Failure and success of jihadi information operations on the Internet
Zoto, Edval N.
Robinson, Glenn E.
Warren, T. Camber
MetadataShow full item record
Obscure entities, individuals, and organizations engaged in jihad have made the Internet their most powerful tool for conducting information operations. Internet outlets, especially social networking sites, provide jihadis with access to the whole world. At the same time, the current Internet environment allows sustainable research about the uses of these resources for the cause of jihad, and simultaneously provides new opportunities to counterterrorist agencies. This thesis proposes an artisanal approach to analyze jihadism on the Internet. Specifically, by identifying prominent jihadi leaders recommendations on the spread of the call to jihad by fellow jihadis, we set up assumptions on what potentially makes jihadi information operations on social networking sites successful. Sets of data publicly available on the Internet and within the most popular social networking sites are identified and framed in line with the jihadi leadership recommendations. A case study and related data are gathered and analyzed to test these assumptions. The results of the analysis may enable researchers to speed data collection by identifying only potentially successful jihadi presences on the Web, and allow counterterrorist bodies to target jihadi Web spaces efficiently. The thesis also provides a background on jihadi approaches to public relations, an empirical analysis of terrorists challenges and counterterrorists opportunities on the Internet, a case study and a methodology for analyzing jihadism on the most visited social networking sites.
RightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
Showing items related by title, author, creator and subject.
Russo, Joshua A. (Monterey, California: Naval Postgraduate School, 2015);Analysts disagree on how to characterize al-Qa’ida’s evolution. One perspective regards jihadi-Islamism in general to be self-marginalizing. A second perspective describes the merging of discrete jihadist grand strategies ...
Xie, Geoffrey (2007-11);This chapter explores the architectural design of the Internet. The main objectives are: (i) highlight the design principles underlying the Internet architecture and explain their roles in the success of the network, and ...
Hafez, Mohammed M. (2010-06);Suicide attacks by radical lslamists mainly target and harm their co-religionists. Whether in Iraq, Afghanistan or Pakistan, suicide bombers are increasingly directing their blows against Muslims, including non-combatants, ...