Failure and success of jihadi information operations on the Internet
Zoto, Edval N.
Robinson, Glenn E.
Warren, T. Camber
MetadataShow full item record
Obscure entities, individuals, and organizations engaged in jihad have made the Internet their most powerful tool for conducting information operations. Internet outlets, especially social networking sites, provide jihadis with access to the whole world. At the same time, the current Internet environment allows sustainable research about the uses of these resources for the cause of jihad, and simultaneously provides new opportunities to counterterrorist agencies. This thesis proposes an artisanal approach to analyze jihadism on the Internet. Specifically, by identifying prominent jihadi leaders recommendations on the spread of the call to jihad by fellow jihadis, we set up assumptions on what potentially makes jihadi information operations on social networking sites successful. Sets of data publicly available on the Internet and within the most popular social networking sites are identified and framed in line with the jihadi leadership recommendations. A case study and related data are gathered and analyzed to test these assumptions. The results of the analysis may enable researchers to speed data collection by identifying only potentially successful jihadi presences on the Web, and allow counterterrorist bodies to target jihadi Web spaces efficiently. The thesis also provides a background on jihadi approaches to public relations, an empirical analysis of terrorists challenges and counterterrorists opportunities on the Internet, a case study and a methodology for analyzing jihadism on the most visited social networking sites.
Approved for public release; distribution is unlimited.
Showing items related by title, author, creator and subject.
Pickett, Bryan M.; Lingenfelter, Charles M. (Monterey, California. Naval Postgraduate School, 2011-12);U.S. strategy in current conflicts (Iraq, Afghanistan, and against al-Qaeda) has focused predominantly on heavy U.S. military involvement (mostly kinetic operations), while using influence components, for the most part, ...
Huang, Chung-Neng; Chen, Hsinchun; Denning, Dorothy; Roberts, Nancy C.; Larson, Catherine; Yu, Ximing (2011);Counter-terrorism, intelligence analysts, and other investigators continue to analyze the Internet presence of terrorists, hate groups, and other extremists through the study of primary sources including terrorists’ ...
Naval Postgraduate School Center for Homeland Defense and Security (CHDS) (Monterey, California. Naval Postgraduate SchoolCenter for Homeland Defense and Security, 2010-01);January 2010. Risk, preparedness, intelligence, public health — these are just a few of the issues facing homeland security in the past year and addressed in this issue of Homeland Security Affairs. In “Changing Homeland ...