Terrorist Experts ’ Perceptions of How the Internet Has Shaped International Terrorism

The use of the Internet by terrorists has greatly contributed to international terrorism. The Internet is a main strategic communication asset for terrorists who use online message boards and chat rooms to share information, coordinate attacks, spread propaganda, raise money, and recruit. The Internet gives terrorists a medium to legitimize, propagate, and intimidate citizens to their cause. Their strategies are based on careful analysis of human communications; thus, messages are adapted and carefully delivered to appeal to people who may need something to believe in. This study bridged the gap in knowledge by exploring, understanding, and explaining the perceptions of 10 American terrorist experts on how the use of the Internet by terrorists has shaped international terrorism. Findings of the study indicate that the use of the Internet by terrorists has shaped international terrorism, which resulted in major challenges for counterterrorism agencies in the United States and abroad due to the ability of terrorists to easily close, change, and create new websites or accounts. In addition, counterterrorism experts also have to deal with advanced encryption software and the anonymity of terrorist suspects. Terrorists are able to attract other like-minded individuals or sympathizers to their cause by using the Internet as the medium of communication. The research is significant in that it is directed at the U.S. intelligence community and international counterterrorism entities in order to make continuous improvements in the United States’ homeland security by recognizing terrorist Internet tactics so they can quickly and effectively respond to them. This requires collaboration among counterterrorism agencies and organizations in the U.S. as well as collaboration among member states.


Introduction
Terrorism is a relevant issue in today's globalized society.Technology has made it easier and faster for individuals to access information around the world.Individuals could easily get information about terrorist attacks, recruitment, and terrorism in general via the Internet.Should someone from outside the United States decide to recruit or influence those who live in the U.S., they could easily do so by sending a message on the World Wide Web.For radicals, the Internet is a valuable tool used to strengthen their cause (Soriano, 2012).As a tool, the Internet provides extremists with the ability to collaborate and inspire others to take up their cause, where some then carry out terrorist attacks independently (Soriano, 2012).
In response to the September 11, 2001 terrorist attacks (9/11) and other terrorist threats in the United States, the counterterrorism agencies and organizations have taken steps against al-Qa'ida, the transnational terrorist organization that is responsible for planning and conducting the attacks (The White House, 2011).For this study, when the word terrorists is used, this term will pertain to individuals who use "force or violence against persons or property in violation of the criminal laws of the United States for purposes of intimidation, coercion, or ransom" (Federal Emergency Management Agency [FEMA], 2013, p. 148).With the establishment of the Internet, terrorists now use it to disseminate information, both near and far, with efforts to recruit members (Stern, 1999).According to Kaplan (2009), there are over 5,000 jihadi websites; however, less than 100 of these are monitored by Pentagon analysts.An essential component of Internet recruitment is social media, which consists of e-mail, egroups, and message boards (Weismann, 2010).The message board is a connector for potential terrorist agents and communication can be as simple as generating a quick response or providing elaborate memos (Weismann).
In fighting against terrorism, the UNODC (2012) reported that the Internet has created both challenges and opportunities.Therefore, with the increasing use of the Internet for terrorist purposes, a proactive and coordinated response by member states is needed.According to The White House (2011), President Obama's National Strategy for Counterterrorism focuses on disrupting, dismantling, and defeating al-Qa'ida, its affiliates, and adherents to ensure the security of the American people and its interests.
The purpose of this phenomenological research study was to bridge the gap in knowledge by exploring, understanding, and explaining the perceptions of 10 American terrorist experts on how the use of the Internet by terrorists has shaped international terrorism.Subsequently, the implications for positive social change stemming from this study are directed toward the U.S. intelligence community, which includes 17 agencies and organizations such as the Department of Homeland Security (DHS), Federal Bureau of Investigations (FBI), Central Intelligence Agency (CIA), National Geospatial-Intelligence Agency (NGA), and the Office of the Director of National Intelligence (ODNI).In addition, implications are also directed toward the Counter-Terrorism Implementation Task Force (CTITF) that consists of 31 international entities such as the United Nations System in Counter-Terrorism Efforts Organigram, as a proactive and coordinated response by member states was recommended by the UNODC (2012).The findings from the study are applicable to many agencies and organizations and a wide array of fields, to include public policy and administration, emergency management, criminal justice, criminal law, and criminal psychology.

Background
The Internet is a powerful vehicle of communication for business, education, healthcare, politics, and terrorism.Because communication on the Internet does not necessarily get filtered for any types of terrorist recruitment, there is an immediate cause of concern as to what messages are being transmitted by outside groups residing in other countries other than the US.We need to be alarmed of this ongoing threat because the Internet has emerged as an instrumental tool for terrorist planning, facilitation, and communication, which offers terrorists several advantages (Mount Holyoke College, 2014; The White House, 2011).Through the use of the Internet, terrorists are able to operate remotely and anonymously without being detected or regulated.People living in the United States may not also be tracked for their possible involvement or willingness to respond to terrorist recruitment.Someone who may be going to US college may be an unsuspecting recruit for terrorist activities (Mount Holyoke College, 2014).Because little is known on how international terrorism is being organized today, this phenomenological study could bridge the gap in knowledge by exploring, understanding, and explaining the perceptions of 10 American terrorist experts on how the use of the Internet by terrorists may have shaped international terrorism.

Access to Technology and Information
Because of the immediate availability of the Internet to anyone in the world who has access to a computer, terrorist organizations no longer face a learning curve in accessing and delivering information online (Hedges, 2008).In fact, the most inexperienced and underfunded terrorist now has the potential to carry out attacks due to the detailed experiences and lessons posted online.Hedges (2008) noted that today's terrorism is a manifestation of an evolution of asymmetric conflict that has existed from the beginning of time.Therefore, terrorists' use of the Internet should be treated and analyzed like other tactical innovations in order to understand how it affects terrorist behavior and how it makes them vulnerable.Hence, while it is important to know how the Internet helps terrorists, it is also important to understand and recognize the weaknesses that accompany its use, which is important in the development of counterterrorism policies (Hedges, 2008;Heickerö, 2008).
As Hedges (2008) noted, similar to terrorists learning from one another, so too, can counterterrorism agencies and organizations.Counterterrorism agencies and organizations should recognize that terrorists' use of the Internet has both costs and benefits that are inherent in its use.As policymakers and practitioners, counterterrorism agencies and organizations should not ignore the limitations of the Internet, but should recognize the opponents' tactics and quickly and effectively respond to them.This is imperative to the national security of the United States and other countries, thus saving the lives of the American people and first responders and adding to the effort to make continuous improvements in the nation's homeland security.
Research pertaining to online terrorist recruitment has indicated the challenges associated with this use of the Internet technology (Hedges, 2008;Heickerö, 2008;Kaplan, 2009;UNODC, 2012).Terrorist groups have become more adaptive and have used the Internet to achieve support for their cause (Lubold, 2010).Gohel (2009) reported that extremists can be recruited and become involved in terrorist plots through __________________________________________________________________________________________________________________ ______________ Samuel F. Wilson II, Teresa M. Lao and Ernesto Escobedo (2016), Journal of Information Assurance & Cybersecurity, DOI: 10.5171/2016.163033 anonymous contacts.The Internet has become a catalyst for spreading messages of violence and attracting sympathizers.Jazib (2010) related that the Internet is now the main tool used by terrorists to locate resources and spread ideas, thus accelerating radicalization.Therefore, terrorists' use of the Internet should be treated and analyzed like other tactical innovations in order to understand how it affects terrorist behavior and how it makes them vulnerable.Hence, while it is important to know how the Internet helps terrorists, it is also important to understand and recognize the weaknesses that accompany its use, which is important in the development of counterterrorism policies (Hedges, 2008;Heickerö, 2008).

Problem
The United States' most preeminent security threat continues to be from al-Qa'ida, its affiliates, and adherents (The White House, 2011).Mass media and the Internet have emerged as enablers for terrorist planning, facilitation, and communication (Hedges, 2008;Heickerö, 2008;Kaplan, 2009; UNODC, 2012; The White House, 2011).The use of the Internet allows terrorists to operate without the confines of borders and increases the potential impact on victims (UNODC, 2012).
Researchers of online terrorist recruitment have noted the challenges associated with this use of the Internet technology (Hedges, 2008;Heickerö, 2008;Kaplan, 2009;UNODC, 2012).Terrorist groups have become more adaptive and have used the Internet to achieve support for their cause (Lubold, 2010).Gohel (2009) reported that extremists can be recruited and become involved in terrorist plots through anonymous contacts.While it is important to know how the Internet helps terrorists, it is also important to understand and recognize the weaknesses that accompany its use, which is important in the development of counterterrorism policies (Hedges, 2008;Heickerö, 2008).Due to the significance of the use of the Internet by terrorists, this phenomenological research study can help bridge the gap in knowledge by exploring, understanding, and explaining the perceptions of 10 American terrorist experts on how the use of the Internet by terrorists has shaped international terrorism is needed.(Roberts, 2000;Stepanova, 2008).
Scholars have noted terrorism to be an example of asymmetric conflict, in which terrorist organizations are the weaker adversaries (Mount Holyoke College, 2014).According to Mount Holyoke College (2014), terrorists use inferior resources against the weaknesses of the superior opponent.Terrorists are small substate actors who have less power than nation-states that they are fighting against.This forces this group to use unorthodox means to achieve their goals.
According to Mount Holyoke College (2014), terrorists use inferior resources against the weaknesses of the superior opponent.Terrorists are small substate actors who have less power than nation-states that they are fighting against.This therefore forces them to use unorthodox means to achieve their goals.On the other hand, unlike nationstates, terrorists have the option to remain completely anonymous until they commit an act of terror.They have developed skills in operating from remote locations, avoiding detection by law enforcement surveillance, and evading designated security checkpoints (Theohary & Rollins, 2011).Hence, terrorists use their differences to compensate for their disadvantages against nation-states (Mount Holyoke College, 2014).Mount Holyoke College (2014) related that asymmetric tools used by terrorists include crashing airplanes into the World Trade Center and sending out anthrax-laced mail in order to further their objectives despite their inferior power.In addition, using the Internet is another asymmetric tool used by terrorists.

Terrorists' Use of the Internet
The development of the Internet can be traced back to 1957 when the Soviet Union launched the Sputnik satellite, which was the world's first manmade satellite into orbit (A&E Television Networks, 2014; George

Information about Terrorist Websites
According to Kaplan (2009), there are over 5,000 jihadi websites; however, less than 100 of these are monitored by Pentagon analysts.Terrorist websites include official site of terrorist organizations and websites of supporters, sympathizers, and fans (Weimann, 2006).Defining some websites as terrorist websites is unclear when the websites have no formal terrorist affiliation (Kaplan, 2009).Terrorist monitors may also find it challenging to monitor hoax sites due to frequent site outages.In addition, there are 11 known terrorist chat rooms (Weimann 2013).
Extremists come from all ethnic, racial, and cultural backgrounds (Spargo, 2007).A major concern is the vast presence of extremist groups online (Conway 2007).A contributing factor for this growth is the ease of website development (Freiburger & Crane, 2008).Other major concerns include access availability, limited regulation, and the speed in which a message can be transmitted (Weimann & Von Knop, 2008).Websites can be set up any time by registering a universal resource locator (URL) and providing identifying data such as a name, address, and primary means of contact (Hoffman, 1996).Once a website is operational, the content is available to Internet users around the globe (Shetret, 2011).According to Gray and Head (2009), that translates to approximately 20% of people around the world or at least 1.An essential component of Internet recruitment is social media, which consists of e-mail, egroups, and message boards (Weimann, 2010).The message board is a connector for potential terrorist agents and communication can be as simple as generating a quick response or providing elaborate memos (Weismann, 2010).Forest (2006) provided a segment of a conversation that took place in an al-Qa'ida chat room, which highlighted an application called Pal Talk which allows terrorists to communicate without detection.Weimann (2010) restated that extremists use chat rooms in order to receive guidance, information, and instructions.For example, Kershaw (2004) noted that Army National Guardsman Ryan Anderson converted to Islam after visiting Islamic websites and used the name Amir Abdul Rashad.The researcher reported that Anderson revealed military information to an undercover federal agent whom he thought was a terrorist operative.Thomas (2003) reported that terrorists use the Internet to provide a sense of constant support to potential followers (Thomas, 2003).Websites are accessible at any time and provide insight into various topics of interest.Information on firearms, virtual training camps, strategic communicators, and operation planning and coordination instructions are all readily available (Gray & Head, 2009).

Social networks such as Facebook and
Twitter are also instrumental in recruitment (Wiemann, 2010).Such sites enable web surfers to give and receive instant messages and photos (Wiemann, 2010).Caldwell (2008) related that the strategies used by extremist organizations are similar to those used by other corporations.This may be magnified by the advanced recruitment methods that are used by al-Qa'ida to include video recording to display their messages, CD-ROMS which contains data, and recorded cassettes, all of which provide an opportunity for recruits to receive information and to get the message to multiple followers (Forest, 2006).For example, Jackson (2007) discussed an on-line video where terrorists were shown assembling a suicide belt.
Another noteworthy aspect of Internet recruitment is the ability to tap into conventional media sources (Denning, 2009).Denning (2009) indicated that these sources include newspapers, television broadcasts, and radio.For example, jihadist websites have disseminated information and resources to potential recruits in the form of electronic magazines and supplemental digital videos related to television audio recordings of jihadist leaders.Hummel (2008)  However, what is described as propaganda can be subjective since a basic tenet of international law is the right to freedom of expression (UNODC, 2012).Individuals have the right to share their opinion or distribute content even if it is objectionable to others; however, there are some limited exceptions.These exceptions include the distribution of certain sexual explicit content and communications detrimental to the protection of national security and communications (UNODC).
According to Radlauer (2013), a sense of belonging is important to human beings.The Internet is an avenue to reach out and recruit those that might be open to the terrorist's message (Lewis, 2005).According to Wright (2008), radicals frequently seek out individuals who feel alone or frustrated, offering them a sense of belonging.This feeling of inclusion appears to be a prominent feature in the ability to recruit online.
In recruiting, terrorists must tap into their target audiences (Schmidle, 2009).Schmidle (2009) stated that extremists gain support by showing validity in their cause.Support is partly gained by showing pictures depicting the enemy administering harm to terrorist groups, women, children, or sympathizers (Tsfati & Weimann, 2002).Terrorists are not just adults and they work to inspire the younger generation to take part in their movement (Tsfati & Weimann, 2002).Singer (2012) reported that almost every young man or woman have access to a computer.Homeland Security Institute (2009) noted several accounts of Islamic Jihad and Hamas recruiting 13-year-old teens for suicide bomb missions and children 11 years old trafficking weapons and explosives.For example, two sisters recruited and linked to al-Qa'ida were filmed in an attempt to demolish business and government buildings.

Financing
Acts of terrorism are financed by terrorist organizations and supporters through the use of the Internet (UNODC, 2012).According to the UNODC (2012), four categories are used to describe the manner in which terrorists use the Internet to raise and collect funds and resources: (a) direct solicitation, (b) e-commerce, (c) exploitation of online payment tools, and (d) through charitable organizations.Direct solicitation pertains to the request for donations from supporters through the use of websites, chat groups, mass mailings, and targeted communications.In regards to e-commerce, supporters may be offered books, audio and video recordings, and other items at online stores.In regards to the exploitation of online payment tools, it is easy to transfer funds electronically between parties due to the dedicated websites and communication platforms.In addition, fraud may occur with online payment facilities, such as identity and credit card theft; wire, stock, and auction fraud; and intellectual property crime.In regards to charitable organizations, individuals may provide financial support to what appears to be legitimate charitable organization and the funds may be used for terrorist purposes.(Gaibulloev & Sadler, 2013).Similarly, many terrorist organizations use video cameras to highlight their operations for potential followers (Michael, 2013).

Execution
The UNODC (2012) reported that elements from propaganda, financing, training, and planning may be used in the execution of terrorist acts.For example, the Internet may be used to disseminate explicit threats of violence in order to cause anxiety, fear, or panic among a targeted population.Such threats may be deemed unlawful by many member states, even if the threats are not carried out.The use of the Internet decreases the chances of being detected and helps to hide the identity of those responsible for terrorist acts.Therefore, terrorist organizations' dissemination explicits threats under different aliases to protect their identity (Soriano, 2013).

Measures to Counter Online Terrorist Recruitment
In fighting against terrorism, the UNODC (2012) reported that the Internet has created both challenges and opportunities.Therefore, with the increasing use of the Internet for terrorist purposes, a proactive and coordinated response by member states is needed.The UNODC noted that despite the international recognition of the terrorist Internet threat, there is currently no universal instrument that specifically addresses this aspect of terrorist activity.In addition, specialized training is limited on the legal and practical aspects of the investigation and prosecution of terrorist cases involving the use of the Internet.
There is a wealth of information on how jihadist groups utilize the Internet to spread propaganda, communicate with distant cells, and organize attacks (Hedges, 2008).However, research has been sparse on how the use of the Internet by terrorists has shaped international terrorism (Hedges, 2008).Therefore, this phenomenological research study bridged the gap in knowledge by exploring, understanding, and explaining the perceptions of American terrorist experts on how the use of the Internet by terrorists has shaped international terrorism.

Discussion
Data analysis for this study consisted of thematic analysis and constant comparison from in-depth open-ended interviews and email questionnaires.The NVivo software facilitated the identification of themes and provided annotation for the codes and categories.

Instrumentation and Data Collection
In-depth semistructured interviews served as the main data collection instrument for this study in order to obtain the perceptions of 10 American terrorist experts on how the use of the Internet by terrorists has shaped international terrorism.The interviews consisted of five questions that were developed to answer the central research question and five subquestions.Based on participants' location and availability, two participants participated in face-to-face interviews, one participated by telephone, and seven participated by e-mail.All participants were American citizens, with eight residing in the United States and two residing overseas.

Procedures
In the beginning, 60 potential participants who met the study's criteria were e-mailed an invitation letter to participate in the study.Any questions that the potential participants had were answered.From the 60 experts who were contacted, 17 agreed to participate in the study.However, seven individuals were unable to take part due to their organizations' privacy policies; therefore, 10 individuals participated in the study.
The participants included eight males and two females.Eight resided in the United States and two resided overseas.Participants worked in the fields homeland security (two professors), law enforcement, government, criminal justice, psychology, communication, and IT.Participants' held bachelor's, master's, and doctoral degrees.Therefore, diverse perspectives on the topic of study were sought from individuals who had investigated, studied, taught, and reported on terrorists' use of the Internet.The demographic breakdown appears in Table 1.

Table 1: Basic Demographics of the Participants in the Study
Note.IT = Information Technology.
The 10 participants were e-mailed a consent form, which they electronically signed and returned.After receiving the electronically signed consent form from each participant, each participant was contacted by phone or e-mail to set-up a 60-minute appointment for individual semistructured interviews at a time and place that was convenient for them.Based on participants' location and availability, two participants participated in face-to-face interviews, one participated by telephone, and seven participated by e-mail.Face-to-face and telephone interviews were audio-taped and took approximately 60 minutes.Individuals who participated by email completed the e-mail questionnaire and e-mailed me their responses.Before concluding the face-to-face and telephone interviews, participants were asked if they have any other questions or concerns.After addressing any questions or concerns, the interviews were concluded and participants were thanked for their participation.Based on participants' location and availability, two participants participated in face-to-face interviews, one participated by telephone, and seven participated by completing an e-mail questionnaire (see Table

Table 2: Data Collection Method Data Analysis Plan
Qualitative data were analyzed the seven steps of the modified van Kaam method of analysis of phenomenological data (Moustakas, 1994, pp.120-121), which is discussed in detail further in the paper.Moustakas (1994) emphasized the significance of identifying pertinent statements for analysis.Data from the indepth face-to-face and telephone interviews and e-mail questionnaires were coded, NVivo data analysis software was used to organize and analyze the data.NVivo assisted with data analysis, which is to interpret the research findings after describing the sample and their behavior (Creswell, 2010).Coding and categorization of interviews facilitated thematic analysis of data.The NVivo software facilitated the identification of themes and provided annotation for the codes and categories.The themes were modified and broken down into subthemes.Coding followed a prespecified protocol based upon key words such as international terrorism, recruitment strategies, recruitment efforts, and counterterrorism.
Participation in the study did not cause any acute discomfort.Being in the study did not pose risk to their safety or well-being.After the data were collected, all identifiable data were eliminated; therefore, the interviews were numbered or coded in order to match each participant, thus protecting participants' identity.Participants were informed that the interviews would be audiotaped and that a verbatim transcription would be made and analyzed later.All audiorecorded data were kept secured and transcribed.
The analysis of data collected was crucial to finding meaning within the phenomenon studied.See Appendix A for the Microsoft Excel spreadsheet of the thematic analysis step 2 or the exploration of text.The results present each major theme and important experiences, which were supported by verbatim passages from participants.This section is organized in the following subsections: thematic analysis and results.

Thematic Analysis
The modified van Kaam method of analysis of phenomenological data (Moustakas, 1994, pp.120-121) was used.This subsection is organized in the following areas: reduction and elimination, clustering and thematizing, final identification of themes, individual textural descriptions, individual structural descriptions, individual composite descriptions, and composite texturalstructural descriptions.

Reductions and Elimination
According to Moustakas (1994), the first step of the modified van Kaam method is the listing and preliminary grouping of the answers of the participants, which is also known as the horizonalization process.This first step was performed when I listed all perceptions shared by the participants that were vital to the phenomenon being explored in the study.The second process, known as the reduction and elimination step, was arranged according to two questions to discern whether the responses of the participants should be incorporated in the next stages of the study or eliminated early on (Moustakas, 1994, p. 121): (a) Does it contain a moment of the experience that is necessary and sufficient for understanding it and (b) is it possible to abstract and label it?If so, it was a horizon of the experience.An expression not meeting the above requirements was eliminated.Overlapping, repetitive, and vague expressions were also eliminated or presented in more descriptive terms.The horizons that remained were the themes of the experience.
Clustering and thematizing.The other most important experiences that were formed from the second step of the method were gathered and clustered together to establish thematic labels (Moustakas, 1994).These grouped and labeled experiences were then expressed as the core themes of the experiences of the study (Moustakas, 1994).This third step of the modified van Kaam method disclosed five main themes and several important experiences.These findings were all critical in addressing the central research question and five subquestions of the study.
Final identification of themes.This fourth step of the modified van Kaam method required the examination and review of themes and important experiences alongside the record transcripts of all the 10 participants.This was performed to strengthen the meanings and impact of the five main themes and important experiences discovered.The following questions were suggested by Moustakas (1994): 1. Are they expressed explicitly in the complete transcription? 2. Are they compatible if not explicitly expressed?3.If they are not explicit or compatible, they are not relevant to the participant's experience and should be deleted.(pp.120-121) Individual textural descriptions.The corroborated main themes and important experiences from the previous stages were employed to establish the individual textual descriptions of the 10 participants (Moustakas, 1994).The computer software program NVivo was used to categorize the summarized individual textural descriptions of the participants.Moustakas (1994)  Individual composite descriptions.This step merges the individual textural and structural descriptions from the two previous stages discussed.Moustakas (1994) explained this as "an integration of individual structural into a group or universal description" (pp.180-181).I then completed this by incorporating the formed themes and important experiences.
Consequential descriptions and actual lived experiences from the findings in the previous stages were then created.The data in this stage were gathered from both the individual and structural descriptions and can be seen in Appendix B.

Composite
textural-structural descriptions.The last and final step of the modified van Kaam method by Moustakas (1994) was performed by combing the results of the composite textural and composite structural descriptions as discussed in the previous stages of the sevenstep method (see Appendix B).Moustakas (1994) stated that the seventh step is where the "composite description of the meanings and essences of the experience" (p.108) correspond to the group in general or in a universal manner.

Summary
Five main themes answered the five subquestions of the study.Findings indicated that (a) forums with private e-mails are still one of the major recruitment strategies used, but social media networks are quickly catching up (e.g., Facebook, Twitter, Instagram, Tumblr, and YouTube); (b) the role of the United States as a leader of website hosting increases the freedom for groups to take advantage of a greater recruitment reach; (c) current measures are not enough to counter online terrorist recruitment efforts; (d) the direction in which terrorist recruitment is heading is constantly going forward, increasing, and progressing through the use of the Internet; and (e) online terrorist recruitment continues to evolve and develop by reaching greater audiences through different social media and networking sites.
The central research question was answered based on the findings from the five subquestions.In regards to how the use of the Internet by terrorists has shaped international terrorism, a the main finding was that terrorists no longer have to depend on traveling to far distances or doing face-toface meetings in order to recruit or plan terrorist attacks.Instead, free and inexpensive Internet programs, as well as advanced encryption software, have allowed terrorists to operate from anywhere in the world.However, although the Internet has been a good method for recruitment, face-toface communication is also considered effective.Even though the United States government and other international measures have maximized efforts in monitoring suspicious individuals and websites online, major counterterrorism challenges in shutting down terrorist websites are still present.Therefore, additional counterterrorism strategies are needed as online terrorist recruitment continues to evolve and develop by reaching greater audiences through different social media and networking sites.

Analysis of the Findings
This study was designed to answer one central research question, which was how the use of the Internet by terrorists has shaped international terrorism, and five subquestions, which were the Internet strategies of recruitment used by terrorist organizations, ways in which terrorist Internet recruitment efforts were supported by the United States, measures in place to counter online terrorist recruitment efforts, direction in which terrorist recruitment is heading, and how online terrorist recruitment is evolving in the 21st century.

Interpretation of the Findings
The central research question of this study was this: How has the use of the Internet by terrorists shaped international terrorism?Based on the findings from the five subquestions, the use of the Internet by terrorists has shaped international terrorism in that it has resulted in major challenges for counterterrorism agencies in the United States and abroad due to the ability of terrorists to easily close, change, and create new websites or accounts.In addition, counterterrorism experts also have to deal with advanced encryption software and the anonymity of terrorist suspects.Terrorists no longer have to depend on traveling to far distances or doing face-to-face meetings in order to recruit or plan terrorist attacks.Instead, free and inexpensive Internet programs, as well as advanced encryption software, have allowed terrorists to operate from anywhere in the world.Therefore, through the use of the Internet, terrorists are able to attract other like-minded individuals or sympathizers to their cause.Although the Internet has been a good method for recruitment, face-to-face communication is also considered effective.
In addition, the Internet has increased terrorist organizations' abilities to recruit potential members through forums with private e-mails and social media networks such as Facebook, Twitter, Instagram, Tumblr, and YouTube.The Internet is used by terrorist organizations to distribute training and informational materials such as manuals, handbooks, and pamphlets with web links to instructional videos and audios.The role of the United States as a leader of website hosting increases the freedom for terrorist groups to take advantage of a greater recruitment reach.
Even though United States government agencies, such as the FBI, and other international measures, such as the EU Counter-Terrorism Action, have maximized efforts in monitoring suspicious individuals and websites online, major counterterrorism challenges in shutting down terrorist websites are still present.Therefore, additional counterterrorism strategies are needed as online terrorist recruitment continues to evolve and develop by reaching greater audiences through different social media and networking sites.
Furthermore, the Internet has allowed terrorist organizations to move away from organized group attacks and focus on lone wolf terrorist attacks carried out by recruits that take place all over the world.As a result, the Internet has made terrorist attacks less challenging to carry out due to online tools that allow terrorists to spread their message through social media, video and voice communication programs, terrorist websites, e-mail accounts, and online magazines.Counterterrorism actions, such as drone strikes by the United States, are used as part of terrorists' propaganda to recruit sympathizers.Different countries, such as Saudi Arabia, Jordan, Indonesia, and Singapore, have taken steps to counter terrorism through means such as deradicalization; however, the advancement of Internet tools requires continuous improvement in counterterrorism measures from all countries, including the United States.
The findings from the central research question concurred with the logical connection of the asymmetric conflict theory, which guided this study.Stepanova's (2008) asymmetric conflict theory is described as "a conflict in which the resources of two belligerents differ in essence and in the struggle University, 2014, para.2).Terrorists are asymmetric actors who are looking to take advantage of their opponent's weaknesses, while the stronger actor seeks to take advantage of the terrorist's weaknesses (Hedges, 2007).Therefore, policymakers and practitioners should continue to recognize terrorist tactics and respond to them in a timely and effective manner, which is vital to national security (Hedges, 2007).In addition, a proactive approach to reduce the danger to open society from online threats is paramount (Heickerö, 2008).As Heickerö (2008) reported, a proactive approach includes gaining knowledge and developing strategies and tactics for counteraction.In addition, cooperation between authorities and organizations around the globe is recommended.

Subquestion 1
Subquestion 1 was as follows: What Internet strategies of recruitment are used by terrorist organizations?The results of Subquestion 1 indicated that forums with private e-mails are still one of the major recruitment strategies used, but social media networks are quickly catching up (e.g., Facebook, Twitter, Instagram, Tumblr, and YouTube).The Internet is also used for the distribution of training and informational materials such as manuals, handbooks, and pamphlets with web links to instructional videos and audios.In addition, the Internet and online profiles of individuals are used as recruiting tools to identify and search for potential members.
The theme and important experiences from Subquestion 1 revealed that terrorists are small substate actors who have less power than nation-states that they are fighting against.This therefore forces them to use unorthodox means, such as the Internet, to achieve their goals (Mount Holyoke College, 2014).The role of the Internet in communication and coordination has been instrumental for groups whose global members and affiliates operate under secrecy (Hedges, 2007).Hedges (2007) related that the Internet has truly aided international jihad by making the tactics and experiences of different insurgent and terrorist groups, from those that are inexperienced to the most professional, available to all.Therefore, terrorists from all experience levels have access to tactics that were forged and refined in places such as Samara, Gaza, Kabul, and Humburg.They can then use these tactics to carry out attacks around the world.
In addition, counterterrorism activities by countries such as the United States are negatively portrayed by terrorists with the goal of recruiting sympathizers and inspiring terrorist action (Thomas, 2003).Terrorism may be the most asymmetrical of all forms of political violence (Stepanova, 2008).In this age of information and mass communications, of critical importance is terrorism's destabilizing effect on national, international, human, and public security, as well as its ability to affect politics (Stepanova, 2008).

Subquestion 3
Subquestion 3 was the following: What measures are in place to counter online terrorist recruitment efforts?The results of Subquestion 3 indicated that that current measures are not enough to counter online terrorist recruitment efforts.However, some measures are done by monitoring and identifying suspicious individuals and groups by the FBI to stop terrorists from further recruiting.In addition, some measures at the national and international levels have been created to closely monitor Internet related terrorism actions.
The theme and important experiences for Subquestion 3 are in line with the UNODC's (2012) report that terrorists' use of the Internet also provides counterterrorism agencies, such as the Center for Strategic Counterterrorism Communications, with the ability to gather intelligence and other activities to prevent and counter acts of terrorism, and gather evidence for prosecution.Terrorist websites, chat rooms, and other Internet communications provide counterterrorism agents with a great amount of knowledge on terrorist functioning, activities, and targets.Electronic data may be compiled and analyzed by counterterrorism agents.In addition, more advanced tools are developed by law enforcement, intelligence, and other authorities to prevent, detect, and deter terrorist activities.Dedicated translation resources are also expanding in order to identify possible terrorist threats.However, additional counterterrorism measures are still needed as there is currently no universal instrument that specifically addresses terrorist Internet threat.Therefore, with the increasing use of the Internet for terrorist purposes, a proactive and coordinated response by member states is needed.

Subquestion 4
Subquestion 4 was this: In what direction is terrorist recruitment heading?The results of Subquestion 4 indicated that the direction in which terrorist recruitment is heading is constantly going forward, increasing, and progressing through the use of the Internet.The direction will not fully be progressive as skills and proficiency cannot be fully transferred through the Internet.The theme and important experience from Subquestion 4 revealed that terrorists will continue to be creative with inciting acts of terrorism through the use of the Internet because of its advantages, such as reducing the likelihood of detection and obscure their identity (UNODC, 2012).Therefore, even though face-to-face recruitment and meetings are still used, terrorists are aware of the benefits of Internet technology and therefore will continue to exploit its use for the purposes of terrorism (UNODC, 2012).

Subquestion 5
Subquestion 5 was as follows: How is online terrorist recruitment evolving in the 21st century?The results of Subquestion 5 indicated that online terrorist recruitment continues to evolve and develop by reaching greater audiences through different social media and networking sites.In the 21st century, online terrorist recruitment continues to evolve by transferring terrorists' knowledge and skills in a timely and more convenient way through the Internet.However, face-to-face encounters and communication are still more effective.Hence, terrorists use their differences to compensate for their disadvantages against nation-states (Mount Holyoke College, 2014).

Conclusion
The study bridged the gap in knowledge by exploring, understanding, and explaining the perceptions of 10 American terrorist experts on how the use of the Internet by terrorists has shaped international terrorism.Findings for the central research question indicated that terrorists no longer have to depend on traveling to far distances or doing face-toface meetings in order to recruit or plan terrorist attacks.Instead, free and inexpensive Internet programs, as well as advanced encryption software, have allowed terrorists to operate from anywhere in the world.However, although the Internet has been a good method for recruitment, face-toface communication is also considered effective.Even though the United States government and other international measures have maximized efforts in monitoring suspicious individuals and websites online, major counterterrorism challenges in shutting down terrorist websites are still present.Therefore, additional counterterrorism strategies are needed as online terrorist recruitment continues to evolve and develop by reaching greater audiences through different social media and networking sites.
As policymakers and practitioners, counterterrorism agencies and organizations should not ignore the limitations of the Internet, but should recognize the opponents' tactics and respond to them in a timely and effective manner.By being proactive about international terrorism and by learning to track communication that is being transmitted on the Internet, the United States could respond to this crisis immediately and effectively.
When US government agencies are proactive in countering terrorist intelligence, then the citizens could be rest assured that international terrorism is not going to be a threat in our country.A proactive approach to learning about international terrorism is imperative to the national security of the United States and other countries, thus saving the lives of the American people and first responders and adding to the effort to make continuous improvements in the nation's homeland security.
_____________________________________________________________________________ ______________ Samuel F. Wilson II, Teresa M. Lao and Ernesto Escobedo (2016), Journal of Information Assurance & Cybersecurity, DOI: 10.5171/2016.163033 Justice Research Institute (2014), terrorists established a presence on the Internet through official terrorist websites run by terrorist organizations or extremist religious scholars, unofficial terrorist websites such as discussion forums and blogs, and distributor websites such as online magazines and videos.Terrorists use the Internet to spread their propaganda, which includes recruitment, radicalization, and incitement to terrorism (United Nations Office of Drugs and Crime, 2012).
3 __________________________________________________________________________________________________________________ ______________ Samuel F. Wilson II, Teresa M. Lao and Ernesto Escobedo (2016), Journal of Information Assurance & Cybersecurity, DOI: 10.5171/2016.163033 billion individuals as of 2008.The researchers noted that although affluent countries typically have the greatest number of users, both Africa and the Middle East have seen increased use of the Internet by over 900% in the past eight years.

2
). Face-to-face and telephone interviews were audio-taped and took approximately 60 minutes.Individuals who participated by e-mail completed the __________________________________________________________________________________________________________________ ______________ Samuel F. Wilson II, Teresa M. Lao and Ernesto Escobedo (2016), Journal of Information Assurance & Cybersecurity, DOI: 10.5171/2016.163033 questionnaire and e-mailed me their responses.
_____________________________________________________________________________ ______________ Samuel F. Wilson II, Teresa M. Lao and Ernesto Escobedo (2016), Journal of Information Assurance & Cybersecurity, DOI: 10.5171/2016.163033 related that the individual textural descriptions of the lived experiences of the participants fuse conspicuously both the themes and important experiences to respond to the "what" of the appearing phenomenon (p.78).For this stage, verbatim examples were again included and the summarized textual __________________________________________________________________________________________________________________ ______________ Samuel F. Wilson II, Teresa M. Lao and Ernesto Escobedo (2016), Journal of Information Assurance & Cybersecurity, DOI: 10.5171/2016.163033 descriptions for each of the 10 participants can be seen in Appendix F. Individual structural descriptions.The discovered individual structural descriptions reported the important lived experiences of the 10 participants with regard to the current state of online terrorist recruitment in the United States.The individual structural descriptions were modeled from the preceding stage or the individual textural descriptions.The individual structural descriptions can be seen in Appendix B.

Subquestion 2 Subquestion 2
was as follows: In what ways are terrorist Internet recruitment efforts supported by the United States?The results of Subquestion 2 indicated that the role of the United States as a leader of website hosting increases the freedom for groups to take advantage of a greater recruitment reach.In addition, even if the United States Government is maximizing their efforts in monitoring suspicious individuals and websites online, this still could not fully translate into shutting down these websites.The United States Government also does not condone or support any Internet recruitment efforts by terrorist groups.Individuals in the United States use the Internet to discuss their fundamental human rights.The terrorists are aware of this issue and are exploiting citizens by responding to their issues on the Internet (UNODC, 2012).Therefore, the use of the Internet for terrorist purposes creates both challenges _____________________________________________________________________________ ______________ Samuel F. Wilson II, Teresa M. Lao and Ernesto Escobedo (2016), Journal of Information Assurance & Cybersecurity, DOI: 10.5171/2016.163033 and opportunities in the fight against terrorism (UNODC, 2012).
The theme and important experiences from Subquestion 5 revealed that although face-toface encounters and communication are more effective, current recruitment focuses on using the latest Internet technology such as Skype, Twitter, Vine video apps, training videos, video games, YouTube videos, emails, and online magazines.These tools assist terrorist organizations with avoiding counterterrorism measures.Therefore, __________________________________________________________________________________________________________________ ______________ Samuel F. Wilson II, Teresa M. Lao and Ernesto Escobedo (2016), Journal of Information Assurance & Cybersecurity, DOI: 10.5171/2016.163033 unlike nation-states, terrorists have the option to remain completely anonymous until they commit an act of terror (Mount Holyoke College, 2014).Through the use of the Internet, they have developed skills in operating from remote locations, avoiding detection by law enforcement surveillance, and evading designated security checkpoints (Theohary & Rollins, 2011).

To address the issue concerning international terrorism, this phenomenological study addressed one central research question: How has the use of the Internet by terrorists shaped international terrorism?
Mason University History News Network, 2014).As a result, the Advanced Research Projects Agency (ARPA) was established in 1958 to research and develop new technology for the United States military.Since the late 1980s, the Internet has been a discussed digital video examples such as the murder and beheading of Daniel Pearlman and Nick Berg, 9/11, and vehicle borne improvised explosive device attacks against U.S Forces in Iraq and Afghanistan.