Several things can evoke the pain associated with acts of terrorism. A picture splattered across page one of a newspaper of a husband and wife cradling their baby following a bomb; a movie which shows the devastation following an army invasion.
But, recently, the United Nations has found a new medium to help the message resonate – the Internet.
Last week, counterterrorist officials from more than 30 countries met in Riyadh, Saudi Arabia, at a United Nations-sponsored workshop to discuss how the World Wide Web can be used to denounce acts of violence, according to a New York Times article published Sunday.
“The terrorist message, for all its deviancy and destructiveness, has gone unchallenged for too long,” Richard Barrett, a conference organizer who heads a United Nations office that monitors sanctions on Al Qaeda and the Taliban, said in the article.
As terrorists plot to harm various sects of the world, United Nations representatives are planning an attack of their own, one in which the Internet is their battleground. Working with international organizations as well as with private and nonprofit groups, several governments are working to “undermine the appeal of terrorists, expose their lack of legitimacy and attack the credibility of their ideology and online messengers.”
The Internet, according to these representatives, can serve as a forum to fight terrorism without the artillery and machine weapons.
And the best soldiers, according to the Times article, are those that previously performed acts of violence and are now speaking out about why their behavior was wrong. From “extremists who have renounced their pasts to Pakistani cricket stars who presumably have wide appeal among the youth solicited by both sides,” these messengers are the ones who can properly deliver the message.
In the wake of September 11, government officials have been working tirelessly to find ways to combat acts of terrorism. Some state that the best offense is a collaboration of human intelligence. The argument has been made that by working with other groups and sharing information, intelligence can be used to thwart terrorist plans.
The Obama administration has recently been advocating for government officials to be able more easily monitor into Internet and e-mail communications. Government officials have contended that law enforcement needs to make it more possible to tap into encrypted e-mails and perform phone taps when the conversation concerns terrorism or public safety issues. The issue has been met with both criticism and skepticism.
While calling for possible wiretaps on all communications and the entire Web might be a bit extremist, for lack of a better word, using the Internet as a secret weapon to fight terrorism, as suggested at the United Nations conference, might be a more diplomatic approach.
Want to learn more about the latest in communications & technology? Then be sure to attend ITEXPO East 2011, taking place Feb 2-4, 2011, in Miami. ITEXPO offers an educational program to help corporate decision makers select the right IP-based voice, video, fax and unified communications solutions to improve their operations. It's also where service providers learn how to profitably roll out the services their subscribers are clamoring for – and where resellers can learn about new growth opportunities. To register, click here.
TechZone360 Web Editor
Digital advertising has exploded in recent years, with the latest eMarketer data forecasting $83 billion in revenue this year and continued growth on …
One of the biggest challenges for 5G and last mile 10 Gig deployments is not raw data speeds, but middle mile and core networks. The wireless industry…
Although a new and emerging technology, (which is still evolving), in early 2018, most companies are not aware of the possible benefits they can achie…
VR could change everything from how we play video games to how we interact with our friends and family. VR has the power to change how we consume all …
The app economy is upon us, and businesses of all stripes are moving to address it. In this age of digital transformation, businesses rely on applicat…