网络恐怖主义:媒体的神话还是明确而现实的危险?

M. Conway
{"title":"网络恐怖主义:媒体的神话还是明确而现实的危险?","authors":"M. Conway","doi":"10.1163/9789004495364_009","DOIUrl":null,"url":null,"abstract":"The Internet is the instrument of a political power shift. It is the first many-to-many communication system. The ability to communicate words, images, and sound s, which underlies the power to persuade, inform, w itness, debate, and discuss (not to mention the power to sl ander, propagandise, disseminate bad or misleading information, engage in misinformation and/or disinf ormation, etc.) is no longer the sole province of t hose who own printing presses, radio stations, or television networks. Every machine connected to the Internet is potentially a printing press, a broadcasting statio n, a place of assembly. And in the twenty first cen tury, terrorists are availing of the opportunity to connect. The Internet is an ideal propaganda tool for terror ists: in the past they had to communicate through a cts of violence and hope that those acts garnered sufficie nt attention to publicise the perpetrators cause or xplain their ideological justification. With the advent of the I nternet, however, the same groups can disseminate t heir information undiluted by the media and untouched by government sensors. In 1998 it was reported that 1 2 of the 30 terrorist organisations identified by the US Sta te Department had their own websites. Today, a majo rity f the 33 groups on the same list of Designated Foreign Te rrorist Organisations maintain an official online p resence (see Conway 2002). 1 The question that then arises is this: Are terrori st groups who use the Internet in such a manner ‘cyberterrorists’? The answer hinges on what constitutes cyberterrorism. The term cyberterrorism unites two significant mode rn fears: fear of technology and fear of terrorism. Both of these fears are evidenced in this quote from Wal ter Laqueur, one of the most well known figures in terrorism studies: “The electronic age has now made cyberterr o ism possible. A onetime mainstay of science ficti on, the doomsday machine, looms as a real danger. The conju nction of technology and terrorism make for an unce rtain and frightening future” (Laqueur 1999, 254). It is not only academics that are given to sensationalism . Cyberterrorism first became the focus of sustained analysis by government in the mid-1990s. In 1996 Jo hn Deutch, former director of the Central Intelligence Agency (CIA), testified before the Permanent Subco mmittee on Investigations of the United States’ Senate Governmental Affairs C ommittee:","PeriodicalId":384069,"journal":{"name":"War and Virtual War","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2004-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Cyberterrorism: Media Myth or Clear and Present Danger?\",\"authors\":\"M. Conway\",\"doi\":\"10.1163/9789004495364_009\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The Internet is the instrument of a political power shift. It is the first many-to-many communication system. The ability to communicate words, images, and sound s, which underlies the power to persuade, inform, w itness, debate, and discuss (not to mention the power to sl ander, propagandise, disseminate bad or misleading information, engage in misinformation and/or disinf ormation, etc.) is no longer the sole province of t hose who own printing presses, radio stations, or television networks. Every machine connected to the Internet is potentially a printing press, a broadcasting statio n, a place of assembly. And in the twenty first cen tury, terrorists are availing of the opportunity to connect. The Internet is an ideal propaganda tool for terror ists: in the past they had to communicate through a cts of violence and hope that those acts garnered sufficie nt attention to publicise the perpetrators cause or xplain their ideological justification. With the advent of the I nternet, however, the same groups can disseminate t heir information undiluted by the media and untouched by government sensors. In 1998 it was reported that 1 2 of the 30 terrorist organisations identified by the US Sta te Department had their own websites. Today, a majo rity f the 33 groups on the same list of Designated Foreign Te rrorist Organisations maintain an official online p resence (see Conway 2002). 1 The question that then arises is this: Are terrori st groups who use the Internet in such a manner ‘cyberterrorists’? The answer hinges on what constitutes cyberterrorism. The term cyberterrorism unites two significant mode rn fears: fear of technology and fear of terrorism. Both of these fears are evidenced in this quote from Wal ter Laqueur, one of the most well known figures in terrorism studies: “The electronic age has now made cyberterr o ism possible. A onetime mainstay of science ficti on, the doomsday machine, looms as a real danger. The conju nction of technology and terrorism make for an unce rtain and frightening future” (Laqueur 1999, 254). It is not only academics that are given to sensationalism . Cyberterrorism first became the focus of sustained analysis by government in the mid-1990s. In 1996 Jo hn Deutch, former director of the Central Intelligence Agency (CIA), testified before the Permanent Subco mmittee on Investigations of the United States’ Senate Governmental Affairs C ommittee:\",\"PeriodicalId\":384069,\"journal\":{\"name\":\"War and Virtual War\",\"volume\":\"19 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2004-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"War and Virtual War\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1163/9789004495364_009\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"War and Virtual War","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1163/9789004495364_009","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6

摘要

互联网是政治权力转移的工具。这是第一个多对多通信系统。沟通文字、图像和声音的能力,是说服、告知、见证、辩论和讨论的力量(更不用说煽动、宣传、传播不良或误导性信息、参与错误信息和/或虚假信息等的力量)的基础,不再是那些拥有印刷厂、广播电台或电视网络的人的专有领域。每一台连接到互联网的机器都可能是一台印刷机,一个广播站,一个集会场所。在21世纪,恐怖分子正在利用这个机会进行联系。互联网是恐怖分子理想的宣传工具:在过去,他们必须通过暴力行为进行沟通,并希望这些行为能够引起足够的关注,以宣传肇事者的原因或解释他们的意识形态理由。然而,随着互联网的出现,同样的群体可以传播他们的信息,而不受媒体的稀释,也不受政府传感器的影响。1998年,据报道,美国国务院认定的30个恐怖组织中有12个拥有自己的网站。今天,33个被列入指定外国恐怖组织名单的组织中,大多数在网上保持官方存在(见Conway 2002)。接下来的问题是:以这种方式使用互联网的恐怖组织是“网络恐怖分子”吗?答案取决于什么构成了网络恐怖主义。网络恐怖主义一词结合了两种重要的网络恐惧:对技术的恐惧和对恐怖主义的恐惧。这两种担忧在恐怖主义研究领域最著名的人物之一沃尔特·拉克尔(walter Laqueur)的一句话中得到了证明:“电子时代现在使网络恐怖主义成为可能。曾经是科幻小说中流砥柱的“末日机器”(doomsday machine),已成为一种真正的危险。技术和恐怖主义的结合创造了一个可怕的未来”(Laqueur 1999,254)。不仅仅是学术界喜欢哗众取宠。20世纪90年代中期,网络恐怖主义首次成为政府持续分析的焦点。1996年,中央情报局(CIA)前局长约翰·多伊奇在美国参议院政府事务委员会常设调查小组委员会作证时说:
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Cyberterrorism: Media Myth or Clear and Present Danger?
The Internet is the instrument of a political power shift. It is the first many-to-many communication system. The ability to communicate words, images, and sound s, which underlies the power to persuade, inform, w itness, debate, and discuss (not to mention the power to sl ander, propagandise, disseminate bad or misleading information, engage in misinformation and/or disinf ormation, etc.) is no longer the sole province of t hose who own printing presses, radio stations, or television networks. Every machine connected to the Internet is potentially a printing press, a broadcasting statio n, a place of assembly. And in the twenty first cen tury, terrorists are availing of the opportunity to connect. The Internet is an ideal propaganda tool for terror ists: in the past they had to communicate through a cts of violence and hope that those acts garnered sufficie nt attention to publicise the perpetrators cause or xplain their ideological justification. With the advent of the I nternet, however, the same groups can disseminate t heir information undiluted by the media and untouched by government sensors. In 1998 it was reported that 1 2 of the 30 terrorist organisations identified by the US Sta te Department had their own websites. Today, a majo rity f the 33 groups on the same list of Designated Foreign Te rrorist Organisations maintain an official online p resence (see Conway 2002). 1 The question that then arises is this: Are terrori st groups who use the Internet in such a manner ‘cyberterrorists’? The answer hinges on what constitutes cyberterrorism. The term cyberterrorism unites two significant mode rn fears: fear of technology and fear of terrorism. Both of these fears are evidenced in this quote from Wal ter Laqueur, one of the most well known figures in terrorism studies: “The electronic age has now made cyberterr o ism possible. A onetime mainstay of science ficti on, the doomsday machine, looms as a real danger. The conju nction of technology and terrorism make for an unce rtain and frightening future” (Laqueur 1999, 254). It is not only academics that are given to sensationalism . Cyberterrorism first became the focus of sustained analysis by government in the mid-1990s. In 1996 Jo hn Deutch, former director of the Central Intelligence Agency (CIA), testified before the Permanent Subco mmittee on Investigations of the United States’ Senate Governmental Affairs C ommittee:
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Cross-Track Approach: A Remedy to Post-Conflict Peace Building? Contemporary British Cinema and the Re-Imagining of World War Two: A Virtual/Humane Sensibility to War and a ‘New’ Grammar of Heroism The ‘Problem’ (Not the ‘Theorem’) of War - On Pasolini’s Salò Globalisation and the Just War Tradition: The Vexing Problem of Legitimate Authority Playing War in Computer Games: Images, Myths, and Reality
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1