Breaking the ISIS Brand Counter Narrative Project: Understanding, Preventing, and Intervening in Militant Jihadi Terrorism and Violent Extremism

Author(s):  
Anne Speckhard ◽  
Molly Ellenberg ◽  
Zack Baddorf

The content of this chapter describes the processes by which individuals become radicalized toward militant jihadi terrorism and ultimately join terrorist groups using ISIS recruitment and radicalization within ISIS as the focus of doing so. In doing so, it identifies steps that practitioners and policy makers can use to prevent and counter violent jihadist extremism by taking a nuanced approach that considers psychosocial vulnerabilities and environmental factors that contribute to radicalization. The case studies presented to illustrate these points are gleaned from the 240 interviews [1] with ISIS defectors, returnees, and imprisoned cadres interviewed by the first author, a research psychologist, in her role as director of the International Center for the Study of Violent Extremism (ICSVE) and well as hundreds of terrorists from other groups. In the case of the ISIS interviews, with the interviewees’ consent, the interviews were video-recorded and cut to create short counter narrative clips that can be used as a powerful tool for challenging the beliefs that individuals who have been exposed to ISIS propaganda may hold. This chapter also focuses on the Internet campaigns that ICSVE has used to test various aspects of the counter narrative videos, revealing the best ways to utilize the counter narratives and to maximize their impact online. Given that ISIS has become notorious for its skill at Internet recruitment and creating high-quality propaganda videos, it is imperative that counter terrorism professionals are able to parallel their efforts in order to continue fighting them even after the territorial defeat of the Caliphate.

2020 ◽  
Vol 13 (3) ◽  
pp. 120-148
Author(s):  
Anne Speckhard ◽  
Molly Ellenberg

Despite the territorial demise of Islamic State of Iraq and Syria [ISIS], the group’s cyberoperations, which once drew an unprecedented 45,000 foreign terrorist fighters [FTFs] to their so-called Caliphate, continue to entice supporters online. ISIS’s slick, high-quality content encourages supporters to hope for the return of the Caliphate and to seek revenge upon those who destroyed it by executing attacks at home. The European Union [EU] was one of the highest contributors of FTFs to ISIS and continues to be a hotspot for ISIS directed and inspired attacks. The International Center for the Study of Violent Extremism [ICSVE] has produced over 180 counter narrative video clips featuring ISIS defectors, returnees, and imprisoned cadres denouncing the group, published in over 100 Facebook campaigns. This article details the results of 20 one-minute long counter narrative Facebook campaigns in eight EU countries. The results support marketing best practices of using shorter videos to increase viewer retention and suggest that EU viewers are more engaged with counter narratives in which the speaker is relatable and representative of the audience toward which the video is targeted.


2021 ◽  
Vol 31 (2) ◽  
pp. 233-256
Author(s):  
Athik Hidayatul Ummah

This article aims to describe the meaning of narratives are used by digital media or online media to counter the narrative of radicalism. The research method used is discourse analysis to find the meaning in the text. The theoretical framework used is narrative theory to explain process audience can trust about a narrative because of the consistency and truth of narrative or story. Narratives are analyzed using a framework of identity prism theory. The identity prism describes that online media as a brand has a strategy to build and promote it is unique among other brands. The results of the study are Islami.co and Ruangobrol.id have different characteristics or uniqueness and segmentation to convey the counter-narratives to the public. The narratives are built is to fight or deconstruct the narratives of radicalism-terrorism as an effort to prevent radicalism and the recruitment of new members through the internet. The counter-narrative also has coherence and truth as important standards for the public to select and judge that the narrative is consistent and credible. In the digital age, digital media have an important role in the counter-narratives of radicalism. It’s because radical-terrorist groups using the internet and social media platforms to spread their thoughts and their actions.


Author(s):  
Maura Conway

This chapter explores the changes that have taken place in the role and functioning of the Internet in terrorism and counter-terrorism in the past decade. It traces the shift in focus from a preoccupation with the threat of so-called “cyberterrorism” in the period pre- and immediately post-9/11 to the contemporary emphasis on the role of the Internet in processes of violent radicalization. The cyberterrorism threat is explained as over-hyped herein, and the contemporary focus, by researchers and policymakers, on the potential of the Internet as a vehicle for violent radicalization viewed as more appropriate albeit not without its difficulties. This change in emphasis is at least partially predicated, it is argued, on the significant changes that occurred in the nature and functioning of the Internet in the last decade: the advent of Web 2.0, with its emphasis on social networking, user generated content, and digital video is treated as particularly salient in this regard. Description and analysis of both “negative” and “positive” Internet-based Counter Violent Extremism (CVE) and online counterterrorism measures and their evolutions are also supplied.


World Affairs ◽  
2019 ◽  
Vol 182 (3) ◽  
pp. 256-272 ◽  
Author(s):  
Robin A. Hardy

This essay addresses recurring and growing inaccurate reports from political officials as well as counter-terrorism analysts and journalists that the Sahara-Sahel group Boko Haram is a defeated entity. Notwithstanding concerted efforts to rout the movement, Boko Haram and its network of jihadists have expanded. Crucial misunderstandings surrounding what fostered and sustains the phenomenon—as well as a general naivety regarding the organization’s flexibility to adapt to attract combatants, financial support, and weaponry beyond Nigeria’s borders—have made performing basic adequate risk assessments overwhelmingly challenging. Policy makers and CVE (Countering Violent Extremism) practitioners would be wise to recognize that not only has Boko Haram morphed but its growing affiliates also terrorize increased territory. The threat of militant Islam in the Sahara-Sahel, therefore, has not been contained as some would have us believe. Rather, Muslim extremism has become entangled and more complex not only in Africa but across the Muslim world. When jihadists in one territory have taken a beating, surviving fighters have simply relocated to other geographies accompanied by connections for capital and munitions. In this way, Boko Haram—the fulcrum of violent Islam in the Sahara-Sahel—has become, over time, an international jihadist actor.


2020 ◽  
Vol 17 (2) ◽  
pp. 1037-1039
Author(s):  
Zanariah Jano ◽  
Hawati Janor ◽  
Asiah Mohd Pilus

Terrorist groups are using the Internet to attract their followers. This paper analyzed the nature of terrorists’ videos in terms of types, modus operandi and production features. A content analysis was utilized involving 4 YouTube videos in terms of types, modus operandi and features. The findings yielded that the types of videos used were hostage-taking, educational training documentaries, and conveying messages. Most videos were published by groups, given Arabic and English subtitles, have medium to high-quality with professional editing with the recital and prayers. Video is a platform to spread their ideologies and messages for a new recruitment of members. Future study should include more videos from other groups for means of comparison.


Author(s):  
John Battersby ◽  
Rhys Ball ◽  
Nick Nelson

In mid-February 2020 New Zealand released its long overdue ‘Countering terrorism and violent extremism national strategy.’ This article draws on the experience of three academic commentators who cast a critical eye over the document and whose respective thoughts are brought together here. The approach taken is to discuss the purpose and fundamentals of what strategy is to provide a framework with which to review New Zealand’s first publicly released counter-terrorism strategy. Unfortunately, this important and long overdue strategy, in the view of the authors, comes up well short of what it should be. The authors offer a challenge to New Zealand’s policy makers concerned with national security to seek more depth in the consideration of their approach, to present a strategy with less graphic design, more substantial discussion of the fundamental questions relating to the management of modern terrorism and violent extremism, and an appreciation of the nuanced New Zealand experience with political violence from late twentieth century to the present day.


Author(s):  
C. McGrath

The purpose of the article is to highlight two pivotal events in Ukrainian history which contain archetypal figures for current Ukrainian national identity. The focus on telling the stories from the Ukrainian perspective and understanding the elements of the hero's journey within the stories, the archetypes at play, as well as the counter narrative adds a unique approach to understanding the complex history shaping Ukrainian identity and fueling the current conflict between Russia and Ukraine, and among the Ukrainian people. Understanding the main points of the stories from the Ukrainian perspective, and how they support Ukrainian national identity will help US policy makers in spotting and understanding the Russian counter narratives and how they are used to influence Russian, Ukrainian and western audiences.


2009 ◽  
Vol 7 (2) ◽  
pp. 195-207 ◽  
Author(s):  
Antony Field

It is essential to understand the concept of the ‘new terrorism’, since it has fostered a paradigm shift in the way that academics, policy makers and counter-terrorism professionals conceive of the contemporary threat. Capturing the notion that there has been a revolutionary change in the nature of terrorism, it now plays a pre-eminent role in shaping counter-terrorism policy. However, despite the attractive simplicity of the concept, there are good reasons to question the assumption that the actual behaviour of terrorist groups has fundamentally altered. Indeed, an analysis of the history of terrorism shows that many of the supposed hallmarks of the ‘new terrorism’ have been seen in the past. As a consequence, the concept of the ‘new terrorism’ should be viewed with some scepticism, as it unduly exaggerates the unprecedented nature of the contemporary terrorist threat and needlessly leads policy makers to reject the relevance of historical counter-terrorism lessons.


2020 ◽  
Vol 2020 (4) ◽  
pp. 116-1-116-7
Author(s):  
Raphael Antonius Frick ◽  
Sascha Zmudzinski ◽  
Martin Steinebach

In recent years, the number of forged videos circulating on the Internet has immensely increased. Software and services to create such forgeries have become more and more accessible to the public. In this regard, the risk of malicious use of forged videos has risen. This work proposes an approach based on the Ghost effect knwon from image forensics for detecting forgeries in videos that can replace faces in video sequences or change the mimic of a face. The experimental results show that the proposed approach is able to identify forgery in high-quality encoded video content.


Sign in / Sign up

Export Citation Format

Share Document