CMRJ620 – Policing and Corrections in Homeland Security
22 December, 2013
“...we will continue to investigate and prosecute those who use the Internet to recruit others to plan or carry out acts of violence,...”
(Quintan Wiktorowicz 2013)
Online Radicalization to Violent Extremism
Introduction
The world today is much more wired or connected than anytime throughout history. This phenomenon will continue to expand and grow to exponential heights in the foreseeable future. This is no more prevalent anywhere in the world than within the United States. American Citizens have the ability to connect and scour the Internet from anywhere in the world, from multiple platforms. In light of this known fact, the business world has migrated to the Internet as well. Businesses understand that American citizens do much of their daily activity online, whether it’s searching for media (songs or videos) or connecting through social networking. There are billions of dollars of revenue to be gained from the Internet, with more and more businesses expanding within this realm. The industry has grown to understand that there is no more valuable tool for expanding your enterprise than the Internet. Essentially, new customers can be thought of as new recruits, as it becomes of the utmost importance to attract more of these new customers than your rivals do.
The moment the average citizen logs onto the Internet, they become bombarded with marketing ploys that are intended to alter their line of thinking, or sway their attention somewhere else. Furthermore, social networking sites have become the most efficient way of spreading any story line or individual method. Every thriving business has tapped into the social networking arena. Although the Internet battle rages on between rival companies and marketing experts, this same sentiment can be stated for radical or extremist organizations as well. As seen with businesses, the Internet has proven to provide fertile recruiting grounds for violent extremism. Essentially, the Internet offers access to a new audience and other radicalization instruments (Wiktorowicz, 2013).
The purpose of this research paper is to determine the role that the Internet plays in fueling radicalization to violent extremism within the United States. More specifically, it will answer the question as to how extremist organizations are using the Internet to further their means. The preliminary hypothesis is that the Internet is playing a pivotal role in radicalization to violent extremism. From the basic understanding of how universal the Internet is, it is feasible to acknowledge how strong of a recruitment tool it may be for radicals or extremist groups. Ultimately, it will be possible to determine what levels of interest extremist groups have in the Internet. Once their level of interest is understood, it is important to then note how or why extremist organizations are using the Internet.
Understanding exactly how extremist organizations are utilizing the Internet will allow for a formidable, proactive program for defeating the spread of violent extremism within the United States. The data for this research project was compiled via a quantitative approach. Information was obtained from multiple open-access sources and compiled for reference. The data was then dissected and cross-referenced to produce a reasonable assertion as to how the Internet is being utilized by extremist organizations. This information is then presented in the findings and analysis portion of the research document, to either prove or disprove the initial hypothesis. As stated above, the overall goal of this research project is to determine the role of the Internet in radicalization to violent extremism. With this goal in mind, it is also important to note which subsections of the Internet are most utilized by extremist groups and how they are using each subsection individually.
Literature Review
Over the years, more and more literary works are being produced with regards to online radicalization to violent extremism. These literary works are accomplished based upon the growing concern of the role the Internet may play in exacerbating violent extremism. The push for more information with regards to the Internet and radicalization to violent extremism is being pushed down from the United States government. The government is motivated by the concept of protecting American citizens from the spread of online violence and radicalization.
In early February 2013, the Federal Government established a new Interagency Working Group to counter the emerging threat. This new group is chaired by the National Security Staff and is designed to be made up of specialists in the areas of violent extremism, Internet safety, and civil liberties (Wiktorowicz, 2013). Essentially, this new group allows for a better system of information sharing. Its overall purpose is to coordinate activity and provide the guidelines for future approaches for defeating online radicalization and violence. The information derived by this working group will then be disseminated down to all concerned parties, to include other federal, state, and local government entities and private industry.
The establishment of the newly founded Interagency Working Group should provide for the production of future literary works in the area of online radicalization to violent extremism. Prior to the initiation of the working group, most literary works were undertaken from an individual standpoint and without strict guidelines. Therefore, the information contained within these documents is approached from many different angles by many different sources. The one constant thread that remains within these literary works is the Internet can and will be used for the spread of propaganda or for advocating the use of violence.
After September 11th, 2001, the New York City Police Department (NYPD) was faced with the daunting task of preventing any future terrorist attacks on their city. In light of this, they began to devise methods for detecting and defeating radicalization. Within this process arose the idea that radical Muslim ideology was spreading to the United States. The NYPD placed considerable effort into discerning how the message was being sent to potential converts within the United States. Ultimately, they were able to determine that the Internet has become an enabler or driver within the radicalization process of American Muslims (Silber and Bhatt, 2007). Ultimately, the NYPD came to the conclusion that the Internet serves the spread of Islamic extremism through all phases of the indoctrination process of new recruits.
For the NYPD’s conclusion to be completely feasible, one must first understand the indoctrination process and who the target audience may be. The United States Federal Bureau of Investigations (FBI’s) Counterterrorism Division (2006) divides target audiences, or conversion groups into four categories. These categories are fairly self-explanatory and are listed as the Jilted Believers, Faith Reinterpretation, Protest Conversion, and Acceptance Seeking (Borum, 2011). Although, a complete explanation of the four categories is not warranted for this research project, it is important to understand whom the extremist groups are targeting via the Internet. Understanding who the target audience is will lead to a better comprehension of what Internet pathways will be the most logical choices for the spread of radical views. The Internet provides a place where conflicted individuals or potential recruits can interact with similar people in complete anonymity. This anonymity is what allows for the initial approach by radicals as well. No other place on the Internet is this concept more profound than social media networks. After all, social media was designed for this purpose, which is to connect individuals across long distances for the sharing of information (Thompson, 2011). In fact, it is widely believed that social media alone may have inspired individuals to become Internet users. This fact is highlighted by the growing number of Internet subscribers across the world. For instance, areas of the world that had very few Internet subscribers in 2010, the Middle East and Northern Africa, has seen an above-average increase in comparison to the rest of the world (Internet World Stats, 2011). Although this fact alone is not a complete indication of the growing number of radical groups on the Internet, it is a cause for concern which requires consideration. Most past literary works have focused on radical Islam and the current and future recruitment tools. Although this is a very important inclusion into any radicalization to violent extremism research project, it is only a small portion of the puzzle. As of 2012, the Southern Poverty Law Center accounted for 1,007 active hate groups within the United States (SPLC.org, 2013). Of these hate groups, many of them maintain websites for the spread of their teachings and propaganda. These websites are protected by the US Constitution, and are allowed to operate without adverse action. Their hate filled messages are presented in multiple essays, articles, and other literary works contained within their websites. These websites become strong recruiting tools and further the spread of their propaganda to untapped audiences.
Research Methodology The research methodology for this literary work is derived from the careful analysis of the studies presented. Based upon past literary works and the review of available statistics, the role of the Internet in radicalization to violent extremism can be ascertained. The literary works reviewed provide a historical review of the studies completed to date, which may be placed into context with statistical data. This approach highlights how and why radical groups are utilizing the Internet to convey their message. This allows for proper analysis per the inclusion of known facts.
Past literary works are important because they set the backdrop for the current threat. Though threats evolve over time, the radical message remains the same. They also highlight the different variables that come into play with regards to the different forms of Internet usage. The basis for this concept is derived from a quantitative approach, as opposed to a qualitative one. The information that currently exists sheds some light onto how radical groups are using the Internet. Thus, by using a quantitative approach one can put all the numbers into perspective with regards to the research question.
When determining the role the Internet plays in radicalization to violent extremism, it is important to note the different modes of conveying a message via the Internet. For the purposes of this research project, the two modes that will be focused on heavily are social media and privately operated websites. Even though the mode of message conveyance varies between radical organizations, the intent should remain the same. The variables that come into play in this research project are access to the Internet and the legal ramifications for portraying a certain message. Some modes of message conveyance are protected by the freedom of speech, and are not subject to any legal ramifications. This is important to understand how the Internet may be utilized by radical organizations. These variables taken as a whole determines the overall effectiveness of the Internet in spreading violent extremist views. All variables must align properly for the attack to be most effective. Simply removing one variable may render the Internet a non-feasible option for radicals. As stated before, the quantitative approach is the most effective method for determining the actual threat facing our homeland with regards to the online radicalization to violent extremism. In light of this philosophy, this research document was produced to address the current threat.
Findings and Analysis Up until as recent as 2008, new recruits for radical Islam were achieved via interpersonal connections (Watts, 2008). These connections were normally achieved through family networks or other personal encounters with radical groups. This sentiment may be changing, as more and more countries are seeing exponential increases in Internet usage since 2008. Bahrain alone has seen a 152 percent increase in a time span of two years (Thompson, 2011). This phenomenon is not central to Bahrain, but is being seen across the globe. Essentially, the Internet has become widely available to all parts of the globe. In light of this fact, future recruits will come from Internet sources, both abroad and domestic. The Internet has given extremist groups the ability to transport their message great distances with relative ease. This method of message conveyance can be used to incite homegrown terrorism or lone wolfs dedicated to the cause. Their message has been converted to the English language to specifically target an American or European audience. Some organizations have even gone so far as to present their message to children in the form of cartoons or other entertaining media outlets. The idea is to produce like-minded individuals or groupthink ideology. Social media has become the prime source for such ideas to be exchanged or disseminated. With social media, the individual spreading the message does not have to be well known. The message is usually spread by new followers to their subsequent followers until the message spreads to great lengths. Essentially, the message becomes viral and spreads throughout the Internet. Radical groups currently use social media to communicate to supporters and fundraise for their cause. Al-Qaida has set up a chat room in PalTalk as an open forum for radicalization and recruitment (Thompson, 2011). Information seekers can stumble on to this site and become enamored by the conversation. Users are becoming bombarded with information from many different angles. Ultimately, any information that would have been kept private in years past is immediately and readily available for all to see. When this information is shown only from one viewpoint, it becomes a strong manipulation tool to alter the user’s perception of reality. This is an unwanted side of effect of the advent of the Internet. Social media has overtaken the mainstream media as the number one information source for American citizens. Social media is the best way for any message to be heard in today’s environment. The message will also be spread much quicker than it would be through conventional media sources. This holds particularly true for young people in America. In the age group of 18 to 24, 70 percent admit that they click on news of interest through Facebook (Saba, 2013). This places the youth in America at a higher risk to radical views. Beyond the use of social media, many groups have dedicated much of their time into spreading their message via personally operated Internet websites. This is most prevalent in hate groups, but it is also visible amongst many other extremist groups. Hate groups have found the Internet to be a powerful tool for spreading their hate-filled messages. “It’s been a tremendous boon for us. That’s why I dedicate most of my time to this. I feel like I’ve accomplished more on the Web than in 25 years of political activism.” (Don Black)
Hate groups have grown exponentially in the last few years, and they are increasing utilizing the Internet to reach new followers. Although their websites have come under increasing scrutiny, there is no legal justification for shutting them down until they break a law. The number of hate websites will only continue to grow for the foreseeable future.
Conclusion
The role of the Internet in radicalization to violent extremism is one of recruitment. Radical groups continue to use the Internet to recruit new followers and advocate for support. The most profound usage of the Internet is seen in social media networks, but websites designed to spread their message are growing as well. The Federal Government is working to disseminate information pertaining to the role the Internet plays and the threat that it has become (Wiktorowicz, 2013). New working groups are emerging designed to defeat this growing threat, as well.
As more and more individuals across the globe achieve access to the Internet, the number of extremist messages on the Internet will increase in turn. The threat of Internet recruits to radicalization is a very real one. To defeat this threat, there needs to be an abundance of information disseminated to the lowest level to coincide with constant monitoring of Internet sources. The constant monitoring will allow for a swift shut down of any sites suspected of instigating extreme violence.
Past literary works are very important to categorizing the threat, but more research is needed. The mental health and social services communities will need to play a more pivotal role in combating this threat in the future. These communities will provide great insight into whom the radical messages will affect most and who the target audience may be. From this, a greater understanding into the psychology of Internet recruitment will evolve. Every message is designed with a target audience in mind. Not every message will affect each individual in the same manner. Those that are at the greatest risk for recruitment should be on the forefront. These individuals are categorized by the FBI’s Counterterrorism Division, but need expounding.
Ultimately, the Internet plays the greatest and most pivotal role in inciting violent extremism. Nearly everyone on the globe subscribes to the Internet, and radical regimes are taking note of this fact. They are increasing their efforts on the Internet ten-fold. Essentially, the Internet has become the new front line for the War on Terror and radicalism. All future homeland security policies should be designed and implemented with this concept in mind. It needs to be an all levels and all agencies approach, as the threat is very high for domestic recruitment in all parts of the United States.
Bibliography
(1) Quintan Wiktorowicz. Working to Counter Online Radicalization to Violence in the United States. The White House Blog. February 5th, 2013. Accessed on December 22nd at http://www.whitehouse.gov/blog/2013/02/05/working-counter-online-radicalization-violence-united-states.
(2) Mitchell D. Silber. Arvin Bhatt. Radicalization in the West: The Homegrown Threat. NYPD Intelligence Division. NYPD. 2007.
(3) Randy Borum. Radicalization into Violent Extremism I: A Review of Social Science Theories. Journal of Strategic Security. Vol. 4. Number 4. Winter 2011.
(4) Federal Bureau of Investigation Counterterrorism Division. (U//FOUO) The Radicalization Process: From Conversion to Jihad. Federal Bureau of Investigation Intelligence Assessment. 10 May 2006.
(5) Robin L. Thompson. Radicalization and the Use of Social Media. Journal of Strategic Security. Vol. 4. Number 4. Winter 2011.
(6) Internet World Stats. “Top 20 Countries with the Highest Number of Internet Users”. June 30, 2010. Accessed on December 22 at http://www.internetworldstats.com/top20.htm.
(7) Southern Poverty Law Center. Active US Hate Groups. Hate and Extremism. Accessed on December 22 at http://www.splcenter.org/get-informed/hate-map
(8) Clinton Watts. “Foreign Fighters: How Are They Being Recruited? Two Imperfect Recruitment Models”. 2008. Accessed on December 22 at http://www.homelandsecurity.org/hsireports/Internet_Radicalization.pdf.
(9) Jennifer Saba. One-Third of US Adults get news through Facebook: study. Reuters. 2013. Accessed on December 22 at http://www.reuters.com/article/2013/10/24/net-us-facebook-study-news-idUSBRE99NOSV20131024.
(10) Harvard Law. Hate Groups on the Internet. 2013. Accessed on December 22 at http://cyber.law.harvard.edu/eon/ei/elabs/race/hate.htm.
Bibliography: (1) Quintan Wiktorowicz. Working to Counter Online Radicalization to Violence in the United States. The White House Blog. February 5th, 2013. Accessed on December 22nd at http://www.whitehouse.gov/blog/2013/02/05/working-counter-online-radicalization-violence-united-states. (2) Mitchell D. Silber. Arvin Bhatt. Radicalization in the West: The Homegrown Threat. NYPD Intelligence Division. NYPD. 2007. (3) Randy Borum. Radicalization into Violent Extremism I: A Review of Social Science Theories. Journal of Strategic Security. Vol. 4. Number 4. Winter 2011. (4) Federal Bureau of Investigation Counterterrorism Division. (U//FOUO) The Radicalization Process: From Conversion to Jihad. Federal Bureau of Investigation Intelligence Assessment. 10 May 2006. (5) Robin L. Thompson. Radicalization and the Use of Social Media. Journal of Strategic Security. Vol. 4. Number 4. Winter 2011. (6) Internet World Stats. “Top 20 Countries with the Highest Number of Internet Users”. June 30, 2010. Accessed on December 22 at http://www.internetworldstats.com/top20.htm. (7) Southern Poverty Law Center. Active US Hate Groups. Hate and Extremism. Accessed on December 22 at http://www.splcenter.org/get-informed/hate-map (8) Clinton Watts. “Foreign Fighters: How Are They Being Recruited? Two Imperfect Recruitment Models”. 2008. Accessed on December 22 at http://www.homelandsecurity.org/hsireports/Internet_Radicalization.pdf. (9) Jennifer Saba. One-Third of US Adults get news through Facebook: study. Reuters. 2013. Accessed on December 22 at http://www.reuters.com/article/2013/10/24/net-us-facebook-study-news-idUSBRE99NOSV20131024. (10) Harvard Law. Hate Groups on the Internet. 2013. Accessed on December 22 at http://cyber.law.harvard.edu/eon/ei/elabs/race/hate.htm.
You May Also Find These Documents Helpful
-
This research project focuses on the rise in domestic terrorism in the U.S. over the last decade, beginning with the 9/11 terrorist attacks. The 9/11 attacks provide a starting point to compare and contrast findings from subsequent acts of domestic terrorism in order to evaluate improvements (and lack thereof) over the same period of time. Findings include action and behavior trends by terrorists and intelligence community/law enforcement personnel in a number of high-profile terrorist cases. Gathered research can provide substantial proof as to the government’s (i.e. intelligence community’s) ability to prevent or at least capably respond to future acts of terrorism in the U.S.…
- 17193 Words
- 69 Pages
Powerful Essays -
References: Combs, C. (2011). Terrorism in the twenty-first century (7th ed.). Boston, MA: Pearson Publishing…
- 1017 Words
- 5 Pages
Better Essays -
Wei, L. (August 2010). Terrorism’s New Frontiers. Beijing Review, Vol. 53, Issue 31, pp 13. Retrieved on 9/9/2013 from http://web.ebscohost.com.ezproxy.liberty.edu:2048/ehost/pdfviewer/pdfviewer?sid=0b0e8b95-14ad-45df-928e-599544912e63%40sessionmgr110&vid=2&hid=119…
- 973 Words
- 4 Pages
Better Essays -
References: Combs, C. C. (2006-2013). Terrorism in the Twenty-First Centry (7th ed.). Boston, Mas: Pearson.…
- 489 Words
- 2 Pages
Good Essays -
The following assignment outlines, research of several different sociological and/or psychological characteristics, which can influence new members to join terrorist organizations. Obviously, no single theory, can completely explain the motivation of terrorists. It appears as though a set of theories can come close to doing so sufficiently though, as they cover the cost-benefit calculation, psychological willingness to commit violence, and social conditions permissive to the growth of extremism, that underlie incidents of terrorist action (Simon, 2011).Often it comes…
- 1009 Words
- 5 Pages
Good Essays -
Pipes, Daniel. Militant Islam Reaches America. New York: W. W. Norton & Company, Inc., 2002. Print.…
- 3330 Words
- 7 Pages
Best Essays -
Kevin, Borgeson, Robin, Valeri. (2009). Terrorism in America. Published by Jones and Bartlett Publishers. Retrieved by Google Scholar at: http://books.google.com/books?hl=en&lr=&id=nuCGVxJGPs0C&oi=fnd&pg=PR11&dq=Terrorism+in+America&ots=cwrYl-sRmr&sig=TfFelxe-ZxGIdjkC1eMpPHGY9Bc#v=onepage&q=Terrorism%20in%20America&f=false.…
- 1045 Words
- 3 Pages
Powerful Essays -
The issue of war against terrorism has been a dominant theme in our media today. Terrorists have been stereotyped as Middle Eastern, Muslim, cold blooded and hard headed suicide bombers who are out to destroy all that standing in the western world. The gargantuan international effort on the War on Terrorism has created a psychological construct where Islamic fundamentalism and the Middle Eastern race are now considered as potential terrorists. There have been numerous circumstances where Muslims and Arabic costume and color precipitated discrimination and hate campaigns.…
- 679 Words
- 3 Pages
Good Essays -
“Leaving terrorism behind, either from an individual or collective perspective, might on the one hand suggest critical cognitive and social changes, in terms of abandoning the shared social norms, values, attitudes and aspirations so carefully forged while the individual was still an active member of a terrorist group – this is what is usually meant by the term ‘de-radicalization’” (Canter 2009). A better understanding of why individuals become radicalized will only aid in the understanding of why individuals disengage from terrorism. As I previously stated, there are many ‘root’ causes, such as victimization, that can lead an individual to radicalization. Additionally, ‘route’ causes are slightly different in their effect on the radicalization process for potential terrorists. Apparently, gradual socialization into terrorism is one of the main ‘route’ causes (Canter 2009). The ‘route’ to terrorism is considered gradual due to the initial level of involvement and interest. Through various activities and group involvement, the individual terrorist becomes more involved and interested. “A perceived sense of reward quite possibly represents the only common denominator across all potential terrorists in terms of understanding the common factors that…
- 1327 Words
- 6 Pages
Powerful Essays -
Throughout history the world has witnessed acts of terrorism motivated by different groups of individuals fighting for a multitude of causes. These individuals have come from various races, religions, and ethnicities. Yet as different as they appear to be, we can still find similarities between them, for instance, groups such as the Tupamaros in Uruguay, the Ku Klux Klan in the United States, and the Irish Republican Army are motivated by vastly different beliefs which they consider a justification for terrorism. However, the underlying concept of these groups, by using acts of terror as a means to an end, is by and large shared by all of them. This paper will evaluate the hypothesis made by Cindy Combs which states, “The forces of oppression that have caused men to rebel have not changed over the centuries; what has changed is the willingness of the oppressed to use previously unthinkable means to achieve their objectives.”1 (Combs, p. 35.). It will also examine the strengths and weaknesses of this statement as it applies to case studies of the groups mentioned above.…
- 1533 Words
- 7 Pages
Powerful Essays -
Lone wolf terrorism has been on the rise due to the accessibility of information on the internet and connection of social media. It is far easier for individuals to find become radicalized through extremist propaganda found through an easy online search. Information on how to build bombs to layouts of city plans are easily accessible on the internet. Terrorists, or aspiring terrorists, are also able to read about failed terrorist attacks, to find areas where they are able to make improvements in their own…
- 85 Words
- 1 Page
Good Essays -
• Charles W. Kegley Jr. The New Global Terrorism: Characteristics, Causes, Controls. Upper Saddle River, NJ: Prentice-Hall, 2002.…
- 1727 Words
- 7 Pages
Powerful Essays -
Combs, Cynthia (2013) Terrorism in the Twenty- First Century, 7th ed, Ch. 5, published by Pearson Publishing…
- 281 Words
- 2 Pages
Satisfactory Essays -
The search for acceptance, power, and identity appears to be the key motivator for most Americans who embrace ISIS’ ideology (Vidino). Young Muslims in non-Muslim Western communities who feel isolated within the societies in which they live sometimes experience strong distrust for Western society and believe that they can find an identity in an all-Muslim community, on which ISIS capitalizes (Vidino). “Lone wolves” who feel marginalized and impotent see an opportunity for acceptance and strength in belonging to a group such as ISIS, which has cachet and presence in social media (Lister). ISIS is influencing the targets to act on its beliefs by urging Americans inside the domestic bubble of ISIS influence to, at some point, move from talk to action. Some Westerners travel to ISIS controlled territory to fight for the group, and get there by following one of many travel guides made for would-be recruits that include online step-by- step guides to crossing the Turkish or Syrian border and/or contact information for individuals involved in smuggling ISIS volunteers (Vidino). In several cases, the targeted individuals plan attacks in the U.S., though the FBI frequently successfully uses “sting operations” to prevent aspiring jihadists from executing large acts of…
- 2230 Words
- 9 Pages
Powerful Essays -
Neumann, P. "Preventing Violent Radicalization in America." Bipartisan Policy Center 's National Security Preparedness Group. June 2011. 09 Dec 2012.…
- 3150 Words
- 13 Pages
Best Essays