Defense against extremist use of the Internet

Collins, Susan
June 2007
Hill;6/5/2007, Vol. 14 Issue 65, p36
The author reflects on the radical movement as defense against extremist violence use of the Internet. She cites that the Internet has expanded the ability of radical groups to recruit, train, motivate and coordinate terrorists over vast distances without direct contact as it play a significant role in radicalizing people in the U.S. She implies that the need for considerable research could help understand the initiations for radicalization.


Related Articles

  • Chapter 3 Al-Qaeda vs. the Albanian Mafia. Uda, Robert T. // Terrorism & Counterterrorism: Victory Over Islamo-Fascist Jihadi;2008, p27 

    The article discusses the comparison between the Al-Qaeda and the Albanian Mafia. It states that the mafia uses violence against the family, person, and group which disobeyed them while the Al-Qaeda uses violence against innocent civilians. It cites that the group both uses tactics such as...

  • WHAT CAN I DO? Klingerman, Shelley // Counter Terrorist;Aug/Sep2015, Vol. 8 Issue 4, p46 

    The article discusses on the way civilians be get involved in homeland security. It mentions that there is an urgent need for the schools to be protected from all types of violence and civilians have greater roles to perform in the said endeavor. It adds that people should also understand the...

  • CONCEPT AND PRIORITIES OF CYBER DEFENCE. NAUMOVSKI, Toni; KENKOV, Vancho // Contemporary Macedonian Defense / Sovremena Makedonska Odbrana;Dec2014, Vol. 14 Issue 27, p77 

    Cyber defence is emerging as a high priority in an era of increasing use of information technology in the globalized world. Understanding cyber defence and security issues such as cyber space, cyber crime and cyber attacks ensure efficient functioning of information systems. Cyber attacks in...

  • TapatybÄ—s vagystÄ— elektroninÄ—je erdvÄ—je. Štitilis, Darius; Laurinaitis, Marius // Informacijos Mokslai / Information Sciences;2009, Vol. 50, p240 

    The article analyzes the identity theft in electronic space, and the main aspects of this dangerous crime. The article consists of four parts. The first part analyzes the identity and identification in electronic space category. The second part is dedicated to discussing and systematizes...

  • Editors' Foreword. Reisner, Katherine; Tsuda, Kenta // Brown Journal of World Affairs;Spring/Summer2007, Vol. 13 Issue 2, pv 

    The article discusses various reports published within the issue, including one on the phenomenon of terrorists recruited or self-enlisted from within domestic Western populations, and another on the integration of environmental and security policies.

  • The Conflict in Kashmir: An Examination of Security Imperatives for the United States. Poplin, Cody M. // Global Security Studies;Fall2011, Vol. 2 Issue 4, p20 

    One of the major security issues facing the United States today is how to handle the disputed Kashmir region. Since the independence movement in India, the valley has been the source of repeated conflicts between India and Pakistan. After evaluating the history of the conflict in and over...

  • National Security.  // Malawi Country Review;2013, p64 

    The article offers information related to threat to Malawi's national security such as crime rate of the country, and terrorism against Malawi.

  • How Soccer Moms Became Security Moms. Klein, Joe // Time;2/17/2003, Vol. 161 Issue 7, p23 

    Focuses on how women are focused on the protection of the U.S. against the next terrorist attack. Failure of the U.S. Office of Homeland Security to secure the protection of the nation against terrorists.

  • National Security.  // Nauru Country Review;2011, p51 

    The article provides an overview of the national security of Nauru, with details on its external threat and terrorist violence.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics