Money Making Opportunities

28 01 2010

I will explain how to making money on the internet, I will mention some points for every available opportunity.
Making money opportunities are classified 2 such as :

A. Top money making B. Middle money making ( next article )

Top Money Making Opportunities :

1: Google Adsense: The advertisement program from Google is the best money making opportunity online for many reason, the first reason is you don’t need to sell or buy something to earn money, you just need an informational website that can help the internet surfers. You build a small niche website, you add the codes, and the system will display the ads which related to your content and you will earn every time a visitor click on the ads, it is that simple.

2: Affiliate Program: You will earn a commission buy adding your referral code in your website, and will a visitor go to the website that your are promoting and buy a something, you will get your commission instantly. You don’t need to sell of buy something, you can earn money without any websites using some advertisement systems like Google Adwords and Email marketing.

3: Sell your E book: you can write an ebook on a topic of your experience, you can build a small web page to sell your ebook from it. You can accept credit cards and other payment systems through PayPal, AlertPay and ClickBank.

4: Buy and sell domains: Everyday, there are new products release, you can buy domains related to these products and then you can sell them again with a high price. Example: say that a new product “X” have been released recently, you can buy these domains”BuyX.com, PurcahseX.com, AffordableX.com, Cheapx.com and so on. After tow or three months, you can resell them with more higher price.

5: Sell complete websites: You can build small websites with unique contents to sell them, you can easily earn one or tow hundred dollars from every website you sell. You can rewrite the PLR articles to build tens of niche website to sell them for good income.

That are some opportunities to making Top money,, suggest to do it : Focus, Continuous and Be patient





Tips How To Pick The Blogspot Template

27 01 2010

I think blogger templates or themes that are good for SEO :

1. Without a background image especially if there are image files stored on photobucket, the result is slow loading
2. Column 2 or 3 columns with sidebar on the right position. (if this is only my opinion)
3. Heading structure in order, that is H1 to the header or title of your blog headers (if not using image) H2 for the post title and sidebar titles.
4. There are required to link the main page in the footer.
5. Support navigation / breadcrumb (this is very helpful google spider robots to crawl your website or blog later)

For a while it was “Tips Choosing The Blogspot Template Seo Friendly” in my opinion, and remember, it was tips on choosing a template rather than a template optimization. (See next article)





The top 10 stories of 2008 ( internet marketing story )

30 12 2008

March is commonly said to come in like a lamb and go out like a lion, or vice-versa, but when the month of March sees one of the financial system’s most venerable and even revered names — in this case, Bear Stearns (a lion of Wall Street, one might say) — go down in flames, all the cutesy aphorisms and simple summations go out the window.

March was that kind of month, setting the stage for that kind of year.

In lieu of our weekly Top 10, we present the 10 news and commentary stories that drew the most attention from MarketWatch readers in 2008.

Additional Headlines and story  :

*Billionaire investor Kirk Kerkorian has sold off all of his remaining shares   of   Ford Motor Co, Detroit ( Reuters )

*Citigroup shares dropped more than 6 percent( Dubai )

*The pardons President George W. Bush granted…(more )

Tim Rostan , managing editor

10 Headlines and story links appear below:

* Gas could fall to $2 if Congress acts. (June 23.)
* Stock futures pointing to sharp losses when U.S. reopens Tuesday. (Jan. 22.)
* The Sarah Palin phenomenon is doomed. (Media Web column by Jon Friedman, Sept. 15.)
* Warm-weather cities sinking to bottom 10. (Special report on best and worst cities for business by Russ Britt, Dec. 2.)
* Gulf investors may not save Citigroup, Dubai executive says. (March 4.)
* Bank failures to surge as credit crunch slows economy. (Weekend Edition by Alistair Barr, May 23.)
* Trump Entertainment to miss interest payment. (Nov. 30.)
* Top hedge-fund managers funereal in midst of crisis. (Nov. 7.)
* Bank stocks plunge as investors mull next potential casualty. (July 14.)
* Four years of home-price gains wiped out: Case-Shiller data. (Economic Report by Rex Nutting, June 24.)





internet marketing inflight

25 11 2008

Virgin America Brings Gogo(r) Inflight Internet and YouTube Live to the Skies

Special Flight Will Include First Air-to-Ground Video Stream

Last update: 1:48 p.m. EST Nov. 21, 2008
SAN FRANCISCO, Nov 21, 2008 (GlobeNewswire via COMTEX) — On November 22nd, Virgin America is launching Gogo(r) Inflight Internet, via the first air-to-ground video stream during YouTube Live-YouTube’s first official real-world user event on November 22nd. The carrier’s first Wi-Fi enabled plane will circle the skies above San Francisco during the event and a segment of the YouTube Live show will be streamed from 35,000 feet to an audience on the ground and on-line.
The YouTube Live event flight will serve as the beta launch of the Gogo(r) Inflight Internet Service on Virgin America with one Wi-Fi enabled aircraft available to guests from Nov. 24 on, the airline will be the first U.S. carrier to offer inflight internet fleet-wide by the second quarter of 2009.
Members of the media are invited to San Francisco International Airport (SFO), International Terminal for a pre-flight reception at the Virgin America gate to greet passengers, Virgin America and YouTube leadership prior to boarding Virgin America’s first Wi-Fi enabled aircraft. Special guests include Virgin America CEO and President David Cush, Aircell CEO and President Jack Blumenstein, some of YouTube’s highest viewed stars and 30 Rock’s Keith Powell and Katrina Bowden.
IMPORTANT NOTE: Accredited media only at airport event. Interested media MUST e-mail their full name, date of birth, and affiliation to abby.lunardini@virginamerica.com no later than 12noon Pacific Daylight Time on Nov. 22 to arrange for airport security. Please arrive at the Virgin America Ticket Counter in the SFO International Terminal no later than 2:00pm to allow for airport security. All media must comply with TSA security requirements in order to attend.




How To Dramatically Increase Website Traffic

25 09 2008

How To Dramatically Increase Website Traffic

Submitted By: Jeff Alderson

 

 

 

If you are looking to increase traffic for you web, then I am sure your brain is just about fried from all the information you have probably already read.

To save your mind from any further cooking, I will share a couple of key principals in one short summary. I hope you find this helpful…( internet marketing tips )

Let’s tackle 2 main things or internet marketing tips  – What to do and what not to do. Both are key.

First let’s go over what not to do. This is simple; don’t do any of the following:

1. Do not buy traffic. These sites that offer you 100,000 visitors guaranteed will more than likely send you the visitors. Which are not interested in your site and will quickly prove to be a waste of money. I have personally tested many of these and it is a waste of time and money.( its not effective on internet marketing )

2.Do not over optimize your site. You need to do the things you must to make your site appealing to the search engines, but let’s face it. You can optimize your site until you are blue in the face and it will do basically nothing if you have no links or no valuable content.( actually do it step by step )

Do the basic things needed to make your site optimized and then move on. Trust me, spending too much time on this is wasting time you need to be spending doing more productive things.

3.Do not waste time submitting to search engines. Google takes no time at all these days to index your site. Just recently I did exactly nothing and my brand new site got indexed in Google in a matter of 3 days. Submitting to them will not speed it up and again, you would be wasting time.

Okay. So there are some basic do nots. Pretty simple. Now here is a short list of things that you should do on internet marketing tips :

1.Do get all the links that you can. No successful site is a site without links. The more links you get the better you will rank. And, the better and more relevant the site that links to you is the more valuable it becomes.

There are many ways to get links on internet marketing so let’s do it the traditional way that is not too complicated.

a.Start by writing some good articles. You are an expert on your subject and I am sure you could bang out a handful of good quality articles. Then go and submit them to article directories like EzineArticles.com, GoArticles.com and ArticleCity.com with major internet marketing .

This will get you links. Simple and straightforward, plus it works.

b.Another thing you can do is start a blog. Get a blog going and keep posting to it. Write good and relevant content as it relates to your niche. Now, I am sure that this is not news to you, but just do it. It works and again it is simple and not hard. Not to mention that it will not cost you a dime.

You may find that your blog out performs your main site, not to worry though.

Lastly I offer one more way to increase traffic. Again, we are going for simple and easy…

Give something away.

c.Giving stuff away is a simple way to leverage the viral aspect of the Internet. Is your site selling tennis racquets? Great, now write a small ebook called “How To Choose The Perfect Tennis Racquet” and give it away.

Be sure to get their email address in exchange for the ebook and also give everyone permission to give it away to others. This is a great marketing and sales tool. It’s a quick way to tap into viral marketing.

Of course, you are probably not selling tennis racquets, but the formula is the same for any site or product.

Follow these simple strategies and you will be on your way to increasing traffic. And see the next series of  internet marketing tips





Internet marketing style by terrorist

11 09 2008

How Modern Terrorism Uses the Internet marketing ?

By :Gabriel Weimann

Internet marketing series

Summary
§ The great virtues of the Internet—ease of access, lack of regulation, vast potential audiences, and fast flow of information, among others—have been turned to the advantage of groups committed to terrorizing societies to achieve their goals. ( they use internet marketing to drive their organization )
§ Today, all active terrorist groups have established their presence on the Internet info Our scan of the Internet in 2003–4 revealed hundreds of websites serving terrorists and their supporters.
§ Terrorism on the Internet is a very dynamic phenomenon: websites suddenly emerge, frequently modify their formats, and then swiftly disappear—or, in many cases, seem to disappear by changing their online address but retaining much the same content.
§ Terrorist websites target three different audiences: current and potential supporters; international public opinion; and enemy publics ( using internet marketing to promotion their website )
§ The mass media, policymakers, and even security agencies have tended to focus on the exaggerated threat of cyberterrorism and paid insufficient attention to the more routine uses made of the Internet. Those uses are numerous and, from the terrorists’ perspective, invaluable.
§ There are eight different ways in which contemporary terrorists use the Internet, ranging from psychological warfare and propaganda to highly instrumental uses such as fundraising, recruitment, data mining, and coordination of actions.
§ While we must better defend our societies against cyberterrorism and Internet-savvy terrorists, we should also consider the costs of applying counterterrorism measures to the Internet. Such measures can hand authoritarian governments and agencies with little public accountability tools with which to violate privacy, curtail the free flow of information, and restrict freedom of expression, thus adding a heavy price in terms of diminished civil liberties to the high toll exacted by terrorism itself.
§ So may be the next several year, their use internet marketing, to collect donate for they activity

Introduction, internet marketing ala terorist

This al Qaeda website image claims responsibility for attacks in Kenya and the United States.
The story of the presence of terrorist groups in cyberspace has barely begun to be told. In 1998, around half of the thirty organizations designated as “Foreign Terrorist Organizations” under the U.S. Antiterrorism and Effective Death Penalty Act of 1996 maintained websites; by 2000, virtually all terrorist groups had established their presence on the Internet. Our scan of the Internet in 2003–4 revealed hundreds of websites serving terrorists and their supporters. And yet, despite this growing terrorist presence, when policymakers, journalists, and academics have discussed the combination of terrorism and the Internet, they have focused on the overrated threat posed by cyberterrorism or cyberwarfare (i.e., attacks on computer networks, including those on the Internet) and largely ignored the numerous uses that terrorists make of the Internet every day, and collect the donate using internet marketing info / their own website
In this report we turn the spotlight on these latter activities, identifying, analyzing, and illustrating ways in which terrorist organizations are exploiting the unique attributes of the Internet. The material presented here is drawn from an ongoing study (now in its sixth year) of the phenomenon, during which we have witnessed a growing and increasingly sophisticated terrorist presence on the World Wide Web. Terrorism on the Internet, as we have discovered, is a very dynamic phenomenon: websites suddenly emerge, frequently modify their formats, and then swiftly disappear—or, in many cases, seem to disappear by changing their online address but retaining much the same content. To locate the terrorists’ sites, we have conducted numerous systematic scans of the Internet, feeding an enormous variety of names and terms into search engines, entering chat rooms and forums of supporters and sympathizers, and surveying the links on other organizations’ websites to create and update our own lists of sites on internet. This is often a herculean effort, especially because in some cases (e.g., al Qaeda’s websites) locations and contents change almost daily, its used to promote or marketing their activity on internet
The report begins by sketching the origins of the Internet, the characteristics of the new medium that make it so attractive to political extremists, the range of terrorist organizations active in cyberspace, and their target audiences. The heart of the report is an analysis of eight different uses that terrorists make of the Internet info. These range from conducting psychological warfare to gathering information, from training to fundraising, from propagandizing to recruiting, and from networking to planning and coordinating terrorist acts. In each instance, we offer concrete examples drawn from our own research, from cases reported in the media, and from contacts with Western intelligence organizations. Although the bulk of the report amounts to a strong argument for the political, intelligence, and academic communities to pay much more attention to the dangers posed by terrorists’ use of the Internet info or internet marketing , the report concludes with a plea to those same communities not to overreact. The Internet may be attractive to political extremists, but it also symbolizes and supports the freedom of thought and expression that helps distinguish democracies from their enemies. Effective counterterrorist campaigns do not require, and may be undermined by, draconian measures to restrict Internet access.

Modern Terrorism, website and their Internet marketing strategy

Paradoxically, the very decentralized network of communication that the U.S. security services created out of fear of the Soviet Union now serves the interests of the greatest foe of the West’s security services since the end of the Cold War: international terror. The roots of the modern Internet are to be found in the early 1970s, during the days of the Cold War, when the U.S. Department of Defense was concerned about reducing the vulnerability of its communication networks to nuclear attack. The Defense Department decided to decentralize the whole system by creating an interconnected web of computer networks. After twenty years of development and use by academic researchers, the Internet quickly expanded and changed its character when it was opened up to commercial users in the late 1980s. By the mid-1990s, the Internet connected more than 18,000 private, public, and national networks, with the number increasing daily. Hooked into those networks were about 3.2 million host computers and perhaps as many as 60 million users spread across all seven continents. The estimated number of users in the early years of the twenty-first century is over a billion.
As it burgeoned, the Internet was hailed as an integrator of cultures and a medium for businesses, consumers, and governments to communicate with one another. It appeared to offer unparalleled opportunities for the creation of a forum in which the “global village” could meet and exchange ideas, stimulating and sustaining democracy throughout the world. However, with the enormous growth in the size and use of the network, utopian visions of the promise of the Internet were challenged by the proliferation of pornographic and violent content on the web and by the use of the Internet by extremist organizations of various kinds. Groups with very different political goals but united in their readiness to employ terrorist tactics started using the network to distribute their propaganda, to communicate with their supporters, to foster public awareness of and sympathy for their causes, and even to execute operations.
By its very nature, the Internet is in many ways an ideal arena for activity by terrorist organizations. Most notably, it offers
§ easy access by Internet
§ little or no regulation, censorship, or other forms of government control;
§ potentially huge audiences spread throughout the world;
§ anonymity of communication;
§ fast flow of information;
§ inexpensive development and maintenance of a web presence;
§ a multimedia environment (the ability to combine text, graphics, audio, and video and to allow users to download films, songs, books, posters, and so forth);
§ To donate from around the word using their website / internet marketing startegy
§ the ability to shape coverage in the traditional mass media, which increasingly use the Internet as a source for stories.

An Overview of Terrorist Websites and marketing strategy on internet
These advantages have not gone unnoticed by terrorist organizations, no matter what their political orientation. Islamists and Marxists, nationalists and separatists, racists and anarchists: all find the Internet alluring. Today, almost all active terrorist organizations (which number more than forty) maintain websites, and many maintain more than one website and use several different languages its used for collect donate and its they marketing on the internet
As the following illustrative list shows, these organizations and groups come from all corners of the globe. (This geographical categorization, it should be noted, reveals the geographical diversity but obscures the fact that many groups are truly transnational, and even transregional, in character.)
§ From the Middle East, Hamas (the Islamic Resistance Movement), the Lebanese Hezbollah (Party of God), the al Aqsa Martyrs Brigades, Fatah Tanzim, the Popular Front for the Liberation of Palestine (PFLP), the Palestinian Islamic Jihad, the Kahane Lives movement, the People’s Mujahedin of Iran (PMOI—Mujahedin-e Khalq), the Kurdish Workers’ Party (PKK), and the Turkish-based Popular Democratic Liberation Front Party (DHKP/C) and Great East Islamic Raiders Front (IBDA-C).
§ From Europe, the Basque ETA movement, Armata Corsa (the Corsican Army), and the Irish Republican Army (IRA).
§ From Latin America, Peru’s Tupak-Amaru (MRTA) and Shining Path (Sendero Luminoso), the Colombian National Liberation Army (ELN-Colombia), and the Armed Revolutionary Forces of Colombia (FARC).
§ From Asia, al Qaeda, the Japanese Supreme Truth (Aum Shinrikyo), Ansar al Islam (Supporters of Islam) in Iraq, the Japanese Red Army (JRA), Hizb-ul Mujehideen in Kashmir, the Liberation Tigers of Tamil Eelam (LTTE), the Islamic Movement of Uzbekistan (IMU), the Moro Islamic Liberation Front (MILF) in the Philippines, the Pakistan-based Lashkar-e-Taiba, and the rebel movement in Chechnya.
Content
What is the content of terrorist sites? Typically, a site will provide a history of the organization and its activities, a detailed review of its social and political background, accounts of its notable exploits, biographies of its leaders, founders, and heroes, information on its political and ideological aims, fierce criticism of its enemies, and up-to-date news. Nationalist and separatist organizations generally display maps of the areas in dispute: the Hamas site shows a map of Palestine, the FARC site shows a map of Colombia, the LTTE site presents a map of Sri Lanka, and so forth. Despite the ever-present vocabulary of “the armed struggle” and “resistance,” what most sides do not feature is a detailed description of their violent activities. Even if they expound at length on the moral and legal basis of the legitimacy of the use of violence, most sites refrain from referring to the terrorists’ violent actions or their fatal consequences—this reticence is presumably inspired by propagandist and image-building considerations. Two exceptions to this rule are Hezbollah and Hamas, whose sites feature updated statistical reports of their actions (“daily operations”) and tallies of both “dead martyrs” and “Israeli enemies” and “collaborators” killed. Its content is propaganda their website ( internet marketing for their site )
Audiences
Whom do the Internet terrorists target at their sites? An analysis of the content of the websites suggests three different audiences.
§ Current and potential supporters. Terrorist websites make heavy use of slogans and offer items for sale, including T-shirts, badges, flags, and videotapes and audiocassettes, all evidently aimed at sympathizers. Often, an organization will target its local supporters with a site in the local language and will provide detailed information about the activities and internal politics of the organization, its allies, and its competitors. ( internet marketing and sales purpose )
§ International public opinion. The international public, who are not directly involved in the conflict but who may have some interest in the issues involved, are courted with sites in languages other than the local tongue. Most sites offer versions in several languages. ETA’s site, for instance, offers information in Castilian, German, French, and Italian; the MRTA site offers Japanese and Italian in addition to its English and Spanish versions; and the IMU site uses Arabic, English, and Russian. For the benefit of their international audiences, the sites present basic information about the organization and extensive historical background material (material with which the organization’s supporters are presumably already familiar).

Judging from the content of many of the sites, it appears that foreign journalists are also targeted. Press releases are often placed on the websites in an effort to get the organization’s point of view into the traditional media. The detailed background information is also very useful for international reporters. One of Hezbollah’s sites specifically addresses journalists, inviting them to interact with the organization’s press office via-email. ( internet marketing strategy )
§ Enemy publics. Efforts to reach enemy publics (i.e., citizens of the states against which the terrorists are fighting) are not as clearly apparent from the content of many sites. However, some sites do seem to make an effort to demoralize the enemy by threatening attacks and by fostering feelings of guilt about the enemy’s conduct and motives. In the process, they also seek to stimulate public debate in their enemies’ states, to change public opinion, and to weaken public support for the governing regime. ( internet marketing stories )

How Terrorists Use the Internet marketing strategy
We have identified eight different, albeit sometimes overlapping, ways in which contemporary terrorists use the Internet. Some of these parallel the uses to which everyone puts the Internet—information gathering, for instance. Some resemble the uses made of the medium by traditional political organizations—for example, raising funds and disseminating propaganda. Others, however, are much more unusual and distinctive—for instance, hiding instructions, manuals, and directions in coded messages or encrypted files.they do anything using internet marketing to achieving the target fund.
Psychological Warfare
Terrorism has often been conceptualized as a form of psychological warfare, and certainly terrorists have sought to wage such a campaign through the Internet. There are several ways for terrorists to do so. For instance, they can use the Internet to spread disinformation, to deliver threats intended to distill fear and helplessness, and to disseminate horrific images of recent actions, such as the brutal murder of the American journalist Daniel Pearl by his captors, a videotape of which was replayed on several terrorist websites. Terrorists can also launch psychological attacks through cyberterrorism, or, more accurately, through creating the fear of cyberterrorism. “Cyberfear” is generated when concern about what a computer attack could do (for example, bringing down airliners by disabling air traffic control systems, or disrupting national economies by wrecking the computerized systems that regulate stock markets) is amplified until the public believes that an attack will happenInterestingly, al Qaeda has consistently claimed on its websites that the destruction of the World Trade Center has inflicted psychological damage, as well as concrete damage, on the U.S. economy. The attacks on the Twin Towers are depicted as an assault on the trademark of the U.S. economy, and evidence of their effectiveness is seen in the weakening of the dollar, the decline of the U.S. stock market after 9/11, and a supposed loss of confidence in the U. S. economy both within the United States and elsewhere. Parallels are drawn with the decline and ultimate demise of the Soviet Union. One of bin Laden’s recent publications, posted on the web, declared that “America is in retreat by the Grace of Almighty and economic attrition is continuing up to today. But it needs further blows. The young men need to seek out the nodes of the American economy and strike the enemy’s nodes.” We call internet marketing tips
Publicity and Propaganda
The Internet has significantly expanded the opportunities for terrorists to secure publicity. Until the advent of the Internet, terrorists’ hopes of winning publicity for their causes and activities depended on attracting the attention of television, radio, or the print media. These traditional media have “selection thresholds” (multistage processes of editorial selection) that terrorists often cannot reach. No such thresholds, of course, exist on the terrorists’ own websites. The fact that many terrorists now have direct control over the content of their message offers further opportunities to shape how they are perceived by different target audiences and to manipulate their own image and the image of their enemies.
As noted earlier, most terrorist sites do not celebrate their violent activities. Instead, regardless of the terrorists’ agendas, motives, and location, most sites emphasize two issues: the restrictions placed on freedom of expression and the plight of comrades who are now political prisoners. These issues resonate powerfully with their own supporters and are also calculated to elicit sympathy from Western audiences that cherish freedom of expression and frown on measures to silence political opposition. Enemy publics, too, may be targets for these complaints insofar as the terrorists, by emphasizing the antidemocratic nature of the steps taken against them, try to create feelings of unease and shame among their foes. The terrorists’ protest at being muzzled, it may be noted, is particularly well suited to the Internet, which for many users is the symbol of free, unfettered, and uncensored communication.
Data Mining
The Internet may be viewed as a vast digital library. The World Wide Web alone offers about a billion pages of information, much of it free—and much of it of interest to terrorist organizations. Terrorists, for instance, can learn from the Internet a wide variety of details about targets such as transportation facilities, nuclear power plants, public buildings, airports, and ports, and even about counterterrorism measures. Dan Verton, in his book Black Ice: The Invisible Threat of Cyberterrorism (2003), explains that “al-Qaeda cells now operate with the assistance of large databases containing details of potential targets in the U.S. They use the Internet to collect intelligence on those targets, especially critical economic nodes, and modern software enables them to study structural weaknesses in facilities as well as predict the cascading failure effect of attacking certain systems.” According to Secretary of Defense Donald Rumsfeld, speaking on January 15, 2003, an al Qaeda training manual recovered in Afghanistan tells its readers, “Using public sources openly and without resorting to illegal means, it is possible to gather at least 80 percent of all information required about the enemy.”
The website operated by the Muslim Hackers Club (a group that U.S. security agencies believe aims to develop software tools with which to launch cyberattacks) has featured links to U.S. sites that purport to disclose sensitive information such as code names and radio frequencies used by the U.S. Secret Service. The same website offers tutorials in creating and spreading viruses, devising hacking stratagems, sabotaging networks, and developing codes; it also provides links to other militant Islamic and terrorist web addresses. Specific targets that al Qaeda-related websites have discussed include the Centers for Disease Control and Prevention in Atlanta; FedWire, the money-movement clearing system maintained by the Federal Reserve Board; and facilities controlling the flow of information over the Internet. Like many other Internet users, terrorists have access not only to maps and diagrams of potential targets but also to imaging data on those same facilities and networks that may reveal counterterrorist activities at a target site. One captured al Qaeda computer contained engineering and structural features of a dam, which had been downloaded from the Internet and which would enable al Qaeda engineers and planners to simulate catastrophic failures. In other captured computers, U.S. investigators found evidence that al Qaeda operators spent time on sites that offer software and programming instructions for the digital switches that run power, water, transportation, and communications grids. Numerous tools are available to facilitate such data collection, including search engines, e-mail distribution lists, and chat rooms and discussion groups. Many websites offer their own search tools for extracting information from databases on their sites. Word searches of online newspapers and journals can likewise generate information of use to terrorists; some of this information may also be available in the traditional media, but online searching capabilities allow terrorists to capture it anonymously and with very little effort or expense.
Fundraising
Like many other political organizations, terrorist groups use the Internet to raise funds / internet marketing tips. Al Qaeda, for instance, has always depended heavily on donations, and its global fund-raising network is built upon a foundation of charities, nongovernmental organizations, and other financial institutions that use websites and Internet-based chat rooms and forums. The Sunni extremist group Hizb al-Tahrir uses an integrated web of Internet sites, stretching from Europe to Africa, which asks supporters to assist the effort by giving money and encouraging others to donate to the cause of jihad. Banking information, including the numbers of accounts into which donations can be deposited, is provided on a site based in Germany. The fighters in the Russian breakaway republic of Chechnya have likewise used the Internet to publicize the numbers of bank accounts to which sympathizers can contribute. (One of these Chechen bank accounts is located in Sacramento, California.) The IRA’s website contains a page on which visitors can make credit card donations.
Internet user demographics (culled, for instance, from personal information entered in online questionnaires and order forms) allow terrorists to identify users with sympathy for a particular cause or issue. These individuals are then asked to make donations, typically through e-mails sent by a front group (i.e., an organization broadly supportive of the terrorists’ aims but operating publicly and legally and usually having no direct ties to the terrorist organization). For instance, money benefiting Hamas has been collected via the website of a Texas-based charity, the Holy Land Foundation for Relief and Development (HLF). The U.S. government seized the assets of HLF in December 2001 because of its ties to Hamas. The U.S. government has also frozen the assets of three seemingly legitimate charities that use the Internet to raise money—the Benevolence International Foundation, the Global Relief Foundation, and the Al-Haramain Foundation—because of evidence that those charities have funneled money to al Qaeda.
Recruitment and Mobilization
The Internet can be used not only to solicit donations from sympathizers but also to recruit and mobilize supporters to play a more active role in support of terrorist activities or causes. In addition to seeking converts by using the full panoply of website technologies (audio, digital video, etc.) to enhance the presentation of their message, terrorist organizations capture information about the users who browse their websites. Users who seem most interested in the organization’s cause or well suited to carrying out its work are then contacted. Recruiters may also use more interactive Internet technology to roam online chat rooms and cybercafes, looking for receptive members of the public, particularly young people. Electronic bulletin boards and user nets (issue-specific chat rooms and bulletins) can also serve as vehicles for reaching out to potential recruits.
Some would-be recruits, it may be noted, use the Internet to advertise themselves to terrorist organizations. In 1995, as reported by Verton in Black Ice, Ziyad Khalil enrolled as a computer science major at Columbia College in Missouri. He also became a Muslim activist on the campus, developing links to several radical groups and operating a website that supported Hamas. Thanks in large part to his Internet activities, he came to the attention of bin Laden and his lieutenants. Khalil became al Qaeda’s procurement officer in the United States, arranging purchases of satellite telephones, computers, and other electronic surveillance technologies and helping bin Laden communicate with his followers and officers.
Networking
Many terrorist groups, among them Hamas and al Qaeda, have undergone a transformation from strictly hierarchical organizations with designated leaders to affiliations of semi-independent cells that have no single commanding hierarchy. Through the use of the Internet, these loosely interconnected groups are able to maintain contact with one another—and with members of other terrorist groups. In the future, terrorists are increasingly likely to be organized in a more decentralized manner, with arrays of transnational groups linked by the Internet and communicating and coordinating horizontally rather than vertically.
The Internet connects not only members of the same terrorist organizations but also members of different groups. For instance, dozens of sites exist that express support for terrorism conducted in the name of jihad. These sites and related forums permit terrorists in places such as Chechnya, Palestine, Indonesia, Afghanistan, Turkey, Iraq, Malaysia, the Philippines, and Lebanon to exchange not only ideas and suggestions but also practical information about how to build bombs, establish terror cells, and carry out attacks.
Planning and Coordination
Terrorists use the Internet not only to learn how to build bombs but also to plan and coordinate specific attacks. Al Qaeda operatives relied heavily on the Internet in planning and coordinating the September 11 attacks. Thousands of encrypted messages that had been posted in a password-protected area of a website were found by federal officials on the computer of arrested al Qaeda terrorist Abu Zubaydah, who reportedly masterminded the September 11 attacks. The first messages found on Zubaydah’s computer were dated May 2001 and the last were sent on September 9, 2001. The frequency of the messages was highest in August 2001. To preserve their anonymity, the al Qaeda terrorists used the Internet in public places and sent messages via public e-mail. Some of the September 11 hijackers communicated using free web-based e-mail accounts.
§ alneda.com, which, until it was closed down in 2002, is said by U.S. officials to have contained encrypted information to direct al Qaeda members to more secure sites, featured international news about al Qaeda, and published a variety of articles, books, and fatwas (the latter typically declaring war on the United States, Christianity, or Judaism);
§ assam.com, which served as a mouthpiece for jihad in Afghanistan, Chechnya, and Palestine;
§ almuhrajiroun.com, which in the late 1990s and early 2000s urged sympathizers to assassinate Pakistani president Pervez Musharraf;
§ qassam.net, a site that U.S. officials claim is linked not only to al Qaeda but also to Hamas;
§ jihadunspun.net, which offered a thirty-six-minute video of Osama bin Laden lecturing, preaching, and making threats;
§ 7hj.7hj.com, which aimed to teach visitors how to hack into Internet networks and how to infect government and corporate websites with “worms” and viruses;
§ aloswa.org, which featured quotations from bin Laden and religious legal rulings justifying the attacks of 9/11 and other assaults on the West;
§ drasat.com, run (some experts suspect) by a fictional institution called the Islamic Studies and Research Center and reported to be the most credible of dozens of Islamist sites posting al Qaeda news; and
§ jehad.net, alsaha.com, and islammemo.com, which are alleged to have posted al Qaeda statements as well as calls for action and directions for operatives.

Conclusion
In a briefing given in late September 2001, Ronald Dick, assistant director of the FBI and head of the United States National Infrastructure Protection Center (NIPC), told reporters that the hijackers of 9/11 had used the Internet, and “used it well.” Since 9/11, terrorists have only sharpened their Internet skills and increased their web presence. Today, terrorists of very different ideological persuasions—Islamist, Marxist, nationalist, separatist, racist—have learned many of the same lessons about how to make the most of the Internet. The great virtues of the Internet—ease of access, lack of regulation, vast potential audiences, fast flow of information, and so forth—have been turned to the advantage of groups committed to terrorizing societies to achieve their goals.
How should those societies respond? This is not the place to attempt anything like a definitive answer, but two things seem clear. First, we must become better informed about the uses to which terrorists put the Internet and better able to monitor their activities. As noted at the outset of this report, journalists, scholars, policymakers, and even security agencies have tended to focus on the exaggerated threat of cyberterrorism and paid insufficient attention to the more routine uses made of the Internet. Those uses are numerous and, from the terrorists’ perspective, invaluable. Hence, it is imperative that security agencies continue to improve their ability to study and monitor terrorist activities on the Internet and explore measures to limit the usability of this medium by modern terrorists.

About the Report
Terrorists fight their wars in cyberspace as well as on the ground. However, while politicians and the media have hotly debated the dangers that cyberterrorism poses to the Internet, surprisingly little is known about the threat posed by terrorists’ use of the Internet. Today, as this report makes plain, terrorist organizations and their supporters maintain hundreds of websites, exploiting the unregulated, anonymous, and easily accessible nature of the Internet to target an array of messages to a variety of audiences. Gabriel Weimann identifies no fewer than eight different ways in which terrorists are using the Internet to advance their cause, ranging from psychological warfare to recruitment, networking to fundraising. In each case, the report not only analyzes how the Internet can facilitate terrorist operations but also illustrates the point with examples culled from an extensive exploration of the World Wide Web.
Gabriel Weimann is a senior fellow at the United States Institute of Peace and professor of communication at Haifa University, Israel. He has written widely on modern terrorism, political campaigns, and the mass media. This report distills some of the findings from an ongoing, six-year study of terrorists’ use of the Internet.
The views expressed in this report do not necessarily reflect those of the United States Institute of Peace, which does not advocate specific policies.





Google targets Microsoft with new Web browser

8 09 2008

Google Inc. is releasing its own Web browser in a long-anticipated move aimed at countering the dominance of Microsoft Corp.’s Internet Explorer and ensuring easy access to its market-leading search engine.

The Mountain View-based company took the unusual step of announcing its latest product on the Labor Day holiday after it prematurely sent out a comic book drawn up to herald the new browser’s arrival.

The free browser, called “Chrome,” is supposed to be available for downloading Tuesday in more than 100 countries for computers running on Microsoft’s Windows operating system. Google said it’s still working on versions compatible with Apple Inc.’s Mac computer and the Linux operating system.

Google’s browser is expected to hit the market a week after Microsoft’s unveiling of a test version of its latest browser update, Internet Explorer 8. The tweaks include more tools for Web surfers to cloak their online preferences, creating a shield that could make it more difficult for Google and other marketing networks to figure out which ads are most likely to appeal to which individuals.

Although Google is using a cartoonish approach to promote Chrome, the new browser underscores the gravity of Google’s rivalry with Microsoft, whose Internet Explorer is used by about 75 percent of Web surfers.

Google’s lead in the lucrative Internet search market is nearly as commanding, with its engine processing nearly two-thirds of the Web’s queries.

For the past few years, Google has been trying to take advantage of its search engine’s popularity to loosen Microsoft’s grip on how most people interact with personal computers.

The assault so far has been focused on a bundle of computer programs, including word processing and spreadsheet applications, that Google offers as an alternative to one of Microsoft’s biggest money makers, its Office suite of products.

Google has tried to make its alternatives more appealing and accessible by hosting them for free over Internet connections instead of requiring users to pay a licensing fee to install them on individual computers, as Microsoft typically does.

Meanwhile, Microsoft has tried to thwart Google by investing billions in the development of its own search engine and making an unsuccessful attempt to buy Yahoo Inc. for $47.5 billion.

The tensions between Microsoft and Google now seem likely to escalate with Google’s foray into Web browsing.

Until now, Google had been trying to undermine Internet Explorer by supporting Firefox, a Web browser developed by the open-source Mozilla Foundation. Bolstered by an advertising partnership with Google’s search engine, Firefox ranks as the second most popular browser, with a market share of more than 10 percent. Google recently extended its advertising alliance with Firefox through 2011.

Bearing the stamp of Google’s renowned brand, Chrome could be an even more formidable rival to Explorer.

Still, Google’s name is no guarantee of success. For instance, Google’s instant messaging service hasn’t made come close to catching up to the market-leading products made by Yahoo, Microsoft and Time Warner Inc.’s AOL.

In a blog post Monday, Google touted Chrome as a more sophisticated Web browser better suited for displaying the dynamic and interactive content blossoming on the Web as people migrate from television, radio and newspapers.

( see more internet marketing info )