SlideShare a Scribd company logo
1 of 10
Fighting Terrorism
Online
“Arguably, the use of the Internet to radicalize and recruit
homegrown terrorists is the single most important
and dangerous novelty since the terrorist attacks of
September 11, 2001.”
BPC 2012 report, Countering Online Radicalization in America, p.47.
1)How Online Radicalization Works
2)How To Reduce The Supply
3)How To Reduce The Demand
4)How To Exploit Cyberspace
5)Recommendations
How Online Radicalization Works
When explaining how online radicalism works, the BPC’s report states that
there are “six processes and dynamics that explain online radicalism”. The
first two of these processes are:
1) The online process in which individuals are “immersed in extremist
content for extended periods of time”and which “increases support for
suicide operations and other, often excessively brutal, terrorist tactics”.
2) The online process in which individuals view “the powerful and
(often) emotionally arousing videos from conflict zones” which depict
“alleged incidents of torture, rape, and other atrocities by Western
troops” which “can induce a sense of moral outrage” and trigger
“mobilization into violent action”.
Terrorist?
Alfons Karg Nicole Mansfield
Nicole Mansfield
What kind of Terrorist is this?
» Alfons R. of Hamburg, Germany
(shown in this undated photo),
converted to Islam at age 17.
Later,he went to Turkey, then
Syria, to join ISIS. He was killed
this past summer.
One of at least 60 Germans killed
fighting alongside ISIS militants,
nine of them in suicide attacks,
according to German authorities.
Reducing the Supply
The report’s recommendations are as follows:
• Government should refrain from establishing nationwide filtering
systems.
• Government needs to retain its capability for aggressive
takedowns of foreign-based websites but only use it when doing
so is absolutely essential to stop a terrorist attack and/or prevent
the loss of life.
• The circumstances and legal framework governing the use of
cyber-attacks need to be clarified.
• Prosecutions against violent extremist Internet entrepreneurs
need to weigh the chances of success against the unintended
consequence of drawing attention to their ideas and
propaganda.
• Government should accelerate the establishment of informal
partnerships to assist large Internet companies in understanding
national security threats as well as trends and patterns in
terrorist propaganda and communication.
Reducing the Demand
The report’s recommendations are as follows:
• Government, in partnership with community groups, needs to continue
to expand programs and initiatives that create awareness and spread
information about online radicalization among educators, parents, and
communities.
• Government should serve as an enabler, bringing together the private
sector, foundations, philanthropists, and community groups to build
capacity and to help potentially credible messengers such as
mainstream groups, victims of terrorism, and other stakeholders to
become more effective at conveying their messages. The forthcoming
Internet strategy should spell out what the government will do and how
success will be measured.
• The government’s Internet strategy also needs to make clear what part
of government will coordinate capacity building, engagement, and
outreach efforts as well as what resources will be made available to
support this task.
• The government should encourage school authorities to review and
update their curricula on media literacy, consider violent extremism as
part of their instruction on child-safety issues, and develop relevant
training resources for teachers.
Reducing the Supply Redux
• The Government Needs to Aggressively Take Down Terrorist
Websites by Spearheading a Definition of Terrorism which Can Be
Universally Accepted and Does Not Provide First Amendment
Protection
• The BPC’s report states that: “For reasons raging from the political to
the practical, approaches that are aimed at reducing the supply of
violent extremist content on the internet are neither feasible nor
desirable.”
• BPC 2012 report, Countering Online Radicalization in America, p.8.
However, the report does make one recommend that modifies that
view: Government needs to retain its capability for aggressive
takedowns of foreign-based websites but only use it when doing so is
absolutely essential to stop a terrorist attack and/or prevent the loss of
life. Ibid.

More Related Content

Featured

PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...DevGAMM Conference
 

Featured (20)

Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 

Fighting Terrorism Online

  • 2. “Arguably, the use of the Internet to radicalize and recruit homegrown terrorists is the single most important and dangerous novelty since the terrorist attacks of September 11, 2001.” BPC 2012 report, Countering Online Radicalization in America, p.47.
  • 3. 1)How Online Radicalization Works 2)How To Reduce The Supply 3)How To Reduce The Demand 4)How To Exploit Cyberspace 5)Recommendations
  • 4. How Online Radicalization Works When explaining how online radicalism works, the BPC’s report states that there are “six processes and dynamics that explain online radicalism”. The first two of these processes are: 1) The online process in which individuals are “immersed in extremist content for extended periods of time”and which “increases support for suicide operations and other, often excessively brutal, terrorist tactics”. 2) The online process in which individuals view “the powerful and (often) emotionally arousing videos from conflict zones” which depict “alleged incidents of torture, rape, and other atrocities by Western troops” which “can induce a sense of moral outrage” and trigger “mobilization into violent action”.
  • 7. What kind of Terrorist is this? » Alfons R. of Hamburg, Germany (shown in this undated photo), converted to Islam at age 17. Later,he went to Turkey, then Syria, to join ISIS. He was killed this past summer. One of at least 60 Germans killed fighting alongside ISIS militants, nine of them in suicide attacks, according to German authorities.
  • 8. Reducing the Supply The report’s recommendations are as follows: • Government should refrain from establishing nationwide filtering systems. • Government needs to retain its capability for aggressive takedowns of foreign-based websites but only use it when doing so is absolutely essential to stop a terrorist attack and/or prevent the loss of life. • The circumstances and legal framework governing the use of cyber-attacks need to be clarified. • Prosecutions against violent extremist Internet entrepreneurs need to weigh the chances of success against the unintended consequence of drawing attention to their ideas and propaganda. • Government should accelerate the establishment of informal partnerships to assist large Internet companies in understanding national security threats as well as trends and patterns in terrorist propaganda and communication.
  • 9. Reducing the Demand The report’s recommendations are as follows: • Government, in partnership with community groups, needs to continue to expand programs and initiatives that create awareness and spread information about online radicalization among educators, parents, and communities. • Government should serve as an enabler, bringing together the private sector, foundations, philanthropists, and community groups to build capacity and to help potentially credible messengers such as mainstream groups, victims of terrorism, and other stakeholders to become more effective at conveying their messages. The forthcoming Internet strategy should spell out what the government will do and how success will be measured. • The government’s Internet strategy also needs to make clear what part of government will coordinate capacity building, engagement, and outreach efforts as well as what resources will be made available to support this task. • The government should encourage school authorities to review and update their curricula on media literacy, consider violent extremism as part of their instruction on child-safety issues, and develop relevant training resources for teachers.
  • 10. Reducing the Supply Redux • The Government Needs to Aggressively Take Down Terrorist Websites by Spearheading a Definition of Terrorism which Can Be Universally Accepted and Does Not Provide First Amendment Protection • The BPC’s report states that: “For reasons raging from the political to the practical, approaches that are aimed at reducing the supply of violent extremist content on the internet are neither feasible nor desirable.” • BPC 2012 report, Countering Online Radicalization in America, p.8. However, the report does make one recommend that modifies that view: Government needs to retain its capability for aggressive takedowns of foreign-based websites but only use it when doing so is absolutely essential to stop a terrorist attack and/or prevent the loss of life. Ibid.

Editor's Notes

  1. 310 625 0424