Countering Online Radicalisation

Anne Gerdes, Ph.D.


In 2008 militant violent jihad web sites were shot down by international authorities, as part of the “war on terror” strategy. But fighting dedicated jihadist websites and forums is not sufficient in order to dam up for online radicalisation. As a consequence of the international banning strategy towards militant homepages, al-Qaeda and jihadist Internet Brigades have increased their presence on global social networking platforms, like YouTube and Facebook. Contrary to an ordinary Web forum, which grows into a mature community by passing through certain developmental stages in establishing critical mass of users and content; Facebook provides a full blown community of friends, in which new groups can easily launch their ideas and foster engagement among friends and related networks of friends. Apart from offering an easy set up framework for groups, Facebook also facilitates a new type of mass interpersonal persuasion, which might sustain radicalisation (Fogg, 2008). Likewise, YouTube provides an accessible platform, motivating participants to contribute by uploading videos or making comments.

Thus, the spread of jihad-promoting content continues, and more over, it now reaches a broader audience besides sworn followers (CTA: Center for Terror Analysis. The Danish Security Intelligence Service, 2010, p. 3), (Bermingham, Conway, McInerney, O’Hare & Smeaton, 2009). Furthermore, the banning-strategy of violent jihad Websites has advanced the transfer of the jihadist online movement, from static Web 1.0 use of the internet – which relay on one-way, typically top-down, communication, focusing on passive acquisition of information – into Web 2.0 use modes, characterized by participation via bottom-up activities and many-to-many communication, in which participants take part in the construction of vivid communities.

In a forthcoming book, Investigating Cyber Law and Cyber Ethics: Issues, Impacts and Practices, edited by Dudley, Braman and Vincenti, I contribute with a chapter called: “Al-Qaeda on Web 2.0 – Radicalisation and Recruitment Strategies” (Gerdes, 2011). Here, I discuss the al-Qaeda Web and media strategy. A strategy, which makes them stand out from other extremist groups, who in most cases lack an overall approach towards branding and Web communication. Consequently, I illustrate the impact of the al-Qaeda media strategy, which enables al-Qaeda to set the agenda for online global jihadism and cultivate virtual communities of engaged jihobbyists (a term coined by Jarret Brachman: Brachman, 2008, p. 19). Thus, I mainly address issues of radicalisation and recruitment by emphasizing how strategic use of Web 2.0 tools scaffolds jihadist activities. In this paper, I set out to discuss prototypical strategies for fighting online jihadist radicalisation (in the form of top-down controlled strategies versus bottom-up user driven strategies). First, al-Qaeda as a global online social movement is described, stressing their professional media strategy, which enables al-Qaeda to enhance processes of self-radicalisation among young people with extremist attitudes. Within this context, I analyse different strategies for breaking the circle of radicalisation and introduce ethical reflections (Macintyre, 1999, 2000, Løgstrup, 1997, Benkler & Nissenbaum 2006) in order to discuss the potentials of these initiatives.


Ansar Al-Mujahideen Network (2010). Retrieved August 16, 2010, from

Anscombe, E. (1958). Modern Moral Philosophy. Philosophy vol. 33, 1-19.

Bermingham, A., Conway, M., McInerney, L., O’Hare, N. & Smeaton, A. F. (2009). Combining Social Network Analysis and Sentiment Analysis to Explore the Potential for Online Radicalisation. Retrieved August 16, 2010, from

Brachman, J. (2008). Global Jihadism: Theory and Practice. Routledge Press.

Cool, S. & Glasser, S. B. (2005). Terrorists turn to the Web as a base of operation. Washington Post, 7 August, 2005.

Conway, M. & McInerney, L. (2008). Jihadi Video & Auto-Radicalisation: Evidence from an Exploratory YouTube Study. Retrieved August 16, 2010, from

CTA: Center for Terror Analysis. The Danish Security Intelligence Service, 2010 (2010). og – de nye radikaliseringsværktøjer? PET, Center for Terroranalyse. Retrieved August 16, 2010, from

Fogg, B.J. (2003). Persuasive Technology – Using Computers to Change What We Think and do. San Francisco: Morgan Kaufmann.

Fogg, B.J. (2008). Mass Interpersonal Persuasion: An Early View of a New Phenomenon. In H. O Kukkonen, P. Hasle, M.H.K. Segerståhl, P. Øhrstrøm (Eds.), Proceedings of the 3rd international conference on Persuasive Technology. Oulu, Finland. (pp. 23-35). Berlin: Springer-Verlag.

Foot, P. (1978). Virtues and Vices. In S. Darwall (ed.), Virtue Ethics. Oxford: Blackwell 2003.

Gerdes, A. (2011). Forthcoming: Al-Qaeda on Web 2.0 – Radicalisation and Recruitment Strategies. In: (ed.): A. Dudley, J. Braman, G. Vincenti, Investigating Cyber Law and Cyber Ethics: Issues, Impacts and Practices. Hersey: IGI Global.

MI5 Security Service. (2010). Al Qaida’s Structure. Retrieved August 16, 2010, from

O’Reilly, T. (2005). What is Web 2.0 Design patterns and business models for the next generation of software. Retrieved August 16, 2010, from

Seib; P., H. (2008). The Al-Qaeda Media Machine. Military Review, May-June 2008, 74-80.

Shactman, N. (2008). Online Jihadists plan to invade Facebook. Retrieved August 16, 2010, from,

The Danish Counterterrorism Research Lab (2010). Retrieved August 16, 2010 from,

Weingberg, L., Perliger, A. (2010). How Terrorist Groups End. CTC Sentinel, February 2010, vol. 3(2), 16-18.