Use of the Internet for Counter-Terrorist Purposes Liat Shetret
Total Page:16
File Type:pdf, Size:1020Kb
POLICY BRIEF February 2011 Use of the Internet for Counter-Terrorist Purposes Liat Shetret Introduction terrorist purposes. It argues that the Internet is not the problem and that the online platform On 1 May 2010, Faisal Shahzad, a naturalized can be employed to counter terrorism efforts. U.S. citizen, tried to detonate a car bomb in the Specifically, models of violent radicalization heart of New York’s Times Square. Thanks to processes off-line offer an important and useful “…the internet the vigilance of local witnesses and to technical framework for the development and remains largely shortcomin gs, the bomb was detected and implementation of policies to counter online unregulated or failed to explode. The investigation 6 use of the Internet for terrorist purposes. un-mediated… surroundin g Shahzad’s case, like other, more recent cases,1 shows that the Internet played an The brief concludes by offering multilateral stakeholders important role in his violent radicalization and institutions, states, civil society organizations, should not shy the planning and execution of the attempted the media, and the private sector examples of away from using attack. For example, he drew spiritual how they can use the Internet more effectively it as yet another inspiration from lectures and videos circulated as a counterterrorism tool to prevent and tool in the online by Anwar al-Awlaki, a U.S.-Yemeni counter the use of the Internet for violent counterterrorism cleric, who helped to convince Shahzad to take radicalization. Four intervention points are toolbox.” up the cause of al-Qaida.2 Shahzad accessed suggested: (1) weaken cult personalities, (2) Web sites for operational and planning challenge the extremist doctrine, (3) dispel the purposes. He viewed “real-time video feeds of glory of the “terrorist lifestyle,” and (4) offer a different areas of Times Square” to help street-smart and locally developed and determine which areas attract a large crowd communicated counternarrative. and would result in a high casualty rate if attacked.3 Shahzad also used the Internet to Background discuss his plans with militants based in Pakistan.4 The Internet is a medium that facilitates the maintenance of a decentralized, global, violent Terrorist operatives such as Shahzad often extremist movement. It provides a virtual draw inspiration, reinforcement, support, and forum for those who wish to propagate violent g uidance from a variety of on- and off-line ideologies and influence audiences around the sources. Some clerics; experts; scholars, such as world in real time.7 As Brynjar Lia, a research al-Awlaki; and virtual communities use the professor at the Norwegian Defence Research Internet to promote violent extremism on their Establishment, noted, the Internet is “an blogs, social network pages, discussion forums, important contributing factor in making or through the streaming of videos on terrorism more global and more transnational multimedia platforms such as YouTube.5 This in scope” and assists in the creation and brief provides an overview of challenges posed preservation of social bonds among leaders, to stakeholders by the use of the Internet for supporters, and sympathizers.8 Marc Sageman Building stronger partnerships to prevent terrorism www.globalct.org POLICY BRIEF suggested that Internet communication serves are difficult to monitor or remove, assure as a “glue” to an otherwise “leaderless jihad.”9 continuity of ideas and information flow, and Indeed, the Internet offers an ideal platform facilitate interactive and dynamic discussions.15 for media-minded terrorists to stimulate and supplement violent extremist activity off-line Recruitment and radicalization are facilitated in the “real world.” Terrorists acutely aware of through strategic online communications and these strengths are actively capitalizing on the messaging consumed by local and global advantages offered by online and off-line audiences. There remains considerable debate platforms. regarding to what extent activities on the Internet are complemented by physical The Internet can be exploited for terrorist relationships. Although most recruitment is purposes in numerous ways. It can be used for believed to be rooted in off-line relationships information gathering, fundraising, and data and experiences in the real world, the Internet mining, as well as for reconnaissance purposes supplements and may replace traditional Liat Shetret is a programs 10 officer at the Center on for potential attacks. The Internet also is used physical gathering spaces such as mosques, Global Counterterrorism to attract attention to a particular cause or community centers, and coffee shops as Cooperation. The author 16 wishes to thank her grievance, to communicate and coordinate recruitment venues. Moreover, individuals’ colleagues at the Center— operations secretly, and to exchange instructive ability to self-select themselves in to specific Alistair Millar, James technical tradecraft manuals and guides.11 In Web sites or chatrooms hardens and reinforces Cockayne, and Jason Ipe— for their valuable addition, the Internet is used to set agendas particular worldviews and can facilitate the comments and critique. and disseminate repackaged information (or creation of an “alternative reality” and value Thank you to Jack Barclay, 17 independent consultant on disinformation) as well as propaganda systems. Individuals continually choose to strateg ic communications, materials that draw on religious texts for return to specific sources of information for his insight, and legitimacy and validity. These materials are repeatedly. Over time, propaganda materials, feedback. produced, authenticated, and distributed by videos, books, poetry, articles, music, and affiliated media wings.12 manuals assure potential recruits of the “righteousness of both the cause and the means The Internet also can be exploited as a adopted” and further legitimize and justify the communicative tool via Web sites, chatrooms, use of violence.18 instant messaging, and social networking platforms to exchange ideas, share Challenges Facing Stakeholders information, and strengthen a sense of Combating the Use of the Internet community and personal identity, as well as for Terrorist Purposes reinforce a particular worldview or narrative. For example, over the past few years there has Multilateral institutions, regional been an increase in the number of Web sites, organizations, states, civil society, and other podcasts, blogs, and social networking pages stakeholders have been grappling with the catering to al-Qaida’s sympathizer community problem of the Internet being used to recruit by calling for the use of violence.13 These and violently radicalize individuals across the messages often are tailored to exploit globe.19 Despite some important positive steps vulnerable populations such as youth and in this area, a number of challenges remain. linguistically are tailored specifically for Western audiences to encourage ideological First, policies and programming have largely buy-in.14 It has been suggested that interactive focused on technology-oriented approaches forums and chatrooms are important, often such as removing and banning Web sites.20 It is critical “nodes” for communication, as they important to distinguish between technological 2 © Center on Global Counterterrorism Cooperation Use of the Internet for Counter-Terrorist Purposes Liat Shetret and technical solutions to cybercrime (attacks According to the United States Institute of on physical systems and infrastructure) and a Peace, “Fragmented efforts of public social phenomenon such as communicative diplomacy, strategic communications and uses of the Internet described in this brief. information operations are underresourced, Applying technological Band-Aids to social poorly coordinated, and understaffed given the concerns naturally limits the positive and strength and pervasiveness of [al-Qaida’s] 26 long-term impact banning and censoring message.” Indeed, media-savvy terrorist mechanisms produce.21 Although policing organizations are good at what they do. Web sites and content may be of some use, Nimble media wings are capitalizing these mechanisms fail to counter the message effectively on the Internet’s advantages, while itself as much of the narrative is not in fact lumbering bureaucracies struggle to balance illegal and does not call overtly for the use of accountability and swift response and are violence.22 Also, technological solutions structurally inflexible. Even though some applicable to our use of the Internet today, for stakeholders have managed to overcome example, to Web sites, chatrooms, and social organizational barriers, they continue to networking platforms, may not apply to struggle with ways to identify and convince technological advances in the future and may reliable messengers to deliver a be a waste of valuable resources. Also, counternarrative, particularly one that is locally censoring and removing information raise relevant, inspiring, and germane to community significant human rights and civil liberty concerns. Stakeholders especially are concerned concerns in practice. about coming up with ways to transmit messages online credibly and effectively Second, the body of literature remains without being dismissed as tainted or underdeveloped on topics such as violent untrustworthy. radicalization, deradicalization, and States and other stakeholders are looking prevention, particularly operational, virtually specifically for practical, financially