Linkages as a Lens: An Exploration of Strategic Communications in P/CVE.

Authors

  • Joe Whittaker Swansea University
  • Lilah Elsayed Hedayah Center

Keywords:

P/CVE, Strategic Communications, Linkages, Counter-Narratives, MENA

Abstract

Strategic communications for the purpose of countering violent extremism have become widespread in recent years, especially given the communications revolution which has amplified the messages of violent extremists and those that wish to counter them. Despite this, there is little-to-no research which collects message data and analyses its design in a systematic way. In this article, we collect data from 10 social media multi-message campaigns and undertake an exploratory analysis of their design using a methodology developed from Ingram’s “Linkage-based” framework for countering militant Islamist propaganda. Our findings include: a prevalence towards highlighting the atrocities of violent extremist groups rather than strategies which challenge their competence; a priority to messages which seize the narrative agenda; differing emotional or rational pulls depending on the language in which the message is delivered; a range of different tactics employed depending on the target audience; as well as a wide range of deployments of different themes of positive and negative messages. We offer a number of possible explanations for these findings, before undertaking a cluster analysis of the data to aid the construction of Weberian “ideal type” campaigns, which offer a contribution to the field for the purposes of future research and exposition.

References

Alava, S., Frau-Meigs, D. & Hassan, G., 2017. Youth and Violent Extremism on Social Media: Mapping the research, Available at: http://unesdoc.unesco.org/images/0026/002603/260382e.pdf, Accessed 18 July 2019.

Archetti, C., 2015. Terrorism, Communication and New Media: Explaining Radicalization in the Digital Age. Perspectives on Terrorism, 9(1), pp.49–59.

Baaken, T. & Schlegel, L., 2017. Fishermen or Swarm Dynamics? Should we Understand Jihadist Online-Radicalization as a Top-Down or Bottom-Up Process? Journal for Deradicalization, (13), pp.178–212.

Berger, J.M., 2017a. Countering Islamic State Messaging Through “ Linkage - Based ” Analysis. International Centre for Counter-Terrorism, (August). Available at: https://icct.nl/wp-content/uploads/2017/08/ICCT-Berger-Countering-IS-Messaging-Aug-2017-1.pdf, Accessed 18 July 2019.

Berger, J.M., 2017b. Deconstruction of identity concepts in Islamic State propaganda. 1st European Counter Terrorism Centre (ECTC) conference on online terrorist propaganda, pp.1–21.

Berger, J.M., 2017c. Extremist Construction of Identity: How Escalating Demands for Legitimacy Shape and Define In- Group and Out-Group Dynamics. International Centre for Counter-Terrorism, (April).

Berger, J.M. & Morgan, J., 2015. The ISIS Twitter Census: Defining and Describing the Population of ISIS Supporters on Twitter. The Brookings Project on U.S. Relations with the Islamic World: ANALYSIS PAPER, March(20), p.68.

Braddock, K. & Horgan, J., 2016. Towards a Guide for Constructing and Disseminating Counternarratives to Reduce Support for Terrorism. Studies in Conflict and Terrorism, 39(5), pp.381–404.

Briggs, R. & Feve, S., 2013. Review of Programs to Counter Narratives of Violent Extremism: What works and what are the implications for government? Institute of Strategic Dialogue. Available at: https://www.counterextremism.org/resources/details/id/444/review-of-programs-to-counter-narratives-of-violent-extremism-what-works-and-what-are-the-implications-for-government, Accessed 18 July 2019.

Comerford, M. & Bryson, R., 2017. Struggle Over Scripture. Tony Blair Institute for Global Change.

Conway, M. et al., 2017. Disrupting Daesh: Measuring Takedown of Online Terrorist Material and Its Impacts, Vox Pol Centre of Excellence.

Elsayed, L., Faris, T. & Zeiger, S., 2017. Undermining Violent Extremist Narratives in the Middle East and North Africa: A how-to-guide. Hedayah Center.

Esses, V.M., Medianu, S. & Lawson, A.S., 2013. Uncertainty, Threat, and the Role of the Media in Promoting the Dehumanization of Immigrants and Refugees. Journal of Social Issues, 69(3), pp.518–536.

Europol. 2017. EU Internet Referral Unit - Transparency Report 2017, Available at: https://www.europol.europa.eu/publications-documents/eu-internet-referral-unit-transparency-report-2017, Accessed July 18 2019.

Everitt, B. et al., 2010. Cluster Analysis, Chichester: John Wiley & Sons.

Federico, C.M., Hunt, C. V. & Fisher, E.L., 2013. Uncertainty and Status-Based Asymmetries in the Distinction Between the “Good” Us and the “Bad” Them: Evidence That Group Status Strengthens the Relationship Between the Need for Cognitive Closure and Extremity in Intergroup Differentiation. Journal of Social Issues, 69(3), pp.473–494.

Ferguson, K., 2016. Countering Violent Extremism Through Media and Communication Strategies: A review of the evidence. Partnership for Conflict, Crime & Security Research, Available at: http://www.paccsresearch.org.uk/wp-content/uploads/2016/03/Countering-Violent-Extremism-Through-Media-and-Communication-Strategies-.pdf, Accessed 18 July 2019.

Field, A., 2018. Discovering Statistics Using IBM SPSS Statistics 5th ed., London: Sage Publications.

Global Coalition to Defeat Daesh. 2019. Partners, Available at: https://theglobalcoalition.org/en/partners/, Accessed 18 July 2019.

Hedayah Center. 2019. Counter Narrative Library, Available at: http://www.hedayahcenter.org/what-we-do/91/departments/98/research-and-analysis/477/counter-narrative-library, Accessed 18 July 2019.

Hemmingsen, A.-S. & Castro, K.I., 2017. The Trouble With Counter-Narratives. Danish Institute for International Studies.

Hogg, M.A. & Adelman, J., 2013. Uncertainty-Identity Theory: Extreme Groups, Radical Behavior, and Authoritarian Leadership. Journal of Social Issues, 69(3), pp.436–454.

Hogg, M.A., Kruglanski, A. & van den Bos, K., 2013. Uncertainty and the Roots of Extremism. Journal of Social Issues, 69(3), pp.407–418.

IBM Support. 2016. Clustering Binary Data. Available at: http://www-01.ibm.com/support/docview.wss?uid=swg21476716, Accessed 18 July 2019.

Ingram, H., 2016a. A Brief History of Propaganda During Conflict: A Lesson for Counter-Terrorism Strategic Communications. International Centre for Counter-Terrorism. Available at: http://icct.nl/publication/a-brief-history-of-propaganda-during-conflict-a-lesson-for-counter-terrorism-strategic-communications/, Accessed 18 July 2019.

Ingram, H., 2016b. A “Linkage- Based” Approach to Combating Militant Islamist Propaganda: A Two-Tiered Framework for Practitioners. International Centre for Counter-Terrorism.

Ingram, H., 2016c. An Analysis of Islamic State’s Dabiq Magazine. Australian Journal of Political Science, 51(3), pp.458–477.

Ingram, H., 2015a. An Analysis of the Taliban in Khurasan’s Azan (Issues 1–5). Studies in Conflict and Terrorism, 38(7), pp.560–579.

Ingram, H., 2016d. Deciphering the Siren Call of Militant Islamist Propaganda: Meaning, Credibility & Behavioural Change. International Centre for Counter-Terrorism, (September 2016).

Ingram, H., 2018. Islamic State’s English ‐ Language Magazines, 2014‐2017: Trends & Implications for CT‐CVE Strategic Communications. International Centre for Counter Terrorism.

Ingram, H., 2015b. The Strategic Logic of Islamic State Information Operations. Australian Journal of International Affairs, 69(6), pp.729–752.

Ingram, H., 2017. The Strategic Logic of the “Linkage-Based” Approach to Combating Militant Islamist Propaganda: Conceptual and Empirical Foundations. International Centre for Counter-Terrorism.

Ingram, H., 2014. Three Traits of the Islamic State’s Information Warfare. RUSI Journal, 159(6), pp.4–11.

Ingram, H. & Reed, A., 2016. Lessons from History for Counter-Terrorism Strategic Communications. Terrorism and Counter-Terrorism Studies, (June).

Jenkins, B.M., 1974. International terrorism: A new kind of warfare. RAND Paper Series.

Kahneman, D., 2012. Thinking, Fast and Slow, London: Penguin.

Katz, R., 2014 ‘The State Department’s Twitter War with IS is Embarrassing,” Time Magazine, September 16. Available at: http://time.com/3387065/isis-twitter-war-state-department/, Accessed 18 July 2019.

Lee, B.J., 2018. Informal Countermessaging: The Potential and Perils of Informal Online Countermessaging. Studies in Conflict & Terrorism, pp.1–17.

Lindekilde, L., 2012. Introduction: Assessing the Effectiveness of Counter-Radicalisation Policies in Northwestern Europe. Critical Studies on Terrorism, 5(3), pp.335–344.

Macdonald, S., 2008. Constructing a Framework for Criminal Justice Research: Learning from Packer’s Mistakes. New Criminal Law Review, 11(2), pp.257–311.

Macnair, L. & Frank, R., 2017. Voices against extremism: A case study of a community-based CVE counter-narrative campaign. Journal of Deradicalization, 10(Spring), pp.147–174.

Mattei, C. & Zeiger, S., 2018. Evaluate Your CVE Results: Projecting Your Impact. Hedayah Center.

McCants, W. 2012. Countering Violent Extremism, Pt. 2: Scope, Jihadica, 1 March, Available at: http://www.jihadica.com/countering-violent-extremism-pt-2-scope/, Accessed 18 July 2019.

Mcgregor, I., Prentice, M. & Nash, K., 2013. Anxious Uncertainty and Reactive Approach Motivation (RAM) for Religious, Idealistic, and Lifestyle Extremes. Journal of Social Issues, 69(3), pp.537–563.

Pell, T. & Hargreaves, L., 2011. Making Sense of Cluster Analysis: Revelations from Pakistani Science Classes. Cambridge Journal of Education, 41(3), pp.347–367.

Pruyt, E. & Kwakkel, J., 2014. Radicalization Under Deep Uncertainty: a Multi-model Exploration of Activism, Extremism, and Terrorism. Supporting Dynamics Review, 30(1), pp.1–28.

Radicalisation Awareness Network, 2018. Preventing Radicalisation to Terrorism and Violent Extremism: Approach and Practices.

Ramalingam, V. 2014. On the Front Line: A Guide to Countering Far-Right Extremism, Institute for Strategic Dialogue.

Reed, A., 2017. Counter-Terrorism Strategic Communications: Back to the Future: Lessons from Past and Present. In M. Conway et al., eds. Terrorists’ Use of the Internet. Amsterdam: IOS Press, pp. 269–278.

Reed, A. & Dowling, J., 2018. The Role of Historical Narratives in Extremist Propaganda. Defence Strategic Communications, 4, pp.79–104.

Reed, A. & Ingram, H., 2019. A Practical Guide to the First Rule of CT-CVE Messaging. Europol.

Reed, A. & Ingram, H., 2017. Exploring the Role of Instructional Material in AQAP ’ s Inspire and ISIS ’ Rumiyah. 1st European Counter Terrorism Centre (ECTC) conference on online terrorist propaganda, (April).

Reed, A., Ingram, H. & Whittaker, J., 2017. Countering Terrorist Narratives. European Parliament.

Reynolds, L., & Tuck, H. 2016. The Counter Narrative Monitoring & Evaluation Handbook, Institute for Strategic Dialogue.

Rothenberger, L., Müller, K. & Elmezeny, A., 2016. The discursive construction of terrorist group identity. Terrorism and Political Violence, 30(3), pp.428-453.

Schmid, A.P., 2013. Radicalisation, De-Radicalisation, Counter-Radicalisation: A Conceptual Discussion and Literature Review, International Centre for Counter-Terrorism.

Silverman, T., Stewart, C.J., Birdwell, J., & Amanullah, Z. 2016. The Impact of Counter-Narratives: Insights from a Year-long Cross-platform Pilot study of Counter-narrative Curation, Targeting, Evaluation and Impact, Institute for Strategic Dialogue.

Stebbins, R.A., 2001. Exploratory Resaerch in the Social Sciences, Thousand Oaks: Sage Publications.

Tuck, H. & Silverman, T., 2016. The counter-narrative handbook. Institute for Strategic Dialogue.

United Kingdom Parliament, 2016, Appendix: Letter from the Foreign Secretary and Government Response, June 8, Available at: https://publications.parliament.uk/pa/cm201617/cmselect/cmfaff/209/20904.htm, Accessed 18 July 2019.

United Nations. 2017. S/2017/375, April 28, Available at: https://www.un.org/sc/ctc/news/2017/05/25/security-council-unanimously-adopts-resolution-countering-terrorist-narratives/, Accessed 18 July 2019.

Watkin, A.-L. & Whittaker, J., 2017. Evolution of Terrorists’ Use of the Internet. Counter-Terror Business. Available at: https://counterterrorbusiness.com/features/evolution-terrorists%E2%80%99-use-internet, Accessed 18 July 2019.

Winter, C., 2015. The Virtual Caliphate”: Understanding Islamic State’s Propaganda Strategy, Quilliam Foundation.

Zeiger, S., 2018. Undermining Violent Extremist Narratives in East Africa. Hedayah Center.

Zeiger, S., 2016. Undermining Violent Extremist Narratives in South East Asia: A How-To Guide. Hedayah Center.

Downloads

Published

2019-09-25

Issue

Section

Articles