Upload
anonymous-wziexzg
View
214
Download
0
Embed Size (px)
Citation preview
8/18/2019 Terror and Social Media PPT
1/112
When New Terrorism Met the New Media
Dr. Gabriel Weimann
8/18/2019 Terror and Social Media PPT
2/112
8/18/2019 Terror and Social Media PPT
3/112
8/18/2019 Terror and Social Media PPT
4/112
8/18/2019 Terror and Social Media PPT
5/112
Always Online:
Terrorists and Laptops
8/18/2019 Terror and Social Media PPT
6/112
Always Online: Terrorists and Laptops
8/18/2019 Terror and Social Media PPT
7/112
Uzbeki Jihadist Leader
8/18/2019 Terror and Social Media PPT
8/112
8/18/2019 Terror and Social Media PPT
9/112
Hezbollah bunker captured in
August 2006 by the Israeli Army
8/18/2019 Terror and Social Media PPT
10/112
Afghan Cyber Army (ACA)
8/18/2019 Terror and Social Media PPT
11/112
Our Project:Monitoring Terror in Cyberpace
Study is now in its 16th year
Monitoring every terrorist website (n=9,800+)
Archiving, coding and analysis of the websites’contents (visual and textual)
Research funded by USIP (United States
Institute of Peace), NIJ (National Institute ofJustice), Woodrow Wilson Center, and other
grants
8/18/2019 Terror and Social Media PPT
12/112
8/18/2019 Terror and Social Media PPT
13/112
Reporting the findings:
8/18/2019 Terror and Social Media PPT
14/112
…and Al Qaeda’s review
8/18/2019 Terror and Social Media PPT
15/112
TERRORIST PPRESENCE ONTHE NET:
In 1998: 12 terrorist websitesTsfati & Weimann, Terror on the Internet, Studies in
Conflict and Terrorism, 2002)
In 2003: 2,650 terrorist websitesWeimann, WWW.Terror.Net: How Modern Terrorism Uses
the Internet, Special Report, Washington, DC: United States
Institute of Peace. In January 2014: 9,800+ terrorist websites
Weimann, Terror on the Internet, Washington, DC: United States Institute of
Peace.
8/18/2019 Terror and Social Media PPT
16/112
WHO ARE THE ONLINETERRORISTS?
Hamas (the Islamic Resistance Movement), the Lebanese Hizbollah(Party of God), the Egyptian Al-Gama'a al Islamiyya (Islamic Group,IG), the Popular Front for the Liberation of Palestine (PLFP), the
Palestinian Islamic Jihad, Boko Haram (Nigeria), the PeruvianTupak-Amaru (MRTA) and ‘The Shining Path’ (Sendero Luminoso),the Kahane Lives movement, the Basque ETA movement, the RealIRA (RIRA), Supreme Truth (Aum Shinrikyo), the ColombianNational Liberation Army (ELN-Colombia), the Liberation Tigers ofTamil Eelam (LTTE), the Armed Revolutionary Forces of Colombia(FARC), the Popular Democratic Liberation Front Party in Turkey(DHKP/C), the Kurdish Workers’ Party (PKK), the Zapatista NationalLiberation Army (ELNZ), the Japanese Red Army (JRA), the IslamicMovement of Uzbekistan (IMU), the Mujahedin, the Chechens,Pakistan-based Lashkar-e-Taiba and Al-Qaeda.
8/18/2019 Terror and Social Media PPT
17/112
Why is the Net so useful forterrorists?
8/18/2019 Terror and Social Media PPT
18/112
The Advantages of the Internet
for Terrorists: Easy access No control, no regulations, no laws
Huge audiences, worldwide
Anonymity
Fast flow of information
Interactive medium
Cheap to establish and maintain
Multi media environment (print; sound; photos; video;)
The Internet as a source for journalists
8/18/2019 Terror and Social Media PPT
19/112
Uses of the Internet byTerrorists:
Psychological warfare
Propaganda
Networking terrorists Recruitment and mobilization
Fund raising
Datamining, information gathering
Instructions
Inner debates
Cyber-war, cyberterrorism
8/18/2019 Terror and Social Media PPT
20/112
The Emerging Trends:
1. Migration to New Media
2. “ Virtual Interactivity”3. “Narrowcasting”
4. Lone Wolf Terrorism
8/18/2019 Terror and Social Media PPT
21/112
The New Trends:
New Terrorism Meets the
New Media
http://www.google.com/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&uact=8&docid=GBzZyMogTRtH7M&tbnid=CVPJXOSdd35S7M:&ved=0CAUQjRw&url=http%3A%2F%2Fwww.communitymusicworks.org%2Fmedia.htm&ei=INM5U4P4C7DgsATslYLABQ&bvm=bv.63808443,d.dmQ&psig=AFQjCNEFKE3WF415-T9gdj7BoL6-9sNB8g&ust=1396384925874608http://www.google.com/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&uact=8&docid=AFI8O1czESJ7eM&tbnid=UG8p4n8HrmOp6M:&ved=0CAUQjRw&url=http%3A%2F%2Fupcity.com%2Fblog%2F2013%2F12%2Fhow-to-become-an-authority-on-twitter%2F&ei=StA5U7i-CueysQSI7YHABg&bvm=bv.63808443,d.dmQ&psig=AFQjCNF_Vo-onf3XGQmXzf5w0XZ3_VCrKg&ust=1396384191099853http://www.google.com/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&uact=8&docid=AFI8O1czESJ7eM&tbnid=UG8p4n8HrmOp6M:&ved=0CAUQjRw&url=http%3A%2F%2Fupcity.com%2Fblog%2F2013%2F12%2Fhow-to-become-an-authority-on-twitter%2F&ei=StA5U7i-CueysQSI7YHABg&bvm=bv.63808443,d.dmQ&psig=AFQjCNF_Vo-onf3XGQmXzf5w0XZ3_VCrKg&ust=1396384191099853
8/18/2019 Terror and Social Media PPT
22/112
New Technologies Applied byTerrorists
http://www.google.com/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&uact=8&docid=GBzZyMogTRtH7M&tbnid=CVPJXOSdd35S7M:&ved=0CAUQjRw&url=http%3A%2F%2Fwww.communitymusicworks.org%2Fmedia.htm&ei=INM5U4P4C7DgsATslYLABQ&bvm=bv.63808443,d.dmQ&psig=AFQjCNEFKE3WF415-T9gdj7BoL6-9sNB8g&ust=1396384925874608http://www.google.com/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&uact=8&docid=AFI8O1czESJ7eM&tbnid=UG8p4n8HrmOp6M:&ved=0CAUQjRw&url=http%3A%2F%2Fupcity.com%2Fblog%2F2013%2F12%2Fhow-to-become-an-authority-on-twitter%2F&ei=StA5U7i-CueysQSI7YHABg&bvm=bv.63808443,d.dmQ&psig=AFQjCNF_Vo-onf3XGQmXzf5w0XZ3_VCrKg&ust=1396384191099853http://www.google.com/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&uact=8&docid=GBzZyMogTRtH7M&tbnid=CVPJXOSdd35S7M:&ved=0CAUQjRw&url=http%3A%2F%2Fwww.communitymusicworks.org%2Fmedia.htm&ei=INM5U4P4C7DgsATslYLABQ&bvm=bv.63808443,d.dmQ&psig=AFQjCNEFKE3WF415-T9gdj7BoL6-9sNB8g&ust=1396384925874608http://www.google.com/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&uact=8&docid=GBzZyMogTRtH7M&tbnid=CVPJXOSdd35S7M:&ved=0CAUQjRw&url=http%3A%2F%2Fwww.communitymusicworks.org%2Fmedia.htm&ei=INM5U4P4C7DgsATslYLABQ&bvm=bv.63808443,d.dmQ&psig=AFQjCNEFKE3WF415-T9gdj7BoL6-9sNB8g&ust=1396384925874608http://www.google.com/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&uact=8&docid=AFI8O1czESJ7eM&tbnid=UG8p4n8HrmOp6M:&ved=0CAUQjRw&url=http%3A%2F%2Fdriveworkshop.com%2F%3Fpage_id%3D931&ei=cdA5U9T3BunQsQT-s4DgCg&bvm=bv.63808443,d.dmQ&psig=AFQjCNF_Vo-onf3XGQmXzf5w0XZ3_VCrKg&ust=1396384191099853http://www.google.com/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&uact=8&docid=AFI8O1czESJ7eM&tbnid=UG8p4n8HrmOp6M:&ved=0CAUQjRw&url=http%3A%2F%2Fupcity.com%2Fblog%2F2013%2F12%2Fhow-to-become-an-authority-on-twitter%2F&ei=StA5U7i-CueysQSI7YHABg&bvm=bv.63808443,d.dmQ&psig=AFQjCNF_Vo-onf3XGQmXzf5w0XZ3_VCrKg&ust=1396384191099853http://www.google.com/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&uact=8&docid=AFI8O1czESJ7eM&tbnid=UG8p4n8HrmOp6M:&ved=0CAUQjRw&url=http%3A%2F%2Fupcity.com%2Fblog%2F2013%2F12%2Fhow-to-become-an-authority-on-twitter%2F&ei=StA5U7i-CueysQSI7YHABg&bvm=bv.63808443,d.dmQ&psig=AFQjCNF_Vo-onf3XGQmXzf5w0XZ3_VCrKg&ust=1396384191099853http://www.google.co.il/url?sa=i&rct=j&q=instagram&source=images&cd=&cad=rja&docid=4xK8nStpmljvvM&tbnid=2nvTFWifClpqqM:&ved=0CAUQjRw&url=http://mashable.com/2012/04/09/facebook-instagram-buy/&ei=opNFUcXVAoiWswblvYDoBQ&psig=AFQjCNELzkIMbtr6fYgTGLIdxSRV7NYySQ&ust=1363600545521861http://earth.google.com/
8/18/2019 Terror and Social Media PPT
23/112
3 stages in terrorist use ofthe Net:
Websites only:1Stage
+ InteractiveWebsites:2Stage(forums, chatrooms)
+ Social Media+ InteractiveWebsites:3Stage (YouTube, Facebook, Twitter, etc.)
8/18/2019 Terror and Social Media PPT
24/112
Al Qaeda’s “ early” site(1998-2002)
8/18/2019 Terror and Social Media PPT
25/112
Al Qaeda’s new site:
8/18/2019 Terror and Social Media PPT
26/112
Al Qaeda’s new site:
http://www.google.com/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&uact=8&docid=J2ZotbOZPCzBZM&tbnid=l2O3uGgtk4HadM:&ved=0CAYQjRw&url=http%3A%2F%2Fpublicintelligence.net%2Faqap-inspire-issue-11%2F&ei=b-wpU_znIqLi0QG33IGwAg&bvm=bv.62922401,d.dmQ&psig=AFQjCNFr8msGRMybli6GW2K-GPpd9oKH8g&ust=1395342829694075http://www.google.com/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&uact=8&docid=J2ZotbOZPCzBZM&tbnid=l2O3uGgtk4HadM:&ved=0CAYQjRw&url=http%3A%2F%2Fpublicintelligence.net%2Faqap-inspire-issue-11%2F&ei=b-wpU_znIqLi0QG33IGwAg&bvm=bv.62922401,d.dmQ&psig=AFQjCNFr8msGRMybli6GW2K-GPpd9oKH8g&ust=1395342829694075
8/18/2019 Terror and Social Media PPT
27/112
Inspire Magazine
http://www.google.com/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&uact=8&docid=J2ZotbOZPCzBZM&tbnid=l2O3uGgtk4HadM:&ved=0CAYQjRw&url=http%3A%2F%2Fpublicintelligence.net%2Faqap-inspire-issue-11%2F&ei=b-wpU_znIqLi0QG33IGwAg&bvm=bv.62922401,d.dmQ&psig=AFQjCNFr8msGRMybli6GW2K-GPpd9oKH8g&ust=1395342829694075http://www.google.co.il/url?sa=i&rct=j&q=inspire+magazine&source=images&cd=&cad=rja&docid=ohxvU9q_mI6OfM&tbnid=P6nJ-0rlOMeFcM:&ved=0CAUQjRw&url=http%3A%2F%2Finfluenceguy.wordpress.com%2Ftag%2Finspire%2F&ei=PtBGUe6yFcqItAaY54DYDw&psig=AFQjCNEWzvih5CAUvX4DCcOcpYLtp05ksA&ust=1363681659168890http://www.google.com/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&uact=8&docid=J2ZotbOZPCzBZM&tbnid=l2O3uGgtk4HadM:&ved=0CAYQjRw&url=http%3A%2F%2Fpublicintelligence.net%2Faqap-inspire-issue-11%2F&ei=b-wpU_znIqLi0QG33IGwAg&bvm=bv.62922401,d.dmQ&psig=AFQjCNFr8msGRMybli6GW2K-GPpd9oKH8g&ust=1395342829694075http://www.google.com/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&uact=8&docid=J2ZotbOZPCzBZM&tbnid=l2O3uGgtk4HadM:&ved=0CAYQjRw&url=http%3A%2F%2Fpublicintelligence.net%2Faqap-inspire-issue-11%2F&ei=b-wpU_znIqLi0QG33IGwAg&bvm=bv.62922401,d.dmQ&psig=AFQjCNFr8msGRMybli6GW2K-GPpd9oKH8g&ust=1395342829694075http://www.google.co.il/url?sa=i&rct=j&q=inspire+magazine&source=images&cd=&cad=rja&docid=60Atg5tQXXUB5M&tbnid=_6tmggesphE5lM:&ved=0CAUQjRw&url=http%3A%2F%2Foccident.blogspot.com%2F2011%2F01%2F4th-issue-of-inspire-magazine-from-al.html&ei=6M9GUfa9CcWJtQbG7YCgDg&psig=AFQjCNG5DCSItr5D2Fjo63MtUlnNTz-kfg&ust=1363681634551117
8/18/2019 Terror and Social Media PPT
28/112
Inspire is an English language onlinemagazine published by al-Qaeda in the
Arabian Peninsula (AQAP).
http://www.google.co.il/url?sa=i&rct=j&q=inspire+magazine+aqap&source=images&cd=&cad=rja&docid=D7DnlJ7bSAI__M&tbnid=Rc06B_OviaQEwM:&ved=0CAUQjRw&url=http%3A%2F%2Fpublicintelligence.net%2Fcomplete-inspire-al-qaeda-in-the-arabian-peninsula-aqap-magazine%2F&ei=ItFGUYuUE83Dswbrn4G4DQ&psig=AFQjCNGBAchRs059DE4ZiwloBr4fr62sbA&ust=1363681949833500http://www.google.co.il/url?sa=i&rct=j&q=inspire+magazine&source=images&cd=&cad=rja&docid=ohxvU9q_mI6OfM&tbnid=P6nJ-0rlOMeFcM:&ved=0CAUQjRw&url=http%3A%2F%2Fpublicintelligence.net%2Finspire-al-qaeda-in-the-arabian-peninsula-magazine-issue-6-july-2011%2F&ei=idBGUfOhAYPUtQbOnIH4Dw&psig=AFQjCNEWzvih5CAUvX4DCcOcpYLtp05ksA&ust=1363681659168890http://www.google.co.il/url?sa=i&rct=j&q=inspire+magazine&source=images&cd=&cad=rja&docid=ohxvU9q_mI6OfM&tbnid=P6nJ-0rlOMeFcM:&ved=0CAUQjRw&url=http%3A%2F%2Fsocialpsychologyeye.wordpress.com%2Fcategory%2Fsocial-cognition%2F&ei=ctBGUdSgDsrBswbRoIHwBA&psig=AFQjCNEWzvih5CAUvX4DCcOcpYLtp05ksA&ust=1363681659168890
8/18/2019 Terror and Social Media PPT
29/112
INSPIRE 12March 2014
http://www.longwarjournal.org/images/Inspire-AQAP-Spring-2014-edition.jpg
8/18/2019 Terror and Social Media PPT
30/112
From Inspire 12:Car Bombs in America
http://cdn.timesofisrael.com/uploads/2014/03/Inspire-car-bomb-main-e1395220862993.png
8/18/2019 Terror and Social Media PPT
31/112
Multimedia:Hezbollah’s Al-Manar Television Online:
8/18/2019 Terror and Social Media PPT
32/112
Hizbollah’s Al-Nour Radio Online
8/18/2019 Terror and Social Media PPT
33/112
Dar al-Hadi: Hezbollah’s publishing
house Online
8/18/2019 Terror and Social Media PPT
34/112
Download Nasrallah’s posters…
8/18/2019 Terror and Social Media PPT
35/112
Jihad Academy online: A Film Production by the Global Islamic
Media Front (GIMF)
8/18/2019 Terror and Social Media PPT
36/112
Terrorist Migration toSocial Media
8/18/2019 Terror and Social Media PPT
37/112
Why social media?
1. Interactive
2. Trendy, popular
3. Young demographics
4. “ knock on their doors”
8/18/2019 Terror and Social Media PPT
38/112
YouTube, They Tube…
8/18/2019 Terror and Social Media PPT
39/112
Importance of YouTube
Attractive, visual, moving images
much easier to locate (no Arabic or high
level of Internet literacy necessary) Appealing to young people
Easy copying and dissemination (e-mail
links, but also copy to VHS, CDs, DVDs,mobile phones)
8/18/2019 Terror and Social Media PPT
40/112
If you put the words“ Hamas Islamic Resistance Movement ”
in YouTube search…
8/18/2019 Terror and Social Media PPT
41/112
8/18/2019 Terror and Social Media PPT
42/112
Hamas Launches AqsaTube,Inspired by YouTube (October 2008)
8/18/2019 Terror and Social Media PPT
43/112
Hamas Launches Pal Tube(2011)
8/18/2019 Terror and Social Media PPT
44/112
All terrorist groups are nowon YouTube
8/18/2019 Terror and Social Media PPT
45/112
Hezbollah’s YouTube
8/18/2019 Terror and Social Media PPT
46/112
Al Qaeda’s YouTube
8/18/2019 Terror and Social Media PPT
47/112
Al Qaeda’s YouTube
Ch h Jih di t Cl i
8/18/2019 Terror and Social Media PPT
48/112
Chechen Jihadists ClaimResponsibility for Moscow Subway
Bombings (March 2010) on YouTube
8/18/2019 Terror and Social Media PPT
49/112
PKK on YouTube
8/18/2019 Terror and Social Media PPT
50/112
“Istiqlal Media”Taliban’s YouTube channel
http://www.wired.com/dangerroom/2009/10/taliban-steps-boldy-in-2007-invades-youtube/taliban-youtube-screen/
8/18/2019 Terror and Social Media PPT
51/112
Taliban’s YouTube video
http://www.google.com/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&uact=8&docid=ExPYyws6U1eStM&tbnid=qrIJ3oF74orBnM:&ved=0CAUQjRw&url=http%3A%2F%2Fwww.zdnet.com%2Fblog%2Figeneration%2Fhow-national-unfriend-day-can-prevent-terrorism%2F6696&ei=cVVqU53qFougyASqq4CIDQ&bvm=bv.66111022,d.aWw&psig=AFQjCNFWGKU3AdNMaGOJdPNhfLPgI-qJlQ&ust=1399564014506264http://www.google.com/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&uact=8&docid=ExPYyws6U1eStM&tbnid=qrIJ3oF74orBnM:&ved=0CAUQjRw&url=http%3A%2F%2Fwww.zdnet.com%2Fblog%2Figeneration%2Fhow-national-unfriend-day-can-prevent-terrorism%2F6696&ei=cVVqU53qFougyASqq4CIDQ&bvm=bv.66111022,d.aWw&psig=AFQjCNFWGKU3AdNMaGOJdPNhfLPgI-qJlQ&ust=1399564014506264
8/18/2019 Terror and Social Media PPT
52/112
Terror on Facebook
http://www.google.com/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&uact=8&docid=ExPYyws6U1eStM&tbnid=qrIJ3oF74orBnM:&ved=0CAUQjRw&url=http%3A%2F%2Fwww.zdnet.com%2Fblog%2Figeneration%2Fhow-national-unfriend-day-can-prevent-terrorism%2F6696&ei=cVVqU53qFougyASqq4CIDQ&bvm=bv.66111022,d.aWw&psig=AFQjCNFWGKU3AdNMaGOJdPNhfLPgI-qJlQ&ust=1399564014506264http://www.google.com/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&uact=8&docid=ExPYyws6U1eStM&tbnid=qrIJ3oF74orBnM:&ved=0CAUQjRw&url=http%3A%2F%2Fwww.zdnet.com%2Fblog%2Figeneration%2Fhow-national-unfriend-day-can-prevent-terrorism%2F6696&ei=cVVqU53qFougyASqq4CIDQ&bvm=bv.66111022,d.aWw&psig=AFQjCNFWGKU3AdNMaGOJdPNhfLPgI-qJlQ&ust=1399564014506264
8/18/2019 Terror and Social Media PPT
53/112
“ Generation Awlaki” on Facebook
8/18/2019 Terror and Social Media PPT
54/112
“ Generation Awlaki” onFacebook
8/18/2019 Terror and Social Media PPT
55/112
“ The ink of the Scholars, theblood of the Martyrs”
8/18/2019 Terror and Social Media PPT
56/112
8/18/2019 Terror and Social Media PPT
57/112
“ Download Awlaki’s Lectures”
Mohammed al Zawahiri 's
8/18/2019 Terror and Social Media PPT
58/112
Mohammed al Zawahiri 'sFacebook page(brother of Ayman)
8/18/2019 Terror and Social Media PPT
59/112
Three video clips posted on his Facebookpage show Mohammed al Zawahiri
encouraging would-be jihadists to support:
The mujahideen in Mali
The Al Nusrah Front in Syria
The Islamic State of Iraq
8/18/2019 Terror and Social Media PPT
60/112
Twitter: Tweets of Terror
To help protectyourprivacy, PowerPointhasblocked automaticdownload of thispicture.
8/18/2019 Terror and Social Media PPT
61/112
The al Shabaab Attack onWestgate Mall, Nairobi, Kenya
September 2013
http://www.google.com/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&uact=8&docid=i5rJJrMkBlT2zM&tbnid=k2uDIw9jIJA-uM:&ved=0CAUQjRw&url=http%3A%2F%2Fwww.telegraph.co.uk%2Fnews%2Fworldnews%2Fafricaandindianocean%2Fkenya%2F10349415%2FNairobi-mall-attack-Bodies-retrieved-from-Westgate-as-militants-vow-more-strikes.html&ei=b5piU5fBLNDT7AbLtIGoCw&psig=AFQjCNGDWNgWOCqx30AkKUHciOCYqwef1g&ust=1399057097918557
8/18/2019 Terror and Social Media PPT
62/112
http://www.google.com/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&uact=8&docid=i5rJJrMkBlT2zM&tbnid=k2uDIw9jIJA-uM:&ved=0CAUQjRw&url=http%3A%2F%2Fwww.telegraph.co.uk%2Fnews%2Fworldnews%2Fafricaandindianocean%2Fkenya%2F10326863%2FTweeting-terrorism-How-al-Shabaab-live-blogged-the-Nairobi-attacks.html&ei=m5piU8OuA6mS7Abw14HIBg&psig=AFQjCNGDWNgWOCqx30AkKUHciOCYqwef1g&ust=1399057097918557
8/18/2019 Terror and Social Media PPT
63/112
http://www.google.com/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&uact=8&docid=ZI1JzrVW2tVDwM&tbnid=ebyNKdi0-kTXZM:&ved=0CAUQjRw&url=http%3A%2F%2Fsomalianewsroom.com%2Falleged-cctv-photo-released-of-westgate-attackers%2F&ei=oZliU47FB4mMyQGZ6oCgCA&psig=AFQjCNGDWNgWOCqx30AkKUHciOCYqwef1g&ust=1399057097918557http://www.google.com/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&uact=8&docid=ZI1JzrVW2tVDwM&tbnid=ebyNKdi0-kTXZM:&ved=0CAUQjRw&url=http%3A%2F%2Fsomalianewsroom.com%2Falleged-cctv-photo-released-of-westgate-attackers%2F&ei=oZliU47FB4mMyQGZ6oCgCA&psig=AFQjCNGDWNgWOCqx30AkKUHciOCYqwef1g&ust=1399057097918557
8/18/2019 Terror and Social Media PPT
64/112
Al-Qaeda on Twitter Under the guise of its Shamukh al-Islam website, the official website of al Qaeda, the
terror group has now its own Twitter feed
@shomokhalislam
https://twitter.com/shomokhalislamhttps://twitter.com/shomokhalislam
8/18/2019 Terror and Social Media PPT
65/112
Al-Qaeda affiliate in Syria ISIL:Online Executions
Islamic State in Iraq and the Levant
Islamic State in Iraq and the Levant (ISIL)
http://www.google.com/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&uact=8&docid=3Sbb5cjAPE3zTM&tbnid=4-Zdfn6wW9-a9M:&ved=0CAUQjRw&url=http%3A%2F%2Fen.alalam.ir%2Fnews%2F1539338&ei=e2xqU6DlENHcoATT5ILADQ&bvm=bv.66111022,d.aWw&psig=AFQjCNHg_o1FI4dby867u6t8RadK-lJDVw&ust=1399569785959163http://www.google.com/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&uact=8&docid=3Sbb5cjAPE3zTM&tbnid=4-Zdfn6wW9-a9M:&ved=0CAUQjRw&url=http%3A%2F%2Fen.alalam.ir%2Fnews%2F1539338&ei=e2xqU6DlENHcoATT5ILADQ&bvm=bv.66111022,d.aWw&psig=AFQjCNHg_o1FI4dby867u6t8RadK-lJDVw&ust=1399569785959163
8/18/2019 Terror and Social Media PPT
66/112
ISIL’s prisoners crucified
ISIL took responsibi lity for the crucifixtion on Twitter
S i El t i A
8/18/2019 Terror and Social Media PPT
67/112
Syrian Electronic Army(SEA)
SEA is a collection of computer hackers who support the
government of Syrian President Bashar al-Assad. Using
denial of service attacks, defacement, and other methods,
it mainly targets political opposition groups and western
websites, including US news organizations and US banks
8/18/2019 Terror and Social Media PPT
68/112
SEA Attacking Twitter:
In 2013 The Syrian Electronic Army hacked a number ofhigh-profile Twitter accounts and websites, including those
of The New York Times, the Associated Press, and the
Guardian.
8/18/2019 Terror and Social Media PPT
69/112
8/18/2019 Terror and Social Media PPT
70/112
April 2013: SEA hacks AP causing stockmarket drop of $136 billion
8/18/2019 Terror and Social Media PPT
71/112
A Terrorist’s Dream ComesTrue..
8/18/2019 Terror and Social Media PPT
72/112
Mumbai attacks (2008) wereplanned with Google Earth
L T i M b i tt k (2008)
8/18/2019 Terror and Social Media PPT
73/112
LeT in Mumbai attacks (2008)used Google Earth
Using Google Earth website to
8/18/2019 Terror and Social Media PPT
74/112
Using Google Earth website topinpoint attacks
(in Basra, Iraq)
G f G
8/18/2019 Terror and Social Media PPT
75/112
Google Earth Map of Abu GhraibPrison posted on Jihadi website
8/18/2019 Terror and Social Media PPT
76/112
M d S t d R t f
8/18/2019 Terror and Social Media PPT
77/112
Maps and Suggested Routes forTraveling to Somalia for Jihad
Google Earth used to target
8/18/2019 Terror and Social Media PPT
78/112
Google Earth used to targetIsrael
8/18/2019 Terror and Social Media PPT
79/112
PIJ Announces Use of Google Earth
to Target Sderot
i f th CIA h d t i
8/18/2019 Terror and Social Media PPT
80/112
image of the CIA headquarters inLangley, posted on Jihadi sites
8/18/2019 Terror and Social Media PPT
81/112
The Impact of Terrorist
Use of New Media:Lone Wolves in
Cyberspace
8/18/2019 Terror and Social Media PPT
82/112
8/18/2019 Terror and Social Media PPT
83/112
A lone wolf terrorist is someone whocommits or prepares for, or is suspected
of committing or preparing for, violentacts in support of some group,
movement, or ideology, but who does soalone, outside of any command structure
and without material assistance from
any group.
The Shift Toward
8/18/2019 Terror and Social Media PPT
84/112
The Shift TowardLeaderless Terrorism
http://www.google.co.il/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&docid=zefUVMphHjzM7M&tbnid=qVPz21VWsD--4M:&ved=0CAUQjRw&url=http%3A%2F%2Fwww.insidehighered.com%2Fviews%2F2012%2F08%2F15%2Freview-george-michael-lone-wolf-terror-and-rise-leaderless-resistance&ei=GvFKUai2B8e4O7qfgJgC&psig=AFQjCNHCIMeq8A1Ud3Wr-s5zMtDWSNME_Q&ust=1363952023589625
8/18/2019 Terror and Social Media PPT
85/112
8/18/2019 Terror and Social Media PPT
86/112
"The most likely scenario that wehave to guard against right now
ends up being more of a lone wolfoperation than a large, well-coordinated terrorist attack“
President Obama August 16, 2011
Jose Pimentel
8/18/2019 Terror and Social Media PPT
87/112
Jose Pimentel (arrested November 2011)
Army Major Nidal Hasan has been
8/18/2019 Terror and Social Media PPT
88/112
y jcharged with kill ing 13 people at Fort
Hood in 2009
Britain’s “ Lone Wolf” :
http://www.google.co.il/url?sa=i&rct=j&q=lone+wolf+terror+ppt&source=images&cd=&docid=GdE7kmtCW9oT2M&tbnid=Yp5t44w831JdEM:&ved=0CAUQjRw&url=http%3A%2F%2Fbijenkorf.wordpress.com%2Fcategory%2Famerica%2Fmilitary-america%2F&ei=a99GUdO2M4iLtAbOvoDADA&psig=AFQjCNFL1Vh6AsM_opkL4K02UB5BXhJb9w&ust=1363685605352986
8/18/2019 Terror and Social Media PPT
89/112
Britain s Lone Wolf :Terrorist Isa Ibrahim
8/18/2019 Terror and Social Media PPT
90/112
http://www.google.co.il/imgres?imgurl=http%3A%2F%2Fwww.homelandsecuritynewswire.com%2Fsites%2Fdefault%2Ffiles%2Fimagecache%2Fstandard%2Fmohamed_osman_mohamud-1.jpg&imgrefurl=http%3A%2F%2Fwww.homelandsecuritynewswire.com%2Fterrorists-lone-wolf-approach-changes-us-strategy&docid=CfnNtb3T0NioRM&tbnid=0icXmdi-BrQatM%3A&w=300&h=305&ei=KeRGUfTnCcjS4QSbu4CIBw&ved=0CAIQxiAwAA&iact=ricshttp://www.google.co.il/imgres?imgurl=https%3A%2F%2Ftwimg0-a.akamaihd.net%2Fprofile_images%2F498375468%2Fmoi_normal.jpg&imgrefurl=https%3A%2F%2Ftwitter.com%2FAlexisZegerman&docid=q1yoq6lzLZ6GGM&tbnid=SSKrVROIPbHNTM&w=500&h=375&ei=KeRGUfTnCcjS4QSbu4CIBw&ved=0CAUQxiAwAw&iact=ricshttp://www.google.co.il/imgres?imgurl=http%3A%2F%2Fimg.timeinc.net%2Ftime%2Fdaily%2F2009%2F0907%2F360_daniel_boyd_0729.jpg&imgrefurl=http%3A%2F%2Fwww.time.com%2Ftime%2Fnation%2Farticle%2F0%2C8599%2C1913602%2C00.html&docid=MCmcs4OEgF2uQM&tbnid=ogmyHLt3it4gvM&w=360&h=235&ei=KeRGUfTnCcjS4QSbu4CIBw&ved=0CAQQxiAwAg&iact=ricshttp://www.google.co.il/imgres?imgurl=http%3A%2F%2Fwww.homelandsecuritynewswire.com%2Fsites%2Fdefault%2Ffiles%2Fimagecache%2Fstandard%2Fabdulmutallab-1.jpg&imgrefurl=http%3A%2F%2Fwww.homelandsecuritynewswire.com%2Fhomegrown-terrorists-share-characteristics-backgrounds&docid=jrL7_oEeziM7cM&tbnid=Sjjpi6YuIFUkyM&w=300&h=204&ei=KeRGUfTnCcjS4QSbu4CIBw&ved=0CAMQxiAwAQ&iact=ricshttp://www.google.co.il/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&docid=tKy9_7CRZpveWM&tbnid=flWGjdpppeKGUM:&ved=0CAUQjRw&url=http://worldobserveronline.com/2013/06/01/woolwich-attack-english-defence-league-chief-muslim-share-hug-protest-2/daily-mirror-front-page-woolwich-beheading-1905709/&ei=t-jCUfCsM4nnswagmoHwCQ&psig=AFQjCNF1ufEiAcY6SYY8MDb_s1kGzll7_Q&ust=1371814245080402
8/18/2019 Terror and Social Media PPT
91/112
http://www.google.co.il/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&docid=tKy9_7CRZpveWM&tbnid=flWGjdpppeKGUM:&ved=0CAUQjRw&url=http://worldobserveronline.com/2013/06/01/woolwich-attack-english-defence-league-chief-muslim-share-hug-protest-2/daily-mirror-front-page-woolwich-beheading-1905709/&ei=t-jCUfCsM4nnswagmoHwCQ&psig=AFQjCNF1ufEiAcY6SYY8MDb_s1kGzll7_Q&ust=1371814245080402
8/18/2019 Terror and Social Media PPT
92/112
Calling the “ wolves” :
Video By Al-Qaeda Media Company Al-Sahab
8/18/2019 Terror and Social Media PPT
93/112
Video By Al-Qaeda Media Company Al-SahabUses Image Of Nidal Hasan To Underline Call
For Lone Wolf Operations
The Boston Marathon attack
8/18/2019 Terror and Social Media PPT
94/112
The Boston Marathon attack April 15, 2013
http://www.google.co.il/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&docid=82xCsKLqUSxDGM&tbnid=rRZQdXUJPF-1NM:&ved=0CAUQjRw&url=http://www.dailymail.co.uk/news/article-2311471/Boston-Marathon-bomb-killer-pictured-walking-calmly-away-scene-horror.html&ei=0-TCUduHK4LWtAamz4HgBg&psig=AFQjCNEdYzE-iAkNe9ttKLrG_X9W_pW28g&ust=1371813455236468http://www.google.co.il/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&docid=82xCsKLqUSxDGM&tbnid=rRZQdXUJPF-1NM:&ved=0CAUQjRw&url=http://www.dailymail.co.uk/news/article-2311471/Boston-Marathon-bomb-killer-pictured-walking-calmly-away-scene-horror.html&ei=0-TCUduHK4LWtAamz4HgBg&psig=AFQjCNEdYzE-iAkNe9ttKLrG_X9W_pW28g&ust=1371813455236468
8/18/2019 Terror and Social Media PPT
95/112
The Tsarnaev brothers
8/18/2019 Terror and Social Media PPT
96/112
The Tsarnaev brothers
http://www.google.co.il/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&docid=m9Dx2Yvif0qfoM&tbnid=X-eAUCB62XsntM:&ved=0CAUQjRw&url=http://www.mirror.co.uk/news/world-news/boston-marathon-bombers-al-qaeda-sympathisers-1836500&ei=S-XCUeiKKYGntAaI_YGYCQ&psig=AFQjCNHWiHD_vq8mlFd2PiE2xeuqCFIWBw&ust=1371813575632664
8/18/2019 Terror and Social Media PPT
97/112
Federal law enforcement officials haveconfirmed that Dzhokhar Tsarnaev and his
brother got bomb-making instructions
from Inspire magazine.
http://www.google.com/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&docid=7wZw1OgKYD8W5M&tbnid=Ho1gacVDWgPgpM:&ved=0CAUQjRw&url=http://blog.adl.org/extremism/inspire-magazine-a-staple-of-domestic-terror&ei=zInZUoysLPPmsATZ4IL4Bg&psig=AFQjCNHvb-pwWXaj7FHVjldF3f0Dme-etg&ust=1390074614327593http://www.google.com/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&docid=7wZw1OgKYD8W5M&tbnid=Ho1gacVDWgPgpM:&ved=0CAUQjRw&url=http://blog.adl.org/extremism/inspire-magazine-a-staple-of-domestic-terror&ei=zInZUoysLPPmsATZ4IL4Bg&psig=AFQjCNHvb-pwWXaj7FHVjldF3f0Dme-etg&ust=1390074614327593
8/18/2019 Terror and Social Media PPT
98/112
8/18/2019 Terror and Social Media PPT
99/112
Teaching the “ Wolves”
In 2013 al Qaeda presents a new
8/18/2019 Terror and Social Media PPT
100/112
In 2013 al Qaeda presents a newonline booklet :
http://www.google.com/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&docid=vo2H0Un2d0EG6M&tbnid=gfCmaAY9bGFMxM:&ved=0CAUQjRw&url=http://worldanalysis.net/modules/news/article.php?storyid=2194&ei=_YrZUpSwNM_gsATU9oGgBw&psig=AFQjCNGObozsu04EYsgR_f_F604rrrd7Mw&ust=1390074943888118
8/18/2019 Terror and Social Media PPT
101/112
Glorifying the “ Wolves”
8/18/2019 Terror and Social Media PPT
102/112
Glorifying the “ Wolves”
A graphic from Inspire 11, imagining an
8/18/2019 Terror and Social Media PPT
103/112
g p p , g gangelic Tamerlan Tzarnaev texting his
mother
Jihad Jane Over a Dozen
8/18/2019 Terror and Social Media PPT
104/112
Jihad Jane – Over a DozenYouTube Pages
In March 2010, an American woman, Colleen LaRose aka"Jihad Jane," had been arrested for alleged ties to Al-Qaeda.LaRose maintained over a dozen YouTube pages devoted to
violent jihad. Her activities included alleged involvement in an plot to kill the Swedish cartoonish Lars Vilks.
Lone Wolf Jihadists Arrested in the
8/18/2019 Terror and Social Media PPT
105/112
Lone Wolf Jihadists Arrested in theWest and in Possession of Inspire 1. Jose Pimentel, arrested November 19, 2011. A Manhattan resident , Pimentel planned to target U.S.
servicemen, post offices, and poli ce.
2. Naser Jason Abdo, a Muslim U.S. in the Army, arrested in July 2011. Abdo was planning an attackon Fort Hood military personnel, similar to the shooting by Major Nidal Hasan. He was found inpossession of an article from Inspire titled " How to Make a Bomb in the Kitchen of Your Mom," which heused to make the bombs he planned to use in his attack.
3. Nine suspects in the U.K.: British officials conduc ted coordinated raids in three separate cities afterconcluding that the suspects were " researching , discussing , carrying out reconnaissance, and agreeingon potential targets," and " igniting and testing incendiary material"; one target was the U.S. Embassy inLondon. They were using Inspire.
4. Hakan Ertarkan, arrested Apri l 12, 2011. Ertakan, 21, from the Edmonton neighborhood of London,was found to be in possession o f a CD issue of Inspire. He was charged with " possessing a record ofinformation of a kind likely to be useful to a person committing or preparing an act of terrori sm."
5. Chris tian Emde and Robert Baum, arrested July 15, 2011. German cit izens Emde, 28, and Baum, 24,were arrested when they tried to enter Britain in possession of electronic copes of Inspire.
6. Zahid Iqbal, Mohammed Sharfaraz Ahmed, Umar Arshad, and Syed Farhan Hussain, arrested in
Britain on Apri l 24, 2012. The four, all aged 21 to 30, are suspected of plot ting to dr ive a toy car loadedwith explosives under the gates of a military base. Iqbal is accused of leading a terror network under theinstruction o f Al-Qaeda masterminds in Pakistan; all are accused of working to recruit others, of takingtheir lead from Inspire, and of possessing cop ies of it.
8/18/2019 Terror and Social Media PPT
106/112
8/18/2019 Terror and Social Media PPT
107/112
Migration to Social
Media Correlates With:
1. “ Virtual Interactivity”
2. “ Narrowcasting”
8/18/2019 Terror and Social Media PPT
108/112
OnlineCounterterrorism:
New Arena, NewChallenges
8/18/2019 Terror and Social Media PPT
109/112
1. The new digital arena requires
new warriors, new weapons and newdefenses (including NSA monitoring,counter-campaigns).
8/18/2019 Terror and Social Media PPT
110/112
2.The new “ war on terrorism” requiresnew regulations so that we will not pay
heavier prices in terms of our civil
liberties.
8/18/2019 Terror and Social Media PPT
111/112
3. Preemptive: Prepare for futurechallenges (e.g., next generation’s
platforms) instead of response-only
8/18/2019 Terror and Social Media PPT
112/112
Thanks
contact: