CINCINNATI – At first blush, the online magazine looks like any other slick electronic publication. The color graphics are eye-catching, the production values are good, and the layout could have been done by a design school grad.
Even the magazine’s name â?? Inspire â?? suggests the content could be about improving your health, or maybe gardening.
It’s not.
Page 62 features an article titled “Car Bombs Inside America,” with a how-to guide for building bombs in your kitchen. Page 15 promotes the setting of forest fires in America as part of an “arson jihad.” And page 33 boasts a first-person account of “Why I Joined al-Qaida.”
Welcome to the world of the modern-day jihadi recruiter, where an Islamic radical makes a pitch to potential converts with the fervor of a religious zealot and the skill of a Madison Avenue ad executive.
The FBI says those recruiters found a willing subject in Green Township, just outside of Cincinnati, sometime last year, when 20-year-old Christopher Cornell took a deep dive into the Internet’s pool of pro-jihadi videos and propaganda.
Cornell’s journey ended with his arrest last week on charges of plotting to attack the U.S. Capitol. But it appears to have begun, as it has for thousands of others around the world, with the click of a mouse.
The far reach of the Internet gives jihadis an opportunity to connect to a global audience of lost, disaffected young people who, experts say, are particularly susceptible to their message. By some estimates, foreign recruits from Western nations now account for more than 5 percent of those fighting for the Islamic State militant group, which also uses the acronyms ISIL and ISIS.
“The phenomena of social media recruitment is key,” said Ed Bridgeman, a criminal justice professor at the University of Cincinnati. “There’s an al-Qaeda and ISIS recruiter in every living room now, potentially.”
The recruiter’s message is appalling to most, but for some, it carries the promise of belonging and purpose, of being part of something more valuable than even their own lives.
For someone like Cornell, who appears to have had few friends and a penchant for anti-government conspiracy theories, the radical Islam he discovered online might have resonated, experts say.
“This guy’s story is very typical,” said Max Abrahms, a Northeastern University professor who specializes in terrorism. “They don’t come up with these ideas on their own, and it’s not surprising he’d be based in Ohio. The Internet is everywhere.
“It’s exactly what al-Qaeda and the Islamic State are shooting for.”
SEEKING MEANING IN LIFE
Cornell’s family said he converted to Islam sometime after graduating from Oak Hills High School in 2012, grew a long beard and changed his name to Raheel Mahrus Ubaydah. According to the FBI, he soon became a willing participant in the jihadi propaganda machine, posting videos and advocating attacks on American soil.
In one message the FBI says it intercepted, Cornell wrote, “I believe that we should just wage jihad under our own orders.”
Abrahms said the ideology that attracts someone like Cornell, who wasn’t raised in the Muslim faith, often is less important than the belief the ideology will somehow bring meaning to the person’s life.
Terrorist groups have relied on that appeal for generations, whether it was the anarchists of a century ago, left-wing radicals in the 1960s or right-wing radicals, such as Timothy McVeigh, in the 1990s.
“Islamist thinking is really the ideology du jour,” Abrahms said.
Among the differences today are the tools of the recruiter’s trade. The Internet is full of opportunities to share and package propaganda in ways never before possible.
Hard-core believers and sociopaths can find inspiration from grisly videos of beheadings and executions. The alienated and impoverished might feel kinship with Islamist rappers who extol the virtues of violent jihad.
Others, including non-Muslims, could find common ground with anti-government rants or the gussied-up content found in magazines like Inspire, which is the official publication of al-Qaeda in the Arabian Peninsula.
The goal of all those approaches is the same: recruit people to kill the enemies of radical Islam. It’s just that sometimes the message sounds like a primal scream, and sometimes like reasoned debate.
“You can recruit people who aren’t necessarily Muslim. You can make it look like we’re fighting the same fight,” said Ian Amit, a vice president at ZeroFOX, a social media risk management company.
“It’s easy to appeal to other grievances, other causes, and use that as a hook,” he said. “I would compare it to marketing. If you’re a company and your goal is to market to a certain audience, you’re going to look for what messaging works.”
VIOLENT MESSAGE, SLEAKER LOOK
Inspire magazine is a case study in selling radical Islam. Scrolling through the pages, it could be easily mistaken for any number of mainstream publications.
Slow down and read the content, however, and it’s a different story.
A question and answer feature includes a reader’s request for advice on how to kill himself in battle. “I have a desire to give my life in the Way of Allah â?¦ and get martyred,” he writes.
The car bomb article is a four-page, step-by-step primer on not only how to build the bomb, but how to kill the most people with it. “The right man in the right place devastates the enemy,” the writer says. “CHOOSE WISELY.”
The words appear over a photo of a busy intersection in an American city.
Much of the jihadi online material, at Insight and elsewhere, focuses not on bringing recruits to the Middle East, but on encouraging them to strike close to home as a so-called “lone wolf” terrorist.
The FBI says that appears to have been Cornell’s goal when he purchased two semi-automatic rifles and 600 rounds of ammunition at a gun store Wednesday morning.
FBI agents, fearing he might follow through with his alleged online talk of jihad, arrested him in the parking lot. He now faces trial in federal court and, if convicted, decades in prison.
Whether he actually would have waged jihad isn’t known, of course. But American homeland security officials fear others one day will, just as the Boston Marathon bombers did two years ago and the assassins who killed staff members at a satirical newspaper in Paris did two weeks ago.
“The perception is there are shadowy cells out there,” said Robert McFadden, senior vice president of the Soufan Group, a New York firm that advises companies on terrorism and security.
But he said the bigger threat may be from “the earnest self-recruit,” the guy living down the street who, for reasons all his own, has been radicalized by Islamist propaganda.
“It’s so readily available on the Internet,” McFadden said. “Those kind of potent images can have an impact on a young life.”
Contributing: Kimball Perry of The Enquirer
Copyright 2015USAToday
Read the original story: Terror groups ramp up online marketing to find recruits
Terror groups ramp up online marketing to find recruits











SYS-CON Events announced today that Windstream, a leading provider of advanced network and cloud communications, has been named “Silver Sponsor” of SYS-CON’s 16th International Cloud Expo®, which will take place on June 9–11, 2015, at the Javits Center in New York, NY.
SYS-CON Events announced today that IDenticard will exhibit at SYS-CON’s 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY.
Cloud Foundry open Platform as a Service makes it easy to operate, scale and deploy application for your dedicated cloud environments. It enables developers and operators to be significantly more agile, writing great applications and deliver them in days instead of months. Cloud Foundry takes care of all the infrastructure and network plumbing that you need to build, run and operate your applications and can do this while patching and updating systems and services without any downtime.
SYS-CON Events announced today that Cloudian, Inc., the leading provider of hybrid cloud storage solutions, will exhibit at SYS-CON’s 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY., and the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA.
SYS-CON Events announced today Sematext Group, Inc., a Brooklyn-based Performance Monitoring and Log Management solution provider, will exhibit at SYS-CON’s DevOps Summit 2015 New York, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY.
“NuoDB is a transactionally consistent SQL database that does scale out, that does all the things you want in a cloud. If you want more transactional throughput, if you want higher availability if you want to run in multiple data centers this is a technology that can scale and still provide a single logical consistent database,” explained Seth Proctor, CTO of NuoDB, in this SYS-CON.tv interview at Cloud Expo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
SYS-CON Events announced today that Solgenia will exhibit at SYS-CON’s 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY, and the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA.
SYS-CON Events announced today that ActiveState, the leading independent Cloud Foundry and Docker-based PaaS provider, has been named “Silver Sponsor” of SYS-CON’s DevOps Summit New York, which will take place June 9-11, 2015, at the Javits Center in New York City, NY.
SYS-CON Events announced today Isomorphic Software, the global leader in high-end, web-based business applications, will exhibit at SYS-CON’s DevOps Summit 2015 New York, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY.
SYS-CON Events announced today that AIC, a leading provider of OEM/ODM server and storage solutions, will exhibit at SYS-CON’s 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY.
There are 182 billion emails sent every day, generating a lot of data about how recipients and ISPs respond. Many marketers take a more-is-better approach to stats, preferring to have the ability to slice and dice their email lists based numerous arbitrary stats. However, fundamentally what really matters is whether or not sending an email to a particular recipient will generate value. Data Scientists can design high-level insights such as engagement prediction models and content clusters that a…
SYS-CON Events announced today that MangoApps will exhibit at SYS-CON’s 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY., and the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA.
SYS-CON Events announced today that Creative Business Solutions will exhibit at SYS-CON’s 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY.
In this demo at 15th Cloud Expo, Derek Tumulak, Vice President of Product Management at Vormetric, takes you through what Vormetric does, and some of the data security capabilities they offer. A lot of times you don’t need high-tech solutions to solve problems; a lot of times it’s education and training that’s crucial in implementing a proper data security solution.
Internet of @ThingsExpo announced today a limited time free “Expo Plus” registration option. On site registration price of $600 will be set to ‘free’ for delegates who register during this period. To take advantage of this opportunity, attendees can use the coupon code “IoTAugust” and secure their “@ThingsExpo Plus” registration to attend all keynotes, as well as limited number of technical sessions each day of the show, in addition to full access to the expo floor and the @ThingsExpo hackathon….
–>
If you’ve used the term “DevOps” as a job title, you may have been making a big mistake. It sounds innocuous: After all, isn’t DevOps something that you do? If you’re a marketer, hiring manager or non-engineer at your company, it might seem like it.
Regardless of the business or industry you’re in, there’s no doubt that a successful year is at the forefront of your strategy. And at the helm driving that success is revenue. But not just any kind of revenue… we’re talking recurring revenue. When an average of 80% of a company’s future profits comes from 20% of its existing customers, it’s a telling sign of where your focus should be. And if you…
Despite valiant efforts of the Dutch ICT association, the local ministry of economic affairs and tireless encouragement from (now former) EU Commissioner Neelie Kroes, my home country, the Netherlands, has been struggling to gain cloud momentum. Not an uncommon characteristics in Europe but a sharp contrast to the US, but also to Dutch progress in the music scene.
Any CEO will tell you that marketing is an essential part of running a successful business. After all, without demand and lead generation there will be no sales; if the product isn’t selling, all the brilliant innovative technology in the world won’t make even the slightest difference and the company will eventually go under.
According to Pardalis, Salesforce employed the most successful method of exposing their APIs at the event, lessening security measures, and including a visual platform that greatly aided in onboarding developers so that direct calls via REST was not necessary. Now, reading between the lines, I know what is meant here by “lessening security measures”. For some APIs, it can be difficult to get start…
Cloud computing adds flexibility to enterprise IT. When companies wish to take advantage of this, they are finding they need to turn to microservices instead of their traditional, monolithic architectures to accommodate frequent change.
I saw more discussion on big data at CES 2015 this week, compared to previous years. Everyone talked about data as the central core of everything. The IoT (Internet of Things), NFC (near Field Communication) and M2M (Machine to Machine) communication are enabling pieces for many industries – security monitoring, asset and inventory tracking, healthcare, process control, building environment monit…
How much risk do you have of someone stealing disks from your datacenter? Take the average life span of a hard drive. The enterprise class hard drive is designed to last a minimum of 5 years. During that 5 years a SAN or NAS filled with hard disks is expected to have at least 99.999 percent uptime or better. So if you take the same approach to securing data in your datacenter as you did with your …
According to a Greer Institute Workforce and Talent study, the 2020 workforce is both “the most educated and culturally diverse of any generation” and “notorious job-hoppers who dislike bureaucracy and distrust traditional hierarchies.” Given this, it is crucial for leaders to understand how best to motivate and engage this 2020 workforce and win the war for top talent.
Cyber security is rapidly becoming a significant issue in the C-suite as well as the population at large. The results of Dell’s Global Technology Adoption Index(GTAI) [1] show that security is a top concern for most of the 2000 global small and medium businesses surveyed. The outcomes further noted that such concerns create barriers to the adoption of critical technologies that drive value and gro…
The worlds of cloud, mobile, social and cyber will continue expanding, permuting and recombining. Their individual effect on society and commerce will become moot as these technological capabilities merge to deliver products and services straight out of Star Trek!
According to several recent studies, consumers are still very much on the fence about the Internet of Things. Before they’ll give IoT a thumbs up, these studies say, companies will need to earn their trust and offer more steak and less sizzle in their IoT offerings.
Virtualized environments are demanding when it comes to storage. Tier-1 virtualized applications require always-on, fast, available access to data. One of the ways that today’s virtualization vendors are increasing the stability and speed of storage access in virtualized environments is through the use of flash, and HP is leading the way among the crowd.
On the server side we always use Java and have no plans to switch to any other technology. After spending many years developing the front end with Adobe Flex framework and ActionScript programming language we got spoiled by this super-productive environment. After the mankind led by Apple killed Flash Player, we started to look for an alternative.
Is there a point where business can safely assume they have hit the limit of what traditional IT organizations have to offer? In an Internet and data driven world, does IT simply lack the agility and depth needed to fulfill business requirements and need for innovation?
There are now more people talking about DevOps. They’re talking louder. Websites with larger viewerships will now put DevOps in a headline because it has become good for SEO. But amplitude is not the same thing as information. A cat meme shared a million times doesn’t have any more information than if it was thrown straight in the trash, and it will certainly never have as much information as, for…
Apache Hadoop is an open source big data processing platform that comes with its own extensive ecosystem to support various business and technical needs. Hadoop’s specialty is large-scale processing and analytics over volumes of data that cannot be efficiently handled by traditional technologies. Hadoop is often complemented by the class of database management technologies referred to as NoSQL, wh…
OpenStack and Hadoop are both amazingly powerful platforms for those who need (and recognize that they need) them. We all know what private clouds and Big Data are, so I won’t waste your time explaining them. I will point out for those who haven’t had the pleasure of installing them that they are terribly difficult to install and manage. Not because they’re poorly designed and written, and not bec…
Today’s software testing practices are abysmal. You’re a major provider of health insurance services to general consumers. Your website is a primary means of interacting with your customers and allowing them view coverage, locate in-plan providers, review Explanation of Benefits for past services and see real-time information regarding deductibles and fees. It’s midday and requests…