more the native language of an ethnic group is despised and deliberately discouraged by a government, the more it gains in mystique and significance as a street language for the expression of communal sufferings and hopes. Where the tradition of culture and language is still widely disseminated among an entire ethnic community, it is entirely unrealistic, as was proved in the case of the Austro-Hungarian Empire in the 19th century, to hope to prevent a political phoenix arising from the embers of cultural nationalism simply by granting a limited imperial recognition of national cultural identity. Only when the larger proportion of an ethnic group has been assimilated in the politically dominant culture, as in modern Brittany, does cultural nationalism survive as a doomed minority movement tragically unable to extend its cultural-linguistic base sufficiently to capture power by democratic means. Anti-colonial nationalism in the ‘Third World’ Nationalism was originally a European political doctrine, and it developed in the Third World as a by-product of colonial experience, accompanying or following the impact of colonial rule rather than preceding it. Herculean efforts at nation-building therefore proceed simultaneously with the construction of the political and administrative apparatus of a modern state. In most cases, however, it is by the accidents of colonial inheritance that 66 EBSCO : eBook Collection (EBSCOhost) - printed on 9/22/2018 5:38 PM via AMERICAN PUBLIC UNIV SYSTEM AN: 208528 ; Wilkinson, Paul.; International Relations : A Very Short Introduction Account: s7348467.main.ehost Copyright @ 2007. Oxford University Press. All rights reserved. May not be reproduced in any form without permission from the publisher, except fair uses permitted under U.S. or applicable copyright law. The early colonial nationalists, however, very soon found themselves threatened by the outflanking economic revolutionism of socialist and Marxist movements. Those leaders who clung to a vague populist appeal, to an abstract millennialism, or to dependence on their charismatic predominance, have frequently paid the price for failing to deliver the material goods, a greater social and economic equality, and improved living standards. In many cases, especially in the British colonies, the colonial power’s permissive rule encouraged the formation of nationalist parliamentary parties as a form of ‘democratic tutelage’, and where this happened the mass violence of a revolutionary overthrow of colonial rule was often avoided. In other circumstances, as in Cyprus, Algeria, and Aden, nationalist movements found 67 EBSCO : eBook Collection (EBSCOhost) - printed on 9/22/2018 5:38 PM via AMERICAN PUBLIC UNIV SYSTEM AN: 208528 ; Wilkinson, Paul.; International Relations : A Very Short Introduction Account: s7348467.main.ehost Non-states the territorial configuration and the designated population, as well as the official language, educational system, and the major economic and administrative institutions have been determined. In such a setting, the appeals of doctrines of national self-determination to a European-educated but partially alienated and subordinated intelligentsia were absolutely overwhelming. Here, couched in terms that Europeans found immediately comprehensible, was the very rationalization they needed for their claims to run their own affairs, liberated from imperialist rule. To carry through their objectives, however, they had to create a national identity, consciousness, and solidarity among their own people, a deep popular movement fired with a commitment to national independence. Not surprisingly, colonial governments at first attempted to crush such movements, though precise treatment varied according to the imperial power concerned and its political and military circumstances. A pragmatic colonialist tradition, such as the British, was able to engender policies of actually encouraging or conniving with the new nationalist movement in the belief that the colonial power could thus more effectively weld the often disparate and warring tribes and religious communities into a stable and orderly polity. International Relations Copyright @ 2007. Oxford University Press. All rights reserved. May not be reproduced in any form without permission from the publisher, except fair uses permitted under U.S. or applicable copyright law. themselves suppressed or outlawed by the colonial government, and resorted to extra-legal, underground, guerrilla, and resistance tactics in order to wrest control from their colonial rulers. Both revolutionary ‘movements of national liberation’ and essentially non-violent emergent nationalist parties require, above all, powerful bases of mass support and active participation if they are to wrest and hold power. The former type has to prove its popular legitimacy in the crucible of revolutionary war, and the latter has to prove its nationalist credentials to the departing power and to its own people. It should be stressed, however, that such movements may be far more ephemeral and unstable coalitions than has been assumed hitherto. Where such movements divide and collapse, the very possibility of a popularly legitimate regime, even the nascent sense of national identity and solidarity, may be lost. In such a vacuum the way is open to determined minority groups, particularly the military officers with a monopoly of control over the coercive forces of the state to snatch a coup d’état, rationalized as ‘the maintenance of national unity’ or ‘preserving law and order’. Multinational Corporations (MNCs) The new Secretary of State will certainly need to be briefed about MNCs. They are among the most influential and powerful non-state actors in the international system. The largest MNCs are likely to possess assets and deploy annual budgets which dwarf those of the many poor states where their operations may be located. MNCs have grown rapidly since the economic recovery following the Second World War and have undoubtedly made a major contribution to the growth of the world economy. Because, by definition, MNCs operate simultaneously in several countries or in some cases numerous countries, they can choose to locate their operations in those parts of the world where it is most profitable. They also have access to considerable funds for investment and can command the best available business and technical expertise. 68 EBSCO : eBook Collection (EBSCOhost) - printed on 9/22/2018 5:38 PM via AMERICAN PUBLIC UNIV SYSTEM AN: 208528 ; Wilkinson, Paul.; International Relations : A Very Short Introduction Account: s7348467.main.ehost It is a common error, however, to assume that the MNC is ‘sovereign’ and that ‘globalization’ has destroyed the capacity of the state to strike back at MNCs when they wish to do so. States have ultimate control over their territories and borders. They can and do seize MNC assets, expel MNC personnel, nationalize MNCs, impose draconian fines and punishments for alleged violations of laws, and so on. Ultimately the state is still sovereign, though it may be reluctant to take extreme steps against an MNC for fear of causing a flight of overseas investment and the withdrawal of other MNCs from the country. It will also be very hard for the new Secretary of State to resist MNC pressures on the US government to intervene on their behalf in the event of a major clash with the host state government. However, if the new Secretary of State is able to push through quietly policies that substantially assist the MNC she might hope to be offered an attractive non-executive directorship when she eventually retires from politics! Guerrillas and insurgents Guerrilla warfare is the natural weapon of the strategically weaker side in a conflict. Rather than risking the annihilation of their own 69 EBSCO : eBook Collection (EBSCOhost) - printed on 9/22/2018 5:38 PM via AMERICAN PUBLIC UNIV SYSTEM AN: 208528 ; Wilkinson, Paul.; International Relations : A Very Short Introduction Account: s7348467.main.ehost Non-states Copyright @ 2007. Oxford University Press. All rights reserved. May not be reproduced in any form without permission from the publisher, except fair uses permitted under U.S. or applicable copyright law. However, although many countries, especially developing countries, are generally eager to attract MNCs they often hopelessly overestimate the benefits to be gained. MNCs tend to use capital-intensive methods of production, in which case they will not need to employ large numbers of workers from the host country. Often the skilled and managerial employees will be brought in from overseas. They may manage to avoid the host country’s taxation by the simple device of shifting the profits out of the host country. Often the MNCs exploit the offers of incentives by the host countries quite cynically, by taking the ‘carrots’ offered and then reconfiguring their operations in ways that deprive the host countries of benefit. International Relations Copyright @ 2007. Oxford University Press. All rights reserved. May not be reproduced in any form without permission from the publisher, except fair uses permitted under U.S. or applicable copyright law. forces in a full-scale battle with better armed and more numerous opponents, the guerrilla wages what Taber has called ‘the war of the flea’, using methods, times, and places of the guerrilla’s choice and constantly striving to benefit from the guerrilla’s major tactical advantage – the element of surprise. It is a classic method of warfare, almost as old as the history of human society. A key lesson from the recent history of guerrilla warfare, as shown in a masterly survey by Walter Laqueur, Guerrilla, is that it is hardly ever a self-sufficient means of achieving victory. Only when the anti-guerrilla side underestimates the guerrilla threat, or simply fails to commit adequate resources to the conflict, does a guerrilla have a change of achieving, unaided, long-term political aims. In most 20th-century cases, guerrilla warfare on a major scale has been linked to revolutionary warfare, a struggle between a non-state movement (in some cases assisted or sponsored by a state) and a government for political and social control of a people in a given nation-state’s territory. Most revolutionary wars (for example, in China, Vietnam, and Cambodia) have moved through a guerrilla phase and have finally developed into a decisive struggle between conventional armed forces. But the evidence from guerrilla struggles and revolutionary warfare in Latin America, where a number of attempts were made to emulate the success of Fidel Castro’s guerrilla revolution in Cuba, shows that where there are determined and ruthless efforts to suppress them and the revolutionaries fail to gain substantial and lasting mass support, guerrilla campaigns will end in failure. However, it would be a serious mistake to conclude that guerrilla warfare has become obsolete as a result of developments in military technology and counter-insurgency. Guerrilla warfare continues to prove effective in tying down large numbers of security forces, disrupting government and the economy: it poses a particularly serious threat to weak and unstable governments in divided societies. The protracted insurgency in Iraq, where rural 70 EBSCO : eBook Collection (EBSCOhost) - printed on 9/22/2018 5:38 PM via AMERICAN PUBLIC UNIV SYSTEM AN: 208528 ; Wilkinson, Paul.; International Relations : A Very Short Introduction Account: s7348467.main.ehost Copyright @ 2007. Oxford University Press. All rights reserved. May not be reproduced in any form without permission from the publisher, except fair uses permitted under U.S. or applicable copyright law. and urban guerrilla attacks on the Coalition armed forces have been combined with major terrorist attacks against the civilian population, has killed hundreds of Coalition troops and members of the new Iraqi army and police, and thousands of civilians. The newly appointed UK Foreign Secretary will need to convey these lessons to his Cabinet colleagues and to his opposite numbers in the US and the other NATO member states in the hope that they will not again be tempted into underestimating the challenges of major insurgencies and terrorism in future conflicts, and the implications for international relations. The consequences of all-out civil war in Iraq and the possible acquisition of a new base area by Al Qaeda in the midst of the Middle East would indeed have dire effects on international security and stability. 71 EBSCO : eBook Collection (EBSCOhost) - printed on 9/22/2018 5:38 PM via AMERICAN PUBLIC UNIV SYSTEM AN: 208528 ; Wilkinson, Paul.; International Relations : A Very Short Introduction Account: s7348467.main.ehost Non-states 10. Vladimir Ilyich Lenin (1870–1924) founded the Bolshevik Party and the Marxist-Leninist ideology of the Soviet Union, which aimed at world revolution against ‘capitalist imperialism’ – a project which failed completely with the collapse of the Soviet Union. International Relations Copyright @ 2007. Oxford University Press. All rights reserved. May not be reproduced in any form without permission from the publisher, except fair uses permitted under U.S. or applicable copyright law. Terrorist groups and networks Terrorism is the systematic use of coercive intimidation, usually to service political ends. It is used to create and exploit a climate of fear among a wider target group than the immediate victims of the violence and to publicize a cause, as well as to coerce a target into assenting to the terrorist aims. Terrorism may be used on its own or as part of a wider unconventional war. It can be employed by desperate and weak minorities, by states as a tool of domestic and foreign policy, or by belligerents as an accompaniment in all types and stages of warfare. A common feature is that innocent civilians, sometimes foreigners who know nothing of the terrorists’ political quarrel, are killed or injured. Typical methods of modern terrorism are explosive and incendiary bombings, shooting attacks and assassinations, hostage-taking and kidnapping, and hijacking. The possibility of terrorists using nuclear, chemical, or bacteriological weapons cannot be discounted. One basic distinction is between state and factional terror. The former has been vastly more lethal and has often been an antecedent to and a contributory cause of factional terrorism. Once regimes and factions decide that their ends justify any means or their opponents’ actions justify them in unrestrained retaliation, they tend to become locked in a spiral of terror and counter-terror. Internal terrorism is confined within a single state or region while international terrorism, in its most obvious manifestation, is an attack carried out across international frontiers or against a foreign target in the terrorists’ state of origin. But, in reality, most terrorism has international dimensions, as groups look abroad for support, weapons, and safe haven. Terrorism is not a philosophy or a movement: it is a method. But even though we may be able to identify cases where terrorism has been used for causes most liberals would regard as just, this does not mean that even in such cases the use of terrorism, which by definition threatens the most fundamental rights of innocent 72 EBSCO : eBook Collection (EBSCOhost) - printed on 9/22/2018 5:38 PM via AMERICAN PUBLIC UNIV SYSTEM AN: 208528 ; Wilkinson, Paul.; International Relations : A Very Short Introduction Account: s7348467.main.ehost Copyright @ 2007. Oxford University Press. All rights reserved. May not be reproduced in any form without permission from the publisher, except fair uses permitted under U.S. or applicable copyright law. There are of course many other threats and challenges which are potentially far more serious than terrorism. Global climate change, the existence of which has been scientifically proven to the satisfaction of all but a curious group of flat-earthers, could bring catastrophic changes. Scientists are also concerned about the dangers of a global pandemic which could kill hundreds 73 EBSCO : eBook Collection (EBSCOhost) - printed on 9/22/2018 5:38 PM via AMERICAN PUBLIC UNIV SYSTEM AN: 208528 ; Wilkinson, Paul.; International Relations : A Very Short Introduction Account: s7348467.main.ehost Non-states civilians, is morally justified. Paradoxically, despite the rapid growth in the incidence of modern terrorism, this method has been remarkably unsuccessful in gaining strategic objectives. The only clear cases are the expulsion of British and French colonial rule from Palestine, Cyprus, Aden, and Algeria. The continuing popularity of terrorism among nationalists and ideological and religious extremists must be explained by other factors: the craving for physical expression of hatred and revenge; terrorism’s record of success in yielding tactical gains (e.g. massive publicity, release of prisoners, and large ransom payments); and the fact that the method is relatively cheap, easy to organize, and carries minimal risk. Regimes of totalitarianism, such as Nazism and Stalinism, routinely used mass terror to control and persecute whole populations, and the historical evidence shows that this is a tragically effective way of suppressing opposition and resistance. But when states use international terrorism they invariably seek to disguise their role, possibly denying responsibility for specific crimes. Another major conducive factor in the growth of modern terrorism has been repeated weakness and appeasement in national and international reaction to terrorism, despite numerous anti-terrorist laws and conventions and much governmental rhetoric. Early writings on terrorism tended to treat it as a relatively minor threat to law and order and individual human rights. In a series of studies, for example, Terrorism and the Liberal State, I concluded that major outbreaks of terrorism, because of their capacity to affect public opinion and foreign policy and to trigger civil and international wars, ought to be recognized as a potential danger to the security and well-being of afflicted states and a possible threat to international peace. In view of these potential dangers it would be wrong to exaggerate the danger from international terrorism, but what any Foreign Minister will need to understand is that the so-called New Terrorism of the Al Qaeda network of networks is the most dangerous type of international terrorism ever experienced from a non-state entity in the international system. Why is this? International Relations Copyright @ 2007. Oxford University Press. All rights reserved. May not be reproduced in any form without permission from the publisher, except fair uses permitted under U.S. or applicable copyright law. of thousands of people. Despite the efforts to maintain a global nuclear non-proliferation regime, proliferation continues and the IAEA (International Atomic Energy Agency) estimates that there are over 40 states capable of using their civil nuclear technology and resources to pursue nuclear weapons programmes. I will consider some of these global problems in Chapter 4. First, Al Qaeda is explicitly aiming at the mass killing of civilians. Al Qaeda declared a jihad or holy war against the US and its allies. In bin Laden’s so-called ‘fatwa’ of 23 February 1998, he announced the setting up of a World Islamic Front for Jihad and declared that it is ‘the duty of all Muslims to kill US citizens – civilian or military and their allies everywhere’. The readiness to kill civilians on a massive scale was demonstrated in the attacks of 11 September 2001 which caused the deaths of nearly 3,000 people. Second, the Al Qaeda network has a presence in over 60 countries and this makes it the most widely dispersed international terrorist network ever experienced in the history of terrorism. Al Qaeda’s large number of affiliates and operational and support network not only gives a genuine global reach to their terrorist activities, it also enables them to claim with some truth that they are continuing to wage a ‘global jihad’. Indeed, Al Qaeda is more of a global transnational movement bound together mainly by a shared ideology than a traditional highly centralized organization. Typical current Al Qaeda methods are no-warning coordinated suicide attacks hitting several targets simultaneously. Al Qaeda’s 74 EBSCO : eBook Collection (EBSCOhost) - printed on 9/22/2018 5:38 PM via AMERICAN PUBLIC UNIV SYSTEM AN: 208528 ; Wilkinson, Paul.; International Relations : A Very Short Introduction Account: s7348467.main.ehost Copyright @ 2007. Oxford University Press. All rights reserved. May not be reproduced in any form without permission from the publisher, except fair uses permitted under U.S. or applicable copyright law. most commonly used weapon has been the large suicide vehicle bomb. However, the Al Qaeda network has shown a keen interest in obtaining weapons of mass destruction (WMD). Its track record shows that it would have no compunction about using them to cause large numbers of civilian deaths. Now let us turn from one of the most malevolent non-states to the most benevolent. Humanitarian and human rights organizations There is an impressive array of humanitarian organizations and charities which operate internationally and which bring great dedication, skill, and experience to bear in order to save lives, alleviate suffering, and assist in post-disaster relief and 75 EBSCO : eBook Collection (EBSCOhost) - printed on 9/22/2018 5:38 PM via AMERICAN PUBLIC UNIV SYSTEM AN: 208528 ; Wilkinson, Paul.; International Relations : A Very Short Introduction Account: s7348467.main.ehost Non-states 11. The twin towers of New York’s World Trade Center on fire after being struck by airliners seized by Al Qaeda suicide hijackers on 11 September 2001. International Relations Copyright @ 2007. Oxford University Press. All rights reserved. May not be reproduced in any form without permission from the publisher, except fair uses permitted under U.S. or applicable copyright law. reconstruction. Among the best known of these organizations are the International Red Cross, Médecins Sans Frontières, Oxfam, Save the Children Fund, and Christian Aid, but there are many others. Most of the international relief work done by these organizations is delivered in the form of humanitarian assistance, with the full consent of the authorities in the country in need. They have made a huge contribution to provision of relief even in the most daunting of humanitarian crisis situations, such as the Indian Ocean Tsunami (2004) and the Pakistan Earthquake disaster (2005). Governments in stricken countries simply cannot cope in the face of large-scale disasters. Assistance rendered by other governments is very important but it could never be enough. What the non-state humanitarian organizations can bring to bear very rapidly in such situations is local knowledge and contacts with the affected communities, great experience of delivering humanitarian 12. Relief workers delivering humanitarian aid to an area devastated by the huge tsunami caused by a submarine earthquake on 26 December 2004 – it struck coasts as far away as Sri Lanka and Thailand, killing an estimated 150,000 people. 76 EBSCO : eBook Collection (EBSCOhost) - printed on 9/22/2018 5:38 PM via AMERICAN PUBLIC UNIV SYSTEM AN: 208528 ; Wilkinson, Paul.; International Relations : A Very Short Introduction Account: s7348467.main.ehost Far more controversial is the growing trend towards coercive intervention, that is intervention without the consent of the target country’s government. Examples are the establishing of Kurdish ‘safe havens’ in northern Iraq (1991), plus interventions in Somalia, Haiti, Liberia, Rwanda, and Bosnia. This trend has been facilitated by the gradual weakening of the principle of state sovereignty; the growth of human rights awareness; the propensity of the UN Security Council to widen the concept of ‘threat to the peace’; and the globalization of information. Yet despite the gradual undermining of the principle of absolute state sovereignty, there are considerable countervailing pressures in the international system which still constitute major obstacles to coercive humanitarian intervention: there is the fear that such intervention might provoke a breakdown of international order; states may also be reluctant to commit themselves to intervention because they fear that it may turn into a very costly long-term responsibility with no prospect of an easy exit; there is the worry of regimes, particularly in the developing countries, that intervention might become a cover for the major powers to interfere in their affairs. Non-state organizations have the huge advantage that they do not engender the sort of mistrust and concern caused by the intervention of foreign states. Non-state humanitarian organizations seem likely to continue to play a vital part in delivering relief to countries with humanitarian crises. Enlightened governments should welcome the NGOs’ contribution and be ready to develop fuller dialogue and cooperation with them in order to help them to optimize their capacity to deliver their knowledge, resources, and 77 EBSCO : eBook Collection (EBSCOhost) - printed on 9/22/2018 5:38 PM via AMERICAN PUBLIC UNIV SYSTEM AN: 208528 ; Wilkinson, Paul.; International Relations : A Very Short Introduction Account: s7348467.main.ehost Non-states Copyright @ 2007. Oxford University Press. All rights reserved. May not be reproduced in any form without permission from the publisher, except fair uses permitted under U.S. or applicable copyright law. aid, and the help of professional experts such as doctors, nurses and so on, and (usually) wide experience of working with host governments and intergovernmental organizations such as the UN agencies. Human rights organizations such as Human Rights Watch and Amnesty International have a similarly vital role. Few governments would be prepared to speak so openly to condemn human rights violations. Governments tend to be worried about losing lucrative trade or investment opportunities or access to key commodities such as oil or natural gas. Non-state human rights organizations can perform an invaluable role by educating and mobilizing international opinion and shaming governments that abuse human rights by spreading accurate information about their misdeeds. International Relations Copyright @ 2007. Oxford University Press. All rights reserved. May not be reproduced in any form without permission from the publisher, except fair uses permitted under U.S. or applicable copyright law. specialized skills directly to the populations that are in greatest need. How would a senior adviser sum up his briefing to a new Secretary of State or a new Foreign Secretary on non-states? If he is doing his job properly he will avoid the old canard of state-centrism. He will not try to suggest that non-states can be safely ignored. States are extremely important, but so also are many non-state phenomena. The new Secretary of State will ignore them at her peril. Let us bear in mind that non-state organizations succeed in seizing power in Russia in 1917, in China in 1949, in India in 1948, and in Iran in 1979, and it was a non-state organization/network that carried out the devastating attacks on 11 September 2001. As a result of the actions of Al Qaeda on 9/11 we have a ‘War on Terror’, the war in Iraq, and a war in Afghanistan. It would be absurd to claim that non-state organizations are of only peripheral importance and have had no significant impact on international relations. 78 EBSCO : eBook Collection (EBSCOhost) - printed on 9/22/2018 5:38 PM via AMERICAN PUBLIC UNIV SYSTEM AN: 208528 ; Wilkinson, Paul.; International Relations : A Very Short Introduction Account: s7348467.main.ehost Terror on Facebook, Twitter, and Youtube Gabriel Weimann Professor Haifa University “My dear brothers in Jihad,” wrote a man who identified himself as Abu Jendal, “I have a kilo of Acetone Peroxide. I want to know how to make a bomb from it in order to blow up an army jeep; I await your quick response.” About an hour later the answer came: “My dear brother Abu Jendal,” answered a Hamas supporter who called himself Abu Hadafa, “I understand that you have 1,000 grams of Om El Abad. Well done! There are several ways to change it into a bomb.” Om El Abad—the mother of Abad—is the Hamas nickname for the improvised explosive TATP—triacetone triperoxide. Abu Hadafa then explained, in detail, how to change the homemade explosive into a deadly roadside bomb, and even attached a file that teaches how to make detonators for the bomb.1 Abu Jendal and Abu Hadafa are two anonymous Palestinians who, it seems, never met one another. The exchange was not encoded or concealed, but was published completely openly on the website of the Izz al din al Kassam Brigades, the military faction of the Hamas. This online form of exchanging of guidance, advice, and instructions has become commonplace in various terrorist chatrooms and online forums. Post-modern terrorists are taking advantage of the fruits of globalization and modern technology—especially advanced online communication technologies that are used to plan, coordinate and execute their deadly campaigns. No longer geographically constrained within a particular territory, or politically or financially dependent on a particular state, they rely on technologically modern forms of communication—including the internet. The internet has long been a favorite tool for terrorists.2 Decentralized and providing almost perfect anonymity, it cannot be subjected to controls or restrictions, and can Gabriel Weimann is Professor of Communications at Haifa University and The School of International Studies at American University. He is author of multiple books including Terror on the Internet: The New Arena, the New Challenges (2006), The Singaporean Engima (2001) and Communicating Unreality: Mass Media and Reconstruction of Realities (2000). Copyright © 2010 by the Brown Journal of World Affairs Spring/Summer 2010 • volume xvi, issue ii 45 Gabriel Weimann 46 be accessed by anyone. The internet has enabled terrorist organizations to research and coordinate attacks; to expand the reach of their propaganda to a global audience; to recruit adherents; to communicate with international supporters and ethnic diasporas; to solicit donations; and to foster public awareness and sympathy for their causes. The internet also allows terrorists to convey their messages to international and distant audiences with whom it would otherwise be difficult to communicate. The internet provides a means for terrorist groups to feed the mass media with information and videos that explain their mission and vision. By these means, the group’s message can reach a greater audience and more easily influence the public agenda.3 In addition to launching their own websites, terrorists can harness the interactive capabilities of chatrooms, instant messenger, blogs, video-sharing websites, self-determined online communities, and social networks. As Noguchi and Kholmann found, “90 percent of terrorist activity on the internet takes place using social networking tools, be it independent bulletin boards, Paltalk, or Yahoo! eGroups. These forums act as a virtual firewall to help safeguard the identities of those who participate, and they offer subscribers a chance to make direct contact with terrorist representatives, to ask questions, and even to contribute and help out the cyber-jihad.”4 By now, all active terrorist groups have established at least one form of presence on the internet and most of them are using all formats of modern online platforms, including e-mail, chatrooms, e-groups, forums, virtual message boards, and resources like You-Tube, Facebook, Twitter, and Google Earth. This essay examines the use of interactive online communication by terrorists and their supporters­—from chatrooms to Twitter and Facebook. Terrorist Chatrooms Chatrooms and electronic forums enable terrorist groups to communicate with members and supporters all over the world, to recruit new followers and to share information at little risk of identification by authorities. The free chatroom service PalTalk, which includes voice and video capabilities, has become particularly popular with terrorist cells. In one PalTalk chat room, British Islamic militants were found to have set up support forums for the killed leader of the insurgents in Iraq, Abu Musab al-Zarqawi. In another chatroom, Arabic-speaking users shared personal experiences of fighting Arab-Afghans. In another, relatives of Iraqi insurgents praised the “martyrdom” of the terrorists.5 On the alneda.com forum, al-Qaeda members posted comments praising Osama Bin Laden, such as “Oh Allah! Support your fighting slave Osama bin Laden.” Other message boards included threats against global security and reference to the 2005 London bombings. The website and forum were infiltrated and closed down by the brown journal of world affairs Terror on Facebook, Twitter, and Youtube an American hacker, but that did not stop al-Qaeda members, who simply started a new forum. In addition to generating support, terrorist groups use chatrooms to share tactical information. Jihadist message boards and chatrooms have been known to have “experts” directly answer questions about how to mix poisons for chemical attacks, how to ambush soldiers, how to carry out suicide attacks and how to hack into computer systems. One chatroom on the PalTalk index, with a name that is slightly altered each time but still identifiable, has been routinely advertised on Jihadi web forums and has been used on a daily basis to post links to al-Qaeda propaganda videos and terrorist instruction manuals.6 The forums Qalah, Al-Shamikh, Majahden, and Al-Faloja are especially popular among terrorist cells, and new recruits are encouraged to refer to the sites to read the jihadist literature. These chatrooms also aim to convince prospective members to join or to stage personal suicide attacks. According to SITE’s special report on Western Jihadist Forums, during 2009 several notable technical changes occurred in many of the jihadist forums.7 For example, the long offline, prominent English-language jihadist forum, al-Firdaws English, returned on 24 May 2009 in a form that is open to the public, rather than pass­wordprotected. Permitting non-members to view discussion and content on the forum is a significant departure for al-Firdaws style, as previous iterations of the forum have been 47 both completely password-protected and not open to new membership. The forum administration’s decision to open the forum to public observation suggests that they may envision the forum con­taining less sensitive information in the future. Despite allowing forum visitors to access threads and read content, al-Firdaws English remains closed to new and prospective members. The case of Younes Tsouli is especially demonstrative of the resourceful uses of the internet by terrorists. As one journalist put it, Tsouli, more commonly known by his internet pseudonym “Irhabi 007,” “illusThe case of Younes Tsouli is especially trated perfectly how terrorists are using the internet not just to spread propaganda, but demonstrative of the resourceful to organize attacks.”8 Between 2003 and the uses of the internet by terrorists. time of his arrest in December 2007, Irhabi 007 engaged in several instrumental activities on the internet. In 2003, he began joining various terrorist internet forums, where he uploaded and published pictures, videos, and instruction manuals on computer hacking. Shortly thereafter his skills were sought out by al-Qaeda leaders who wanted him to provide logistical support for their online operations, and in 2005 Tsouli became the administrator of the extremist internet forum al-Ansar, where he began publishing bomb making instruction manuals and details related to suicide bombing operations. He helped Zarqawi’s al-Qaeda faction in Spring/Summer 2010 • volume xvi, issue ii Gabriel Weimann Iraq and became a central figure in enabling Zarqawi to reestablish the links between al-Qaeda affiliated groups after the fall of the Taliban. Irhabi 007 eventually hacked his way into an unprotected file directory on an Arkansas state government website. He then posted propaganda and beheading videos. Cyber-tracking intelligence immediately noticed Irhabi 007’s perfect English and questioned the cybercriminal’s nationality. Younis Tsouli was caught in 2006. On his home computer, British investigators found photos of locations in Washington D.C. that had been emailed to him by colleagues which suggested that he was helping to organize a terrorist attack on Capitol Hill. Of course, after Tsouli was caught, other cyberterrorists learned from his mistake. When Terrorists “Tweet” 48 An intelligence report released in October of 2008 by the U.S. Army’s 304th Military Intelligence Battalion included a chapter entitled the “Potential for Terrorist Use of Twitter,” which expressed the Army’s concern over the use of the blogging service.9 The report says that Twitter could become an effective coordination tool for terrorists trying to launch militant attacks. The Army report includes references to several proHezbollah tweets. The report also highlights three possible scenarios of terrorist use of Twitter. The first scenario is that terrorists can send and receive near real-time updates on the logistics of troop movements in order to conduct more successful ambushes. In the second, one operative with an explosive device or suicide belt could use his mobile phone to send images of his or her location to a second operative who can use the near real-time imagery to time the precise moment to detonate the explosive device. The third is that a cyberterrorist operative could find and compromise a soldier’s account and communicate with other soldiers under the stolen identity.10 Although the last two options seem a bit far-fetched and difficult for terrorists to carry out successfully, the first option is a very viable threat. The instantaneous update capabilities could help the terrorists organize more precise and detrimental ambushes. According to the SITE report, despite the potential util­ity of Twitter, members of terrorist groups continue to be wary of networking sites such as Facebook. In response to a forum mem­ber’s suggestion to become friends on Facebook, some Ansar al-Mujahideen posters envisioned that such a network of friends could be a danger to Western jihadists. In a thread begun on 4 May 2009, Ansar al-Mujahideen members attempted to dissuade a member (called “islamic jihad union”) from connecting with other jihad supporters on Facebook. Soon, other Ansar al-Mujahideen participants were warning against using Facebook. Several forum members opined that the risks of having their real identity tied to their online personas outweighed the potential gains from networking with other jihad supporters. the brown journal of world affairs Terror on Facebook, Twitter, and Youtube Social Networking Popular social networking websites are another means of attracting potential members and followers. These types of virtual communities are growing increasingly popular all over the world, especially among younger demographics. Jihadist terrorist groups especially target youth for propaganda, incitement, and recruitment purposes. Terrorist groups and their sympathizers are using predominately Western online communities like Facebook, MySpace, Second Life, and their Arabic equivalents more frequently. Counter-terrorism expert Anthony Bergin says that terrorists use these youth-dominated websites as recruitment tools, “in the same way a pedophile might look at those sites to potentially groom would-be victims.”11 Social networking websites allow terrorists to disseminate propaganda to an impressionable age bracket that might empathize with their cause and possibly agree to join. Many users join interest groups that may help terrorists target users they might be able to manipulate. Many social network users accept people as friends whether or not they know them, thereby giving perfect strangers access to personal information and photos. Some people even communicate with the strangers and establish virtual friendships. Terrorists apply the narrowcasting strategy to social networking sites as well. The name, accompanying default image, and information on a group message board are all tailored to fit the profile of a particular social group. The groups also provide terrorists with a list of predisposed recruits or sympathizers. In the same way that marketing groups can view a member’s information to decide which products to target to a webpage, terrorist groups can view people’s profiles to decide whom they are going to target and how they should configure the message. Yet, terrorists are well aware of the risks involved. A member of a Jihadi forum in English issued a warning, reminding readers that a Fa­cebook network would allow security agencies to trace entire groups of jihad­ists, arguing: Don’t make a network in Fa­cebook...Then Kuffar will know every friend you have or had in the past. They will know loca­tion, how you look, what you like, they will know everything! Join Facebook if you want and use it to keep in touch with friends and brothers far away but not as a network.12 As a strategy to distribute jihadist propaganda to a wide range of Muslims and overcome countermeasures, a posting on the al-Fallujah jihadist forum on 16 March 2009 suggested that administrators of similar forums and media organizations create e-mail groups. This mailing group is patterned after the Ansar Mailing Group, an inactive jihadist media distributor that dispatched news of the mujahideen to users via e-mail. He suggested that other jihadists, too, create such groups to reach the largest possible Spring/Summer 2010 • volume xvi, issue ii 49 Gabriel Weimann number of users, and that they should remove any obstacle in the registration process that hinders distribution. To this end, the jihadist, in a later posting, provided instructions for creating groups on Google. Another forum participant, pleased with the suggestion, gave instructions on how to create a user account on Yahoo, and added that groups may be created on that service. You Have a Friend Request: Facebook 50 Membership within the international Facebook community has boomed in recent years. Facebook is currently the world’s most popular social networking website with an estimated 222 million users world wide, which includes a 66 percent membership increase within the Middle East and a 23 percent increase in Asia.13 Terrorists have taken note of the trend and have set up profiles as well. There are numerous Facebook groups declaring support for paramilitary and nationalist groups that the U.S. government has designated as terrorist organizations, such as Hezbollah, Hamas, the Turkish Revolutionary People’s Liberation Army, and the Liberation Tigers of Tamil Eelam (LTTE). The majority of these groups have open pages and anyone interested can read the information, look at the discussion boards, clink on links to propaganda videos, and join the group. Deputy Director for Intelligence at the National Counterterrorism Center Andrew Liepman recently reported to Congress that the Federal Bureau of Investigations is tracking a few Somali-Americans from the Minneapolis area that were reportedly recruited for the purpose of starting a U.S. terrorist cell of the Al-Shabaab faction through Facebook.14 The FBI is keeping a close eye on one Facebook user who posted a photo of a man wearing a black mask over his face and holding what appears to be the Koran in one hand and a grenade launcher in the other. Although some might argue that the aforementioned posting is probably in violation of Facebook’s terms of use, which bans posting “threatening,” “harassing,” or “hateful” messages, the FBI is finding it difficult to regulate terrorist activity on the internet because of First Amendment right issues. It is also nearly impossible to track down individuals involved in these sorts of instances because of the international nature of the websites. Social networking websites do not always have identifiable information about users; all that is needed to register for the websites in an email address and users often set up their accounts under false names and details. Terrorists can use these social networking sites to monitor military personnel. In 2008, the Canadian Defense Department and the British Secret Service M15 requested that troops remove personal details from social networking sites because of alleged monitoring by al-Qaeda operatives. U.S. personnel are also warned against the brown journal of world affairs Terror on Facebook, Twitter, and Youtube posting certain details or photos on their profile pages. Even if the information does not give details about the logistics of troop movements, it could potentially endanger the friends and relatives of military and security personnel. Many soldiers unwittingly post detailed information about themselves, their careers, family members, date of birth, present locations, and photos of colleagues and weaponry. Canadian troops have been asked to exclude any information from their profiles that might even link them with the military. A report from the Lebanese capital of Beirut later that year stated that Hezbollah had been monitoring Facebook to find potentially sensitive information about Israeli military movements and intelligence that could be harmful to the national security of Israel. The report quoted an Israeli intelligence official saying that “Facebook is a major resource for terrorists, seeking to gather information on soldiers and IDF [Israel Defense Forces] units and the fear is soldiers might even unknowingly arrange to meet an internet companion who in reality is a terrorist.”15 According to a posting on al-Ekhlaas, a password-protected al-Qaeda affiliated forum dated 21 August 2008, a group for supporters of the Islamic State of Iraq (ISI) and al-Qaeda is also using Facebook.16 The post briefly describes the pictures found in this Facebook group, which include shots of Osama bin Laden, Ayman al-Zawahiri, and ISI mujahedeen. One of the members commented on the utility of such a group: “these sites can be exploited to post our ideas and what we owe Allah to those who do not carry our ideology.” YouTube and “TheyTube” YouTube was established in February 2005 as an online repository facilitating the sharing of video content. YouTube claims to be the “the world’s most popular online video community.” A 2007 report from the Pew Internet and American Life Project put the percentage of U.S. online video viewers using YouTube at 27 percent, ahead of all other video sharing sites. In the 18 to 29 year-old age demographics, YouTube’s leadership is even more pronounced, with 49 percent of U.S. online video viewers. In fact, CNNMoney reported that in January 2008 alone, nearly 79 million users worldwide viewed more than three billion YouTube videos. Terrorist groups realized the potential of this easily accessed platform for the dissemination of their propaganda and radicalization videos. Terrorists themselves have praised the usefulness of this new online apparatus: “A lot of the funding that the brothers are getting is coming because of the videos. Imagine how many have gone after seeing the videos. Imagine how many have become shahid [martyrs],” convicted terrorist Younis Tsouli (so-called “Ithabi007”) testified. In 2008, jihadists suggested a “YouTube Invasion” to support jihadist media and the administrators of al-Fajr-affili- Spring/Summer 2010 • volume xvi, issue ii 51 Gabriel Weimann 52 ated forums.17 This suggestion was posted on al-Faloja, a password-protected jihadist forum, on 25 November 2008. The posting provides a synopsis of the YouTube site and its founding, and notes its use by, among others, President Barack Obama during his presidential campaign. YouTube is argued to be an alternative to television as a medium that allows for jihadists to reach massive, global audiences. This particular message even instructs jihadists to cut mujahedeen videos into ten-minute chunks, as per YouTube’s requirements, and upload them sequentially to the site. “I ask you, by Allah, as soon as you read this subject, to start recording on YouTube, and to start cutting and uploading and posting clips on the jihadist, Islamic, and general forums,” said the poster. “Shame the Crusaders by publishing videos showing their losses, which they hid for a long time.” Hezbollah, Hamas, the LTTE and the Shining Path of Peru all have propaganda videos on YouTube. One LTTE YouTube user has posted over 100 videos in 2009 alone.18 In 2008, Hamas allegedly launched its own video-sharing website, although the group denied ownership of the site. AqsaTube, in addition to choosing a similar name, was designed to look just like YouTube and even copied its logo. Once certain internet providers refused to host the website, Hamas launched a PaluTube and TubeZik.19 The LTTE has also launched TamilTube.20 These videos are not just aimed at Middle Eastern Muslim youths. More recent videos posted on these video-sharing websites are dubbed in English or have English subtitles. A recent study conducted by Conway and McInerney analyzed the online supporters of jihad-promoting video content on YouTube, focusing on those posting and commenting upon martyr-promoting material from Iraq.21 The findings suggest that a majority are less than 35 years of age and reside outside the region of the Middle East and North Africa with the largest percentage of supporters located in the United States. As the researchers concluded: “What is clearly evident however is that jihadist content is spreading far beyond traditional jihadist websites or even dedicated forums to embrace, in particular, video sharing and social networking—both hallmarks of Web 2.0—and thus extending their reach far beyond what may be conceived as their core support base in the Middle East and North Africa region to Diaspora populations, converts, and political sympathizers.” Conclusion Much of the original online terrorist content was one-directional and text-based, either in the form of traditional websites with a heavy reliance on text or as messages posted on forums. However, technological advances, particularly the increased availability of sophisticated, but cheap and user-friendly video capturing hardware (e.g., hand-held the brown journal of world affairs Terror on Facebook, Twitter, and Youtube digital video cameras, mobile telephones, etc.) and interactive online networking platforms (e.g., Facebook) have changed terrorist online communications. The global community created by social networks and interactive forums on the internet is advancing cultural awareness and reconciliation efforts, but it is also advancing terrorists’ goals to share their extremist messages to global audiences. By using these online communities to their advantage, not only can terrorists promote global paranoia, share their messages with sympathizers, and obtain donations, but they can also create more terrorists. The internet has provided terrorists with a whole new virtual realm to conduct their sinister back-ally transactions. Terrorist groups are no longer confined to specific regional boundaries—now terrorist networks can recruit and members located in any part of the globe.22 A person in the United States can literally take a terrorist training course within the privacy of their bedroom. The interactive capabilities of the internet, like chatrooms, social networking sites, video-sharing sites and online communities, allow terrorists to assume an offensive position. Instead of waiting for web-surfers to come across their websites and propaganda materials, terrorists can now lure targeted individuals to the sites. Paradoxically, the most innovative network of communication developed by the West with its numerous online networking platforms now serves the interests of the greatest foe of the West, W international terrorism. A Notes 1. This exchange was reported by Amit Cohen, “Hamas Dot Com”, in Maariv Online, 7 February 2003. 2. Gabriel Weimann, “How Modern Terrorism Uses the Internet,” United States Institute of Peace Special Report 116 (2004), http://www.usip.org/pubs/specialreports/sr116.pdf; Gabriel Weimann, Terror on the Internet: The New Arena, The New Challenges. (Washington, DC.: USIP Press Books, 2006a); Gabriel Weimann, “Virtual Training Camps: Terrorist Use of the Internet,” in ed. James Forest Teaching Terror: Strategic and Tactical Learning in the Terrorist World (Boulder: Rowman & Littlefield Publishers, 2006b): 110-132. 3. David H. Gray, and Albon Head. “The Importance of the Internet to the Post- Modern Terrorist and its Role as a Form of Safe Haven.” European Journal of Scientific Research 25 (2009): 396-404. 4. Yuki Noguchi, and Evan Kholmann. “Tracking Terrorists Online.” Washingtonpost.com video report. 19 April 2006. The Washington Post, , accessed 11 March 2009 . 5. Evan Kholmann, “Al Qaeda and the Internet.” Washingtonpost.com video report. The Washington Post, accessed 2 August 2005. 6. Elizabeth Montalbano, “Social networks link terrorists.” Computer World, 7 January 2009, accessed 13 March 2009. 7. InSITE: Western Jihadist Forums: The Monthly SITE Monitoring Service on Western Language Jihadist Websites, April-May 2009, accessed June 2009. 8. Gordon Corera, “Al-Qaeda’s 007: The Extraordinary Story of the Solitary Computer Geek in a Shepherds Bush Bedsit Who Became the World’s Most Wanted Cyber-Jihadist,” Times Online, 16 January 2008, http://women.timesonline.co.uk/tol/life_and_style/women/the_way_we_live/article3191517.ece. Spring/Summer 2010 • volume xvi, issue ii 53 Gabriel Weimann 9. “U.S. Army Says Blogging Site ‘Twitter’ Could Become Terrorist Tool.” Fox News, 27 October 2008, accessed 11 March 2009. 10. Noah Shachtman, “Spy Fears: Twitter Terrorists, Cell Phone Jihadists.” Wired, 24 October 2008, accessed 8 March 2009. 11. “Facebook terrorism investigation.” The Advertiser, 5 April 2008, accessed 10 March 2009. 12. InSITE: “Western Jihadist Forums,” ibid. 13. “Social Networking Explodes Worldwide as Sites Increase their Focus on Cultural Relevance.” Press release. ComScore.com. 12 August 2008, accessed 15 March 2009. 14. Andrew Liepman, Violent Islamist Extremism: Al- Shabaab Recruitment in America. Hearing before the Senate Homeland Security and Governmental Affairs Committee, 11 March 2009. 15. “Cyber Terrorism: Perils of the Internet’s Social Networks.” Middle East Times [Washington D.C.] 8 September 2008. 16. InSITE, “ISI Supporters Group on Facebook,” 21 August 2008. 17. “Jihadist Forum Suggests YouTube Invasion,” The Telegraph, 4 December 2008, http://www.telegraph. co.uk/news/worldnews/northamerica/usa/3547072/Jihadist-forum-calls-for-YouTube-Invasion.html. 18. http://www.youtube.com/user/TamilEelamTigers. 19. The Internet and Terrorism: Hamas and Palutube “Global Terrorism.” Right Side News, 6 April 2009. 20. http://www.tubetamil.com. 21. Maura Conway and Lisa McInerney, 2008. “Jihadi Video & Auto-Radicalisation: Evidence from an Exploratory YouTube Study,” In Proceedings of the 1st European Conference on intelligence and Security informatics, Esbjerg, 3-5 December 2008. 22. Maura Conway, “Terrorism and the Internet: New Media- New Threat?” Parliamentary Affairs 59 (2006): 283-98. 54 the brown journal of world affairs Copyright of Brown Journal of World Affairs is the property of Brown University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use.
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Hello buddy, attached is the initial response, kindly attach the student post to respond to. Thank you

Running Head: MERITS AND DEMERITS OF ENHANCED COMMUNICATION

Merits and demerits of enhanced communication
Student_Name
Course:
Institution

1

MERITS AND DEMERITS OF ENHANCED COMMUNICATION

2

Merits and demerits of enhanced communication
New technology is daily shrinking the world making it look smaller. It is making it easier
to access things that only recently could be accessed only in a dream by many. This is especially
the ca...

Similar Content

Related Tags