Terrorism, the Internet and the Social Media Advantage: Exploring how terrorist organizations exploit aspects of the internet, social media and how these same platforms could be used to counter-violent extremism.
Keywords:
Digital technology and terrorism, Counter-Terrorism, Digital Media, Terrorist Groups Digital Potential, Digital Existence.Abstract
The deeply engrained nature of social media in modern life have provided ease of access to information and speed of use within almost every aspect of a person’s life. These same benefit are also available to terrorists and their organizations. The same technology that allows for a globalized world to interact without regard for distance or physical location is also utilized, exploited and adapted to by terrorist organizations to conduct operations, reach candidates and ensure organizational longevity.
This article takes the position of observer of these advancements with the end goal of informing counter-violent extremism strategists of the advances that terrorist groups have already made in digital technology; and where the priority of intervention strategies should be aimed. Further, this is intended to guide policy makers to embrace and utilize digital technologies as a mechanism to carry counter-radicalization and counter-violent extremism interventions through the same digital potential and reach the same audiences as terrorist organizations. What appears strongly apparent is that social media will not abate from its intrinsic position graphed into daily life. This means that counter-terrorism, counter-radicalization and counter-violent extremism strategies must take up the same technology in order to effectively discredit and nullify extremist groups – a digital problem needs a digital solution.
References
Ali, M. (2013, September). The link between unemployment and terrorism [Video file]. Ted Conferences. Retrieved from www.ted.com/talks/mohamed_ali_the_link_between_unemployment_and_terrorism
Aly, A. (2016, 26 February). Brothers, Believers, Brave Mujahideen: Focusing attention on the audience of violent jihadist preachers. Studies in Conflict and Terrorism. Retrieved from http://dx.doi.org/10.1080/1057610X.2016.1157407
Aly, A., Macdonald, S., Jarvis, L. & Chen, T. M. (2016, 7 April) Introduction to the Special Issue: Terrorist Online Propaganda and Radicalization. Studies in Terrorism and Conflict. 2016, VOL. 0, NO. 0, 1–9. Retrieved from http://dx.doi.org/10.1080/1057610X.2016.1157402
Anti-Defamation League. (2014, 11 July). Hashtag Terror: How ISIS Manipulates Social Media. http://www.adl.org/combatinghate/internationalextremismterrorism/c/isisislamicstatesocialmedia.html
Atran, S. (2015, 23 April). The Youth Need Values and Dreams. United Nations General Assembly [Video file]. Retrieved from https://www.youtube.com/watch?v=qlbirlSA-dc
Berger, J.M. & Morgan, J. (2015, March). Defining and describing the population of ISIS supporters on Twitter. The Brookings Project on U.S. Relations with the Islamic World Analysis Paper. Retrieved from http://www.brookings.edu/~/media/research/files/papers/2015/03/isis-twitter-census-berger-morgan/isis_twitter_census_berger_morgan.pdf
Braddock K. & Horgan, J. (2015, 11 December) Towards a Guide for Constructing and
Disseminating Counternarratives to Reduce Support for Terrorism. Studies in Conflict & Terrorism. 2016, Volume 39, Number 5, 381–404. Retrieved from http://dx.doi.org/10.1080/1057610X.2015.1116277
Broadhurst, R., Grabosky, P., Alazab, M. and Chon, S. (2014). Organizations and Cyber crime: An Analysis of the Nature of Groups engaged in Cyber Crime. International Journal of Cyber Criminology. Volume 8, issue 1, pp. 1 -20. Retrieved from http://search.proquest.com.ezproxy.csu.edu.au/docview/1545341663?rfr_id=info%3Axri%2Fsid%3Aprimo
Coker, C. (2002). Globalisation and Terrorism [Conference Paper]. London School of Economics and Political Science. Retrieved from https://www.google.de/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&ved=0ahUKEwjhloiRp6vKAhVH8A4KHW5hD2QQFggnMAA&url=http%3A%2F%2Fwww.g8.utoronto.ca%2Fconferences%2F2002%2Ftokyo%2Fcocker.pdf&usg=AFQjCNHIdQKbY0XILj7iET-a7J4mXtYHgw&cad=rja
Conway, M. (2005, 8-10 September). Terrorism ‘Use’ and the Internet Fighting Back. Conference Paper: Cybersafety: Safety and Security in a Networked World: Balancing Cyber-Rights and Responsibilities. Retrieved from https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&ved=0ahUKEwj8yczw1cLNAhUMMY8KHfGFAzAQFggeMAA&url=http%3A%2F%2Fwww.oii.ox.ac.uk%2Fresearch%2Fcybersafety%2Fextensions%2Fpdfs%2Fpapers%2Fmaura_conway.pdf&usg=AFQjCNGsB3-g-clxKhAdsL0Y3qHmCRdCeg
Conway, M. (2016, 12 April). Determining the Role of the Internet in Violent
Extremism and Terrorism: Six Suggestions for Progressing Research. Studies in Conflict & Terrorism. 1521-0731. Retrieved from http://dx.doi.org/10.1080/1057610X.2016.1157408
Cukier, K. and Mayer-Schoenberger, V. (2013, May/June). The Rise of Big Data. Foreign Affairs. Volume 92, issue 3. http://search.proquest.com.ezproxy.csu.edu.au/docview/1335008763?OpenUrlRefId=info:xri/sid:primo&accountid=10344
Denning, D. E. (2001). Activism, Hacktivism, and Cyberterrorism: The internet as a tool for influencing foreign policy, chapter 8 in Arquilla and Ronfeldt (ed.), Networks and Netwars: The Future of Terror, Crime and Militancy, pp. 239-288. Rand Corporation. Retrieved from https://www.rand.org/content/dam/rand/pubs/monograph_reports/MR1382/MR1382.ch8.pdf
Dubouloz, C. & Wilner, A. (2010, February). Home grown terrorism and transformative learning: an interdisciplinary approach to understanding radicalization. Global Change Peace and Security. Retrieved from http://www.researchgate.net/publication/228624027_Homegrown_terrorism_and_transformative_learning_an_interdisciplinary_approach_to_understanding_radicalization
Edelman, A. (2015, 10 May). Lone-wolf terrorists could attack U.S. ‘at any moment,’ Homeland Security chief admits. New York Daily News. Retrieved from http://www.nydailynews.com/news/politics/lone-wolf-terrorists-attack-moment-dhs-chief-article-1.2217118
Eriksson, J. and Giacomello, G. (2006, July). The Information Revolution, Security, and International Relations: (IR) Relevant Theory? International Political Science Review, volume 27, number 3, pp. 221 – 244. Sage Publications Limited. Retrieved from http://ips.sagepub.com.ezproxy.csu.edu.au/content/27/3/221
Ferguson, P. and Huston, G. (1998, June). What Is a VPN? Part I. The Internet Protocol Journal, volume 1, number 1. Cisco Systems. Retrieved from http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_11/what_is_a_vpn.html
Grob-Fitzgibbon, B. (2010, 10 August). From the dagger to the bomb: Karl Heinzen and the evolution of political terror. Terrorism and Political Violence. Volume 16, number 1, pp. 97 – 115. United Kingdom: Routledge Taylor and Francis Group. Retrieved from http://www-tandfonline-com.ezproxy.csu.edu.au/doi/abs/10.1080/09546550490446036
Harrison, W. B. [Jnr] (2002, 7 March). Closing The Digital Divide. Global Information. Vital Speeches of the Day. Volume 68, issue 19, pp. 606 – 608. Retrieved from http://connection.ebscohost.com/c/speeches/6995469/closing-digital-divide
Heickerö, R. (2014, 28 July). Cyber Terrorism: Electronic Jihad. Strategic Analysis, volume 38, number 4, pp. 554 – 565. United Kingdom: Routledge Taylor and Francis Group. Retrieved from http://www-tandfonline-com.ezproxy.csu.edu.au/doi/abs/10.1080/09700161.2014.918435
Henschke, A. (2014, June). A decision-making procedure for responding to cyber-attacks. Occasional Paper, number 6, pp. 3 - 9. National Security College. Crawford School of Public Policy. Australian National University. Retrieved from http://nsc.anu.edu.au/documents/ocassional-paper-6-cyber-ethics.pdf
House of Commons, United Kingdom. (2012, 6 February). Roots of Violent Radicalization. Nineteenth Report of Session 2010–12. Reference: HC 1446. House of Commons Home Affairs Committee. Retrieved from http://www.publications.parliament.uk/pa/cm201012/cmselect/cmhaff/1446/1446.pdf
Jones, C. (2015, 17 March). Jake Bilardi’s story shows why terrorist intervention must be tailored. The Conversation. Retrieved from https://theconversation.com/jake-bilardis-story-shows-why-terrorist-intervention-must-be-tailored-38769
Khalil, E. (2014, 1 October). Gone viral - Islamic State's evolving media strategy. Jane’s Intelligence Review. IHS Global Limited. Retrieved from http://search.proquest.com.ezproxy.csu.edu.au/docview/1609437740?rfr_id=info%3Axri%2Fsid%3Aprimo
Klausen, J. (2015). Tweeting the Jihad: Social Media Networks of
Western Foreign Fighters in Syria and Iraq. Studies in Conflict & Terrorism, 38:1, 1-22. Retrieved from http://dx.doi.org/10.1080/1057610X.2014.974948
Koehler, D. (2014). The Radical Online: Individual Radicalization Processes and the Role of the Internet. Journal for Deradicalization. Winter, 2014/2015, number 1, pp. 116 – 134. Retrieved from http://journals.sfu.ca/jd/index.php/jd/article/view/8/8
Labi, N. (2006, July/August). Jihad 2.0: With the loss of training camps in Afghanistan, terrorists have turned to the Internet to find and train recruits. The story of one pioneer of this effort—the enigmatic “Irhabi 007”—shows how. The Atlantic. Retrieved from http://search.proquest.com.ezproxy.csu.edu.au/docview/223088747?OpenUrlRefId=info:xri/sid:primo&accountid=10344
Mackinlay, J. (2009). The Virtual Battlefield. In The Insurgent Archipelago: From Mao to Bin Laden (pp. 123-142). United Kingdom: Hurst and Company. Retrieved from https://doms.csu.edu.au/csu/file/57260df0-83fe-4a03-a0c9-7a8c3fbc8973/1/mackinlay-j.pdf
McCauley, C., Moskalenko, S. and Van Son, B. (2013). Characteristics of Lone Wolf Violent Offenders: A Comparison of Assassins and School Attackers. Perspectives on Terrorism. Terrorism Research Initiative. Volume 7, number 1. Retrieved from http://www.terrorismanalysts.com/pt/index.php/pot/article/view/240/pdf
McMillan, R. (2016, 5 April). Facebook’s WhatsApp Launches ‘End-to-End’ Encryption. WhatsApp texting service strengthens encryption so only sender and receiver can read message contents. Retrieved from http://www.wsj.com/articles/facebooks-whatsapp-turns-on-encryption-by-default-1459869097
Ministry of Education and Home Office, United Kingdom. (n.d). How social media is used to encourage travel to Syria and Iraq: Bringing note for schools. Retrieved from https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/440450/How_social_media_is_used_to_encourage_travel_to_Syria_and_Iraq.pdf
Mishra, S. (2003, 5 September). Exploitation of information and communication technology by terrorist organizations. Strategic Analysis, volume 27, number 3. Institute for Defence Studies and Analyses. United Kingdom: Routledge Taylor and Francis Group. Retrieved from http://www-tandfonline-com.ezproxy.csu.edu.au/doi/abs/10.1080/09700160308450099
Mohamedou, M-M. O. (2015, 18 June). The Islamic State, Al-Qaeda, and Postmodern Globalized Violence [Video file]. The Fletcher School, Fares Centre for Eastern Mediterranean Studies. Retrieved from https://www.youtube.com/watch?v=kFFfKJydBfs
Neumann, P. (2012, December). Countering Online Radicalization in America. National Security Program, Homeland Security Project. Bipartisan Policy Center. Retrieved from http://bipartisanpolicy.org/wp-content/uploads/sites/default/files/BPC%20_Online%20Radicalization%20Report.pdf
Phillips, P. J. (2011). Lone Wolf Terrorism. Peace Economics, Peace Science and Public Policy. Volume 17, issue 1, article 1. Berkeley Electronic Press. Retrieved from http://web.a.ebscohost.com.ezproxy.csu.edu.au/ehost/detail/detail?sid=a5c0a290-fc3d-48d7-b99d-fa3ef0c900cc%40sessionmgr4002&vid=0&hid=4101&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#AN=60199449&db=tsh
Pretch, T. (2007, December). Home grown terrorism and Islamist radicalization in Europe. From Conversion to Terrorism. An assessment of the factors influencing violent Islamist extremism and suggestions for counter radicalization measures. Denmark: Danish Ministry of Justice. Retrieved from http://www.justitsministeriet.dk/sites/default/files/media/Arbejdsomraader/Forskning/Forskningspuljen/2011/2007/Home_grown_terrorism_and_Islamist_radicalization_in_Europe_-_an_assessment_of_influencing_factors2.pdf
Rogan, H. (2006, 20 March). Jihadism Online - A study of how al-Qaida and radical Islamist groups use the Internet for terrorist purposes, 2006/00915. Norwegian Defence Research Establishment. Retrieved from http://rapporter.ffi.no/rapporter/2006/00915.pdf
Rudner, M. (2016, 30 March). “Electronic Jihad”: The Internet as Al Qaeda's
Catalyst for Global Terror. Study in Conflict and Terrorism, Volume 0, Number. 0, 1–14. Retrieved from http://dx.doi.org/10.1080/1057610X.2016.1157403
Sageman, M. (2008). Leaderless Jihad: Terror networks in the twenty first century. Philadelphia, United States of America: University of Pennsylvania Press.
Schmid, A. P. (2013, March). Radicalization, De-Radicalization, Counter-Radicalization: A Conceptual Discussion and Literature Review. International Centre for Counter-Terrorism. Retrieved from http://www.icct.nl/download/file/ICCT-Schmid-Radicalization-De-Radicalization-Counter-Radicalization-March-2013.pdf
Simon, T., Goldberg, A., Aharonson-Daniel, L., Leykin, D. and Adini, B. (2014, August). Twitter in the Cross Fire—The Use of Social Media in the Westgate Mall Terror Attack in Kenya. Plos One, volume 9, issue 8, reference e104136. Retrieved from http://search.proquest.com.ezproxy.csu.edu.au/docview/1556010857?rfr_id=info%3Axri%2Fsid%3Aprimo
Soo Hoo, K., Goodman, S. & Greenberg, L. (2008, 3 March). Information technology and the terrorist threat. Survival, vol. 39, no. 3, Autumn 1997, pp. 135-55. Retrieved from http://dx.doi.org/10.1080/00396339708442930
Stevens, T. and Neumann, P.R. (2009, 28 January). Countering Online Radicalization: A Strategy for Action. London, United Kingdom: The International Centre for the Study of Radicalization and Political Violence. Retrieved from https://cst.org.uk/docs/countering_online_radicalization1.pdf
Stohl, M. (2007, 30 March). Cyber terrorism: a clear and present danger, the sum of all fears, breaking point or patriot games? Crime Law Social Change. Cyber Terrorism. Volume 46, pp. 223 – 238. Springer Science + Business Media. Retrieved from http://link.springer.com.ezproxy.csu.edu.au/article/10.1007/s10611-007-9061-9
Tabansky, L. (2011, November). Critical Infrastructure Protection against Cyber Threats. Military and Strategic Affairs. Volume 3, number 2, pp. 61 – 78. Retrieved from http://www.inss.org.il/uploadimages/Import/%28FILE%291326273687.pdf
Tadjdeh, Y. (2014, December). Government, Industry Countering Islamic State’s Social Media Campaign (Updated). National Defence. Retrieved from http://www.nationaldefensemagazine.org/archive/2014/December/Pages/GovernmentIndustryCounteringIslamicStatesSocialMediaCampaign.aspx
Tehrani, P. M., Manap, N. A. and Taji, H. (2013). Cyber terrorism
challenges: The need for a global response to a multi-jurisdictional crime. Computer Law and Security Review, volume 29, pp. 207 – 215. Faculty of Law, The National University of Malaysia. Malaysia: Elsevier Limited. Retrieved from http://www.sciencedirect.com.ezproxy.csu.edu.au/science/article/pii/S0267364913000666
The Clarion Project. (2014, 10 September). The Islamic State's (ISIS, ISIL) Magazine: All of the issues of the Islamic State's glossy propaganda magazine 'Dabiq,' named after a key site in Muslim apocalypse mythology can be found here. Retrieved from http://www.clarionproject.org/news/islamic-state-isis-isil-propaganda-magazine-dabiq
Thomas, T. L. (2003). Al Qaeda and the Internet: The danger of "cyberplanning". Parameters.Volume 33, number 1. ProQuest. Central. Retrieved from http://search.proquest.com.ezproxy.csu.edu.au/docview/198039860?OpenUrlRefId=info:xri/sid:primo&accountid=10344
Torok, R. (2013). Developing an explanatory model for the process of online radicalization and terrorism. Security Infomatics, a Springer Open Journal, volume 2, number 6. Security Research Institute, Edith Cowan University. Perth, Australia: Torok; licensee Springer. Retrieved from http://www.security-informatics.com/content/2/1/6
Torres-Soriano, M.R. (2016, 27 April). The Caliphate Is Not a Tweet Away: The Social Media Experience of Al Qaeda in the Islamic Maghreb. Studies in Conflict & Terrorism. DOI: 10.1080/1057610X.2016.1159430. Retrieved from http://dx.doi.org/10.1080/1057610X.2016.1159430
Von Behr, I., Reding, A., Edwards, C. and Gribbon, L. (2013). Radicalization in the digital era: The use of the internet in 15 case studies of terrorism and extremism. Brussels, Belgium: RAND Europe. Retrieved from http://www.rand.org/content/dam/rand/pubs/research_reports/RR400/RR453/RAND_RR453.pdf
Weimann, G. (2006). New terrorism, new media. In Terror on the internet: the new arena, the new challenges. (pp. 15-31). Washington, DC: United States Institute of Peace Press. Retrieved from https://doms.csu.edu.au/csu/file/1eba375e-679b-43bf-b60a-d75d35983420/1/weimann-g.pdf
West, L. J. (2014, June). Virtual terrorism: Data as a target. Cybersecurity: Mapping the ethical terrain. Occasional Paper, number 6, pp. 28 - 33. National Security College. Crawford School of Public Policy. Australian National University. Retrieved from http://nsc.anu.edu.au/documents/ocassional-paper-6-cyber-ethics.pdf
Wilson, C. (2005, 1 April). Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress. CRS Report for Congress. Congressional Research Service - The Library of Congress. Retrieved from http://handle.dtic.mil/100.2/ADA444799
Downloads
Published
Issue
Section
License
The JD Journal for Deradicalization uses a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND) Licence. You are free to share - copy and redistribute the material in any medium or format under the following conditions:
Attribution — You must give appropriate credit, provide a link to the license, andindicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
NonCommercial — You may not use the material for commercial purposes.
NoDerivatives — If you remix, transform, or build upon the material, you may not distribute the modified material.