<http://www.gwumc.edu/hspi/reports/NETworked%20Radicalization_A%20Counter%20Strategy.pdf>
 NETworked Radicalization: A Counter-Strategy (PDF; 1.59 MB)
Source: Homeland Security Policy Institute
>From press  <http://www.gwumc.edu/hspi/news/index.cfm?d=4098> release:

Through a compelling ‘call to action’ based on myths and falsehoods, terror 
networks have made savvy use of the Internet to radicalize potential recruits 
worldwide. With the “war” now shifting to one of ideology, cyberspace is the 
battlefield, and the United States has not yet developed an effective narrative 
as part of its counter strategy. That’s the conclusion of a new report issued 
by The George Washington University’s Homeland Security Policy Institute (HSPI) 
and the University of Virginia’s Critical Incident Analysis Group (CIAG) 
titled, “NETworked Radicalization: A Counter-Strategy.” The report is the 
second in a series addressing the issue of terrorist radicalization.

Frank J. Cilluffo, Director of HSPI, presented the report’s findings and 
recommendations before the May 3 hearing of the Senate on Homeland Security and 
Governmental Affairs Committee, to address extremist use of the Internet to 
spread radical ideology and the impact of those efforts on potential followers. 
He described how terror networks have moved from using the Internet for 
operational planning (such as 9/11) and propaganda (videos of beheading of 
Nicholas Berg and Daniel Pearl) to a means of social networking to radicalize 
new recruits. According to the report, Internet chatrooms are now major venues 
for recruitment and radicalization by terrorist groups like al Qaeda, and 
video-hosting websites like YouTube broaden the outreach. The report also 
indicates that websites are being used more and more to feature extremist 
interpretations of religious doctrine with little being done on the other end 
to refute, counter, or when appropriate, shut down the dialogue. 



  _____  




HOMELAND SECURITY

POL IC Y IN S T I T U T E

A Special Report by

The George Washington University

Homeland Security Policy Institute

The University of Virginia

Critical Incident Analysis Group

NETworked Radicalization:

A Counter Strategy

Homeland Security Policy Institute (HSPI) and

Critical Incident Analysis Group (CIAG)

Task Force on Internet-Facilitated Radicalization*

... 




TASK FORCE SPECIAL REPORT ON INTERNET-FACILITATED RADICALIZATION 



Introduction

Savvy use of the Internet has empowered terror networks to expand their reach 
beyond

national borders by enabling wide distribution of a compelling message and 
social

connectivity with new audiences. Use of computer-mediated communication (CMC) 
has

made a range of terrorist operational activities cheaper, faster, and more 
secure, including

communications, fundraising, planning and coordination, training, information 
gathering

and data mining, propaganda and misinformation dissemination, and 
radicalization and

recruitment. The list is long, and not even complete. Before the Internet, 
terrorists seeking

to communicate with one another through electronic means used telephones or 
radios,

which could be tapped. Terrorists seeking to offer training meant congregating 
trainers and

trainees in a fixed training location, exposing the group to capture or worse. 
Terrorists or

their supporters engaged in fundraising or recruitment often pursued these aims 
in public

settings. And terrorists researching a potential target often did so at public 
libraries and

bookstores, subjecting them to surveillance in these public spaces. Now, with 
the Internet,

all of these same activities can be conducted in relative anonymity from safe 
locations across

the globe:

􀂃 Terrorists can draft an email message and save it as a draft rather than 
sending it, so

that anyone with access to that email account can log in and read the message.

Known as “dead drops,” these communications are less subject to interception.1

􀂃 Terrorists can post training manuals online or even hack into a legitimate 
website

and hide training materials “deep in seemingly innocuous subdirectories of the

legitimate site,” a process known as “parasiting.”2

􀂃 Terrorists can conduct research on potential targets online, where both text 
and

imagery, including satellite photography, is frequently available. Google 
Earth, for

instance, has been used to target British soldiers in Iraq with increasing 
accuracy.3

􀂃 Terrorists can appeal anonymously for donations of financial or other support 
via

websites.

Planning and preparations for the 9/11 attacks were facilitated by the 
Internet. Operatives

engaged in the attack used it to communicate. Flight schools were researched 
through it, as

were targets. Its uses have evolved over time and to increasingly gruesome 
creative effect –

witness the videotaped beheadings of Nicholas Berg and Daniel Pearl circulated 
online to the

four corners of the earth. These uses of the Internet, horrific as they may be, 
are

fundamentally static – one way communication directed at a global audience.

1 See Appendix A. All information provided, without a pinpoint source, 
originates from task force briefings

with subject matter experts and officials with personal experience in dealing 
with the issues under study. The

task force received many briefings of a sensitive nature and some briefers wish 
to remain anonymous.

2 “Examining the Cyber Capabilities of Islamic Terrorist Groups,” Institute for 
Security Technology Studies at

Dartmouth College, November 2003, 
http://www.ists.dartmouth.edu/TAG/ITB/ITB_032004.pdf.

3 Thomas Harding, “Terrorists 'use Google maps to hit UK troops',” Telegraph 
Online, January 13, 2007,

http://www.telegraph.co.uk/news/main.jhtml?xml=/news/2007/01/13/wgoogle13.xml.

GW HSPI • UVA CIAG 1

NETWORKED RADICALIZATION: A Counter-Strategy

What renders the Internet a particularly potent tool is its capacity to foster 
interaction.

Virtual chat rooms make real time, two-way dialogue possible, permitting 
extremist ideas to

be shared, take root, be reaffirmed and spread exponentially. For the post-Iraq 
(post-2003)

generation especially, Internet chat rooms are now supplementing and replacing 
mosques,

community centers and coffee shops as venues for recruitment. In short, 
cyberspace is now

the battlefield, and the “war” is one of ideas. Our adversaries currently have 
firm possession

of that battlefield because they understand this shift and have crafted and 
disseminated a

narrative that resonates and that has served both to energize and expand their 
ranks. They

have woven an effective tale of an imaginary “clash of civilizations” in which, 
supposedly, a

monolithic West has been engaged in an aggressive struggle against a monolithic 
Islam for

centuries, since the time of the Crusades. The messaging is meant to resonate 
with a

younger generation, and reinterpret Islam to suit the agenda of the global 
extremist “jihadi”

Salafist movement.

By its very nature, the Internet “enables groups and relationships to form that 
otherwise

would not be able to, thereby increasing and enhancing social connectivity.” 4 
As a new

means of social interaction, it brings together people – friends, family 
members, or complete

strangers – with similar interests and values, and fosters a sense of 
affiliation and identity.

The “killer application” of the Internet is not so much its use as a broadcast 
tool, but its

function as a communications channel that links people in cyberspace, who then 
meet and

can take action in the physical world.5

And who are those individuals who will be receptive – or vulnerable – to an 
extremist

message and “call to action” at that nexus where the cyber and physical realms 
meet? There

is no one-size-fits-all explanation, and much still remains to be learned on 
this count.

However, from Toronto to London, from Madrid to Morocco, and in Holland, America

and beyond, we have witnessed the effects of radicalization. Some have termed 
these

instances as the rise of “homegrown” terrorism, but the label is something of a 
misnomer.

The Internet has created a largely borderless world and those who participate 
in terrorist acts

are therefore perhaps best understood within this global context, rather than 
merely a

national one.

Preliminary Matters of Scope and Definition

This report focuses on radicalization in the context of the transnational 
insurgency that is the

global extremist “jihadi” Salafist movement. Further, the report explores the 
relatively

delimited question of how to respond to and counter Internet-facilitated 
radicalization. It

does not address wider policy questions, not because they are unimportant, but 
because they

fall outside the scope of this particular study. Key terms are defined as 
follows:

4 John A. Bargh and Katelyn McKenna, “The Internet and Social Life,” Annual 
Review of Psychology, 55, 573-

590 (2001), p.2, http://pantheon.yale.edu/~jab257/internet_and_social_life.pdf.

5 Ibid, p. 3, citing J. Kang, “Cyber-race,” Harvard Law Review 113 (2000): 1150.

2 GW HSPI • UVA CIAG

Special Report on Internet-Facilitated Radicalization

􀂃 Radicalization is “the process of adopting an extremist belief system, 
including the

willingness to use, support, or facilitate violence, as a method to effect 
societal

change.”6

􀂃 Recruitment is “the solicitation of individuals to commit terrorist acts or 
engage in

behavior for a terrorism purpose.”7

􀂃 The global extremist “jihadi” Salafist movement is a transnational insurgency,

perhaps best exemplified by al Qaeda but including other groups ascribing to the

same ideology. The movement seeks to seize control of the countries of the 
Muslim

world and unite them in a single state (caliphate) governed by the extremists’ 
literal

interpretation of Islamic law. The terms “jihad” and “jihadi” appear in 
quotation

marks because extremists have hijacked the concept of jihad, using it – wrongly 
– to

justify acts of violence. Unfortunately, the media and government entities have

adopted this incorrect usage, and it has now become part of common parlance. In 
its

true sense, however, jihad refers either to inner struggle (striving for 
righteous deeds),

or to external struggle against aggression and injustice in which strict rules 
of

engagement concerning the protection of innocents apply.8

Radicalization is not unique to Islam nor is it a new phenomenon. Historically, 
extremist

beliefs have been used to subvert the ideals of every major religion in the 
world and Islam is

only one of several that terrorists may invoke to justify acts of violence 
(though such acts run

counter to the very tenets of Islam). Indeed, terrorist organizations of all 
stripes, adhering to

any number of extremist belief systems, are present on the Internet and have 
used it to

radicalize and recruit others.

Virtual Propaganda and Radicalization:

Connecting the Dots in the Real World

Propaganda and radicalization matter, whether online, offline or a mixture of 
the two.

Propaganda fuels the radicalization process, and evidence of the effects of 
that process is

disturbing:

Adam Gadahn. An American citizen from California, Gadahn now serves as al 
Qaeda’s

English-language spokesman under the name Azzam al Amriki. He has produced

propaganda videos, circulated over the Internet, which extol Muslims to join 
the global

6 Charles E. Allen, “The Threat of Islamic Radicalization to the Homeland,” 
testimony before the Committee

on Homeland Security and Governmental Affairs, U.S. Senate, delivered on March 
14, 2007, p. 4.

7 Frank Cilluffo, Gregory Saathoff, et al., Out of the Shadows: Getting Ahead 
of Prisoner Radicalization, Special

report by The George Washington University’s Homeland Security Policy Institute 
and the University of

Virginia’s Critical Incident Analysis Group, September 19, 2006, p. 3.

8 See Appendix A.

GW HSPI • UVA CIAG 3

NETWORKED RADICALIZATION: A Counter-Strategy

extremist “jihadi” Salafist movement and take part in “slitting the throats of 
the infidel.”9

Adept at building networks offline, he was able to carry that ability – along 
with a sense of

moral outrage – to the online environment.

Hassan Abujihaad. Formerly known as Paul R. Hall. “[A]n American-born Muslim

convert,” Abujihaad was arrested in March and charged with disclosing secret 
information

about the location of Navy ships to terrorist groups. Abujihaad was in contact 
with

extremists online and had ordered from them videos “that promoted violent 
jihad.” 10

Christopher Paul. In April 2007, Paul, an American from Ohio, was charged with 
providing

training to al Qaeda operatives, and planning terrorist attacks overseas. He is 
alleged to have

trained with al Qaeda operatives in Pakistan and Afghanistan, and recruited for 
al Qaeda in

Germany. He is also believed to have provided equipment and money to terrorists 
plotting

attacks overseas.11 It is further alleged that Paul watched propaganda videos 
showing violence

against Muslims.12

The Madrid Bombings. On March 11, 2004, terrorists detonated a series of 
explosives

placed on Madrid’s commuter trains, killing one hundred ninety-one people. The 
terrorists

are believed to be members of an autonomous network active in North Africa, 
connected to

al Qaeda only by ideology and drawing no more than inspiration from other 
terrorist groups.

The Internet is known to have played a role in promoting extremist ideology 
among the

group. Specifically, among propaganda circulated by the Global Islamic Media 
Front

(GIMF) was speculation as to the impact of an attack prior to Spanish 
elections.13

The London Bombings. On July 7, 2005, four suicide bombers killed themselves 
and fiftytwo

others in a series of coordinated attacks on London’s public transportation 
system,

targeting crowded commuter trains and a bus. Three of the bombers were born and 
raised in

Britain. There is no indication that the attacks were planned or supported by 
al Qaeda or

other foreign extremist groups.14 Instead, the group appears to have formed, 
planned, and

acted on its own.

The Toronto Case. In June 2006, Canadian authorities arrested seventeen people 
(later

eighteen) suspected of plotting a series of terrorist attacks including truck 
bombings against

the Toronto Stock Exchange, a strike on Parliament, the murder of Prime 
Minister Stephen

Harper, and other acts of mass murder. The group appears to have sprung up on 
its own, its

9 Raffi Khatchadourian, “Azzam the American: The Making of an Al Qaeda 
Homegrown,” The New Yorker,

January 22, 2007, 
http://www.newyorker.com/fact/content/articles/070122fa_fact_khatchadourian.

10 “Judge Orders Terror Suspect Held without Bond” International Herald 
Tribune, March, 23 2007,

http://www.iht.com/articles/ap/2007/03/23/america/NA-GEN-US-Navy-Terror.php.

11 Peter Selvin, “Jury Indicts Ohio Man for Conspiring With Al-Qaeda,” The 
Washington Post, April 13, 2007,

p. A09,

http://www.washingtonpost.com/wp-dyn/content/article/2007/04/12/AR2007041200689.html.

12 Kevin Bohn, “Ohio Man Charged With Helping al Qaeda,” CNN, April 12, 2007,

http://www.cnn.com/2007/LAW/04/12/terrorism.charges/index.html.

13 Geoff Pingree and Lisa Abend, “Judge Assesses Madrid Attacks,” The Christian 
Science Monitor, April 13,

2006, http://www.csmonitor.com/2006/0413/p06s02-woeu.html.

14 “Report of the Official Account of the Bombings in London on 7th July 2005,” 
United Kingdom House of

Commons, May 11, 2006, p. 21, 
http://news.bbc.co.uk/2/shared/bsp/hi/pdfs/11_05_06_narrative.pdf.

4 GW HSPI • UVA CIAG

Special Report on Internet-Facilitated Radicalization

members radicalized in part by extremist “jihadist” videos downloaded from the 
Internet and

viewed as a part of training exercises.15

Radicals in the Netherlands. These include the Hofstad Group, which plotted to 
conduct

suicide bombings and assassinate Dutch politicians. One operation allegedly 
considered was

an assault on a nuclear power plant. The Group included immigrants, the 
descendants of

immigrants to the Netherlands, and indigenous Dutch converts to extremist 
“jihadi” Salafist

beliefs; one person who helped provide safe houses to the Group was a former 
policewoman.

Dutch police have identified several examples of Dutch Muslims, mostly young 
and not

religiously trained, who have adopted extremist “jihadi” Salafist beliefs to 
which they were

exposed over the Internet.”16

Casablanca. In March 2007, a Moroccan man was killed in Casablanca when the 
explosives

he had strapped to his body exploded inside an Internet café. The man and his 
companions

often visited the café to view “jihadist” websites. It appears that the bomb 
detonated during

a struggle with the café’s owner, who wanted to stop the men from downloading 
and viewing

propaganda materials in his shop.17

The pace of “transformation” is striking and has been accelerating.18 London 
police chief Ian

Blair has said that the suspects in the plot to bomb airliners in the United 
Kingdom during

the summer of 2006 went “from what would appear to be ordinary lives in a 
matter of some

weeks and months, not years, to a position where they were allegedly prepared 
to commit

suicide and murder thousands of people.”19 This toxic combination of speed and 
potential

consequences brings into stark relief the urgent need to better understand how 
and why

radicalization occurs, either in person or via the Internet or chat rooms, so 
that it may be

countered.

Online Propaganda and Virtual Radicalization:

The Medium, the Message and Reasons for its Appeal

The Internet facilitates radicalization because it is without peer as a tool 
for both active and

passive communication and outreach. Online chat rooms are interactive venues 
where

aberrant attitudes and beliefs may be exchanged, reinforced, hardened and 
validated (at least

15 See Appendix A.

16 S.J. van Hulst, “Violent Jihad in the Netherlands: Current Trends in the 
Islamist Terrorist Threat,”

Netherlands Ministry of the Interior and Kingdom Relations, 2006, p. 47.

17 Craig S. Smith, “Companion of Suicide Bomber Questioned over Casablanca 
Internet Café Blast,”

International Herald Tribune, March 12, 2007, 
http://www.iht.com/articles/2007/03/12/news/morocco.php.

18 Stewart Bell, “Jihadization of Youth a 'Rapid Process',” The National Post, 
January 26, 2007,

http://www.canada.com/nationalpost/news/story.html?id=25e76872-b309-47a7-841b-

938bdd9ffd71&k=76582.

19 Michael Holden, “Bomb Suspects ‘Radicalized in Weeks’,” Reuters, January 24, 
2007,

http://today.reuters.co.uk/news/articlenews.aspx?type=topNews&storyID=2007-01-

24T175436Z_01_L24334309_RTRUKOC_0_UK-BRITAIN-SECURITY.xml.

GW HSPI • UVA CIAG 5

NETWORKED RADICALIZATION: A Counter-Strategy

in the minds of participants). This mutual affirmation in turn gives rise to a 
sense of

community and belonging – a virtual ummah (worldwide Muslim community). Even 
those

who simply lurk in these forums may be at risk, although they may not realize 
it. As

extremist viewpoints are continuously reaffirmed by the like-minded, the doubts 
of

observers/listeners may be assaulted and eroded. CMC has been shown to increase

conformity to group norms.20 In studies of racial violence and hate crime over 
the Internet,

it has been demonstrated that the anonymity of the Web and the culture of chat 
rooms leads

to an increased level of endorsement for violence than is actually felt by 
participants.21

As a mechanism to exert influence and mold opinion, the Internet is powerful 
because it

gives voice to potentially everyone and does so in distinctly egalitarian 
fashion. The case of

“Irhabi (Terrorist) 007” offers a powerful illustration. Under this pseudonym, 
and while

barely into his twenties, Younis Tsouli rose from obscurity to a position of 
leadership by

participating frequently and enthusiastically in online extremist forums. The 
sheer volume

of Tsouli’s postings began to earn him the trust of other participants and, 
when he

responded positively and energetically to the beheading videos posted on the 
Web by al

Qaeda in Iraq, that group in turn praised and endorsed Tsouli.22

Indeed, any extremist group, no matter how small, can create a 
professional-looking website

that may reach a wide, geographically dispersed audience of potential recruits. 
Neo-Nazi

groups, for example, “were among the first to seize upon the benefits of 
cyberspace,”23

establishing websites, bulletin boards, newsgroups, mailing lists, and chat 
rooms.24 Just a few

years ago, hundreds of websites served terrorists and their supporters.25 Now, 
ten to twentyfive

such sites are thought to generate new material which is mirrored in several 
thousand

others.26

These developments mirror those in society writ large, where use of the 
Internet is

continually expanding and evolving as a means of social networking and 
mobilization. For

example, a number of candidates running for president in 2008 announced their 
candidacy

not at rallies or press conferences, but through videos broadcast on their 
websites. Almost

every top contender is turning to social networking sites, such as MySpace, as 
“a method of

reaching people who are historically not interested in voting.”27 Politicians 
now maintain

blogs, conduct web chats with constituents, and hold virtual town hall meetings 
to shape

public opinion and mobilize popular support.

20 Bargh, supra note 4 at p. 8, citing T. Postmes and R. Spears, 
“Deindividuation and Anti-Normative

Behavior: A Meta-Analysis,” Psychological Bulletin 123 (1998): 238-259.

21 Jack Glaser, Jay Dixit, and Donald P. Green, “Studying Hate Crime with the 
Internet: What Makes Racists

Advocate Racial Violence?” Journal of Social Issues 58, no. 1 (2002): 177-193.

22 See Appendix A.

23 Michael Whine, “Cyberspace – A New Medium for Communication, Command, and 
Control by

Extremists,” Studies in Conflict and Terrorism 22 (1999): 233.

24 Phyllis B. Gerstenfeld, et al., “Hate Online: A Content Analysis of 
Extremist Internet Sites,” Analysis of Social

Issues and Public Policy 3, no. 1 (2003): 30.

25 Gabriel Weimann, “www.terror.net: How Modern Terrorism Uses the Internet,” 
United States Institute of

Peace, March 2004, p. 2.

26 See Appendix A.

27 Alex Williams, “The Future President, on Your Friends List,” The New York 
Times, March 18, 2007,

http://www.nytimes.com/2007/03/18/fashion/18myspace.html.

6 GW HSPI • UVA CIAG

Special Report on Internet-Facilitated Radicalization

The media posture of the global extremist “jihadi” Salafist movement is, 
similarly,

sophisticated and multidimensional. By way of illustration, al Qaeda has its 
own official

production arm (As-Sahab), for which the GIMF serves as clearinghouse.28 The 
GIMF itself

is a multipronged operation, which to date has used many of the tools of a 
major public

relations effort including television, websites/chat rooms, and word of mouth. 
Indeed, al

Qaeda as we now know it is both an inspirational and operational force. And the 
movement

it has spawned is fuelled by ideology propagated in a range of ways, from 
simple word of

mouth to sophisticated technological means. The Internet facilitates the spread 
of that

ideology and inspiration in various ways, including by serving as a 
distribution vehicle for

videos, songs, videogames and radio broadcasts.29

The primary focus of the movement’s efforts online appears to be youth, 
including those

living in the West. Websites are often flashy and colorful, apparently designed 
to appeal to

“a computer savvy, media-saturated, video game-addicted generation.”30 One site 
features a

game called “Quest for Bush” in which the player fights Americans and proceeds 
to different

levels including “Jihad Growing Up” and “Americans’ Hell.”31 These so-called 
games

amount to a dynamic form of propaganda, whose purpose is to transform a 
generation into

radicalized foot soldiers of a global insurgency.32 Videos circulated through 
websites serve the

same purpose, spreading a simple but seemingly compelling message: Islam is 
under attack

and young Muslims have a personal duty to fight in defense of the ummah.

33

The images presented in these videos are graphic and calculated to provoke, 
issue a call to

arms and motivate. News footage is included from the Israeli-Palestinian 
conflict, Iraq,

Lebanon, Chechnya, Bosnia, Kosovo, and other “hot spots” around the world. U.S. 
and

allied troops are framed as invaders, occupiers, and destroyers. Civilian 
casualties of these

conflicts, especially Muslim women and children, are depicted as victims of 
Western

aggression, with blood, gore, and tears often emphasized. Exposed to these 
images over and

over again, the viewer may internalize the message, becoming frustrated and 
enraged over the

enormous injustice he perceives to be occurring. 34

Once produced only in Arabic, videos are being dubbed, subtitled, or produced 
in a wider

range of languages in order to reach a broader audience.35 Some now include 
hip-hop and

rap musicians whose catchy, melodic messages contain calls to violence. In one 
such video,

28 Sebastian Usher, “Webcast News Gives Al-Qaeda View,” BBC News, September 30, 
2005,

http://news.bbc.co.uk/1/hi/world/middle_east/4298206.stm.

29 Weimann, supra note 25 at p. 4. See also Frank J. Cilluffo, Sharon L. 
Cardash and Andrew J. Whitehead,

“Radicalization: Behind Bars and Beyond Borders,” Brown Journal of World 
Affairs (2007), referencing select

concepts/passages in the present report.

30 Bruce Hoffman, “The Use of the Internet by Islamic Extremists,” testimony 
before the Permanent Select

Committee on Intelligence, U.S. House of Representatives, May 4, 2006, p. 5.

31 Jose Antonio Vargas, “Way Radical, Dude,” The Washington Post, October 9, 
2006, p. C01,

http://www.washingtonpost.com/wp-dyn/content/article/2006/10/08/AR2006100800931.html.

32 See Appendix A.

33 Hoffman, supra note 30 at p. 6. See also Weimann, supra note 25 at p. 6.

34 See Appendix A.

35 Frank Gardner, “The Growth of ‘Online Jihadism’,” BBC News, October 25, 2006,

http://news.bbc.co.uk/2/hi/uk_news/6086042.stm.

GW HSPI • UVA CIAG 7

NETWORKED RADICALIZATION: A Counter-Strategy

titled “Dirty Kuffar [Non-believers],” the rapper “Sheikh Terra” sings with a 
gun in one

hand and a Qur’an in the other; images of Iraqis being killed by American 
troops are

displayed, the terrorist attacks of 9/11 are lauded, and viewers/listeners are 
called on to fight

back.36 Videos were crudely produced, sold for a few cents and in limited 
distribution before

the Internet. Raids of “safe houses” often yield stacks of DVDs, CDs, VHS 
tapes, and

VCDs. The Worldwide Web has made it increasingly easy to produce and circulate 
these

videos globally.37 All of these visuals are accompanied or underpinned, either 
explicitly or

implicitly, by a carefully crafted narrative depicting the Islamic world under 
siege or attack.

New video-hosting websites like YouTube broaden potential audience reach 
further. The

site receives tens of thousands of new videos daily, and users watch over a 
hundred million

per day, making content difficult to monitor. Though authorities have 
identified a number

of “jihadist” propaganda items on the site – some being viewed by thousands – 
these are

often replaced almost as soon as they are removed.38 Extremists themselves 
confess the

importance of the video as tool. As one said of his radicalization, the “first 
time I saw an al-

Qaeda video, I was ready to go… I wanted to kill the disbelievers.”39

Extremist interpretations of religious doctrine feature prominently on 
websites, where

articles, pamphlets and even libraries of books appear. These texts are devoted 
to finding

justifications, within the context of Islam, for the movement’s violent 
ideology and acts.

This is intended to assure potential recruits, and to reassure those already 
recruited, of the

righteousness of both the cause and the means adopted to further it.40 By way 
of example,

consider the following fatwa (religious ruling) published online by an Egyptian 
declaring

suicide terrorism to be legitimate within Islam (contrary to the traditional 
Islamic

jurisprudence that it is a violation of the religion and forbidden by God):

He who commits suicide kills himself for his own benefit,

while he who commits martyrdom sacrifices himself for the

sake of his religion and his nation. While someone who commits

suicide has lost hope with himself and with the spirit of Allah,

the Mujahid [struggler] is full of hope with regard to Allah’s

spirit and mercy. He fights his enemy and the enemy of Allah

with this new weapon, which destiny has put in the hands of

36 This video was viewed on March 29, 2007 at 
http://youtube.com/watch?v=5mcSbUQc3hU. See also Antony

Barnett, “Islamic Rappers’ Message of Terror,” The Guardian, February 8, 2004,

http://observer.guardian.co.uk/uk_news/story/0,6903,1143499,00.html.

37 See Appendix A.

38 Tariq Panja, “Militant Islamic Groups Turn to YouTube,” The Washington Post, 
February 11, 2007,

http://www.washingtonpost.com/wp-dyn/content/article/2007/02/11/AR2007021100956.html.

39 Stewart Bell, “Making of a Zealot,” National Post, June 30, 2006,

http://www.canada.com/nationalpost/news/story.html?id=04c78d5f-8003-4d21-b845-d17f47852b71&p=1.

In online images, “jihadist” leaders are depicted as either heroic or angelic. 
Fighters are juxtaposed with images

of lions, horses, falcons, and other animals to emphasize their bravery, 
strength, and ferocity. Those who died

while fighting are depicted as martyrs for the cause; their images – in life 
and, sometimes, after death – are

juxtaposed with images of flowers, waterfalls, Korans, and beams of light in 
order to depict the holiness of their

sacrifices and the paradise expected to await them after death. See “The 
Islamic Imagery Project: Visual Motifs

in Jihadi Internet Propaganda,” Combating Terrorism Center, U.S. Military 
Academy, March 2006,

http://www.ctc.usma.edu/CTC%20--%20Islamic%20Imagery%20Project.pdf.

40 See Appendix A.

8 GW HSPI • UVA CIAG

Special Report on Internet-Facilitated Radicalization

the weak, so that they would fight against the evil of the strong

and arrogant.41

The virtual world cannot be divorced from the physical realm in which it is 
grounded,

however. It is the complex, iterative and dynamic interplay between the two 
that helps

explain why the extremist narrative resonates and how it spreads. There is no 
set formula

that explains why someone is vulnerable to radicalization, or why a radicalized 
individual

goes on to become a terrorist. As the Department of Homeland Security (DHS)’s 
Office of

Intelligence and Analysis observes, the process of radicalization “varies 
across ideological and

ethno-religious spectrums, different geographic regions, and socioeconomic 
conditions.”42

Social bonds play an important role in the radicalization process. Some argue 
that they “are

the critical element and precede ideological commitment.”43

This is especially true for diaspora communities around the world, which often 
turn inward

to seek mutual support, a sense of identity, and an enhanced sense of dignity. 
Youth in these

communities, including second- and third-generation descendants of immigrants, 
may feel

alienated both from their parents’ culture and from the surrounding culture of 
the country in

which these youth live. They may therefore rely on each other to provide a 
sense of

community, making it considerably easier for a single radicalized individual to 
influence

others. Shaming of a group or community is transmitted by first-generation 
immigrants

fleeing economic and social conditions elsewhere to the next generations 
(second, third and

fourth) who may not feel part of either their new land or the land that their 
parents fled.

Their ambivalence about their parents and their new country may lead to 
disturbance in

them as a group and sometimes to violent actions that their individual personal 
profiles

would not immediately have suggested.44

While particularly evident in Europe, similar senses of alienation exist within 
American

Muslim communities – although barriers to assimilation are on average much 
lower in the

United States.45 American Muslim community leaders have expressed their 
perception of

“the roll back of basic civil liberties in America” since 9/11. Of specific 
concern is the

perception of how the USA PATRIOT Act was implemented, and the subsequent

“imprison[ment of] well over 1,200 Muslim and Arab men using the pretext of 
immigration

violations.”46

41 Gabriel Weimann, “Virtual Disputes: The Use of the Internet for Terrorist 
Debates,” Studies in Conflict and

Terrorism (2006): 634.

42 Allen, supra note 6 at p. 5.

43Angela Gendron, “Militant Jihadism: Radicalization, Conversion, Recruitment,” 
Canadian Centre for

Intelligence and Security Studies, The Norman Paterson School of International 
Affairs, Carleton University,

April 2006, p. 9, http://www.csis-scrs.gc.ca/en/itac/itacdocs/2006-4.pdf.

44 Lord Alderdice, “The Individual, the Group and the Psychology of Terrorism,” 
International Review of

Psychiatry (June 2007), in press.

45 Cilluffo and Saathoff, supra note 7 at pp 9-10.

46 Parvez Ahmed, “Terror in the Name of Islam: Unholy War not Jihad” (paper 
presented at the ‘Sacred

Violence: Religion and Terrorism’ conference held by the Institute for Global 
Security, Law and Policy at the

Case Western University School of Law, Cleveland, Ohio, March 30, 2007), citing 
figures in “The September

11 Detainees: A Review of the Treatment of Aliens Held on Immigration Charges 
in Connection with the

Investigation of the September 11 Attacks,” Office of the Inspector General, 
U.S. Department of Justice, April

1, 2003.

GW HSPI • UVA CIAG 9

NETWORKED RADICALIZATION: A Counter-Strategy

Terror networks target young men by giving them “interpretations of Koranic 
verses that

have been chosen so as to lead them to rebel against their parents, their 
families, and even

against the society in which they live.”47 Veterans of combat – in Iraq and 
other places – are

particularly useful for recruiting youth, who respect the veterans’ 
anti-authoritarian attitude

and “street credibility.” Therefore, there may also be an element of youthful 
rebellion in all

of this, as some may be swept up by the romanticism of joining an 
“international brigade.”48

Through social network analysis, a remarkably complex array of interactions – 
between

terrorists, their supporters, potential recruits and targeted audiences, and 
many others

relevant to understanding this movement – is rendered easier to understand. 
Social network

analysis offers “a way to visualize the nodes in the network and how things 
move through

that network such as weapons, pieces of knowledge or people…”.49 The Internet, 
by virtue

of being the preferred mode of social connectivity among this generation, 
coupled with an

understanding of social networking can better inform our understanding of the 
radicalization

process and what moves one from sympathizer to activist.

A psychological understanding of radicalization via the Internet includes an 
appreciation of

large and small group psychology.50 An important means of understanding large 
group

psychology is through the prism of cultural identity. Historically, geography 
was a major

determinant of cultural, ethnic and religious identity. Whether contained 
within a country

of origin or within ethnic or immigrant communities, spread of these large 
group identities

was only as effective as the limited transportation possibilities at that time. 
If jet

transportation has accelerated the process of large group identity formation, 
it may be that

the Internet is transforming large group identity formation from a lateral, 
physical process to

a metastatic, technological process. Previous boundaries have little relevance.

Now, through chat rooms and websites, boundaries are formed and broken 
instantaneously,

so that persons in Seattle, Singapore and Stockholm can meet, establish and 
maintain

ideologic bonds, perhaps even stronger than if they had been forged in 
face-to-face

encounters. Extremist radicalization, whether secular or religious, is 
inherently a group

phenomenon. This can begin in open environments such as universities, or closed

environments such as prisons. For large groups, there is a resonance to shared 
cultural,

ethnic and religious symbols. Real events that can be perceived as oppressive 
or humiliating

– described in psychiatric literature as “chosen traumas”51 – may be 
memorialized through

language, images and music, and may then powerfully resonate within the 
intended audience

and in subsequent generations.

An understanding of small group psychology and sociology is also vital. 
According to Atran,

members of individual cells usually show remarkable in-group homogeneity (age, 
place of

47 Gendron, supra note 43 at p. 9.

48 See Appendix A.

49 Bryan Bender, “Antiterrorism Agency Taps Boston-area Brains,” The Boston 
Globe, March 27, 2007,

http://www.boston.com/news/nation/washington/articles/2007/03/28/antiterrorism_agency_taps_boston_area

_brains/.

50 Emerging neuropsychiatric research is also important to a psychological 
understanding of this process.

51 V. Volkan, Bloodlines (Farrar, Straus and Giroux, 1997) 48-49.

10 GW HSPI • UVA CIAG

Special Report on Internet-Facilitated Radicalization

origin, residence, educational background, socioeconomic status, and so on).52 
This

homogeneity can be established and shaped by extremists through initial and 
subsequent

interactions on the Internet, using aliases as the initial identifying feature 
and progressing in

a give-and-take process.

A Snapshot of Countering Efforts To-Date

To generate a sense of context, a sampling (albeit unscientific) of noteworthy 
and creative

initiatives—many of which are not very well known—are highlighted below. 
Admittedly,

some of these measures may be limited in their ability to counteract the impact 
of the

extremist narrative, which is being accepted and adopted by an important 
minority around

the world. It is also important to recognize that certain countries and 
institutions may be

sending mixed messages by simultaneously engaging or acquiescing in other 
activities that

would seem to undercut the efforts referenced.

Britain.

• An important grassroots effort directed against radicalization in the U.K. is 
“the

Radical Middle Way,” an initiative aimed at articulating a mainstream 
understanding

of Islam that is dynamic and relevant, particularly to young British Muslims.

Partially funded by the government, the project is a collaboration among several

British Muslim organizations. It seeks to undermine the extremists’ message that

violence is a legitimate way of practicing Islam. To this end, the Radical 
Middle

Way maintains a website that features presentations by scholars of religion on 
the

tenets of Islam. The project has also held roundtables with radical groups in 
Britain,

seeking to establish dialogue as a way of encouraging extremists to renounce 
their

radical beliefs.

• Pursuant to a recently announced UK government initiative, Muslim “opinion

formers” (imams and others) will be offered “special training in how to face 
down

extremism and be role models for moderation and tolerance.” There is also to be 
“a

major increase in the number of `forums against extremism’—regional groups which

meet regularly and which were set up in the wake of the July 7 London bombings 
to

enable Muslims to discuss ways of tackling extremism.”53

• In the wake of 9/11, UK intelligence officials posted messages on websites 
known to

be accessed by extremists, to appeal for information about the perpetrators. The

requests emphasized that people of all faiths, including Muslims, were murdered 
that

day.54

52 Scott Atran, “Commentary: A Failure of Imagination (Intelligence, WMDs and 
‘Virtual Jihad’),” Studies in

Conflict and Terrorism 29 (2006): 263-278.

53 Patrick Hennessy, “Muslim Leaders Helped to Tackle Extremists,” Sunday 
Telegraph, February 2, 2007,

http://www.telegraph.co.uk/news/main.jhtml?xml=/news/2007/04/01/nislam01.xml.

54 Maura Conway, “Terrorist ‘Use’ of the Internet and Fighting Back,” (paper 
prepared for presentation at the

“Cybersafety: Safety and Security in a Networked World: Balancing Cyber-Rights 
and Responsibilities”

conference held by the Oxford Internet Institute, Oxford, United Kingdom, 
September 8-10, 2005), p. 24.

GW HSPI • UVA CIAG 11

NETWORKED RADICALIZATION: A Counter-Strategy

Egypt.

• The Muslim Brotherhood has denounced terrorist attacks committed by 
“jihadists,”

accusing them of having no “conscience or religion.”55

• Ali Gomaa, Grand Mufti of Egypt, has issued a statement declaring that “women

have equal political rights in Islam,” and that nothing in Islamic principles 
prevents

women from holding high institutional positions including “the highest office in

Muslim nations.”56 This is a direct challenge to the extremists, who seek to 
enforce

incredibly strict restrictions on women.

Indonesia.

• Kyai Haji Abdurrahman Wahid, the country’s first democratically elected 
president,

now serves as head of a major Muslim congregation and as senior advisor to the

LibforAll Foundation; in those capacities he advocates religious tolerance, 
pluralism

and democracy for all.57

• Ahmad Dhani, an Indonesian rock star, has used both his music and his stardom 
to

counter calls to violence with a message of peace and tolerance. His 2004 album,

titled “Laskar Cinta” (Warriors of Love) was a direct challenge to “Laskar 
Jihad”

(Warriors of Jihad), a violent militia in Indonesia.58

Jordan.

• In July 2005, 170 leading Muslim clerics issued a fatwa (Islamic legal

pronouncement) in Amman denouncing all acts of terrorism committed in the name

of Islam. A little known but notable fact, the fatwa was issued a day before the

bombings in London on 7/7.59

Saudi Arabia.

• Public television aired a five-part series titled “Jihad Experiences: The 
Deceit.”

Among other things, the series featured renunciations of terrorism by former

“jihadists.” The series also showcased scholarly rebuttals to extremist 
propaganda.60

• Huge banners and signs have been hung throughout the capital to illustrate the

human costs of terrorism.61 Similar broadcasts have occurred on television and 
even

on the screens of automated teller machines.

55 Fawaz A. Gerges, “The End of the Islamist Insurgency in Egypt?: Costs and 
Prospects,” The Middle East

Journal (Autumn 2004): 594.

56 “Women Have Equal Rights in Islam and Can Be Rulers, ” Gulf News, February 
5, 2007,

http://archive.gulfnews.com/articles/07/02/05/10101999.html.

57 See LibforAll Foundation <http://www.libforall.org/home.html>.

58 Daveed Gartenstein-Ross, “Warrior of Love: An Unlikely Champion of Moderate 
Islam,” The Weekly

Standard, November 15, 2006,

http://www.weeklystandard.com/Content/Public/Articles/000/000/012/932fifqs.asp?pg=1.

59 Kenneth Ballen, “The Myth of Muslim Support for Terror,” The Christian 
Science Monitor, February 23,

2007, http://www.csmonitor.com/2007/0223/p09s01-coop.html.

60 See “TV Seminar Offers an Overview of the Series titled Jihad Experiences,” 
Al-Riyadh Newspaper, Issue No.

13700, December 27, 2005, 
http://www.alriyadh.com/2005/12/27/article118422.html. See also “TV

broadcasts a five part series titled ‘Jihad Experiences, the Deceit…’,” 
Al-Riyadh Newspaper, Issue No. 13672,

November 25, 2005, http://www.alriyadh.com/2005/11/29/article111369.html.

12 GW HSPI • UVA CIAG

Special Report on Internet-Facilitated Radicalization

• The Interior Ministry is developing a plan (to include lectures and seminars) 
to

portray extremist “jihadi” Salafism as a deviant form of Islam to students in 
schools

and universities.62 Textbooks and curriculum are being audited to ensure that

schools are not used to radicalize students.63

• As part of a government-supported “Tranquility Campaign,” volunteers including

scholars of religion, psychiatrists, and sociologists have visited websites, 
chat rooms

and forums to engage in dialogue with extremists. According to government 
figures,

almost 700 individuals have recanted their beliefs as a result. As part of the

Campaign, there is an ongoing effort to establish a website to help counter 
extremist

ideology.64

• Under a new law to fight cyber-crime, approved on April 13, 2007, it is a 
punishable

offence (up to ten years in prison and/or a fine of up to 5 million Saudi 
riyal, which

equates to approximately $1.3 million) to create a website for a terrorist

organization.65

United States.

• Immediately following September 11, 2001, a fatwa condemning terrorism and

extremism was issued by American Muslim jurists and ultimately was endorsed by

more than one hundred and twenty U.S. Muslim groups, leaders and institutions.

The fatwa deemed terrorism or involvement in terrorism by any individual or 
group

as haram (forbidden) and stated “it is the civic and religious duty of Muslims 
to

cooperate with law enforcement authorities to protect the lives of all 
civilians.”66

• 

(F)AIR USE NOTICE: All original content and/or articles and graphics in this 
message are copyrighted, unless specifically noted otherwise. All rights to 
these copyrighted items are reserved. Articles and graphics have been placed 
within for educational and discussion purposes only, in compliance with "Fair 
Use" criteria established in Section 107 of the Copyright Act of 1976. The 
principle of "Fair Use" was established as law by Section 107 of The Copyright 
Act of 1976. "Fair Use" legally eliminates the need to obtain permission or pay 
royalties for the use of previously copyrighted materials if the purposes of 
display include "criticism, comment, news reporting, teaching, scholarship, and 
research." Section 107 establishes four criteria for determining whether the 
use of a work in any particular case qualifies as a "fair use". A work used 
does not necessarily have to satisfy all four criteria to qualify as an 
instance of "fair use". Rather, "fair use" is determined by the overall extent 
to which the cited work does or does not substantially satisfy the criteria in 
their totality. If you wish to use copyrighted material for purposes of your 
own that go beyond 'fair use,' you must obtain permission from the copyright 
owner. For more information go to: 
http://www.law.cornell.edu/uscode/17/107.shtml 

THIS DOCUMENT MAY CONTAIN COPYRIGHTED MATERIAL. COPYING AND DISSEMINATION IS 
PROHIBITED WITHOUT PERMISSION OF THE COPYRIGHT OWNERS.

 


[Non-text portions of this message have been removed]



--------------------------
Want to discuss this topic?  Head on over to our discussion list, [EMAIL 
PROTECTED]
--------------------------
Brooks Isoldi, editor
[EMAIL PROTECTED]

http://www.intellnet.org

  Post message: osint@yahoogroups.com
  Subscribe:    [EMAIL PROTECTED]
  Unsubscribe:  [EMAIL PROTECTED]


*** FAIR USE NOTICE. This message contains copyrighted material whose use has 
not been specifically authorized by the copyright owner. OSINT, as a part of 
The Intelligence Network, is making it available without profit to OSINT 
YahooGroups members who have expressed a prior interest in receiving the 
included information in their efforts to advance the understanding of 
intelligence and law enforcement organizations, their activities, methods, 
techniques, human rights, civil liberties, social justice and other 
intelligence related issues, for non-profit research and educational purposes 
only. We believe that this constitutes a 'fair use' of the copyrighted material 
as provided for in section 107 of the U.S. Copyright Law. If you wish to use 
this copyrighted material for purposes of your own that go beyond 'fair use,' 
you must obtain permission from the copyright owner.
For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml 
Yahoo! Groups Links

<*> To visit your group on the web, go to:
    http://groups.yahoo.com/group/osint/

<*> Your email settings:
    Individual Email | Traditional

<*> To change settings online go to:
    http://groups.yahoo.com/group/osint/join
    (Yahoo! ID required)

<*> To change settings via email:
    mailto:[EMAIL PROTECTED] 
    mailto:[EMAIL PROTECTED]

<*> To unsubscribe from this group, send an email to:
    [EMAIL PROTECTED]

<*> Your use of Yahoo! Groups is subject to:
    http://docs.yahoo.com/info/terms/
 

Reply via email to