On November 6, 2011, a Filipino man with long hair uploaded a three-minute, twenty-second video on YouTube, the world’s second largest search engine. It was a video of himself, wearing a camouflage jacket and a mask covering his face and head...
Read MoreCTX Vol 2 No 4 - November 2012 - Global ECCO
COMBATING THREATS EXCHANGE
A Quarterly, Peer Reviewed Online Journal
Radical milieus have been described as specific social environments whose culture, narratives, and symbols shape both individuals and groups, and the social networks and relationships out of which those individuals and groups develop and emerge. Researcher Peter Waldmann and his co-authors attribute distinct and independent qualities to these environments, portraying them as social entities in their own right, that is, a collective of people sharing certain perspectives and a unitary identity: a “subculture” or a “community.”..
Read MoreMany security officials, policy analysts, and researchers are quick to identify the internet as a powerful terrorist recruiting tool that poses a growing security threat. Some worry that rapidly evolving technical capabilities offer terrorist groups a new strategic weapon with which to attack their enemies...
Read MoreIn December 2011, U.S. Homeland Security Secretary Janet Na-politano told an interviewer that the risk of attacks by so-called “lone wolves,” individuals with no apparent ties to known extremist networks or conspiracies, is on the rise, and is an indication that the global terrorist threat has shifted.1 Secretary Napolitano’s statement is a sobering assessment of the violent Islamist threat to the United States...
Read MoreSocial media hold out the promise of discovering previously unidentified threats, as well as the peril of information overload. It is pos-sible to utilize social media to find the unknown unknowns, those violent extremists who we can assume exist but whose identities are not currently known to us. It is also possible to triage social media profiles in order to identify those most likely to generate useful investigative leads...
Read MoreMuch of the recent writing within military circles surround-ing social media has centered on what can be learned from “bad guys’” use of social media sites, or the role social media played (and play) in events such as the Arab Spring and Haiti disaster relief. However, from an information operations perspective, the “golden ticket” in our operations is the ability to influence behavior and attitudes. The questions we address in this article are: “Can an information operator use social media to influence audiences, and if so, how?”
Read MoreIn this article we draw on social movement theory to help explain how the use of social media, in particular Twitter feeds, may have played a role in the emergence of the Egyptian Arab Spring revolution. More precisely, we suggest that activists’ uses of Twitter may have facilitated the framing of grievances in ways that resonated with their target audience.
Read MoreIn today’s military, the word “professional” has become a catch-all for anything good or worthy of praise. You’ll hear it used by a commander who, one suspects, is simply reaching for something—anything—positive to say...
Read MoreThe spectacular growth in social media over the last decade, led by Facebook, YouTube, and Twitter, and their potential usefulness have not been lost on insurgents and others using what we call dark networks.3Over the last few years, such groups have increasingly turned to social media to communicate with and motivate their followers and supporters.
Read MoreIn the 2007 movie, L’ennemi Intime (Intimate Enemies), a cinematic tour de force of the French-Algerian War, some soldiers in a French company are ordered to take a fellagha, a captured insurgent out for a “walk in the woods” and dispose of him. During this walk, Saïd, a Harki (an Algerian fighting on the French side) in the company strikes up a conversation with the fellagha.,,
Read MoreThis journal is not an official DoD publication. The views expressed or implied within are those of the contributors and do not necessarily reflect the views of any governmental or nongovernmental organization or agency of the United States of America or any other country.
TERMS OF COPYRIGHT
Copyright © 2023 by the author(s), except where otherwise noted. The Combating Threats Exchange journal (CTX) is a peer-reviewed, quarterly journal available free of charge to individuals and institutions. Copies of this journal and the articles contained herein may be printed or downloaded and redistributed for personal, research, or educational purposes free of charge and without permission, except if otherwise noted. Any commercial use of CTX or the articles published herein is expressly prohibited without the written consent of the copyright holder. The copyright of all articles published herein rests with the author(s) of the article, unless otherwise noted.
EDITORIAL STAFF
- ELIZABETH SKINNER, Editor
- ELIZABETH ROBINSON, Copy Editor
- SALLY BAHO, Copy Editor
- LAYOUT AND DESIGN, Graduate Education Advancement Center, Naval Postgraduate School
EDITORIAL REVIEW BOARD
- VICTOR ASAL, University of Albany SUNY
- CHRIS HARMON, Marine Corps University
- TROELS HENNINGSEN, Royal Danish Defense College
- PETER MCCABE, Joint Special Operations University
- RAJAN RAVINDRAN, Indian Army (Ret.)
- IAN C. RICE, US Army (Ret.)
- ANNA SIMONS, Naval Postgraduate School
- SHYAMSUNDER TEKWANI, Asia-Pacific Center for Security Studies
- CRAIG WHITESIDE, Naval War College