Paste your essay in here…Executive Summary
The use of the Internet for terrorist purposes is a rapidly growing phenomenon that has allowed for the rapid expansion of terrorism. Recruitment and radicalization of vulnerable individuals is made possible through the exploitation and manipulation of the Internet and social media technologies. These evolutions in technology provide crucial strategic factors that allow terrorist organizations and sympathizers the ability to recruit, finance, train, communicate, and incite acts of terrorism and extremism utilizing a computer from anywhere in the world.
The terrorist threat posed by extremism and terrorism is variable and volatile. With the adoption of exploitive recruitment tactics via the Internet and social media, the threat from previously unidentified extremist individuals will drastically increase. With an increased ability to spread extremist ideology, interconnect terrorist cells, communicate and plan, as well as share resources and expand membership the need to curtail social media usage through regulation and oversight is a must.
Global recognition of a correlation between social media and radicalization is the first step in mitigating future attacks and reducing potential recruitment. Collaborative efforts between privately owned social media corporations and the government are steering changes to curtail the usage of terrorist organizations and extremist groups on various platforms. In the United States, legislation is being proposed and implemented to give credence to fight against the spread of violent extremism and to mitigate the evolving threats of violent extremism and spread of terrorist ideology; shifting focus towards an understanding and analysis of the usage of social media by various extremist groups and implementing counter-radicalization and counter-propaganda strategies.
Introduction
The use of the Internet for terrorist purposes is a rapidly growing phenomenon that has allowed for the rapid expansion of terrorism. Recruitment and radicalization of vulnerable individuals is made possible by the evolution of the Internet and social media technologies. These evolutions in technology provide crucial strategic factors that allow terrorist organizations and sympathizers the ability to recruit, finance, train, communicate, and incite acts of terrorism utilizing a computer from anywhere in the world. Evolving recruitment platforms have necessitated evolved responses from government officials and private organizations in response to the growing threat and dissemination of terrorist ideology and propaganda. Social media plays a crucial role in not only providing the medium of communication for terrorist organizations, but also can be used to identify terrorists and hinder the spread of ideology and propaganda.
Traditionally terrorist organizations utilize conventional methods in an effort to indoctrinate and communicate with potential recruits. These methods were rooted in traditional social interactions, where communication was often dependent on face-to-face meetings, which necessitated coordination, time, and travel (The Homeland Security Institute, 2009). Application of these traditional methods limited the potential recruiting pool and increased the risk of exposure from law enforcement and intelligence agencies. The evolution of the Internet from static web pages and simplistic content to a developed Web 2.0, which allows for more dynamic and user-generated content based in social media provides terrorist groups the ability to reach a global audience. Adoption of social media as part of terrorist group operational strategies has increased the amount of foreign fighters found in terrorist organizations. The increase in sophisticated online social media use by terrorist groups resonates around the globe. To establish a construct for radicalization and violent extremism, the power and reach of social media has transformed the ability of terrorist organizations to identify, recruit, and radicalize individuals in the Western world.
The Internet is quickly becoming an essential resource for the spreading of terrorist propaganda, which begins with the process of contacting and influencing potential recruits. This allows for people, who would not normally be involved in possible terrorism activities, access to representatives, supporters or recruiters of an organization. The structure of the Internet provides an optimal environment of communication as it is accessible, cheap, and can provide anonymity to users on both ends of the spectrum, from potential recruits to terrorist recruiters (The Homeland Security Institute, 2009). With this drastic increase in user population, terrorist organizations have the ability to connect with an ever-increasing audience. Current usage of the Internet and social media in the US has increased significantly since 2005, rising from initial use of ten percent in 2005 to approximately seventy-six percent in 2015 (Perrin, 2015).
Radicalization Process
The concept of radicalization emphasizes the individual and, to some extent, the ideology and the group, and significantly de-emphasizes the wider circumstances. There are multiple circumstances that can lead to radicalization of individuals. In this instance, the production of extremists from the radicalization process is dictated by the progression of a four-step process identified and expanded upon by the New York Police Department and the Intelligence Division. Each of these phases is unique and has specific signatures associated with it. All individuals who begin this process do not necessarily pass through all the stages and many, in fact, stop or abandon this process at different points. Moreover, although this model is sequential, individuals do not always follow a perfectly linear progression. The four stages are as follows:
Stage 1: Pre-Radicalization – Pre-Radicalization involves an individual’s world his or her pedigree, lifestyle, religion, social status, neighborhood, and education, which collectively foreshadow the beginning of radicalization. There is no universal profile that is used to describe or identify an at risk individual for radicalization; however, there are certain peculiarities, such as demographic, social, or cultural implications, that can make a person predisposed to radicalization. Individuals seek other like- minded individuals and often look towards or identify particular groups, clusters, or networks. The easiest and most common method that is being utilized to contact, identify, and instigate pre-radicalization is the use of the Internet and social media. (Silber & Bhatt, 2007)
Stage 2: Self-Identification – This stage, which is largely influenced by both
internal and external factors, marks the point where the individual begins to explore extremist ideology, looking for a new group to identify with; most likely looking to align with a new philosophy, ideology, and values. The catalyst for this is often a crisis event, which can ultimately challenges previously held beliefs, opening the individual’s mind to a new perception or view of the world. Individuals most vulnerable to experiencing this phase are often those who are at a crossroad in life; those who are trying to establish an identity, or a direction, while seeking approval and validation for the path taken. These individuals can also be steered towards the need for acceptance after a cataclysmic life even triggers the shift towards radicalization, such potential triggers include, but are not limited to: economic (losing a job, excessive debt), social (alienation, discrimination, racism), political (international conflicts, personal grievance with government or law enforcement), or of a personal nature (death of a loved one or friend). Ultimately the individual is alienated from his former life and affiliates with like-minded individuals, who, via small group dynamics, strengthen the individuals’ beliefs for the newly adopted extremist group, terrorist organization, and criminal organization. This phase can be most prominently characterized as a self-selection process by which individuals first join a group that then becomes radicalized. (Silber & Bhatt, 2007)
Stage 3: Indoctrination – Indoctrination is the stage in which an individual gradually intensifies their beliefs, wholly adopting the terrorist ideology, which they most prominently identify with and concludes, without question, that the conditions and circumstances exist where action is required to support and further the cause. That action is violent extremism through radicalization. Consequently, as individuals progress through the indoctrination phase, they most likely have already sought, found and bonded with other like-minded individuals. This loosely knit but cohesive
group of people forms a cluster—an alliance based on social, psychological, ideological, and ethnic commonalities.
The Internet plays a vital role throughout the radicalization process, but most serves most strongly in the indoctrination process. As individuals go through the progression of radicalization, so too does the usage of the Internet and social media.
Internet usage in the first phase, self-identification, serves as the primary source of information about extremism and terrorism; providing the platform to meet other like-minded individuals in cyberspace. During the Indoctrination phase those undergoing this self-imposed brainwashing devote their time in the Internet and social media with extremist overtones. Perusing the various social media accounts and extremist webpages for like-minded individuals around the world who reinforce the individual’s beliefs and commitment and further legitimize them. (Silber & Bhatt, 2007)
Stage 4: Jihadization – This is the final phase in the radicalization process, and is the culmination of evolving and altering an individuals thought process and converting them into a violent extremist who wants to commit jihad, conduct violence, or carry out a terrorist act. While some individuals independently seek opportunities to fulfill this obligation, other persons are so willing and indoctrinated with hate that they will do whatever is necessary to be a participant in terrorism. It is in this phase that radicalization shifts from indoctrination to the operational phase where individuals participate in the planning, preparation, and ultimately execution of a terrorist attack. In the Jihadization phase, people challenge and encourage each other’s move to action. The Internet is now a tactical resource for obtaining instructions on constructing weapons, gathering information on potential targets, and providing spiritual justification for an attack. (Silber & Bhatt, 2007)
Why Social Media?
Following the events of 9/11 there was a massive shift in policy to focus on antiterrorism and strengthen homeland security. Many terrorist organizations and extremist groups shifted into the relatively anonymous platforms online that provided some sanctuary from the intelligence community, counterterrorism teams, and law enforcement. Terrorists have good reasons to use social media. Firstly, these channels are by far the most popular with their intended audience, which are primarily young impressionable youths who are at a cross roads in life. Second there is the usability and access to the Internet and social media that are predominately user-friendly, reliable, and free. Finally, social networking allows terrorists to reach out to directly to their target audience (Gates & Podder, 2013).
Social media differs from traditional and conventional media in many aspects, such as in interactivity, reach, frequency, usability, and accessibility. The aforementioned Web 2.0 shows the development of communication that has transformed the interaction and recruitment of terrorist organizations. Traditional media, which present with the conventional method of communication facilitating a ‘one-to-many’ approach in which only a small cohort of established institutions disseminates information to an effectively limitless audience. In contrast, the progression of social media allows anyone to publish or access information. New communication technologies, primarily social media, have created highly interactive platforms through which individuals and communities share, co-create, discuss, and modify content.
Terrorist Organizations Using Social Media
Islamic State of Iraq and Syria – ISIS
It is estimated that the Islamic State of Iraq and Syria (ISIS) currently has approximately 20,000 foreign fighters amongst its ranks. While a majority of these recruits are of Arab decent from countries neighboring Syria and Iraq, about twenty percent are foreign fighters from Western countries (Gates & Podder, 2013). The U.S. is not immune to these statistics, as there has been a drastic increase in foreign fighters recruited by ISIS in recent years. The Federal Bureau of Investigation (FBI) has been tracking US citizens who have either joined ISIS or attempted to join. The amount of citizens attempting to join in 2015 doubled from the previous year from 100 to 250 citizens (Dienst, 2015).
The focus of radicalization is normally towards younger people, specifically teenagers who feel alienated in their lives or immigrants who may be sympathetic to the terrorist cause. Through a combination of attacking the vulnerable psychological state of youths with a tailored recruiting process that is dependent on the targeted recruit, ISIS has been very successful in manipulating Western teenagers. Dr. John Horgan is a forensic psychologist who focuses on terrorist behavior; he elaborates on the techniques used by ISIS:
Recruitment is an intensely personal experience… ISIS is so good at it because [they] recognize the tailor-made efforts with teenagers. They’ll use North American young 20-somethings to target teenagers, [or] they’ll use females to target female teenagers, [or] they’ll use English speakers to target English speakers (Geiger, 2015)
One of the principle ideologies that are exploited in teenage recruits is the yearning and wanting to be accepted by a group, organization, or simply anyone who will give them the time of day. When their lives seemingly appear boring, controlled, and/or empty they look for acceptance and understanding; however, when they turn to the Internet for acceptance, there are often terrorist recruiters waiting to attack their vulnerability.
Many of the motives surrounding terrorism ideology have categorically remained consistent throughout history. As technology has advanced and developed, the modus operandi related to funding, communication, and recruitment has evolved accordingly. By progressing with technology, terror organizations have focused recruitment efforts towards vulnerable sympathizers on a digital platform. Initial exposure for potential sympathetic recruits generally occurs for one of the following reasons: accidentally stumble across radical material while searching for other entertainment; attempting to understand curiosity for the unknown in relation to ideologies, traditions, and methodologies of an extremists group; or are trying to find a group that they can identify with (The Homeland Security Institute, 2009).
The omnipresence of social media makes it an effective tool to recruit and radicalize sympathizers. Terrorist organizations utilize multiple accounts across various social media platforms to ensure vast dissemination of radical ideologies. A report published by the Brookings Institute in March of 2015 approximates that there were nearly 46,000 twitter accounts run by ISIS supporters and extremists (Berger & Morgan, 2015). Accounts linked to ISIS on Twitter have seen a drastic increase from the inception of this terror organization with a massive increase in the creation of accounts from a paltry two in 2006 to an astonishing creation of 12,000 in 2014; of the 46,000 accounts associated to ISIS, approximately 18,000 compose up to 50 tweets daily (Berger & Morgan 2015).
These organizations do not limit social media interactions only to Twitter, instead groups are exploiting numerous social media sites to include: Facebook, YouTube, Instagram, and Flickr. By utilizing multiple social media outlets, the potential to contact, influence, and recruit sympathizers drastically increases.
The fundamental principles of ISIS vary from traditional terrorist organizations. In contrast to other terrorist groups, who are content in controlling and governing a specified territory, ISIS wants to establish a global Islamic Caliphate; which involves the governance of its occupied territory but seeks ambitious territorial control (Gates & Podder, 2013). To help maintain focus on accomplishing the establishment of an Islamic state in Iraq, Syria, and abroad, ISIS has adopted various slogans to create understanding of its mission orientation. One specific slogan that correlates to this ambitious global caliphate is, “this Khilafa [Caliphate] will have no borders, inshallah, only fronts†(Gates & Podder, 2013). In order to achieve this, ISIS needs to focus on the traditional physical fronts of conventional warfare and unconventional warfare. Utilizing militaristic intentions through training, equipment and manpower in combination with a strong psychological warfare endeavor that can be found on the digital front.
Combating Terrorism on Social Media
To combat the growing threat of ISIS, governments need to attack ISIS on the unconventional and conventional frontiers. Emphasis has been placed on conventional warfare methods to combat terrorist organizations, with the US dropping approximately 23,000 bombs since January 1st 2015 killing over 25,000 suspected terrorist fighters (Johnson, 2016). There has been limited urgency in combating terrorism on the unconventional fronts, allowing terrorist organization the ability to replenish manpower and continue the spread of radical ideology.
Beginning in 2007, intelligence analysts and government officials began to realize that the evolution of technology brought with it a new form of radicalization in the West (DHS, 2010). There was a significant increase in the majority of terrorist suspects evolving through seemingly untraditional methods. “The majority of these individuals began as “unremarkable†– they had “unremarkable†jobs, had lived “unremarkable†lives and had little, if any criminal history†(Bhatt & Silber, 2007).
While intelligence agencies were beginning to implicate radicalization with the Internet and social media, government officials were beginning to draft legislation to mitigate the possibility of radicalization of US citizens and Westerners. The Violent Radicalization and Homegrown Terrorism Act of 2007 was proposed to establish a bipartisan committee that would “examine and report upon the facts and causes of violent radicalization, homegrown terrorism, and ideologically based violence in the United States†(H.R. 1955, 2007). This legislation would have defined the actions that implicated participation in radicalization and homegrown terrorism. This would have allowed law enforcement and intelligence agencies the ability to investigate and identify suspected terrorists based on federal guidelines, and focus on the role of the Internet and social media in radicalization and recruitment. Unfortunately, while this legislation was passed through the House of Representatives, Senate would not pass the legislation over a myriad of concerns, ranging from a generalized definition of terrorism to a departure from a focused counter terrorism plan (Center for Constitutional Rights, 2007).
It would not be until 2015, that a strategy for combating terrorist use of social media would appear in legislative form. The recent proposed legislation, the Combat Terrorist Use of Social Media Act of 2015, has passed through the House of Representatives, and is currently awaiting consideration from Congress. The following key points are taken from a Congressional summary of the legislation: evaluating the role social media plays in radicalization, analyze how terrorists and terrorist organizations are using social media, and an improvement of the federal governments efforts to disrupt and counter the use of social media (H.R. 3654, 2015). This legislation shows that there is now an understanding of the significance that social media can have on radicalizing individuals and create homegrown terrorists. While this legislation has not yet become law, the recognition of a correlation between social media and radicalization is the first step in mitigating future attacks and reducing potential recruitment.
Counterterrorism Strategy
Terrorists have transformed their methodologies in order to maximize and increase exposure for recruitment, radicalization, propaganda, and fundraising. They have turned to utilizing social media as counterterrorism tactics have disrupted their traditional methods, necessitating a shift towards an online presence; taking advantage of the ability to garner a mass following through a globally accessible medium. Terrorist followers, sympathizers, recruits, and those with curiosity are able to be easily access information and terrorist related content from a plethora of social media accounts. The migration of terrorism recruitment and communication into cyberspace has created new challenges for counterterrorism
Transitioning to social media has allowed radical groups and terrorists freely disseminate ideas through multiple modalities, to include: websites, blogs, social networks, forums, etc. Counterterrorism is certainly lagging behind terrorists’ manipulative use of the Internet and social media.
The conundrum that arises from the need to curtail the spread and usage of social media and the Internet by terrorist organization is the protection of free speech. “Protecting civil rights and civil liberties is paramount in itself and helps to counter violent extremism by safeguarding equal and fair treatment, ensuring nonviolent means to address grievances, and making it more di cult for violent extremists to divide communities†(DHS, 2016).
Conclusion
The Internet has evolved into a very important tool in the recruitment and radicalization process of individuals. Utilizing social media allows terror organizations the ability to contact and influence recruits on a global scale. The anonymity provided by the Internet allows organizations to penetrate into the US and Western countries with minimal effort. Threats of radicalization of US citizens are quickly turning into the next major terrorism threat on the home front. Through a combination of legislation, policy creation, and law enforcement involvement, there is a significant chance at mitigating the influence and risks associated with social media use for recruitment and radicalization.