SlideShare ist ein Scribd-Unternehmen logo
1 von 7
Austin Schiano- Professor Galliotti-Transnational Security- 12-08-14
Recommendation: In an effort to forestall the use of social media by belligerent non-
state actors, specifically the Islamic State of Iraq and Syria (ISIS), the United States
government must create stronger partnerships, and facilitate legal strategies with social
media corporations, that allow for greater censorship, and curtail the spread of: terrorist
propaganda, global outreach of terrorism, and terrorist communication.
I. Executive Summary
ISIS has redefined the ideology of global jihadism, moving away from the traditional
dogmatism of Al-Qaida, and toward a more inclusive engagement, in perpetrating and
orchestrating terror attacks. Social media, and various online technologies, have largely
aided in defining this shift of the organizations propaganda, communication, and
recruitment . Strengths in combatting ISIS’s online strategy include: social media
corporations being publicly owned and US based, along with an ability of to control site
content, current US legislation, and political leadership; weaknesses center on the
uncoordinated censorship measures across platforms, labor outsourcing, along with
speech and press restriction. Recommendations include: the United States government
working more closely with the private sector, coordination regarding the internet within
international institutions, further investment technology that disables communication,
and, as a last resort, measures of lethal force against ISIS via targeted bombing.
II. Assessment of the issue
A. The evolution of Islamic extremism and online technology
Other incarnations of Islamic extremists, have also strategically utilized the
internet. Al-Qaida’s internet actions in the early 2000’s however, were disseminated
through the means of a strict hierarchy. This meant that it relied upon the dogmatic
messaging of key figures such as Usama Bin Laden, to communicate with Al-Qaida
members abroad, through videos that re-affirmed the importance of centralized leadership
. The organization would then use the internet, to distribute information on: membership
protocol, ideology, strategy, and operations. This created the allusion of an almost
religious value being placed upon Al-Qaida leadership, creating an intentional disconnect
with subordinates and new recruits, who passively received instruction from top figures.1
It also made it significantly harder to join Al-Qaida.
The core foundation of ISIS challenges Al-Qaida’s structure, as developed by the
now deceased jihadist ideologue, Abu Musab al-Zarqawi. Zarqawi rejected the
dogmatism of Al-Qaida, moving authority away from the radical Islamist intelligentsia,
and toward soldiers fighting on the battlefield.2 ISIS has provided a means to utilize
1 Brachman,Jarret “TranscendingOrganization:Individuals and theIslamic State”,(START- National
Consortiumfor the Study of Terrorismand Responses to Terrorism, June 2014),at 3.
2 Zelin,Y Aaron “The War between ISIS and al-Qaeda for Supremacy of the Global JihadistMovement”(
The Washington Institutefor Near East Policy,June 2014),at 3.
aspects of social media to further this notion, using online technology, to redesign the
central model of directing communication in active combat, and recruitment. This creates
the opportunity for deeper radicalization, and more solidified commitment to ISIS’s
cause, within an exponentially reduced period of time. As individuals connect with ISIS,
they feel an increased sense of personal legitimacy and community, as they rise through
the ranks of ISIS communication. Likewise, ISIS has also masterfully utilized online
platforms, to exponentially spread propaganda material.
B. Detailing ISIS’s systemic use of Social Media
ISIS utilizes an advanced system of communication, which encourages discourse
between those on the frontline, those sympathetic to the organizations cause, and aspiring
members. The methodology of this interaction plays out across various levels of
engagement. The first step, consists of inspiring individuals with “visual propaganda”
distributed on Instagram, or similar platforms, that is meant to encourage the user to
follow a foreign fighter on Twitter. The organization’s anticipation is then, that after
following the individual on the frontline, the sympathizer will look to engage, in a
mediated communication, on Ask.fm, a site that allows users to pose anonymous
questions, to a given username. If there is mutual interest then, between the individual
and ISIS affiliates, to continue the conversation, the parties will utilize a private direct
message system such as: Kik, Surespot, or Skype direct Messenger. 3 It is generally at
this point, that the individual would join, or make a firm commitment, to ISIS and the
global jihadist movement. This process of communication of course, is not the only way
that ISIS interacts and recruits members. However, it highlights a tangible example of
how there are many levels of correspondence in this sytem, each level with a unique goal,
that requires an increase of trust and commitment by both ISIS and the individual.
In regard to the first step of the above process, what we can refer to as traditional
social media interaction, ISIS spreads their message with accounts that both represent the
group as a whole, and through those of members and supporters. A reason why ISIS is so
represented and accessible on social media platforms, is because of the value the
organization places on individual fighters, and not key leadership figures. This means that
if one account is deleted by a website, another account can easily spread the same
information, without breaking institutional protocol, or first seeking a higher level of
authorization from a leader. ISIS is collectively, active upon the platforms of: Facebook,
Twitter including certain English speaking jihadist’s utilizing the username
“#AmessagetoUSfromISIS”, Instagram instituting doctored photos that flout American
symbols of power (specifically an ISIS flag in front of the White House), You-Tube
Channels displaying videos such as the Hollywood-esque “Clanging of the Swords IV”,
along with the series of terrifying beheadings.4 ISIS has also shown great sophistication,
playing upon divisive moments in western culture, and engaging in radicalized messaging
when liberal moral superiority was under scrutiny, notably, the November protest’s in
3 Brachman,Jarret “TranscendingOrganization:Individualsand the IslamicState”,(START- National
Consortiumfor the Study of Terrorismand Responses to Terrorism, June 2014),at 3.
4 Brooking, Emerson “The ISIS Propaganda machine is Horrible and Effective. How Does It
Work?”(CFR, August 2014),at 1.
Ferguson Missouri. Also, ISIS shocked the world with the development of the now
revoked Android App, that, before it’s removal, served as an aggregate for all
information related to the actions of the organization.
III. Opportunities and Strengths in combatting ISIS online
 Facebook, Twitter, Instagram (owned by Facebook), Youtube (owned by
Google),Android Apps (approved by Google), and Skype (owned by Microsoft),
are all administered by private corporations, that have the resources and methods
to censor content.
 Facebook, Twitter, Google, and Microsoft, all have their headquarters in America.
 The above - mentioned corporations are all publicly owned, and traded, on the
New York Stock Exchange. This means, that if they do not want to cooperate with
the desired censorship measures, the government could publicize, in an
information campaign, the fact that terrorists are using social media outlets, that
this is a matter of national security, and thereby create instability in the market.
This would cause stock prices to drop, threaten global commerce, and pressure the
corporations into government compliance.
 Americans have been galvanized in the fight against ISIS, specifically with the
collective horror from the publicized beheadings of westerners, but are reluctant
of measures that require troops. This sort of partnership, or legislative strategy to
combat ISIS, and should not appear costly to the American population, and not
cause controversy.
 The United States government can utilize the framework of the 2001 Patriot Act,
to justify these efforts of increased censorship, or outright surveillance, at least
concerning the American domestic population.
 The Republicans have recently achieved a majority in Congress, and this political
party should be more supportive to such measures against terrorism.
IV. Weaknesses andChallenges in combatting ISIS online
 Facebook has traditionally been more pro active in censoring images of sexuality,
and hesitant in removing images of political meaning or violence.
 Facebook utilizes third party corporations to engage in censorship. This labor, has
largely been exported to Morocco, or South East-Asia, both of which have large
Muslim populations. ISIS could infiltrate these populations, co-opt individuals
who worked in these locations, and edit or learn from the way in which the
Facebook’s censorship occurs.
 Twitter is hesitant to censor controversial information in conflict zones, due to the
fact that the site has been viewed as a source of positive user generated content,
and “citizen reporting”, in fragile states and conflict zones. Examples of this
include Twitter’s role in the attempted Iranian revolution, and the Arab Spring.
 The KIK platform, does not currently have strongly developed measures of
censorship.
 The Ask.fm platform, due to the intentionally ambiguous nature of questions
posed on the site, does not have strongly developed measures of censorship.
 The government risks both international and public backlash, specifically from
journalists, for any social media censorship, as per claims that it limits free
speech, and freedom of the press. Such claims have already been expressed, in
previous instances, by non-government organizations, ex: Article 19.
V. Recommendations
 The United States government must work with domestic institutional structures,
which engage with private technological corporations to regulate social media.
 Increased supervision over social media, by the United States government, must
be conducted with the strictest scrutiny, and focus on cutting off the relationship
of those on the battlefield, with access to technology. This is integral, as
communication with those on the frontline, is key to both the structure and
legitimacy of the organization.
 The United States government must recognize that the activities of ISIS represent
a global threat to international peace and security. The United States should
utilize it’s status as a member-state of the United Nations, and member of the UN
Security Council, to spearhead and pressure the Internet Governance Forum, and
the International Telecommunication Union, and Global Network Initiative, all
affiliated UN entities, to co-opt expertise, and pledge support for global
censorship measures, against ISIS.
 The United States government must provide resources to research technologies
that can disable communication mechanisms.
 (In the case that the above point is not effective) The United States government
must use lethal force, preferably without the presence of soldiers (i.e. drones), to
destroy fighting ISIS members, and their centers of command, along with means
of communication.
VI. Bibliography
-Arthur, Charles. "Facebook's Nudity and Violence Guidelines Are Laid Bare Nipples
Are Rude but Crushed Limbs Are OK – a Document Leak Has Revealed the Social
Network's Attitudes to Sex and Violence." The Guardian. N.p., 21 Feb. 2012. Web.
-Berger, J.M. "How ISIS Games Twitter." The Atlantic. Atlantic Media Company, 16
June 2014. Web.
-Brachman, Jarret. "Transcending Organization: Individuals and the Islamic
State." START- National Consortium for the Study of Terrorism and Responses to
Terrorism (2014): n. pag. US Department of Homeland Security at the University of
Maryland, June 2014. Web.
-Brooking, Emerson. "The ISIS Propaganda Machine Is Horrifying and Effective. How
Does It Work?" Council on Foreign Relations. Council on Foreign Relations, 21 Aug.
2014. Web.
-"Censorship, Violence & Press Freedom." · What We Do · Article 19. N.p., 2014. Web.
-Chen, Adrian. "Facebook Releases New Content Guidelines, Now Allows Bodily
Fluids." Gawker. N.p., 16 Feb. 2012. Web.
-Chen, Adrian. "Inside Facebook's Outsourced Anti-Porn and Gore Brigade, Where
'Camel Toes' Are More Offensive Than 'Crushed Heads'"Gawker. N.p., 16 Feb. 2012.
Web.
-Efrati, Amir, and Loretta Chao. "Twitter Can Censor by Country Service Is Able to
Block Tweets Geographically, Marking Content as Withheld."The Wall Street Journal.
N.p., 28 Jan. 2012. Web.
-"Facebook Community Standards." Facebook. N.p., 2014. Web.
https://www.facebook.com/communitystandards
-Hall, John. "ISIS Supports Ferguson Protesters: Islamic Militants Pledge to Send over
'soldiers That Don't Sleep, Whose Drink Is Blood, and Their Play Is Carnage'" Mail
Online. Associated Newspapers, 26 Nov. 2014. Web.
-Hall, John. "'We Are Humans like You... Why Shouldn't We See Jumanji?': Bizarre
Twitter Outburst by ISIS Fighters Who Reveal Their Love of Robin Williams'
Blockbuster Hit." Mail Online. Associated Newspapers, 12 Aug. 2014. Web.
-Jackson, Benjamin F. "CENSORSHIP AND FREEDOM OF EXPRESSION IN THE
AGE OF FACEBOOK." New Mexico Law Review 44 (2014): 121-60. 1 Mar. 2014.
Web.
-Lazareva, Inna. "Now Available in the Android Store: An App for Terrorists." Vocativ.
N.p., 20 May 2014. Web.
-Levy, Racheal. "ISIS Tries to Outwit Social Networks." Vocativ. N.p., 17 June 2014.
Web.
-Morozov, Evgeny. The Net Delusion the Dark Side of Internet Freedom. New York:
PublicAffairs, 2011. Print.
-"New Pro-Islamic State Of Iraq And Syria (ISIS) ‘News’ App For Android, Available
At Google Play Store | The Cyber & Jihad Lab | Presented by MEMRI." The Cyber Jihad
Lab. N.p., 2014. Web.
-"Removal Requests." Twitter Transparency Report. Twitter, 2013. Web.
(January-June 2013) https://transparency.twitter.com/removal-requests/2013/jan-jun
-"Removal Requests." Twitter Transparency Report. Twitter, 2013. Web.
(July-December 2013) https://transparency.twitter.com/removal-requests/2013/jul-dec
-"Removal Requests." Twitter Transparency Report. Twitter, 2014. Web.
(January-June 2014) https://transparency.twitter.com/removal-requests/2014/jan-jun *It
is interesting to note that while these reports do provide a brief synopsis concerning the
content, and location of the tweets and accounts that were removed, there is no mention
made of ISIS. It would be telling, for further research endeavors, to see if Twitter lists the
removal of ISIS tweets, and from what location, in the July-December 2014 transparency
report.
-"Report an Inappropriate App." - Google Play Help. Google, 2014. Web.
-"Reporting & Enforcement." - Android Developer Help. Google, 2014. Web.
-Rich, Paul B., and Isabelle Duyvesteyn. The Routledge Handbook of Insurgency and
Counterinsurgency. London: Routledge, 2012. Print.
-Siegel, Jacob. "ISIS Is Using Social Media to Reach YOU, Its New Audience."The
Daily Beast. Newsweek/Daily Beast, 31 Aug. 2014. Web.
-Sloane, Garrett. "All Those Kik Pics From Strangers Will Now Be Blurred."AdWeek.
N.p., 20 May 2014. Web.
-S,M. "FaceBook Censorship- Arbitrary and Capricious." The Economist. The Economist
Newspaper, 28 Aug. 2014. Web.
-"Surveillance Under the USA PATRIOT Act." American Civil Liberties Union. ACLU,
10 Dec. 2010. Web.
-Thorton, Rod. Asymmetric Warfare. Cambridge: Polity, 2007. Print.
-Whittaker, Zack. "1,168 Keywords Skype Uses to Censor, Monitor Its Chinese Users |
ZDNet." ZDNet. N.p., 8 Mar. 2014. Web.
-York, Jillian C. "How Attempts to Silence ISIS Online Could Backfire." Slate Magazine.
Slate, 25 June 2014. Web.
-Zelin, Aaron Y. "The War between ISIS and Al-Qaeda for Supremacy of the Global
Jihadist Movement." Research Notes-The Washington Institute for Near East Policy 20
(2014): 1-8. The Washington Institute for Near East Policy, 2014. Web.

Weitere ähnliche Inhalte

Was ist angesagt?

Future_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESFuture_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESJenny O'Meara
 
Manipulating social media report compressed
Manipulating social media report compressedManipulating social media report compressed
Manipulating social media report compressedPLETZ.com -
 
Fake news learner packet
Fake news learner packetFake news learner packet
Fake news learner packetPhill Briscoe
 
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...Maurice Dawson
 
The Dark Side of Social Media
The Dark Side of Social MediaThe Dark Side of Social Media
The Dark Side of Social MediaAref Jdey
 
A Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy OnlineA Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy OnlineBrenden Brown
 
Content sharing-and-identity
Content sharing-and-identityContent sharing-and-identity
Content sharing-and-identityMadalina Balaban
 
COM 427 Social Media and Security
COM 427 Social Media and SecurityCOM 427 Social Media and Security
COM 427 Social Media and SecurityKyle Basedow
 
Lis4380 f13-w5
Lis4380 f13-w5Lis4380 f13-w5
Lis4380 f13-w5caseyyu
 
Facebook presentation
Facebook presentationFacebook presentation
Facebook presentationnrovi01
 
Social media censorship: beneficial or harmful?
Social media censorship: beneficial or harmful?Social media censorship: beneficial or harmful?
Social media censorship: beneficial or harmful?SholomStevenMorgan
 
Redes socialesarlet
Redes socialesarletRedes socialesarlet
Redes socialesarletarletjaraa
 
My Space Project
My Space ProjectMy Space Project
My Space ProjectPat Howarth
 
My Space Project
My Space ProjectMy Space Project
My Space ProjectPat Howarth
 
Peer Influence & Social Media Research Paper_A Watson
Peer Influence & Social Media Research Paper_A WatsonPeer Influence & Social Media Research Paper_A Watson
Peer Influence & Social Media Research Paper_A WatsonAlexandra Watson
 
Hum 140: Social Media: Privacy
Hum 140: Social Media: PrivacyHum 140: Social Media: Privacy
Hum 140: Social Media: PrivacyRay Brannon
 
Information & Intent: Optimizing Content and the User Search Experience
Information & Intent: Optimizing Content and the User Search ExperienceInformation & Intent: Optimizing Content and the User Search Experience
Information & Intent: Optimizing Content and the User Search ExperienceJonathan Mendez
 
Trust and privacy concern within social networking sites a comparison of fa...
Trust and privacy concern within social networking sites   a comparison of fa...Trust and privacy concern within social networking sites   a comparison of fa...
Trust and privacy concern within social networking sites a comparison of fa...Sohail Khan
 

Was ist angesagt? (19)

Future_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESFuture_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RES
 
Manipulating social media report compressed
Manipulating social media report compressedManipulating social media report compressed
Manipulating social media report compressed
 
Fake news learner packet
Fake news learner packetFake news learner packet
Fake news learner packet
 
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
 
The Dark Side of Social Media
The Dark Side of Social MediaThe Dark Side of Social Media
The Dark Side of Social Media
 
A Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy OnlineA Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy Online
 
Content sharing-and-identity
Content sharing-and-identityContent sharing-and-identity
Content sharing-and-identity
 
COM 427 Social Media and Security
COM 427 Social Media and SecurityCOM 427 Social Media and Security
COM 427 Social Media and Security
 
Lis4380 f13-w5
Lis4380 f13-w5Lis4380 f13-w5
Lis4380 f13-w5
 
Facebook presentation
Facebook presentationFacebook presentation
Facebook presentation
 
Social media censorship: beneficial or harmful?
Social media censorship: beneficial or harmful?Social media censorship: beneficial or harmful?
Social media censorship: beneficial or harmful?
 
Redes socialesarlet
Redes socialesarletRedes socialesarlet
Redes socialesarlet
 
My Space Project
My Space ProjectMy Space Project
My Space Project
 
My Space Project
My Space ProjectMy Space Project
My Space Project
 
The Digital Divide in the Post Snowden Era Presentation
The Digital Divide in the Post Snowden Era PresentationThe Digital Divide in the Post Snowden Era Presentation
The Digital Divide in the Post Snowden Era Presentation
 
Peer Influence & Social Media Research Paper_A Watson
Peer Influence & Social Media Research Paper_A WatsonPeer Influence & Social Media Research Paper_A Watson
Peer Influence & Social Media Research Paper_A Watson
 
Hum 140: Social Media: Privacy
Hum 140: Social Media: PrivacyHum 140: Social Media: Privacy
Hum 140: Social Media: Privacy
 
Information & Intent: Optimizing Content and the User Search Experience
Information & Intent: Optimizing Content and the User Search ExperienceInformation & Intent: Optimizing Content and the User Search Experience
Information & Intent: Optimizing Content and the User Search Experience
 
Trust and privacy concern within social networking sites a comparison of fa...
Trust and privacy concern within social networking sites   a comparison of fa...Trust and privacy concern within social networking sites   a comparison of fa...
Trust and privacy concern within social networking sites a comparison of fa...
 

Andere mochten auch

THE REAL FRESHMAN: 101
THE REAL FRESHMAN: 101THE REAL FRESHMAN: 101
THE REAL FRESHMAN: 101sferrill
 
Shipra Mishra Resume
Shipra Mishra ResumeShipra Mishra Resume
Shipra Mishra ResumeShipra Mishra
 
Seizing the agenda | Being data-informed and measuring what we value
Seizing the agenda | Being data-informed and measuring what we valueSeizing the agenda | Being data-informed and measuring what we value
Seizing the agenda | Being data-informed and measuring what we valueWholeeducation
 
безопасный интернет сш 2
безопасный интернет сш 2безопасный интернет сш 2
безопасный интернет сш 2tenshova
 
Seizing the Agenda | Establishing a shared culture between schools
Seizing the Agenda | Establishing a shared culture between schoolsSeizing the Agenda | Establishing a shared culture between schools
Seizing the Agenda | Establishing a shared culture between schoolsWholeeducation
 

Andere mochten auch (10)

THESIS-
THESIS-THESIS-
THESIS-
 
THE REAL FRESHMAN: 101
THE REAL FRESHMAN: 101THE REAL FRESHMAN: 101
THE REAL FRESHMAN: 101
 
Saddy's B'day PPT
Saddy's B'day PPTSaddy's B'day PPT
Saddy's B'day PPT
 
Thought for the_week_-_275
Thought for the_week_-_275Thought for the_week_-_275
Thought for the_week_-_275
 
Naftogaz annual-report-2015
Naftogaz annual-report-2015Naftogaz annual-report-2015
Naftogaz annual-report-2015
 
Genre theory
Genre theoryGenre theory
Genre theory
 
Shipra Mishra Resume
Shipra Mishra ResumeShipra Mishra Resume
Shipra Mishra Resume
 
Seizing the agenda | Being data-informed and measuring what we value
Seizing the agenda | Being data-informed and measuring what we valueSeizing the agenda | Being data-informed and measuring what we value
Seizing the agenda | Being data-informed and measuring what we value
 
безопасный интернет сш 2
безопасный интернет сш 2безопасный интернет сш 2
безопасный интернет сш 2
 
Seizing the Agenda | Establishing a shared culture between schools
Seizing the Agenda | Establishing a shared culture between schoolsSeizing the Agenda | Establishing a shared culture between schools
Seizing the Agenda | Establishing a shared culture between schools
 

Ähnlich wie Galliotti Policy Reccomendation ISIS and social media

Capstone_SingleSpaced
Capstone_SingleSpacedCapstone_SingleSpaced
Capstone_SingleSpacedCameron Banks
 
Katherine Neal_Case Study 2
Katherine Neal_Case Study 2Katherine Neal_Case Study 2
Katherine Neal_Case Study 2Kate Neal
 
Global TerrorismGVPT 406AbstractSocial M.docx
Global TerrorismGVPT 406AbstractSocial M.docxGlobal TerrorismGVPT 406AbstractSocial M.docx
Global TerrorismGVPT 406AbstractSocial M.docxbudbarber38650
 
Miami University_P2P_Submission
Miami University_P2P_SubmissionMiami University_P2P_Submission
Miami University_P2P_SubmissionKristen Koch
 
Brown and Beige Aesthetic Vintage Group Project Presentation.pdf
Brown and Beige Aesthetic Vintage Group Project Presentation.pdfBrown and Beige Aesthetic Vintage Group Project Presentation.pdf
Brown and Beige Aesthetic Vintage Group Project Presentation.pdfvenuspatatag4
 
POE 319 Term Paper IS recruitment...
POE 319 Term Paper IS recruitment...POE 319 Term Paper IS recruitment...
POE 319 Term Paper IS recruitment...Julia Wenger
 
Children Affected by the Foreign Fighter Phenomenon: Guidelines on the Preven...
Children Affected by the Foreign Fighter Phenomenon: Guidelines on the Preven...Children Affected by the Foreign Fighter Phenomenon: Guidelines on the Preven...
Children Affected by the Foreign Fighter Phenomenon: Guidelines on the Preven...Cecilia Polizzi
 
Prevention of Radicalization on Social Media and the Internet in this Digital...
Prevention of Radicalization on Social Media and the Internet in this Digital...Prevention of Radicalization on Social Media and the Internet in this Digital...
Prevention of Radicalization on Social Media and the Internet in this Digital...Cecilia Polizzi
 
How Social Media has Helped in the Spread of Radicalization
How Social Media has Helped in the Spread of RadicalizationHow Social Media has Helped in the Spread of Radicalization
How Social Media has Helped in the Spread of RadicalizationMuhammad Zahid Saeed
 
1Current Events Case StudyUMGAnthony Bahlman11.docx
1Current Events Case StudyUMGAnthony Bahlman11.docx1Current Events Case StudyUMGAnthony Bahlman11.docx
1Current Events Case StudyUMGAnthony Bahlman11.docxrobert345678
 
45SpringSummer 2010 • volume xvi, issue ii45Copyr.docx
45SpringSummer 2010 • volume xvi, issue ii45Copyr.docx45SpringSummer 2010 • volume xvi, issue ii45Copyr.docx
45SpringSummer 2010 • volume xvi, issue ii45Copyr.docxgilbertkpeters11344
 
Social Media- A gateway to world domination
Social Media- A gateway to world dominationSocial Media- A gateway to world domination
Social Media- A gateway to world dominationKrishna Vijaywargiy
 
Final_paper_revised
Final_paper_revisedFinal_paper_revised
Final_paper_revisedRicky Hemant
 
Social Media and PoliticsLearning objectivesLearning objec.docx
Social Media and PoliticsLearning objectivesLearning objec.docxSocial Media and PoliticsLearning objectivesLearning objec.docx
Social Media and PoliticsLearning objectivesLearning objec.docxjensgosney
 
TO EACH POST MIN 100 WORDS In.docx
TO EACH POST MIN 100 WORDS In.docxTO EACH POST MIN 100 WORDS In.docx
TO EACH POST MIN 100 WORDS In.docxwrite31
 
64The Empire Strikes Back Social Media Uprisings and .docx
64The Empire Strikes Back Social Media Uprisings and .docx64The Empire Strikes Back Social Media Uprisings and .docx
64The Empire Strikes Back Social Media Uprisings and .docxevonnehoggarth79783
 
Targeted disinformation warfare how and why foreign efforts are
Targeted disinformation warfare  how and why foreign efforts areTargeted disinformation warfare  how and why foreign efforts are
Targeted disinformation warfare how and why foreign efforts arearchiejones4
 

Ähnlich wie Galliotti Policy Reccomendation ISIS and social media (20)

Capstone_SingleSpaced
Capstone_SingleSpacedCapstone_SingleSpaced
Capstone_SingleSpaced
 
Katherine Neal_Case Study 2
Katherine Neal_Case Study 2Katherine Neal_Case Study 2
Katherine Neal_Case Study 2
 
Global TerrorismGVPT 406AbstractSocial M.docx
Global TerrorismGVPT 406AbstractSocial M.docxGlobal TerrorismGVPT 406AbstractSocial M.docx
Global TerrorismGVPT 406AbstractSocial M.docx
 
Miami University_P2P_Submission
Miami University_P2P_SubmissionMiami University_P2P_Submission
Miami University_P2P_Submission
 
Brown and Beige Aesthetic Vintage Group Project Presentation.pdf
Brown and Beige Aesthetic Vintage Group Project Presentation.pdfBrown and Beige Aesthetic Vintage Group Project Presentation.pdf
Brown and Beige Aesthetic Vintage Group Project Presentation.pdf
 
POE 319 Term Paper IS recruitment...
POE 319 Term Paper IS recruitment...POE 319 Term Paper IS recruitment...
POE 319 Term Paper IS recruitment...
 
567 bruce
567 bruce567 bruce
567 bruce
 
Children Affected by the Foreign Fighter Phenomenon: Guidelines on the Preven...
Children Affected by the Foreign Fighter Phenomenon: Guidelines on the Preven...Children Affected by the Foreign Fighter Phenomenon: Guidelines on the Preven...
Children Affected by the Foreign Fighter Phenomenon: Guidelines on the Preven...
 
Prevention of Radicalization on Social Media and the Internet in this Digital...
Prevention of Radicalization on Social Media and the Internet in this Digital...Prevention of Radicalization on Social Media and the Internet in this Digital...
Prevention of Radicalization on Social Media and the Internet in this Digital...
 
How Social Media has Helped in the Spread of Radicalization
How Social Media has Helped in the Spread of RadicalizationHow Social Media has Helped in the Spread of Radicalization
How Social Media has Helped in the Spread of Radicalization
 
1Current Events Case StudyUMGAnthony Bahlman11.docx
1Current Events Case StudyUMGAnthony Bahlman11.docx1Current Events Case StudyUMGAnthony Bahlman11.docx
1Current Events Case StudyUMGAnthony Bahlman11.docx
 
45SpringSummer 2010 • volume xvi, issue ii45Copyr.docx
45SpringSummer 2010 • volume xvi, issue ii45Copyr.docx45SpringSummer 2010 • volume xvi, issue ii45Copyr.docx
45SpringSummer 2010 • volume xvi, issue ii45Copyr.docx
 
Social Media- A gateway to world domination
Social Media- A gateway to world dominationSocial Media- A gateway to world domination
Social Media- A gateway to world domination
 
Final_paper_revised
Final_paper_revisedFinal_paper_revised
Final_paper_revised
 
Social Media and PoliticsLearning objectivesLearning objec.docx
Social Media and PoliticsLearning objectivesLearning objec.docxSocial Media and PoliticsLearning objectivesLearning objec.docx
Social Media and PoliticsLearning objectivesLearning objec.docx
 
Essay On Terrorism In India
Essay On Terrorism In IndiaEssay On Terrorism In India
Essay On Terrorism In India
 
Terrorism and business
Terrorism and businessTerrorism and business
Terrorism and business
 
TO EACH POST MIN 100 WORDS In.docx
TO EACH POST MIN 100 WORDS In.docxTO EACH POST MIN 100 WORDS In.docx
TO EACH POST MIN 100 WORDS In.docx
 
64The Empire Strikes Back Social Media Uprisings and .docx
64The Empire Strikes Back Social Media Uprisings and .docx64The Empire Strikes Back Social Media Uprisings and .docx
64The Empire Strikes Back Social Media Uprisings and .docx
 
Targeted disinformation warfare how and why foreign efforts are
Targeted disinformation warfare  how and why foreign efforts areTargeted disinformation warfare  how and why foreign efforts are
Targeted disinformation warfare how and why foreign efforts are
 

Galliotti Policy Reccomendation ISIS and social media

  • 1. Austin Schiano- Professor Galliotti-Transnational Security- 12-08-14 Recommendation: In an effort to forestall the use of social media by belligerent non- state actors, specifically the Islamic State of Iraq and Syria (ISIS), the United States government must create stronger partnerships, and facilitate legal strategies with social media corporations, that allow for greater censorship, and curtail the spread of: terrorist propaganda, global outreach of terrorism, and terrorist communication. I. Executive Summary ISIS has redefined the ideology of global jihadism, moving away from the traditional dogmatism of Al-Qaida, and toward a more inclusive engagement, in perpetrating and orchestrating terror attacks. Social media, and various online technologies, have largely aided in defining this shift of the organizations propaganda, communication, and recruitment . Strengths in combatting ISIS’s online strategy include: social media corporations being publicly owned and US based, along with an ability of to control site content, current US legislation, and political leadership; weaknesses center on the uncoordinated censorship measures across platforms, labor outsourcing, along with speech and press restriction. Recommendations include: the United States government working more closely with the private sector, coordination regarding the internet within international institutions, further investment technology that disables communication, and, as a last resort, measures of lethal force against ISIS via targeted bombing. II. Assessment of the issue A. The evolution of Islamic extremism and online technology Other incarnations of Islamic extremists, have also strategically utilized the internet. Al-Qaida’s internet actions in the early 2000’s however, were disseminated through the means of a strict hierarchy. This meant that it relied upon the dogmatic messaging of key figures such as Usama Bin Laden, to communicate with Al-Qaida members abroad, through videos that re-affirmed the importance of centralized leadership . The organization would then use the internet, to distribute information on: membership protocol, ideology, strategy, and operations. This created the allusion of an almost religious value being placed upon Al-Qaida leadership, creating an intentional disconnect with subordinates and new recruits, who passively received instruction from top figures.1 It also made it significantly harder to join Al-Qaida. The core foundation of ISIS challenges Al-Qaida’s structure, as developed by the now deceased jihadist ideologue, Abu Musab al-Zarqawi. Zarqawi rejected the dogmatism of Al-Qaida, moving authority away from the radical Islamist intelligentsia, and toward soldiers fighting on the battlefield.2 ISIS has provided a means to utilize 1 Brachman,Jarret “TranscendingOrganization:Individuals and theIslamic State”,(START- National Consortiumfor the Study of Terrorismand Responses to Terrorism, June 2014),at 3. 2 Zelin,Y Aaron “The War between ISIS and al-Qaeda for Supremacy of the Global JihadistMovement”( The Washington Institutefor Near East Policy,June 2014),at 3.
  • 2. aspects of social media to further this notion, using online technology, to redesign the central model of directing communication in active combat, and recruitment. This creates the opportunity for deeper radicalization, and more solidified commitment to ISIS’s cause, within an exponentially reduced period of time. As individuals connect with ISIS, they feel an increased sense of personal legitimacy and community, as they rise through the ranks of ISIS communication. Likewise, ISIS has also masterfully utilized online platforms, to exponentially spread propaganda material. B. Detailing ISIS’s systemic use of Social Media ISIS utilizes an advanced system of communication, which encourages discourse between those on the frontline, those sympathetic to the organizations cause, and aspiring members. The methodology of this interaction plays out across various levels of engagement. The first step, consists of inspiring individuals with “visual propaganda” distributed on Instagram, or similar platforms, that is meant to encourage the user to follow a foreign fighter on Twitter. The organization’s anticipation is then, that after following the individual on the frontline, the sympathizer will look to engage, in a mediated communication, on Ask.fm, a site that allows users to pose anonymous questions, to a given username. If there is mutual interest then, between the individual and ISIS affiliates, to continue the conversation, the parties will utilize a private direct message system such as: Kik, Surespot, or Skype direct Messenger. 3 It is generally at this point, that the individual would join, or make a firm commitment, to ISIS and the global jihadist movement. This process of communication of course, is not the only way that ISIS interacts and recruits members. However, it highlights a tangible example of how there are many levels of correspondence in this sytem, each level with a unique goal, that requires an increase of trust and commitment by both ISIS and the individual. In regard to the first step of the above process, what we can refer to as traditional social media interaction, ISIS spreads their message with accounts that both represent the group as a whole, and through those of members and supporters. A reason why ISIS is so represented and accessible on social media platforms, is because of the value the organization places on individual fighters, and not key leadership figures. This means that if one account is deleted by a website, another account can easily spread the same information, without breaking institutional protocol, or first seeking a higher level of authorization from a leader. ISIS is collectively, active upon the platforms of: Facebook, Twitter including certain English speaking jihadist’s utilizing the username “#AmessagetoUSfromISIS”, Instagram instituting doctored photos that flout American symbols of power (specifically an ISIS flag in front of the White House), You-Tube Channels displaying videos such as the Hollywood-esque “Clanging of the Swords IV”, along with the series of terrifying beheadings.4 ISIS has also shown great sophistication, playing upon divisive moments in western culture, and engaging in radicalized messaging when liberal moral superiority was under scrutiny, notably, the November protest’s in 3 Brachman,Jarret “TranscendingOrganization:Individualsand the IslamicState”,(START- National Consortiumfor the Study of Terrorismand Responses to Terrorism, June 2014),at 3. 4 Brooking, Emerson “The ISIS Propaganda machine is Horrible and Effective. How Does It Work?”(CFR, August 2014),at 1.
  • 3. Ferguson Missouri. Also, ISIS shocked the world with the development of the now revoked Android App, that, before it’s removal, served as an aggregate for all information related to the actions of the organization. III. Opportunities and Strengths in combatting ISIS online  Facebook, Twitter, Instagram (owned by Facebook), Youtube (owned by Google),Android Apps (approved by Google), and Skype (owned by Microsoft), are all administered by private corporations, that have the resources and methods to censor content.  Facebook, Twitter, Google, and Microsoft, all have their headquarters in America.  The above - mentioned corporations are all publicly owned, and traded, on the New York Stock Exchange. This means, that if they do not want to cooperate with the desired censorship measures, the government could publicize, in an information campaign, the fact that terrorists are using social media outlets, that this is a matter of national security, and thereby create instability in the market. This would cause stock prices to drop, threaten global commerce, and pressure the corporations into government compliance.  Americans have been galvanized in the fight against ISIS, specifically with the collective horror from the publicized beheadings of westerners, but are reluctant of measures that require troops. This sort of partnership, or legislative strategy to combat ISIS, and should not appear costly to the American population, and not cause controversy.  The United States government can utilize the framework of the 2001 Patriot Act, to justify these efforts of increased censorship, or outright surveillance, at least concerning the American domestic population.  The Republicans have recently achieved a majority in Congress, and this political party should be more supportive to such measures against terrorism. IV. Weaknesses andChallenges in combatting ISIS online  Facebook has traditionally been more pro active in censoring images of sexuality, and hesitant in removing images of political meaning or violence.  Facebook utilizes third party corporations to engage in censorship. This labor, has largely been exported to Morocco, or South East-Asia, both of which have large Muslim populations. ISIS could infiltrate these populations, co-opt individuals who worked in these locations, and edit or learn from the way in which the Facebook’s censorship occurs.  Twitter is hesitant to censor controversial information in conflict zones, due to the fact that the site has been viewed as a source of positive user generated content,
  • 4. and “citizen reporting”, in fragile states and conflict zones. Examples of this include Twitter’s role in the attempted Iranian revolution, and the Arab Spring.  The KIK platform, does not currently have strongly developed measures of censorship.  The Ask.fm platform, due to the intentionally ambiguous nature of questions posed on the site, does not have strongly developed measures of censorship.  The government risks both international and public backlash, specifically from journalists, for any social media censorship, as per claims that it limits free speech, and freedom of the press. Such claims have already been expressed, in previous instances, by non-government organizations, ex: Article 19. V. Recommendations  The United States government must work with domestic institutional structures, which engage with private technological corporations to regulate social media.  Increased supervision over social media, by the United States government, must be conducted with the strictest scrutiny, and focus on cutting off the relationship of those on the battlefield, with access to technology. This is integral, as communication with those on the frontline, is key to both the structure and legitimacy of the organization.  The United States government must recognize that the activities of ISIS represent a global threat to international peace and security. The United States should utilize it’s status as a member-state of the United Nations, and member of the UN Security Council, to spearhead and pressure the Internet Governance Forum, and the International Telecommunication Union, and Global Network Initiative, all affiliated UN entities, to co-opt expertise, and pledge support for global censorship measures, against ISIS.  The United States government must provide resources to research technologies that can disable communication mechanisms.  (In the case that the above point is not effective) The United States government must use lethal force, preferably without the presence of soldiers (i.e. drones), to destroy fighting ISIS members, and their centers of command, along with means of communication.
  • 5. VI. Bibliography -Arthur, Charles. "Facebook's Nudity and Violence Guidelines Are Laid Bare Nipples Are Rude but Crushed Limbs Are OK – a Document Leak Has Revealed the Social Network's Attitudes to Sex and Violence." The Guardian. N.p., 21 Feb. 2012. Web. -Berger, J.M. "How ISIS Games Twitter." The Atlantic. Atlantic Media Company, 16 June 2014. Web. -Brachman, Jarret. "Transcending Organization: Individuals and the Islamic State." START- National Consortium for the Study of Terrorism and Responses to Terrorism (2014): n. pag. US Department of Homeland Security at the University of Maryland, June 2014. Web. -Brooking, Emerson. "The ISIS Propaganda Machine Is Horrifying and Effective. How Does It Work?" Council on Foreign Relations. Council on Foreign Relations, 21 Aug. 2014. Web. -"Censorship, Violence & Press Freedom." · What We Do · Article 19. N.p., 2014. Web. -Chen, Adrian. "Facebook Releases New Content Guidelines, Now Allows Bodily Fluids." Gawker. N.p., 16 Feb. 2012. Web. -Chen, Adrian. "Inside Facebook's Outsourced Anti-Porn and Gore Brigade, Where 'Camel Toes' Are More Offensive Than 'Crushed Heads'"Gawker. N.p., 16 Feb. 2012. Web. -Efrati, Amir, and Loretta Chao. "Twitter Can Censor by Country Service Is Able to Block Tweets Geographically, Marking Content as Withheld."The Wall Street Journal. N.p., 28 Jan. 2012. Web. -"Facebook Community Standards." Facebook. N.p., 2014. Web. https://www.facebook.com/communitystandards -Hall, John. "ISIS Supports Ferguson Protesters: Islamic Militants Pledge to Send over 'soldiers That Don't Sleep, Whose Drink Is Blood, and Their Play Is Carnage'" Mail Online. Associated Newspapers, 26 Nov. 2014. Web. -Hall, John. "'We Are Humans like You... Why Shouldn't We See Jumanji?': Bizarre Twitter Outburst by ISIS Fighters Who Reveal Their Love of Robin Williams' Blockbuster Hit." Mail Online. Associated Newspapers, 12 Aug. 2014. Web.
  • 6. -Jackson, Benjamin F. "CENSORSHIP AND FREEDOM OF EXPRESSION IN THE AGE OF FACEBOOK." New Mexico Law Review 44 (2014): 121-60. 1 Mar. 2014. Web. -Lazareva, Inna. "Now Available in the Android Store: An App for Terrorists." Vocativ. N.p., 20 May 2014. Web. -Levy, Racheal. "ISIS Tries to Outwit Social Networks." Vocativ. N.p., 17 June 2014. Web. -Morozov, Evgeny. The Net Delusion the Dark Side of Internet Freedom. New York: PublicAffairs, 2011. Print. -"New Pro-Islamic State Of Iraq And Syria (ISIS) ‘News’ App For Android, Available At Google Play Store | The Cyber & Jihad Lab | Presented by MEMRI." The Cyber Jihad Lab. N.p., 2014. Web. -"Removal Requests." Twitter Transparency Report. Twitter, 2013. Web. (January-June 2013) https://transparency.twitter.com/removal-requests/2013/jan-jun -"Removal Requests." Twitter Transparency Report. Twitter, 2013. Web. (July-December 2013) https://transparency.twitter.com/removal-requests/2013/jul-dec -"Removal Requests." Twitter Transparency Report. Twitter, 2014. Web. (January-June 2014) https://transparency.twitter.com/removal-requests/2014/jan-jun *It is interesting to note that while these reports do provide a brief synopsis concerning the content, and location of the tweets and accounts that were removed, there is no mention made of ISIS. It would be telling, for further research endeavors, to see if Twitter lists the removal of ISIS tweets, and from what location, in the July-December 2014 transparency report. -"Report an Inappropriate App." - Google Play Help. Google, 2014. Web. -"Reporting & Enforcement." - Android Developer Help. Google, 2014. Web. -Rich, Paul B., and Isabelle Duyvesteyn. The Routledge Handbook of Insurgency and Counterinsurgency. London: Routledge, 2012. Print. -Siegel, Jacob. "ISIS Is Using Social Media to Reach YOU, Its New Audience."The Daily Beast. Newsweek/Daily Beast, 31 Aug. 2014. Web.
  • 7. -Sloane, Garrett. "All Those Kik Pics From Strangers Will Now Be Blurred."AdWeek. N.p., 20 May 2014. Web. -S,M. "FaceBook Censorship- Arbitrary and Capricious." The Economist. The Economist Newspaper, 28 Aug. 2014. Web. -"Surveillance Under the USA PATRIOT Act." American Civil Liberties Union. ACLU, 10 Dec. 2010. Web. -Thorton, Rod. Asymmetric Warfare. Cambridge: Polity, 2007. Print. -Whittaker, Zack. "1,168 Keywords Skype Uses to Censor, Monitor Its Chinese Users | ZDNet." ZDNet. N.p., 8 Mar. 2014. Web. -York, Jillian C. "How Attempts to Silence ISIS Online Could Backfire." Slate Magazine. Slate, 25 June 2014. Web. -Zelin, Aaron Y. "The War between ISIS and Al-Qaeda for Supremacy of the Global Jihadist Movement." Research Notes-The Washington Institute for Near East Policy 20 (2014): 1-8. The Washington Institute for Near East Policy, 2014. Web.