Online Terrorist Propaganda, Recruitment, and Radicalization
eBook - ePub

Online Terrorist Propaganda, Recruitment, and Radicalization

  1. 504 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Online Terrorist Propaganda, Recruitment, and Radicalization

About this book

Online Terrorist Propaganda, Recruitment, and Radicalization is most complete treatment of the rapidly growing phenomenon of how terrorists' online presence is utilized for terrorism funding, communication, and recruitment purposes. The book offers an in-depth coverage of the history and development of online "footprints" to target new converts, broaden their messaging, and increase their influence. Chapters present the emergence of various groups; the advancement of terrorist groups' online presences; their utilization of video, chat room, and social media; and the current capability for propaganda, training, and recruitment.

With contributions from leading experts in the field—including practitioners and terrorism researchers—the coverage moves from general factors to specific groups practices as relate to Islamic State of Iraq and the Levant (ISIL), and numerous other groups. Chapters also examine the lone wolf phenomenon as a part of the disturbing trend of self-radicalization. A functional, real-world approach is used regarding the classification of the means and methods by which an online presence is often utilized to promote and support acts of terrorism.

Online Terrorist Propaganda, Recruitment, and Radicalization examines practical solutions in identifying the threat posed by terrorist propaganda and U.S. government efforts to counter it, with a particular focus on ISIS, the Dark Web, national and international measures to identify, thwart, and prosecute terrorist activities online. As such, it will be an invaluable resources for intelligence professionals, terrorism and counterterrorism professionals, those researching terrorism funding, and policy makers looking to restrict the spread of terrorism propaganda online.

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Online Terrorist Propaganda, Recruitment, and Radicalization by John R. Vacca in PDF and/or ePUB format, as well as other popular books in Politics & International Relations & Computer Science General. We have over one million books available in our catalogue for you to explore.

Section V

Online Terrorist Propaganda

Chapter 14

Metaphors of Radicalization

A Computational and Qualitative Analysis of Jihadi Propaganda
Ben Miller , Weeda Mehran , Yassin Kosay Alsahlani , and Haroon Qahtan
CONTENTS
14.1 Introduction
14.2 Background on Online Radicalization
14.3 Linguistic and Psychological Models of Radicalization
14.3.1 What Is the IMB Model and How Does It Relate to Radicalization?
14.3.2 How Does Conceptual Metaphor Function in Relation to Radicalization?
14.3.3 Technical Literature on NLP
14.3.4 Metaphor Identification and Classification
14.4 Where and How the Islamic State Writes
14.4.1 Operationalization of IMB
14.5 Patterns of Metaphor in Jihadi Propaganda
14.6 Summary
Notes
References

14.1 Introduction

Radicalization of individuals to violent action or the support of violent action presents an almost impossibly complex problem for study. It can take place across any medium or set of media, on the scale of a purposeful global propaganda campaign in multiple languages or by accident via unrecorded one-on-one conversations. It can take place over the course of long periods of time, or in an afternoon. The consequences of radicalized individuals and institutions, however, are concrete and drastic. Radicalized individuals have committed attacks on public transit systems, in public and private buildings, and against peaceful gatherings of civilians worldwide. In the period from January 2011 to June 2015, a study found that there were 69 terrorism plots in Europe, North America, and Australia. Overall, 19 of those plots came to fruition. The study goes on to argue that 30 had a declared connection to the Islamic State, and that plots with an IS connection were twice as likely than plots not connected to IS to move from planning to practice [1]. Ingram [2] interprets this information to suggest that it is in part the persuasive efficacy of the IS media campaign that led to this increased likelihood of execution, while Hegghammer and Nesser suggest that undercover operatives themselves may have precipitated the higher likelihood of a plot moving beyond the planning stage [1]. The conventional wisdom put forward by Ingram, that propaganda contributes to radicalization, is pervasive throughout the literature on atrocities [3 –5]. Understanding how messages that incite radicalization are composed, structured, and function to radicalize individuals such that they are more willing to further political agendas through violent, unidirectional means may help efforts to reduce the effectiveness of this kind of messaging.
In this study, we examine the writing produced by various Islamic State affiliates in English so as to disentangle the relationship between the writing and radicalization. Our examination of written propaganda focuses on their use of metaphors. We do so because as Steuter and Willis argue in their study, At War with Metaphor, ā€œthe metaphors we use reflect and reflexively shape our thinking.ā€ They go further, indicating the kinds of metaphors typically used to radicalize; ā€œ[t]he massacres and genocides that comprise our most painful historical moments are characterized by a persistent dehumanization of the enemy,ā€ and ā€œ[l]anguage itself, in the way it invites us to understand both the enemy and ourselves, becomes a potential weaponā€ [6]. Most significantly, they state, ā€œ[i]t is language, rather than logic, that summons us through its emotional affect to a war we can no longer justify.ā€
In tracing the role of metaphor in the propaganda efforts of the Islamic State and its affiliates, our research bridges two bodies of theory. The first, conceptual metaphor theory [7], describes how language functions to communicate ideas by connecting a concept in one abstract domain via references to ideas in another more concrete domain. As an example, one might refer to an idea as ā€œbrilliant,ā€ a connection transferring a feeling from the concrete domain of light and brightness to the abstract domain of inspiration. To supplement the perspective provided by Lakoff and Johnson’s work, we relied on the operationalization of their work by Gordon et. al. [8], which presents 14 abstract ontological categories covering the range of conceptual and linguistic metaphors and their correspondence to the annotation work of [9]. The second body of theory on which this study draws is the information–motivation–behavioral skills (IMB) model [10], which describes how to understand the causal pathways linking messaging and behavior. Developed in the public health domain, it first appeared in studies of people’s adoption of proactive behavior in relation to the public health crises of smoking and HIV. Fisher and Fisher separated messaging into components of information, such as that condoms prevent the transmission of HIV, the reasons and motivation for why the information is significant, such as that HIV can be a fatal disease, and the behavioral skills needed to implement the information, such as how to properly use a condom.
To develop the connections between these two bodies of theory, we simultaneously apply a computational and qualitative research design that allows for us to assess the relationship between the use of conceptual metaphors and the information, motivation, and skills communicated by the documents in our research corpus. Our method involved manual, parallel, qualitative coding of a subset of documents from our jihadi corpus for both metaphor usage and focus on information, motivation, or behavioral skills. Comparing those two sets of manual annotations using a bag-of-words model [11, 12] showed connections between different types of metaphor and different elements in the IMB model. For example, to convey information, wr...

Table of contents

  1. Cover
  2. Half-Title
  3. Title
  4. Copyright
  5. Dedication
  6. Contents
  7. Foreword
  8. Preface
  9. Acknowledgements
  10. Editor
  11. Contributors
  12. Section I Introduction
  13. Section II A Transnational Recruitment Problem of Violent Online Extremist Terrorists
  14. Section III Policy and Legislative Frameworks Responses to Threats Presented by Online Terrorists
  15. Section IV Policy and Legislative Frameworks Responses to Threats Presented by Online Terrorists
  16. Section V Online Terrorist Propaganda
  17. Section VI ISIS and the Dark Web
  18. Section VII International Cooperation with Online Terrorism
  19. Section VIII Private Sector Cooperation and Responsibility for Countering the Use of the Internet for Terrorist Purposes
  20. Section IX Appendices
  21. Index