Page 18 - Cyber Terrorism and Extremism as Threat to Critical Infrastructure Protection
P. 18

SECTION I:  EXTREMISM, RADICALIZATION AND CYBER THREATS AS AN IMPORTANT
               SECURITY FACTORS FOR COUNTERING TERRORISM PROCESSES

        may explain the rise in European knife attacks, as well as those using vehicles to run over
        pedestrians (Brzuszkiewicz, 2018).

        Similarly, diplomatic channels provide invaluable sounding boards for the potency of inter-
        ventions on audiences abroad, and individuals outside domestic boundaries but potentially
        shaping attitudes and opinions of those ripe for terrorist group recruitment at home. These
        channels, however, are also limited in their ability to extend findings beyond a small circle.

        Looking wider, threat finance trends serve as important benchmarks for the potential of action
        and organizational legitimacy, as does an increase/decrease in incidents of contact or related
        activities within a social network of analysis. Once more, even these finance-based data points
        are – at best – correlated to extremist potential, not action.

        Critiques of the above are not intended to discredit efforts, but rather to highlight a glar-
        ing oversight in current approaches. Despite a seeming abundance of resources, interest and
        collected data intended to tackle the jihadi violent extremism problem in Europe, the conti-
        nent remains wedded to solutions founded in data points and/or counter-narratives. Europe
        is anything but alone in this mindset; machine learning and artificial intelligence expenditure
        across the globe is rapidly on the rise (Columbus, 2019). For this problem, this expenditure,
        by increasing computational power, is intended to maximize data prediction towards lower-
        ing future violent extremist instances and the associated risks. In doing so, however, they also
        ignore what lies behind the numbers. Bigger and faster does not equate to better or smarter.



        5  Marketing Counter-Radicalization

        Marketing researchers continue to explore ways to best create and disseminate persuasive
        message campaigns capable of eliciting the strongest attitudes and opinions about products,
        services and ideas in niche audiences. The internet, of course, has only increased the potential
        of marketing campaigns. Nearly every form of online interaction and communication is now
        tracked, mapped, and sorted into assessable audience and individual patterns.

        Despite countless everyday instances of marketing campaign success, there is surprisingly
        limited, if any, application of these concepts to counter-radicalization. This is a glaring over-
        sight, as jihadi extremists – if Brzuszkiewicz’ (2018) explanation of a two-pronged grievance
        schema is an accurate picture of the sentiment landscape – should be prime candidates for
        marketing-driven campaigns emphasizing non-violent alternatives.

        5.1 Nets for Trust

        For example, in their analysis of the Ukranian banking industry, Kuznetsova et al. (2019)
        devised a four-stage marketing model to address the Ukranian population’s lack of trust in
        this sector. The model – which they termed ‘nets for trust’ – is based on principles derived
        from the ‘boiling frog effect’ (Hoffman, 2003) which, as its name suggests, describes how to
        successfully boil a living frog. If the frog is suddenly placed into boiling water, it will imme-
        diately jump out, due to the extreme temperature contrast. If this same frog is placed in tepid
        water slowly brought to a boil, it instead fails to see the inherent danger, and ultimately will
        be cooked to death. Through an extremist lens, this effect highlights the fallacy of dramatic


       18
   13   14   15   16   17   18   19   20   21   22   23