You are on page 1of 6

Katherine Gee

US Government
Rogers
October 18 2016
More Access to Internet Bill
According to Pew Research Centers Social Networking Fact Sheet, 89% of adults aged
18 - 29 use social media(Pew Research Center). With technology integrating into every aspect
of our lives, it is time we took advantage of arguably the greatest tool of the modern world.
While it plays an essential role in our day to day lives, it also can have deadly repercussions. For
years the controversy of online privacy has been discussed all over America.The issue of the
government of having more access to our online profiles and information has never sat well with
the public. However, with the new threat of ISIS and the constant reminder of 9/11 riding our
consciences, it can no longer be ignored. The July(2007) National Intelligence Estimate report,
states that the United States would face persistent and evolving terrorist threat over the next ten
years indicating our need for preparation(Wilson,Mike).Congress should allow more access of
personal data because of the changing perspective of terrorist groups on technology, the rising
number of terrorist-affiliated propaganda and recruitment, possibility of finding suspects online,
and a decrease in privacy will only affect those who arent committing any terrorist related
crimes.
Exactly how large of a role does the Internet play in our lives? According to Internet
World Stats, The number of internet users has increased tenfold from 1999 to 2013. It is
evident all over the world we live in a culture of social media. Apps like Snapchat,
Instagram,Twitter, and Facebook make it possible to share information at the click of a button
and just ask easily remove it. As a key player in all organizations, it comes as no shock that it
plays a huge role in terrorist groups. A playing field in where, the government has a very small

window into sharing of information of all kinds.Philip Seib, a professor of journalism and Public
Diplomacy at International Relations shares this about his research of Al Qaeda,Every second
Al Qaeda member was holding a laptop computer along with their Kalashnikov(Seib 2006).
With the change of the importance of technology in our culture it also seems the importance of
technology has changed within terrorist groups. A new perspective on how people can participate
has risen among many of the leaders. Rather than individual based terrorism many are suggesting
something more broad. Anwar- Al Awlaki Online Cleric for Al-Qaeda says this,Some ways in
which the brothers and sisters could be internet mujahidin is by contributing in one or more of
the following ways: establishing discussion forums that offer a free, uncensored medium for
posting information relating to jihad; establishing e-mail lists to share information with interested
brothers and sisters; posting or e-mail jihad literature and news; and establishing websites to
cover specific areas of jihad, such as mujahidin news, Muslim prisoners of war, and jihad
literature,( Al Awlaki). This may sound harmless but can leads to the hacking and spreading of
jihad beliefs.
Secondly, propaganda has taken on a whole new life thanks to the Internet, which has
encouraged many to act on their own or to recruit. For example, Advanced technologies also
allow the extremists to deliver well-coordinated propaganda campaigns that increase the levels of
support among the general public, which in turn allows terrorists to operate freely in these
societies. For example, one of al Qaedas goals is to use the Internet to create resistance
blockades in order to prevent Western ideas from further corrupting Islamic institutions,
organizations, and ideas.Such Websites are unfortunately common and some of these websites
are actually based in the U.S. It is more than just spreading ideas when the information shared
can actually have a real negative impact outside of the screen. There is evidence that such chat

rooms have produced actual events for example in the case of a 22-year-old student (a United
States national), Emerson Win eld Begolly, who was indicted for his involvement in the
distribution over the Internet of information relating to bomb-making and solicitation to commit
violence on American soil. Additional charges against him included assaulting and threatening
Federal Bureau of Investigation (FBI) agents with a loaded rearm(United States of America v.
Emerson Win eld Begolly). Without taking measures to stop this kind of behavior sooner, it is
possible we wont be able to control the impact and protect the people around us.
With an increase in access to more personal information, finding suspects could become a
reality. For example currently we cannot actually directly take in or convict those on public chat
forums because we dont have enough proof that they have committed any crimes. However the
Internet still creates a dangerous threat regardless of our ability to battle it. It allows a more
broad and potentially more dangerous way of ideology. According to a report by the
NYPD,During the Indoctrination phase, when individuals adopt this virulent ideology, they
begin interpreting the world from this newly-formed context. Cloaked with a veil of objectivity,
the Internet allows the aspiring jihadist to view the world and global conflicts through this
extremist lens, further reinforcing the objectives and political arguments of the jihadi-Salafi
agenda(NYPD). Without being able to regulate how people come to the faith more can act
individually. In the Jihadization phase, people challenge and encourage each others move to
action. The internet is now a tactical resource for obtaining instructions on constructing weapons,
gathering information on potential targets, and providing spiritual justification for an
attack(NYPD) In contrast to when the focus was going to a foreign country to seek out and find
terrorists, it is now entirely possible to easily find them thanks to the Internet.

A common worry with taking away privacy from citizens is that the government will
have more control over their lives. Along with this, the public is concerned they will convicted
for all crimes no matter how big or small will an increase in surveillance. However, with this bill
crimes only related to terrorism will be investigated. The phrase nothing will happen if you are
doing nothing wrong applies here if the information taken is only concerned with terrorist risk.
Information is moving far faster than the government can keep with and they need a bigger
proverbial net to be effective in producing results. Legal analysts, even courts,if not the larger
public, have long recognized that innovation in information and communications technologies
often moves faster than the protections afforded by legislation, which is usually written without
an understanding of new or emerging technologies, unanticipated terrorist tactics, or new
analytical capabilities(Pikowsky).The public recognizes the what could be gained from a bill
such as this. The possibility of having this new advantage overrides the suspicions of taking
away privacy when there are no repercussions for the normal law abiding citizen. In fact the
public actually favors the idea of using the internet in this specific way. In a study by Pew
Research Center states,8.82% say it is acceptable to monitor communications of suspected
terrorists(Pew Research Center). With this fact in mind, it is not a large step to acquire more
information against said suspected terrorists by opening up access to more personal information.
How can we protect what is near and dear to us from seemingly omnipresent threats? The
answer isnt by blindly searching for people that can be easily accessed right in front of us. By
changing with the culture of technology we can stay ahead and possibly go on the offensive in
these issues. An increase in personal information is a necessity for finding suspects,
understanding the issue and facing it head on. If you believe in having true security for our
country vote for my bill.

Works Cited
"Internet Users." Number of (2016). Web. 17 Oct. 2016.3
Silber, Mitchell D. "Radicalization in the West: The Homegrown Threat." NYPD(2007): 1-88.
New York City Police Department. Web. 10 Oct. 2016.
R.A. Pikowsky, The need for revisions to the law of wiretapping and interception of email,
Michigan Telecommunications & Technology Law Review 10(1), 2004.
Rainie, Lee, and Mary Madden. "Americans Views on Government Surveillance Programs."
Pew Research Center Internet Science Tech RSS. 16 Mar. 2015. Web. 18 Sept. 2016.

Seib, Philip. "The Al-Qaeda Media Machine." MILITARY REVIEW, May-June 2008. Web. 9
Oct. 2016.
"Social Networking Fact Sheet." Pew Research Center Internet Science Tech RSS. 27 Dec. Web.
17 Oct. 2016.
"Terrorists and the Internet." Council on Foreign Relations. Council on Foreign Relations, 08
Jan. 2009. Web. 17 Sept. 2016.
Verma, R. N. Internet Terrorism: New Trends and Challenges. Delhi: Navyug International,
2011. Print.
"The Virtual Jihad." Combating Terrorism Center at West Point. Web. 17 Oct. 2016.
Wilson, Mike. Terrorism: Opposing Viewpoints. Detroit: Greenhaven, 2009. Print.

You might also like