ISIS: STATE OF TERROR
LINKSBlogs of War
Making Sense of Jihad
Views from the Occident
American Al Qaeda Members
News, documents and analysis on violent extremism
Sunday, August 21, 2011
Hyping The Terrorist Internet: The "You Name It" ProblemAs most readers know, I have a healthy respect for the dangers of terrorist use of the Internet. But at the same time, I think U.S. media and policymakers tend to oversell the impact and uniqueness of how Al Qaeda and its admirers and adherents use the Web.
While reading Counterstrike: The Untold Story of America's Secret Campaign Against Al Qaeda it occurred to me that this is the "You Name It" Problem.
"General Abizaid was the Centcom commander and he essentially felt like we were losing daily, not just the broader battle of ideas, but we were losing the war in Iraq and Afghanistan because the way the terrorists dominate in either putting out beheadings or you just name it," said a counterterrorism official involved in the discussions.A paragraph or two later, Abaizaid is quoted directly:
Yet when you looked at the enemy, the enemy was moving in the cyberspace world in a way that allowed them to recruit, train, organize, equip, proselytize, educate -- you name it! -- conduct intelligence operations."Recruit, train, organize, equip, proselytize, educate -- you name it! -- conduct intelligence operations" is actually just "recruit, train, equip and conduct intelligence operations" when you remove redundancies. Serious, yes, but a shorter list.
Meanwhile, the phrase "you name it" is designed to invoke all manner of mysterious goings-on that we are encouraged not to actually name, so that they can remain mysterious.
The vast majority of work and activity taking place on extremist forums is the same activity that extremist networks engage in offline. The Internet is a magnifier and accelerator, as it is in other aspects of life, but it has not, for the most part, fundamentally changed the work of extremism.
Some things are easier, like exposing people to various sorts of training manuals in dangerous techniques. Other things are harder, like ensuring that recruits are actually competent to perform dangerous techniques. Inspire magazine is a terrorist magazine just like dozens of its predecessors. It's not something fundamentally new, it's just being distributed more efficiently and at lower cost.
We need to be concerned about the ways that Internet use expands the reach and speed of terrorist organizations, but we also need to stay grounded, understand the basics and describe them in clear and concrete ways.
During a recent conversation about the Internet as a "driver" of radical activities, I pointed out that terrorists used printed newsletters and magazines before there was an Internet. Yet no one talks about the role of paper in driving extremist activities.
The Internet is an important tool, but it's just a tool. We should be talking about WHAT extremists are doing online, rather than marveling at the fact they are doing it ONLINE.
For more about Internet radicalization, check out J.M. Berger's new book, Jihad Joe: Americans Who Go to War in the Name of Islam, on sale everywhere.
Views expressed on INTELWIRE are those of the author alone.
Tweets referencing this post:
"...smart, granular analysis..."ISIS: The State of Terror
"Jessica Stern and J.M. Berger's new book, "ISIS," should be required reading for every politician and policymaker... Their smart, granular analysis is a bracing antidote to both facile dismissals and wild exaggerations... a nuanced and readable account of the ideological and organizational origins of the group." -- Washington Post
More on ISIS: The State of Terror
"...a timely warning..."Jihad Joe: Americans Who Go to War in the Name of Islam:
"At a time when some politicians and pundits blur the line between Islam and terrorism, Berger, who knows this subject far better than the demagogues, sharply cautions against vilifying Muslim Americans. ... It is a timely warning from an expert who has not lost his perspective." -- New York Times
More on Jihad Joe
Finding A Way Forward For CVE
Oklahoma City Bombing: FBI Informants Reported on ...
9/11 Commission Memorandum on Relations with the T...
Unlocking 9/11: A Collection of Primary Source Doc...
1999 FBI Summary of Information, Khalid Shaikh Moh...
9/11 Commission Interview With Omar Al-Bayoumi
Listening to Anwar Awlaki
Jihad Joe, The New Book On American Jihadists, Now...
Who Really Inspired Nasser Abdo?
White House Strategy On Violent Extremism: Full Of...
New York Pipe Bomb Suspect Linked to Revolution Muslim
The Utility of Lone Wolves
Interview with Online Jihadist Abu Suleiman Al Nasser
A Way Forward for CVE: The Five Ds
How Terrorists Use The Internet: Just Like You
PATCON: The FBI's Secret War on the Militia Movement
Interview About Jihad With Controversial Cleric Bilal Philips
Forgeries on the Jihadist Forums
U.S. Gave Millions To Charity Linked To Al Qaeda, Anwar Awlaki
State Department Secretly Met With Followers of Blind Sheikh
State Department Put 'Political Pressure' On FBI To Deport Brother-in-Law Of Osama Bin Laden In 1995
FBI Records Reveal Details Of Nixon-Era Racial Profiling Program Targeting Arabs
Gaza Flotilla Official Was Foreign Fighter in Bosnia War
U.S. Had 'High Confidence' Of UBL Attack In June 2001
Behind the Handshake: The Rumsfeld-Saddam Meeting