Tech Savvy Militants in the Age of ICT Globalization: Online Radicalization to Violent Extremism in Kenya

Similar documents
Terror Finance and Technology

The public seven radi entering th. (NYPD) released. caliphate, virtual. grounds. Police Department, 2007.

Jihadist women, a threat not to be underestimated

A Report of the Seminar on

(U//FOUO) ISIL Social Media Messaging Resonating with Western Youth

Terrorism in Cyberspace

the Middle East (18 December 2013, no ).

THE FUTURE OF CYBER TERRORISM

ICT Jihadi Monitoring Group. AZAN Magazine Profile Analysis

Summary. Aim of the study, main questions and approach

COUNTERING VIOLENT EXTREMISM IN SINGAPORE. Muhammad Haniff Hassan, PhD

Documenting the Virtual Caliphates Dr. Mia Bloom #N /30/16-06/30/19

Conference on Peaceful Coexistence, Dialogue and Combating Radicalization

Policy Workshop of the EU-Middle East Forum (EUMEF) Middle East and North Africa Program. Deconstructing Islamist Terrorism in Tunisia

The Harvest Truly is Great

Radicalization and extremism: What makes ordinary people end up in extreme situations?

Efforts to carry out electronic Jihad on the part of the Jihadi online forum members

Radicalism and of the violent Islamist extremism phenomenon in the Albanian Balkans (Albania, Kosovo, Macedonia)

Integration as a means to prevent extremism and terrorism

Arabian Knightz: The Ever-Evolving Al-Qaeda Threat. Mitch Silber Director Intelligence Division

The Fighters Factory: Inside Al-Shabab's Education System

Community Statement on NYPD Radicalization Report

HIZB UT-TAHRIR [THE ISLAMIC LIBERATION PARTY] IN THE WEST BANK

Big Data, information and support for terrorism: the ISIS case

Issue Overview: Jihad

THE DARK W. IT S A FORMIDABLE blockade: 5000

«Violent Islamist Extremism : The European Experience» Committee on Homeland Security and Government Affairs U.S. Senate Washington, June 27, 2007

Robin Wright. Arab Spring, The Middle East & The World Social, Political, and Communication Change in the Middle East

The Shoe Bomber Richard Reid - His Radicalization Explained. Avraham Jager, (Research Assistant, ICT)

Morocco. Hundreds of returned jihadists across the Strait of Gibraltar who intelligence officials fear pose a large, residual threat on Europe s

Global Affairs May 13, :00 GMT Print Text Size. Despite a rich body of work on the subject of militant Islam, there is a distinct lack of

June The Internet at the Service of Jihad Organizations. Table of Contents. General...2. YouTube...2. Mega Video...6. Facebook...

Analysis of ISIS's Claims of Responsibility for Terrorist Attacks Carried Out Abroad. Overview 1

TERRORISM IN SUB-SAHARAN AFRICA: CAUSES AND POSSIBLE SOLUTIONS

Selected methods of recruiting Islamic terrorists

Digital Jihad: How online networks are changing extremists

Introduction. Special Conference. Combating the rise of religious extremism. Student Officer: William Harding. President of Special Conference

STATEMENT OF JARRET BRACHMAN BEFORE THE HOUSE ARMED SERVICES COMMITTEE SUBCOMMITTEE ON TERRORISM, UNCONVENTIONAL THREATS AND CAPABILITIES

OPERATION OF ISIS THROUGH SOCIAL MEDIA AND ITS LEGAL IMPLICATIONS IN INDIA

Islamic State in Somalia

Radical Islam In The House: The Plan To Take America For The Global Islamic State By Kate Mathieson, Michael Coffman READ ONLINE

SOCIAL MEDIA AND RADICALIZATION

Intelligence Bulletin

AM L CHALLE N G E S. situation in Sydney, Australia, in December 2014; two attacks on

With friends like these... Is Syria seeing a spill over from Iraq?

AMBER RUDD ANDREW MARR SHOW 26 TH MARCH 2017 AMBER RUDD

Ladies and gentlemen, Thanks for giving me the opportunity to talk to you today. Ladies and gentlemen,

PREVENT. Working in Partnership for the Prevention of Terrorism and Violent Extremism

Does parenting play a role in the development or prevention of radical beliefs? Indonesian case study

KURZ-INFOS. Islamism in Germany BRIEF INFORMATION. A project of the Catholic and Protestant secretaries for Religious and Ideological Issues

PROCMURA REPORT THE KENYA CHURCH LEADERS SEMINAR ON COUNTERING RADICALISATION AND VIOLENT EXTREMISM

The Terrorism Threat In 2012: Global Perspective Terrorism Risk And Insurance Markets In 2012 OECD Headquarters Paris, France 5 December 2012

Intelligence and Terrorism Information Center at the Israel Intelligence Heritage & Commemoration Center (IICC)

Muhammad Sawalha, senior Hamas operative living in London, continues participating in Hamas-supported political activities.

British fanatics heading to Iraq to join ISIS militants in their HUNDREDS amid fears 'they could bring terror to UK'

#Jihad. A Qualitative Study of Radical Jihadists Online Performance on Social Media. Anne Ingeborg Johnsen Bøe

Intelligence and Terrorism Information Center at the Center for Special Studies (C.S.S.)

Overview 1. On June 29, 2014, ISIS leader Abu Bakr al-baghdadi declared the establishment of the

Civil Wars, Violence, and International Responses project The Evolution of Armed Groups: Crafting Effective Responses Workshop 7 November 2017

and Mohamed Ahmed GARISSA, Kenya, May 30, 2012

Playing With Fire: Pitfalls of Egypt s Security Tactics

UC Berkeley Working Papers

The killing of two Al-Qaeda leaders in Iraq and its implications

Terrorism: a growing threat to the Western states and societies?

African Caucus Topic A: Combatting the Rise of Terrorism in Africa. Chairs: Mariana Araujo, Shalom Rubino

MINDS ON ACTIVITY SETTING THE STAGE. News in Review January 2013 Teacher Resource Guide EIGHT DAYS: Israel and Hamas

Anglican Church of Kenya Provincial Synod Archbishop s Charge

Church of England digital evangelism update. Chaired by Canon John Spence Adrian Harris, Amaris Cole and Thomas Allain Chapman

MULTI directional. MULTI ethnic. MULTI skilled

The Islamic State in West Africa Accuses Shekau, the Leader of Boko Haram, of Deviating from Islam

BYU MANAGEMENT SOCIETY

JEFFERSON COLLEGE COURSE SYLLABUS CRJ135 TERRORISM. 3 Credit Hours. Prepared by: Mark A. Byington. Revised Date: January 2009

Global View Assessments Fall 2013

Please note I ve made some minor changes to his English to make it a smoother read KATANA]

ISIS and Recruitment: How Do Demographics Play a Role? A Senior Honors Thesis. Submitted to the Faculty of Carnegie Mellon University.

NAVAL POSTGRADUATE SCHOOL

Beyond Iraq and Afghanistan

UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA

A new religious state model in the case of "Islamic State" O Muslims, come to your state. Yes, your state! Come! Syria is not for

Delegate Research Information

31/05/2013 Contact :

Intelligence and Terrorism Information Center

This report examines. Legacy of an Exile: How al-shabaab Was Inspired by and Learned From Usama bin Ladin. Introduction.

Is Extremist Violence in the West Caused by the Clash of Cultures?

Countering Violent Extremism in the United States and the European Union April 9 10, 2015 Twentieth Century Club

Anne Josso, Secretary General of MIVILUDES The French approach to dealing with Salafist/Jihadist radicalisation

fragility and crisis

Long Range Plan: Communications

War on Terrorism Notes

Grade yourself on the OER. Test Friday on Unit 1

Understanding Jihadism

Cyber Intelligence. Proceedings of Student-Faculty Research Day, CSIS, Pace University, May 4th, 2018 D7-1

UNCLASSIFIED//FOUO. Terrorism Social Media Promote Jihadist Group, Attacks in Syria

Seyedmehdi Hashemirahaghi B.A., Islamic Azad University of Tehran, 2008

Radicalization Process in the Horn of Africa Phases and Relevant Factors

Prime Minister s Foreword

I am once again honoured and privileged to speak in front of this distinguished audience.

EU Global Strategy Conference organised by EUISS and Real Institute Elcano, Barcelona

TALKING JUSTICE EPISODE TWO: THE AFTERMATH OF THE PARIS ATTACKS

Hizb-ut-Tahrir in Australia: Urgent Need for International Engagement and Counter-Narrative

Transcription:

Issue No: 3, September 2017 Tech Savvy Militants in the Age of ICT Globalization: Online Radicalization to Violent Extremism in Kenya WORKING PAPER By Dr. Wilson Muna

The introduction of the 21 st century information and communication technologies (ICT) has broken a new space for radicalization to VE. The explosion, globalization and development of the ICT sector, particularly cell phones and the internet has created an opportunity for millions of youth, even those in far-flung areas to get in touch with social-economic, religious and political developments across the world. Violent extremists like the Al-Shabaab have now shifted their focus to the use of social media platforms like Facebook, Twitter and WhatsApp to advance their agenda. This means that they can post radical ideologies online without much physical contact with their targets. According to the Lamu County Plan for CVE, the internet and mobile phone tools have enabled youth to create platforms where they can meet, discuss and interact on social issues, where at times radicalization is alive and violent extremism is glorified. 1 As a case in point, Fouad Belkacem, the spiritual leader of the outlawed terrorist organization Sharia4Belgium 2 - is known to have managed a highly effective online campaign through videos that led to the recruitment of many young Belgians to jihad. 3 Under his command, the Sharia4Belgium claimed responsibility of having recruited 10 percent of Belgium s jihad foreign fighters. 4 The emergent ICT platform has given birth to a brand new concept, that is selfradicalization. This concept refers to the process whereby an individual (is radicalised and) becomes a violent extremist without any specific terrorist group engaging him directly; it often occurs through access to extremist propaganda via media and the Internet. 5 Elucidating, Ali 6 argues that the internet has turned out to be the primary radicalization and recruitment platform. He posited that more than 5 prominent militant Islamic extremist websites were being exclusively managed by Somali Jihadists by 2009. As Mitchell and Bhatt argue 7, internet radicalization traverse three distinct phases: 1 Boga, Hamadi Iddi. "Lamu County plan for countering violent extremism." (2016). 2 The organization rose to distinction in 2010, following a protest against the proposed public headscarf ban. 3 Arutz Sheva Staff, Radical Belgian Jihadist Group Gets Jail Time, Arutz Sheva, (February 11, 2015). Available on: http://www.israelnationalnews.com/news/news.aspx/191209#.vduqtvnviko. Retrieved on August 24, 2017. 4 Duncun Crawford, Sharia4Belgium trial: Belgian court jails members, BBC NEWS, (February 11, 2015) Available on: http://www.bbc.com/news/world-europe-31378724 Retrieved on August 24, 2017. 5 Boga, Hamadi Iddi. "Lamu County plan for countering violent extremism." (2016). 6 Ali, A. "Radicalization process in the horn of Africa-phases and relevant factors." Institut für strategie- Politiksicherheits- und Wirtschaftsberatung, (2009). 7 Silber, Mitchell D., and Arvin Bhatt. Radicalization in the West: The homegrown threat. New York: Police Department, (2007).

1. In the Self-Identification phase - the internet provides the wandering mind of the conflicted young potential convert with direct access to unfiltered radical and extremist ideology. It also serves as an anonymous virtual meeting place a place where virtual groups of like-minded and conflicted individuals can meet, form virtual relationships and discuss and share the jihadi-salafi message they have encountered. 2. During the indoctrination phase, when individuals adopt this virulent ideology, they begin interpreting the world from this newly-formed context. Cloaked with a veil of objectivity, the Internet allows the aspiring jihadist to view the world and global conflicts through this extremist lens, further reinforcing the objectives and political arguments of the jihadi-salafi agenda. 3. In the Jihadization phase, when an individual commits to jihad, the Internet serves as an enabler providing broad access to an array of information on targets, their vulnerabilities and the design of weapons. In Kenya, evidence is replete indicating that the Al-Shabaab and their agents are using the internet such as blogs, Twitter and video and/or audio recordings to indoctrinate and radicalise potential recruits to VE. 8 In an attempt to understand the process and trends of youth radicalization in both Mombasa and Nairobi through an empirical field research, Mwangi found 9 that most individuals and groups spreading violent extremist ideologies preferred to use WhatsApp to spread their messages in lieu of the perception that the app is encrypted. This belief gave them confidence that third parties, especially government authorities were kept at bay. Both closed groups such as WhatsApp groups and open platforms such as available public content would contain carefully prepared narratives that would justify the pursuit of violence. Fieldwork findings indicate that the messaging revolves around themes such as an assault on Islam, claims of Christian and or Western invasions in places such as Iraq, Somalia and Syria As Mwangi 10 posits, violent extremists also prefer to disseminate their messaging through YouTube, with a strong persuasion that it would reach a crosscutting wider audience. Individuals, especially young people struggle to look for meaning, identity and purpose and are constantly looking for relevant messages that can satisfy their quest. Cognisant of the 8 Botha, Anneli. "Radicalisation to Terrorism in Kenya and Uganda: a Political Socialisation Perspective." Perspectives on Terrorism 9, no. 5 (2015). 9 Mwangi, John. "The process and trends of youth radicalization in Kenya s Mombasa and Nairobi counties." (2016). 10 Ibid.

fact that radicalization is a continuous process, the first thing an individual comes across would be propaganda and then a tailored message that would seem to respond to some of the individual s psychological, emotional, social, or religious needs. In Kenya for example, videos and online text messages by violent extremists are custommade around a string of localized historical grievances such as land injustices at the Kenyan Coast. Others may exploit perceptions of police harassment in major cities in the disguise of countering violent extremism and terrorism, which could then be manipulated to coin an entry point to radicalization and eventually being recruited. In a nutshell, a scapegoat has to be pointed out to justify the use of violence or be actively involved in a violent extremist movement. 11 In his findings, Mwangi 12 observed that following Al-Shabaab s attack on Westgate in 2013, a series of propagandist videos have been generated and always ends with an appeal for interested individuals and groups to join the movement. He further observed that after the 2016 Al-Shabaab attack on the Kenya Defence Forces (KDF) in their El-Adde military base, the leader of the Al-Hijra wing of the al-shabaab in Kenya posted an online video praising and used the same platform to call for recruitment of interested individuals. According to Mutanda 13, it is evident that the Al-Shabaab media team Al-Khataib, is highly tech savvy and produces online Jihadist materials that are of high quality. Foreign expert fighters such as those from Europe and the U.S. are part of the media team that conscript jihadist messages. The Al-Shabaab has perfected the art of sending videos through internet and social media platforms such as Twitter, Facebook and Twitter. Today, internet has become more accessible and cheaper and is no longer viewed as a significant barrier to access information. According to Patterson 14, rapid internet diffusion in Kenya has led to a mushrooming of cyber-cafes charging users less than a dollar per hour. These spaces have largely remained uncensored and have become critical radicalization sites for many youth. According to Kenya s National Security Intelligence Service (NIS), Al-Shabaab militants and their agents in Kenya are growingly alluring well-educated university students to join their 11 Mwangi, John. "The process and trends of youth radicalization in Kenya s Mombasa and Nairobi counties." (2016). 12 Ibid. 13 Mutanda, Darlington. "What Makes Terrorism Tick in Africa? Evidence from Al-Shabaab and Boko Haram." Jadavpur Journal of International Relations (2017). 14 Patterson, William R. "Islamic Radicalization in Kenya." Joint Forces Quarterly (78) (2015).

course through online platforms. 15 Through the use of online media like blogs, social media, magazines and online videos, Al-Shabaab have recently invaded the media space to lure professionals and disillusioned youth with special skills in medicine, engineering, among others They are being given job offers of up to $700 monthly, economic benefits for their families plus a host of other promises. 16 In the context of the foregoing, the Kenyan people need to be wary of tech savvy extremists who are busy producing content that is targeted at its population, particularly the young people. Parents have particularly a critical role to play in guiding their children while surfing the internet, and protect them from harmful content. In order to manage this looming threat, the government, through its multi-agency security sector and parliament are to establish legislative and policy frameworks that will insulate its population, particularly the youth from being lured into violent extremism. 15 Kenya National Security Intelligence Service (cited in Sunguta West, 2016), Al-Shabaab Recruitment from Kenyan Universities Alarms Officials, the Jamestown Foundation, Available on: https://jamestown.org/program/al-shabaab-recruitment-from-kenyan-universities-alarms-officials/ Retrieved on September 08, 2017. 16 Sunguta West, Al-Shabaab Recruitment from Kenyan Universities Alarms Officials, the Jamestown Foundation, (2016). Available on: https://jamestown.org/program/al-shabaab-recruitment-from-kenyanuniversities-alarms-officials/ Retrieved on September 08, 2017.