Leave a comment

How terrorists are taking over the Internet and why no one can stop them

How terrorists are taking over the Internet and why no one can stop them
photo courtesy of shutterstock

You've heard the alarming news reports. Terrorist groups like ISIS have used the Internet to coordinate deadly attacks and recruit extremists who kill, torture and enslave people around the world.

We've also told you that social media sites like Facebook have taken no-tolerance approaches to terrorists. They yank them off the sites. Yet, ISIS and other terrorists keep popping up online.

How is that possible, and why isn't the U.S. government doing more to stop them? There's a two-part answer.

First, their social media activity is easy to monitor and stop. Second, no one really knows how they're accessing the Internet, so it's almost impossible to stop them. Plus, we may not want to. (More on that in a minute.)

Most experts believe they're accessing the Internet with satellite dishes or microwave dishes. ISIS controls a lot of land, but has almost no infrastructure for fixed-line broadband access.

To access the Internet with a satellite dish, terrorists just need an Internet subscription, a modem, a dish to receive the signal, and a V-sat terminal (those cost as little as $500).

While satellite companies can just cut off access, which the Iraq government has been requesting, there are still issues that make it tough to stop ISIS. For one thing, while it functions as a country, ISIS' borders are constantly changing, as are its leaders.

Plus, ISIS controls an area with a lot of people, about 5 million. Complicating that, many resellers sell all those people satellite Internet access. "Anybody can become a reseller," a source recently told Reuters. "It's very informal and wholesalers probably want to keep it that way."

Next page: How terrorists hide online
How to dump your Facebook friends (and why you should)
Previous Happening Now

How to dump your Facebook friends (and why you should)

Top Story: 715 critical security flaws found in automated medical equipment
Next Happening Now

Top Story: 715 critical security flaws found in automated medical equipment

View Comments ()