Select your localized edition:

Close ×

More Ways to Connect

Discover one of our 28 local entrepreneurial communities »

Be the first to know as we launch in new countries and markets around the globe.

Interested in bringing MIT Technology Review to your local market?

MIT Technology ReviewMIT Technology Review - logo


Unsupported browser: Your browser does not meet modern web standards. See how it scores »

{ action.text }

TR: Obviously the Web is full of all sorts of things. Why does any of this matter? How can the actual efficacy of terrorist Web exposure be measured?

GW: Let me only say that testimonies of terrorists indicate their trust in the usefulness of the Internet. Another measure is the many cases of people affected by Internet messages – from recruitment to support and fund-raising. The fact that they went from 12 websites to almost 5,000 in eight years shows how this medium became useful and important. Did you know about [Abu Musab al-] Zarqawi some years ago? No. But now you do, because he is launching attacks and publishing them on the Internet. The Chechen rebels were executing Russians and you never heard about it. Now you hear about it on the Internet.

TR: For free-loving people, who accept even the most noxious forms of speech, what in your view is the problem with this state of affairs?

GW: I am one of those who fight for freedom of speech, free press, and free Internet. And yet when it becomes a weapon, when it is used to kill and victimize people – then I look for ways to minimize the threat, to limit its potential for abuse and violence.

TR: But whose job is this? Should the same big companies, who are criticized for helping China censor dissidents, help Western nations censor terrorists?

GW: The big ISPs will take down sites only if somebody makes them aware of the abuse of the service they provide. They – Yahoo for example – will not scan all the forums, chat rooms, electronic boards, e-mails, and postings on their servers. Thus, their real power is rather limited and they are activated only by complaints from individuals, agencies, states, and organizations.

There is no way I will let Yahoo or Google scan the Internet and make a political decision on who is a terrorist and who isn’t. But if you can approach them and you can prove to them that formal agencies can do this scanning and monitoring, and tell them “Your service is being abused by those groups -– so please police it” – this is legitimate.

TR: Who are these “formal agencies” that will alert ISPs to abuse? The U.S. or Israeli government? Surely not the United Nations?

GW: It can be an ad hoc Internet security organization, which doesn’t have to be under the United Nations. There are so many measures that can be applied to the Internet, including access and monitoring the flow. But for every measure you apply to the Internet, there is a price tag you pay for it in terms of civil liberties, privacy freedom of speech. I think there can be a “golden path” to minimize the price in terms of civil liberties and damage to the Internet’s freedom, and yet reduce the Net’s use and abuse by terrorists.

TR: I have heard people say “Sure, terrorists use the Internet. They also use the highways and drink the water.”

GW: Drinking water or breathing air lets them live – but they are not weapons, they are not instruments of death and fear. By breathing or drinking you do not victimize anyone. The Internet in the hands of terrorists, as my study shows, is a lethal weapon. And we are just starting to witness its lethality.

7 comments. Share your thoughts »

Tagged: Web

Reprints and Permissions | Send feedback to the editor

From the Archives


Introducing MIT Technology Review Insider.

Already a Magazine subscriber?

You're automatically an Insider. It's easy to activate or upgrade your account.

Activate Your Account

Become an Insider

It's the new way to subscribe. Get even more of the tech news, research, and discoveries you crave.

Sign Up

Learn More

Find out why MIT Technology Review Insider is for you and explore your options.

Show Me