StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Counter-Terrorism Propaganda on Social Media - Research Paper Example

Cite this document
Summary
The "Counter-Terrorism Propaganda on Social Media" paper focuses on counter-terrorism that is the military or political activities developed to thwart or prevent terrorist activities. It is a strategy that aims at preventing terrorism and its impacts.  …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.8% of users find it useful

Extract of sample "Counter-Terrorism Propaganda on Social Media"

Name Instructor Course Date Counter Terrorism Propaganda on Social Media Definition of Terms Terrorism is the use of intimidation of violence in the pursuit of political, ideological, or religious goals. It is a crime that is illegal by legislation and immoral. Terrorism has primary and secondary impacts as it affects the target victims and those associated with them. An example of Terrorism activities is the bombing of France in 2015. Social media is an electronic communication in which online communities are developed to share ideas, personal content, and information among other contents. Examples of social media include Facebook and Twitter. ISIS is an abbreviation that stands for Islamic State of Iraq and Syria. It is an extremist group governed by the Salafi or Wahhabi law. Propaganda is misleading and biased information spread with the aim of promoting a particular point of view or political course. It is the spread of a rumor, information, or idea with the goal of helping or injuring a person, cause, or institution. War in New Era is a modern challenge faced in the society. An example of modern wars is terrorism. Counter-terrorism is the military or political activities developed to thwart or prevent terrorism activities. It is a strategy that aims at preventing terrorism and its impacts. Overview on Terrorism on Social Media Terrorists use social media due to their broad reach, affordability, and convenience. The aim of the terrorist is to pass the propaganda to the target population at the shortest time possible thus preference of the social media (Gates & Podder). Some of the social media platforms that are convenient and with the broadest reach include Twitter, Facebook, and YouTube. Affordability of the social media has seen the terrorists use social media to spread information and enhance their goals. Terrorists have also opted for the social media since the conventional ones may not be able to give them a chance to broadcast their propaganda. Surveillance is also not comprehensive on the social media compared to the conventional ones. ISIS and Al-Qaeda are some of the terrorist group that extensively uses social media. Terrorists use social media to raise funds, recruit and radicalize the public (Gates & Podder). They use the encryption tools to conduct these activities thus not able to be traced neither can their identities be revealed. For instance, ISIS is active in internet memes, Tumblr, Instagram, Twitter, and YouTube. They use the social media to pass propaganda through the uploading of video footages. The terrorists use Muslim grievances to attract the Islamic believers. For instance, they appeal to the Muslims through misquoting the Quran and assuring them that they are championing for their needs. In political cases, they have been claiming responsibility for attacks to show their wit and power. For example, the ISIS took responsibility on some of the attacks on Israel. As a result, the terrorist group portrays as a captivating and powerful entity thus attracting some of the youths (Lia). Some of the terrorist groups such as Al-Qaeda have also opened their membership for all irrespective of the nationality or ethnic group. War in a New Era Terrorist integrate social media with their group operation due to the advantages of the former. The internet has enabled the terrorists to develop creative techniques and encryption tools thus making it relatively secure and efficient means of communication. An example of encryption is steganography has allowed them to hide their information in graphic files. Another technique is ‘dead dropping' which enables the terrorist groups to transmit information through a password-secured email account (Kaplan). The internet also allows the terrorists to reach a potential pool of donors and recruits. The internet is used to integrate the ground operations such as planning and implementation that cannot be conducted online. For example, the November 2008 Mumbai attack was possible due to the actual training that the terrorists conducted on a physical camp. War in new era can be described as an attempt to stop the terrorists from spreading their propaganda through social media. In explanation, the war aims at reducing the effectiveness of social media as a tool used by terrorists to cause panic. Terrorists have used social media to post footages as a sign of proclaiming authority. For instance, Al-Qaeda used the internet to post footages of decapitation of Nick Berg, an American hostage; roadside bombings; and kidnap of the Algerian and Egyptian diplomats and their execution (Kaplan). War in a new era, therefore, entails preventing such video propaganda from accessing the public domain without which they will increase terrorist sympathizers and insurgents. Overview on Counterterrorism Propaganda in Social Media Social media use among the terrorists has been linked to the increase in terror attacks. Russia and France are some of the countries that have received most video threats from ISIS. The video threats have been 25 and 20 respectively in a period of two years. Fourteen days before the Paris attack, ISIS released a video calling for the young French population to join the group. The same thing happened on June 26 before attacking Lyon (Lesaca). Social media has also seen the rise of a number of terror recruits and increase in diversity (Gates and Podder). It is, therefore, important that the fight against terrorism be conducted through eliminating of the social media propaganda shared by ISIS among other terror groups. Counterterrorism in the social media platform can be conducted through development and implementation of campaigns that react to the propaganda. The campaigns should also keep the public aware of propaganda in advance. Analysis and monitoring of social media can also help in eliminating some of the videos posted on the platforms that might cause panic. Furthermore, accounts suspected to be linked to the terrorist organization should be blocked (Bartlett & Reynolds 68). Such a process is only possible through the collaboration between the government and the social media private companies. United Nations is some of the global actors fighting terrorist propaganda dispersed through social media. The body conducting the anti-terrorism role in United Nations is the Counterterrorism Committee and is governed by the United Nations Council Resolution 1373 (Wu 281). The European Union and International Monetary Fund have also made efforts to curb terrorist groups using social media through monitoring and auditing. The United States through NATO and the Homeland Security has also been fighting the messages passed by Terrorists through social media. Russia has also drafted their counterterrorism bill. Egypt also has a counter-terror unit addressing the threats that terrorists cause through social media. The United Arab Emirates in conjunction with the United States also have a center to counter the propaganda of terrorists. Social media platforms such as Twitter, YouTube, and Facebook have a role to play in fighting terrorism propaganda. The platforms can control the registration process of the terrorist groups. Furthermore, they can suspend the terrorist’s accounts (Lesaca). The social media platform owners are the ones in better place in monitoring the accounts and identifying any suspicious acts thus able to terminate the propaganda messages and close or suspend the accounts used. Main Arguments about Counter Terrorism Propaganda on Social Media  The counter-messaging techniques have not been effective in the addressing the terrorism social media propaganda. ISIS has continued to use social media platforms such as Twitter and Facebook to pass their messages and cause panic among people. Technological developments have made the terror groups to be able to shield their information and use anonymous accounts. Furthermore, the governmental and non-governmental attempts have experienced several shortcomings (Aistrope 121). For example, the surveillance and monitoring of social media accounts have been deemed as infringement of the right to privacy. The foreign policies have also made it difficult to monitor the social media platforms thus making the programs lose authenticity and credibility. Monitoring social media is seen as a business process rather than a censorship when it is done by the private companies such as Twitter and Facebook. However, when the government does it, it is more of censorship as opposed to a business process (Nasr). In explanation, monitoring will be considered more of business when done by the private entity because it will be deemed as a business doing it overseeing role on its customers. It will be like a business monitoring its customer services. The process will call for the reporting of suspicious online activities to the relevant authority. Reporting of Online Activities Act The Act calls for the social media companies to report terrorists' activities and information on the unlawful distribution of explosives conducted online to the relevant authorities (Williams). However, the law gives no power on monitoring the user. Neither does it allow for any of the communication of the stakeholders be monitors by the social media company. The Act defines the terrorist as a person distributes information about weapons of mass destructions, destructive devices, and explosives (Williams). The law protects the social media and public in general from the invasion of privacy and affecting the flow of social media. It protects any user, customer, or subscriber from being monitored (Williams). Furthermore, it protects the monitoring of the content of any of the person's or entity's communication. United Arab Emirates Case Study The United Arab Emirates legislation against the use of social media among the terrorist is found under the cybercrime law (Embassy of the United Arab Emirates). The law criminalizes the use of internet among the terrorists and their groups to finance their activities. It also criminalizes the terrorist groups using social media to pass their ideologies to the public. The United Arab Emirates has two entities that fight terrorism propaganda in social media. The first entity is the Sawab Center, which is a collaboration between the United States and the United Arab Emirates (Embassy of the United Arab Emirates). It aims at countering the terrorist online messaging and propaganda. The headquarter of the entity is in Abu Dhabi. The second entity is the Joint Digital Communication Center. The Center uses Twitter to provide facts on ISIL; counter their claims; highlight the global coalition primary activities against extremists, and amplify the credible voices that speak against ISIL. Work Cited Aistrope, Tim. “Social Media and Counterterrorism Strategy.” Australian Journal of International Affairs 70.2 (2016): 121-138. Bartlett, Jamie, and Louis Reynolds. "The state of the art 2015: A literature review of social media intelligence capabilities for counter-terrorism." (2015). Embassy of the United Arab Emirates. UAE Counterterrorism. UAE Embassy, 2015. Web. 16 May 2016. < http://www.uae-embassy.org/about-uae/foreign-policy/uae-counterterrorism >. Gates, Scott, and Sukanya Podder. "Social Media, Recruitment, Allegiance and the Islamic State." Perspectives on Terrorism 9.4 (2015). Web. 16 May 2016. < http://www.terrorismanalysts.com/pt/index.php/pot/article/view/446/html >. Kaplan, Eben. Terrorists and the Internet. Terrorism and Technology, 8 January 2009. Web. 16 May 2016. < http://www.cfr.org/terrorism-and-technology/terrorists-internet/p10005#p4 >. Lesaca, Jabier. Fight Against ISIS Reveals Power of Social Media. The Brookings Institution, 19 November 2015. < http://www.brookings.edu/blogs/techtank/posts/2015/11/19-isis- social-media-power-lesaca >. Lia, Brynjar. "Al-Qaida’s appeal: Understanding its unique selling points."Perspectives on Terrorism 2.8 (2010). Web. 16 May 2016. < http://terrorismanalysts.com/pt/index.php/pot/article/view/44/html >. Nasr, Amir. Fighting Terrorism on Facebook Isn’t that Easy. Morning Consult, 19 January 2016. Web. 16 May 2016. < https://morningconsult.com/2016/01/fighting-terrorism-on- facebook-isnt-that-easy/ >. Williams, Lauren C. New Bill Would Force Social Media Companies to Identify Potential Terrorists, Report them to Government. Thinkpprogress, 10 December 2015. < http://thinkprogress.org/politics/2015/12/10/3730691/facebook-terrorism/ > Wu, Paulina. "Impossible to Regulate: Social Media, Terrorists, and the Role for the UN." Chi. J. Int'l L. 16 (2015): 281- 294. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Counter-Terrorism Propaganda on Social Media Research Paper, n.d.)
Counter-Terrorism Propaganda on Social Media Research Paper. https://studentshare.org/military/2054900-counter-terroism-propaganda-on-scoail-media
(Counter-Terrorism Propaganda on Social Media Research Paper)
Counter-Terrorism Propaganda on Social Media Research Paper. https://studentshare.org/military/2054900-counter-terroism-propaganda-on-scoail-media.
“Counter-Terrorism Propaganda on Social Media Research Paper”. https://studentshare.org/military/2054900-counter-terroism-propaganda-on-scoail-media.
  • Cited: 0 times

CHECK THESE SAMPLES OF Counter-Terrorism Propaganda on Social Media

Media and war on Terror

media as an active agent in dispensing mass information inadvertently became an instrument of the interests of the warring parties.... For the terrorist group, mediamedia can become an unwitting instrument to spread fear among the population or to gain support from the public.... One of the recent examples we can Teacher What do you believe the role of the media is in the “War on Terror?... Do you believe that terrorism and the media have asymbiotic relationship (they benefit from each other)?...
1 Pages (250 words) Essay

TOPIC MENTIONED IN THE *DETAILS* SECTION BELOW

The power from individuals and channels such as the mass media can create fear.... So powerful is the media in creating situations that emotional audiences go to the extent of shading tears at a mere movie covering aspects of bloody terrorism.... The mass media also presents the pop cultures that cast propaganda and terrorism thereby giving the power to create a situation (Kemper, 89).... The media are controlled by individuals and agencies that have power, and as such are able to define the situation of fear among the members of society....
5 Pages (1250 words) Essay

Terrorism and Homeland Security

The two warn that most of these models were developed after 9/11 and are based on social-psychological processes alone.... Osama viewed himself as a person with the role of… Osama wanted to use the media to incite parts of the Muslim world so as to rise and rebel against their rulers whom he viewed as being oppressive and with western ideologies towards the HOME LAND SECURITY: AN ANALYSIS ON OSAMA BIN LADEN AND HOME MADE JIHADISTS of unit Osama bin Laden's intended strategies in response to the “Arab Spring When the Arab spring sprout Osama bin Laden viewed the events as an opportunity to spread his ideology to the Muslim world....
2 Pages (500 words) Essay

The Concept of Terrorism with Agreed-Upon Precision

uestion 5: Role of media in propagating terrorismTerrorists use the social media to execute their terror activities.... From my opinion, the social media is a good choice due to the large number of people that they are able to reach.... The anonymity that is guaranteed by the social media is also needed.... propaganda has been used as a tool for long in various mischiefs and so many terrorists use it to intimidate their target....
2 Pages (500 words) Essay

How and Why Did ISIS Form

Furthermore, it has been stated in media that this organization runs extortion rackets in the territory it holds and this is done to such an extent that it has managed to establish a consistent source of income.... It was under these circumstances that al Qaeda in Iraq formerly became ISIS and went its own way, achieving great success on the battlefield because of its brutal tactics as well as an extremely effective propaganda war, which encouraged many individuals and organizations with similar ideologies to join its ranks....
7 Pages (1750 words) Essay

Denotations and Connotations in Sensationalism

Sensationalism can be defined as the style used in reporting news to the public where the use of anger, fear, tension, excitement and at times crude thrill are used by the media to pull or attract the viewership, readership, ratings and eventually profits.... In media reporting, denotation is regarded as first level of analysis; this is primarily what the target audience can visually view on the page.... While sensationalism is not completely a negative tool to be used in the media and journalism, it matters when it is applied in crucial situations....
7 Pages (1750 words) Essay

Social and regional variation in narrative media

Social and Regional Variation in Narrative media: 24 TV Series Social and Regional Variation in Narrative media: 24 TV Series The 24 television Series is a composition of terrorism events and a counter-terrorism agency fighting them.... Jack Bauer works as the top agent of the counter-terrorism Unit (CTU).... Jack Bauer works as the top agent of the counter-terrorism Unit (CTU).... The terrorists under the guidance of Nina Myers, a top-level counter-terrorism Unit official, take his family....
2 Pages (500 words) Essay

Moral or Profit: A Constant Problem of Game Development

nbsp;    … It is often reported that pursuing only one goal – to capitalize on their products – the game developers often include inappropriate content into their media products, such as excessive violence, explicit content and other things which are untypical of real-life and are even prohibited.... We believed that the story of terrorism and counter-terrorism could attract many potential customers, as the games with such a plot are usually very popular among gamers....
7 Pages (1750 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us