International Cooperation in Combating the Recruitment of "Ione Wolves" on Social Media
Al-Anbar University Journal For Humanities,
2020, Volume 2020, Issue 2, Pages 1-30
According to the large development in the use of social media sites and its wide spread among segments of society and large groups of people, especially young people, many extremist groups have used these sites to recruit terrorists and push them to carry out terrorist activities within their countries. This growing phenomenon is known as the phenomenon of lone wolves through social media sites.
Hence, this paper aims to identify and investigate the methods for global collaboration in a particular territory of cybersecurity, specifically countering the recruitment of lone wolves through social media sites.
As international regulation is still limited to the development of a set of rules, regulations and agreements against the recruitment of lone wolves. Indeed, this study, through using of analytical qualitative approach, concluded that the phenomenon of the recruitment of lone wolves is a transnational phenomenon that cannot be contained without creating agreed rules of international action; in order to combat the spread of this phenomenon through social networking sites.
The study also found out that the capabilities of many countriesin the field of combating the recruitment of lone wolves is relatively weak due to the weakness of the expertise and technological capabilities of cybersecurity in its security firms, which are usually expensive, complex and intertwined.
The study recommended the importance of establishing an "electronic army" by state and not only technical units, which is equipped with the latest technology and equipment and able to monitor SPAM and recruitment of terrorists.
- Esfandiary, D. (2015). ISIS: inside the army of terror. By Michael Weiss and Hassan Hassan and ISIS: the state of terror. By Jessica Stern and JM Berger.
- Feldman, M. (2013). Comparative lone wolf terrorism: Toward a heuristic definition. Democracy and Security, 9(3), 270-286.
- Holmer, G. (2013). Countering violent extremism: A peacebuilding perspective. US Institute of Peace.
- Spaaij, R. (2010). The enigma of lone wolf terrorism: An assessment. Studies in Conflict & Terrorism, 33(9), 854-870.
- Spaaij, R. (2011). Understanding lone wolf terrorism: Global patterns, motivations and prevention. Springer Science & Business Media.
- Teich, S. (2013). Trends and developments in lone wolf terrorism in the western world: An analysis of terrorist attacks and attempted attacks by Islamic extremists. International Institute for Counter-Terrorism
- The UN Global Counter-Terrorism Strategy Review. (2019). Retrieved 15 may, 2019. From http://cutt.us/9mQl1
- Vladimir Ivanovich Voronkov. (2018). Under-Secretary-General for Counter-Terrorism International Research-To-Practice Conference on Priorities of International Cooperation in Countering Extremism and Terrorism 3 April 2018, Moscow. Retrieved 15 may, 2019. From http://www.unrussia.ru/en/taxonomy/term/4/2018-04-05
1. International Telecommunication Union . Cybersecurity Guide for Developing Countries. Retrieved May 15, 2019 https://www.itu.int/dms_pub/itu-d/opb/str/d-str-secu-2007-msw-a.doc . (2007).
2. Amin, Amel. Confronting "lone wolves" The road from intellectual mechanisms to security and intelligence confrontations. Middle East. Retrieved May 15, 2019 http://cutt.us/jznpa .(2017).
3. Al-Bashari, Muhammad. (2017). Cyberterrorism and the Responsibility of the International Community. Union newspaper. Retrieved May 15, 2019 http://cutt.us/azTi5.
4. Albayan. The International Conference on the Criminalization of Cyberterrorism kicks off in Abu Dhabi today. Retrieved May 15, 2019 https://www.albayan.ae/across-the-uae/news-and-reports/2017-05-15-1.2947562
5. League of Arab States. (2014). At the Conference on "The Impact of Terrorism on Global Peace and Security" October 14-16, 2014.
6. Al-Hayat newspaper. Etidal: Social media facilitated the spread of 90 percent of extremist content. Retrieved May 15, 2019 from http://cutt.us/7deij
7. Hossam Mohamed. Recruitment of terrorists through social networking sites. Regained on May 15, 2019 from, http://www.carjj.org/sites/default/files/events/%D8%%
8. Al-Rasheed, Firas. Countering Cyber Terrorists. The upper link in the fight against terrorism. Naif Arab University for Security Sciences. (2012).
9. East Electronic. Fighting extremism and terrorism starts with social media. Retrieved May 15, 2019 http://cutt.us/VxuQJ .(2016).
10. Adel, Alaa. Lone Wolves: Operations and Coping Strategies. Retrieved May 15, 2019 http://cutt.us/cjx57 .
11. Alearabia. Security leaders chasing "lone wolves" on social media. Retrieved May 15, 2019 http://cutt.us/GrauH .
12. Alearabia. An international organization reveals how al-Qaradawi spread extremism online. Retrieved May 15, 2019 http://cutt.us/qSjfU .
13. Attia, Acer. The role of modern mechanisms to reduce new crimes and methods of confronting cyberterrorism. Conference on new crimes in light of regional and international changes and transformations for the period from 2-4, September, 2014.
14. Ali, Rushdie. Cybercrime International ThreatConfronting Cybercrime between the Budapest Convention and National Legislation, retrieved May 15, 2019 http://cutt.us/aCXl5
15. Taliqani, Ali. How are the centers of electronic terrorism destroyed?. Retrieved May 15, 2019 from
17. Olabi, Ibrahim. "Cyber Warfare". This is how the Gulf states fight terrorism electronically. Gulf Online. Retrieved May 15, 2019 http://cutt.us/LJKej
18. Fayed, Nora. The Role of Social Media in Recruiting Members of Terrorist Organizations: A Case Study of ISIS. Arab Democratic Center. Retrieved May 15, 2019 https://democraticac.de/?p=34268
19. Al-Arab Magazine. . Interpa Conference stresses international cooperation to counter the exploitation of social media in spreading terrorism. Retrieved May 15, 2019 http://cutt.us/sBRxF
20. Working Group on the Criminal Justice Sector and the Rule of Law. (2011). Rabat Memorandum on Good Practices for Effective Criminal Justice Sector Counter-Terrorism. Retrieved May 15, 2019 https://www.thegctf.org/Portals/1/Documents/Framework%20Documents/A/GCTF-Rabat-Memorandum-ARA.pdf
- Article View: 47
- PDF Download: 15