7

Click here to load reader

Programs to Discredit Radicals Through Use of Online Sexual Activity

  • Upload
    aclufan

  • View
    214

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Programs to Discredit Radicals Through Use of Online Sexual Activity

BACKGRO UN""D (U)

(TS!/SV/REL TO USA, FVEY) A previous SIGINT assessment report on radicalization indica ted that radicalizers appear to be particularly

vulnerab le in the area of authority when their private and public beh aviors are not c.onsistent. (A) Some of the vulnerabilities, if e.xp ose.d, would likely

call into question a radicalizer's devotion to tlie jiliadist cause, leading.!o tlie de.gradation or loss of his authority. Examples of some of these

vulnerabilities include:

• Viewing se.xually e.xplicit material ouline. or using se.xually explicit p ersuasive language when commwlicating 1\~th inexperienced voung girls;

• Using a p ortion of the donations they are receiving from the susceptib le p ool to defray their own p ersonal exp enses;

• Charging an exorbitant amount of money for their speaking fees and b eing singularly attracted b y opp ortwlities to increase their stature; or • Being known to b ase their public messaging on questionable sources or using language that is contradictory in nature, leaving them op en to

credib ility challenges.

(TS!/SV/REL TO USA, FVEY) Issues of trust and reputation are important when considering the validity and appeal of the message. It stands

to reason that exploiting vulnerabilities of character, credib ility, or b oth, of the radic.alizer and his message could be enhanced b y an understanding of

the vehicles he uses to disseminate his message to the susceptib le pool of p eop le and where he is vulnerable in terms of access.

Page 2: Programs to Discredit Radicals Through Use of Online Sexual Activity

(TSI/Sl!IREL TO USA, FVEY/FISA) The third chart includes the radic.alizers' preswned areas of authority, countries of resonance, and vulnerabilities as reported and docwnented in 3/RAJ50 1518 - 12 2020 172 JUN 12, "Terrorism/Islamic Radicalization: Global Radicalizers Vulnerab le in Terms of Authority."

(TS//Sl!IREL TO USA, FVEY/FISA)

-------------+-------------+-------------+-------------+------------RADICALI ZERS !AUTHORITY

I I

IARGUl-!ENT I I

!COUNTRIES JWITH HIGHEST !RESONANCE

JVULNERAEILI­JTIES I

-------------+-------------+-------------+-------------+------------I Impr i s oned JNon- Huslims ! - Online I f or incit ing Jare a t hrea t I pr omis c uit y I hatred It o I s l am 1- Hay

name I a g a inst I I misdi rec t redacted lnon- Hus lims I identifying I donat ions

I I information 1- Desi re t o I I redacted !stay out I I Jo f j ail I I I results in I I I incons i stent

I I I a r gume nts

-------------+-------------+-------------+-------------+------------!Respected I Offens ive 1- Online I ac ademic, I jihad i s I pr omis c uit y

name I pr omotes I j usti f i ed 1- Publis hes identifying redacted Ja l - Qai' da I information I articles

I (AQ) I redacted I'Hit hout !pr opaganda I I che c king I I I f ac ts

-------------+-------------+-------------+-------------+------------

Page 3: Programs to Discredit Radicals Through Use of Online Sexual Activity

name redacted

I Well- knoTNn I cleric,

!Killing o f Jnon- Hus lim

1- Di sagrees l wit h AQ on

1 e xtremist 1 occupiers i s identifying 1 s ome i ssues I f ina ncier, I just i f i ed information I (e. g . I a nd a l - I redacted I targeting JQa i' da 1 !civilia n s ) ! s upporter 1 ! - Pragmatic I I I on "Arab I I I Spr ing"

-------------+-------------+-------------+-------------+------------

name redacted

I Wr i t ings Ja ppear on I numerous 1 jihadi J;ue bs i tes

IThe u.s . ! - Dec e i tful Jbrought t he 1use o f 19/11 attac ks identifying 1 f unds 1 upon i tsel f information 1- Potent i a l I redacted I f or I Jcontradic-1 I t or y I l stateme nts

-------------+-------------+-------------+-------------+------------I Well- knoTNn I Preaches ! - Charges

name I cleric, I int ole r a nce I e xor bitant I famou s f or I f or a ll identifying Js peaking

redacted I hostilit y Jnon- Sunni information I fees 1 t OTNard s JHus lims redacted ! - Attrac ted Jnon- Sunni I I t o fame JHus lims I I

-------------+-------------+-------------+-------------+------------

name redacted

!Well- known JThe U. S . ! - Glamor ous Jrnedi a Jperpetrated !lifestyle 1 c e l e b r i t y 1 t he 9/11 identifying 1- His inter-1 !attac ks Jprets information I I redacted JQu r ' a n I I ! - Possibly I I !mis dire c ts I I ! donations

-------------+-------------+-------------+-------------+------------

Page 4: Programs to Discredit Radicals Through Use of Online Sexual Activity

____ ..:...._ ____ fi Distribution for 3/00/ 532318-12- Google Chrome - CJ

l Cl about:blank

~ FM DIRNSA TO NSNTANGO ZULU COS KINGSTON

Originator COS PORT OF SPAIN

DIRNSA ZEN/ATF ZEN/CMRCE DEPT

Serial ZEN/CUSTOMS

3/00/532318-12 ZEN/DEA ZEN/OIA (DHS)

Report Date ZEN/DIA (JITF-CT)

03 October 20 12 ZEN/FAA ZEN/INTERIOR

~~~o Got ·nus R!:QortV ZEN/J/STF J2/J39 ZEN/JOINT STAFF

DisQlav in Original F onnat ZEN/JUSTICE ZEN/NRC

DisQlav in XML F omtat ZEN/SECHOME CIPD ZEN/TRANSP DEPT

Email a Cow ofThis Rwort ZEN/USTR

. ' r.: A. I:

Page 5: Programs to Discredit Radicals Through Use of Online Sexual Activity

PREFACE (U)

(TS!/S!!IREL TO USA, FVEY/FISA) This SIGINT assessment examines access as one element in the process oflslamic radicalization in order

to identify vulnerab ilities. Using six prominent, globally-resonating foreign radic.alizers as exemplars, this report focuses on the means they use to

reach their intended audience and reveals potential vulnerabilities for exploit ation. It should be read in conjunc.tion with N SA report 3/RA'50 1518-

12 , which identifies vulnerabilities of authority.

(TS!/S!!IREL TO USA, FVEY) Information herein is based largely on Sunni extremist communications and includes disseminated SIGI:l\l'f as

well as collateral available between January 2008 and September 20 12. The SIGI:l\l'f infonnation is from primary sources with direct access and is

generally considered reliab le . Greater specificity on the SIGI:l\l'f sourcing is. provided in the text . Included in the appendix are charts on ways that

access has been affected and countermeasures taken; a comparison of radic.alizers' access mechanisms; and a matrix that compares their authority,

argument, countries where they resonate, and their personal vulnerab ilities.

Page 6: Programs to Discredit Radicals Through Use of Online Sexual Activity

(TS//SVIREL TO USA, FVEY) Examining how the six radic.alizers establish and maintain access with different pools of people susceptible to

their message -- and their perceptions of the difficulties in doing so -- suggests that there are vulnerab ilities that can be exploited in terms of this

access, and em er ging radicalizers may be vulnerable on tllis point as well. Focusing on access reveals potential vulnerabilities that could be even

more effectively exploited when used in combination with vulnerabilities off character or credibility, or both, of the message in order to shape the

perception of the messen ger as well as that of his followers.

Page 7: Programs to Discredit Radicals Through Use of Online Sexual Activity

(TS!/SVIREL TO USA, FVEY/F ISA) Six globally-resonating, radicalizers are used as exemplars in this assessment. The first three listed target

an English-speaking audience, while the second three target an Arabic-speaking audience.

0

0

0

0 names redacted 0

0

(TS!/SVIREL TO USA, FVEY/F ISA) One indicator of the potential effectiveness of these radicalizers is the extent of their resonanc.e, i.e ., the

number and locations of individuals who respond to a radicalizer' s message b y contacting him using his pub licly-known c.ontact information . A

significant proportion of the audience associated with the specified English-language radic.alizers is located in Pakistan, yet none of these radic.alizers

appear to have any commwlic.ants in common. In addition, commwlications profiles of these English-language radicalizers reveal that very few of the

contacts noted were associated with terrorism. suggesting that the target audience includes incfu1duals who do not yet hold extremist views but who

are. susc~tible to the extremist message.