Violent Islamist Extremism, the Internet, and the Homegrown Terrorist Threat

reportActive / Technical Report | Accession Number: ADA482218 | Open PDF

Abstract:

This is the first in a series of reports by the Majority and Minority staff of the Senate Committee on Homeland Security and Governmental Affairs on the threat of homegrown terrorism inspired by violent Islamist extremism. The Committee initiated an investigation into this threat during the 109th Congress. The first hearing on the homegrown threat considered the potential for radicalization in U.S. prisons. During the 110th Congress, the Committee has held five more hearings exploring a range of subjects. This report concerns one of these subjects how violent Islamist terrorist groups like al-Qaeda are using the Internet to enlist followers into the global violent Islamist terrorist movement and increase support for the movement, from ideological support, to fundraising, and planning and executing terrorist attacks. In the second section of the report, the authors examine the increasing number of homegrown incidents and the judgments of the intelligence and law enforcement communities that there will likely be additional homegrown threats in the future. The third section explores the four-step radicalization process through which an individual can be enticed to adopt a violent Islamist extremist mindset and act on the ideologys call to violence. Section four identifies the disturbingly broad array of materials available on the Internet that promote the violent Islamist extremist ideology. The availability of these resources is part of a comprehensive, tightly controlled messaging campaign by al-Qaeda and like-minded extremists designed to spread their violent message. The fifth section of the report examines how these materials facilitate and encourage the radicalization process. Finally, the report assesses the Federal Governments response to the spread of the violent Islamist message on the Internet and concludes that there is no cohesive and comprehensive outreach and communications strategy in place to confront this threat.

Security Markings

DOCUMENT & CONTEXTUAL SUMMARY

Distribution:
Approved For Public Release
Distribution Statement:
Approved For Public Release; Distribution Is Unlimited.

RECORD

Collection: TR
Identifying Numbers
Subject Terms