An insightful and informative piece on countering the Internet jihad from Joshua Sinai of The Analysis Corporation in The Washington Times (thanks to Sr. Soph):
The Internet has become the “seductive hypermedia” for radical Islamic terrorists, with official and unofficial Web sites, forums and chatrooms that appeal to supporters worldwide. Most Web sites are intended to advance a group’s propaganda to increase their supporting audience, while some have operational intentions. But how do we defeat such terrorism in cyberspace?
An eclectic group of international experts in terrorist use of the Internet and graphic design specialists met recently in Israel’s southern resort city of Eilat to formulate a comprehensive response campaign that deserves wide attention.
As explained by Gabriel Weimann, of Israel’s Haifa University, terrorists “narrow-cast” their messages to “trap” selected audiences of adherents. Taking this further, Boaz Ganor, of the Israeli Interdisciplinary Center, showed how the “captured” adherents are then indoctrinated into radicalization by emphasizing a problem, such as threats posed by a common enemy or humiliation suffered by Muslims at the hands of their adversaries. Emphasizing the religious obligation of Muslims to confront their enemies and the challenge to their faith is the common denominator that binds the audience into their new virtual community. Segments of this community are then activated into a variety of activities on behalf of the terrorist group, such as fund-raising, recruitment, training and warfare.
The different types of terrorist activities on the Internet require appropriately differentiated responses. As outlined by Mr. Weimann, one such response is based on what he terms a “MUD” approach (Monitoring, Using and Disrupting).
c First, terrorist Web sites need to be monitored to learn about their mindsets, motives, persuasive “buzzwords,” audiences, operational plans and potential targets for attack. These sites will also reveal whom they consider to be their political and religious authorities, as well as moderate religious clerics they regard as particularly threatening. Monitoring also reveals their inner debates and disputes.
c Second, counterterrorism organizations need to “use” the terrorist Web sites to identify and locate their propagandists, chat room discussion moderators, Internet service provider (ISP) hosts, operatives and participating members.
c Third, terrorist Web sites need to be “disrupted” through negative and positive means. In a negative “influence” campaign, sites can be infected with viruses and worms to destroy them, or kept “alive” while flooding them with false technical information about weapons systems, circulating rumors to create doubt about the reputation and credibility of terrorist leaders, or inserting conflicting messages into discussion forums to confuse operatives and their supporters. In a more positive approach, alternative narratives can be inserted into these Web sites to demonstrate the negative results of terrorism or, to potential suicide bombers, to suggest the benefits of the “value of life” versus the self-destructiveness of the “culture of death and martyrdom.”
That last one may be a bit quixotic, but I suppose it’s worth a try. Anyway, read it all.