Skip to main content

Pulling the Plug on the ISIS ‘Virtual Caliphate’

It’s now two years since the horrific attacks in Paris that killed 130 people and injured hundreds more at a sports stadium, at sidewalk cafés, and in the Bataclan concert hall. The world was shaken, and the powerful tremors of terror were felt in the United States. Then, less than three weeks later, a husband and wife who’d secretly embraced violent jihad carried out a mass shooting at a Christmas party in San Bernardino, California, that left 14 people dead and 22 injured. Candidate Donald Trump was able to ride a wave of fear that helped him clinch the Republican nomination and eventually the presidency as he called for a ban on foreign Muslims and registration of domestic ones in the United States. But such measures have proved difficult to implement, and would be counterproductive if ever they were put in effect. The following essay by veteran counterterror investigator Ahmet Yayla offers a different approach. —Christopher Dickey,

World News Editor The anniversaries of the Bataclan atrocity in France and the San Bernardino attack in California are a good moment to consider, and re-evaluate, the best ways to fight the socalled Islamic State and prevent similar future attacks.

Case in point: We still don’t know what was recovered from the San Bernardino attacker’s iPhone after it was unlocked by a third party for the FBI and whether the attacker had communicated with other terrorists prior to the mass shooting. And Salah Abdeslam, the sole survivor of the attackers in Paris, joined ISIS simply because he was very close friends with other members of the ISIS Belgian cell; not because he was ideologically tied to the terrorist organization.

 You might think that these and the many so-called lone wolf terrorists we have seen since then who have blown up children at a concert in Manchester, or driven through crowds in Nice, in Berlin, on London’s bridges, and in Lower Manhattan, get radicalized by lurid jihadist snuff films and radical Islamist propaganda on social media sites. But you would be wrong. “Most terrorist recruitment happens face-toface.”

Just over 10 percent of the 144 people charged with ISIS-related offenses in the U.S. courts were “radicalized online,” according to research by George Washington University’s Program on Extremism which studies ISIS-related court cases.

In my own research, I have found that introduction to a terrorist organization happens through friends 35 percent of the time and through family members in 26.5 percent of the cases I studied. So, interdicting the ISIS recruitment chain means short-circuiting both human and electronic terrorist engagements. Consider first how local government authorities can subvert recruitment by peers and family. In most cases, especially for school-age youngsters, the families may not be aware of the fact that terrorist recruiters are approaching their children or that they are under the threat of being radicalized.


 I learned this while running a program six years ago for at-risk youth in a city on Turkey’s southern border with Syria. I served then as the chief of counterterrorism in Sanliurfa, a city that became a key point of departure on the jihadi highway. The program we set up largely halted their recruitment into terrorist organizations. We simply identified the potential recruits and first contacted their families in a friendly way, and, failing that, we contacted the subjects being targeted as soon as we realized they were being approached by terrorists.

Our team members took an open and sincere approach to the boys and girls by explaining to them their likely fate as foot soldiers of terrorists. We deployed their moms and dads as well as respected elders and teachers in a campaign of moral suasion, and nobody got judicially investigated or arrested. Over three years, we rescued more than 2,000 teens and young adults who might otherwise that more than 92 percent of the families were not aware of their loved ones’ interactions with the terrorists and more than 95 percent of the families were willing to cooperate with the police in order to keep their kids from dying for the sake of terrorist organizations.

 While this was a local program, its lessons may be applied in Europe and in the United States, where custom-tailored local programs aimed at potential ISIS recruits are needed. In Turkey we offered “a second chance” to many young adults. This approach works, particularly if the team involves native-speaker police officers who can establish bonds and keep the communications channels open so the cult-like isolation tactics of the jihadists and terrorists will fail.

The terrorists typically attempt to isolate their recruits from the outside world and to monopolize their time with conversations or training by jihadist mentors so as to harden loyalty. The key is to break into the recruit’s inner circle of friends. Secondly, consider how the digital tools of terrorists can be blocked. Recruitment face to face is abetted by encrypted social media, and here much more needs to be done to unplug ISIS, especially as it has lost its territories in the Middle East and morphed into a “virtual caliphate.” There are two critical steps to be taken to combat the online terror-sphere. The first is for governments to require internet companies to prohibit free access to terrorist materials through chat rooms and group sites available to hundreds at a time. Today, terrorists can easily download “Lone Wolf Handbooks,” terrorist journals, or ideological and military training manuals over the internet with a click of a button. Several actual attacks have happened as a result.

The availability of these kinds of materials complete disaster for counterterrorism efforts. Internet companies must wipe off the terrorist content. Social media companies have successfully done this with child pornography, and they can adopt similar approaches to terrorist content by blocking search results. For example, when the al Qaeda manual “A Course in the Art of Recruiting” is searched, Google provides 22,600 results, many of which provide direct links to this electronically downloadable terrorist recruitment manual.

The second step involves regulating social media and cellphone applications such as Telegram, which broadly allows terrorists to share encrypted content including videos, literature, books, and pictures with any user who has the right password. These applications have become major propaganda tools for terrorists and, unfortunately, many of those applications do not or cannot deal with the terrorist invasion of their mediums.

Several terrorist attacks were directed through such encrypted platforms, and many of the terrorist channels remain open for weeks at a time, allowing the terrorists to share know-how and to reach apprentice radicals such as Sayfullo Saipov who carried out the deadly attack on a New York City bike path last month. Without taking these measures, the virtual caliphate will strike again and again.

Comments

Popular posts from this blog

Why States Still Use Barrel Bombs

Smoke ascends after a Syrian military helicopter allegedly dropped a barrel bomb over the city of Daraya on Jan. 31.(FADI DIRANI/AFP/Getty Images) Summary Barrel bombs are not especially effective weapons. They are often poorly constructed; they fail to detonate more often than other devices constructed for a similar purpose; and their lack of precision means they can have a disproportionate effect on civilian populations. However, combatants continue to use barrel bombs in conflicts, including in recent and ongoing conflicts in Africa and the Middle East, and they are ideally suited to the requirements of resource-poor states. Analysis Barrel bombs are improvised devices that contain explosive filling and shrapnel packed into a container, often in a cylindrical shape such as a barrel. The devices continue to be dropped on towns all over Syria . Indeed, there have been several documented cases of their use in Iraq over the past months, and residents of the city of Mosul, which was re

Russia Looks East for New Oil Markets

Click to Enlarge In the final years of the Soviet Union, Soviet leader Mikhail Gorbachev began orienting his foreign policy toward Asia in response to a rising Japan. Putin has also piloted a much-touted pivot to Asia, coinciding with renewed U.S. interest in the area. A good expression of intent was Russia's hosting of the Asia-Pacific Economic Cooperation summit in 2012 in Vladivostok, near Russia's borders with China and North Korea. Although its efforts in Asia have been limited by more direct interests in Russia's periphery and in Europe, Moscow recently has been able to look more to the east. Part of this renewed interest involves finding new export markets for Russian hydrocarbons. Russia's economy relies on energy exports, particularly crude oil and natural gas exported via pipeline to the West. However, Western Europe is diversifying its energy sources as new supplies come online out of a desire to reduce its dependence on Russian energy supplies . This has

LONDON POLICE INDIRECTLY ENCOURAGE CRIMINALS TO ATTACK RUSSIAN DIPLOMATIC PROPERTY

ILLUSTRATIVE IMAGE A few days ago an unknown perpetrator trespassed on the territory of the Russian Trade Delegation in London, causing damage to the property and the vehicles belonging to the trade delegation , Russian Foreign Ministry Spokeswoman Maria Zakharova said during the September 12 press briefing. The diplomat revealed the response by the London police was discouraging. Police told that the case does not have any prospects and is likely to be closed. This was made despite the fact that the British law enforcement was provided with video surveillance tapes and detailed information shedding light on the incident. By this byehavior, British law inforcements indirectly encourage criminals to continue attacks on Russian diplomatic property in the UK. Zakharova’s statement on “Trespassing on the Russian Trade Mission premises in London” ( source ): During our briefings, we have repeatedly discussed compliance with the Vienna Convention on Diplomatic Relations, specif