Web-Interpol gegen islamistische Propaganda
--- Die rechte US-Zeitung Washington Times berichtet über einen interessanten Workshop über die Bekämpfung islamistischer Internetpropaganda in Israel mit den üblichen Verdächtigen, die auf diesem Gebiet tätig sind:
The Internet has become the "seductive hypermedia" for radical Islamic terrorists, with official and unofficial Web sites, forums and chatrooms that appeal to supporters worldwide. ... An eclectic group of international experts in terrorist use of the Internet and graphic design specialists met recently in Israel's southern resort city of Eilat to formulate a comprehensive response campaign that deserves wide attention. As explained by Gabriel Weimann, of Israel's Haifa University, terrorists "narrow-cast" their messages to "trap" selected audiences of adherents. The different types of terrorist activities on the Internet require appropriately differentiated responses. As outlined by Mr. Weimann, one such response is based on what he terms a "MUD" approach (Monitoring, Using and Disrupting).Willkommen also zum Netwar, wie ihn Arquilla und Ronfeld schon vor langem vorhergesagt haben. Anregungen bietet der Workshop natürlich auch für die in letzter Zeit verstärkt vorgetragenen Forderungen von Schäuble und seinem US-Kollegen Chertoff zur stärkeren Überwachung des Internet. <a href="http://del.icio.us/esmaggbe/propaganda" rel="tag">propaganda</a>, <a href="http://del.icio.us/esmaggbe/netwar" rel="tag">netwar</a>, <a href="http://del.icio.us/esmaggbe/überwachung" rel="tag">überwachung</a>
c First, terrorist Web sites need to be monitored to learn about their mindsets, motives, persuasive "buzzwords," audiences, operational plans and potential targets for attack. These sites will also reveal whom they consider to be their political and religious authorities, as well as moderate religious clerics they regard as particularly threatening. Monitoring also reveals their inner debates and disputes.
c Second, counterterrorism organizations need to "use" the terrorist Web sites to identify and locate their propagandists, chat room discussion moderators, Internet service provider (ISP) hosts, operatives and participating members.
c Third, terrorist Web sites need to be "disrupted" through negative and positive means. In a negative "influence" campaign, sites can be infected with viruses and worms to destroy them, or kept "alive" while flooding them with false technical information about weapons systems, circulating rumors to create doubt about the reputation and credibility of terrorist leaders, or inserting conflicting messages into discussion forums to confuse operatives and their supporters. In a more positive approach, alternative narratives can be inserted into these Web sites to demonstrate the negative results of terrorism or, to potential suicide bombers, to suggest the benefits of the "value of life" versus the self-destructiveness of the "culture of death and martyrdom." ... such a response requires new counterterrorism "armies" possessing new strategies, capabilities, tactics and cyber weapons to counteract the Jihadi Web sites. ... The Eilat workshop also proposed an institutional framework to carry out such influence campaigns. Joint governmental and independent nongovernmental organization (NGO) campaigns would be driven by coordinated official and "unofficial" international monitoring entities that would form a "Web site Interpol." Guidelines would be issued to define "Red Lines" in terrorist supporters' Web sites which, crossed, would trigger measures to cease their presence on the Internet.