On the Trail of Counter Radicalisation: an Examination of Strategies to Prevent the Threat of Islamist Extremism

Total Page:16

File Type:pdf, Size:1020Kb

On the Trail of Counter Radicalisation: an Examination of Strategies to Prevent the Threat of Islamist Extremism On the Trail of Counter Radicalisation: An Examination of Strategies to Prevent the Threat of Islamist Extremism Author Satterley, Shane Published 2017-07 Thesis Type Thesis (Masters) School School of Hum, Lang & Soc Sc DOI https://doi.org/10.25904/1912/2102 Copyright Statement The author owns the copyright in this thesis, unless stated otherwise. Downloaded from http://hdl.handle.net/10072/370984 Griffith Research Online https://research-repository.griffith.edu.au On the Trail of Counter Radicalisation: An Examination of Strategies to Prevent the Threat of Islamist Extremism Shane Satterley Supervisor: Associate Professor Dr Halim Rane Submitted in fulfilment of the requirements of the Master of Arts (Research), Griffith University July, 2017 2 Abstract The problem of Islamist inspired terrorism is a challenge that states around the world are struggling to deal with. This thesis focuses on the process of Islamist radicalisation that leads to this form of terrorism. It analyses strategies and programs that seek to counter or reverse the process of Islamist radicalisation. This thesis provides an explanatory model of radicalisation, a key component for first understanding how this process emerges and for analysing policies and programs. Semi-structured interviews were conducted in order to solicit best practices, lessons learned and challenges from key practitioners and policy makers in the area of counter radicalisation and deradicalisation in the United Kingdom, The Netherlands and Morocco. Also, this thesis provides new data concerning Australian Islamist terrorists and their educational status. These data show an overrepresentation of Australian terrorists in the STEM fields, particularly engineering. One of the key findings of this thesis is that radicalised individuals tend to lack particular epistemic skills, which have implications for pedagogy in general, and particularly counter radicalisation and deradicalisation programs. This thesis concludes with recommendations for counter radicalisation and deradicalisation policies and practice in Australia, drawn from broader contexts. 3 Statement of Originality This work has not previously been submitted for a degree or diploma in any university. To the best of my knowledge and belief, the thesis contains no material previously published or written by another person except where due reference is made in the thesis itself. (Signed)__Shane Satterley___________________________ 4 Table of Contents Introduction .................................................................................................................... 7 The Threat of Global Islamist Extremism .................................................................. 7 Definitions .................................................................................................................. 7 Purpose and Direction ................................................................................................ 9 Research Aims.......................................................................................................... 10 Chapter One: The Australian Context.......................................................................... 11 Chapter Two – Understanding Muslim Radicalisation, Countering and Rehabilitating .................................................................................................................................................. 18 Section Two: Counter Radicalisation ....................................................................... 31 Section Three: Deradicalisation ............................................................................... 41 Conclusion ................................................................................................................ 48 Chapter Three: Diving Deeper into Programs and Policies ......................................... 49 Introduction .............................................................................................................. 49 The United Kingdom: .......................................................................................... 50 Europe: ................................................................................................................. 51 Morocco: .............................................................................................................. 51 Data Collection and Evaluation ........................................................................... 52 The Interviews .......................................................................................................... 54 Active Change Foundation, London, United Kingdom ....................................... 54 Quilliam, London, United Kingdom .................................................................... 58 Radicalisation Awareness Network, Amsterdam, The Netherlands .................... 62 5 Institute Mohammad VI of Training Imams, Rabat, Morocco ............................ 65 The Australian Context ........................................................................................ 67 Conclusion ................................................................................................................ 70 Chapter Four: Discussion ............................................................................................. 71 State Involvement ................................................................................................ 71 Best Practice/Lesson Learned .............................................................................. 72 Intervention .......................................................................................................... 72 Best Practice/Lesson Learned: ............................................................................. 73 Families ................................................................................................................ 73 Best Practice/Lesson Learned: ............................................................................. 74 International Presence and Youth Leadership ..................................................... 74 Best Practice/Lesson Learned: ............................................................................. 75 Using Religious Leaders or Voices...................................................................... 75 Best Practice/Lesson Learned: ............................................................................. 76 Using Evidence .................................................................................................... 76 Best Practice/Lesson Learned: ............................................................................. 76 Defining Success .................................................................................................. 77 Best Practice/Lesson Learned: ............................................................................. 77 Challenges ............................................................................................................ 77 Best Practice/Lesson Learned: ............................................................................. 78 Training ................................................................................................................ 78 6 Best Practice/Lesson Learned: ............................................................................. 78 Using the five-part model of radicalisation .............................................................. 78 Identity Crisis ....................................................................................................... 79 Grievances............................................................................................................ 79 Socialisation ......................................................................................................... 80 Ideology ............................................................................................................... 80 Epistemological Failure ....................................................................................... 81 Conclusion ................................................................................................................ 82 Chapter Five: Policy Recommendations and Conclusion ............................................ 84 Policy Recommendations ......................................................................................... 84 Table of Figures Figure 1 CVE Pyramid …………………………………………………………… 41 Figure 2 Support for armed struggle as a function of time and rehabilitation…….. 51 Appendix…………………………………………………………………………….88 7 Introduction The Threat of Global Islamist Extremism The problem that is contemporary jihadist terrorism is hard to keep in perspective. News of the latest terror attack spreads instantly to all corners of the globe, which gives the impression that the problem is constant and getting worse. As Pinker (2011) argued in his seminal work on the history of violence, we are living in the most peaceful time in human history (Pinker, 2011). This fact is easily lost due to the ease with which one can remember the latest terrorist incident – an incident designed for shock value, remembrance and one that generates the “oxygen of publicity” (Wilkinson, 1997, p. 53). Studies of those in the West who are at risk of becoming violent extremists are often so low in number as to be statistically insignificant. Australia for instance has an estimated 0.2% of its Muslim population at risk of turning to terrorist violence (Rane, 2015).
Recommended publications
  • Women Who Run with the Wolves Lemos De Carvalho, Claudia
    Tilburg University Women Who Run With The Wolves Lemos De Carvalho, Claudia Publication date: 2018 Document Version Publisher's PDF, also known as Version of record Link to publication in Tilburg University Research Portal Citation for published version (APA): Lemos De Carvalho, C. (2018). Women Who Run With The Wolves: Online stories and roles of Spanish- speaking jihadist women. [s.n.]. General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain • You may freely distribute the URL identifying the publication in the public portal Take down policy If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. Download date: 29. sep. 2021 Women Who Run With The Wolves Online stories and roles of Spanish-speaking jihadist women Women Who Run With The Wolves Online stories and roles of Spanish-speaking jihadist women PROEFSCHRIFT ter verkrijging van de graad van doctor aan Tilburg University op gezag van de rector magnificus, prof. dr. E.H.L. Aarts, in het openbaar te verdedigen ten overstaan van een door het college voor promoties aangewezen commissie in de Ruth First zaal van de Universiteit op dinsdag 19 juni 2018 om 10.00 uur door Claudia Sofia Lemos de Carvalho geboren te Porto, Portugal Promotores: Prof.
    [Show full text]
  • Embargoed Until 2018 Or Until Further Notice
    Department of Social Sciences and Security Studies The OODA Loop and Salafi-Jihadi Inspired Home-Grown Terrorism A Tactic of Asymmetric Warfare Jason Thomas This thesis is presented for the Degree of Doctor of Philosophy of Curtin University EMBARGOED UNTIL 2018 OR UNTIL FURTHER NOTICE April 2016 1 Declarations Candidate’s Declaration I, Jason Thomas, hereby confirm that this PhD thesis has been solely written by me, that it is a record of work carried out by me and has not been submitted in any previous application for a higher degree. I was admitted as a candidate for the degree of Doctor of Philosophy in 2012, at Curtin University of Technology. Date: 12 April 2016 Signature of Candidate: Supervisor’s Declaration I hereby certify that the candidate has fulfilled the conditions of the Resolution and Regulations appropriate for the degree of Doctor of Philosophy at the Curtin University of Technology and that the candidate is qualified to submit this thesis in application for that degree. Date: Signature of Supervisor 2 Abstract A central theme in the current terrorism phenomenon has been al Qaeda’s Salafi-Jihadi narrative and its ability to inspire home-grown terrorism. In the minds of generally young, unexceptional Muslim males and some Western converts to Islam, this narrative is recreated in the context of their own personal circumstances and networks. The predominant strategic models of terrorism are inadequate for critically analysing a phenomenon that is adaptable, dynamic, evolving and regenerative. Through the application of Colonel John Boyd’s Observe-Orientate-Decide-Act Loop (OODA Loop) as an adaptable, alternative strategic model of terrorism and case study research methodology, this thesis tested the theory that Salafi-Jihadi inspired home-grown terrorism is a tactic of asymmetric warfare.
    [Show full text]
  • American Media Depiction of Terrorism in the U.S After September 11 Attacks
    Mississippi State University Scholars Junction Theses and Dissertations Theses and Dissertations 12-1-2020 American media depiction of terrorism in the U.S after September 11 Attacks Maria Thuy Trinh Follow this and additional works at: https://scholarsjunction.msstate.edu/td Recommended Citation Trinh, Maria Thuy, "American media depiction of terrorism in the U.S after September 11 Attacks" (2020). Theses and Dissertations. 447. https://scholarsjunction.msstate.edu/td/447 This Dissertation - Open Access is brought to you for free and open access by the Theses and Dissertations at Scholars Junction. It has been accepted for inclusion in Theses and Dissertations by an authorized administrator of Scholars Junction. For more information, please contact [email protected]. Template B v4.0 (beta): Created by L. Threet 2/5/19 American media depiction of terrorism in the U.S after September 11 Attacks By TITLE PAGE Maria Thuy Trinh Approved by: Raymond Edward Barranco (Major Professor) Nicole E. Rader (Minor Professor) Kimberly C. Kelly David C. May Margaret Ann Hagerman (Graduate Coordinator) Rick Travis (Dean, College of Arts & Sciences) A Dissertation Submitted to the Faculty of Mississippi State University in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy in Sociology. in the Department of Sociology Mississippi State, Mississippi November 2020 Copyright by COPYRIGHT PAGE Maria Thuy Trinh 2020 Name: Maria Thuy Trinh ABSTRACT Date of Degree: November 25, 2020 Institution: Mississippi State University Major Field: Sociology. Major Professor: Raymond Barranco Title of Study: American media depiction of terrorism in the U.S after September 11 Attacks Pages in Study: 192 Candidate for Degree of Doctor of Philosophy The purpose of this dissertation was to analyze perceptions of terrorism through the analysis of two newspapers’ news coverage of terrorism after the September 11 attacks, a popular Kentucky newspaper, the Courier-Journal and the New York Times (NYT).
    [Show full text]
  • Foreign Terrorist Fighters?
    TO CATCH THE BOOMERANG? SHOULD AUSTRALIA EXTRADITE, REPATRIATE AND PROSECUTE THEIR “RETURNING” FOREIGN TERRORIST FIGHTERS? Lieutenant-Commander Jacqueline Swinton JCSP 46 PCEMI 46 Solo Flight Solo Flight Disclaimer Avertissement Opinions expressed remain those of the author and do Les opinons exprimées n’engagent que leurs auteurs not represent Department of National Defence or et ne reflètent aucunement des politiques du Ministère Canadian Forces policy. This paper may not be used de la Défense nationale ou des Forces canadiennes. Ce without written permission. papier ne peut être reproduit sans autorisation écrite. © Her Majesty the Queen in Right of Canada, as represented by © Sa Majesté la Reine du Chef du Canada, représentée par le the Minister of National Defence, 2020. ministre de la Défense nationale, 2020. CANADIAN FORCES COLLEGE – COLLÈGE DES FORCES CANADIENNES JCSP 46 – PCEMI 46 2019 – 2020 SOLO FLIGHT TO CATCH THE BOOMERANG? SHOULD AUSTRALIA EXTRADITE, REPATRIATE AND PROSECUTE THEIR “RETURNING” FOREIGN TERRORIST FIGHTERS? By Lieutenant-Commander Jacqueline Swinton “This paper was written by a candidate “La présente étude a été rédigée par un attending the Canadian Forces College in stagiaire du Collège des Forces canadiennes fulfilment of one of the requirements of the pour satisfaire à l'une des exigences du cours. Course of Studies. The paper is a L'étude est un document qui se rapporte au scholastic document, and thus contains cours et contient donc des faits et des opinions facts and opinions which the author alone que seul l'auteur considère appropriés et considered appropriate and correct for the convenables au sujet. Elle ne reflète pas subject.
    [Show full text]
  • Should We Understand Jihadist Online-Radicalization As a Top-Down Or Bottom-Up Process?1
    Fishermen or Swarm Dynamics? Should we Understand Jihadist Online-Radicalization as a Top-Down or Bottom-Up Process?1 Till Baakena2, Linda Schlegelb aResearch Fellow at the Violence Prevention Network e.V., bJunior Analyst at Global Risk Insights Abstract Article History The internet has profoundly changed the way we communicate, including how jihadist Received Oct 18, 2017 groups seek to reach Western audiences with their propaganda strategies. Cases of believed Accepted Dec 3, 2017 online-radicalization call for a re-evaluation of radicalization processes, previously thought to depend on face-to-face interactions. Based on the Hoffman-Sageman debate on whether Published Dec 29, 2017 top-down or bottom-up processes drive terrorism, this essay explores both social movement and organizational approaches to understand online-radicalization. Do jihadist organizations such as Al-Qaeda and IS act as ‘fishermen’, actively engaging in the radicalization processes of individual recruits, or is radicalization driven by social group dynamics with little organizational involvement? Essentially, the larger question is: What role do organizational structures play for radicalization in times of ‘virtual jihad’? Bottom- up radicalization processes are facilitated online, because the conditions for Sageman’s ‘bunch of guys’ are replicated by the characteristics of virtual communication: an echo chamber effect causes frame-alignment through repetition and enables ‘digital natives’ to communicate claims that resonate with other ‘digital natives’. Top-down structures are influential, because organizations continue to employ sophisticated propaganda development, preachers and special recruiters or ‘fishermen’. The article finds evidence for both schools of thought and concludes that the internet facilitates both types of radicalization mechanisms.
    [Show full text]
  • 'Diaspora'-Tracing-The-Women-And
    King’s Research Portal Document Version Publisher's PDF, also known as Version of record Link to publication record in King's Research Portal Citation for published version (APA): Cook, J., & Vale, G. A. (2018). From Daesh to 'Diaspora': Tracing the women and minors of Islamic State. International Centre for the Study of Radicalisation. Citing this paper Please note that where the full-text provided on King's Research Portal is the Author Accepted Manuscript or Post-Print version this may differ from the final Published version. If citing, it is advised that you check and use the publisher's definitive version for pagination, volume/issue, and date of publication details. And where the final published version is provided on the Research Portal, if citing you are again advised to check the publisher's website for any subsequent corrections. General rights Copyright and moral rights for the publications made accessible in the Research Portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognize and abide by the legal requirements associated with these rights. •Users may download and print one copy of any publication from the Research Portal for the purpose of private study or research. •You may not further distribute the material or use it for any profit-making activity or commercial gain •You may freely distribute the URL identifying the publication in the Research Portal Take down policy If you believe that this document breaches copyright please contact [email protected] providing details, and we will remove access to the work immediately and investigate your claim.
    [Show full text]
  • Armed Groups, Child Soldiers and the Pursuit of Legitimacy
    Armed Groups, Child Soldiers and the Pursuit of Legitimacy by William Plowright B.A., The University of British Columbia, 2010 M.Sc., London School of Economics, 2011 A DISSERTATION SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY in THE FACULTY OF GRADUATE AND POSTDOCTORAL STUDIES (Political Science) THE UNIVERSITY OF BRITISH COLUMBIA (Vancouver) July, 2018 © William Plowright, 2018 The following individuals certify that they have read, and recommend to the Faculty of Graduate and Postdoctoral Studies for acceptance, the dissertation entitled: Armed Groups, Child Soldiers and the Pursuit of Legitimacy submitted by William Plowright in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Political Science Examining Committee: Dick Price, Political Science Supervisor Arjun Chowdhury, Political Science Supervisory Committee Member Katharina Coleman, Political Science Supervisory Committee Member Philippe Le Billon, Geography University Examiner Brian Job, Political Science University Examiner ii Abstract In armed conflicts around the world, armed groups recruit child soldiers into their organisations to fill a wide range of roles. In response, transnational advocacy networks have been mobilised to name-and- shame such armed groups and seek an end to this humanitarian concern through asserting the norm against the use of child soldiers. Some armed groups respond to this advocacy, and demobilise their child soldiers, while others ignore international pressure. There is a puzzle here: why do some armed groups demobilize child soldiers, while others do not? What makes armed groups more or less responsive to advocacy? I argue that some armed groups are engaging with the child soldiers norm in order to gain legitimacy from international audiences.
    [Show full text]
  • X Final Version
    MASTER THESIS Titel der Master Thesis / Title of the Master‘s Thesis „The Digital Caliphate: The use of propaganda in DAESH communication operations to legitimise, radicalise and recruit“ verfasst von / submitted by Jovana Vujanović angestrebter akademischer Grad / in partial fulfilment of the requirements for the degree of Master of Arts (MA) Wien, 2016 / Vienna 2016 Studienkennzahl lt. Studienblatt / A 992 884 Postgraduate programme code as it appears on the student record sheet: Universitätslehrgang lt. Studienblatt / Universitätslehrgang Master of Arts in Human Rights Postgraduate programme as it appears on the student record sheet: Betreut von / Supervisor: Nenad Šebek, BA Journalism The media is the most powerful entity on Earth. They have the power to make the innocent guilty and to make the guilty innocent, and that’s power, because they control the minds of the masses. - Malcolm X Acknowledgments I would like to take the opportunity to thank the people who supported me during the writing process. To Naomi O’Leary and Koen Vidal for their contributions; To Cassandra Brown, Josie Caprara, Aliesha Dowlath, Constanze Riha and Hilary Wirachowsky for their moral support over the last two years; To Ferdinand Riha for translating the abstract; To Shane Singh for editing; To Hebah Baker for checking in on me regularly; To Charlotte Verhofstadt for helping me format and brainstorm; and to Anna Steiner for editing, but mostly for keeping me laughing. A special thank you to my family for being an incredible support system. To my parents, Dragan and Brani, I want to thank you for your endless love and unyielding belief in my abilities.
    [Show full text]
  • Page 01 March 13.Indd
    ISO 9001:2008 CERTIFIED NEWSPAPER Home | 3 Business | 15 Sport | 21 Empower 2015 Europe’s main stock Al Emadi produced a conference opens markets finished the faultless routine with with a call to youth day mixed as the euro Tamira IV to defend to collaborate and sank to a 12-year low the Emir’s Sword title overcome differences. against the dollar. he won last year. FRIDAY 13 MARCH 2015 • 22 Jumada I 1436 • Volume 20 Number 6368 www.thepeninsulaqatar.com [email protected] | [email protected] Editorial: 4455 7741 | Advertising: 4455 7837 / 4455 7780 GCC states can defend Emir meets Erdogan in Ankara their borders, says FM Yemen national dialogue open to Houthis: Dr Al Attiyah DOHA: Foreign Minister conference is to reiterate H E Dr Khalid bin Mohamed Yemen’s legitimacy, reject the Al Attiyah said yesterday coup and restore the power of that the GCC states are the state on the Yemeni soil. quite capable of defending These aims were outlined themselves against foreign in a communication Hadi threat. addressed to the Custodian of The GCC states have the Two Holy Mosques King “undisclosed measures” Salam bin Abdulaziz Al Saud through which they can pro- of Saudi Arabia. tect their borders and sover- The aims include ensur- eignty, said Al Attiyah, reports ing security and stability in Aljazeera.net. Yemen and its legitimacy, and He was replying to ques- rejection of the coup, and to tions at a news conference he not deal with the Houthis’ and GCC Secretary-General constitutional declaration and Dr Abdullateef Al Zayani held rejection of its (constitution’s) after a meeting of GCC foreign legitimacy.
    [Show full text]
  • Gen Y Jihadists: Preventing Radicalisation in Australia
    STRATEGY Gen Y jihadists Preventing radicalisation in Australia Anthony Bergin, Michael Clifford, David Connery, Tobias Feakin, Ken Gleiman, Stephanie Huang, Grace Hutchison, Peter Jennings, David Lang, Amelia Long, Clare Murphy, Simone Roworth, Rosalyn Turner, Samina Yasmeen About ASPI June 2015 ASPI’s aim is to promote Australia’s security by contributing fresh ideas to strategic decision‑making, and by helping to inform public discussion of strategic and defence issues. ASPI was established, and is partially funded, by the Australian Government as an independent, non‑partisan policy institute. It is incorporated as a company, and is governed by a Council with broad membership. ASPI’s core values are collegiality, originality & innovation, quality & excellence and independence. ASPI’s publications—including this paper—are not intended in any way to express or reflect the views of the Australian Government. The opinions and recommendations in this paper are published by ASPI to promote public debate and understanding of strategic and defence issues. They reflect the personal views of the author(s) and should not be seen as representing the formal position of ASPI on any particular issue. Important disclaimer This publication is designed to provide accurate and authoritative information in relation to the subject matter covered. It is provided with the understanding that the publisher is not engaged in rendering any form of professional or other advice or services. No person should rely on the contents of this publication without first obtaining advice from a qualified professional person. Cover image: Armed Australian Federal Police officers are seen after new security directives are instigated at Parliament House in Canberra, 23 February 2015.
    [Show full text]
  • Countering Daesh Extremism: European and Asian Responses Countering Daesh Extremism: European And
    02/2016 PANORAMA INSIGHTS INTO ASIAN AND EUROPEAN AFFAIRS COUNTERING DAESH EXTREMISM EUROPEAN AND ASIAN RESPONSES K o n r a d A d e n a u e r S t i f t u n g Panorama InsIghts Into asIan and euroPean affaIrs Countering daesh extremism Panorama: Insights into Asian and European Affairs is a series of occasional papers published by the Konrad- Adenauer-Stiftung’s “Regional Programme Political Dialogue Asia and the Pacific/Singapore”. This is a special edition published in collaboration with the International Centre for Political Violence and Terrorism Research, S. Rajaratnam School of International Studies, Nanyang Technological University. © 2016 Konrad-Adenauer-Stiftung, Singapore Editors: Dr. Beatrice Gorawantschy, Professor Rohan Gunaratna, Megha Sarmah, Patrick Rueppel Publishers: Konrad-Adenauer-Stiftung Ltd 36 Bukit Pasoh Road Singapore 089848 Registration Number: 201228783N Tel: (65) 6603-6160 Tel: (65) 6227-8343 Email: [email protected] Website: www.kas.de/singapore International Centre for Political Violence and Terrorism Research S. Rajaratnam School of International Studies Nanyang Technological University, Block S4, Level B4 50 Nanyang Avenue, Singapore 639798 All rights reserved. No part of this book may be reprinted or reproduced or utilised in any form or by any electronic, mechanical or other means, now known or hereafter invented, including photocopying or recording, or in any information storage or retrieval system, without permission from the publisher. Manuscript offers, review copies, exchange journals, and requests for subscription are to be sent to the editors. The responsibility for facts and opinions in this publication rests exclusively with the authors and their interpretations do not necessarily reflect the views or the policy of Konrad-Adenauer-Stiftung and the International Centre for Political Violence and Terrorism Research, S.
    [Show full text]
  • Online-Radicalisation: Myth Or Reality?
    No. 314 / September 2018 Facts & Findings Counter-terrorism and Internal Security Online-Radicalisation: Myth or Reality? Linda Schlegel › The Internet is often an important factor, but not the › The new focus on the radicalisation of children on only element which contributes to radicalisation. the Internet is a cause for concern and demands a comprehensive approach to combatting it. › Online radicalisation is both part of the strategy employed by potentially violent extremists and also a › Both the supply and the demand for online propa- by-product of the proliferation of social media among ganda must be curbed. This can only succeed if we the adherents of these groups. Not always is official view the phenomenon not solely through a security propaganda the main driver, but rather, discussions lens. started among users often become accelerators of the processes of radicalisation. www.kas.de Konrad-Adenauer-Stiftung e. V. No. 314 2 Facts & Findings September 2018 Table of contents Are there cases of radicalisation that occur only online? 2 Top-down or Bottom-up? 3 New Challenges 4 Outlook and Recommendations 5 Imprint 8 The proliferation of extremist, jihadist and violence-inciting websites, blogs and channels in social media has long since become a major theme in security policy. Extremists and terrorists use the new technological tools to communicate with each other, to organise themselves and to publicise their ideas. Whereas terrorists in the previous millennium were still dependent on journalists to report their acts and to draw attention to their group and their ideology, potentially violent groups today are in a position to publish their story and their intentions unfiltered on the web, and to communicate with each other swiftly and effectively across national borders.
    [Show full text]