Terrorism and social media

Last updated

Terrorism, fear, and media are interconnected. Terrorists use the media to advertise their attacks and or messages, and the media uses terrorism events to further aid their ratings. Both promote unwarranted propaganda that instills mass amounts of public fear. The leader of Al Qaeda, Osama Bin Laden, discussed weaponization of media in a letter written after his organization committed the terrorist attacks of 9/11. In that letter, Bin Laden stated that fear was the deadliest weapon. He noted that Western civilization has become obsessed with mass media, quickly consuming what will bring them fear. He further stated that societies are bringing this problem on their own people by giving media coverage an inherent power.

Contents

In relation to one’s need for media coverage, Al Qaeda and other militant Jihadi terrorist organizations can be classified as a far-right radical offshoot of mainstream mass media. The Jihad needs to conceptualize their martyrdom by leaving behind manifestos and live videos of their attacks; it is crucially important to them that their ill deeds are being covered by news media.

The components the media looks for to deem the news “worthy” enough to publicize are categorized into ten qualities; terrorists usually exceed half in their attacks. These include: Immediacy, Conflict, Negativity, Human Interest, Photographability, Simple Story Lines, Topicality, Exclusivity, Reliability, and Local Interest. Historically, morality and profitability are two motivations which are not easily weighed when delivering news; recent news coverage has become far more motivated in making money for their parent corporation than serving as a defender of truth, doing true journalistic fact-finding, and shielding the public from news which is sensational, outright untrue, or politically-motivated propaganda. [1]

A study concerning the disparity in coverage of terrorist events took attacks from the ten-year span of 2005-2015 and found that 136 episodes of terrorism occurred in the United States. LexisNexis Academic and CNN were the platforms used to measure the media coverage. It was found that out of other terrorist attacks showed on the news, one’s with Muslim perpetrators received more than 357% coverage. In addition to this disparity, attacks also received more coverage when they were targeted at the government, had high fatality rates, and showed arrests being made. These findings were aligned with America’s tendency to categorize Muslim people as a threat to national security. Thus, mass media coverage on terrorism is creating fake narratives and an absence of related coverage. For instance, the American public believes that crime rates have been on the rise which in fact they have been on an all-time low. Given that the media often covers crime almost immediately and frequently, suggests that people infer it happening all the time. In reference to the disparity in terror attacks, three attacks were seen to have the least media coverage of all the 136. The Sikh Temple Massacre in Wisconsin which had 2.6% coverage, the Kansas synagogue killings which had 2.2%, and the Charleston Church deaths which only resulted in 5.1% coverage. The three events had commonalities worth mentioning in that they all had white perpetrators and were not directed at government intuitions (in fact all targeted minorities). The media’s obsession with terror is making people fearful of the wrong things and not attentive enough to the issues that are radically unseen. [2]

Not only are minorities usually not the perpetrators of domestic terrorism but they are common victims in mass casualties or proximal witnesses to the attacks. In an early 2000’s study, 72 Israeli adults were measured pre and posttest for increased anxiety after being exposed to news broadcasts of terrorism attacks. The study found that the group exposed to the broadcasts without any treatment (preparation intervention) had heightened levels of anxiety compared to the group that received the treatment along with viewing the broadcast. Since preparatory intervention is not yet normalized, people in proximity to ongoing coverage of terror events are suffering from the lasting impacts of fear and anxiety. Preparatory Intervention, in this case, was conducted by a group facilitator who introduced a topic concerning terrorism in which participants were instructed to write down feelings to share with the group and later learn to cope with. [3]

A discourse of fear created by mass media presence, but false information is leading people to prepare for the wrong situations. In the early 2000’s police units circulated public schools flooding the idea of Stranger Danger into the minds of adolescents. Children and their parents cautiously separated from strangers while perpetrators in those families' social circles continued to offend under the radar. For myths are becoming common precedent and real danger is buried beneath the surface. It is these implementations of fear that are falsifying the true narrative which for terrorism is a huge social problem but one that is not resolved through entertainment and mass media production. Mass media like news outlets and even social media platforms are contributing to the growing discourse of fear surrounding terrorism. [4]

Terrorism and social media refers to the use of social media platforms to radicalize and recruit violent and non-violent extremists.

According to some researchers the convenience, affordability, and broad reach of social media platforms such as YouTube, Facebook and Twitter, terrorist groups and individuals have increasingly used social media to further their goals, recruit members, and spread their message. Attempts have been made by various governments and agencies to thwart the use of social media by terrorist organizations. [5]

Terror groups take to social media because it’s cheap, accessible, and facilitates quick access to a lot of people. Social media allow them to engage with their networks. In the past it wasn’t so easy for these groups to engage with the people they wanted to whereas social media allows terrorists to release their messages right to their intended audience and interact with them in real time. "Spend some time following the account, and you realize that you’re dealing with a real human being with real ideas- albeit boastful, hypocritical, violent ideas". [6] Al- Qaeda has been noted as being as being one of the terror groups that uses social media the most extensively. "While almost all terrorist groups have websites, al qaeda is the first to fully exploit the internet. This reflects al Qaeda’s unique characteristics." [7]

Despite the risks of making statements, such as enabling governments to locate terror group leaders, terror leaders communicate regularly with video and audio messages which are posted on the website and disseminated on the internet. ISIS uses social media to their advantage when releasing threatening videos of beheadings. ISIS uses this tactic to scare normal people on social media. Similarly, Western domestic terrorists also use social media and technology to spread their ideas.

Traditional media

Many authors have proposed that media attention increases perceptions of risk of fear of terrorism and crime and relates to how much attention the person pays to the news. [8] The relationship between terrorism and the media has long been noted. [9] Terrorist organizations depend on the open media systems of democratic countries to further their goals and spread their messages. To garner publicity for their cause, terrorist organizations resort to acts of violence and aggression that deliberately target civilians. [9] This method has proven to be effective in gathering attention:

It cannot be denied that although terrorism has proved remarkably ineffective as the major weapon for taking down governments and capturing political power, it has been a remarkably successful means of publicizing a political cause and relaying the terrorist threat to a wider audience, particularly in the open and pluralistic countries of the West. When one says 'terrorism' in a democratic society, one also says 'media'. [9]

While a media organization may not support the goals of terrorist organizations, it is their job to report current events and issues. In the fiercely competitive media environment, when a terrorist attack occurs, media outlets scramble to cover the event. In doing so the media help to further the message of terrorist organizations:

To summarise briefly on the symbiotic nature of the relationship between terrorists and the media, the recent history of terrorism in many democratic countries vividly demonstrates that terrorists do thrive on the oxygen of publicity, and it is foolish to deny this. This does not mean that the established democratic media share the values of the terrorists. It does demonstrate, however, that the free media in an open society are particularly vulnerable to exploitation and manipulation by ruthless terrorist organisations. [9]

One notable example of the relationship between terror groups and the media was the release of the Osama bin Laden audio and video recordings. These tapes were sent directly to mainstream Arabic television networks, including Al-Jazeera.

Media can often be the source of discontent for terrorist groups. Irene Kahn says,

New seeds of social discord and insecurity are sprouting between citizens and noncitizens. Racism and xenophobia are latent in all societies, but in some European countries they feature blatantly as some politicians exploit people's fears and prejudices for short-term electoral gains. Some aspects of the media have played into this strategy, dehumanizing and demonizing foreigners, foreign-born citizens, refugees, and asylum seekers. They are pointed out as a source of danger and become an easy target for hate speech and violence. Those who need their rights protected the most have become the ones most at risk of attacks. [10]

Most terrorist groups use social media as a means to bypass the traditional media and spread their propaganda. [11]

Media surveillance

The network described in Michel Foucault's theory of surveillance, panopticism, is a networks of power where all parties are transfixed by the actions of the others in the network. It is especially imperative when major events in the world occur, which is usually the case with terrorism. This model can be transposed on the network of power that media-outlet consumers and producers enter. In a network of power that includes consumers and producers, both parties have fixed gazes' on each other. The consumers transfix their gazes' on the stories that media outlets produce. And, the needs of the consumers, which is in this case their need to be updated regularly, becomes the producers gaze. The producers or media outlets are in competition with other media outlets to supply their constituents with the most up-to-date information. This network of fixed gazes' is both "privileged and imperative" for the system to satisfy the status quo. [12]

Consumers looks to media outlets to provide news on terrorism. If consumers believe terrorism is a threat to their safety, they want to be informed of the threats against them. Media outlets fulfill their viewers' needs, and portray terrorism as a threat because of the cycle that surveillance engenders. As terrorism flourishes as a prominent discourse of fear, consumers want information faster because they feel their safe being is in peril. The idea of total surveillance, as prescribed by Foucault, becomes a cycle where the disruption of power causes scrutiny by various players in system. If the media-outlets are not constantly looking for stories that fulfill consumer needs, then they are scrutinized. In addition to the surveillance aspect of news dissemination, therein is the notion that "needs" drive the network of power: both the media outlets and consumers have needs that are fulfilled by broadcasting the news. It is this idea expressed in the uses and gratifications theory. It stipulates that the active audience and the terrorist "seek to satisfy their various needs" through media transmission. [13] While media outlets know the stories they show have astounding effects on the political and sociological perspective in society, the impetus on economic gains is of greater importance.

Use of social media

In a study by Gabriel Weimann from the University of Haifa, Weimann found that nearly 90% of organized terrorism activities on the internet takes place via social media. [14] According to Weimann, terror groups use social media platforms like Twitter, Facebook, YouTube, and internet forums to spread their messages, recruit members and gather intelligence. [14]

Terror groups take to social media because social media tools are cheap and accessible, facilitate quick, broad dissemination of messages, and allow for unfettered communication with an audience without the filter or "selectivity" of mainstream news outlets. [15] Also, social media platforms allow terror groups to engage with their networks. Whereas previously terror groups would release messages via intermediaries, social media platforms allow terror groups to release messages directly to their intended audience and converse with their audience in real time: [16] Weimann also mentions in "Theater of Terror", that terrorists use the media to promote the theatrical like nature of the premeditated terror.

HSMPress is using Twitter the way social media experts have always advised- not just broadcasting, but engaging in conversation. Spend some time following the account, and you realize that you're dealing with a real human being with real ideas—albeit boastful, hypocritical, violent ideas. [16]

Terror groups using social media

Al-Qaeda has been noted as being one of the terror groups that uses social media the most extensively. [17] Brian Jenkins, senior advisor for the Rand Corporation, commented on Al-Qaeda's dominant presence on the web:

While almost all terrorist organizations have websites, al Qaeda is the first to fully exploit the internet. This reflects al Qaeda's unique characteristics. It regards itself as a global movement and therefore depends on a global communications network to reach its perceived constituents. It sees its mission as not simply creating terror among its foes but awakening the Muslim community. Its leaders view communications as 90 percent of the struggle. Despite the risks imposed by intense manhunts, its leaders communicate regularly with video and audio messages, which are posted on its websites and disseminated on the Internet. The number of websites devoted to the al Qaeda-inspired movement has grown from a handful to reportedly thousands, although many of these are ephemeral. [17]

According to Rob Wainwright, author of "Fighting Crime and Terrorism in the Age of Technology," in order for ISIS to spread its message, they have utilized more than one hundred sites. [5] This shows how vastly social media is used by terrorist groups. Known terrorist group the Islamic State of Iraq and the Levant, also translated to ISIS, uses the widespread of news over social media to their advantage when releasing threatening videos of beheadings. As of November 16, 2014, following the beheading of former U.S. Army Ranger Peter Kassig, there have now been five recorded executions of Westerners taken captive in Syria. [18] James Foley, David Cawthorne Haines, Alan Henning, and Steven Sotloff are also among the men kidnapped and executed by ISIS. The videos of the brutal beheadings are both posted online by ISIS, where they can be viewed by anyone using their own discretion, and sent to government officials as threats. Posting the executions online gives the terrorist groups the power to manipulate viewers and cause havoc among the population viewing them, [19] and the videos have the ability to instill fear within the Western world. The videos are typically high production quality and generally show the entirety of the gruesome act, with the hostage speaking a few words before they are killed on camera.

In the case of U.S. aid worker Peter Kassig, his video did not show the actual beheading act and he did not speak any final words before the execution. [18] His silence and the fact that the actual execution was not included in the video raised question about his video was different than the rest. [20] In response to Kassig's beheading, his family expressed their wish that news media avoid doing what the group wants by refraining from publishing or distributing the video. [20] By refusing to circulate the video of the beheading, it therefore loses the ability to manipulate Americans or further the cause of the terrorist group. [20]

In addition to beheading videos, ISIS has released videos of their members doing nonviolent acts. For example, Imran Awan described one such instance in his article "Cyber-Extremism: Isis and the Power of Social Media" where one video showed members of the Islamic State were seen helping people and visiting hospitals. [21] These videos gave a humanistic nature to the terrorist group members, therefore, contradicting what civilians think terrorist groups should be.

Edgar Jones has mentioned in his article, "The Reception of Broadcast Terrorism: Recruitment and Radicalisation," that ISIS has utilized documentaries and even their own magazine, Dabiq, in order to recruit new members and to get their message out to the public. [22] This illustrates just a couple of the various mediums that ISIS has used.

According to Wainwright, social media is also used by ISIS and other terror groups to recruit foreign people to join the terrorist cause. In some cases, these new recruits are sent back to their home country to carry out terrorist attacks. Others who can not physically move to the terrorist cause have been known to carry out acts of terrorism in their own countries due to the propaganda that they are exposed to online. [23] This exhibits how ISIS can brainwash or expand on ideas that individuals may have.

The Taliban has been active on Twitter since May 2011, and has more than 7,000 followers. Tweeting under the handle @alemarahweb, the Taliban tweets frequently, on some days nearly hourly. This account is currently suspended. [24]

In December 2011, it was discovered that the Somalia-based terror cell Al-Shabaab was using a Twitter account under the name @HSMPress. [25] Since opening on December 7, 2011, the account has amassed tens of thousands of followers and tweets frequently. [25]

Shortly after a series of coordinated Christmas bombings in Kono, Nigeria, in 2011, the Nigerian-based terror group Boko Haram released a video statement defending their actions to YouTube. [26] Boko Haram has also used Twitter to voice their opinions.

AQAP and Islamic State (ISIS/ISIL/DAESH)

Islamic State has emerged as one of the most potent users of social media. In many respects, Islamic State learned their propaganda craft from al Qaeda on the Arabian Peninsula (AQAP). However, IS quickly eclipsed its mentor, deploying a whole range of narratives, images and political proselytizing through various social media platforms. [27] A study by Berger and Morgan estimated that at least 46,000 Twitter accounts were used by ISIS supporters between September and December 2014. [28] However, as ISIS supporters regularly get suspended and then easily create new, duplicate accounts, [27] counting ISIS Twitter accounts over a few months can overestimate the number of unique people represented by 20–30%. [29] In 2019, Storyful discovered that approximately two dozen TikTok accounts were used to post propaganda videos targeting users. Accounts broadcast news from Amaq News Agency, the official news outlet for the Islamic State. [30]

However, as the November 2015 attacks in Paris demonstrate, IS also uses old-fashioned methods of communication and propaganda. Lewis notes that the attacks in Paris represent the sort of 'propaganda in action' which was a method developed by the 19th century anarchists in Europe. The November 2015 IS attacks were perpetrated without prior warning, largely because the operatives met face-to-face and used other non-digital means of communication.[ citation needed ]

Attempts to thwart the use of social media by terror groups

Some U.S. government officials have urged social media companies to stop hosting content from terror groups. In particular, Joe Lieberman has been especially vocal in demanding that social media companies not permit terror groups to use their tools. [31] In 2008, Lieberman and the United States Senate Committee on Homeland Security and Governmental Affairs issued a report titled "Violent Islamist Extremism, the Internet, and the Homegrown Terrorist Threat". The report stated that the internet is one of the "primary drivers" of the terrorist threat to the United States. [31]

In response to the news that Al-Shabaab was using Twitter, U.S. officials have called for the company to shut down the account. Twitter executives have not complied with these demands and have declined to comment on the case. [32]

In January 2012, Twitter announced changes to their censorship policy, stating that they would now be censoring tweets in certain countries when the tweets risked breaking the local laws of that country. [33] The reason behind the move was stated on their website as follows:

As we continue to grow internationally, we will enter countries that have different ideas about the contours of freedom of expression. Some differ so much from our ideas that we will not be able to exist there. Others are similar but, for historical or cultural reasons, restrict certain types of content, such as France or Germany, which ban pro-Nazi content.Until now, the only way we could take account of those countries' limits was to remove content globally. Starting today, we give ourselves the ability to reactively withhold content from users in a specific country — while keeping it available in the rest of the world. We have also built in a way to communicate transparently to users when content is withheld, and why. [33]

The move drew criticism from many Twitter users who said the move was an affront to free speech. [34] Many of the users threatened to quit tweeting if the policy was not rescinded, including Chinese artist and activist Ai Weiwei. [34]

In December 2010, in response to growing demands that YouTube pull video content from terrorist groups from its servers, the company added a "promotes terrorism" option under the "violent or repulsive content" category that viewers can select to "flag" offensive content. [35] By limiting the terrorists access to conventional mass media and censoring news coverage of terrorist acts and their perpetrators and also minimising the terrorists allowance to manipulate mass media, the mass fear impact that is usually created will decrease. [36]

Effectiveness of suspension

Western governments have been actively trying to surveil and censor IS social media sites. As Jeff Lewis explains, as quickly as platform managers close down accounts, IS and its supporters continually create new IDs which they then use to resurge back with new accounts and sites for propaganda. [27] A case study of an al Shabaab account [37] and a George Washington University white paper [38] found that accounts that resurged did not regain the high number of followers they had had originally. However this picture is complicated as a May 2016 article in the Journal of Terrorism Research found that resurgent accounts acquire an average (median) of 43.8 followers per day, while regular jihadist accounts accrue only 8.37 followers on average per day. [29]

Free speech and terrorism

U.S. Rep. Ted Poe, R-Texas, has said that the U.S. Constitution does not apply to terrorists and that they have given up their rights to free speech. He cited a Supreme Court ruling that anyone providing "material support" to a terrorist organization is guilty of a crime, even if that support only involves speaking and association. He also cited terrorist speech as being like child pornography in that it does harm. [39]

Homeland security subcommittee

On December 6, 2011 the US Committee on Homeland Security's Subcommittee on Counterterrorism and Intelligence held a hearing entitled "Jihadist Use of Social Media - How to Prevent Terrorism and Preserve Innovation."

At the hearing, members heard testimony from William McCants, an analyst for the Center for Naval Analyses, Aaron Weisburd, director of the Society for Internet Research, Brian Jenkins, senior advisor for the Rand Corporation and Evan Kohlmann, senior partner from Flashpoint Global Partners. [17]

McCants stated that while terror groups were actively using social media platforms to further their goals, research did not support the notion that the social media strategies they adopted were proving effective: [40]

We are talking about a relatively small number of people. Because the number of people is so small, it is difficult to say why some become active supporters of al-Qaeda and others do not. What we can say is that the vast majority of people who watch and read al-Qaeda propaganda will never act violently because of it. Put metaphorically, the material may be incendiary but nearly everyone is fireproof. Since that is the case, it is better to spend our resources putting out the fires and issuing warnings about the dangers of fire rather than trying to fireproof everyone or remove incendiary material. [40]

McCants added that he did not believe that closing online user accounts would be effective in stopping radicalization and stated that closing online accounts could even disadvantage US security and intelligence forces: [40]

I do not put much stock in closing online user accounts that do not violate our laws. I also do not put much stock in intervening with well-meaning outreach programs or removing propaganda. There are too many downsides to these approaches. They are also unnecessary. The FBI and local law enforcement in the United States have done an excellent job in finding al-Qaeda supporters online and arresting them before they hurt anyone. They have gotten very good at following the smoke trails and putting out fires. [40]

McCants stressed that not enough research has been conducted on this topic and he would be willing to change his opinion on the matter if there was empirical evidence that proved that social media has a major role in radicalizing youth. [40]

Weisburd stated that any organization that played a part in producing and distributing media for terrorist organizations were in fact supporting terrorism: [41]

I would argue that a service provider who knowingly assists in the distribution of terrorist media is also culpable. While it is in no one's interest to prosecute internet service providers, they must be made to realize that they can neither turn a blind eye to the use of their services by terrorist organizations, nor can they continue to put the onus of identifying and removing terrorist media on private citizens. [41]

Weisburd argued that social media lends an air of legitimacy to content produced by terror organizations and provides terrorist organizations an opportunity to brand their content: "Branding in terrorist media is a sign of authenticity, and terrorist media is readily identifiable as such due to the presence of trademarks known to be associated with particular organizations." [41] He concluded that the goal of intelligence and security forces should not be to drive all terrorist media offline, but rather to deprive terror groups from the branding power gleaned from social media. [41]

Jenkins stated that the risks associated with al Qaeda's online campaign do not justify an attempt to impose controls on content distributors. Any attempted controls would be costly and would deprive the intelligence officials of a valuable source of information. [42] Jenkins also stated that there was no evidence that attempts to control online content would be possible: [42]

Even China, which has devoted immense resources to controlling social media networks with far fewer concerns about freedom of speech, has been unable to block the micro blogs that flourish on the web. Faced with the shutdown of one site, jihadist communicators merely change names and move to another, dragging authorities into a frustrating game of Whac-a-mole and depriving them of intelligence while they look for the new site. Is this, then the best way to address the problem?" [42]

Kohlmann stated US government officials must do more to pressure social media groups like YouTube, Facebook and Twitter to remove content produced by terror groups: [43]

Unfortunately, current U.S. law gives few incentives for companies like YouTube for volunteering information on illicit activity, or even cooperating when requested by U.S. law enforcement. If such companies are to be trusted to self-police their own professed commitments to fighting hate speech, then they must be held to a public standard which reflects the importance of that not unsubstantial responsibility. [43]

See also

Related Research Articles

A lone wolf attack, or lone actor attack, is a particular kind of mass murder, committed in a public setting by an individual who plans and commits the act on their own. In the United States, such attacks are usually committed with firearms. In other countries, knives are sometimes used to commit mass stabbings. Although definitions vary, most databases require a minimum of four victims for the event to be considered a mass murder.

<span class="mw-page-title-main">Islamic Army in Iraq</span> Iraqi underground Islamist militant organization

The Islamic Army in Iraq was an underground Islamist militant organization formed in Iraq following the 2003 invasion of Iraq by U.S.-led Coalition forces, and the subsequent collapse of the Ba'athist regime headed by Saddam Hussein. IAI was regarded as one of the largest, sophisticated and most influential Sunni insurgent groups in Iraq that led an asymmetrical military insurgency against Coalition forces. The group became known for its grisly videos of kidnappings and attacks on U.S. and Iraqi troops.

Martyrdom videos are video recordings, generally from Islamist jihadists who are about to take part in a suicide attack and expect to die during their intended actions. They typically include a statement by the person preparing to be a martyr for their cause. They can be of amateur or professional quality and often incorporate text, music, and sentimental clips. The people in these videos typically sit or stand in front of a black Islamic flag, in their explosive-rigged vehicles, or media or other symbol of their allegiance. Suicide bombers considered themselves religiously justified by sharia and consider themselves to be shahid.

During and immediately after the 2008 Mumbai attacks the news media worldwide broadcast incorrect factual information on a scale often seen in a fog of war. Erroneous reporting on the 2008 Mumbai attacks included false information concerning the number of attackers, their nationality, their organizational affiliations, origins, and the methods of transport they had used. Theories and speculations were openly aired by various commentators that were later proved to be wrong. Many such speculations, such as the involvement in the attacks of the "Deccan Mujahideen", were widely reported by media worldwide. Various news outlets carried opinion pieces and unattributed theories about the origins of the attackers which were unfounded.

In United States law, providing material support for terrorism is a crime prohibited by the USA PATRIOT Act and codified in title 18 of the United States Code, sections 2339A and 2339B. It applies primarily to groups designated as terrorists by the State Department. The four types of support described are "training," "expert advice or assistance," "service," and "personnel."

<span class="mw-page-title-main">Michael S. Smith II</span> US counterterrorist

Michael S. Smith II is an American terrorism analyst, specialist in open source intelligence (OSINT), and a consultant in preventing and countering violent extremism. He is also a lecturer at Johns Hopkins University's Global Security Studies program.

Terrorism, in some of its definitions, serves to communicate a message from terrorists to a target audience (TA). By extension, symbols play an important role in such communication, through graphics that the organizations use to represent themselves, as well as the meaning and significance behind their choice of targets.

Islamic extremism in the United States comprises all forms of Islamic extremism occurring within the United States. Islamic extremism is an adherence to fundamentalist interpretations of Islam, potentially including the promotion of violence to achieve political goals. In the aftermath of the September 11, 2001 terror attacks, Islamic extremism became a prioritized national security concern of the U.S. government and a focus of many subsidiary security and law enforcement entities. Initially, the focus of concern was on foreign Islamic terrorist organizations, particularly al-Qaeda, but in the course of the years since the September 11 terror attacks, the focus has shifted more towards Islamic extremist radicalized individuals and jihadist networks within the United States.

<span class="mw-page-title-main">Global Islamic Media Front</span>

The Global Islamic Media Front (GIMF) is an Islamist propaganda organization that is associated with the terrorist group, al-Qaeda, and other jihadist groups. The GIMF is known by the U.S. Federal Bureau of Investigation (FBI) as an "underground media" organization. The GIMF specializes in production of jihadist material for distribution. It is one of several organizations that jihadists use to spread information via the Internet, including the well-known As-Sahab. Their slogan that is used on their materials is "Observing Mujahideen News and Inspiring the Believers." There is no indication who the leader of this organization is.

Steven Stalinsky is an American political commentator whose writings focus on the interplay between Islamic terrorism and technology, and especially terrorism and social media. He has served as executive director of the Middle East Media Research Institute (MEMRI) since 1999.

<span class="mw-page-title-main">Islamic State beheadings</span> Mostly 2014–2015 beheadings by Islamic State of Iraq and the Levant

Beginning in 2014, a number of people from various countries were beheaded by the Islamic State (IS), a radical Sunni Jihadist group operating in Iraq and Syria as well as elsewhere. In January 2014, a copy of an IS penal code surfaced describing the penalties it enforces in areas under its control, including multiple beheadings. Beheading videos have been frequently posted by IS members to social media. Several of the recorded beheadings were conducted by Mohammed Emwazi, whom the media referred to as "Jihadi John" before his identification. The beheadings received wide coverage around the world and attracted international condemnation. Political scientist Max Abrahms posited that IS may be using well-publicized beheadings as a means of differentiating itself from Al-Qaeda in Iraq, and identifying itself with Khalid Sheikh Mohammed, the al-Qaeda member who beheaded Daniel Pearl. The publicised beheadings represent a small proportion of a larger number of total people killed following capture by IS.

Hajjaj bin Fahd al-Ajmi is a Kuwait-born sheikh who has been accused to be active in fundraising for Islamist rebels in the Syrian Civil War. The U.S. government and United Nations accuse Ajmi of backing the Jabhat al-Nusra, an affiliate of al Qaeda.

The portrayal of ISIL in American media has largely been negative. The Islamic State of Iraq and the Levant (ISIL) has been linked in the American media to several atrocities throughout the Middle East. Most recently U.S. coverage has linked ISIL members to burning alive the Royal Jordanian Air Force pilot Muath al-Kasasbeh, the beheadings of journalists James Foley and Steven Sotloff, and most recently, because the perpetrator of the June 2016 Orlando mass shooting- America's second deadliest- reportedly pledged allegiance to ISIL and its leader in a phone call to 911 operators just before the incident. The American public was introduced to ISIL with these actions. This contrasts with the renewed prominence of al-Qaeda after the September 11 attacks in the media. That coverage focused on the United States' response to the attacks, while the coverage of ISIL started with the organization itself and evolved to cover America's potential strategy.

<span class="mw-page-title-main">Counter Extremism Project</span> Nonprofit NGO that combats extremist groups

The Counter Extremism Project (CEP) is a non-profit non-governmental organization that combats extremist groups "by pressuring financial support networks, countering the narrative of extremists and their online recruitment, and advocating for strong laws, policies and regulations".

<span class="mw-page-title-main">Al-Qaeda in the Sinai Peninsula</span> Militant jihadist organization

Al-Qaeda in the Sinai Peninsula, or AQSP, was an Egyptian militant jihadist organization possibly formed by a merger between al-Qaeda operatives in Sinai and Ansar al Jihad. It was Al-Qaeda's branch in the Sinai peninsula, and is composed of many Al-Qaeda factions in the area. AQSP made international headlines in November 2014 when the organization pledged allegiance to the Islamic State (IS) in a nine-minute audio speech released on Twitter.

Madid Ahl al-Sham was a Qatar-based fundraising campaign widely suspected of acting as a conduit for donations intended for Jabhat al-Nusra, al-Qaeda’s affiliate in Syria. While the online campaign reportedly coordinated the delivery of humanitarian supplies to Syrian citizens in need, the U.S. Department of State identified Madid Ahl al-Sham as a fundraising source for violent extremists.

The Islamic State is a militant group and a former unrecognised proto-state. The group sophisticatedly utilizes social media as a tool for spreading its message and for international recruitment. The Islamic State is widely known for its posting of disturbing content, such as beheading videos, on the internet. This propaganda is disseminated through websites and many social media platforms such as Twitter, Facebook, Telegram, and YouTube. By utilizing social media, the organization has garnered a strong following and successfully recruited tens of thousands of followers from around the world. In response to its successful use of social media, many websites and social media platforms have banned accounts and removed content promoting the Islamic State from their platforms.

Online youth radicalization is the action in which a young individual or a group of people come to adopt increasingly extreme political, social, or religious ideals and aspirations that reject, or undermine the status quo or undermine contemporary ideas and expressions of a state, which they may or may not reside in. Online youth radicalization can be both violent or non-violent.

ISIL is known for its extensive and effective use of propaganda. It uses a version of the Muslim Black Standard flag and developed an emblem which has clear symbolic meaning in the Muslim world.

Extremist Salafi jihadist groups such as ISIS and Jama'at al-Tawhid wal-Jihad have used beheading as a method of killing captives. Since 2002, ISIS have circulated beheading videos as a form of terror and propaganda. Their actions have been condemned by militant and other terrorist groups, as well as by mainstream Islamic scholars and organizations.

References

  1. Schmid, Alex (2005-08-10), "Prevention of terrorism", Root Causes of Terrorism, Routledge, doi:10.4324/9780203337653.ch18, ISBN   978-0-415-35149-2 , retrieved 2022-12-17
  2. Kearns, Erin; Betus, Allison; Lemieux, Anthony (2018). "Why Do Some Terrorist Attacks Receive More Media Attention Than Others?". SSRN Electronic Journal. doi:10.2139/ssrn.2928138. ISSN   1556-5068.
  3. Slone, Michelle; Shoshani, Anat; Baumgarten-Katz, Inbar (July 2008). "The relation between actual exposure to political violence and preparatory intervention for exposure to media coverage of terrorism". Anxiety, Stress & Coping. 21 (3): 243–261. doi:10.1080/10615800701510124. ISSN   1061-5806. PMID   18938291. S2CID   13305090.
  4. Altheide, David L. (2006). "Terrorism and the Politics of Fear". Cultural Studies ↔ Critical Methodologies. 6 (4): 415–439. doi:10.1177/1532708605285733. ISSN   1532-7086. S2CID   143322154.
  5. 1 2 "Fighting Crime and Terrorism in the Age of Technology". The Brown Journal of World Affairs. 2018-07-30. Retrieved 2019-02-24.
  6. Weimann, 1
  7. Jenkins, 1
  8. Nellis and Savage (2012)
  9. 1 2 3 4 Wilkinson, Paul (1997). "The media and terrorism: a reassessment". Terrorism and Political Violence. 9 (2): 51–64. doi:10.1080/09546559708427402.
  10. Khan, I. (2013). A Human Rights Agenda for Global Security. In CAHILL K. (Ed.), History and Hope: The International Humanitarian Reader (pp. 112-122). Fordham University Press. Retrieved from https://www.jstor.org/stable/j.ctt13x0c1d.15
  11. Aly, Anne; MacDonald, Stuart; Jarvis, Lee; Chen, Thomas M. (2017). "Introduction to the Special Issue: Terrorist Online Propaganda and Radicalization" (PDF). Studies in Conflict & Terrorism. 40: 1–9. doi:10.1080/1057610X.2016.1157402. S2CID   111835083.
  12. Schmelzer, Mary (1993). "Panopticism in the Postmodern Pedagogy". University Park, PA: Pennsylvania State UP.{{cite journal}}: Cite journal requires |journal= (help)
  13. Hoffman, B. (2006). "Inside Terrorism". Columbia University Press.{{cite journal}}: Cite journal requires |journal= (help)
  14. 1 2 CBC (January 10, 2012). "Terrorist groups recruiting through social media". CBC News. Retrieved April 5, 2012.
  15. Dark, Calvin (December 20, 2011). "Social Media and Social Menacing…". Foreign Policy Association. Retrieved April 5, 2012.
  16. 1 2 Oremus, Will (December 23, 2011). "Twitter of Terror". Slate Magazine. Retrieved April 5, 2012.
  17. 1 2 3 Jenkins, Brian. "Is Al Qaeda's Internet Strategy Working?" . Retrieved April 5, 2012.
  18. 1 2 Mark Thompson (17 November 2014). "Peter Kassig Bravely Said Nothing Before His Execution". Time .
  19. "Numun Xvii" (PDF).
  20. 1 2 3 Time (magazine)
  21. Awan, Imran (April 2017). "Cyber-Extremism: Isis and the Power of Social Media". Society. 54 (2): 138–149. doi: 10.1007/s12115-017-0114-0 . ISSN   0147-2011.
  22. Jones, Edgar (2017-07-04). "The reception of broadcast terrorism: recruitment and radicalisation". International Review of Psychiatry. 29 (4): 320–326. doi:10.1080/09540261.2017.1343529. ISSN   0954-0261. PMID   28805128. S2CID   45546629.
  23. Gorrell, Michael Gorrell (2011). "E-books on EBSCOhost: Combining NetLibrary E-books with the EBSCOhost Platform". Information Standards Quarterly. 23 (2): 31. doi:10.3789/isqv23n2.2011.07. ISSN   1041-0031.
  24. Twitter. "Twitter page of the Taliban". Twitter. Retrieved April 12, 2012.{{cite web}}: |last= has generic name (help)
  25. 1 2 Twitter. "Twitter page of Al-Shabab". Twitter. Retrieved April 13, 2012.{{cite web}}: |last= has generic name (help)
  26. BBC (2012-01-11). "Boko Haram: Nigerian Islamist leader defends attacks". BBC News. BBC. Retrieved April 5, 2012.
  27. 1 2 3 Jeff Lewis (2015/6) Media, Culture and Human Violence, Rowman and Littlefield, Lanham, MD.
  28. Berger, Morgan (2015-03-05). "Defining and describing the population of ISIS supporters on Twitter". The Brookings Institution. Retrieved 2016-05-22.
  29. 1 2 Wright, Shaun; Denney, David; Pinkerton, Alasdair; Jansen, Vincent A.A.; Bryden, John (2016-05-17). "Resurgent Insurgents: Quantitative Research Into Jihadists Who Get Suspended but Return on Twitter". Journal of Terrorism Research. 7 (2): 1. doi: 10.15664/jtr.1213 . ISSN   2049-7040.
  30. Wells, Georgia (21 October 2019). "WSJ News Exclusive | Islamic State Turns to Teen-Friendly TikTok, Adorning Posts With Pink Hearts". Wall Street Journal. Retrieved 2019-12-04.
  31. 1 2 "Joe Lieberman, Would-Be Censor". The New York Times. May 25, 2008. Retrieved April 5, 2012.
  32. Friedman, Uri (December 20, 2011). "U.S. officials may take action again al-Shabab's Twitter account". Foreign Policy. Retrieved April 5, 2012.
  33. 1 2 "Tweets still must flow". Twitter. Retrieved April 5, 2012.
  34. 1 2 El Akkad, Omar. "Why Twitter's censorship plan is better than you think". The Globe and Mail. Retrieved April 13, 2012.
  35. Kanalley, Craig (December 13, 2010). "YouTube Gives Users Ability To Flag Content That Promotes Terrorism". The Huffington Post. Retrieved April 5, 2012.
  36. Weimann, 1999
  37. Stern, Berger (2015). ISIS: The state of terror. London: William Collins.
  38. Berger, Perez (2016). "Occasional Paper The Islamic State's Diminishing Returns on Twitter How suspensions are limiting the social networks of English-speaking ISIS supporters" (PDF). GW Program on Extremism.
  39. "ISIS getting social media megaphone (Opinion) - CNN.com". CNN. 25 February 2015. Retrieved 2015-12-01.
  40. 1 2 3 4 5 McCants, William. "McCants Testimony" (PDF). Retrieved April 13, 2012.
  41. 1 2 3 4 Weisburd, Aaron. "How to Prevent Terrorism and Preserve Innovation" (PDF). Retrieved April 5, 2012.
  42. 1 2 3 Jenkins, Brian. "Is Al Qaeda's Internet Strategy Working?" (PDF). Retrieved April 5, 2012.
  43. 1 2 Kohlmann, Evan. "The Antisocial Network: Countering the Use of Online Social Networking Technologies by Foreign Terrorist Organizations" (PDF). Retrieved April 5, 2012.