U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Technology and Terrorism: How the Internet Facilitates Radicalization

NCJ Number
226974
Author(s)
Marie Wright, Ph.D., CHS-IV
Date Published
2008
Length
7 pages
Annotation
This paper identifies ways in which terrorists achieve key objectives through their use of the Internet, and it recommends options for a coordinated effort to counter terrorist information operations.
Abstract
Terrorist groups use Internet sites to disseminate propaganda and recruit supporters. Over the past decade, the number of terrorist Web sites has increased from less than 100 to more than 5,000 (Kaplan, 2006). According to the Assistant Secretary of Defense for International Security Affairs, these sites are being used to present speeches, graphics, training manuals, slides, blogs, and Web casts, all for propaganda purposes (Porth, 2006). Web-based propaganda includes the publicizing of acts of violence believed to enhance perceptions of a terrorist group's strength and effectiveness. In addition, the Internet is being used by terrorists to collect information on potential targets. Such information is used in planning attacks. Further, the Internet is being used by terrorists to send secret communications, using encryption systems. Five recommendations are offered for countering the terrorists' Internet information campaign. First, develop a stronger connection with Muslim communities, in order to develop a better understanding of and connection with Muslim communities throughout the world. Second, encourage the integration of Muslim immigrants using the assistance of Muslim leaders in communities. Third, implement a comprehensive online counter-narrative that combats extremism and promotes integration and common goals. Fourth, assist U.S. allies in implementing such a comprehensive online counter-narrative. Five, promote interagency initiatives that undermine terrorist information operations. Examples of such initiatives are provided. 21 references