Click here to load reader
Upload
aclufan
View
214
Download
0
Embed Size (px)
Citation preview
BACKGRO UN""D (U)
(TS!/SV/REL TO USA, FVEY) A previous SIGINT assessment report on radicalization indica ted that radicalizers appear to be particularly
vulnerab le in the area of authority when their private and public beh aviors are not c.onsistent. (A) Some of the vulnerabilities, if e.xp ose.d, would likely
call into question a radicalizer's devotion to tlie jiliadist cause, leading.!o tlie de.gradation or loss of his authority. Examples of some of these
vulnerabilities include:
• Viewing se.xually e.xplicit material ouline. or using se.xually explicit p ersuasive language when commwlicating 1\~th inexperienced voung girls;
• Using a p ortion of the donations they are receiving from the susceptib le p ool to defray their own p ersonal exp enses;
• Charging an exorbitant amount of money for their speaking fees and b eing singularly attracted b y opp ortwlities to increase their stature; or • Being known to b ase their public messaging on questionable sources or using language that is contradictory in nature, leaving them op en to
credib ility challenges.
(TS!/SV/REL TO USA, FVEY) Issues of trust and reputation are important when considering the validity and appeal of the message. It stands
to reason that exploiting vulnerabilities of character, credib ility, or b oth, of the radic.alizer and his message could be enhanced b y an understanding of
the vehicles he uses to disseminate his message to the susceptib le pool of p eop le and where he is vulnerable in terms of access.
(TSI/Sl!IREL TO USA, FVEY/FISA) The third chart includes the radic.alizers' preswned areas of authority, countries of resonance, and vulnerabilities as reported and docwnented in 3/RAJ50 1518 - 12 2020 172 JUN 12, "Terrorism/Islamic Radicalization: Global Radicalizers Vulnerab le in Terms of Authority."
(TS//Sl!IREL TO USA, FVEY/FISA)
-------------+-------------+-------------+-------------+------------RADICALI ZERS !AUTHORITY
I I
IARGUl-!ENT I I
!COUNTRIES JWITH HIGHEST !RESONANCE
JVULNERAEILIJTIES I
-------------+-------------+-------------+-------------+------------I Impr i s oned JNon- Huslims ! - Online I f or incit ing Jare a t hrea t I pr omis c uit y I hatred It o I s l am 1- Hay
name I a g a inst I I misdi rec t redacted lnon- Hus lims I identifying I donat ions
I I information 1- Desi re t o I I redacted !stay out I I Jo f j ail I I I results in I I I incons i stent
I I I a r gume nts
-------------+-------------+-------------+-------------+------------!Respected I Offens ive 1- Online I ac ademic, I jihad i s I pr omis c uit y
name I pr omotes I j usti f i ed 1- Publis hes identifying redacted Ja l - Qai' da I information I articles
I (AQ) I redacted I'Hit hout !pr opaganda I I che c king I I I f ac ts
-------------+-------------+-------------+-------------+------------
name redacted
I Well- knoTNn I cleric,
!Killing o f Jnon- Hus lim
1- Di sagrees l wit h AQ on
1 e xtremist 1 occupiers i s identifying 1 s ome i ssues I f ina ncier, I just i f i ed information I (e. g . I a nd a l - I redacted I targeting JQa i' da 1 !civilia n s ) ! s upporter 1 ! - Pragmatic I I I on "Arab I I I Spr ing"
-------------+-------------+-------------+-------------+------------
name redacted
I Wr i t ings Ja ppear on I numerous 1 jihadi J;ue bs i tes
IThe u.s . ! - Dec e i tful Jbrought t he 1use o f 19/11 attac ks identifying 1 f unds 1 upon i tsel f information 1- Potent i a l I redacted I f or I Jcontradic-1 I t or y I l stateme nts
-------------+-------------+-------------+-------------+------------I Well- knoTNn I Preaches ! - Charges
name I cleric, I int ole r a nce I e xor bitant I famou s f or I f or a ll identifying Js peaking
redacted I hostilit y Jnon- Sunni information I fees 1 t OTNard s JHus lims redacted ! - Attrac ted Jnon- Sunni I I t o fame JHus lims I I
-------------+-------------+-------------+-------------+------------
name redacted
!Well- known JThe U. S . ! - Glamor ous Jrnedi a Jperpetrated !lifestyle 1 c e l e b r i t y 1 t he 9/11 identifying 1- His inter-1 !attac ks Jprets information I I redacted JQu r ' a n I I ! - Possibly I I !mis dire c ts I I ! donations
-------------+-------------+-------------+-------------+------------
____ ..:...._ ____ fi Distribution for 3/00/ 532318-12- Google Chrome - CJ
l Cl about:blank
~ FM DIRNSA TO NSNTANGO ZULU COS KINGSTON
Originator COS PORT OF SPAIN
DIRNSA ZEN/ATF ZEN/CMRCE DEPT
Serial ZEN/CUSTOMS
3/00/532318-12 ZEN/DEA ZEN/OIA (DHS)
Report Date ZEN/DIA (JITF-CT)
03 October 20 12 ZEN/FAA ZEN/INTERIOR
~~~o Got ·nus R!:QortV ZEN/J/STF J2/J39 ZEN/JOINT STAFF
DisQlav in Original F onnat ZEN/JUSTICE ZEN/NRC
DisQlav in XML F omtat ZEN/SECHOME CIPD ZEN/TRANSP DEPT
Email a Cow ofThis Rwort ZEN/USTR
. ' r.: A. I:
PREFACE (U)
(TS!/S!!IREL TO USA, FVEY/FISA) This SIGINT assessment examines access as one element in the process oflslamic radicalization in order
to identify vulnerab ilities. Using six prominent, globally-resonating foreign radic.alizers as exemplars, this report focuses on the means they use to
reach their intended audience and reveals potential vulnerabilities for exploit ation. It should be read in conjunc.tion with N SA report 3/RA'50 1518-
12 , which identifies vulnerabilities of authority.
(TS!/S!!IREL TO USA, FVEY) Information herein is based largely on Sunni extremist communications and includes disseminated SIGI:l\l'f as
well as collateral available between January 2008 and September 20 12. The SIGI:l\l'f infonnation is from primary sources with direct access and is
generally considered reliab le . Greater specificity on the SIGI:l\l'f sourcing is. provided in the text . Included in the appendix are charts on ways that
access has been affected and countermeasures taken; a comparison of radic.alizers' access mechanisms; and a matrix that compares their authority,
argument, countries where they resonate, and their personal vulnerab ilities.
(TS//SVIREL TO USA, FVEY) Examining how the six radic.alizers establish and maintain access with different pools of people susceptible to
their message -- and their perceptions of the difficulties in doing so -- suggests that there are vulnerab ilities that can be exploited in terms of this
access, and em er ging radicalizers may be vulnerable on tllis point as well. Focusing on access reveals potential vulnerabilities that could be even
more effectively exploited when used in combination with vulnerabilities off character or credibility, or both, of the message in order to shape the
perception of the messen ger as well as that of his followers.
(TS!/SVIREL TO USA, FVEY/F ISA) Six globally-resonating, radicalizers are used as exemplars in this assessment. The first three listed target
an English-speaking audience, while the second three target an Arabic-speaking audience.
0
0
0
0 names redacted 0
0
(TS!/SVIREL TO USA, FVEY/F ISA) One indicator of the potential effectiveness of these radicalizers is the extent of their resonanc.e, i.e ., the
number and locations of individuals who respond to a radicalizer' s message b y contacting him using his pub licly-known c.ontact information . A
significant proportion of the audience associated with the specified English-language radic.alizers is located in Pakistan, yet none of these radic.alizers
appear to have any commwlic.ants in common. In addition, commwlications profiles of these English-language radicalizers reveal that very few of the
contacts noted were associated with terrorism. suggesting that the target audience includes incfu1duals who do not yet hold extremist views but who
are. susc~tible to the extremist message.