Countering Internet Extremism By Mr. Timothy L. Thomas Editorial Abstract: The author examines the modern informational environment, and introduces the concept of contemporary extremist work as a type of living influence laboratory. He focuses on a specific Web-based counter-ideology example, then presents a methodology to address specific cyber audiences. Introduction other such methods have been effective. • In 2003 the US Army developed Recruiters even hand out CDs and DVDs Counterterrorism Center at West Point, Unless the US crafts a strategy of key speeches and events, at low or no to follow extremist thought by looking that stymies long-term ideological cost, further supporting this cognitive at the books terrorists put online radicalization among large numbers of movement. • In 2004-2005 the Defense Department Muslim youth, America’s ‘long war’ The coalition response to these hired contractors such as the Lincoln against terrorism is likely to be just measures has been constant but sporadic Group to find stringers to write pro- that. in the types of organizations involved. Western stories Several issues of seemingly benign First, there is the usual list of players with • In 2005-2006, DoD conceived and importance eventually emerged as information operations expertise that developed Human Terrain Teams, tasked significant activities when the US and have been involved since the beginning: to interact with the population, to better its coalition partners went to war in the 1st IO Command, psychological understand the culture and traditions of Iraq and Afghanistan in 2003 and 2001. operations groups, the Joint Information the area One of those issues was extremists’ Operations Warfare Command, the • In 2006 an Internet Radicalization use of the Internet—that transnational National Security Agency, DIA and CIA Task Force was created at the Homeland communication device. Warning signs analysts, US think tanks such as RAND, Security Policy Institute, to develop a of this emerging capability and its and many others. Second, there has been report on how to de-radicalize the Web; influence on events were observed earlier a constant effort by non-government the report was delivered to Congress during the Chechen-Russian conflict in and government agencies to relook the • Specific websites were developed to the 1990s and in early 2000. Chechen problem of extremist organizations for combat terrorist use of the Internet such use of the Web enabled them to win over decades now. A host of new measures as [email protected] public opinion in the early stages of and efforts have joined this group since • US government elements developed the conflict, and secure an information 1989: a strategic communications plan. warfare victory. • In 1989 Ben Venzke developed Some of these groups have been more Extremists’ use of the Internet has IntelCenter, which has monitored Al successful than others. Some merely developed rapidly since the Chechen- Qaeda and other terrorist movement monitor the situation while others make Russian conflict. Now they are more worldwide both before and after 9/11 recommendations to counter extremist creative, and more importantly, more • In 1998 the Middle East Media use of the Internet. persuasive in their methods to recruit Research Institute (MEMRI) was The difficulty in successfully members, gain financial support, and founded. It monitors and analyzes neutering extremist use of the Internet provide proof of success. The extremists’ various trends, to include terrorism, in is evident from our daily experiences. task has been made easier since coalition the Middle East press. It has an Islamist For example, in spite of all of these forces are stationed in countries where Website Monitoring project resources—plus all of the money the their understanding of culture and the • In 1999 the job of Undersecretary west has thrown into information (read means of spreading information is less of State for Public Diplomacy and Internet) security—an individual known informed. Extremists, on the other Public Affairs was created (occupied by as Irhabi 007, sitting in a room in London hand, tap into both culture and media Charlotte Beers, Margaret Tutwiler, and in front of a monitor, still operated methods. Karen Hughes, three very powerful but successfully and was effective until the Extremists have demonstrated their marginally effective undersecretaries, time of his capture. The advantages of military capabilities online (their use of from October 2001-November 2007) to using the Internet (anonymity, use of cut video to demonstrate the effectiveness develop a State Department effort to put -outs, masking of server use, movement of improvised explosive devices (IEDs) out the US message to the Arab world, from personal computer to cyber café, and sniper attacks against coalition forces mostly via TV and radio stations etc.) enable extremists to make it very come to mind) and in their use of clerics • In 2002 Rita Katz and Josh Devon difficult to find them. and imams to justify their actions to the formed the Search for International This article will examine briefly Arab world. Internet videos, postings on Terrorist Entities (SITE) intelligence the environment in which extremists You Tube, recruiting on My Space, and group, to follow terrorist activities now operate (ideological and technical), 16 Winter 2009 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. 1. REPORT DATE 3. DATES COVERED 2009 2. REPORT TYPE 00-00-2009 to 00-00-2009 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER Countering Internet Extremism 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING ORGANIZATION Foreign Military Studies Office,Fort Leavenworth,KS,66027 REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSOR/MONITOR’S ACRONYM(S) 11. SPONSOR/MONITOR’S REPORT NUMBER(S) 12. DISTRIBUTION/AVAILABILITY STATEMENT Approved for public release; distribution unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF 18. NUMBER 19a. NAME OF ABSTRACT OF PAGES RESPONSIBLE PERSON a. REPORT b. ABSTRACT c. THIS PAGE Same as 6 unclassified unclassified unclassified Report (SAR) Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std Z39-18 outline what issues we must counter, being producers, users, and interpreters available as freeware, or via software and summarize/review efforts to date to (through interactions such as blogs) of packages such as Windows, Movie counter, neuter, or cauterize extremists’ information that shapes or socializes the Maker, and Adobe Acrobat. All can use of the Internet by coalition forces followers’ world views. Theories are be downloaded at will or purchased at and governments worldwide. Progress tested and discoveries made that have minimal cost. Such applications do not is being made, but it is uncertain if the real world consequences, which may require the expense of a college course restrictions on Western democracies or may not be in line with the common to access them, just access to the Web. in particular (legal, moral, etc.) and good. Access to these devices empowers The systems that run the extremists’ the difficulties in countering Internet an extremist’s active operations. One can experiments were created by others, and advantages will ever be able to fully even use the computer monitor to watch provided free of charge. contain online extremism. Al Qaeda TV right at home. Extremists not only share our The labs can explain why, how, networks but easily exploit them. It The Environment when, and even where to fight in an would be fair to state that extremists go Information technologies enable open or anonymous manner. These labs by the law of “we can use your systems, extremists to achieve many goals that serve as cyber mobilizers for people of you can’t use ours,” as witnessed by would have been unimaginable in the like thought, but they cyber mobilize extremists’ use of Yahoo’s free online 1970s. These technologies have been fence sitters as well. This is performed newsgroups (to distribute communiqués), used to initiate IEDs, to communicate through personal messages or mass MySpace, and YouTube among many (via cell phones or on the Internet), to circulation Internet journals or papers. others. Stateless information labs bypass employ high-tech deception operations, The lab is an environment where cultural censorship and regulations as well as to filter news and information for the knowledge of the target audience is traditional cultural norms of restraint, people of the Middle East, and to and do what they can to prevent influence Western opinion. Such non-sympathizers from accessing flexibility allows development their net niche. of new uses as required. Yet the Third, just as plants need influence aspect of information fertile soil, the environment technologies merits the greatest must possess a rich and adaptive attention. ideological atmosphere. Without Several elements of the this, it is impossible to fertilize environment have changed the cognitive aspects of their dramatically since the 1970s, and target audience. Instigators create strongly support an extremist’s this atmosphere by developing influence of cognitive activities. specific images and messages in First, information laboratories their information labs, offering (computers) inhabit our work their slanted and prejudiced Persuasion helps counter extremism. (Defense Link) place, homes, and relaxation perceptions of reality to selected stops (coffee shops, etc.). It is here vitally important in developing both the target audiences. Sophisticated tools that extremists’ influence operations technological support and know-how/ mentioned above make this job easier. take place. A ‘lab’ used to be a place message appropriate for each target. Content filters ensure only certain in a scientific research organization Information labs in the right hands viewpoints are available on some sites. or a university where one went to provide sustenance to the cause, offer Cognitive activities are sprinkled with test theories and make discoveries meaning to one’s existence, provide warnings about the dangers of “other using Bunsen burners and microscopes. proof of success, and offer personal thoughts or ideologies” to one’s soul Entire buildings were assembled to examples of heroism and martyrdom. and afterlife. Al Qaeda and other run simulations. The modern day These experimental workshops are the insurgent groups offer specific and “information lab” consists of a desk or combustion chambers that spawn interest unique ideologies that fit selected organic laptop. Experiments can be run on real in events, and motivate supporters to social movements. life situations (via virtual environments extraordinary actions. This is a persuasive Fourth, the environment is like SIMS and Second Life) and perform form of effects-based operations of the organized differently than in the past. much of the work that simulation labs mind. The formation of radical media brigades used to do. Images can be manipulated Second, there is minimal or no indicates creation of a new combat according to the creator’s wish or to fit cost involved in using tools to shape space, wherein the rules of civilized a product. Information labs move the the environment. In the past, tools news organizations do not apply. For individual from being just a TV, radio, used in laboratories were expensive. that reason, the propaganda videos and or newspapers information consumer, to Now information laboratory tools are photos are often of a shocking nature 17 in regard to beheading, throat slitting, tools. First, media resources can be 6. Al Qaeda friendly news cast and other ‘online slaughter’ techniques. used to establish “resistance blockades” calls that criticize Arab governments This new combat space is a cognitive that keep the enemy (Western countries) collaborating with Jews and Christians battle space without laws, rules, and from corrupting Islamic institutions, and discuss goals of the jihadi movement regulations—operating via manipulation, organizations, and ideas while or establishment of the Voice of the filters, and fear. radicalizing Muslim masses. Second, Caliphate. Further, this environment is in addition to the main platforms of 7. Mobile Internet services offering a transnational communication and the Internet and satellite TV, al-Suri selected news content via cell phones. influence network. It empowers anyone recommends sending written statements 8. Extremist links to several Al Qaeda with an opinion on anything to post that call on Muslims to join the Global magazines containing instructions their thoughts, and may be read by one Islamic Resistance; to publish works on on communications, tactics, and individual or by millions. Revered military and training curricula (e-mail explosives authority figures such as religious leaders contact lists, CD-ROMs, DVDs, etc.); 9. Extremists links to instructions on can lead followers to specific websites or to translate works into other languages; jihadi websites on how to use software postings. However, anonymous postings and to disseminate scholarly writing that packages and encryption devices and can also have tremendous impact on supports the spirit of resistance, including video editing entire groups of people, if presented opinions regarding the enemies of jihad. 10. Computer programmer launches of properly (that is, with a message that stand alone Web browsing software that strikes a nerve in a specific cultural allows searches only on particular sites. setting). Chatrooms or bulletin boards These efforts to bound jihadi ideological host the bulk of such postings. space by intellectually separating them This experimental lab in your living from other areas of cyberspace allows room has other uses as well. It can them to become more dogmatic and intimidate or taunt rivals with the click of isolated a mouse, persuade fence-sitters to accept 11. Extremist protocol offers on a cause based on the evidence presented, how to safely use the Internet. These allow access to some information but countermeasures help identify how deny access to other sources, and allow other governments penetrate their use for the social networking of criminals of software chat programs (such as and other extremists. These virtual Microsoft Messenger and PalTalk) transnational labs have eliminated and advise readers not to use Saudi much of the need for physical training Arabian e-mail addresses but rather camps (due to the spread of online Al Qaeda on the Web. (Alneda.com) use anonymous Hotmail and Yahoo training material) and thus inhibit law accounts. enforcement agencies from detecting Obviously analysts should conduct an 12. Extremist posts on how to use where, and in what form, extremist in-depth study of al-Suri’s rhetoric and video games to reach the young, and groups operate. ideological reasoning instead of the instill in them the hope of reaching short, truncated list offered here. What Must Be Countered? extremist goals such as a global Islamic With regard to technical issues, caliphate. The more realistic the game, To counter terrorist use of the Web, Jarret Brachman, Director of Research the less dissonance players feel between it helps to understand the logic that at the Combating Terrorism Center at the the game and the world around them. informs an extremist’s use of technology. United States Military Academy, West Video games harmonize reality with One could literally examine hundreds of Point New York, listed twelve key aspects books and speeches. Since the purpose of a terrorist’s use of technology: the need to catalyze awareness of the of this work is examining ways to counter 1. Extremist posts of insurgent ‘job Muslim requirement to resist. an extremist’s Internet use of the Internet openings’ on the Web To be successful, Coalition members rather than counter-ideology as a whole, 2. Extremist posts of motivational must find ways to counter these uses. we’ll look at only one example. The imagery that cyber mobilizes insurgents Further, we must find ways to counter work of ideologue Abu Musab al-Suri or wanna-be insurgents jihadi-themed books, recruitment, (also known as Mustafa ‘Abd alQadir 3. Extremist downloads of scripted and propaganda materials that can be Mustafa Husayn, Umar ‘Abd al-Hakim, talking points about religious justifications downloaded via cell phone. and Mustafa Setmariam Nassar), is for waging jihad Another good extremist technology representative of this ideology. 4. Breaking news posted from a reference comes from author Remy Al-Suri believes jihad must be jihadist point of view Mauduit, editor of the US Air Force’s comprehensive and utilize military, 5. Extremist posts of links to attack Air & Space Power Journal French political, media, civil, and ideological videos edition. Mauduit spent five years in 18 Winter 2009 an insurgency and guerrilla leadership 8. Using captured computer hard drives TV studio, a European liaison position, position during the 1954-1962 Algerian to learn how to develop counter-messages a “pre-active” approach to media, a TV War, and published a book on insurgency to extremists plans or speeches adviser position, and a Senior Adviser and counterinsurgency based upon his 9. Releasing seized videotapes on Muslim engagement. In spite of this hands-on experience. In 2008 he wrote showing terrorist brainwashing sessions rather broad range of options offered on the effects-based information battle in with children (extremist “camps” for by Graffy, Goodall finds the Deputy’s the Muslim world, including issues that children, hate cartoons, etc.) and training remarks out of touch with US strategic Westerners must learn to counter—such sessions with children teaching them to communication needs. His take on the as the seemingly benign Islamic rhetoric kidnap or kill problem is that it is more important to use that serves as a cover for nationalist, anti- 10. Releasing letters that demonstrate active engagement through a pragmatic imperialist, and reformist objectives. poor morale within their organization complexity model than to merely ‘get Such messages include denunciations 11. Looking at a militant’s culture, visual,’ or ‘get the message out.’ of the injustices, corruption, and tyranny family associations, or religion to Marc Sageman, a forensic that have characterized the reigning determine what dishonors them and psychiatrist and former CIA case officer, oligarchies in the Islamic world. undermines their rhetoric on the Web is recognized for his work on extremist Methods To Counter Or Neuter 12. Taking away extremists’ popular or mindsets, and potential ways to influence Extremists’ Use Of The Internet theological legitimacy for actions such as them. In March/April 2008 he wrote the moral legitimacy of using weapons that in the past mobilization occurred by There is no shortage of ideas on of mass destruction face-to-face networks that caused a small how to counter or neuter an extremists’ 13. Persuading “extremist support number of people to become extremists. use of the Internet. Of course, none can networks” to stop offering assistance Today, online radicalization substitutes be designed to totally eliminate such to extremists and holding these support for face-to-face radicalization, allowing use. Yet several sources offered below networks accountable if they do not extremists to get support and validation. provide differing perspectives on how to 14. Perfecting technical systems that Sageman notes these virtual marketplaces counter extremist Internet use. identify the source of unconventional of extremist ideas are the invisible hand A 2008 New York Times article weapons or their components. that is organizing extremist activities indirectly offers some methods. Writers A March 2008 effort, attributed worldwide. The leader of this violent Eric Schmitt and Thom Shanker discussed only to “US authorities,” was “implied” social movement—attracting younger weaknesses of insurgent movements, and from a post to the Islamist website http:// members and now women—is not a while not presented as counteractions, www.al-farooq.net/ (currently hosted person, but “the collective discourse” these are easily derived: by SoftLayer Technologies Inc., Dallas, appearing on half a dozen influential 1. Muting Al Qaeda messages (ways Texas, USA). In a message posted forums. Each network acts according to to do so were not offered) 27 February, administrators claimed its own understanding, however, and Al 2. Turning jihadi movements own US authorities had contacted both the Qaeda Central cannot “impose discipline weaknesses against the movement website administrator and its US host to on these third-wave wannabes, mostly 3. Illuminating Al Qaeda errors pressure them to remove jihadi content, because it does not know who they 4. Planting bogus e-mail messages saying that if they do not, the site will be are.” Thus their collective actions do and website postings to sow confusion, shut down. Actually, this can be a very not amount to much. Sageman believes dissent, and distrust among militant effective way to keep server operators these people thrive only at the abstract organizations from allowing someone to use their fantasy level, making them vulnerable 5. Amplifying the speeches and network. to whatever may diminish their appeal writings of prominent Islamic clerics who renounce terrorist violence; persuading Earlier, in February 2008, Colleen among the young. Thus Sageman sees Muslims not to support terrorists through Graffy, Deputy Assistant Secretary for real opportunity for countering these messages such as that from Abdul-Aziz European and Eurasian Affairs, US movements if we construct the correct el-Sherif, who wrote a book renouncing State Department, was quoted by author message, particularly if these separate violent jihad on legal and religious Bud Goodall as asserting that the main groups cannot coalesce into a physical grounds problem with US public diplomacy movement. 6. Identifying territory that terrorists is “getting the word out.” Successes Sageman concludes that a leaderless hold dear, to include emotional territory in the public diplomacy world from social movement is at the mercy of its such as a terrorists reputation or Graffy’s view include nine elements: participants. The main threat to the credibility with Muslims, and damaging a European Union news alert system, movement’s existence is that its appeal that territory a rapid response unit, a streamlined is self-limiting. What appeals to one 7. Identifying and manipulating or approval process for ambassadors’ media generation may not appeal to the next. destroying terrorist terrain, which at the appearance requests, new media hubs Extremists and their messages must be moment is the Web in Brussels, Dubai, and London, a new demilitarized (deny young men the glory 19 of fighting uniformed soldiers of the sole failed to effectively counter portrayals or delegitimize extremist use of the remaining superpower) and reduced to of America as an aggressive, predatory Internet. First, the State Department the image of common criminals stripped force that poses a threat to Islam. maintains a website in a number of of glory; extremism is about death and The US government should stand up languages devoted to countering false destruction, not fame. Counterextremism an independent agency to plan and stories that appear in extremist sources, voices must encourage opportunity orchestrate a coherent, national-level and countering disinformation that may and reject violence. It is necessary to strategic communication strategy. All end up in mainstream media. Second, show young people they can address of this assumes, she notes, that the US military units conduct operational level hopes, dreams, and grievances, without government can compete with the global influence operations for a long period of violence. information market. time. Lachow and Richardson discussed Remy Mauduit, noted above, Frank Cilluffo, Chairman of the utility of viewing the War of Ideas recommended that the Department of the Homeland Security Institute’s as equal in importance to military and Defense establish a permanent Islamic “Radicalization of the Internet” project, law enforcement aspects of the fight. Information Center to assess, develop, discussed his commission’s findings in Finally, they recommended trying to find disseminate, and coordinate information IO Sphere journal [Summer 2007, p. 14.] specific language with which to label to the international Muslim public. Long He noted that there are several ways to Salafist extremists, such as irhabists term objectives would be to promote neuter terrorist use of the Web. His ideas (terrorist) conducting hirabah (unholy democracy, good governance, freedom, were both more general, and yet in line war) instead of muhjahideen conducting and human rights in the Muslim world. with many recommendations that were jihad; they recommended promoting the Short-range objectives would be letting to appear in 2008: views of well-respected Muslim clerics the Muslim world know that the US 1. Understand the narrative who counter terrorist claims. Lachow continues to help it through repetitive and context of an extremist, why it and Richardson support attempts to broadcasting of the various humanitarian resonates undermine Internet-based terrorist missions it organizes and runs. Themes 2. Use all resources—no agency influence operations and counters to a to use and target audiences are: owns the mission terrorist’s operational use of the Net. • Supporting civil-society institutions 3. Defeat networks with networks, Conclusions •Supporting both secularists and not a supercomputer The consensus of experts appears moderate Islamists 4. Use all elements of statecraft, not to be that the use of secular or moderate • Discrediting extremist ideology just the military religious figures or scholars have the • Delegitimizing individuals and 5. Remove terrorist masterminds most potential to effectively counter positions associated with extremists 6. Offer opportunity to those who extremist Internet use. Such efforts by challenging their interpretation of could be seduced by a terrorist message could help to stifle some of the issues Islam and promoting divisions among 7. Allow former jihadists to come that extremists magnify in the Internet extremists by encouraging journalists forward and denounce terrorism environment (death and destruction, to investigate issues of corruption, 8. Substitute a new concept for Koranic verses of motivation). Getting hypocrisy, and immorality in extremist the term GWOT (which to Cilluffo is secular or moderate figures online can and terrorist circles. as bad as the term crusader since it help counter an insurgent’s recruiting • Focusing on young people, Muslim allows extremists to feel like warriors). ability, and search for financial minorities in the West, women, and Terminology matters donations. Notably, several religious the pious traditionalist populations, 9. Require Islamic scholars to offer figures have recently been highlighted educating Muslims and non-Muslims a counter dialogue as contributing to this effort. Writing alike on critical questions related to 10. Find how to prevent someone from prison in November 2007, Sayyid the compatibility between Islam and from going from a sympathizer, to an Imam al-Sharif published the book On democracy. activist, to indiscriminate violence. Rationalizations on Jihad in Egypt and Finally in February 2008, journalist Discrediting extremism through religion the World. Al-Sharif was a former aide Sharon Weinberger wrote that the gravest is one option to Al Qaeda second in command, Ayman strategic lapse of the US government 11. Drive wedges between and among al-Zawahiri. His counterextremism has been its anemic—if not self- extremist and terrorist organizations piece states it is religiously unlawful destructive—effort to create and exploit (isolate planners from organizations, to use violence to overthrow Islamic divisions within and among jihadi organizations from one another, and from governments. Another important figure, groups, discredit their ideology, promote society at large). Sheikh Abd Al-Aziz bin Abdallah Aal alternative Islamic voices, and isolate Also in 2007, Irving Lachow Al-Sheikh, highest religious authority Islamic extremists. Weinberger seems and Courtney Richardson, writing in in Saudi Arabia, issued a October 2007 to highlight the very themes that Maudit Joint Force Quarterly, noted several fatwah [Islamic legal pronouncement] recommended. She states the US has US Government efforts to counter prohibiting Saudi youth from engaging 20 Winter 2009 in jihad abroad. Also in autumn 2007, To counter an extremist’s use of the • Amplify Al Qaeda’s mistakes, Saudi cleric Sheikh Salman al-Awdah, Internet, the Coalition needs to develop fabricate other mistakes, and ensure wrote an open letter condemning Usama and execute the correct combination of that any extremist group is used, not bin Laden. All of these individuals constraining, monitoring, and deceiving just Al Qaeda. Using other groups to have had a strong impact on countering extremists. Identifying which servers serve propaganda purposes is known as extremist recruitment and spread of their extremist groups use allows Coalition “widening the circle” propaganda online. members to shut down those servers, and • Government’s prompting of Limiting the manner in which force (or even guide) an extremist to a mainstream Muslim clerics to issue the Internet can shape opinions, new host. This constrains an extremist’s fatwas (religious rulings) that incriminate through offering “other information or activities, making it much more difficult the movement and their actions sources” that are deemed offensive to to connect with their online user base and • Strengthening and backing Islamic an insurgents cause, can certainly help communicate new plans and activities. movements far removed from the fight, the Coalition effort. Advanced societies Monitoring allows one to get an inside particularly those with a democratic have developed the virtual transnational look at how plans are developing. approach communication network that insurgents Insurgent’s use of the Internet can also • Aggressively neutralizing or can use at no or limited cost, and we must simply be shut down. Both of these discrediting the guiding thinkers of the offset their efforts if the US hopes to options might involve deception, but jihadist movement succeed in the ongoing War of Ideas. the best use of deception is simply • Spinning the minor disagreements Today, terrorists are toying with the infiltrating a group and pretending to be among leaders or radical organizations as use of the virtual environment created someone you aren’t. What about limiting being major doctrinal and methodological by Linden Lab and known as Second content? If extremists are not provided disputes. Life (SL) [see “Exploring Second Life, material or video footage, they lose a Al-Libi thus indicates the best way Cory Ondrejka Interview,” IO Sphere major mobilizing factor. Simply making to influence an extremist movement is Fall 2007, p. 25]. A terrorist envisions things more painful for extremists by to ‘strangle it by tying it up in knots.’ It SL as a means to communicate, launder disrupting communications should have is unclear why he would develop such money, or recruit individuals. There a countering effect on their Internet options for countering an insurgent’s are measures in place to thwart this activities. use of the Internet—bravado is one effort. First, Ken Driefach, Linden Lab’s Most significant of all, an extremist possibility. Another possibility is that Deputy General Counsel, states that recommends ways to limit the ability of he was merely regurgitating all that was there are systems in place to monitor insurgents to communicate. Abu Yahaya written in 2007 about methods to counter avatar activities and identify gaming al-Libi offered tips for better prosecuting insurgent Internet access and use. behavior that may support a terrorist the war of ideas against Al Qaeda. He Governments should force Al Qaeda cause. Second, SL users can help noted that to defeat Al Qaeda, it was into a series of compromising positions counter terrorist use of the virtual gaming necessary to follow six steps: from a variety of angles so that it hangs environment by monitoring information • Focus on amplifying cases of ex- itself over the long term. Hopefully the and communications exchanged among Jihadists who have willingly renounced US Strategic Communication plan, and players and their activities. Finally, the use of armed action and recanted the organizations it will spawn in this undercover operations could be initiated their previously held ideological new year, will be able to implement this to provide information on groups with commitments strategy in an innovative manner. jihadist tendencies. Since the most often discussed solution to challenge insurgents is the use of clerics or imams to issue decrees, perhaps this option would also Tim Thomas, LTC, US Army, Retired, work in SL’s ‘virtual mosques?’ served as a Soviet/Russian Foreign Area The Second Life case shows a small Officer. His assignments include brigade S-2 sample of other law enforcement issues. and company commander in the 82d Airborne First, there are technological challenges. Division, and the Army Russian Institute. He Insurgents skip from server to server, use has done extensive research and publishing in anonymity as a friend, hide in chatrooms, the areas of peacekeeping, IO, and PSYOP. move from one neutral computer source He currently serves as a Senior Analyst to another, and enter friendly systems in the Foreign Military Studies Office, Ft at will to recruit or look for financial Leavenworth. He holds a BS from West Point, support. Second, Western nations must and a Master of Arts from USC. contend with extremist ideology that rejects anything other than their way of living and thinking. 21