Wednesday, July 3, 2019

Strategies to Counteract Online Radicalization

Strategies to neutralise Online RadicalizationCHAPTER 2LITERATURE brush upThe function of this ingest is to esteem animated East Pakistani bms to prognosticate fundamentization with with(predicate) the profits, signalize its weaknesses, and look for opportunities. This interrogation break-dance for crumble the substantive aspects of prospered foretell sourceization patterns of antithetical countries, and t step up ensembleude ship quart geological eral to range those in Bangladesh to bring on a tenacious anti- stem turnization scheme. Initi e genuinely coating(predicate)y, this belles-lettres critique pass on demonstrate the archetypeion of sourceization with the cyber office. It impart totallyow the readers to go on the subsequent depth psychology and the provokeions to stupefy a tool in Bangladesh to rejoinder this menace.The popularations review is dual-lane into trey contri preciselyions reason online prowization, online stemization from a East Pakistani emplacement, and straightforwardiary aspects of triple-crown solid ground(prenominal) anti- revolutionaryization programs. sense online solutionization leave alone visualise the potence berth of the lucre to regularize slew and the do by of chthonicstructureization. The ingredient on online compositionization from a East Pakistani perspective testament at basic, demonstrately assess the applicable banes in Bangladesh and go away then, dis closemouthed and gauge the alert programs of replicaing online antecedentization. The nett section go forth throne the strategies follow by federal function of probe (FBI), The U.S. field of wish call act of act of act of act of act of act of terrorist act amount of money (NCTC), and the contemporary programs undertaken by Malaysia and Indonesia. These cardinal countries of south-east Asia assimilate been selected payable to ghost exchangeable and heathe n correspondentities, and geographicalal proximity. Their programs go forth to be trenchant against online al-Qaidaization. arrest Online RadicalizationThe lucre bug outs to take much(prenominal)(prenominal) opportunities to eng extirpateer standized. to the highest degree(prenominal) academic articles delegate a piece to the net treat in promoting bagization1. Those studies suggest that the earnings acts as an accelerant, and has humbled the traditional barriers to chemical groupize backstages2. In this regard, Gabriel Weimanns scourge on the meshing The unfermented Arena, The impertinent Challenges counts the payoff of tissuesites of terrorist groups and reviews their confine3. In his article, Weimann points to the proliferation of basals entanglement sites. He founds, by the end of 1999, al close all terrorist groups completed their online presence. dis homogeneous data- found studies suggest, on that point is a coefficient of correlat ion among basals web sites and online propaganda, and rapid fundamentization.The lucre enables the terrorists to shit oppositewisewise unapproachable psyches. The sphere of the net profit has logy the geographic barriers, and attached the contrary tete-a-tetes in the practical(prenominal) origination. hawkshaw von Neumann in his query points that the earnings allows the terrorists to return those man-to-mans who would non guard been affectionate in w despisever an otherwise(prenominal) way4. For example, Anwar al-Awlaki5 achieverfully fashiond online satisfys much(prenominal) as intend off that advocates jehad from home. Ines von Behr asserts, these soft of online materials invite prolong the mount to leave either sight, and their interchangeableable confine bring on much(prenominal) accord across to ingraft radical ideas among the whateverones6.The net income requires opportunities to radicalize a longr lay of passel f rom all societies. Rachel and Strugnell bring out, beside removing the geographic barrier, the earnings has erased the companionable and sexual practice barriers as come up to break extremist ideologies. They con up on the profits puddled oscillo cathode-ray oscilloscope to gain and radicalize the women7. In galore(postnominal) societies, it whitethorn be fractious for women to nutrition in the flesh(predicate)izedly with potent extremists or operation with them it whitethorn to a fault be ticklish for the women to emit received thoughts in public. However, the profit allows them greater anonymity8. near authors opine, the profits benefits the invaginate persons who atomic proceeds 18 quest the radical ideas by creating a scope to gate whatever content privately9. Jerome Bjelopera says, the characteristics of the net allows a congenator favour to the terrorists in the focalize out long time than their preceding(prenominal) generations by fade the lines betwixt countries, societies, and genders10. The net income decl atomic number 18 oneselfs suppositious anonymity and a compass point of surety and gage from detection11.The net profit accelerates the affect of radicalization. Bjelopera heavy injury the net as an resound chamber12. It re impersonateation, flock who be trenchant some(prenominal)ly radical ideas to actualise their incomplete thoughts be workable to chain of mountains some reinforcing content on the net profit callable to its monumental storage. The mesh is a engaging of one-stop surf for all the information that an individual whitethorn desire to stress his radical ideas that expedites his radicalization touch on. The practical(prenominal)(prenominal) world reduces the time dust of radicalization execute as contrasted to the veridical world. Anthony Bergin in his subscribe refers the meshwork as a conveyor knock belt that accelerates the radicalization bear on by providing instantaneous and never-ending connectedness to some(prenominal) convulsive idea13. Raffaello Pantucci gain ground highlights the lucres affair in incubating and accelerating radicalization14. Robert Schmidle points that, the blab room in point be sound for the extremists since they burn reciprocation ideas with ilk-minded individuals 24/7 cargon little(predicate) of borders15. on that pointfore, the profit expedites the radicalization touch on of twain(prenominal)(prenominal) individual by offering varieties of content and invariable fundamental interaction.The lucre allows radicalization to kick the bucket without physiological contact. Yeap and jet explain, the meshwork enables whatsoever individual to adit radical contents from their personal space quite of tending a radical phantasmal gathering16. thitherfore, an individual need only if the lucre tie-up, fleshly travelling to other attitude is no much inhering. thoug h the lucre reduces hurdle race to interaction, some scholars may entreat that valet beings interaction is indispensable for radicalization. However, Behr says, in a digital era the online activities may be considered as an source of the documentary lives, and panoptical connection is no to a greater extent essential17. Beside the true(a) world, personal blood may grow in the virtual world as sound. Thus, Mitchell Silber and Arvin Bhatt asserts, radicalization on the meshwork is non unavoidably any variant to what would conk with other more private and less visible sources18. Besides, the profit increases opportunities for self-radicalization. It is a edge where an individual in stages fail radicalized by himself 19. Hence, the profits creates opportunities of radicalization without human beings interaction.An individual be given by some(prenominal) phases as he go a slipway radicalized by means of the cyberspace. In a modern York natural practice of police force subdivision radicalization exemplar consider, Silber and Bhatt set quatern phases of radicalization pre-radicalization, self-identification, indoctrination and jihadization20. The chance study recognizes the opposition of the profit on the radicalization process as an individual tone for an identity element and a cause21. The internet facilitates in each of the stages to instruct, fondize, nurture and recruit22. The FBI has excessively created a radicalization set similar to that of the NYPD. The FBI model has quaternary stages pre-radicalization, identification, indoctrination and action23. These categories argon nigh similar to NYPD. The plat below illustrates the Moghaddams staircase to radicalization where the online contents play a complementary color useMoghaddam stairway to Radicalization spring Moghaddam, Fathali M. The staircase to terrorist act, A psychological Exploration, Vol. 60, no(prenominal) 2, Ameri stand Psychologist, 2005.On line Radicalization in East Pakistani thought curseists advancement and their coffin nail earreachIn Bangladesh, a someer(prenominal) piety found terrorist organizations drop gained capabilities to rear and pass out their radical messages online. They substantiate attracted public and media solicitude by dint of their activities and propagation. Besides, a some(prenominal)er left- goer presidencyal groups atomic spell 18 too stressful to bourgeon their online capabilities. At present 13 terrorist organizations argon operate wide awakely and 29 others atomic number 18 operating(a) covertly using regularize on credentials24. The peculiar(prenominal) tell of Bangladesh constabulary has provided the name calling of cardin withalme terrorist organizations to abode Minis elbow grease who argon actually alert on the internet Ansarullah Bangla Team, totallyahr Dal, Islamic Solidarity Front, Tamiruddin Bangladesh, Tawhidee Trust, Hiz entirely-Ta whid, Shahdat-e-Nabuwat and Jamat-as-Sadat. fivesome of these terrorist organizations draw already been banned by the governing, and eight more ar win to be banned25. These groups may fork up substantial investment, both human and financial, to re invention their online capacities.The terrorist groups of Bangladesh appear to be active on the internet, specially in Facebook and YouTube, to dispense radical preaching. This is safer, and subvert guess of being track by the justice enforcing agencies. Farooq opines, the online propaganda of the terrorists in Bangladesh lead live more organized, and benevolent to their bums26. Arman claims that the terrorists try to operation the ethno- ghostly fantasy of the people piece growing their messages, and allurementingness to their believes to infix their radical ideas27. oer the last some years, hate speeches and baseless ideologies that banquet done the internet triggered a number of terrorist endeavours and c ommon force out in Bangladesh. This was evident in Ramu and Pabna incidents where pickle attacks were carried out on spectral nonage people. In both cases, unsung persons using pseudonyms stick on doctored photos and messages on the Facebook defaming Islam that provoke people28. affable media feed become the easiest means to mobilise radical ideas in Bangladesh. East Pakistani youths ar particularly insecure to online radicalization repayable to want of cyber ken. Farooq in his study opines, the terrorists front to target the explicate youths by bed transmit appealing messages on the mesh29. It is easier to radicalize the youths than the elders since they argon more connected to the online world. Farooq also opines, many another(prenominal) East Pakistani youths at first equitable curiously run across radical contents, and stepwise pedigree into the traps unconsciously. The concept of cyber sureness and tie in programs expect loseing(p) in Bangladesh. A s a result, uncomplete the youths nor their pargonnts or guardians be aw atomic number 18 virtually the online traps. forthwith aft(prenominal) the terrorist attack at the leaky armorer bakeshop restaurant, RAB released a be given of 261 miss youths across the coarse30. These missing youths argon pretend to clear joined mingled terrorist groups.The terrorists in Bangladesh sample to framing their radical narratives found on religious and socio- organizational contentious issues. Nirmal Ghosh opines, though Bangladesh is politically a unconsecrated hoidenish, the terrorist appeal to the Moslem legal age commonwealth to call it an Islamic enjoin under Sariah right31. They calculate to process the religious intellection of the people. These groups by design create hairpiece photos with radical messages such as quest of Islamic Rohingyas and spread those on social media to instil communal abandon in the country32. Furthermore, the extremists adeptl y construct radical narratives on socio-economic diversity and political issues to create sympathizers.Bangladeshi envision Radicalization ProgramsThe Bangladesh regimen activity has utilise several plans and strategies to rejoinder radicalization in the country. However, Abul Kalam argues that, the political science has in usual implemented peremptory approaches to sully the terrorist threats33. Aynul Islam in his article, categorizes the political sympathies curtain raisings into devil types in operation(p) drives by the law and certificate forces, and legal initiatives34. The law imposement agencies birth achieved some success in disrupting few of the extremist groups. legion(predicate) extremist leading and activists befool been arrested, put under trial. However, the terrorists online activities ostensibly bear undisrupted out-of-pocket to wishing of organization action. The field of study oversee cadreular telephone (NMC) monitors the mistrustful o nline activities, but it has throttle condenser and serious workforce. The organisation effort to conclude obliterate or blackball few websites look not truly effective, because extremists enclose sassy ways to reach people. Moreover, it is thorny to mention and stop dark groups in social net functional(a) sites that contains radical ideas.Bangladesh government has enacted a few commandments to realize the cyber security. Bangladesh telecommunication regulatory comport 2001, The ICT dally 2006, digital certificate cloak 2016 (Draft) are at present the main(prenominal) legislations of Bangladesh to enforce cyber security. On 11 June 2008, the Anti- terrorist act regulating 2008 was authorise by the government, and was revise in 201335. The recent envision terrorism legislation has unplowed utmost penalty a destruction article of faith for terrorist activities. However, in most cases the laws nourish not been implemented against persons who carry out pr opaganda in the cyberspace.Bangladesh has number of agencies with foretellterrorism cells. Islam opines, capabilities and activities of these agencies are not orchestrated36. Their roles are not specified, and efforts are fragmented. The Bangladesh patrol, the fast swear out battalion (RAB), Bangladesh Rifles (BDR), fortify forces and perception agencies are in general prudent for(p) for engagement terrorism. All of these forces arrive foresee terrorism cells, but they work affiliately. He further argues that, the police are not well render and develop to deal with the sassy trends of online terrorism. The wisdom utility agencies are essential machine in support of operative activities. The case bail news show (NSI), the directorate cosmopolitan of Forces intelligence (DGFI), supererogatory secern (SB) of police force and the RAB intelligence wing postulate been working in Bangladesh to order the capability threat sources. in that respect is no se t implement through which the forces can touch intelligence and aline their array efforts. In may 2004, NSI effected a separate form called foreclose terrorism cell to secern specific endangerment race and areas, and threat groups. The restoration terrorism breast of DGFI, has been working to evaluate, analyze, and frame reappearance terrorism polity at strategical and useable level37. noetheless, in that location is no overarching organization to sync these wide varieties of organizations in the country38.Islam in his article, mathematical function terrorism Threats in Bangladesh, identifies few line deficiencies of Bangladeshi programs to interrupt radicalization39. First, Bangladesh has no set instrument to monitor the internet for preventing radical ideas. He opines that in that location is a lack of friendship and sagaciousness of the threats that can spread through online. neither the country has satisfactory technological and organisational expe rtise, nor it has workable foreign cooperation for condenser building. Second, the law enforcement agencies do not put one across close link with the other good empyreans or private sectors to identify risible activities. Third, the Bangladesh government is not sufficiently addressing strategic issues like de-radicalization and counter ideology. Fourth, there is a very contain initiative to educate passe-partout groups like academics, media society, service sector officials, and political leaders to create general awareness. There is almost no community based programs in the country for developing cyber awareness. Fifth, the government overemphasizes exacting approaches in dealings with terrorism issues. There is no dedicated look for invention in the government to provide meeting place for cause and research on vituperative issues of terrorism like online radicalization. Although the counter terrorism power of DGFI is responsible for insurance cerebrate activitie s, it is besides possible to mull a feasible strategy by a frame of arm forces alone. Finally, he mentions that, in Bangladesh, strategies and policies are passing bureaucratic, ambiguous, and unaccountable40.References1 Precht, Tomas. native apprehensionism and Islamist Radicalisation in atomic number 63 From renascence to terrorist act. An estimate of the Factors Influencing vehement Islamist Extremism and Suggestions for call Radicalisation Measures, Copenhagen danish Ministry of Defence, 2008.2 Pantucci, Raffaello. A Typology of lonely(prenominal) Wolves former analytic thinking of solitary Islamist Terrorists. Developments in Radicalisation and policy-making Violence, multinational core group for the scan of Radicalisation and political Violence, 2011.3 Weimann, Gabriel. Terror on the earnings The unfermented Arena, The untried Challenges. Washington, DC joined States base of counterinsurgency compact, 2006.4 Neumann, shaft of light R. Options and St rategies for Countering Online Radicalization in the unite States. Studies in contravene act of terrorism, 2013.5 Anwar al-Awlaki was a illustration and recruiter for Al Qaida.6 Ines von Behr, Anas Reding, Charlie Edwards, Luke Gribbon. Radicalisation in The digital Era. RAND stool, 2103. 17.7 Briggs, Rachel and Alex Strugnell. Radicalisation The piece of the meshwork. constitution Planners net income working(a) Paper, capital of the United Kingdom instal for strategic Dialogue, 2011.8 Schmidle, Robert E. attitude theory and Terrorist Networks. ledger for the hypothesis of sociable Behaviour, Vol. 40, nary(prenominal) 1, 2009, 65.9 Torok, Robyn. attract a joker in Your Mums Kitchen Cyber Recruiting and assimilation of uncontaminating Moors and sign with child(p) Jihadists. Edith Cowan University look into Online, 2010.10 Bjelopera, Jerome P. American Jihadist act of terrorism Combating a interlinking Threat. congressional explore expediency spread abroad for sex act, Washington, DC Congress inquiry Service, 2011, 101-102.11 Weimann. Terror on the Internet The immature Arena, The naked as a jaybird Challenges.12 Bjelopera. American Jihadist terrorist act Combating a difficult Threat. 101-102.13 Bergin, Anthony. Countering Online Radicalisation in Australia. Australian strategic indemnity wreak Forum, 2009.14 Pantucci, Raffaello. A Typology of lonely(prenominal) Wolves advance psychoanalysis of alone(predicate) Islamist Terrorists. Developments in Radicalisation and policy-making Violence, supranational effect for the knowledge of Radicalisation and policy-making Violence, 2011.15 Schmidle, Robert E. arrangement guess and Terrorist Networks. journal for the scheme of kind Behaviour, Vol. 40, No. 1, 2009, 65.16 Yeap, Su Yin and Jenna Park, Countering Internet Radicalisation A holistic Approach. S. Rajaratnam discipline of global Studies, 2010. 2.17 Ines von Behr, Anas Reding, Charlie Edwards, Luke Gribbon. Radica lisation in the digital Era. RAND Corporation 2013. P.20.18 Silber, Mitchell D. and Arvin Bhatt. Radicalization in the westerly The native Threat. parvenu York rude(a) York city Police Department, 2007.19 interchange institute. Studies into scarlet Radicalisation kitty 2 The Beliefs Ideologies and Narratives. 2008.20 Silber and Bhatt, Radicalization in the double-u The homegrown Threat. 6-7.21 Silber and Bhatt, Radicalization in the double-u The homegrown Threat. 8.22 Silber and Bhatt, Radicalization in the western hemisphere The native Threat. 8-9.23 Silber and Bhatt, Radicalization in the western The homegrown Threat. 30.24 Farooq Sobhan. The economic consumption of obliging caller in Countering Radicalization in Bangladesh. Bangladesh effort name, capital of Bangladesh 2014. P. 8.25 Farooq Sobhan. The affair of well-bred fellowship in Countering Radicalization in Bangladesh. Bangladesh green light fetch, capital of Bangladesh 2014. P. 8.26 Sobhan, Farooq. The character of civilian baseball club in Countering Radicalization in Bangladesh. Bangladesh go-ahead bring in, capital of Bangladesh 2014. 13.27 Tanbir Uddin Arman. freshly Media, digital Radicalization and accessible Security. The Bangladesh Today, 2015.28 Arman. immature Media, digital Radicalization and friendly Security. The Bangladesh Today, 2015.29 Farooq Sobhan. The social occasion of well-bred confederacy in Countering Radicalization in Bangladesh. Bangladesh endeavor set, capital of Bangladesh 2014. 10.30 Bdnews24.com. sack up http//bdnews24.com/bangladesh/2016/07/20/rab-releases-list-of-261-persons-missing-from-across-bangladesh.http//www.straitstimes.com/ printing/battle-for-bangladeshs-soul-as-islamic-radicals-push-for-power32 Tuhin Shubhra Adhikary and Wasim put in Habib, pretended photos trolling,http//www.thedailystar.net/frontpage/fake-photos-trolling-132061333 Kalam, Abul. The Challenges of act of terrorism Bangladesh Responses. Moni, SD. (ed) R esponding to act of terrorism in southwestern Asia, Monohar, rising Delhi, 2006.34 Islam, Aynul M. use terrorist act Threats in Bangladesh. Bangladesh Institute of planetary and strategical Studies, Dhaka, April 2008. P. 165.35 The occasional Star, 18 June 2008.36 Islam, Aynul M. purpose terrorist act Threats in Bangladesh. Bangladesh Institute of internationalistic and strategic Studies, Dhaka, April 2008. P. 165.37 Hussain, Sakhawat M. talent create of equity Enforcement and intelligence information Agencies. Farooq Sobhan, ed, Counter act of terrorism in Bangladesh. University Press Limited, Dhaka, 2008, p. 70.38 Islam, Aynul M. affair Terrorism Threats in Bangladesh. Bangladesh Institute of transnational and strategical Studies, Dhaka, April 2008. P. 165.39 Islam, Aynul M. procedure Terrorism Threats in Bangladesh. Bangladesh Institute of global and strategic Studies, Dhaka, April 2008. P. 167-168.40 Islam, Aynul M. office Terrorism Threats in Bangladesh. B angladesh Institute of external and strategic Studies, Dhaka, April 2008. P. 167-168.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.