
By
Grace Mubashir, New Age Islam
24 January
2024
The Internet,
A Double-Edged Sword, Offers Both Connection And Vulnerability. While It
Empowers Individuals And Fosters Communities, It Also Provides Fertile Ground
For Extremist Groups To Spread Their Ideologies And Recruit Susceptible
Individuals. Recognizing This Challenge, Various Strategies Can Be Implemented
To Curb Online Radicalization And Safeguard Individuals From Its Pernicious
Influence.
Main
Points:
1. Ways to
prevent online radicalisation
1.
Empowering Individuals:
a. Media
Literacy: Equipping individuals with the critical thinking skills to evaluate
online information effectively is crucial. Educational programs can teach users
to identify bias, verify sources, and recognize manipulative tactics employed
by extremist groups.
b. Alternative
Narratives: Countering extremist propaganda requires promoting positive and
diverse narratives online. This can be achieved through supporting alternative
media outlets, encouraging user-generated content that challenges extremist
messages, and amplifying voices advocating for tolerance and understanding.
c. Social
Support Networks: Fostering strong social connections online and offline can
bolster individuals' resilience against radicalization. Community engagement
initiatives, online support groups, and mental health resources can provide
individuals with a sense of belonging and combat feelings of isolation that
extremist groups often exploit.
2.
Countering Extremist Content:
d. Content
Moderation: Social media platforms and online service providers have a
responsibility to moderate content that incites violence or promotes extremist
ideologies. Robust content moderation policies, coupled with efficient
reporting mechanisms, can help curb the spread of harmful content.
e. Algorithmic
Transparency: Demystifying the algorithms that govern online content delivery
is crucial. Understanding how platforms recommend and prioritize content can
help identify potential biases and develop strategies to prevent the
algorithmic amplification of extremist narratives.
f. Collaboration
with Law Enforcement: Building bridges between social media platforms, law
enforcement agencies, and civil society organizations can facilitate
information sharing and coordinated efforts to identify and counter online
radicalization activities.
3.
Addressing Underlying Vulnerabilities:
g. Addressing
Socioeconomic Inequalities: Social and economic marginalization can contribute
to feelings of alienation and disenfranchisement, making individuals more
susceptible to extremist narratives. Addressing socioeconomic inequalities
through targeted policies and support programs can reduce vulnerabilities and
foster social inclusion.
h. Promoting
Education and Opportunity: Educational opportunities and skills development
programs can empower individuals to build fulfilling lives and contribute
meaningfully to their communities. This can reduce the risk of turning to
extremist groups for a sense of purpose or belonging.
i. Promoting
Interfaith Dialogue and Understanding: Fostering interfaith dialogue and
promoting understanding between different communities can help combat prejudice
and discrimination, ultimately reducing the appeal of extremist ideologies that
often thrive on divisiveness and hatred.
------
Online
radicalization to violence is a complex process wherein an individual is
exposed to an ideological message and belief system that pushes them from
mainstream perspectives toward extreme views. This transformation primarily
takes place through online media channels, including popular social networks
like Facebook, Twitter, and YouTube. The extreme views often arise from radical
interpretations of mainstream religious or political doctrines, and they may
advocate, endorse, provoke, or support violence as a means to achieve various
social, religious, or political changes.
It's
crucial to note that online radicalization typically doesn't happen abruptly,
triggered by a single video or post. Instead, it tends to unfold gradually over
time. The factors influencing an individual's radicalization can be dynamic, changing
based on circumstances or personal developments. Furthermore, the process
itself is not uniform, as individuals may move back and forth between different
stages or remain static, while various factors and levels interact and
influence one another. Likewise, prevention is also a complicated issue.
Preventing
The Dissemination Of Terrorist Content Online
Preventing
the dissemination of terrorist content online constitutes the primary strategy
for countering radicalization on social media and the internet. This approach
involves employing digital mechanisms and tools to curb the spread of terrorist
propaganda, encompassing legislative and policy measures, content and platform
blocking, and filtering and removal of such content. These measures are interconnected,
with legislative frameworks adapting to emerging technological tools in the
prevention space. It is crucial to acknowledge that the prevention of terrorist
content online relies on the utilization of technology and platforms
predominantly owned by the private sector. Therefore, effective implementation
involves fostering public-private partnerships and cooperation. Tech Against
Terrorism is a noteworthy example of such collaboration, aligning with the
United Nations Security Council Resolution 2354 (2017). This initiative focuses
on enhancing the capabilities of smaller start-up companies and furnishing
online tools to the private sector technology industry to mitigate the spread
of terrorist content on their platforms. Collaborating with multiple private
sector entities, including Facebook, Tech Against Terrorism consistently
engages with UN Security Council bodies.
Countering
The Narratives Of Violent Extremism And Terrorism In The Digital Space
A strategy
aimed at preventing radicalization on social media and the internet involves
countering the narratives of violent extremism and terrorism in the digital
space, either directly or indirectly. While the definition of
"counter-narratives" has sparked debates within the CVE (Countering
Violent Extremism) community, for the purpose of this chapter, it is adopted as
an attempt "to challenge extremist and violent extremist messages, whether
directly or indirectly through a range of online and offline means."
Several key
points are relevant to this strategy. Firstly, countering narratives online
should carefully consider the target audience within the local context. For a
counter-narrative to be effective, it must address the grievances or needs of
individuals joining terrorist groups and counter the attractions of terrorist
propaganda. Empowering communities, both online and offline, with the necessary
knowledge, skills, and tools to contest and counter the messages of violent
extremism and terrorism in their networks is crucial. Organizations have implemented
capacity-building initiatives for "local voices" as part of broader
communication campaigns against terrorism. An illustrative example is the
#insolidarity campaign by YADEN based in Kenya. This initiative offers
capacity-building, tools, and platforms for youth to create their own messages
and share stories about how terrorism has impacted their lives.
The
effectiveness of a counter-narrative lies in its ability to be both appealing
and informative, dissuading individuals from being enticed by terrorist groups.
Achieving this involves various approaches: deconstructing terrorists'
arguments by highlighting inaccuracies in their claims, undermining the
credibility of the group, and presenting alternative narratives that emphasize
non-violent actions. Additionally, it is essential for counter-narratives to be
reinforced by positive actions. Mere words and images are insufficient to
persuade dissatisfied individuals unless accompanied by credible and consistent
deeds.
It also
includes:
· Deconstructing Terrorist Arguments
· De-legitimizing Terrorist Groups and
Actions
· Positive Messages and Alternatives to
Terrorism
Building
Digital Resilience and Media Literacy
In the
contemporary digital landscape, combating the challenges of "fake news,"
"misinformation," and "disinformation" is crucial, as these
tactics are employed by political actors and terrorist groups alike. A third
strategy for preventing online terrorism involves building digital resilience
and enhancing media literacy skills. This approach is based on two key
assumptions. Firstly, by fostering digital resilience and media literacy,
individuals can peacefully address grievances that might lead to incorrect
radicalization based on misinformation or disinformation. Secondly, individuals
with improved abilities to evaluate information content and source credibility
are less likely to be swayed by terrorist propaganda.
To clarify
these terms within the context of terrorism prevention, "fake news"
is defined as "fabricated information that mimics news media content in
form but not in organizational process or intent."
"Misinformation" refers to false or misleading information, while
"disinformation" is false information intentionally spread to deceive
people. These types of content are leveraged by various actors, including
politicians and terrorist groups. While not always intended to cause harm,
these tools can be employed by terrorist organizations to exacerbate societal
grievances, push factors leading to radicalization, or recruitment efforts.
Additionally, these tactics may reinforce black-and-white thinking, encourage
polarized worldviews, and exploit divisive rhetoric, further emphasizing the
"us" versus "them" dynamic. When combined with hate speech
and divisive narratives, the use of "fake news,"
"misinformation," and "disinformation" by terrorist groups
can contribute to a dangerous environment.
The formal
education sector holds a pivotal role in equipping students with the skills to
discern and counter various tactics employed by terrorist groups in spreading
their messages. To support educators in this endeavour, numerous resources are
available to enhance their ability to teach students about digital resilience.
UNESCO offers valuable tools, such as a framework and assessment tools,
designed to monitor global progress in digital literacy skills, aligning with
Sustainable Development Goal #4 on Quality Education. This framework offers
guidelines covering diverse digital competencies, including:
· information and data literacy (e.g.
browsing, searching, and evaluating data online;
• communication and collaboration (e.g.
interacting, sharing, and collaborating using
digital
technologies);
• digital content creation (e.g.
developing digital content, copyrights, and licensing);
• safety (e.g. protecting devices,
personal data, and well-being); and
• problem-solving (e.g. identifying needs
and digital/technical responses).
Conclusion
This
article emphasizes several potential approaches that could contribute to
terrorism prevention. A key recommendation is the implementation of a
public-private cooperative and inclusive approach, recognizing the need to
enhance all prevention efforts. The lack of understanding within the public
sector regarding the operations of various online platforms, especially
smaller, lesser-known ones, underscores the importance of coordinating with
relevant providers in developing legislation, policies, and practical
responses. Realistic legislation, engaging private sector representatives
during development, is considered valuable for prosecuting individuals and
organizations, penalizing content, and making it illegal to host such content
on platforms.
Blocking
access to content shared by terrorist groups is another approach discussed,
with a cautionary note on unintentional effects on the general population and
potential infringement upon universal human rights. The resilience of online
platforms, where blocked platforms are often replaced by others, suggests that
a more effective approach, albeit resource-intensive, involves the takedown of
terrorist content. While primarily based on private organizations' policies,
this approach could benefit from robust public-private cooperation, enabling
government agencies to inform platform providers about content that needs
removal.
The article
highlights the importance of forward-looking strategies in addressing terrorism
online. While the discussed approaches are preventative, they are also
reactive, evolving based on past experiences and current methods employed by
terrorist groups. The emphasis is placed on the need for governments and online
platform providers to anticipate how platforms might be exploited in the future
and anticipate potential forthcoming platforms that could contribute to
radicalization and recruitment. Identifying possible future threats is crucial
for developing proactive prevention strategies, and ensuring positive outcomes
in the ongoing effort to counter online terrorism.
References:
Bulbeck,
Emilia, ‘The Path to Persuasion: An Investigation into how al-Shabab Constructs
their Brand in their Digital Magazine Gaidi Mtaani,’ Master’s Thesis, Uppsala
University,
2017. Available at:
http://uu.diva-portal.org/smash/record.jsf?pid=diva2%3A1148028&dswid=-8240
Paganini,
Pierluigi, ‘The Role of Technology in Modern Terrorism,’ INFOSEC, 2018.
Available
at:
https://resources.infosecinstitute.com/topic/the-role-of-technology-inmodern-terrorism/#gref
Tech
Against Terrorism, ‘Project Background (Online),’ Tech Against Terrorism, 2017.
Available
at: https://www.techagainstterrorism.org/project-background/.
Twitter
Help Center, ‘Terrorism and Violent Extremism Policy,’ Twitter Help Centre,
2019.
https://transparency.twitter.com/content/dam/transparency-twitter/download/2019-juldec/Twitter_Transparency-Rules_Enforcement_Jul-Dec-2019.pdf
Weimann,
Gabriel, ‘Going Dark: Terrorism on the Dark Web,’ Studies in Conflict &
Terrorism, 39(3), 2015,
Zeiger,
Sara, Undermining Violent Extremist Narratives in East Africa: A How-To Guide,’
Abu Dhabi: Hedayah, 2018. Available at:
https://www.hedayahcenter.org/resources/reports_and_publications/undermining-violentextremist-narratives-in-east-africa-a-how-to-guide-2
------
Previous
Articles:
Islamic Terrorism In
Cyberspace: Changing Frontiers Of Global Muslim Terrorism (Part One)
ISIS And
Manipulation of Cyberspace for Terrorism (Part Two)
Online Islamist
Radicalism and the Threat of Lone Wolves
Terrorist
Recruitment and Communication Revolution: The Double-Edged Sword of the Digital
Age
-----
A regular columnist for NewAgeIslam.com, Mubashir
V.P is a PhD scholar in Islamic Studies at Jamia Millia Islamia and freelance
journalist.
New Age Islam, Islam Online, Islamic Website, African Muslim News, Arab World News, South Asia News, Indian Muslim News, World Muslim News, Women in Islam, Islamic Feminism, Arab Women, Women In Arab, Islamophobia in America, Muslim Women in West, Islam Women and Feminism