Does the Al- Qaeda Spread Fear through Internet and Other Sources of Electronic Media – Thesis Proposal Example

Download full paperFile format: .doc, available for editing

The paper “ Does the Al- Qaeda Spread Fear through Internet and Other Sources of Electronic Media? ” is an  impressive example of a thesis proposal on media. This paper will be based on how Qaida uses the internet to spread or send their ideology to the world, and how they induce fear in the public using this technology. After the tragic September 11 incident a lot of key questions regarding the part that internet and media channels have played in the surfacing of the “ new terrorism. ” A lot of researchers have studied the change in terrorism in modern society, however, relatively little attention has been given to the fact that terrorists now use the internet.

How are “ terrorist” organizations using new media technologies? It is an important question. Before further moving on it is important to understand the concept of terrorism. Terrorism: Defining the ConceptTerrorism is an extremely sensitive phrase. Many use it in the wrong sense, as these days it may even be used for an abusive husband Section 2331 of Chapter 113b of the Federal Criminal Code defines terrorism as: " Activities that involve violent or life-threatening acts; that are a violation of the criminal laws of the United States or of any State; and appear to be intended (i) to intimidate or coerce a civilian population; (ii) to influence the policy of a government by intimidation or coercion; or (iii) to affect the conduct of a government by mass destruction, assassination, or kidnapping; and … (C) occur primarily within the territorial jurisdiction of the United States … [or] … (D) occur primarily outside the territorial jurisdiction of the United States … " A number of overarching concepts are extremely relevant while discussing terrorism.

The first important concept in warfare. Terrorists frequently give an excuse that they at war, they basically try to justify their acts of terrorism. The second concept is the rules of engagement of combat. If they are at war they should follow the guidelines given by the Geneva Convention. They have their own set of rules which they follow the jihad or holy war. Both go against the guidelines set by the Geneva Convention. Another concept is innocent civilians. During warfare, a lot of innocent people become the target.

The distancing and deceptive military term is "collateral damage. " However, the phrase terrorism means the deliberate targeting of civilians, like the 9/11 attack. The third concept is criminal acts apart from murder or torture. These could include kidnapping or drug dealing. A lot of terrorist groups financially strong, thus they turn to drug dealing, smuggling, robbery, kidnapping for ransom, etc for funding. Terrorist Use of the InternetThe terrorist has easy access to the internet as it is easier to globally spread uncensored information. This information is usually about their ideology and how they are being treated badly due to it.

Once, the groups attain important documents or information they use the internet as a medium for communication, and thus they spread information worldwide Networking and Information Sharing  Terrorists have a strong belief that information should always be shared. They tend to share all kinds of information, how to assemble explosives, attain fake passports, carry out identity theft, or providing both logistical and tactical information. Whilst usually depending on password-guarded forums, chat rooms and bulletin boards.

References

Proposed References

Brouns Thomas ( 2009)Exploiting insurgent violence in Afghanistan. Military Review U.S. Army CGSC Vol 89 Iss 4 p10(11) Retrieved On 25 February 2011 from usacac.army.mil/CAC2/.../Archives/.../MilitaryReview_20090831_art005.pdf

Cassel D, 2002, "US counter-terrorism: leap before you look?" World View Commentary number 136, Center for International Human Rig

Clarke David ( 2004 ),: Technology and Terrorism, Transaction Pub

Conway, M. (2006). Terrorism and the Internet: New media—a new threat? Parliamentary Affairs, 59(2), 283-298.

Durmaz Huseyin (2007), Understanding and responding to terrorism. North Atlantic Treaty Organization, Turkish Institute for Police Studies p208

Emery, D. (2006). Rumor Watch: 9/11 Terrorist Attack on U.S. Retrieved February 25, 2011, from http://urbanlegends.about.com/library/weekly/aa091101a.htm

Forest, J. (2006). The Democratic Disadvantage in the Strategic Communications Battlespace. Democracy & Security, 2(1), 73-101.

Jahangiri Ali (2009); Cyberspace, Cyber Terrorism, and Information Warfare: A Perfect Recipe for Confusion. Retrieved on 25 February 2011 from www.alijahangiri.org/.../Cyberspace-Cyberterrorism-and-Information-Warfare-A-Perfect-Recipe-for-Confusion.htm

Nacos, Brigitte L (2000). Mass-Mediated Terrorism: The Centrality of the Media in Terrorism and Counterterrorism, Second Edition. Lanham, MD: Rowman & Littlefield

Newitz, A. (2001), "Techsploitation: How 9-11 Will Change Cyberspace," retrieved on 25 February 2011 from .

O’Leary, Stephen (2002). Rumors of Grace and Terror. Los Angeles, CA: The Online Journalism Review. Retrieved 25 February 2011, from the Online Journalism Review Web site: http://www.ojr.org/ojr/ethics/1017782038.p

Schleifer, Ron (2006). Psychological Warfare in the Intifada: Israeli and Palestinian Media Politics and Military Strategies. Portland, Ore.: Sussex Academic,

Tsfati, Y., & Weimann, G. (2002)0Terror on the Internet. Studies in Conflict & Terrorism, 25(5), 317-332.

Wittebols, J.H., 1991. Politics and coverage of terrorism: from media images to public consciousness. Communication Theory I, pp. 253–266.

Download full paperFile format: .doc, available for editing
Contact Us