The Islamist Cyberpropaganda Threat and Its Counter-Terrorism Policy Implications

This chapter examines Islamist cyberpropaganda case studies live in 2014, namely Al Qaeda, Islamic State, Boko Haram and Al Shabaab. The authors define cyberpropganda as the exploitation of the generative characteristics of online interaction for the production and reproduction of propaganda. The cross-case analysis identifies key messages and themes, how cyberpropaganda is generated and spread, and how it is made attractive to those who may act on it. In the discussion that follows implications for the policy-maker are identified and addressed. These include whether to tackle symptoms or causes of the problems and whether to treat the problems as essentially global or local. The final issue is how the counter-propagandist can make themselves heard.

[1]  Robert Dowd Religious Diversity and Religious Tolerance , 2016 .

[2]  Robert A. Cropf,et al.  Ethical Issues and Citizen Rights in the Era of Digital Government Surveillance , 2016 .

[3]  Roland Heickerö,et al.  Cyber Espionage and Illegitimate Information Retrieval , 2016, Int. J. Cyber Warf. Terror..

[4]  Pedro Miguel Fernandes Ruivo,et al.  Success Factors for Data Protection in Services and Support Roles: Combining Traditional Interviews with Delphi Method , 2015, Int. J. Hum. Cap. Inf. Technol. Prof..

[5]  Andrew Phillips The Islamic State's challenge to international order , 2014 .

[6]  Carol K Winkler,et al.  Visual Propaganda and Extremism in the Online Environment , 2014 .

[7]  Stewart Kenton Bertram,et al.  Sub Saharan African Terrorist Groups’ use of the Internet , 2014 .

[8]  Joel Busher,et al.  Introduction: Terrorism and Counter-terrorism in Sub-Saharan Africa , 2014 .

[9]  C. Rakodi Inter-Religious Violence and its Aftermath: Insights from Indian and Nigerian Cities , 2013 .

[10]  F. Adegbulu Boko Haram: the emergence of a terrorist sect in Nigeria 2009–2013 , 2013 .

[11]  W. Hansen,et al.  Fanon, the Wretched and Boko Haram , 2013 .

[12]  Roman Loimeier Boko Haram: The Development of a Militant Religious Movement in Nigeria , 2012 .

[13]  Innocent Chiluwa Social media networks and the discourse of resistance: A sociolinguistic CDA of Biafra online discourses , 2012 .

[14]  S. Weinstein,et al.  The United Kingdom’s Centre for the Protection of National Infrastructure : An evaluation of the UK Government’s response mechanism to cyber-attacks on critical Infrastructures. , 2012 .

[15]  S. Gourley Linkages Between Boko Haram and al Qaeda: A Potential Deadly Synergy , 2012 .

[16]  David Shinn Al Shabaab's Foreign Threat to Somalia , 2011 .

[17]  N. O'shaughnessy,et al.  The dark side of political marketing , 2010 .

[18]  Neville Bolt Propaganda of the Deed and the Irish Republican Brotherhood , 2008 .

[19]  M. Conway Terrorism and new media: the cyber-battlespace , 2007 .

[20]  R J Mills,et al.  Harnessing peer networks as an instrument for AIDS prevention: results from a peer-driven intervention. , 1998, Public health reports.

[21]  G. L. Bon The sentiments and morality of crowds. , 2022 .