Terroristic groups use the Internet to help their propaganda and other recruiting methods. Many terrorist groups use the Internet as a tool for recruiting mainly targeting young people. They use infamous sites such as YouTube, Twitter and Facebook. These websites help them gain insight and recruit and almost advertise the things they think are right. As I researched terrorist groups and ISIS on YouTube there were a plethora of videos of terrorist members illustrating things they are trained on and how you can do some of the things like them. These videos are duplicates of the original because officials remove them, but these unoriginal videos are still being viewed over one million times. This is very alarming because people want to learn more about the training preparation of terroristic groups. These groups also use social media platforms to acknowledge their bombings and give explanations for them. What is sickening is the many people that follow them on their social media accounts. With the help of social media, terrorist groups can find like-minded individuals who idealize there thinking basically a way for radicalization and recruiting. These outlets are becoming a venue for perpetuating radicalization among the groups of recruits or interested spectators. These people who engage in researching and finding what terroristic groups do as intriguing are most likely looking for a way to fit in society. These people look for ways that their thinking can be justified and they find like-minded individuals just like them and they share a common stance. These groups and websites are really intensifying ones identity to make them feel better about the way they are feeling. “The widespread use of technology propagates the persistent terrorist message to attack U.S. interests whether in the homeland or abroad. Many foreign terrorist organizations use various digital communication platforms in an effort to reach individuals they believe may be susceptible and sympathetic to the message,” the FBI official said in his opening testimony (Grubs, 2016).” Through my research I concluded that these terrorist are transforming with time. As technology progress so are there technology propagates because it is convenient for and being how widespread the Internet is the more allies they can acquire. There are many terrorist groups and have been for many years, but with the help of technology; these groups thoroughly explain in websites their primary goals and find some similarities between each other ultimately acquiring allies. Now the Internet and websites will be the blame for the spread of terrorist propagandas. Looking more in depth, there is not an isolated item to be at blame for the spread of terrorism. The Internet is helping with the spread of terroristic information but them using different website platforms add to the spread of this information. These websites try their best to censor terroristic information but they cannot catch every terroristic thing that is being put on their sites especially regarding social media.
With the help of media and social media terrorism recruitment have been high especially for US citizens. These citizens feel betrayal by the government and look for ways to feel validated. That’s when they search for things to feel justified for their feelings against the government. These emotions are then expressed through plans of bombings and suicide bombings like the most recent attacks in America. The most recent attacks on America are from American citizens with terroristic ties. These ties are mostly through Internet communication. Terrorists have developed sophisticated encryption tools and creative techniques that make the Internet an efficient and relatively secure means of correspondence. These include steganography, a technique used to hide messages in graphic files, and “dead dropping”: transmitting information through saved email drafts in an online email account accessible to anyone with the password. Now terrorism is more than just bombings across countries but now they are cyberterrorism. “Cyberterrorism is defined as the use of the Internet as a vehicle through which to launch an attack (Kohlman, 2006).” Terrorist can now hack into security systems and distribute computer viruses. Terrorist uploading propaganda videos sometimes go through websites where the videos can be posted anonymously. But nothing done by computer can be anonymous as everything can be traced back via Internet protocol address. An Internet protocol address is a unique string of numbers separated by periods that identifies each computer using the Internet Protocol to communicate over a network. Every computer have an unique IP address so nothing no one does can not be tracked back. In chat rooms, terrorist use that medium to discuss religions views and not only to recruit but also step-by-step processes on how to construct bombs and suicide vest.
I do believe the government should heighten online security measures. Different online media services try to control the terroristic actions being done with the use of their platform but I think the government should help them. The government implementing some form of action against these terrorists would help decrease the spread of terroristic activity by United States citizens who feel the need to relate to groups like ISIS or Al-Queada. “When speech is protected, there is a high standard the government must meet in order to justify censorship. Especially in countries like the U.S., where freedom of speech is domestically protected, screening and removal of offensive social media raises complicated issues over what should and should not be censored” (Wu, 2015, p.15).
Grubs, Alex. Islamic State Most Adept Terrorist Group at Online Recruiting. 07 July 2016. 10 December 2016 .
Wu, P. (2015). Impossible to regulate? social media, terrorists, and the role for the U.N. Chicago Journal of International Law, 16(1), 281-311. Retrieved from https://login.proxy.lib.fsu.edu/login?url=http://search.proquest.com/docview/1696228641?accountid=4840