Global Terrorism and New Media

Total Page:16

File Type:pdf, Size:1020Kb

Global Terrorism and New Media Global Terrorism and New Media Global Terrorism and New Media carefully examines the content of terrorist websites and extremist television programming to provide a comprehensive look at how terrorist groups use new media today. Based partly on a content analysis of discussion boards and forums, the authors share their findings on how terrorism 1.0 is migrating to 2.0 where the interactive nature of new media is used to build virtual organization and community. Although the creative use of social networking tools such as Facebook may advance the reach of terrorist groups, the impact of their use of new media remains uncertain. The book pays particular attention to ter- rorist media efforts directed at women and children, which are evidence of the long-term strategy that some terrorist organizations have adopted, and the relationship between terrorists’ media presence and actual terrorist activity. This volume also looks at the future of terrorism online and analyzes lessons learned from counterterrorism strategies. This book will be of much interest to students of terrorism studies, media and communication studies, security studies and political science. Philip Seib is Professor of Journalism and Public Diplomacy, Professor of International Relations, and Director of the Center on Public Diplomacy at the University of Southern California. Dana M. Janbek is Assistant Professor at the Department of Communication at Lasell College. Media, War and Security Series Editors: Andrew Hoskins, University of Warwick, and Oliver Boyd-Barrett, Bowling Green State University This series interrogates and illuminates the mutually shaping relationship between war and media as transformative of contemporary society, politics and culture. Global Terrorism and New Media The post-Al Qaeda generation Philip Seib and Dana M. Janbek Global Terrorism and New Media The post-Al Qaeda generation Philip Seib and Dana M. Janbek First published 2011 by Routledge 2 Park Square, Milton Park, Abingdon, Oxon OX14 4RN Simultaneously published in the U.S.A. and Canada by Routledge 270 Madison Avenue, New York, NY 10016 Routledge is an imprint of the Taylor & Francis Group, an informa business This edition published in the Taylor & Francis e-Library, 2010. To purchase your own copy of this or any of Taylor & Francis or Routledge’s collection of thousands of eBooks please go to www.eBookstore.tandf.co.uk. © 2011 Philip Seib and Dana M. Janbek All rights reserved. No part of this book may be reprinted or reproduced or utilized in any form or by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying and recording, or in any information storage or retrieval system, without permission in writing from the publishers. British Library Cataloguing in Publication Data A catalogue record for this book is available from the British Library Library of Congress Cataloging-in-Publication Data Seib, Philip M., 1949- Global terrorism and new media : the post Al-Qaeda generation / Philip Seib and Dana M. Janbek. p. cm. Includes bibliographical references and index. 1. Terrorism and mass media. 2. Terrorism–Computer network resources. 3. Terrorists–Recruiting. 4. Internet–Political aspects. 5. Information warfare. I. Janbek, Dana M. II. Title. P96.T47S45 2010 363.325–dc22 2010006937 ISBN 0-203-84537-4 Master e-book ISBN ISBN 978-0-415-77961-6 (hbk) ISBN 978-0-415-77962-3 (pbk) ISBN 978-0-203-84537-0 (ebk) To the victims of the United States’ 9/11 and Jordan’s 9/11, and to others throughout the world whose lives have been affected by terrorism. Contents Preface viii Acknowledgements xiii 1 Communicating terror 1 2 High tech terror: Al Qaeda and beyond 22 3 Terrorists’ online strategies 43 4 Targeting the young 61 5 Women and terrorism 75 6 Terrorism’s online future 88 7 Responding to terrorism 101 Notes 119 Selected bibliography 133 Index 137 Preface This book is not the first examination of terrorism and new media, nor will it be the last. That says as much about the durability of terrorism and its embrace of new media tools as it does about the persistence of those who write about such matters. As a political force, terrorism has a long history and it has always evolved in order to survive and retain its ugly potency. During the first decade of the twenty-first century, terrorism has proved to be pervasive in terms of the incidence of terrorist acts, the pretensions to legitimacy of terrorists, the pro- minence of a few individual terrorist leaders, and, more significantly, in the way it has invaded our consciousness, permeating society with fearful aware- ness. The broad existence of a sense of terror, felt by some more acutely than by others, is a success for the purveyors of terrorism. There is no terrorism without communication, and this success has been enabled in part by clever use of new media, principally the numerous tools provided by the Internet. The breadth of terrorism’s societal presence is evidence that it is no longer the domain of the individual “mad bomber” or the isolated group of plotters intent on a single act or on a limited campaign designed primarily as a sym- bolic venture. Rather, today we see terrorism as an expansive enterprise, reli- ant on claims—however fraudulent—of religious or political legitimacy. Some terrorist organizations are conscious of building for the future, as can be seen in their insidious outreach to children. They nurture hatred and take advan- tage of ignorance and innocence to ensure that their ranks will fill faster than they can be depleted by counterterrorism measures. This appeal to young people (as is discussed in Chapter 4) illustrates ways that new media have been woven into the fabric of terrorist enterprises. You- Tube, as just one example, has proved an invaluable tool, allowing terrorist groups to advertise themselves in a venue that has innate attraction to a youthful audience. Without Internet-based media, terrorists would probably be unable to reach most of these prospective supporters. In terms of remaining visible to a larger, more general audience, the Internet similarly allows terrorist groups to thrive virtually, outside the shadows where they once had to dwell. The relationship between terrorism and new media is important to several constituencies that address terrorism in different ways. For governments seeking Preface ix to prevent terrorist attacks and to punish those who have carried out such attacks, new media add layers of complexity to terrorist organizations and operations. Whether the means of addressing terrorism is through military, law enforcement, or politics, the technologically sophisticated milieu in which many terrorists operate makes them both more elusive and more ubiquitous. This is the terrain on which they must be fought, as well as by using more traditional methods to find them and remove their operating capacity through capturing them or by enticing them to repudiate violence and rely instead on conventional political practices. Members of the public must understand terrorism if they are to successfully deal with the terror produced by this enemy. Even if not directly or physically affected by terrorist attacks, people in many parts of the world must confront fear—of flying in an airplane, of traveling on a train or subway, of working in an office building, and even just driving down a street or going shopping. In the West, there is a tendency to focus on singular events such as the 9/11 attacks or the bombings in London and Madrid. But what about the Iraqis and Pakistanis and others who live every day with the very real possibility of a terrorist bombing? For people to exist without the emotional paralysis that terror can induce requires an understanding of the evil that is at work in their world. Broad-based comprehension of terrorism is also essential if the public is to have a voice in governmental responses. Before surrendering basic rights and values or acceding to bloody military action, people should understand who the enemy is, what motivates them, how they operate, and what is at stake. To a large extent, these decisions made by the public are dependent on information they receive from the news media. Many journalists treat terror- ism simplistically, focusing on individual terrorist acts and their immediate aftermath without thoughtfully inquiring why these acts occurred and exploring alternative ways to respond. The always-present tendency of the news media, even in democracies, to move in lockstep with government is particularly evident in matters related to terrorism. That will continue unless journalists become better schooled in the roots and practices of terrorism, and today that means appreciating the enhanced power terrorists enjoy as a result of their use of new media. For the terrorists themselves, new media are, collectively, a transformative tool that offers endless possibilities for communication and expansion. The power of terrorism lies not in the acts of individuals but rather in the net- works that allow secure coordination within even loosely knit terrorist orga- nizations. New media are crucial in helping terrorist groups to endure—to sustain themselves by reaching various publics and to create a virtual imper- meability that protects their operations. These media allow terrorist groups to become regional and even global players, sometimes punching above their weight in propaganda terms and building support from among those who might otherwise not even know of their existence. Dissemination of videos over the Internet, to cite just one example, enables terrorists to rely less on traditional news media to deliver their messages to widespread audiences. x Preface With regard to security and operational matters, new media allow intelli- gent terrorists to work more effectively. As is discussed in this volume, to protect communications terrorist organizations have become adept at “cyber dead drops” and other tricks of their evolving trade.
Recommended publications
  • Jihad.De Jihadistische Online-Propaganda: Empfehlungen Für Gegenmaßnahmen in Deutschland
    SWP-Studie Stiftung Wissenschaft und Politik Deutsches Institut für Internationale Politik und Sicherheit Asiem El Difraoui jihad.de Jihadistische Online-Propaganda: Empfehlungen für Gegenmaßnahmen in Deutschland S 5 Februar 2012 Berlin Alle Rechte vorbehalten. Abdruck oder vergleichbare Verwendung von Arbeiten der Stiftung Wissenschaft und Politik ist auch in Aus- zügen nur mit vorheriger schriftlicher Genehmigung gestattet. SWP-Studien unterliegen einem Begutachtungsverfah- ren durch Fachkolleginnen und -kollegen und durch die Institutsleitung (peer review). Sie geben ausschließlich die persönliche Auffassung der Autoren und Autorinnen wieder. © Stiftung Wissenschaft und Politik, 2012 SWP Stiftung Wissenschaft und Politik Deutsches Institut für Internationale Politik und Sicherheit Ludwigkirchplatz 3­4 10719 Berlin Telefon +49 30 880 07-0 Fax +49 30 880 07-100 www.swp-berlin.org [email protected] ISSN 1611-6372 Eine Studie im Rahmen des von der Gerda-Henkel-Stiftung geförderten Projekts »Jihadismus im Internet: Die Internationalisierung von Gewaltdiskursen im World Wide Web« Inhalt 5 Problemstellung und Empfehlungen 7 Vorbemerkung: Islamismus, Salafismus und Jihadismus 10 Entwicklung, Struktur und Inhalte des jihadistischen Internet 10 Vom Hindukusch nach Neukölln – die Geschichte 10 Phase 1: Die Vorgeschichte des Online-Jihad am Hindukusch (1979–1989) 11 Phase 2: Londonistan – Jihadismus im Herzen Europas (1990–2001) 11 Phase 3: Die Globalisierung des Cyberjihad (2001–2006) 13 Phase 4: Web 2.0 – Facebook- und YouTube-Jihad (seit 2006)
    [Show full text]
  • Countering Violent Extremism Scientific Methods & Strategies
    TOPICAL STRATEGIC MULTI-LAYER ASSESSMENT AND AIR FORCE RESEARCH LABORATORY MULTI-DISCIPLINARY WHITE PAPER IN SUPPORT OF COUNTER-TERRORISM AND COUNTER-WMD Countering Violent Extremism Scientific Methods & Strategies Revised & Updated1 July 2015 The views expressed in this document are those of the authors and do not reflect the official policy or position of the organizations with which they are associated. Editor: Laurie Fenstermacher (Air Force Research Laboratory) Contributing Authors: Lt. Gen John N. “Jack” Shanahan, Ziad Alahdad, Latéfa Belarouci, Cheryl Benard, Kurt Braddock, William Casebeer, Steve Corman, Paul Davis, Karl DeRouen, Diane DiEuliis, Evelyn Early, Alexis Everington, Dipak Gupta, Tawfik Hamid, John Horgan, Qamar-ul Huda, Eric Larson, Anthony Lemieux, Robert Nill, Paulina Pospieszna, Tom Rieger, Marc Sageman, Anne Speckhard, Troy Thomas, Lorenzo Vidino Integration Editors: Sarah Canna & George Popp NSI, Inc. [email protected] 1 Originally Published September 2011 1 NOTE FROM THE EDITOR Why are we reissuing the paper collection, “Countering Violent Extremism: Scientific Methods and Strategies”? The answer is simple. Five years later, violent extremism is still an issue. In September 2014, President Obama spoke at the United Nations, calling on member nations to do more to address violent extremism. This was followed by a three-day summit in February 2015 to bring together local, federal, and international leaders to discuss approaches to counter violent extremism. The wisdom contained in this paper collection is more relevant than ever. I encourage everyone to read it, again or for the first time, in whole or in part. 2 CONTENTS Foreword (Lt. Gen. John N. “Jack” Shanahan) ............................................................................................................... 1 Preface (Diane DiEuiliis) ...............................................................................................................................................
    [Show full text]
  • Recruitment and Radicalization of School-Aged Youth by International
    HOMELAND SECURITY INSTITUTE The Homeland Security Institute (HSI) is a federally funded research and development center (FFRDC) established by the Secretary of Homeland Security under Section 312 of the Homeland Security Act of 2002. Analytic Services Inc. operates HSI under contract number W81XWH-04-D-0011. HSI’smiiission istoassist the Secretary of HldHomeland SiSecurity, the UdUnder Secretary for Science and Technology, and the Department of Homeland Security (DHS) operating elements in addressing national policy and security issues where scientific, technical, and analytical expertise is required. HSI also consults with other government agencies, nongovernmental organizations, institutions of higher education, and nonprofit organizations. HSI delivers independent and objective analyses and advice to support policy developp,ment, decision making, alternative approaches, and new ideas on significant issues. HSI’s research is undertaken by mutual consent with DHS and is organized by Tasks in the annual HSI Research Plan. This report presents the results of research and analysis conducted under Task 08-37, Implications for U.S. Educators on the Prevalence and Tactics Used to Recruit Youth for Violent or Terrorist Activities Worldwide of HSI’s Fiscal Year 2008 Research Plan. The purpose of the task is to look at the phenomenon of school-aged individuals being recruited by individuals or groups that promote violence or terrorissm. The results presented in this report do not necessarily reflect official DHS opinion or policy. Homeland Security Institute Catherine Bott Task lead, Threats Analysis Division W. James Castan Robertson Dickens Thomas Rowley Erik Smith Rosemary Lark RECRUITMENT AND Fellow & Division Manager, Threats Analysis Division RADICALIZATION OF George Thompson, SCHOOL-AGED YOUTH Deputy Director, HSI BY INTERNATIONAL TERRORIST GROUPS Final Report 23 April 2009 Prepared for U.S.
    [Show full text]
  • Islamic Extremism in Europe”
    Peter Bergen, Schwartz Fellow of the New America Foundation and adjunct professor of the School of Advanced International Studies at Johns Hopkins University. Wednesday, April 27, 2005, “Islamic Extremism in Europe” House Committee on International Relations The greatest threat to the United States from al Qaeda, its affiliated groups, or those animated by al Qaeda’s ideology, emanates today from Europe. There are four strands to this argument which will be amplified in my testimony. The first, is that there is little or no evidence of American “sleeper cells” found in the US since the 9/11 attacks. Secondly, the most significant Islamist terrorist plots in the United States in the past decade have generally not involved “sleeper cells,” but rather terrorists who have come into the U.S. from abroad, often from Europe. Third, in 2004, we saw with the Madrid attacks and the disruption of serious terrorist plots in London that there are European sleeper cells that have the ability and motivation to carry out major terrorist operations, and even, perhaps, to attack the United States itself. Fourth, the European threat from militant jihadists will likely increase over time as declining European populations are replaced by rising Muslim immigration into Europe, a combination of circumstances that is generating, and will continue to generate, rising Muslim alienation in many European countries, and a significant amount of backlash against Muslim immigrants in countries such as the Netherlands. Since the 9/11 attacks we have seen little evidence of US sleeper cells. The terrorism cases that American officials have prosecuted since 9/11 have often followed the trajectory of an initial trumpeting by the government only to collapse, or to be revealed as something less than earth shattering, when the details emerge months later.
    [Show full text]
  • Terrorism/Counterterrorism and Media in the Age of Global Communication
    United Nations University Global Seminar Second Shimame-Yamaguchi Session “Terrorism—A Global Challenge”, 5-8 August 2006 Terrorism/Counterterrorism and Media in the Age of Global Communication By Brigitte L. Nacos, Columbia University In the age of global communication and international media the messengers of hate and terror are no longer impeded by national borders or regions; they can easily spread powerful words and images around the globe and condition impressionable men and women to be recruited into terrorist cells and networks. International and domestic terrorists exploit the traditional and the new communication means to achieve a host of crucial objectives--most of all the media-dependent dissemination of their “propaganda of the deed” among friends and foes. Whether in the United States, Europe, the Middle East, the Far East, or any other region, the architects of terrorism exploit the mass-media—including the Internet for the benefit of their operational efficiency, information gathering, recruitment, fund raising, and propaganda schemes. But governments in countries whose populations are intimidated by terrorist attacks and threats thereof utilize the mass media as well to enlist public support for actual and alleged counterterrorist measures. This lecture, then, will explain how media and communication figure prominently, indeed indispensably, into both terrorism and counterterrorism. Terrorists and their Need for Publicity Each major act of terrorism (and of minor terrorist incidents as well) results inevitably in news coverage. While I do not suggest that the news media favor this sort of political violence, it is nevertheless true that terrorist strikes provide what the contemporary media crave most—drama, shock, tragedy, and grief, the ideal ingredients of human interest stories.
    [Show full text]
  • 1 the Ideology and Discourse of the English Defence League: 'Not Racist
    University of Huddersfield Repository Kassimeris, George and Jackson, Leonie The ideology and discourse of the English Defence League: ‘Not racist, not violent, just no longer silent’ Original Citation Kassimeris, George and Jackson, Leonie (2015) The ideology and discourse of the English Defence League: ‘Not racist, not violent, just no longer silent’. British Journal of Politics and International Relations, 17 (1). pp. 171-188. ISSN 1369-1481 This version is available at http://eprints.hud.ac.uk/id/eprint/31846/ The University Repository is a digital collection of the research output of the University, available on Open Access. Copyright and Moral Rights for the items on this site are retained by the individual author and/or other copyright owners. Users may access full items free of charge; copies of full text items generally can be reproduced, displayed or performed and given to third parties in any format or medium for personal research or study, educational or not-for-profit purposes without prior permission or charge, provided: • The authors, title and full bibliographic details is credited in any copy; • A hyperlink and/or URL is included for the original metadata page; and • The content is not changed in any way. For more information, including our policy and submission procedure, please contact the Repository Team at: [email protected]. http://eprints.hud.ac.uk/ The ideology and discourse of the English Defence League: ‘Not racist, not violent, just no longer silent’ Abstract The English Defence League (EDL) emerged in 2009 and quickly became a major ‘anti-Islamist’ street protest movement, able to attract thousands to its national demonstrations.
    [Show full text]
  • Der Dschihadismus Als Transnationale Soziale Bewegung
    Andreas Keller Der Dschihadismus als transnationale soziale Bewegung München 2011 ISBN 978-3-9809131-0-2 STUDIEN AUS DEM MÜNCHNER INSTITUT FÜR ETHNOLOGIE, Band 1 WORKING PAPERS IN SOCIAL AND CULTURAL ANTHROPOLOGY, LMU MUNICH, Vol 1 Sökefeld Frank Heidemann, Martin Dürr, Herausgeber: Eveline Inhalt Glossar ................................................................................................................................ iv 1. Einführung und theoretischer Rahmen ........................................................................ 1 1.1. Thema und Aufbau der Arbeit ................................................................................................ 1 1.2. Theoretische Grundlagen der Bewegungsforschung ............................................................. 5 1.2.1. Definition von sozialen Bewegungen ............................................................................. 6 1.2.2. Paradigmen der Bewegungsforschung .......................................................................... 8 1.3. Komplementäre Anwendung der Paradigmen .................................................................... 15 1.4. Forschungsstand ................................................................................................................... 17 1.5. Vorgehensweise .................................................................................................................... 20 2. Genese des Dschihadismus ........................................................................................ 23 2.1.
    [Show full text]
  • Terrorism and Internet: a US Senate Report1 Analyzes the Extensive Use Made by Al-Qaeda of the Internet in Its War for Hearts and Minds
    Intelligence and Terrorism Information Center at the Israel Intelligence Heritage & Commemoration Center (IICC) July 14, 2008 Terrorism and Internet: a US Senate report1 analyzes the extensive use made by Al-Qaeda of the Internet in its war for hearts and minds. The report voices concerns over the exposure of American citizens to the websites of Al-Qaeda and other radical Islamic organizations. A poster produced by the Global Islamic Media Front, Al-Qaeda’s media center, published on Maktoob, an online forum not affiliated with Al-Qaeda (April 18, 2008). The poster reads: “The nation of Islam still stands since it was founded upon the skulls of Crusaders and infidels”. Ayman al-Zawahiri, Bin Laden’s deputy: “We are in a battle and more than half of this battle is taking place in the battlefield of the media. And that we are in a media battle in a race for the hearts and minds of our people” (The Senate Report, p. 6) 1 For the complete report, see: http://hsgac.senate.gov/public/_files/IslamistReport.pdf. 2 Overview 1.Al-Qaeda and other radical Islamic organizations in the Middle East and elsewhere have managed to harness the media revolution which has taken place in the last decade. Those terrorist organizations massively exploit such media as Internet and television for the battle for hearts and minds which takes place alongside the ongoing fighting on the ground. Using an extensive infrastructure of websites and other media, they disseminate their ideology and political messages, generate public interest in their activities, and try to win support and sympathy for their cause.
    [Show full text]
  • Representing Muslims: Islamophobic Discourse and the Construction Of
    Representing Muslims: Islamophobic discourse and the construction of identities in Britain since 2001 Leonie Jackson BA, MA A thesis submitted in partial fulfilment of the requirements of the University of Wolverhampton for the degree of Doctor of Philosophy April 2015 This work or any part thereof has not previously been presented in any form to the University or to any other body whether for the purposes of assessment, publication or for any other purpose (unless otherwise indicated). Save for any express acknowledgments, references and/or bibliographies cited in the work, I confirm that the intellectual content of the work is the result of my own efforts and of no other person. The right of Leonie Jackson to be identified as author of this work is asserted in accordance with ss.77 and 78 of the Copyright, Designs and Patents Act 1988. At this date copyright is owned by the author. Signature……………………………………….. Date…………………………………………….. 1 Abstract Employing critical race theory as a theoretical and analytical framework, this thesis explores the nature, structure and purpose of Islamophobic discourse, and offers two central contributions to the scholarly debate on Islamophobia. First, it contributes to the literature on the nature of Islamophobia by analysing the form and structure of discourse that seeks to represent Muslims and Islam in a number of social and political sites. Second, the thesis addresses a significant gap identified in the scholarly literature, which has largely overlooked the purpose that Islamophobic discourse serves for those employing it. In order to address the nature and structure of Islamophobic discourse, the thesis analyses representations of Muslims and Islam in dominant national community cohesion and counterterrorism discourses; rearticulation of these discourses at the local level in the West Midlands town of Dudley; the use of Islamophobic discourse by the English Defence League; and the ways in which Islamophobic narratives were used to mark national boundaries in Switzerland, Denmark, the Netherlands and France.
    [Show full text]
  • Gary R. Bunt Imuslims: Rewiring the House of Islam (2009) Online Bibliography
    IMUSLIMS: REWIRING THE HOUSE OF ISLAM (2009) ONLINE BIBLIOGRAPHY. VERSION 1.0 Gary R. Bunt iMuslims: Rewiring the House of Islam (2009) Online Bibliography. Version 1.0 (050509) © 2009 Copyright Gary R. Bunt http://www.virtuallyislamic.com This is the first version of the online bibliography to accompany iMuslims: Rewiring the House of Islam. All links were correct at the time the book went to press. At this stage, I have not separated books, articles, web pages and other sources. All sources are in this listing, classified alphabetically. A more refined version of this resource may be made available in due course. If you are looking for a specific term, use your browser’s search box. Full information about these links can be found in the Endnotes to iMuslims, and in the text itself. Links and content changes: you may find archive copies elsewhere. Content is provided for information purposes only. A PDF of this document is also available. 9-11 Commission. The 9-11 Commission Report, Final Report of the National Commission on Terrorist Attacks Upon the United States, Official Government Edition. Washington, 2004. A Garden of Children. http://www.mumsy.blogspot.com/ A Meta Blog on Arab blogs. In the Arab World, a Blog Can Mean Prison, accessed 22 February 2006, http://arabblogandpoliticalcommunication.blogspot.com/2006/02/in- arab-world-blog-can-mean-prison.html A12N Gateway. A12n, accessed 17 September 2007, http://www.bisharat.net/A12N/ Abbey Mills Mosque. accessed 17 May 2007, http://www.abbeymillsmosque.com ABC News. Berg Had Been Advised to Leave Iraq, accessed 2 May 2004, http://abcnews.go.com/wire/World/ap20040512_222.html ABC News.
    [Show full text]
  • New Muslim Cool a Film by Jennifer Maytorena Taylor Co-Produced by Hana Siddiqi and Kauthar Umar
    n o s a e P.O .V. s 22 Facilitator’s Guide New Muslim Cool A film by Jennifer Maytorena Taylor Co-produced by Hana Siddiqi and Kauthar Umar www.pbs.org/pov n FACiliTATor’S GUide o s New Muslim Cool a e s 22 Letter frOm the fiLmmaker san Francisco , M ay 2009 Dear Viewer, i had an accidental start as a documentary filmmaker. injuries ended my modern-dance career before it really began, and during my recuperation i spent a few years teaching in new york city and san Francisco Head start and special-education classrooms. i started to learn that everybody has a story worth listening to, if you can just take the time and really open your ears and mind. and “normal” is usually in the eye of the beholder. i alternated those teaching gigs with time spent living in Brazil and ar - gentina, at a time when both countries were transitioning to elected gov - ernments from the military dictatorships of the ’70s and ’80s. Watching my friends and relatives in those countries emerge from the trauma of those years, i was struck by how powerfully each country’s pop culture was help - ing people express themselves collectively and individually. Flash forward to the period right after 9/11: i was working as a producer at san Francisco’s PBs affiliate, KQed, where i was offered the chance to do some pieces on south asian youth in the Bay area. in the course of my re - search, i discovered a thriving Muslim hip-hop scene in oakland.
    [Show full text]
  • Terrorist Celebrity: Online Personal Branding and Jihadist Recruitment and Planning Ari Weil Pomona College
    Claremont Colleges Scholarship @ Claremont Pomona Senior Theses Pomona Student Scholarship 2018 Terrorist Celebrity: Online Personal Branding and Jihadist Recruitment and Planning Ari Weil Pomona College Recommended Citation Weil, Ari, "Terrorist Celebrity: Online Personal Branding and Jihadist Recruitment and Planning" (2018). Pomona Senior Theses. 206. https://scholarship.claremont.edu/pomona_theses/206 This Open Access Senior Thesis is brought to you for free and open access by the Pomona Student Scholarship at Scholarship @ Claremont. It has been accepted for inclusion in Pomona Senior Theses by an authorized administrator of Scholarship @ Claremont. For more information, please contact [email protected]. Terrorist Celebrity: Online Personal Branding and Jihadist Recruitment and Planning By Ari Weil In Partial Fulfillment of the Requirements for the Degree of Bachelor of Arts in International Relations Submitted To Professor Jennifer Morrison Taw Pomona College Claremont, California April 27, 2018 Weil 2 Table of Contents Abstract ................................................................................................................................................... 4 Acknowledgements ................................................................................................................................. 5 Chapter One: Introduction ....................................................................................................................... 6 Literature Review ...............................................................................................................................
    [Show full text]