CMRJ620 – Policing and Corrections in Homeland Security
22 December, 2013
“...we will continue to investigate and prosecute those who use the Internet to recruit others to plan or carry out acts of violence,...”
(Quintan Wiktorowicz 2013)
Online Radicalization to Violent Extremism
Introduction
The world today is much more wired or connected than anytime throughout history. This phenomenon will continue to expand and grow to exponential heights in the foreseeable future. This is no more prevalent anywhere in the world than within the United States. American Citizens have the ability to connect and scour the Internet from anywhere in the world, from multiple platforms. In light of this known fact, the business world has migrated to the Internet as well. Businesses understand that American citizens do much of their daily activity online, whether it’s searching for media (songs or videos) or connecting through social networking. There are billions of dollars of revenue to be gained from the Internet, with more and more businesses expanding within this realm. The industry has grown to understand that there is no more valuable tool for expanding your enterprise than the Internet. Essentially, new customers can be thought of as new recruits, as it becomes of the utmost importance to attract more of these new customers than your rivals do.
The moment the average citizen logs onto the Internet, they become bombarded with marketing ploys that are intended to alter their line of thinking, or sway their attention somewhere else. Furthermore, social networking sites have become the most efficient way of spreading any story line or individual method. Every thriving business has tapped into the social networking arena. Although the Internet battle rages on between rival companies and marketing experts, this same sentiment can be stated for radical or extremist organizations as well. As seen with businesses, the Internet has proven to provide fertile recruiting grounds for violent extremism. Essentially, the Internet offers access to a new audience and other radicalization instruments (Wiktorowicz, 2013).
The purpose of this research paper is to determine the role that the Internet plays in fueling radicalization to violent extremism within the United States. More specifically, it will answer the question as to how extremist organizations are using the Internet to further their means. The preliminary hypothesis is that the Internet is playing a pivotal role in radicalization to violent extremism. From the basic understanding of how universal the Internet is, it is feasible to acknowledge how strong of a recruitment tool it may be for radicals or extremist groups. Ultimately, it will be possible to determine what levels of interest extremist groups have in the Internet. Once their level of interest is understood, it is important to then note how or why extremist organizations are using the Internet.
Understanding exactly how extremist organizations are utilizing the Internet will allow for a formidable, proactive program for defeating the spread of violent extremism within the United States. The data for this research project was compiled via a quantitative approach. Information was obtained from multiple open-access sources and compiled for reference. The data was then dissected and cross-referenced to produce a reasonable assertion as to how the Internet is being utilized by extremist organizations. This information is then presented in the findings and analysis portion of the research document, to either prove or disprove the initial hypothesis. As stated above, the overall goal of this research project is to determine the role of the Internet in radicalization to violent extremism. With this goal in mind, it is also important to note which subsections of the Internet are most utilized by extremist groups and how they are using each subsection individually.
Literature Review
Over the years, more and more literary works are being produced with regards to online radicalization to violent extremism. These literary works are accomplished based upon the growing concern of the role the Internet may play in exacerbating violent extremism. The push for more information with regards to the Internet and radicalization to violent extremism is being pushed down from the United States government. The government is motivated by the concept of protecting American citizens from the spread of online violence and radicalization.
In early February 2013, the Federal Government established a new Interagency Working Group to counter the emerging threat. This new group is chaired by the National Security Staff and is designed to be made up of specialists in the areas of violent extremism, Internet safety, and civil liberties (Wiktorowicz, 2013). Essentially, this new group allows for a better system of information sharing. Its overall purpose is to coordinate activity and provide the guidelines for future approaches for defeating online radicalization and violence. The information derived by this working group will then be disseminated down to all concerned parties, to include other federal, state, and local government entities and private industry.
The establishment of the newly founded Interagency Working Group should provide for the production of future literary works in the area of online radicalization to violent extremism. Prior to the initiation of the working group, most literary works were undertaken from an individual standpoint and without strict guidelines. Therefore, the information contained within these documents is approached from many different angles by many different sources. The one constant thread that remains within these literary works is the Internet can and will be used for the spread of propaganda or for advocating the use of violence.
After September 11th, 2001, the New York City Police Department (NYPD) was faced with the daunting task of preventing any future terrorist attacks on their city. In light of this, they began to devise methods for detecting and defeating radicalization. Within this process arose the idea that radical Muslim ideology was spreading to the United States. The NYPD placed considerable effort into discerning how the message was being sent to potential converts within the United States. Ultimately, they were able to determine that the Internet has become an enabler or driver within the radicalization process of American Muslims (Silber and Bhatt, 2007). Ultimately, the NYPD came to the conclusion that the Internet serves the spread of Islamic extremism through all phases of the indoctrination process of new recruits.
For the NYPD’s conclusion to be completely feasible, one must first understand the indoctrination process and who the target audience may be. The United States Federal Bureau of Investigations (FBI’s) Counterterrorism Division (2006) divides target audiences, or conversion groups into four categories. These categories are fairly self-explanatory and are listed as the Jilted Believers, Faith Reinterpretation, Protest Conversion, and Acceptance Seeking (Borum, 2011). Although, a complete explanation of the four categories is not warranted for this research project, it is important to understand whom the extremist groups are targeting via the Internet. Understanding who the target audience is will lead to a better comprehension of what Internet pathways will be the most logical choices for the spread of radical views. The Internet provides a place where conflicted individuals or potential recruits can interact with similar people in complete anonymity. This anonymity is what allows for the initial approach by radicals as well. No other place on the Internet is this concept more profound than social media networks. After all, social media was designed for this purpose, which is to connect individuals across long distances for the sharing of information (Thompson, 2011). In fact, it is widely believed that social media alone may have inspired individuals to become Internet users. This fact is highlighted by the growing number of Internet subscribers across the world. For instance, areas of the world that had very few Internet subscribers in 2010, the Middle East and Northern Africa, has seen an above-average increase in comparison to the rest of the world (Internet World Stats, 2011). Although this fact alone is not a complete indication of the growing number of radical groups on the Internet, it is a cause for concern which requires consideration. Most past literary works have focused on radical Islam and the current and future recruitment tools. Although this is a very important inclusion into any radicalization to violent extremism research project, it is only a small portion of the puzzle. As of 2012, the Southern Poverty Law Center accounted for 1,007 active hate groups within the United States (SPLC.org, 2013). Of these hate groups, many of them maintain websites for the spread of their teachings and propaganda. These websites are protected by the US Constitution, and are allowed to operate without adverse action. Their hate filled messages are presented in multiple essays, articles, and other literary works contained within their websites. These websites become strong recruiting tools and further the spread of their propaganda to untapped audiences.
Research Methodology The research methodology for this literary work is derived from the careful analysis of the studies presented. Based upon past literary works and the review of available statistics, the role of the Internet in radicalization to violent extremism can be ascertained. The literary works reviewed provide a historical review of the studies completed to date, which may be placed into context with statistical data. This approach highlights how and why radical groups are utilizing the Internet to convey their message. This allows for proper analysis per the inclusion of known facts.
Past literary works are important because they set the backdrop for the current threat. Though threats evolve over time, the radical message remains the same. They also highlight the different variables that come into play with regards to the different forms of Internet usage. The basis for this concept is derived from a quantitative approach, as opposed to a qualitative one. The information that currently exists sheds some light onto how radical groups are using the Internet. Thus, by using a quantitative approach one can put all the numbers into perspective with regards to the research question.
When determining the role the Internet plays in radicalization to violent extremism, it is important to note the different modes of conveying a message via the Internet. For the purposes of this research project, the two modes that will be focused on heavily are social media and privately operated websites. Even though the mode of message conveyance varies between radical organizations, the intent should remain the same. The variables that come into play in this research project are access to the Internet and the legal ramifications for portraying a certain message. Some modes of message conveyance are protected by the freedom of speech, and are not subject to any legal ramifications. This is important to understand how the Internet may be utilized by radical organizations. These variables taken as a whole determines the overall effectiveness of the Internet in spreading violent extremist views. All variables must align properly for the attack to be most effective. Simply removing one variable may render the Internet a non-feasible option for radicals. As stated before, the quantitative approach is the most effective method for determining the actual threat facing our homeland with regards to the online radicalization to violent extremism. In light of this philosophy, this research document was produced to address the current threat.
Findings and Analysis Up until as recent as 2008, new recruits for radical Islam were achieved via interpersonal connections (Watts, 2008). These connections were normally achieved through family networks or other personal encounters with radical groups. This sentiment may be changing, as more and more countries are seeing exponential increases in Internet usage since 2008. Bahrain alone has seen a 152 percent increase in a time span of two years (Thompson, 2011). This phenomenon is not central to Bahrain, but is being seen across the globe. Essentially, the Internet has become widely available to all parts of the globe. In light of this fact, future recruits will come from Internet sources, both abroad and domestic. The Internet has given extremist groups the ability to transport their message great distances with relative ease. This method of message conveyance can be used to incite homegrown terrorism or lone wolfs dedicated to the cause. Their message has been converted to the English language to specifically target an American or European audience. Some organizations have even gone so far as to present their message to children in the form of cartoons or other entertaining media outlets. The idea is to produce like-minded individuals or groupthink ideology. Social media has become the prime source for such ideas to be exchanged or disseminated. With social media, the individual spreading the message does not have to be well known. The message is usually spread by new followers to their subsequent followers until the message spreads to great lengths. Essentially, the message becomes viral and spreads throughout the Internet. Radical groups currently use social media to communicate to supporters and fundraise for their cause. Al-Qaida has set up a chat room in PalTalk as an open forum for radicalization and recruitment (Thompson, 2011). Information seekers can stumble on to this site and become enamored by the conversation. Users are becoming bombarded with information from many different angles. Ultimately, any information that would have been kept private in years past is immediately and readily available for all to see. When this information is shown only from one viewpoint, it becomes a strong manipulation tool to alter the user’s perception of reality. This is an unwanted side of effect of the advent of the Internet. Social media has overtaken the mainstream media as the number one information source for American citizens. Social media is the best way for any message to be heard in today’s environment. The message will also be spread much quicker than it would be through conventional media sources. This holds particularly true for young people in America. In the age group of 18 to 24, 70 percent admit that they click on news of interest through Facebook (Saba, 2013). This places the youth in America at a higher risk to radical views. Beyond the use of social media, many groups have dedicated much of their time into spreading their message via personally operated Internet websites. This is most prevalent in hate groups, but it is also visible amongst many other extremist groups. Hate groups have found the Internet to be a powerful tool for spreading their hate-filled messages. “It’s been a tremendous boon for us. That’s why I dedicate most of my time to this. I feel like I’ve accomplished more on the Web than in 25 years of political activism.” (Don Black)
Hate groups have grown exponentially in the last few years, and they are increasing utilizing the Internet to reach new followers. Although their websites have come under increasing scrutiny, there is no legal justification for shutting them down until they break a law. The number of hate websites will only continue to grow for the foreseeable future.
Conclusion
The role of the Internet in radicalization to violent extremism is one of recruitment. Radical groups continue to use the Internet to recruit new followers and advocate for support. The most profound usage of the Internet is seen in social media networks, but websites designed to spread their message are growing as well. The Federal Government is working to disseminate information pertaining to the role the Internet plays and the threat that it has become (Wiktorowicz, 2013). New working groups are emerging designed to defeat this growing threat, as well.
As more and more individuals across the globe achieve access to the Internet, the number of extremist messages on the Internet will increase in turn. The threat of Internet recruits to radicalization is a very real one. To defeat this threat, there needs to be an abundance of information disseminated to the lowest level to coincide with constant monitoring of Internet sources. The constant monitoring will allow for a swift shut down of any sites suspected of instigating extreme violence.
Past literary works are very important to categorizing the threat, but more research is needed. The mental health and social services communities will need to play a more pivotal role in combating this threat in the future. These communities will provide great insight into whom the radical messages will affect most and who the target audience may be. From this, a greater understanding into the psychology of Internet recruitment will evolve. Every message is designed with a target audience in mind. Not every message will affect each individual in the same manner. Those that are at the greatest risk for recruitment should be on the forefront. These individuals are categorized by the FBI’s Counterterrorism Division, but need expounding.
Ultimately, the Internet plays the greatest and most pivotal role in inciting violent extremism. Nearly everyone on the globe subscribes to the Internet, and radical regimes are taking note of this fact. They are increasing their efforts on the Internet ten-fold. Essentially, the Internet has become the new front line for the War on Terror and radicalism. All future homeland security policies should be designed and implemented with this concept in mind. It needs to be an all levels and all agencies approach, as the threat is very high for domestic recruitment in all parts of the United States.
Bibliography
(1) Quintan Wiktorowicz. Working to Counter Online Radicalization to Violence in the United States. The White House Blog. February 5th, 2013. Accessed on December 22nd at http://www.whitehouse.gov/blog/2013/02/05/working-counter-online-radicalization-violence-united-states.
(2) Mitchell D. Silber. Arvin Bhatt. Radicalization in the West: The Homegrown Threat. NYPD Intelligence Division. NYPD. 2007.
(3) Randy Borum. Radicalization into Violent Extremism I: A Review of Social Science Theories. Journal of Strategic Security. Vol. 4. Number 4. Winter 2011.
(4) Federal Bureau of Investigation Counterterrorism Division. (U//FOUO) The Radicalization Process: From Conversion to Jihad. Federal Bureau of Investigation Intelligence Assessment. 10 May 2006.
(5) Robin L. Thompson. Radicalization and the Use of Social Media. Journal of Strategic Security. Vol. 4. Number 4. Winter 2011.
(6) Internet World Stats. “Top 20 Countries with the Highest Number of Internet Users”. June 30, 2010. Accessed on December 22 at http://www.internetworldstats.com/top20.htm.
(7) Southern Poverty Law Center. Active US Hate Groups. Hate and Extremism. Accessed on December 22 at http://www.splcenter.org/get-informed/hate-map
(8) Clinton Watts. “Foreign Fighters: How Are They Being Recruited? Two Imperfect Recruitment Models”. 2008. Accessed on December 22 at http://www.homelandsecurity.org/hsireports/Internet_Radicalization.pdf.
(9) Jennifer Saba. One-Third of US Adults get news through Facebook: study. Reuters. 2013. Accessed on December 22 at http://www.reuters.com/article/2013/10/24/net-us-facebook-study-news-idUSBRE99NOSV20131024.
(10) Harvard Law. Hate Groups on the Internet. 2013. Accessed on December 22 at http://cyber.law.harvard.edu/eon/ei/elabs/race/hate.htm.
Bibliography: (1) Quintan Wiktorowicz. Working to Counter Online Radicalization to Violence in the United States. The White House Blog. February 5th, 2013. Accessed on December 22nd at http://www.whitehouse.gov/blog/2013/02/05/working-counter-online-radicalization-violence-united-states. (2) Mitchell D. Silber. Arvin Bhatt. Radicalization in the West: The Homegrown Threat. NYPD Intelligence Division. NYPD. 2007. (3) Randy Borum. Radicalization into Violent Extremism I: A Review of Social Science Theories. Journal of Strategic Security. Vol. 4. Number 4. Winter 2011. (4) Federal Bureau of Investigation Counterterrorism Division. (U//FOUO) The Radicalization Process: From Conversion to Jihad. Federal Bureau of Investigation Intelligence Assessment. 10 May 2006. (5) Robin L. Thompson. Radicalization and the Use of Social Media. Journal of Strategic Security. Vol. 4. Number 4. Winter 2011. (6) Internet World Stats. “Top 20 Countries with the Highest Number of Internet Users”. June 30, 2010. Accessed on December 22 at http://www.internetworldstats.com/top20.htm. (7) Southern Poverty Law Center. Active US Hate Groups. Hate and Extremism. Accessed on December 22 at http://www.splcenter.org/get-informed/hate-map (8) Clinton Watts. “Foreign Fighters: How Are They Being Recruited? Two Imperfect Recruitment Models”. 2008. Accessed on December 22 at http://www.homelandsecurity.org/hsireports/Internet_Radicalization.pdf. (9) Jennifer Saba. One-Third of US Adults get news through Facebook: study. Reuters. 2013. Accessed on December 22 at http://www.reuters.com/article/2013/10/24/net-us-facebook-study-news-idUSBRE99NOSV20131024. (10) Harvard Law. Hate Groups on the Internet. 2013. Accessed on December 22 at http://cyber.law.harvard.edu/eon/ei/elabs/race/hate.htm.