CSIS:了解哈马斯和真主党对信息技术的使用(2023)11页

ID:68679

大小:2.26 MB

页数:11页

时间:2023-10-30

金币:4

上传者:神经蛙1号
CSIS BRIEFS | WWW.CSIS.ORG | 1
THE ISSUE
Hamas’s and Hezbollahs information technoloy (IT) strategies heavily reect their roles in governance. Terrorist
organizations like al Qaeda and the Islamic State eschew nationalism in favor of a broad pan-Islamist vision and focus media
operations primarily on recruitment and at times operations. In contrast, Hamas and Hezbollah are nationalist as well as
Islamist in orientation and favor traditional forms of communication over social media in order to legitimize their political
power—a preference reinforced by the policies of technoloy companies and, in general, the limited capacity of these terrorist
groups to use social media without considerable risk. Because Hamas and Hezbollah govern and provide goods, services, and
information to their constituents, it is harder to target their IT infrastructure without risking humanitarian consequences.
JULY 2023
CSIS BRIEFS
By Daniel Byman and Emma McCaleb
H
amas and Hezbollah are among the world’s most
important and multifaceted terrorist groups. In
addition to conducting terrorist attacks, they run
hospitals and schools and otherwise engage in social and
political activities that make them important in the daily
lives of many Palestinians and Lebanese, including those
who do not support their ideologies. Perhaps their greatest
inuence, however, is through governing. Hamas is the de
facto government of Gaza, and for many years Hezbollah
has been part of the Lebanese government, eectively
governing southern Lebanon, occupying cabinet positions
directly and via its allies and often acting as a kingmaker, or
at least veto player, for the countrys prime minister. These
roles stand in contrast to the aims of groups like the core of
al Qaeda, which has focused primarily on terrorism, or in
the case of the Islamic State, war. Today core Al Qaeda and
the Islamic State play little or no role in governing.
Governing shapes how Hamas and Hezbollah use
communications technologies. Although both groups
use social media and other technologies to recruit and,
at times, support operations, their primary focus is using
more traditional media to gain support from Arab and
Muslim populations and bolster morale within their
organizations, with their constituents in the Palestinian
territories and Lebanon comprising their most important
audiences. Counterterrorism also shapes this focus: social
media–run operations are highly vulnerable, and Israeli
counterterrorism can exploit this to disrupt attacks.
This paper describes how Hamas and Hezbollah
use information technoloy (IT), highlighting their
similarities and dierences and comparing them with
groups like the Islamic State. The paper concludes by
identifying the implications for counterterrorism.
HAMAS’S IT STRATEGY
Hamas has fought Israel and sought dominance in the
Palestinian national community for over 30 years.
Although the militant Palestinian movement has faced
Understanding Hamas’s and
Hezbollahs Uses of
Information Technoloy
资源描述:

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。
关闭