Keywords:
Related Articles:

Abstract
1. Introduction
Terrorism is currently one of the biggest global challenges in the world. The militant groups are continuously changing their strategies and adopting new tactics to meet the new challenges. This changing tactics also include the modernisation and modification of the means of radicalisation to recruit new members. In this era of globalisation, nobody can ignore and escape the advancements of communication technologies. The development of modern communication technologies like Internet and online Social Media platforms like Facebook, Twitter, YouTube and others have immensely fostered the flow of information and ideas across the world. As a result, violent extremist groups like Al Qaeda and ISIS have begun to fervently use the social media sites to radicalise the young Muslims around the world and recruit new members. Cases of online radicalisation have been emerging constantly and as the investigations
Khawaja Masnoon Zayeem is an independent researcher and currently pursuing a Masters Degree in
International Relations at the University of Dhaka. His e-mail address is: msn.zym@gmail.com © Bangladesh Institute of International and Strategic Studies (BIISS), 2016.
have revealed, perpetrators of some of the high-profile militant attacks around the world were all radicalised through some form of social media influence.
The paper mainly focuses on the contemporary Islamist militancy led by the ISIS and Al Qaeda. The context of the paper is the relation between the process of globalisation and modern terrorism. With improved telecommunications, the extremist groups have become more powerful than ever before. This new strength is strongly visible in their propaganda efforts which have proved to be highly effective. With this end in view, the research question of the paper is: how the radicalisation through social media is affecting global terrorism? The main objectives of the research are to understand the modern radicalisation process, identify the loopholes in the global counterterrorism strategies and suggest possible ways forward.
The research conducted for this paper is qualitative, based on secondary sources. The research took place in duration of three months and includes extensive reviews of literatures by some distinguished scholars and experts related to terrorism studies. Because of being relatively a recent phenomenon, there is yet to be much study over the use of social media in contemporary terrorism which explains the low amount of available literature about the topic. The research in this paper also relied on some online photos and videos collected from social media to analyse the process of radicalisation through social media and the overall propaganda movements by the extremist groups. Reports of some government agencies are also reviewed to understand the counterterrorism strategies.
The paper highlights the selection of individuals as well as the process of their
radicalisation by the extremists. Here, some notable instances are discussed to explain
the main components of the propaganda strategies of militant groups, especially in
the use of social media. After the radicalisation process, the possible outcomes are
also shown which are leaving huge impact in the membership and organisational
structure of the terrorist groups. The latter parts of the paper analyses the favourable
changes in the operations of extremist groups through the use of social media, as
well as the counterterrorism strategies of different countries to combat their growing
strength. To analyse the counterterrorism strategies, the representative countries have
been selected with a view to portraying a global picture in the context. Lastly, some
policy recommendations have been proposed to formulate more effective strategies.
2. Contextualisation: Globalisation and Spread of Modern Terrorism
Globalisation has become one of the defining features of modern era that has been influencing almost each and every activity in this world. Without delving into the steadfast definitions of globalisation, it can be explained as a process of interconnectedness. Through globalisation, faster flow of information has been ensured with the development of advanced communication technologies. As a result, people living in long distance can stay connected to each other through adopting these improved communication systems, like Internet. The consequences of globalisation have affected everybody and people are both benefitting as well as suffering from its effects. Among the many effects of globalisation, the spread of modern terrorism is one of the most prominent global challenges the world is facing at present.
The prime advantage that globalisation has provided to terrorism is the expansion of its network into a transnational level.2 The emergence of global terror groups like Al Qaeda and ISIS is the most relevant occurrence of this feature. The two groups have successfully established affiliated terror groups among several countries, almost resembling the characteristics of a multinational corporation. Al Qaeda has formed numerous branches in different regions of the world. The Al Qaeda in the Arabian Peninsula (AQAP) operates in the Middle East region based out of Yemen3 , while the Al Qaeda in the Indian Subcontinent (AQIS) is carrying out its activities in South Asia.4 The organisation has also formed separate affiliated groups in other regions like North and West Africa, Levant and Horn of Africa among others.5
The ISIS is another example of a global terror organisation. Based out of the central regions of Iraq and Syria, ISIS has set up a network of affiliated groups in Libya, Sinai, Yemen, Algeria, South Asia and West Africa. The main objective behind such expansion of networks is the promotion and spread of the ideologies and causes of these militant groups, using the tool of globalisation.6
Globalisation has also made the militant groups to evolve with the changing tides and adopt new strategies in their operations.7 An interesting component of this phenomenon is the increasing use of media by the terrorist groups to expand their notability. Coverage among the global media outlets enhances the publicity of these organisations which helps them to swell their networks.8 In recent years, some terror organisations have established their own media networks to further propagate their agenda. The Dabiq magazine and the Al Hayat Media Centre, operated by the ISIS, are distinctly a crucial part of the organisation’s extensive propaganda movements and so are the magazines Inspire and Resurgence for Al Qaeda.
9
1 Audrey Kurth Cronin, “Behind the Curve: Globalization and International Terrorism”, International Security, Vol. 27, No. 3, 2003, pp. 46-51. 2 Paul R. Pillar, “The Diffusion of Terrorism”, Mediterranean Quarterly, Vol. 21, No. 1, 2010, p. 4. 3 Bryce Loidolt, “Managing the Global and Local: The Dual Agendas of Al Qaeda in the Arabian Peninsula”, Studies in Conflict & Terrorism, Vol. 34, No. 2, 2011, pp. 102-104. 4 Dawood Azami, “The Islamic State in South and Central Asia”, Survival, Vol. 58, No. 4, 2016, p. 139. 5 Celine Marie I. Novenario, “Differentiating Al Qaeda and the Islamic State through Strategies Publicized in Jihadist Magazines”, Studies in Conflict & Terrorism, Vol. 39, No. 11, 2016, pp. 957-959. 6 Daniel Byman, “Understanding the Islamic State — A Review Essay”, International Security, Vol. 40, No. 4, 2016, pp. 127-139. 7 Albert J. Bergesen and Omar Lizardo, “International Terrorism and the World-System”, Sociological Theory, Vol. 22, No. 1, 2004, pp. 41-43. 8 Nicholas J. O’Shaughnessy and Paul R. Baines, “Selling terror: The symbolization and positioning of Jihad”, Marketing Theory, Vol. 9, No. 2, 2009, pp. 227-228. 9 Novenario, op. cit., pp. 956-969
In this context, the recruitment strategies of these militant groups have also
changed over the years. The use of internet by the terrorists is increasingly becoming
a frequent occurrence to attract potential militants. The terror groups are now seeking
greater presence in the cyber space to promote themselves and their ideas. Members
of such groups are also specialising in utilising the social media sites like Facebook,
Twitter, YouTube and others to expand their networks. Media and literature related
to the militant organisations are spread throughout the internet which is publicly
accessible, allowing a greater number of people to get indoctrinated with the
extremist ideas and carry out violent actions, some without even directly associating
with a militant group.
3.2. Target Audience
According to Julian Charvat29, the audience could be divided into four groups: general population, sympathisers, supporters and activists30 (see Table 1). The general population includes people living a usual life and opposed to any form of violent extremism. They are highly unlikely to get radicalised by the extremist ideas. The sympathisers are those who are also opposed to terrorism but sympathetic to the cause or objective of the terrorists. This group of people considers the non-violent legal and legitimate protests and movements to be the best ways of achieving the desired goals. Supporters are the people who publically condemn violent extremism but are sympathetic to the cause of the extremists and consider violence to be justified in achieving the goal. The fourth group is the activists who, unlike the other three groups, publically support terrorism and are compassionate to the cause and ideology of the terrorists but yet to join a terror group or commit an act of violent extremism.
27 J. M. Berger, “How ISIS Games Twitter”, The Atlantic, 16 June 2014, available at http://www.theatlantic.com/
international/archive/2014/06/isis-iraq-twitter-social-media-strategy/372856/, accessed on 10 December
2016.
28 Anthony Cuthbertson, “Isis Telegram channel doubles followers to 9,000 in less than 1 week”, International
Business Times, 12 October 2015, available at http://www.ibtimes.co.uk/isis-telegram-channel-doublesfollowers-9000-less-1-week-1523665, accessed on 10 December 2016.
29 Julian Charvat is a former Course Director in the Centre of Excellence-Defence Against Terrorism, a NATO
affiliated Think Tank in Ankara, Turkey.
30 Julian Charvat, “Radicalization on the Internet”, Defence Against Terrorism Review, Vol. 3, No. 2, 2010, pp.
76-77 The militant groups usually seek some key traits among the individuals to consider them as potential recruits. The marginalised people are one of the prime target groups for radicalisation.31 These people include religious and ethnic minorities who are victims of discrimination or alienation from the society; immigrants and refugees who are unwelcomed in their host societies; or the politically suppressed groups.32 This marginalisation could be in the form of lack of some basic rights and amenities like education, judicial access, employment etc.33 The terrorists also look for people with some sort of grievances toward the society for perceived wrong. Such grievances exist in states with unpopular governments and lack of rule of law.34 The recruitment of fighters by the ISIS from the Sunni community in Iraq and anti-Assad elements in Syria is a major manifestation of such exploitation of the marginalisation and grievances of communities and individuals by the militant groups. Individuals going through relative deprivation or being lesser privileged than other communities happen to suffer from low self-esteem and identity crisis and become a major target audience for the terrorists.35 These individuals often aspire to find excitement in their life and belongingness to a group which they try to fill up by joining a militant group.
The recruiters have been using the social media sites and applications
in recent years to target the youth community - another major component of the
desired features in a potential recruit. Youths are easy to convince and desired due
to their energy and zeal. Recruiters typically look for urban educated youths through
the social media and try to radicalise them. Social media also links the recruiters
to the tech-savvy individuals who are increasingly sought by the terror groups to
secure technical knowhow about various gadgets and communication technologies.
Through specific forums for likeminded people within the social media platforms, the
recruiters also look for categorising the audience into different groups based on their
allegiance to the cause and ideology of the terrorist organisations. Such forums also
help them to sort the marginalised communities or people with social grievances.36
3.3. The Radicalisation Process
The radicalisation process goes through several phases that gradually transform an individual into a violent extremist. Usually, the radicalisation process starts with the sympathisers who gradually climb up the ladder to become a supporter, an activist and ultimately a terrorist. The process includes both the deliberate
31 Sarah Lyons-Padilla, Michele J. Gelfand, Hedieh Mirahmadi, Mehreen Farooq and Marieke van Egmond,
“Belonging nowhere: Marginalization & radicalization risk among Muslim Immigrants”, Behavioral Science & Policy, Vol. 1, No. 2, 2015, pp. 1-10. 32 Ibid. 33 Ibid. 34 Clark McCauley and Sophia Moskalenko, “Mechanisms of Political Radicalization: Pathways Toward Terrorism”, Terrorism and Political Violence, Vol. 20, No. 3, 2008, pp. 417-419. 35 Michael King and Donald M. Taylor, “The Radicalization of Homegrown Jihadists: A Review of Theoretical Models and Social Psychological Evidence”, Terrorism and Political Violence, Vol. 23, No. 4, 2011, pp. 607-611. 36 Charvat, op. cit., p. 82.
radicalisation by targeting a particular individual or the general propaganda movements by the militant groups. A recruiter first comes across a potential recruit and gradually gets acquainted with him/her, gets closer through increasing interactions, begin to give knowledge about Islamic way of life and lastly start to plant the ideas of the need for a change in the current world order and the necessity for a global jihad.37 Besides, an individual may get self-radicalised out of curiosity and accessing the publicly available propaganda literature and media.
Social media has become the biggest tool for radicalisation process by the terrorists. In some recent incidents, it has been seen that recruiters are increasingly using the social media platforms to lure the youths into joining their organisations. A precedent set by Anwar Al Awlaki while working as a recruiter for Al Qaeda, radicalisation through social media is now a new norm for the militant groups. The existing members of the militant groups often stay connected to their families and friends through social media and contribute to the radicalisation of the natives of their countries of origin. The pattern could be seen in the attempted joining of ISIS by three teenage girls from Colorado, US in 2014, where the girls were radicalised through social media by the Western-origin recruiters in Turkey, Syria and Iraq. These fighters were also supposedly guiding them on the travelling process to Syria.38 The use of popular Hashtags in Twitter to release major news and updates is a notable component in the propaganda machinery of ISIS.
In their radicalisation activities, a major use of social media by the extremist groups is to spread the graphic images and videos of atrocities of Muslims, particularly in Iraq, Syria and Palestine, among the sympathisers. Nowadays, videos and pictures of injured or dead children from Syria are heavily shared on social media sites like Facebook and Twitter with, in some cases, quite upsetting stories. This makes the audience to be increasingly sympathetic to the cause of the extremist groups. A noteworthy example is that of Colleen LaRose alias Jihad Jane who had unsuccessfully attempted to kill an allegedly blasphemous Swedish artist in 2008 and contributed to the financing of terrorist groups, was mainly influenced by the videos of torture and civilian casualties on YouTube, particularly against the Muslim children in Palestine and Iraq by the Israeli and US forces respectively.39 Often recruiters use some specific forums where the discussions are focused and specialised and where many young individuals, going through some sort of hardships in real lives, try to seek answers to spiritual questions related to life. Coming across the radical and often misinterpreted religious literature makes these individuals to be sympathetic to the cause of the extremist groups.40 At some stages, videos in YouTube containing lectures of radical Islamist scholars are shared with the supporters. Lectures
37 Different terrorist guidelines of recruitment, for example, Abu Amru Al Qa’idy, “A Course in the Art of
Recruiting”, 2010. 38 Michael King and Donald M. Taylor, op. cit., pp. 607-611. 39 Tom Holt, Joshua D. Freilich, Steven Chermak and Clark McCauley. “Political radicalization on the Internet: Extremist content, government control, and the power of victim and jihad videos”, Dynamics of Asymmetric Conflict, Vol. 8, No. 2, 2015, pp. 113-114. 40 Charvat, op. cit., pp. 82-83.
of prominent motivators like Anwar Al Awlaki leave a deep impact on the individuals because of their skillful persuasive techniques and make them more dedicated to the cause.41 The recruiters also use some online chatting applications where users can send encrypted messages, as evident through the use of Telegram by ISIS.
The radicalisation process of ISIS also includes an interesting feature to lure young men. The recruiters often compare the lifestyle of their fighters with that of the protagonists of the popular video games played by the young men and release posters, videos and memes through social media containing such messages asking them to join real wars instead of imitated games.42 Such propaganda is especially useful in attracting the individuals who seek excitement in their lives.
In recent years, the militant organisations have become more interested in
recruiting female members as they can be married to the male fighters which will
ultimately lure in more male fighters. The radicalisation of female recruits displays a bit
of different strategy with some common elements. The female members of ISIS also use
the social media to further promote the organisation among the female folk and try to
alter the typical views about the status of women in the ISIS occupied territories. Aqsa
Mahmood, an ISIS member who was influential in radicalising three British school girls
to join the organisation, used her blog page to explain that women can get their basic
amenities in ISIS occupied territories just like any other place in their own country.43
The ISIS female members also try to portray the romantic relationship with their new
husbands through the social media to assert that true love could be found only by
joining ISIS. One such member is Bird of Jannah (pseudonym), a Malaysian woman,
who used to post stories about her relationship with her ISIS fighter husband on her
Tumblr page, embracing poetic expressions about their romantic bond.44
4 . Outcomes: Shaping the New Breed of Militants
Radicalisation by the recruiters as well as the propaganda efforts by the militant groups make an individual more devoted to their ideology and more inclined towards committing violent acts to achieve the desired goals of the organisations. Some individuals act as ‘lone-wolves’ who are self-radicalised and do not join a militant organisation but carry out terrorist attacks within their capacities. Between 1993 and 2011, the percentage of online-radicalised lone-wolves increased from none to about 60 per cent (Figure 1). Since 2010, there has been a growing tendency by the terrorist groups to encourage lone wolf attacks, as evident in the issues of Al Qaeda’s
41 United Nations Office on Drugs and Crime, The use of the Internet for terrorist purposes, Vienna: Publishing
and Library Section, United Nations Office, 2012, pp. 35-36. 42 Simon Parkin, “How Isis hijacked pop culture, from Hollywood to video games”, The Guardian, 29 January 2016. 43 Jethro Mullen, “What is ISIS appeal for young people?”, CNN, 25 February 2015, available at http://edition. cnn.com/2015/02/25/middleeast/isis-kids-propaganda/, accessed on 10 December 2016. 44 Ellie Hall, “An ISIS Love Story: Till Martyrdom Do Us Part”, BuzzFeed News, 18 September 2014, available at https:// www.buzzfeed.com/ellievhall/an-isis-love-story-till-martyrdom-do-us part, accessed on 10 December 2016.
digital propaganda magazine the Inspire.45 Messages of these issues contain technical information about making a bomb ‘at home’ as well as comprehensive details on using different weapons and ammunition.46 The terrorist attack in San Bernardino, California in 2015 is one of the most significant incidents of such lone-wolf attacks in recent times. FBI investigations reveal that the perpetrators Rizwan Farook and Tashfeen Malik were “consuming poison on the Internet”, however, no further details have been released.47 There is a high possibility that this online poison must have been accessed through some social media platforms, most likely propagated by the ISIS
Some of the radicalised individuals directly join the terrorist groups as militants while others work indirectly to the cause of the groups. Such indirect activism includes providing funding to the terrorist organisation in carrying out their militant activities. Since 2013, such private funding has become a key source of financing for the militant groups as evident in the financing of the groups operating in Syria. 48 The private financiers usually use the social media platforms like Twitter to accumulate funds worth millions of dollars from the sympathisers around the world, which would be used to fund the purchase of weapons, grooming or nurturing new fighters or to support specific missions.49
45 Martin Rudner, “Electronic Jihad: The Internet as Al Qaeda’s Catalyst for Global Terror”, Studies in Conflict &
Terrorism , Vol. 40, No. 1, 2017, pp. 10-23. 46 Ibid. 47 Al Baker and Mark Santora, “San Bernardino Attackers Discussed Jihad in Private Messages, F.B.I. Says”, The New York Times, 16 December 2015. 48 Joby Warrick, “Private donations give edge to Islamists in Syria, officials say”, The Washington Post, 21 September 2013. 49 Ibid.
A major portion of the social media recruits works in the cyber-cells of the terrorist groups to extend the propaganda efforts on the Internet as well as radicalise others to join the organisation. Apart from the online propaganda and recruitment activities, the cyber cell members of the terrorist groups have now been indulging into defacing and breaching data of websites and online pages of different state agencies which could prove to be a massive threat to the global security. One such recruit was Junaid Hussain, a UK born hacker who worked for the Cyber Caliphate, the online propaganda wing of ISIS.50 Before being killed in an airstrike in August 2015, Hussain was involved in the hacking of the official Twitter and YouTube accounts of the US Central Command in January 2015 along with the online radicalisation and recruitment of several other fighters for ISIS.51 Reports indicate that he also worked to develop new hackers for the terrorist group and was believed to be capable of breaching the servers of banks and financial institutions to extort millions of dollars to fund their violent activities.52 According to a neighbour and long-time family friend, Hussain “was radicalised by a computer”53 referring to the possibilities of use of social media sites in his recruitment into the ISIS. In August of the same year, a group identifying themselves as Islamic State Hacking Division, published personal details of 1,400 military personnel and officials of influential state agencies of the US, allegedly by breaching the government databases.54 Although the US officials have denied having their server breached by the hackers, such disclosure of this crucial information is a serious threat to the safety of US military and government officials.
The Al Qaeda has also been making significant strides toward improving its cyber cell, though still not as efficient as ISIS. Initially, only being deployed as the digital propaganda and recruitment arm, the cyber activists of the organisation seem to be expanding their pursuit with the emergence of ‘Al Qaeda Electronic (AQE)’ in 2015, as the official cyber warfare branch of Al Qaeda led by Yahya Al Nemr. 55 The group is still believed to be at its infancy and has defaced some low value websites with few allegedly denial-of-service attacks.56 Here as well, the members of this hacking group could be recruited through social media as the group’s media wing, Al Maarek, uses its Facebook and Twitter pages to publicise their successful cyber operations.57 It is true that these cyber terrorist cells are yet to have sufficient capabilities to impose major
50 Kimiko De Freytas-Tamura, “Junaid Hussain, ISIS Recruiter, Reported Killed in Airstrike”, The New York Times,
27 August 2015.
51 Ibid. 52 Russell Myers, “Jihadist hackers targeting celebrity and business bank accounts to fund Islamic State terror
campaign”, The Mirror, 15 August 2014. 53 Nick Mccarthy, “Isis hacker Junaid Hussain ‘was radicalised by a computer’, neighbour claims”, Birmingham
Mail, 27 August 2015, available at http://www.birminghammail.co.uk/news/isis-hacker-junaid-hussainwas-9941768, accessed on 03 July 2017.
54 Michael Safi, “Isis ‘hacking division’ releases details of 1,400 Americans and urges attacks”, The Guardian,13
August 2015.
55 Eric Liu, Al Qaeda Electronic: A Sleeping Dog?, Critical Threats Project, Washington DC: American Enterprise
Institute, 2015, pp. 4-10.
56 Ibid.
57 Ibid. cyber offensives, affecting critical digital infrastructure around the world. However, there should be little doubt that they are gradually moving towards achieving that level of expertise and capacity to become a deadlier threat in the coming days.
5. Global Counterterrorism Strategies: Strength and Loopholes
To combat the growing menace of global terrorism, several states have begun to formulate counterterrorism strategies based on their needs and requirements. Usually, the counterterrorism efforts could be divided into two categories, hard approach and soft approach. The hard approach refers to the activities of military and security personnel involving into direct combat with the terrorist groups. The soft approach, on the other hand, includes a broad range of efforts to deny the terrorist recruitment of individuals by instigating counter narratives, addressing the grievances of the marginalised communities and improving the overall situation of the society to eradicate its vulnerability to militancy.
Since the 9/11, the US has been considering the threat of terrorism with an immense gravity and striving to frame an effective national counterterrorism strategy. Since 2001, the White House has published three editions of its national counterterrorism strategy – in 2003, 2006 and 2011. The latest one, National Strategy for Counterterrorism 2013, is yet to be publicly available. Not surprisingly, all these counterterrorism strategies are mostly directed towards the recent surge of religious terrorism by Islamist violent extremist groups. A key element of the counterterrorism strategy of the US is the development of the vulnerable societies in the forms of poverty alleviation, upholding the democratic environment, eradicating inequality and women and youth empowerment. These efforts could contribute to preventing the radicalisation of the people. The strategy also calls for providing necessary training and equipment to the vulnerable states who are the biggest victims of global
59 Cognitive bias is a psychological term that refers to the situation when an individual gives up rational
thinking after being influenced by social influence, emotional and moral motivations. 60 Siddharthya Roy, “A Year of Bangladesh’s War on Terror”, The Diplomat, 6 July 2017.
terrorism. A major change in the US strategy has been the promotion of and assistance in upholding good governance particularly in the terrorism affected countries. A notable instance is Afghanistan where the US is withdrawing its troops but continue to assist in the new governance system since the removal of the Taliban from power,61 perhaps resulting from a lesson drawn from the experience during the Soviet-Afghan War.
One thing the strategy has tried to make clear is that “The US is not and never will be at war with Islam”.62 Such messages will leave a dent on the propaganda movements by the violent extremist groups and make them losing their acceptance. However, the strategy clearly lacks a comprehensive approach to deal with the growing radicalisation and propaganda efforts by the extremist groups through social media. There has been no mention about any proposed surveillance or counter propaganda efforts. The Obama administration had accepted the shortcomings of their counterterrorism efforts in dealing with the increasingly stronger propaganda movements and decided to expand the activities of Center for Strategic Counterterrorism Communications under the Department of State63. In recent years, the US counterterrorism operations have been demonstrating a pattern of aerial strikes and drone attacks in the militant held areas.64 While these operations are indeed useful in eliminating some top militant commanders, the collateral damages caused by the aerial attacks in the form of scores of civilian casualties pretty much diminish the value of such operations. These civilian casualties are later used by the extremist groups in their propaganda drives which ultimately bolster their organisational strength.
The European Union (EU) has also formulated a comprehensive counterterrorism strategy based on four pillars - Prevent, Protect, Pursue and Respond.65 ‘Prevent’ emphasises on the tools and mechanisms to counter radicalisation and prevent the people from joining the extremist groups. ‘Protect’ calls for measures to boost up the institutional and infrastructural capabilities to ensure security from attacks. ‘Pursue’ deals with issues like intelligence and information sharing as well as border control to pursue the perpetrators. ‘Respond’ demonstrates the measures and policies to tackle the aftermath of a terrorist attack. Like the US, the counterterrorism strategy of EU also stresses the need for good governance, human rights, economic prosperity and intercultural dialogue to stop the radicalisation process. The most significant aspect of the EU counterterrorism strategy is the accentuation of cooperation among the member states of EU in the form of intelligence sharing, sharing of best practices as well as capacity building. The EU also appears to be a bit cautious about the radicalisation process going on the Internet. In 2015, the EU
61 The White House, National Security Strategy, Washington DC, 2015, p. 9. 62 The White House, National Strategy for Counterterrorism, Washington DC, 2011, p. 17. 63 Eric Schmitt, “US Intensifies Effort to Blunt ISIS’ Message”, The New York Times, 16 February 2015. 64 Rosa Brooks, “US Counterterrorism Strategy Is the Definition of Insanity”, Foreign Policy, 24 June 2015. 65 Council of the European Union, The European Union Counter-terrorism Strategy, Brussels, 2005, p. 3.
Internet Referral Unit was established by the Europol.66 The unit has identified 3,200 contents across 45 different platforms in the Internet, of which about 91 per cent have been removed.67 There is, however, a lot to be done, especially given the fact that several European youths are still joining militant groups like ISIS, being radicalised through the Internet.
The counterterrorism strategies of entities other than the US and EU are largely kept classified and not available publicly, which makes it difficult to analyse their effectiveness or weaknesses. However, through observing the actions of these countries, some elements of their strategies could be discerned. Because of its recent rise as an emerging super power, China’s counterterrorism strategy deserves a special scrutiny, which is based on the perceived ‘Three Evils’ – terrorism, separatism and religious fundamentalism.68 China’s counterterrorism efforts are mostly concentrated in the province of Xinjiang, witnessing a separatist movement by the ethnic Uyghur Muslims. The violent extremist groups operating in the region, most notably the Turkistan Islamic Party, also known as East Turkistan Islamic Movement (ETIM), are allegedly linked with Al Qaeda in the forms of training and funding of operations.69 China’s counterterrorism strategy has combined the characteristics of both ‘hard’ and ‘soft approaches’,70 evident in the frequent crackdowns on the militant groups along with efforts to ensure economic development. An important element of China’s counterterrorism strategy seems to be the censorship of cultural and media agencies, dedicated to blocking anti-state contents, as seen in the government approaches.71 The strategy also includes strict surveillance which has been manifested in the recent government policy of instructing the Muslim residents of Xinjiang to install a spyware in their mobile phones.72 These censorships and heavy surveillance could prove to be effective in keeping the propaganda materials of the terrorist organisations at bay. However, excessive censorships also violate the right to freedom of expression of the people while heavy surveillance will curb on their privacy. This situation could further alienate the Uyghur Muslims from the society, leading to the growing grievances and their eventual participation in violent extremist activities.
Among the African countries, Nigeria is one of the most severely affected states by terrorist activities. The most prominent violent extremist group operating
66 European Police Office, a law enforcement agency of the EU.
67 European Commission, Communication from the Commission to the European Parliament, Brussels, p. 7. 68 Chien Peng Chung, “Confronting terrorism and other evils in China : all quiet on the western front?” The China and Eurasia Forum Quarterly, Vol. 4, No. 2, 2006, pp. 77-78. 69 Phillip B. K. Potter, “Terrorism in China: Growing Threats with Global Implications”, Strategic Studies Quarterly, Vol. 7, No. 4, 2013, pp. 71-74. 70 Michael Clarke, “China, Xinjiang and the internationalisation of the Uyghur issue”, Global Change, Peace & Security, Vol. 22, No. 2, 2010, pp. 220-221. 71 Ibid. 72 Yi Shu Ng, “China is force-installing spyware onto Muslim citizens’ phones, to monitor them”, Mashable, 21 July 2017, available at http://mashable.com/2017/07/21/china-spyware-xinjiang/#Pn2_0cirzOqn, accessed on 01 August 2017.
in the country is Boko Haram, an ISIS-affiliated organisation73, notoriously known for its brutalities and widespread terrorist networks throughout Nigeria and in the neighbouring countries.74 Nigeria’s National Counter Terrorism Strategy (NACTEST) was first formulated in 2014 under the administration of President Goodluck Jonathan and have released one revised edition ever since.75 The NACTEST, on paper, does talk about soft approaches like counter radicalisation efforts to prevent the individuals from joining the terrorist groups, in the form of one of the five work streams of the strategy called ‘Forestall’. However, the ground realities suggest the government is more inclined towards the hard approach as seen in the massive military deployment in the affected regions as well as the austere security measures against the civilians.76 A major deficit of the NACTEST is that it fails to illustrate any proper guideline on the capacity building of the government institutions and the military, especially when the Nigerian military has been receiving widespread criticisms because of its alleged corruptions in the procurement of military equipment to combat the ongoing insurgencies.77
Some policy formulations over counterterrorism have also been conducted by the United Nations (UN). In 2001, the UN formed the Counter-Terrorism Committee (CTC) and in 2005, the member states of the General Assembly78 adopted the UN Global Counter-Terrorism Strategy which is reviewed in every two years. The strategy is based on four pillars stated as:79
1. Addressing conditions conducive to the spread of terrorism;
2. Preventing and combatting terrorism;
3. Building Member States’ capacity to prevent and combat terrorism and to strengthen the role of the United Nations system in this regard; and
4. Ensuring the respect for human rights for all and the rule of law as the fundamental basis for countering terrorism.
The article 12 under pillar II specially talks about the online activities by the extremist groups and calls for cooperation on international and regional level to
73 “IS welcomes Boko Haram allegiance: tape”, Yahoo News, 12 March 2015, available at https://www.yahoo.
com/news/accepts-allegiance-nigeria-jihadists-boko-haram-201513146.html, accessed on 03 July 2017. 74 Eugene Eji, “Rethinking Nigeria’s Counter-Terrorism Strategy”, The International Journal of Intelligence, Security, and Public Affairs, Vol. 18, No. 3, 2016, pp. 201-203. 75 Ibid., pp. 204-208. 76 Ibid. 77 Ibid., p. 61. 78 The General Assembly is one of the six principal organs of the UN where all the member states of the UN are included. 79 “United Nations Action To Counter Terrorism”, available at http://www.un.org/en/counterterrorism/, accessed on 10 December 2016.
combat it.80 The strategy, however, exhibits some major weaknesses; a notable one
is the lack of any clear definition for terms like terrorism, extremism or radicalisation,
following the trend in other counterterrorism strategies.
6. Way Forward
The countries and organisations like UN are yet to create a universal definition of radicalisation. The absence of such definition is a major obstacle in bringing in the recruiters and motivators of violent extremism to the court. To formulate effective laws, acts or conventions, there is no alternative to a proper definition of the crime. As it can be seen, the terror groups are increasingly becoming transnational. Universality of these definitions will make it easier for countries to cooperate in the judicial processes.
A major deficiency in the different counterterrorism strategies is the lack of proper and specific solution to counter the radicalisation process through Internet, especially the social media. Though not mentioned in the official strategies, countries do indulge in surveillance of the cyberspace and often takedown suspicious contents. The US, for example, have urged some internet companies to takedown contents by Anwar Al Awlaki, which have allegedly radicalised a large number of extremists to carry out violent acts.81 Though surveillance over the Internet is indeed necessary to ensure national and global security, the relevant agencies must also be careful that they do not violate the right to freedom of expression. Such violations could, in return, instigate new grievances among the youth and make them vulnerable to radicalisation. Proper space must be created to ensure the expression of opinions from all sorts of people, even for the sympathisers or supporters of extremist groups. Such a space will create an environment of constructive debates where people could counter the arguments of the extremists. In this way, the extremists will be bound to leave the path of violence. Besides, the freedom of press and media is also an essential component to build a pluralistic society. Extensive censorship of media causes the people to rely on alternative sources of news out of curiosity which often comes from questionable sources and contain misinformed views. Such alternative sources could also include contents produced by the terrorist organisations which would ultimately radicalise the individuals to hold violent extremist views.
A key to reach success in counterterrorism is the good relations between law enforcement agencies and the civilians. Trust on the law enforcement agencies is crucial in countering the radicalisation process. However, considering some recent events, it could be seen that the law enforcement agencies are dramatically losing their acceptance. In the US for example, the allegations of racial prejudice against the police have dented their image to a great extent. Such mistrust on the police could be one of the reasons behind the radicalisation of Afro-American youths in the US. In many developing countries, the law enforcement agencies are often used
80 “UN Global Counter Terrorism Strategy”, available at https://www.un.org/counterterrorism/ctitf/unglobal-counter-terrorism-strategy, accessed on 10 December 2016.
81 Scott Shane, “Internet Firms Urged to Limit Work of Anwar al-Awlaki”, The New York Times, 18 December 2015.
by the governments against the political opponents of the ruling parties. Such acts are also detrimental to the image of the law enforcement agencies which ultimately diminish the trust over the agencies. The counterterrorism strategies must include some effective provisions for enhancing the trust and relations between the law enforcement agencies and the civilians. The strategies should also embody elements of proper guidelines to ensure effective capacity building of the security agencies, especially in the developing countries. Such guidelines must have provisions for necessary modernisation of the forces as well as transparency and accountability in this effort to prevent misuse of the disbursed funds.
Effective intelligence sharing is also a vital element in the counterterrorism
efforts. However, there is a lack of effective cooperation among the states as far as
intelligence sharing is concerned. The US involves itself in extensive intelligence
sharing with several countries but refrain from such cooperation with countries like
Iran.82 Given Iran’s geopolitical location, intelligence sharing with this country will
provide some useful information regarding the extremist groups based in the Middle
East. The EU is also mainly concerned with intelligence sharing among its member
states and the US. Such constraints in intelligence sharing stem from the fear of
possible dissemination of information critical to their national interests. Countries
must get rid of such mistrust and should cooperate in extensive intelligence sharing
for effective counterterrorism operations.
7. Conclusion
The use of social media in the radicalisation process challenges the traditional notion that recruits of the extremist groups mainly belong to poor and less educated backgrounds. On the other hand, social media has left the extremist groups with bigger outreach and larger acceptance. The threat of global terrorism has become such a big challenge that it requires an equally strenuous effort. The counterterrorism strategies adopted by different countries in the world, indeed, have some useful suggestions and recommendations that could help to mitigate the spread of terrorism. But the existence of some key weaknesses is also a matter of great concern. Moreover, the modern terror organisations continue to change their strategies time to time to be adaptive to new challenges posed by the global counterterrorism forces. The current situation requires an innovative and prudent strategy to face the challenges of global terrorism.
82 Derek S. Reveron, “Counterterrorism and Intelligence Cooperation”, Journal of Global Change and
Governance, Vol. 1, No. 3, 2008, pp. 9-10.
There are numerous counterterrorism operations being carried out in
different parts of the world, involving heavily armed counterterrorism forces. But
the policymakers must understand the fact that only the ‘hard approach’ is not
going to help them. Effective measures to stop the radicalisation process must be
implemented to kill the root cause of the threat. The counterterrorism efforts must
remain a step ahead of the extremist groups to be adaptive to their changing tactics.
The radicalisation through social media is one such case of the changing tactics but
will not be limited to that. The policymakers must be innovative in predicting the
future scenario and formulating the ways to deal with it. While in many cases, there is
no alternative to military actions in the counterterrorism operations, the strategy to
such operations must ensure the minimum possible collateral damage. Such strategy
should not only look for immediate results but must also stay careful about long term
consequences