Loreto Machés Blázquez
Total Page:16
File Type:pdf, Size:1020Kb
Facultad de Ciencias Humanas y Sociales Grado en Relaciones Internacionales Trabajo Fin de Grado A Comparative Analysis of Al-Qaeda’s and ISIS’ Strategic Communication Techniques Estudiante: Loreto Machés Blázquez Director: Prof. Dr. Alberto Priego Moreno Madrid, 30 de abril de 2019 “I have been studying terrorists and terrorism for more than twenty years. Yet I am still always struck by how disturbingly ‘normal’ most terrorists seem when one actually sits down and talks to them. Rather than the wild-eyed fanatics or crazed killers that we have been conditioned to expect, many are in fact highly articulated and extremely thoughtful individuals for whom terrorism is (or was) an entirely rational choice, often reluctantly embraced and then only after considerable reflection and debate.” – Bruce Hoffman, 2006, p. xv Image 1: Magnum Chronicles Vol. 1. Larry Towell A man picks up a paper that was blown out of the towers after the attack of the World Trade Center on Sept. 11, 2001 Source: (Ritchin, 2018) I INDEX CHAPTER I: INTRODUCTION .................................................................................. 1 1. Purpose and Motives ................................................................................................. 2 CHAPTER 2: CONTEXTUALIZATION OF THE ANALYSIS .............................. 3 2. State of The Art ......................................................................................................... 3 3. Conceptual Framework ........................................................................................... 12 4. Research Questions ................................................................................................. 12 5. Study Research ........................................................................................................ 13 6. Hypothesis ............................................................................................................... 14 7. Time Framework ..................................................................................................... 15 8. Geographical Framework ........................................................................................ 15 9. Methodology ........................................................................................................... 15 CHAPTER III: ANALYSIS ........................................................................................ 16 10. Analysis of Variables ............................................................................................ 16 10.1. Group Presentation and Religious Legitimation ............................................ 17 10.1.1. Purpose .................................................................................................... 17 10.1.2. Religious Appeals and Duties .................................................................. 18 10.1.3. Authority Speeches and Quotes ............................................................... 19 10.1.4. Legitimization over other Terrorist Groups ............................................. 21 10.1.5. Legitimization .......................................................................................... 22 10.2. Attacks ............................................................................................................ 25 10.2.1. Training Provided and Encouragement to Attack ................................... 25 10.2.2. Attacks in Western Countries from 2001 until 2016 ............................... 28 10.3. Language and Visual Material ....................................................................... 30 10.3.1. Language ................................................................................................. 30 10.3.2. Visual and media support ........................................................................ 31 10.4. Community Building ...................................................................................... 34 10.4.1. Reception and Opinion ............................................................................ 34 10.4.2. Role of Muslims and their Place in the Group ........................................ 36 II CHAPTER IV: CONCLUSIONS ................................................................................ 37 11. Conclusions ........................................................................................................... 37 12. Future Consequences ............................................................................................ 39 BIBLIOGRAPHY ......................................................................................................... 41 ANNEXES ..................................................................................................................... 46 ANNEX 1: ANALYSIS OF MAGAZINES ............................................................................. 46 ANNEX 2: TERRORIST ATTACKS IN WESTERN COUNTRIES 2001-2016 .......................... 134 ANNEX 3: FIGURES OF AL-QAEDA AND ISIS ................................................................. 144 ANNEX 4: GLOSSARY OF ISLAMIC TERMS .................................................................... 145 II A. Index of Acronyms CAP Center for Analysis and Foresight at the Guardia Civil Centro de Análisis y Prospectiva de la Guardia Civil EU European Union IS Islamic State ISIS Islamic State of Iraq and Syria ISIL Islamic State of Iraq and the Levant IO Information Operations NATO North Atlantic Treaty Organization U.S. United States of America B. Index of Figures and Images Figure 1: Strategies of Terrorist Violence………………………………………………..4 Figure 2: Breakdown of IS OI output by content (weekly summery) …………………...10 Figure 3: Percentage of articles reflecting strategic logics of costly signaling ………….11 Figure 4: The strategic logic of IS OI……………………………………………………12 Image 1: Magnum Chronicles Vol. 1. Larry Towell…………………………………...I III Acknowledgments I would like to express my special gratitude to Begoña Vieitiez Pérez, Interim Head of the Centre for Analysis and Foresight at the Guardia Civil for her help and assistance in providing me with the necessary documentation for the elaboration of this final degree thesis. Moreover, I would also like to thank my tutor, Alberto Priego Moreno, for his commitment and guidance throughout this year. Finally, a special recognition to my parents whom have constantly expressed their support and inexhaustible encouragement in this journey. IV “Information technology and the Internet are rapidly transforming almost every aspect of our lives - some for better, some for worse.” –John Landgraf (2017) CHAPTER I: INTRODUCTION At the present time, it is unthinkable to describe the facts and events happening in the World without taking into consideration the enormous influence of the Internet. Almost every aspect of our lives is affected in one way or another by information technology, improving in numerous cases certain restrings related to time, space or location. News, videos, movies, online shopping, or social media platforms, to name a few, are just one click away from our reach. There is no doubt that the Internet improves many aspects of our personal and professional lives, nevertheless the threats that come along as well are very relevant and cannot be ignored, more importantly when it is used for terrorist purposes. In the case of communication networks, new technologies have allowed for an instant spread of information all around the world with the sole need of a digital devise with access to an internet connection. This overcoming of time and space has made it possible to not only communicate with individuals all over the globe, but to access and upload information as well, at any time and place. One important danger in this respect is the facilitation to any person with certain technology skills to upload all kinds of information, true or false, pejorative or friendly, radical or pacifist, with the purpose of creating a discourse of division and conflict between different groups. This is the case of both jihadist terrorist groups, Al-Qaeda and ISIS, which have developed a sophisticated set of digital communication tools to spread their message and ideology, seek support and fundraising, radicalize and recruit fighters, and finally, coordinate attacks. Moreover, the Internet has allowed the terrorist organizations to contact and reach supporters outside the Middle East and encourage them to join their cause, without the need of having to organize personal meetings to connect with them and appeal to their emotions and believes. This type of communication has proven to be so effective, that Al-Qaeda and ISIS have developed over the years a number of online propaganda mechanisms written in perfect English with the intention of directly appealing to Muslims living in Western countries. These online networks are a source of radicalization, recruitment and terrorist training that pose an enormous threat for State and civilian security. 1 1. Purpose and Motives Communication is indispensable in seeking to implement a change in reality, either by informing, teaching, threatening or asking for support. Without proper communication it is very difficult to achieve a major change, as no participation and coordination can take place. In this regard, terrorist groups Al-Qaeda and ISIS have undoubtedly identified the importance of creating a strong communication network issuing propaganda information in the English language to reach as many readers as possible and radicalize them. The purpose of this