Internet, and specifically belong to a social network, "does not seem to play a significant role" in the radicalization of Muslims to the cause of Al Qaeda , concludes a report by the British Home Office ( PDF ).
This report, one of three on terrorism charge in 2009 by the previous Labour government, examines the most effective ways of attracting recruits and the profile of people likely to join extremist causes.
The study recognizes that social contacts are very important for the recruitment of militants, but not so much through the Internet and through direct relationships with people already involved in criminal or moral authority figures.
" It may seem surprising that the Internet plays a key role in the radicalization influenced by Al Qaeda, as is the means par excellence of social connection, "the document explains that the technology presents obstacles to the formation of intimate relationships .
"The personal ties with radical agents, be they colleagues, activists, recruiters or figures of moral authority, do play a key role" in attracting followers for causes like Al Qaeda, says the study.
This report contradicts other institutions in countries like the U.S., where only three years ago a Senate report ( PDF ) warned of the use of Internet by al Qaeda precisely to attract and recruit supporters .
Unclear Profile
In the British report, as the profile of the "vulnerable" to fall into the trap of extremist organizations such as the one leading the late Osama bin Laden, the researchers conclude that although there are common features can not define a specific prototype because it would generate "many false positives" .
Can be said however that in general, more likely to join terrorist organizations in the style of Al Qaeda are young people between 15 and 35 years who find it hard to cope with stress or difficult situations and who are committed to values slightly moral and conventional rules .
Also influences the statement said, if these youth are at a "determinant" of his life , such as that just lost the job or have lost a loved one in traumatic circumstances.
To prevent radicalization, experts say, it is important to control the appearance and access to scenarios in which a moral authority figure can influence people vulnerable to terrorist ideologies.
Subscribe to:
Post Comments (Atom)
Blog Archive
-
▼
2011
(360)
-
▼
November
(222)
- Youtube features a tool to edit videos on the web
- Born an iceberg the size of New York in Antarctica
- A programmer calls to his girlfriend via Google Maps
- Home for iPad
- Tim O'Reilly: "Web 2.0 concept is obsolete"
- The Internet of Things
- Need for Speed: The Run
- Barnes & Noble displays its first tablet
- Is Nokia's last chance?
- Microsoft is working on a PC Kinect
- Newspaper readership is the most widespread intern...
- The network that mocks the police threw the angry ...
- Spotify wins and loses users of electronic music
- Electronic tablet cheapest in the world
- Turkey block access to Facebook
- Robots as employees in Foxconn
- NASA launches a mission to Mars
- SmartWatch 'clocks'
- The worst (and most popular) passwords, 2011
- Possibilities to work on Internet connection
- Virtual Reality through bionic contact lenses
- Cyborg insects venture into the unknown
- Five things you should know about the Galileo navi...
- Why the "dummies" of the crash test cars have that...
- Lens iPhone Dial, three lenses that rotate on the ...
- Displa, holograms touch
- Warning of possible scams in the most important da...
- Halo Aniversary: a lesson for another ten years
- The origins of Lara Croft
- Hundreds of Xbox Live accounts suffer an attack of...
- The e-book with the best screen in the world
- Thirty giant iPhones to pay tribute to Steve Jobs
- One hundred emails from Steve Jobs come to light
- The best day to buy an iPhone
- 37,000 euros for a puzzle
- There are over paid apps in Android Apple
- Santillana launches children's applications for iP...
- Google closes more services
- Nokia Siemens to lay off 17,000 people by 2014
- The TouchPad record-breaking sales in the U.S.
- South Korea bans video games to minors at night
- Simulates a virus come from the National Police
- Apple removes a subscription-based gaming application
- Europe bans Internet filter operators to prevent i...
- New campaigns phishing messages pretend to Faceboo...
- A robot control the movements of a human arm
- The consumer technology for low-income
- Now You Can See the Source of Einstein’s Genius
- Samsung Galaxy Ace, Special Edition Hugo Boss
- How the tablets affect the way of watching TV?
- Japanese researchers create a robot to get dressed...
- 3 Uncharted: Drake's deception, better than a movi...
- The Gmail password? Better not to reuse it elsewhere
- This factory produces 2.0
- What is your 'last will online'?
- Socle, Microsoft's secret project
- The new Motorola rugged smartphone
- 40,000 applications for Windows Phone
- Intel launches 50-core superchip
- A 'hacker' denounces the fragility of the systems ...
- Skype application for Facebook
- The parodies of the PP and PSOE won the rallies on...
- They claim that the iPhone does not recognize 4S s...
- The entrepreneurs and the power user will star in ...
- Microsoft is preparing a system for companies to c...
- Google + incorporates its own 'Trending Topics' an...
- Screen TV to Facebook
- Individual glasses 3D display in November
- Charge your phone walking
- Watson, IBM's artificial intelligence for the future
- This Christmas will be sold 1,440 million euros fo...
- The end of the heating of the computers
- Google challenges you to shape your city with Goog...
- They create the lightest solid material in the world
- Ten basic safety tips computer
- Apple and Amazon want to put 'airbags' in your mobile
- A website recommended to drink as you hear the music
- Launch a 'telephoto' ultralight for iPhone 4
- Max Payne returns to the fray
- Twitter accounts for over 90% of online opinions o...
- They discover a mysterious lines in the Gobi deser...
- Nokia will release a tablet with Windows 8 in 2012...
- Google, Facebook, eBay and Twitter, among others, ...
- A porn producer, ready to sue HTC for the name of ...
- A new world for the 'e-book'
- Samsung redesigned its Galaxy Tab 10.1 to avoid th...
- Amazon will launch a 'smartphone' low cost in 2012
- Cassini documents the development of a giant storm...
- The TC includes data stored on a computer in the p...
- Kodak is selling its photo sharing service on the ...
- Facebook and Twitter: Rubalcaba and Rajoy just bee...
- Waterproof Headphones
- Create a flexible OLED
- The SIM card world's smallest
- Launched two new touchscreen BlackBerry, Bold 9790...
- Ilya dies at 22 Zhitomirskiy, cofounder of the Dia...
- The next Bioshock
- An electric car made by a single molecule
- A decade of Xbox
- Fujitsu launches first dual screen 2D and 3D
-
▼
November
(222)
0 comments:
Post a Comment