Need a perfect paper? Place your first order and save 5% with this code:   SAVE5NOW

Countering Violent Extremism

The Internet and social media platforms have played an influential role in the recruitment and radicalization processes of extremists. Although extremists were slow to embrace the channels, in recent decades, the number of individuals distributing extremist content has surged alongside the facilitation of extremist relationships. Data from PIRUS indicated that in 2016 alone, social media was responsible for about 90 percent of the radicalization process (Jensen, n.d.). Notably, the Internet provides an ideal architecture through user activity, which presents, selects, connects, and curates information in the context of extremist ideologies. Such features enable the formation of echo chambers online and structures in which people can interact with extremist groups, and reinforce each other’s views. Since terrorism and extremism are illegal in many states, terrorist organizations have continued to implement high levels of secrecy through encryption to reduce the risk of detection (Binder & Kenyon, 2022). Thus, countering violent extremism will require comprehensive online intervention programs, such as content moderation, implementing algorithms, and online counseling and support services.

Impact on Recruitment and Radicalization

The objective behind social networking sites was to enable people to connect with friends, family, and peers, but extremists have capitalized on the loopholes and are now using them to offer invitations to everyone. Social media and the Internet have made it easy for terrorist organizations to share information across different geographical locations, including North America. For example, Anwar al-Awlaki, a US-born Imam, is believed to be a pioneering terrorist to used the Internet to produce and propagate terrorist propaganda through his blog, YouTube channel, and Facebook page (Schmid, 2020). He invited volunteers to join different extremist groups by sharing sophisticated videos and publishing the online magazine Inspire. However, despite efforts to curtail the violent extremist content aimed at recruiting unsuspecting individuals, ideologues and recruiters have remained adept at attracting and sharing propaganda. A similar instance was that of Aqsa Mahmood, who used social media, mainly Twitter and Tumblr, to radicalize and recruit British teenagers (Schmid, 2020). Hence, social networking sites have provided extremist with open channels to recruit, radicalize, and control narratives about their practices in North America and worldwide.

It is also noted that videos, images, and magazines shared via the Internet and social media platforms have contributed to propaganda and radicalization in North America. Terrorist organizations are operating and distributing controlled propaganda. The diversity and availability of digital equipment have empowered them to produce high-quality content as part of their branding strategy (Schmid, 2020). Vulnerable individuals have fallen “prey” to the strong narrative peddled by extremists because they touch on the push and pull factors of local communities. For example, Al-Hayat Media generated numerous videos targeting potential recruits and sympathizers by depicting America as immoral and unlawful, while showing how life within ISIS territory is spiritually fulfilling (Schmid, 2020). Unfortunately, these depictions often go viral and help with translating the terrorists’ way of life and violence into a way that is easily understood by average American viewers, enhancing their psychological impacts on the target audience. In this regard, the Internet and social media provide potential recruits with various narratives in a single, well-presented package that has technical instructions on how to carry out violent acts as lone actors, and directives on how to join terrorist groups.

Current Efforts to Counter Homegrown and Domestic Violent Extremists in North America

North American nations, particularly the US, through the Department of Homeland Security (DHS), have invested in a multidirectional and information-gathering and -sharing infrastructure to counter domestic violent extremists. The infrastructure prioritizes critical areas, including the National Terrorism Advisory System, the NSI, the “If You See Something, Say Something” public awareness campaign, and the National Network of Fusion Centers (Department of Homeland Security, 2019). Furthermore, the Department reinforced the jurisdiction of the NSI by intertwining it with the National Threat Evaluation and Reporting Program (NTER) to focus on various types of threats regardless of ideology or motive. The NTER is vital in addressing extremism in North America because it provides resources and training to law enforcement officers and DHS, enabling them to quickly identify and avert terrorism, mass attacks, and targeted violence (Department of Homeland Security, 2019). Together, these agencies facilitate the national capacity to gather and share intelligence and information, assisting all levels of government and private sectors to prepare for threats of targeted violence and terrorism adequately.

America is also countering homegrown and domestic violent extremists by denying them the opportunity to exploit trade, immigration, and domestic and international travel systems. Thousands of terrorist watch-listed people are prevented from traveling to or entering America by the DHS. Various interventions are employed to detect such actors to thwart their efforts of using designated ports and exploiting the immigration systems, such as complex vetting programs and patrols (Department of Homeland Security, 2019). In addition, America resorted to cooperating with foreign governments to confirm better people’s identities, particularly those seeking asylum and refugees. For instance, the US gathers and shares biographic information to augment its vetting ad targeting initiatives. In 2018, the National Vetting Center was established by the National Security Presidential Memorandum-9 to promote interagency partnerships through a standard technology platform (Department of Homeland Security, 2019). The platform enabled a coordinated and comprehensive review of all classified information about immigrants and applicants for travel. Ergo, these interventions have helped North America curb violent extremism, making it challenging for domestic terrorists to exploit the travel continuum.

Recommendations for Countering Radicalization

I recommend social networking sites to collaborate and implement algorithms that counter the echo-chamber effects by promoting diverse viewpoints. Homegrown extremism can be alleviated by capitalizing on algorithms that enhance content diversification to disrupt the echo chamber phenomenon, guaranteeing that all online interactions are exposed to a broader audience to minimize the potential for radicalization and recruitment. The collaborative intervention will prioritize credible and balanced sources, leaving no room for the spread of extremist ideologies. The other recommendation entails outright content moderation and removal of extremist propaganda from the Internet (Ganesh & Bright, 2020). Different governments can work with technology firms and civil societies to develop advanced tools that search and remove extremist material, such as enhanced reporting mechanisms and AI-powered moderation systems. The final suggestion would be to offer online counseling and support services for people at risk of radicalization as part of a proactive strategy, providing them with guidance and alternative narratives to counter extremist ideas. Ultimately, these programs will help counter radicalization in North America and the rest of the world.

Conclusion

Overall, extremist activities have been fueled by the development of the Internet and social media platforms. PIRUS indicated that the radicalization peaked in 2016, noting that within the same timeframe, it was responsible for about 90 percent of all the cases. Historical evidence has further backed such accusations across different geographical locations in North America. For instance, Anwar al-Awlaki, a US-born Imam, pioneered terrorists’ use of the Internet to produce and propagate terrorist propaganda through his blog, YouTube channel, and Facebook page. Alternatively, various efforts exist to counter extremists, including denying terrorists the opportunity to exploit trade, immigration, and domestic and international travel systems. I would recommend social networking sites to collaborate and implement algorithms that counter the echo-chamber impacts by facilitating diverse viewpoints. Therefore, implementing these interventions will assist in addressing extremist radicalization and recruitment in North America.

References

Binder, J. F., & Kenyon, J. (2022). Terrorism and the Internet: How dangerous is online radicalization? Frontiers in Psychology, 6639.

Department of Homeland Security. (2019). Department of Homeland Security Strategic Framework for countering terrorism and targeted violence. United States Department of Homeland Security.https://www.dhs.gov/sites/default/files/publications/19_0920_plcy_strategic-framework-countering-terrorism-targeted-violence.pdf

Ganesh, B., & Bright, J. (2020). Countering extremists on social media: challenges for strategic communication and content moderation. Policy & Internet12(1), 6-19.

Jensen, M. (n.d.). The Use of Social Media by United States Extremists. The National Consortium for the Study of Terrorism and Responses to Terrorism (START). https://www.start.umd.edu/pubs/START_PIRUS_UseOfSocialMediaByUSExtremists_ResearchBrief_July2018.pdf

Schmid, A. P. (Ed.). (2020). Handbook of terrorism prevention and preparedness: Prevention of Radicalization on Social Media and the Internet. International Centre for Counter-Terrorism (ICCT). https://www.icct.nl/sites/default/files/2023-01/Chapter-12-Handbook_0.pdf

 

Don't have time to write this essay on your own?
Use our essay writing service and save your time. We guarantee high quality, on-time delivery and 100% confidentiality. All our papers are written from scratch according to your instructions and are plagiarism free.
Place an order

Cite This Work

To export a reference to this article please select a referencing style below:

APA
MLA
Harvard
Vancouver
Chicago
ASA
IEEE
AMA
Copy to clipboard
Copy to clipboard
Copy to clipboard
Copy to clipboard
Copy to clipboard
Copy to clipboard
Copy to clipboard
Copy to clipboard
Need a plagiarism free essay written by an educator?
Order it today

Popular Essay Topics