1
âElectronic Jihadâ
The Internet as al-Qaedaâs catalyst for global terror
Martin Rudner
Introduction
Al-Qaeda has deemed the Internet âa great medium for spreading the call of Jihad and following the news of the mujahideen (Islamic warriors)â (al-Alwaki 2009). Hence, the al-Qaeda (2015) operational manual titled Military Studies in the Jihad Against the Tyrants describes one of its primary missions as âspreading rumors and writing statements that instigate people against the enemy.â Subsequently, al-Qaedaâs Twenty-Year Strategic Plan (2001â2020) outlined a seven-stage jihadist struggle for global supremacy, culminating in a Definitive Victory for a renewed Islamic caliphate by the year 2020.1 Already at the second stage of this Strategy, spanning the years 2003â2006, the Internet had emerged as a key instrument in al-Qaedaâs effort to mobilize jihadist empathy among Muslims worldwide (Springer et al. 2009, p. 76). Radical Islamist leaders underlined their encouragement for what they defined as âElectronic Jihad,â insisting that âany attempt to âspite the enemyâ and endorse religion is legitimateâ (Atayf 2012). By the current fifth stage of the Strategy, covering the years 2013â2016, Electronic Jihad has come to play an expanded role in pursuit of the declared objective of mobilizing Muslim support for the âDeclaration of the Caliphate.â Indeed, the Internet has come to serve as a choice means of communications outreach on the part of al-Qaeda and its regional affiliates, for its pronounced, digitalized multiplier effects on jihadist consciousness-raising, recruitment, training, fund-raising, and operational activities (Weimann 2012; Gendron and Rudner 2012; Rudner 2013b).
The methodological approach utilized in this study of al-Qaedaâs and its jihadist associatesâ use of the Internet for the promotion of global terror is empirically focused, and may be described as a âdescriptive analysis.â This essentially empirical approach highlights al-Qaedaâs self-proclaimed doctrine, strategy, tactics, and goals as it has evolved in utilizing Internet technology in pursuit of its own declared objectives. These descriptive elements are then accompanied by a detailed analysis of the actual activities that ensured, including incitement for jihad, recruitment, training, fund-raising, and terror operations. Alas, in the authorâs opinion, there exists no relevant theoretical framework, in the academic sense of the term, which can explain terrorist motivations and behavioristics in their use of the Internet, and from which one can draw simple âconclusions.â In the absence of appropriate theoretical applications, the empirical methodology to be used here describes, analyzes, and explains actual practices.
The study commences with an overview of the al-Qaeda conceptualization of its so-called Electronic Jihad. It reviews the formulation of this strategy and its perceived role as in the promotion of jihadist aims. This is followed by an examination of the operative elements of Electronic Jihad, including the provision of online library resources, serving as virtual platforms for radical preachers, and facilitating forums for extremist discourse. Consideration is furthermore given to the actual impact of these Internet-based polemics on shaping attitudes, beliefs, and behaviors on the part of Muslim communities worldwide. The study then proceeds to scrutinize how Internet connectivity has actually been deployed by al-Qaeda and its associates for terrorist-related purposes. Detailed attention is paid to their utilization of the Internet for such purposes as inciting prospective cadres to action, recruiting jihadist operatives and fighters, providing virtual training in tactical methods and manufacture of explosives, terrorism financing, and for operational planning and preparations for specific terror attacks. Reference is also made to cyberterrorism, but this will be addressed in lesser detail here since it has been dealt with fully elsewhere, including by the present author (Gendron and Rudner 2012; Rudner 2013b;).
The thrust of the present study thus emphasizes the actionable intentions of al-Qaeda and its partners in availing themselves of the Internet as a catalyst for militant jihadism. By describing and analyzing the doctrines, strategies, tactics, and objectives of al-Qaeda and its jihadist partners, the threat arising from jihadi terrorist use of the Internet could be contextualized. Understanding adversarial intentions should help to facilitate further research and analysis relating to the impact of Electronic Jihad on targeted individuals and communities, and furthermore on ways and means of counteracting its harmful effects in the interests of public safety and national security.
The strategy of Electronic Jihad
To capitalize on the intrinsic capabilities of the Internet, prominent al-Qaeda stalwarts like the late, notorious preacher Anwar al-Awlaki urged followers to become âInternet mujahideenâ by setting up dedicated websites to cover specific areas of jihad, such as news about jihadist activities and operations or jihadist literature, what he termed âWWW Jihadâ (al-Alwaki 2009). Jihadist websites have come to play a prominent part in propagandizing on behalf of militant Islam, mobilizing prospective adherents, and inciting terrorist actions. Thus, a 2009 judgment by a Canadian court found that an extremist website posted by the Global Islamic Media Front purveyed messaging characteristic of militant jihadism, which was tantamount to a terrorist threat, by way of:
- publicizing and expounding upon the speeches of al-Qaeda leaders;
- inciting people to carry out violent jihad;
- urging people to support jihadist groups like al-Qaeda and its affiliates and al-Shabaab in Somalia;
- disseminating al-Qaeda textual propaganda;
- glorifying jihadist âmartyrsâ;
- providing advice on computer security, and instructions about hacking into computer networks;
- engaging in psychological warfare by threatening targeted societies and communities;
- delivering military training to carry out violent jihad, including tactics for urban and gang warfare, concealing explosives, executing ambushes, arrests, and explosions;
- webcasting news reports from jihadist battlefronts;
- publishing online magazines like Sawt al-Jihad (Voice of Jihad) and Inspire;
- translating its propaganda material into various languages to reach out to a wide audience especially in the West.
Accordingly, the Court held that jihadist websites like the Global Islamic Media Front contribute directly or indirectly to actual terrorist activities.2
The Internet and other related digital and electronic technologies like YouTube and Twitter offer certain unique advantages for radical preachers, jihadist proponents, and militant operatives, as compared to other traditional media. A key feature of the Internet is its digitalization of information, which enables the material to be infinitely copied without loss of fidelity and be disseminated endlessly. The scope and reach of these Internet discussion forums create, in effect, a near-global digital ummah (Muslim realm), linking up potential jihadist fellow travelers from various communities across the Asia, the Middle East, Western Europe, and the Americas. The emergence of what some have called a âdigitalized ummahâ contributes to a homogenization of political attitudes and religious sentiments shaped by a relentless flow of identical messages and images (verbal and graphic) across cyberspace (Kaya 2010). These cyberspace communities, unbounded by territory or civic loyalty, can spawn a virtual radicalism among prospective recruits and neophytes, thereby fostering a jihadist counterculture that challenges the traditional authority of established religious scholars in Muslim communities as well as in the diaspora.
Proponents of Electronic Jihad seek to exploit the strategic capabilities of the Internet and related technologies for promoting the spread of radical Islamist principles and fomenting jihadist militancy among Muslim communities, especially in the Western diaspora. In that regard, al-Qaeda and proxy jihadist websites seem to have had a both direct and more diffuse impact on actual terrorist operations. The direct impact relates to their influence in indoctrinating and inspiring terrorist operatives to mount attacks on specific targets. In addition, these websites can and do have a more diffuse effect by way of motivating jihadist recruitment and training efforts. At a broader community level, these and similar Internet domains may play their part in inciting wider Muslim identification with and support for the militant jihadist cause (Lennings et al. 2010).
Operative elements of Electronic Jihad
The Centre for Social Cohesion, a British research institution, has identified three core Internet-based functions performed by jihadist websites, chatrooms, and social media (Brandon 2008):
Online Libraries: Jihadist websites perform a key role as repositories of archival writings by preeminent figures in the jihadi pantheon like Abdullah Azzam, founder of al-Qaeda, and jihadist e-magazines like al-Qaedaâs Inspire;
Platform for Extremist Preachers: Jihadist websites offer posting of sermons and tracts by prominent radical Islamist preachers and expositors of jihadism like Anwar al-Awlaki, which can be readily accessed through the Internet;
Forums for Radical Discourse: Jihadist websites usually host newsgroups, chatrooms, discussion forums, and newsgroups which serve to facilitate e-conversations among like-minded followers, and represent networking hubs for addressing key issues, planning and coordinating activities, and promoting group dynamics.
(Brandon 2008, Chapter 5; Simon Wiesenthal Center 2010)3
Jihadists and other Islamist extremists make extensive use of the Internet and social media for the dissemination of propaganda, as well as for the recruitment and training of operatives (Brandon 2008; Europol 2009, pp. 13â14, 20). The Internet and social media, for their part, offer radical preachers, strategists, and enthusiasts especially advantageous capabilities for reaching out and influencing, inciting, and motivating jihadist activism at a global level (Taylor and Ramsay 2010, p. 106). Arguably the preeminent Jihadist preacher on the Internet to date was the late Anwar al-Awlaki, an American-born and later a high-profile spokesman for al-Qaeda in the Arabian Peninsula, where he was assassinated by a U.S. drone strike in 2011 (Koplowitz 2013). Anwar al-Awlaki utilized the Internet to purvey al-Qaedaâs militant Islamist doctrine to a targeted audience of educated, English-speaking Muslim youth (including converts), in particular, with a view to fomenting a jihadist struggle âfrom withinâ the democratic societies of Europe and North America, a homegrown âWestern Jihadâ (al-Awlaki 2010). Indeed, his Internet-based guide on â44 Ways to Support Jihadâ insisted that âJihad today is obligatory on every capable Muslimâ (al-Alwaki 2009; Moon 2010).
Preliminary inquiries into the recruitment of âhomegrownâ terrorists in Western societies suggest the particular importance of âreligious teachingâ as a precursor and trend-setter, more so than, for example, âstrategyâ documents (Lia 2007, pp. 226â227; Springer et al. 2009, pp. 132â133, 143â146).An assessment by the British Security Service (MI5) discerned that the Internet had come to serve as a more pronounced instrument for the promotion of Islamist radicalization, especially among youth, than more conventional meeting spaces (Andrew 2009, pp. 827â828; U.K. House of Commons 2012).
Jihadist messaging across the Internet, and through other digital formats, may be assessed according to the extent to which they instigate, promote, or enable activities that directly or indirectly facilitate terrorist acts. The actual thrust of Electronic Jihadi messaging may be rated, in ascending order of severity, in terms of their impact on:
- subverting Muslim communities in Western democracies while deceiving and distracting their governments from reacting to the threat at hand (Phares 2005, p. 263);
- cultivating supportive attitudes toward acts of terrorism;
- offering theological justification to acts of political violence and terror;
- providing technical instructions and operational guidelines for terrorist acts;
- promoting direct involvement in preparatory activities that expedite terrorist operations;
- encouraging personal engagement in committing acts of terrorism (Taylor and Ramsay 2010, p.100).
For proponents of Electronic Jihad, probably the most pertinent attribute of the Internet is its potential to affect the mindset and behavior of followers in various ways that help to transform hitherto placid individuals into jihadist militants (Taylor and Ramsay 2010, p. 107). It is indicated that jihadist terrorists are increasingly utilizing Internet-based social media, such as Facebook and Twitter, for messaging and communications (Gertz 2013). Virtual interaction between militant elements through the Internet and social media has fostered widespread radicalization across countries and regions along with the emergence of new jihadist networks (The Netherlands General Intelligence...