YouTube War: Fighting in a World of Cameras in Every Cell Phone and Photoshop on Every Computer. Cori E. Dauber. Читать онлайн. Newlib. NEWLIB.NET

Автор: Cori E. Dauber
Издательство: Bookwire
Серия:
Жанр произведения: Социология
Год издания: 0
isbn: 4064066312480
Скачать книгу
unit was accompanied by a cameraman who would videotape their operations from the front line.14 [My emphasis]

      Today even the smallest terrorist or insurgent group active in the Islamist movement, certainly those in the combat theaters of Afghanistan and Iraq, will have a specific position within the organization for the person whose responsibility is “media affairs”—in this they mirror al-Qaeda itself15—but this is invariably one of the highest ranking posts, obviously seen as a job of great importance and authority.16 Indeed, Hamid Mir, the Pakistani journalist and bin Laden biographer, described how he watched al-Qaeda men fleeing U.S. bombardments of their training camps in November 2001: “Every second al-Qaeda member [was] carrying a laptop computer along with his Kalashnikov,” he reported.17

      According to Lara Logan, CBS News’ Senior Foreign Correspondent and one of the very few reporters to have continued reporting regularly from Afghanistan during the time she was stationed in Baghdad, the Taliban always give the person with responsibility for media and information in an operational cell the number two position in the cell overall.18

      As that suggests, part of the reason terrorists can take advantage of this technology as easily as American “citizen journalists” can is that this is hardly a phenomenon restricted to the developed world or to citizens of the developed world. Laptops, the Internet, cameras, cell phones equipped with cameras, and the software that allows the user to tie it all together, have penetrated all but the most remote corners of the globe.19 This is “the era not only of the citizenjournalist, but also the terrorist-journalist.”20 For this to be useful to the terrorist or insurgent, of course, some of these technologies need to have penetrated the larger societies they are hoping to influence. Obviously Westerners were able to see it as soon as the video was uploaded to their own computers, but average Iraqis, without computers and often without electricity, were watching the Saddam hanging on their cell phones; often those who do not have computers at home or do not have regular electricity do have easy access to Internet cafes, and this is the case throughout the Islamic world.

      The latest estimates suggest that Internet use in the Middle East and North Africa is growing at a rate higher than any other place in the world. Between the years 2000–05, Internet access rates grew at a measure of around 411.5% (compounded growth.) Connectivity may be even higher than is estimated by conventional measures because of the large number of people in the region who use Internet cafes or community access points. … Jordan even made the Guinness Book of Records for the highest concentration of Internet cafes anywhere in the world. There are more than 200 Internet cafes on a single street in Irbid, Jordan.21

      Connectivity has grown at a rate of 100 percent in Iraq—but 900 percent in Algeria, 566 percent in Yemen, and 900 percent in Morocco over that same 5-year period.22

      But the use of these technologies is not only a feature of the insurgency in Iraq: if they are being used in a country without regular electric power, then obviously, they are being used in developed countries. In Britain, for example, police arrested a group on charges that they were plotting to kidnap a Muslim soldier on leave from duty in Afghanistan. But they were not interested in kidnapping him to bargain with authorities for the release of compatriots being held in various prisons as an earlier generation of terrorists might have done. Apparently the plan—from its original inception—was to kidnap someone so that the group would be able to film an execution, and then upload that footage onto the Internet.23 It is believed that it is when the group was spotted purchasing a camera that British security forces, after months of surveillance, finally moved in and made their arrests.24 This makes sense: in this context, the camera was as much a weapon as was the knife.

      Or as one jihadi magazine found on Irhabi007’s computer (an infamous webmaster for Zarqawi until his eventual capture in London) explained: “Film everything; this is good advice for all mujahideen [holy warriors]. Brothers, don’t disdain photography. You should be aware that every frame you take is as good as a missile fired at the Crusader enemy and his puppets.”25

      Today it is not just al-Qaeda but virtually every terrorist group, no matter how small, that has a presence on the web.26 Some groups have as many as 20 websites, many of which are extremely sophisticated, in multiple languages, even with separate pages specifically for children.27 The use of the Internet is not only for internal purposes, however. These groups also use the web as a means to communicate with the public, using the press as intermediary, posting communiqués, statements, and various declarations from terrorist leaders.

      Without a doubt, this material is important to their ability to reach their own constituencies and for their ability to recruit from those who have been labeled “swing voters,” those in the Islamic world who have not decided whether or not they are going to support the global Islamist insurgency. But these are sophisticated propagandists who are not only constructing sophisticated texts meant to simultaneously reach multiple audiences, they are also constructing multiple texts targeted to reach a variety of different categories of audience. They understand that the trick is that, in doing so, texts targeted to different audiences need to be modified slightly for each different audience.

      Конец ознакомительного фрагмента.

      Текст предоставлен ООО «ЛитРес».

      Прочитайте эту книгу целиком, купив полную легальную версию на ЛитРес.

      Безопасно оплатить книгу можно банковской картой Visa, MasterCard, Maestro, со счета мобильного телефона, с платежного терминала, в салоне МТС или Связной, через PayPal, WebMoney, Яндекс.Деньги, QIWI Кошелек, бонусными картами или другим удобным Вам способом.

/9j/4AAQSkZJRgABAgAAAQABAAD/2wBDAAgGBgcGBQgHBwcJCQgKDBQNDAsLDBkSEw8UHRofHh0a HBwgJC4nICIsIxwcKDcpLDAxNDQ0Hyc5PTgyPC4zNDL/2wBDAQkJCQwLDBgNDRgyIRwhMjIyMjIy MjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjL/wAARCBLAC7gDASIA AhEBAxEB/8QAHwAAAQUBAQEBAQEAAAAAAAAAAAECAwQFBgcICQoL/8QAtRAAAgEDAwIEAwUFBAQA AAF9AQIDAAQRBRIhMUEGE1FhByJxFDKBkaEII0KxwRVS0fAkM2JyggkKFhcYGRolJicoKSo0NTY3 ODk6Q0RFRkdISUpTVFVWV1hZWmNkZWZnaGlqc3R1dnd4eXqDhIWGh4iJipKTlJWWl5iZmqKjpKWm p6