18 Jun 2022

54

Jihadi Recruitment of Westerners

Format: APA

Academic level: College

Paper type: Essay (Any Type)

Words: 1046

Pages: 3

Downloads: 0

The Western world has been the target of terrorist attacks for years. Terrorist groups such as Al-Qaeda have had some success in their efforts to infiltrate Western countries and carry out attacks. While these attacks have had devastating impacts, they have provided Western nations with valuable lessons for enhancing security. The terrorist groups are encountering hurdles in their efforts to launch attacks. This has forced them to rethink their strategy and techniques. The groups are now setting their sights on Western nationals whom they recruit, train and instruct to return to their countries to carry out attacks (Gilluffo, Cozzens & Ranstorp, 2010). This new strategy is presents a new challenge for security forces in the Western world and more must be done to counter it.

Methods and techniques used by terrorist groups 

In an effort to swell their numbers and improve their chances of successfully attacking Western targets, the terrorist groups employ a number of methods and techniques. Social media is among these methods (Gates & Podder, 2015). Such groups as the Islamic State are reported to appeal to potential recruits through social media platforms like Twitter and WhatsApp. The anonymity that social media offers makes this method particularly effective. Furthermore, thanks to social media, the terrorist groups are able to tailor their messages to the profile of individual targets. Social media has proved useful in the targeting, selection and introduction of recruits to the world of terrorism.

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

While social media is an important tool, it is not the only one that the terrorist groups rely on for recruitment. Traditional methods are also used. These methods include using clerics and religious facilities. In such countries as the UK, Muslim clerics have been accused of radicalizing young Muslims and encouraging them to take up arms against their own countries (Malik & Laville, 2014). In their recruitment messages, the terrorist groups highlight the ‘injustices’ that the Western countries have perpetrated against Muslim communities. This message is effective in encouraging vulnerable and disillusioned young minds to join the efforts of these groups (Gilluffo, Cozzens & Ranstorp, 2010). Terrorist groups are also known to use handlers and contacts in the Western world. These individuals are charged with the mandate of identifying and recruiting Westerners to join their cause.

Vulnerability of the US and the West 

The US and the wider Western world have established robust measures aimed at tackling terrorism. However, despite these measures, Western countries remain exposed to the threat of home-grown terrorism. What makes the West vulnerable is the difficulty in monitoring online activity. As already noted, terrorist groups have embraced social media as part of their recruitment efforts. It is nearly impossible for intelligence and law enforcement agencies in the West to inspect all activities that occur in the digital world (“The Guardian View”, 2017). Furthermore, such social media platforms as WhatsApp have implemented encryption technologies that make it impossible for the agencies to read messages.

Another issue that makes the US and the West vulnerable to home-grown terrorism are the religious freedom principles on which these countries are based. The West has championed for religious freedom staunchly. This means that all people in the Western world are permitted to practice their religion without any restrictions. The strong belief in religious freedom makes it difficult for law enforcement and intelligence services to monitor or raid mosques. It is therefore difficult to ensure that clerics do not radicalize their congregations. When campaigning to become US President, Donald Trump vowed to monitor mosques. This announcement was met with strong criticism. The backlash suggests that Western ideals and values expose the West to the threat of home-grown terrorism.

Value analysis and vulnerability assessment in target selection 

When selecting the targets to attack, terrorist groups conduct value analysis and vulnerability assessment. Value analysis involves evaluating targets to determine what the impact of an attack will be. Terrorist groups often target facilities that promise high casualty figures (MI5, n.d). These facilities include public buildings and transport networks. However, even as they target facilities that promise maximum impact, the groups must ensure that they do not go overboard. For example, targeting children and other vulnerable groups may see the group lose the support of their core base. Value analysis is also used to make a political statement. The groups may target government buildings to remind the government that the groups possess the capacity to cause damage to facilities that are well guarded.

Vulnerability assessment is another component of the target selection process. Basically, vulnerability assessment involves examining if there are any security loopholes in the target (Apostolakis & Lemon, 2005). The terrorist groups use vulnerability assessment to determine the level of resistance that they may expect. For example, public buildings are usually well guarded. This makes them poor targets. The groups may focus their efforts on less guarded facilities such as public transport systems. Vulnerability assessment is also used to determine the effectiveness of the methods that the terrorist group intends to employ. For instance, it would be unwise to use guns in an area with low numbers of potential victims. Gun would be more appropriate and effective in targets that host large numbers of people.

Boyd loop 

While it is difficult to intercept terrorist attackers before they launch an attack, various methods for identifying them are available. The Boyd loop is among the approaches that law enforcement and intelligence services may use to identify and intercept attackers. Essentially, the Boyd loop outlines how individuals respond to stimuli. The first part of the response process involves observing an event. Orienting oneself to the event is the second part. After orientation, an individual then makes a decision. The last step of the process is taking action. The Boyd loop can be integrated into counter-terrorism efforts. It has been suggested that law enforcement agencies can use it as part of simulation exercises (Tajwer & Shamsi, 2012). Agents can be involved in simulation exercises where terrorist groups are planning an attack. These exercises equip the agents with the skills and attitudes that they need to intercept the attack before it occurs.

In conclusion, terrorism remains a serious challenge for the United States and the larger Western world. Terrorist groups are refining their techniques and coming up with new ones. They have recognized that traditional approaches are no longer effective and cannot be relied on. They have been forced to focus their efforts on recruiting Westerners. Hundreds of Westerners have abandoned the comfort of their home countries and moved to conflict zones. The Westerners pose a grave threat to the Western world. Intelligence and law enforcement agencies must revamp their efforts to keep their countries safe.

References

Apostolakis, G. E. & Lemon, D. M. (2005). A Screening Methodology for the Identification and

Ranking of Infrastructure Vulnerabilities due to Terrorism. Risk Analysis, 25 (2), 361-376.

Gates, S. & Podder, S. (2015). Social Media, Recruitment, Allegiance and the Islamic State.

Perspectives on Terrorism, 9 (4), 107-115.

Gilluffo, F. J., Cozzens, J. B. & Ranstorp, M. (2010).Foreign Fighters. Trends, Trajectories & 

Conflict Zones. Retrieved 17 th July 2017 from

https://cchs.gwu.edu/sites/cchs.gwu.edu/files/downloads/HSPI_Report_16.pdf 

Malik, S. & Laville, S. (2014). Islamic Recruitment moves from Online Networks to British 

Mosques. Retrieved 17 th July 2017 from https://www.theguardian.com/world/2014/sep/05/isis-recruitment-moves-to-radical-network-and-mosques 

MI5. (n.d). Terrorist Targets. Retrieved 17 th July 2017 from

https://www.mi5.gov.uk/terrorist-targets 

Tajwer, K. & Shamsi, J. (2012). Counter-terrorism Simulation Framework. System 

Engineering and Technology (ICSET) 2012 International Conference, 1-7.

The Guardian View on Counter-Terrorism: Strong Encryption makes us all Safer. (2017).

Retrieved 17 th July 2017 from https://www.theguardian.com/commentisfree/2017/mar/27/the-guardian-view-on-counter-terrorism-strong-encryption-makes-us-all-safer 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 15). Jihadi Recruitment of Westerners.
https://studybounty.com/jihadi-recruitment-of-westerners-essay

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

Climate Change Pattern around the World

Running head: CLIMATE CHANGE PATTERN AROUND THE WORLD 1 Climate Change Pattern around the World Name Institutional Affiliation Climate Change Pattern around the World It is now an accepted fact that the world’s...

Words: 690

Pages: 2

Views: 93

Autism Myths: Debunking the Misconceptions

The patient portal is a 24-hour internet application that the patients use to access their personal health information. The first patient’s website was established in 1998 but the patient portal was rolled out in...

Words: 1480

Pages: 5

Views: 155

Pros and Cons of Cancer Treatment

The project is about the pros and cons associated with the treatment of cancer patients. Patients who have cancer may benefit from the advantages of cancer treatment and suffer the consequences of the treatment...

Words: 359

Pages: 1

Views: 453

Human Mitochondrial DNA: Functions, Mutation, and Inheritance

2 Summary of Three Papers Human mitochondria DNA is characterized by circular double-stranded molecules that are separable through the process of configuration density. The comprehension of the various roles and...

Words: 1377

Pages: 5

Views: 135

What is Team Learning?

Teamwork is becoming paramount in organizations to achieve their objectives, but there are concerns that collaboration may limit individuals from reaching their career goals. Most teams are based on ensuring that a...

Words: 408

Pages: 1

Views: 200

What is Gentrification? Causes, Effects & Solutions

Gentrification refers to the conversation of farm buildings to dwelling places. The wealthy people mostly do gentrification by moving in from the outside community leading to the rise of the socio- economic status of...

Words: 293

Pages: 1

Views: 126

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration