United Nations Turns to Web to Fight Terrorism

By

Several things can evoke the pain associated with acts of terrorism. A picture splattered across page one of a newspaper of a husband and wife cradling their baby following a bomb; a movie which shows the devastation following an army invasion.

But, recently, the United Nations has found a new medium to help the message resonate – the Internet.

Last week, counterterrorist officials from more than 30 countries met in Riyadh, Saudi Arabia, at a United Nations-sponsored workshop to discuss how the World Wide Web can be used to denounce acts of violence, according to a New York Times article published Sunday.

“The terrorist message, for all its deviancy and destructiveness, has gone unchallenged for too long,” Richard Barrett, a conference organizer who heads a United Nations office that monitors sanctions on Al Qaeda and the Taliban, said in the article.

As terrorists plot to harm various sects of the world, United Nations representatives are planning an attack of their own, one in which the Internet is their battleground. Working with international organizations as well as with private and nonprofit groups, several governments are working to “undermine the appeal of terrorists, expose their lack of legitimacy and attack the credibility of their ideology and online messengers.”

The Internet, according to these representatives, can serve as a forum to fight terrorism without the artillery and machine weapons.

And the best soldiers, according to the Times article, are those that previously performed acts of violence and are now speaking out about why their behavior was wrong. From “extremists who have renounced their pasts to Pakistani cricket stars who presumably have wide appeal among the youth solicited by both sides,” these messengers are the ones who can properly deliver the message.

In the wake of September 11, government officials have been working tirelessly to find ways to combat acts of terrorism. Some state that the best offense is a collaboration of human intelligence.  The argument has been made that by working with other groups and sharing information, intelligence can be used to thwart terrorist plans.

The Obama administration has recently been advocating for government officials to be able more easily monitor into Internet and e-mail communications. Government officials have contended that law enforcement needs to make it more possible to tap into encrypted e-mails and perform phone taps when the conversation concerns terrorism or public safety issues. The issue has been met with both criticism and skepticism.

While calling for possible wiretaps on all communications and the entire Web might be a bit extremist, for lack of a better word, using the Internet as a secret weapon to fight terrorism, as suggested at the United Nations conference, might be a more diplomatic approach.

Want to learn more about the latest in communications & technology? Then be sure to attend ITEXPO East 2011, taking place Feb 2-4, 2011, in Miami. ITEXPO offers an educational program to help corporate decision makers select the right IP-based voice, video, fax and unified communications solutions to improve their operations. It's also where service providers learn how to profitably roll out the services their subscribers are clamoring for – and where resellers can learn about new growth opportunities. To register, click here.


Carrie Schmelkin is a Web Editor for TechZone360. Previously, she worked as Assistant Editor at the New Canaan Advertiser, a 102-year-old weekly newspaper, covering news and enhancing the publication�s social media initiaitives. Carrie holds a bachelor�s degree in journalism and a bachelor�s degree in English from the S.I. Newhouse School of Public Communications at Syracuse University. To read more of her articles, please visit her columnist page.

Edited by Carrie Schmelkin

TechZone360 Web Editor

SHARE THIS ARTICLE
Related Articles

Coding and Invention Made Fun

By: Special Guest    10/12/2018

SAM is a series of kits that integrates hardware and software with the Internet. Combining wireless building blocks composed of sensors and actors con…

Read More

Facebook Marketplace Now Leverages AI

By: Paula Bernier    10/3/2018

Artificial intelligence is changing the way businesses interact with customers. Facebook's announcement this week is just another example of how this …

Read More

Oct. 17 Webinar to Address Apache Spark Benefits, Tools

By: Paula Bernier    10/2/2018

In the upcoming webinar "Apache Spark: The New Enterprise Backbone for ETL, Batch and Real-time Streaming," industry experts will offer details on clo…

Read More

It's Black and White: Cybercriminals Are Spending 10x More Than Enterprises to Control, Disrupt and Steal

By: Cynthia S. Artin    9/26/2018

In a stunning new report by Carbon Black, "Hacking, Escalating Attacks and The Role of Threat Hunting" the company revealed that 92% of UK companies s…

Read More

6 Challenges of 5G, and the 9 Pillars of Assurance Strategy

By: Special Guest    9/17/2018

To make 5G possible, everything will change. The 5G network will involve new antennas and chipsets, new architectures, new KPIs, new vendors, cloud di…

Read More