Pages

Wednesday, January 24, 2024

Combating the Shadows Strategies to Prevent Islamist Radicalization on Social Media and the Internet

By Grace Mubashir, New Age Islam 24 January 2024 The Internet, A Double-Edged Sword, Offers Both Connection And Vulnerability. While It Empowers Individuals And Fosters Communities, It Also Provides Fertile Ground For Extremist Groups To Spread Their Ideologies And Recruit Susceptible Individuals. Recognizing This Challenge, Various Strategies Can Be Implemented To Curb Online Radicalization And Safeguard Individuals From Its Pernicious Influence. Main Points: 1. Ways to prevent online radicalisation 1. Empowering Individuals: a. Media Literacy: Equipping individuals with the critical thinking skills to evaluate online information effectively is crucial. Educational programs can teach users to identify bias, verify sources, and recognize manipulative tactics employed by extremist groups. b. Alternative Narratives: Countering extremist propaganda requires promoting positive and diverse narratives online. This can be achieved through supporting alternative media outlets, encouraging user-generated content that challenges extremist messages, and amplifying voices advocating for tolerance and understanding. c. Social Support Networks: Fostering strong social connections online and offline can bolster individuals' resilience against radicalization. Community engagement initiatives, online support groups, and mental health resources can provide individuals with a sense of belonging and combat feelings of isolation that extremist groups often exploit. 2. Countering Extremist Content: d. Content Moderation: Social media platforms and online service providers have a responsibility to moderate content that incites violence or promotes extremist ideologies. Robust content moderation policies, coupled with efficient reporting mechanisms, can help curb the spread of harmful content. e. Algorithmic Transparency: Demystifying the algorithms that govern online content delivery is crucial. Understanding how platforms recommend and prioritize content can help identify potential biases and develop strategies to prevent the algorithmic amplification of extremist narratives. f. Collaboration with Law Enforcement: Building bridges between social media platforms, law enforcement agencies, and civil society organizations can facilitate information sharing and coordinated efforts to identify and counter online radicalization activities. 3. Addressing Underlying Vulnerabilities: g. Addressing Socioeconomic Inequalities: Social and economic marginalization can contribute to feelings of alienation and disenfranchisement, making individuals more susceptible to extremist narratives. Addressing socioeconomic inequalities through targeted policies and support programs can reduce vulnerabilities and foster social inclusion. h. Promoting Education and Opportunity: Educational opportunities and skills development programs can empower individuals to build fulfilling lives and contribute meaningfully to their communities. This can reduce the risk of turning to extremist groups for a sense of purpose or belonging. i. Promoting Interfaith Dialogue and Understanding: Fostering interfaith dialogue and promoting understanding between different communities can help combat prejudice and discrimination, ultimately reducing the appeal of extremist ideologies that often thrive on divisiveness and hatred. ------ Online radicalization to violence is a complex process wherein an individual is exposed to an ideological message and belief system that pushes them from mainstream perspectives toward extreme views. This transformation primarily takes place through online media channels, including popular social networks like Facebook, Twitter, and YouTube. The extreme views often arise from radical interpretations of mainstream religious or political doctrines, and they may advocate, endorse, provoke, or support violence as a means to achieve various social, religious, or political changes. It's crucial to note that online radicalization typically doesn't happen abruptly, triggered by a single video or post. Instead, it tends to unfold gradually over time. The factors influencing an individual's radicalization can be dynamic, changing based on circumstances or personal developments. Furthermore, the process itself is not uniform, as individuals may move back and forth between different stages or remain static, while various factors and levels interact and influence one another. Likewise, prevention is also a complicated issue. Preventing The Dissemination Of Terrorist Content Online Preventing the dissemination of terrorist content online constitutes the primary strategy for countering radicalization on social media and the internet. This approach involves employing digital mechanisms and tools to curb the spread of terrorist propaganda, encompassing legislative and policy measures, content and platform blocking, and filtering and removal of such content. These measures are interconnected, with legislative frameworks adapting to emerging technological tools in the prevention space. It is crucial to acknowledge that the prevention of terrorist content online relies on the utilization of technology and platforms predominantly owned by the private sector. Therefore, effective implementation involves fostering public-private partnerships and cooperation. Tech Against Terrorism is a noteworthy example of such collaboration, aligning with the United Nations Security Council Resolution 2354 (2017). This initiative focuses on enhancing the capabilities of smaller start-up companies and furnishing online tools to the private sector technology industry to mitigate the spread of terrorist content on their platforms. Collaborating with multiple private sector entities, including Facebook, Tech Against Terrorism consistently engages with UN Security Council bodies. Countering The Narratives Of Violent Extremism And Terrorism In The Digital Space A strategy aimed at preventing radicalization on social media and the internet involves countering the narratives of violent extremism and terrorism in the digital space, either directly or indirectly. While the definition of "counter-narratives" has sparked debates within the CVE (Countering Violent Extremism) community, for the purpose of this chapter, it is adopted as an attempt "to challenge extremist and violent extremist messages, whether directly or indirectly through a range of online and offline means." Several key points are relevant to this strategy. Firstly, countering narratives online should carefully consider the target audience within the local context. For a counter-narrative to be effective, it must address the grievances or needs of individuals joining terrorist groups and counter the attractions of terrorist propaganda. Empowering communities, both online and offline, with the necessary knowledge, skills, and tools to contest and counter the messages of violent extremism and terrorism in their networks is crucial. Organizations have implemented capacity-building initiatives for "local voices" as part of broader communication campaigns against terrorism. An illustrative example is the #insolidarity campaign by YADEN based in Kenya. This initiative offers capacity-building, tools, and platforms for youth to create their own messages and share stories about how terrorism has impacted their lives. The effectiveness of a counter-narrative lies in its ability to be both appealing and informative, dissuading individuals from being enticed by terrorist groups. Achieving this involves various approaches: deconstructing terrorists' arguments by highlighting inaccuracies in their claims, undermining the credibility of the group, and presenting alternative narratives that emphasize non-violent actions. Additionally, it is essential for counter-narratives to be reinforced by positive actions. Mere words and images are insufficient to persuade dissatisfied individuals unless accompanied by credible and consistent deeds. It also includes: · Deconstructing Terrorist Arguments · De-legitimizing Terrorist Groups and Actions · Positive Messages and Alternatives to Terrorism Building Digital Resilience and Media Literacy In the contemporary digital landscape, combating the challenges of "fake news," "misinformation," and "disinformation" is crucial, as these tactics are employed by political actors and terrorist groups alike. A third strategy for preventing online terrorism involves building digital resilience and enhancing media literacy skills. This approach is based on two key assumptions. Firstly, by fostering digital resilience and media literacy, individuals can peacefully address grievances that might lead to incorrect radicalization based on misinformation or disinformation. Secondly, individuals with improved abilities to evaluate information content and source credibility are less likely to be swayed by terrorist propaganda. To clarify these terms within the context of terrorism prevention, "fake news" is defined as "fabricated information that mimics news media content in form but not in organizational process or intent." "Misinformation" refers to false or misleading information, while "disinformation" is false information intentionally spread to deceive people. These types of content are leveraged by various actors, including politicians and terrorist groups. While not always intended to cause harm, these tools can be employed by terrorist organizations to exacerbate societal grievances, push factors leading to radicalization, or recruitment efforts. Additionally, these tactics may reinforce black-and-white thinking, encourage polarized worldviews, and exploit divisive rhetoric, further emphasizing the "us" versus "them" dynamic. When combined with hate speech and divisive narratives, the use of "fake news," "misinformation," and "disinformation" by terrorist groups can contribute to a dangerous environment. The formal education sector holds a pivotal role in equipping students with the skills to discern and counter various tactics employed by terrorist groups in spreading their messages. To support educators in this endeavour, numerous resources are available to enhance their ability to teach students about digital resilience. UNESCO offers valuable tools, such as a framework and assessment tools, designed to monitor global progress in digital literacy skills, aligning with Sustainable Development Goal #4 on Quality Education. This framework offers guidelines covering diverse digital competencies, including: · information and data literacy (e.g. browsing, searching, and evaluating data online; • communication and collaboration (e.g. interacting, sharing, and collaborating using digital technologies); • digital content creation (e.g. developing digital content, copyrights, and licensing); • safety (e.g. protecting devices, personal data, and well-being); and • problem-solving (e.g. identifying needs and digital/technical responses). Conclusion This article emphasizes several potential approaches that could contribute to terrorism prevention. A key recommendation is the implementation of a public-private cooperative and inclusive approach, recognizing the need to enhance all prevention efforts. The lack of understanding within the public sector regarding the operations of various online platforms, especially smaller, lesser-known ones, underscores the importance of coordinating with relevant providers in developing legislation, policies, and practical responses. Realistic legislation, engaging private sector representatives during development, is considered valuable for prosecuting individuals and organizations, penalizing content, and making it illegal to host such content on platforms. Blocking access to content shared by terrorist groups is another approach discussed, with a cautionary note on unintentional effects on the general population and potential infringement upon universal human rights. The resilience of online platforms, where blocked platforms are often replaced by others, suggests that a more effective approach, albeit resource-intensive, involves the takedown of terrorist content. While primarily based on private organizations' policies, this approach could benefit from robust public-private cooperation, enabling government agencies to inform platform providers about content that needs removal. The article highlights the importance of forward-looking strategies in addressing terrorism online. While the discussed approaches are preventative, they are also reactive, evolving based on past experiences and current methods employed by terrorist groups. The emphasis is placed on the need for governments and online platform providers to anticipate how platforms might be exploited in the future and anticipate potential forthcoming platforms that could contribute to radicalization and recruitment. Identifying possible future threats is crucial for developing proactive prevention strategies, and ensuring positive outcomes in the ongoing effort to counter online terrorism. References: Bulbeck, Emilia, ‘The Path to Persuasion: An Investigation into how al-Shabab Constructs their Brand in their Digital Magazine Gaidi Mtaani,’ Master’s Thesis, Uppsala University, 2017. Available at: http://uu.diva-portal.org/smash/record.jsf?pid=diva2%3A1148028&dswid=-8240 Paganini, Pierluigi, ‘The Role of Technology in Modern Terrorism,’ INFOSEC, 2018. Available at: https://resources.infosecinstitute.com/topic/the-role-of-technology-inmodern-terrorism/#gref Tech Against Terrorism, ‘Project Background (Online),’ Tech Against Terrorism, 2017. Available at: https://www.techagainstterrorism.org/project-background/. Twitter Help Center, ‘Terrorism and Violent Extremism Policy,’ Twitter Help Centre, 2019. https://transparency.twitter.com/content/dam/transparency-twitter/download/2019-juldec/Twitter_Transparency-Rules_Enforcement_Jul-Dec-2019.pdf Weimann, Gabriel, ‘Going Dark: Terrorism on the Dark Web,’ Studies in Conflict & Terrorism, 39(3), 2015, Zeiger, Sara, Undermining Violent Extremist Narratives in East Africa: A How-To Guide,’ Abu Dhabi: Hedayah, 2018. Available at: https://www.hedayahcenter.org/resources/reports_and_publications/undermining-violentextremist-narratives-in-east-africa-a-how-to-guide-2 ------ Previous Articles: Islamic Terrorism In Cyberspace: Changing Frontiers Of Global Muslim Terrorism (Part One) ISIS And Manipulation of Cyberspace for Terrorism (Part Two) Online Islamist Radicalism and the Threat of Lone Wolves Terrorist Recruitment and Communication Revolution: The Double-Edged Sword of the Digital Age Online Islamist Radicalisation Mechanisms: Impact of the Internet on the Radicalization of Lone Actor Terrorists ----- A regular columnist for NewAgeIslam.com, Mubashir V.P is a PhD scholar in Islamic Studies at Jamia Millia Islamia and freelance journalist. URL: https://newageislam.com/islam-terrorism-jihad/combating-islamist-radicalization-social-media-internet/d/131578 New Age Islam, Islam Online, Islamic Website, African Muslim News, Arab World News, South Asia News, Indian Muslim News, World Muslim News, Women in Islam, Islamic Feminism, Arab Women, Women In Arab, Islamophobia in America, Muslim Women in West, Islam Women and Feminism

0 comments: