July 25, 2015
An example of ISIS' media outreach: A video released from ISIS shows militants executing 25 captives (Syrian army soldiers) in the ruins of the main Roman amphitheater in the ancient city of Palmyra, Syria. (Photo: Balkis Press / ABACA/Newscom)
James Jay Carafano, a leading expert in national security and foreign policy challenges, is The Heritage Foundation’s Vice President, Foreign and Defense Policy Studies, E. W. Richardson Fellow, and Director of the Kathryn and Shelby Cullom Davis Institute for International Studies.Read his research.
Used to be that, when a crime occurred, investigators would flood the crime scene. Now, they race to access the perpetrator’s footprint in digital space. Often, that’s where they’ll find the most crucial clues.
And that’s why the FBI wants to know everything Chattanooga shooter Mohammad Youssef Abdulazeez did online.
Digital tracing has proved particularly important in suspected terrorism cases. In grappling with the dramatic surge in homegrown terror plots, investigators search social networking sites, emails and digital address books for signs of radicalization or links to transnational groups.
Over a decade ago, researcher Gabriel Weimann delivered a troubling reportabout terrorist activity online. Bad actors were less interested in attacking the Internet or conducting malicious activity than they were in exploiting the medium for everything from raising money to scouting potential targets.
The Daily Signal is the multimedia news organization of The Heritage Foundation. We’ll respect your inbox and keep you informed.
A few years later (even as the activities of evildoers exploiting the internet grew), the world witnessed a second phenomenon exhibiting the growing power of social media. Disputed results for Iran’s 2009 presidential election triggered a wave of public protests in Iran. The mass demonstrations were fueled and organized, in large part, by the use of social networking sites.
What was remarkable in 2009 is now commonplace. Many actors—good as well as bad—mobilize social networks to get their message out.
By blending terrorist activity online with cyber rabble-rousing, ISIS has melded these two trends to create a serious threat. It’s not just the group’s capacity to instigate on the Internet that makes the threat so formidable. Where ISIS gets “value added” is by linking online communities with human ones—connecting people who have a propensity to act with a supportive and inspiring cyber-support group.
The technique has given rise to a dangerous synergy between ISIS’s advances on the battlefield and its global support network. Their ability to produce slickvideos is just as effective as their capacity to control territory in inspiring radical activity elsewhere.
Yet key government officials seem to be missing this point. In 2011, the U.S. announced its strategy for countering violent extremism. More recently, British Prime Minister David Cameron called for a comprehensive strategy to combat domestic radicalization. Yet the cyber-warfare components of both strategies focused almost exclusively on combating the transmission of incitements to violence. That’s just not enough.
Concentrating solely on combating messaging will be like poking a balloon—even as we push in at one spot, the messaging will bulge out elsewhere. To counter violent extremism, we must also break the nexus between the cyber and human networks.
Fighting terrorism is not simply a matter of finding better messages or advancing a more appealing ideology. The war of ideas can’t be divorced from the physical war on terrorists—and we must win them both. A large component of that task will require physically diminishing and defeating the threat of ISIS by breaking their territorial control and driving them from the field.
No comments:
Post a Comment