Abstract
Without recruitment terrorism can not prevail, survive and develop. Recruitment provides the killers, the suicide bombers, the kidnappers, the executioners, the engineers, the soldiers and the armies of future terrorism. The internet has become a useful instrument for modern terrorists’ recruitment and especially of foreign fighters. Online platforms and particularly the new social media (e.g., Twitter, Facebook, YouTube) combine several advantages for the recruiters. The global reach of the Net allows groups to publicise events to more people; and by increasing the possibilities for interactive communication, new opportunities for assisting groups and individuals are offered, along with more chances for contacting them directly. Terrorist recruiters may use interactive online platforms to roam online communities, looking for more ‘promising’ and receptive individuals, using sophisticated profiling procedures. Online recruitment of foreign fighters by terrorist organisations such as the Islamic State (IS) is analysed here as an example of an online multichannel recruitment venue.
The author is a Full Professor of Communication at Haifa University, Israel. This chapter is based on a research project on Terrorism in Cyberspace funded by the United States Institute of Peace (USIP), Washington, DC, The Woodrow Wilson Center (Washington, DC) and the National Institute of Justice (NIH).
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
Katz 2014a.
- 2.
According to UN assessment published in November 2014, the number of foreign terrorist fighters in the Syria and Iraq conflicts alone has grown to over 15,000 from more than 80 countries while other fighters are reportedly seeking to join militant groups in Somalia, Yemen, as well as several countries in the Maghreb and Sahel regions, at: http://www.un.org/apps/news/story.asp?NewsID=49381#.VRkSQvnoT_8.
- 3.
Hoffman 2004, p. 1.
- 4.
The term foreign terrorist fighter was used in the UN Security Council Resolution 2178 (2014). Adopted under Chapter VII, it requires states to take a series of measures to prevent the movement and recruitment of foreign terrorist fighters.
- 5.
The report was obtained and reported by The Guardian and published on 30 October 2014, at: http://www.theguardian.com/world/2014/oct/30/foreign-jihadist-iraq-syria-unprecedented-un-isis.
- 6.
- 7.
“Isis: Jihadi Janes in Syria incite UK Muslim women to violence say ICSR study”, International Business Times, 18 January 2015, at: http://www.ibtimes.co.uk/isis-jihadi-janes-syria-incite-uk-muslim-women-violence-says-icsr-study-1483971. See also Chap. 7 by Van Leuven, Mazurana and Gordon in this volume.
- 8.
- 9.
- 10.
Just 2015.
- 11.
- 12.
Zanini and Edwards 2001.
- 13.
- 14.
Gerwehr and Daly 2006.
- 15.
On the notion of trust in online recruitment, see Hegghammer 2015.
- 16.
Kik is a smartphone application for messaging.
- 17.
- 18.
Lennings et al. 2010.
- 19.
MEMRI 2014.
- 20.
Weimann 2008b.
- 21.
- 22.
See also Chap. 7 by Van Leuven, Mazurana and Gordon in this volume.
- 23.
For example, there are at least 70 German women who joined IS (see: http://rt.com/news/245077-germany-women-join-isis/), about 60 British women (http://www.independent.co.uk/news/uk/home-news/syria-girls-at-least-60-british-women-and-girls-as-young-as-15-have-joined-isis-in-syria-10078069.html) and the overall estimate is that about 10 % of foreign recruits from Europe, North America and Australia are women (http://www.dissentmagazine.org/article/why-women-choose-isis-islamic-militancy).
- 24.
Recorded Future 2015.
- 25.
Klausen 2015.
- 26.
Berger and Morgan 2015.
- 27.
The Dark Web is a collection of thousands of websites that use various measures and tools to hide their IP address, thus enabling anonymous users from surveillance and identification. The websites on the Dark Web are publicly visible, yet hide the addresses of the servers that run them. That means anyone can visit a Dark Web site, but it can be very difficult to figure out where they are hosted or by whom.
- 28.
Cited in Department for Homeland Security 2010.
- 29.
Weyers 2014.
- 30.
As Klausen, 2015, at 4 argues, “Tweets of cats and images of camaraderie bridge the real-life gap between Strasbourg, Cardiff, or suburban Denver, and being in a war zone. They may even make it seem more desirable to be in war-torn Raqqa and Aleppo than comfortably, and boringly, in the family home”.
- 31.
- 32.
Weimann 2014a.
- 33.
- 34.
See, for example, the VOX-Pol project, a European Union Framework Program, funding academic research network focused on researching the prevalence, contours, functions, and impacts of violent online political extremism and responses to it. At: http://voxpol.eu/.
- 35.
White House 2011a, p. 6.
- 36.
White House 2011b, p. 20.
- 37.
Bipartisan Policy Center 2012.
- 38.
MEMRI 2013.
- 39.
Malik et al. 2014.
- 40.
Bipartisan Policy Center 2012.
- 41.
Casebeer and Russell 2005.
- 42.
Al Raffie 2012, p. 17.
- 43.
See SNTT website (http://www.sntt.me/), Facebook (https://ar-ar.facebook.com/saynototerror), Twitter (https://twitter.com/saynototerror), YouTube (http://www.youtube.com/user/saynototerror).
- 44.
Aly et al. 2014.
- 45.
Reported by CNN, at: http://edition.cnn.com/2015/02/23/europe/france-anti-jihadist-campaign/.
- 46.
References
Ahmad A (2014) The role of social networks in the recruitment of youth in an Islamist organization in Pakistan. Sociol Spectrum 34(6):469–488
Al Raffie D (2012) Whose hearts and minds? Narratives and counter-narratives of Salafi Jihadism. J Terrorism Res 3(2):13–31
Aly A, Weimann-Saks D, Weimann G (2014) Making ‘noise’ online: an analysis of the say no to terror online campaign. Perspectives on terrorism 8(5). http://www.terrorismanalysts.com/pt/index.php/pot/article/view/376
Berger JM, Morgan J (2015) The ISIS Twitter census. The Brookings Project on U.S. relations with the Islamic World, report number. http://www.brookings.edu/~/media/research/files/papers/2015/03/isis-twitter-census-berger-morgan/isis_twitter_census_berger_morgan.pdf. Accessed 20 Mar 2015
Bipartisan Policy Center (2012) Countering online radicalization in America. http://bipartisanpolicy.org/wp-content/uploads/sites/default/files/BPC%20_Online%20Radicalization%20Report.pdf
Casebeer WA, Russell J (2005) Storytelling and terrorism: towards a comprehensive ‘counter-narrative strategy.’ Strateg Insights 4(3). http://calhoun.nps.edu/bitstream/handle/10945/11132/casebeerMar05.pdf
Denning D (2010) “Terror’s web: how the Internet is transforming terrorism”, in Handbook of Internet Crime, Yvonne Jewkes and Majid Yar, Eds. Cullompton, United Kingdom, Willan Publishing, pp 194–213
Department of Homeland Security (2010) Terrorist use of social networking facebook case study, public intelligence. http://publicintelligence.net/ufouoles-dhs-terrorist-use-of-social-networking-facebook-case-study. Accessed 5 Dec 2010
European Commission (2008) Expert Group on Violent Radicalisation, “Radicalisation processes leading to acts of terrorism”. www.clingendael.nl/publications/2008/20080500_cscp_report_vries.pdf
Gerwehr S, Daly S (2006) Al-Qaida: terrorist selection and recruitment. In: Kamien D (ed) The McGraw-Hill Homeland Security handbook. McGraw-Hill, New York
Green R (2013) The exploitation of children in the Jihad in Syria, MEMRI inquiry & analysis series report No. 961. http://www.memri.org/report/en/0/0/0/0/0/0/7158.htm
Hegghammer T (2015) Interpersonal trust on Jihadi internet forums. In: Gambetta D (ed) Fight, flight, mimic: identity signaling in armed conflicts (forthcoming)
Hoffman B (2004) Redefining counterterrorism: the terrorist leader as CEO, Rand review, Spring 2004
Just J (2015) Jihad 2.0: the impact of social media on the Salafist scene and the nature of terrorism. Anchor Academic Publishing, Hamburg
Katz R (2014a) From teenage colorado girls to Islamic state recruits: a case study in radicalization via social media. INSITE blog on terrorism and extremism. http://news.siteintelgroup.com/blog/index.php/entry/309-from-teenage-colorado-girls-to-islamic-state-recruits-a-case-study-in-radicalization-via-social-media
Katz R (2014b) Follow ISIS on Twitter: a special report on the use of social media by Jihadists. INSITE blog on terrorism and extremism. http://news.siteintelgroup.com/blog/index.php/entry/192-follow-isis-on-twitter-a-special-report-on-the-use-of-social-media-by-jihadists
Klausen J (2015) Tweeting the Jihad: social media networks of western foreign fighters in Syria and Iraq. Stud Conflict Terrorism 38:1–22
Lennings C, Amon K, Brummert H, Lennings N (2010) Grooming for terror: the internet and young people. Psychiatry Psychol Law 17(3):424–437
Malik S, Laville S, Cresci E, Gani A (2014) Isis in duel with Twitter and YouTube to spread extremist propaganda. The Guardian. http://www.theguardian.com/world/2014/sep/24/isis-twitter-youtube-message-social-media-jihadi. Accessed 24 Sept 2014
MEMRI (2013) YouTube questioned in U.K. house of commons over keeping terrorism-promoting videos active on its website; of 125 videos of Al-Qaeda commander Al-Zawahiri flagged on YouTube by MEMRI, YouTube keeps 57 active, MEMRI inquiry & analysis 956. http://www.memri.org/report/en/0/0/0/0/0/841/7121.htm. Accessed 9 Apr 2013
MEMRI (2014) Al-Qaeda and its offshoots train and indoctrinate newborns, toddlers, and preschoolers—captured on Twitter, MEMRI inquiry & analysis 1065. http://www.memri.org/alqedachildrenreport/MEMRI_IA_1065_AQ_children_on_Twitter.pdf. Accessed 7 Feb 2014
Neumann P (2009a) Joining Al-Qaeda: Jihadist recruitment in Europe. Routledge, London
Neumann P (2009b) Old and new terrorism. Polity Press, Cambridge
Neumann P (2015) Foreign fighter total in Syria/Iraq now exceeds 20,000, ICSR Report. http://icsr.info/2015/01/foreign-fighter-total-syriairaq-now-exceeds-20000-surpasses-afghanistan-conflict-1980s/
Recorded future (2015) Explosive growth in ISIS tweets: Arabic overtakes English. https://www.recordedfuture.com/isis-twitter-growth/
Weimann G (2004) WWW.Terror.Net: How modern terrorism uses the internet, special report. United States Institute of Peace, Washington DC
Weimann G (2006) Terror on the internet: the new arena, the new challenges. USIP Press, Washington
Weimann G (2007) “Using the Internet for Terrorist Recruitment and Mobilization”, in Hypermedia Seduction for Terrorist Recruiting (Eds. Boaz Ganor, Katharina Von Knop, Carlos Duarte), NATO Science for Peace and Security Series, pp 47–58
Weimann G (2008a) Online terrorists prey on the vulnerable. Yale global online. http://yaleglobal.yale.edu/content/online-terrorists-prey-vulnerable. Accessed 5 Mar 2008
Weimann G (2008b) Narrowcasting: the trend in online terrorism. Gazette 70(3):9–15
Weimann G (2012) Lone wolves in cyberspace. J Terrorism Res 3(2). http://ojs.st-andrews.ac.uk/index.php/jtr/article/view/405
Weimann G (2014a) New terrorism and new media, Woodrow Wilson Center report, Washington DC. http://www.wilsoncenter.org/publication/new-terrorism-and-new-media-1
Weimann G (2014b) Virtual packs of lone wolves: how the internet made ‘lone wolf’ terrorism a misnomer, Woodrow Wilson Center report, Washington, DC. https://medium.com/p/17b12f8c455a
Weimann G (2015) Terrorism in cyberspace: the next generation. Columbia University Press and Woodrow Wilson center Press, New York
Weyers J (2014) The newest advertising and recruiting mogul: ISIS, IBRABO. https://ibrabo.wordpress.com/2014/06/. Accessed 26 June 2014
White House (2011a) Empowering local partners to prevent violent extremism in the United States. http://www.whitehouse.gov/sites/default/files/empowering_local_partners.pdf
White House (2011b) Empowering local partners to prevent violent extremism in the United States. https://www.counterextremism.org/resources/details/id/136/empowering-local-partners-to-prevent-violent-extremism-in-the-united-states
Zanini M, Edwards SJA (2001) The networking of terror in the information age. In: Arquilla J, Ronfeldt D (eds) Networks and netwars. RAND Corporation, Santa Monica, pp 29–60
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 T.M.C. Asser Press and the authors
About this chapter
Cite this chapter
Weimann, G. (2016). The Emerging Role of Social Media in the Recruitment of Foreign Fighters. In: de Guttry, A., Capone, F., Paulussen, C. (eds) Foreign Fighters under International Law and Beyond. T.M.C. Asser Press, The Hague. https://doi.org/10.1007/978-94-6265-099-2_6
Download citation
DOI: https://doi.org/10.1007/978-94-6265-099-2_6
Published:
Publisher Name: T.M.C. Asser Press, The Hague
Print ISBN: 978-94-6265-098-5
Online ISBN: 978-94-6265-099-2
eBook Packages: Law and CriminologyLaw and Criminology (R0)