EXPLORING THE DIVERSE IMPACTS OF RADICALISED VIOLENT IDEOLOGIES ON SOCIETAL DYNAMICS

Main Article Content

AYAZ KHAN, MUHAMMAD QASIM ,MUHAMMAD WASIF, MUHAMMAD UMAIR

Abstract

This study examines the concerns raised by professionals and regular individuals regarding the potential role of the Internet in facilitating radicalization. This study examines the growing concerns surrounding the prevalence of violent extremist content on the internet. It acknowledges the collective apprehension expressed by academics, policymakers, and the public regarding this issue. This research article presents an overview of the key unresolved inquiries pertaining to the utilization of the internet, particularly social media, by violent extremists and terrorists. Additionally, it proposes six potential avenues for further investigation in this domain. This study aims to address the existing knowledge gaps regarding the utilization of the internet by terrorist groups and violent extremists. By exploring unanswered questions, this research seeks to enhance our understanding of their online activities. This research abstract presents the five most significant suggestions. This research abstract proposes three key areas of focus for future research: conducting comparative studies across various ideologies, groups, countries, languages, and social media platforms; incorporating interviewing and virtual ethnographic methods into analyses; and enhancing the collection and analysis of "big data." These areas aim to enhance the understanding of diverse perspectives and improve research methodologies in the field. This research abstract focuses on five key aspects: (1) examining the impact of collaboration and knowledge sharing, (2) investigating the role of technology in enhancing communication and connectivity, (3) exploring the benefits of interdisciplinary research approaches, (4) analysing the significance of community engagement and involvement, and (5) exploring opportunities for expanding outreach efforts beyond our immediate community.

Article Details

Section
Articles
Author Biography

AYAZ KHAN, MUHAMMAD QASIM ,MUHAMMAD WASIF, MUHAMMAD UMAIR

  1. AYAZ KHAN

Chief Coordination Officer, Khyber Pakhtunkhwa Centre of Excellence on Countering Violent Extremism, Pakistan

 

  1. MUHAMMAD QASIM

Director General, Khyber Pakhtunkhwa Centre of Excellence on Countering Violent Extremism, Pakistan

 

  1. MUHAMMAD WASIF

Principal Research Officer Khyber Pakhtunkhwa Centre of Excellence on Countering Violent Extremism, Pakistan

 

  1. MUHAMMAD UMAIR

Principal Research Officer Khyber Pakhtunkhwa Centre of Excellence on Countering Violent Extremism, Pakistan

 

References

William McCants, “Testimony, U.S. House of Representatives, Subcommittee on Counterterror- ism and Intelligence, Jihadist Use of Social Media: How to Prevent Terrorism and Preserve Inno- vation,” 6 December 2011. Available at http://homeland.house.gov/sites/homeland.house.gov/ files/Testimony%20McCants.pdf (accessed 27 March 2015); Diana Rieger, Lena Frischlich, and Gary Bente, Propaganda 2.0: Psychological Effects of Right-Wing and Islamic Extremist Internet Videos (Cologne, Germany: Wolters Kluwer, 2013).

David C. Benson, “Why the Internet is Not Increasing Terrorism,” Security Studies 23(2) (2014), pp. 293–328; No´emie Bouhana and Per-Olof H. Wikstr€om, Al-Qa’ida-influenced Radicalisation: A Rapid Evidence Assessment Guided by Situational Action Theory (London: UK Home Office, 2011); Jonathan Githens-Mazer, “Radicalisation Via YouTube? It’s Not So Simple,” The Guard- ian, 4 November 2010. It’s worth mentioning here too the contestability of “radicalization” as a concept as discussed in, for example, Akil Awan, Andrew Hoskins, and Ben O’Loughlin, Radical- isation and Media: Connectivity and Terrorism in the New Media Ecology (London: Routledge, 2012).

J. M. Berger and Bill Strathearn, Who Matters Online: Measuring Influence, Evaluating Content and Countering Violent Extremism in Online Social Networks (King’s College London: ICSR, 2013); Joseph Carter, Shiraz Maher, and Peter Neumann, #Greenbirds: Measuring Importance and Influence in Syrian Foreign Fighter Networks (King’s College London: ICSR, 2014); Charlie Edwards and Luke Gribbon, “Pathways to Violent Extremism in the Digital Era,” RUSI Journal No. 158 (2013), pp. 40–47; David H. Gray and Albon Head, “The Importance of the Internet to the Post-modern Terrorist and its Role as a Form of Safe Haven,” European Journal of Scientific Research 25(3) (2009); Anne Stenersen, “The Internet: A Virtual Training Camp?,” Terrorism and Political Violence 20(2) (2008); United Nations Independent International Commission of Inquiry on the Syrian Arab Republic, Rule of Terror: Living under ISIS in Syria (New York: UN, 2014), p. 4.

Aaron Zelin, The State of Global Jihad Online: A Qualitative, Quantitative, and Cross-Lingual Analysis (Washington, DC: New America Foundation, 2013), p. 1. See also, on conduits, Daniel Kimmage, The Al-Qaeda Media Nexus: The Virtual Network Behind the Global Message (Wash- ington, DC: Radio Free Europe/Radio Liberty, 2008); Daniel Kimmage and Kathleen Ridolfo, Iraqi Insurgent Media: The War of Images and Ideas (Washington, DC: Radio Free Europe/Radio Liberty, 2007).

Walter Laqueur, The New Terrorism: Fanaticism and the Arms of Mass Destruction (Oxford: Oxford University Press, 1999), p. 262.

David Rapoport, “The Four Waves of Rebel Terror and September 11,” Anthropoetics 8(1) (2002). Available at http://www.anthropoetics.ucla.edu/ap0801/terror.htm?goback .gde_3131037_mem ber_5798090843084578819 (accessed 27 March 2015).

Jason Burke, “Al-Shabab’s Tweets Won’t Boost its Cause,” The Guardian, 16 December 2011.

Arab Social Media Report, “Dynamic Dashboard: Facebook Penetration, 31 December 2011.” Available at http://www.arabsocialmediareport.com/Facebook/LineChart.aspx?&PriMenuID 18&CatID 24&mnu Cat (accessed 27 March 2015).

Jamie Bartlett, “You Can’t Prevent Terrorism by Singling Out Muslims,” The Telegraph, 19 Febru- ary 2015.

Hanna Rogan, Jihadism Online: A Study of How al-Qaida and Radical Islamist Groups Use the Internet for Terrorist Purposes (Norway: FFI, 2006), p. 30.

House of Commons Home Affairs Committee, Counter-Terrorism: Seventeenth Report of Session 2013–14 (London: The Stationery Office, 2014), pp. 6–7.

Awan et al., Radicalisation and Media, pp. 58–59 and 64–65; Gilbert Ramsay, “Relocating the Vir- tual War,” Defence Against Terrorism Review 2(1) (2009), p. 35.

Intelligence and Security Committee of Parliament, Report on the Intelligence Relating to the Mur- der of Fusilier Lee Rigby (UK: Her Majesty’s Stationery Office, 2014), p. 131.

John Suler, “The Online Disinhibition Effect,” International Journal of Applied Psychoanalytic Stud- ies 2(2) (2005). See also Jamie Bartlett, The Dark Net (London: Windmill Books, 2015), pp. 41–42.

As quoted in Intelligence and Security Committee of Parliament, Report on the Intelligence Relat- ing to the Murder of Fusilier Lee Rigby, p. 60; see also Alexander Meleagrou-Hitchens, As Ameri- can as Apple Pie: How Anwar al-Awlaki Became the Face of Western Jihad (King’s College London: ICSR, 2011), p. 56.

Aaron Zelin, The State of Global Jihad Online, p. 8; see also Thomas Hegghammer, “Interpersonal Trust on Jihadi Internet Forums,” in Diego Gambetta, ed., Fight, Flight, Mimic: Identity Signalling in Armed Conflicts (forthcoming). Available at http://hegghammer.com/_files/Interpersonal_ trust.pdf (accessed 27 March 2015), p. 5.

Europol, TE-Sat 2015: European Union Terrorism Situation and Trend Report 2015 (The Hague: Europol, 2015); Europol, TE-Sat 2014: European Union Terrorism Situation and Trend Report 2014 (The Hague: Europol, 2014).

Andrew Silke, “The Impact of 9/11 on Research on Terrorism,” in Magnus Ranstorp, ed., Map- ping Terrorism Research: State of the Art, Gaps and Future Direction (London: Routledge, 2007), p. 84.

“Is Islamic State Shaping Boko Haram Media?” BBC Monitoring, 4 March 2015 http://www.bbc. com/news/world-africa-31522469 (accessed 27 March 2015).

Aur´elie Campana and Benjamin Ducol, “Voices of the ‘Caucasus Emirate’: Mapping and Analyz- ing North Caucasus Insurgency Websites,” Terrorism and Political Violence 27(4) (2015), pp. 679–700.

An exception is Charlie Winter, Documenting the Virtual Caliphate (London: Quilliam Founda- tion, 2015).

Benjamin Ducol, “Uncovering the French-speaking Jihadisphere: An Exploratory Analysis,”

Media, War & Conflict 5(1) (2012).

Derek O’Callaghan et al., “An Analysis of Interactions Within and Between Extreme Right Com- munities in Social Media,” Lecture Notes in Computer Science 8329 (2013).

Maeve Duggan et al, “Social Media Update 2014,” Pew Research Centre: Internet Science and Tech Report, 9 January 2015. Available at http://www.pewinternet.org/2015/01/09/social-media- update-2014/ (accessed 27 March 2015).

Justpaste.it is a particularly important node in the contemporary violent jihadi online scene; Pas- tebin and Paste.ee are also used as repositories. In terms of video-hosting, Dailymotion, Media- Fire, Vid.me, Vimeo, and a host of other more obscure sites (e.g., Hugefiles.net, Uploadhero.com, Uptobox.com) are also employed.

These include Ask.fm, Diaspora, Flickr, Instagram, SoundCloud, Tumblr, VKontakte, and others.

Zeynep Tufekci, “Big Questions for Social Media Big Data: Representativeness, Validity and Other Methodological Pitfalls.” Available at http://arxiv.org/ftp/arxiv/papers/1403/1403.7400.pdf (accessed 30 November 2015), p. 2.

von Behr et al., Radicalisation in the Digital Era, p. 8.

Janet E. Salmons, Qualitative Online Interviews: Strategies, Design, and Skills (London: Sage, 2014).

Daniel K€ohler, “The Radical Online: Individual Radicalization Processes and the Role of the Internet,” Journal for Deradicalization 1 (Winter 2014/15).

Tim Ingold, “Anthropology is Not Ethnography,” Proceedings of the British Academy 154 (2008), p. 69.

Christine Hine, Virtual Ethnography (London: Sage, 2000); Robert Kozinets, Netnography: Doing Ethnographic Research Online (London: Sage, 2009).

Thomas Hegghammer, “Why Terrorists Weep: The Socio-Cultural Practices of Jihadi Militants” (Paul Wilkinson Memorial Lecture, University of St. Andrews, April 16, 2015), p. 2. Available at http://hegghammer.com/_files/Hegghammer_-_Wilkinson_Memorial_Lecture.pdf (accessed 21 April 2015).

Erika Pearson, “All The World Wide Web’s a Stage: The Performance of Identity in Online Social Networks,” First Monday 14(3) (2009).

Terrorism Studies,” Critical Studies on Terrorism 5(1) (2012), p. 12.

Archetti, Understanding Terrorism in the Age of Global Media.

The ISIS Twitter Census, p. 29.

Ducol, “Uncovering the French-Speaking Jihadisphere,” pp. 54–55.

Marc Sageman, Leaderless Jihad: Terror Networks in the Twenty-First Century (Philadelphia: Uni- versity of Pennsylvania Press, 2008), p. 112.

Charlie Winter’s translation of “Women in the Islamic State” is available at https://www.quilliam foundation.org/wp/wp-content/uploads/publications/free/women-of-the-islamic-state3.pdf (accessed 30 November 2015). See also Charlie Winter, “Women of The Islamic State: Beyond the Rumor Mill,” Jihadology.net 31 March 2015. Available at http://jihadology.net/2015/03/31/guest- post-women-of-the-islamic-state-beyond-the-rumor-mill/ (accessed 26 April 2015).

Hoyle et al., Becoming Mulan?, p. 32.

Adam Bermingham et al., “Combining Social Network Analysis and Sentiment Analysis to Explore the Potential for Online Radicalisation,” pp. 234–235.

Martey et al., “The Strategic Female.”

ADL, Computerized Networks of Hate.

Kruglanski, A. W., Gelfand, M. J., Bélanger, J. J., Sheveland, A., Hetiarachchi, M., & Gunaratna, R. (2014). The psychology of radicalization and deradicalization: How significance quest impacts violent extremism. Political Psychology, 35, 69-93.

Meleagrou-Hitchens, A., Alexander, A., & Kaderbhai, N. (2017). The impact of digital communications technology on radicalization and recruitment. International Affairs (Royal Institute of International Affairs 1944-), 93(5), 1233-1249.

Guazzini, A., Stefanelli, F., & Imbimbo, E. (2020). Further examples of violent attitudes: The online radicalisation. Preventing Violent Radicalisation in Europe: Multidisciplinary Perspectives, 191-208.

Donnelly, P. (2021). Demystifying Gender Analysis for Research on Violent Extremism. Resolve Network, https://doi. org/10.37805/rve2021, 2.