The Road to the Slaughter: ISIS Process of Dehumanizing the Enemy

  • Sara Hamad Alqurainy
  • Adnan Hamedi M.
  • Abubakar Usman Abubakar
Palabras clave: ISIS, Daʿsh, Duplex Theory, Terrorism, Extremism

Resumen

The so-called Islamic State is currently known as one of the greatest non-state security challenges of the 21st century. The organisation’s barbaric and inhuman treatments of its perceived enemies remain extremely shocking and totally unfath- omable to the sane humans. How ISIS succeeds in brainwashing its members to such inhuman acts requires deep study and analysis of the organisation’s messages in all forms and contexts. The aim of this paper, therefore, is to show how ISIS prepares its members to carry out heartless and cruel attacks on its foes. To achieve this objective, Sternberg’s Duplex Theory of hate is adopted as the framework of this paper. As proposed by Sternberg, Duplex Theory of hate consists of triangular structure namely, negation of intimacy, passion in hate, and commitment in hate. The paper collected 20 ISIS Arabic Twitter campaigns which were analysed the- matically with the aid of Nvivo 12 Pro software. Prior to the analysis, all 20 cam- paigns were transcribed, translated into English, and coded. This paper found that the Islamic State employs several strategies in an attempt to modify the behavior of its follower and potential recruits, thus, dehumanizing them in the process. Doing so prepares its followers to subject its enemies to the cruelest treatments of torture and often killing them.

Biografía del autor/a

Sara Hamad Alqurainy
Department of Media and Communication Studies Faculty of Arts and Social Sciences University of Malaya
Adnan Hamedi M.
Department of Media and Communication Studies Faculty of Arts and Social Sciences University of Malaya
Abubakar Usman Abubakar
Department of Media and Communication Studies Faculty of Arts and Social Sciences University of Malaya

Citas

Al-Rawi, A, J Groshek - International Journal of Cyber Warfare and, and undefined 2018. “Jihadist Propaganda on Social Media: An Examination of ISIS Related Content on Twitter.” Igi-Global. Com. Accessed July 14, 2019. https://www.igi-global.com/article/ jihadist-propaganda-on-social-media/216876.

Ashcroft, Michael, Ali Fisher, Lisa Kaati, Enghin Omer, and Nico Prucha. “Detecting Jihadist Messages on Twitter.” In 2015 Europe- an Intelligence and Security Informatics Conference, 161–64. IEEE, 2015.

Awan, Imran. “Cyber-Extremism: Isis and the Power of Social Me- dia.” Society 54, no. 2 (2017): 138–49.

Bandura, Albert. Moral Disengagement: How People Do Harm and Live with Themselves. Worth publishers, 2016.

Benigni, Matthew C, Kenneth Joseph, and Kathleen M Carley. “On- line Extremism and the Communities That Sustain It: Detecting the ISIS Supporting Community on Twitter.” PloS One 12, no. 12 (2017): e0181405.

Berger, John M. “How ISIS Games Twitter.” The Atlantic 16 (2014). Bodine-Baron, Elizabeth, Todd C Helmus, Madeline Magnuson, and Zev Winkelman. “Examining ISIS Support and Opposition Net- works on Twitter.” RAND Corporation Santa Monica United States, 2016.

Braun, Virginia, and Victoria Clarke. “Using Thematic Analysis in Psychology.” Qualitative Research in Psychology 3, no. 2 (2006): 77–101.

Braun, Virginia, Victoria Clarke, Nikki Hayfield, and Gareth Terry. “Thematic Analysis.” Handbook of Research Methods in Health So- cial Sciences, 2019, 843–60.

Bromley, David G, and Anson D Shupe Jr. “ Moonies” in America: Cult, Church, and Crusade. SAGE Publications, Incorporated, 1979. Bruneau, Emile. “Understanding the Terrorist Mind.” Cerebrum : The Dana Forum on Brain Science 2016 (2016). http://www.ncbi. nlm.nih.gov/pubmed/28058095.

Buchanan, Elizabeth. “Considering the Ethics of Big Data Research: A Case of Twitter and ISIS/ISIL.” PloS One 12, no. 12 (2017): e0187155.

Combs, Cynthia C. Terrorism in the Twenty-First Century. Rout- ledge, 2017.

Corman, Steven R, Jill Schiefelbein, K Acheson, B Goodall, K Mc- donald, and A Trethewey. Communication and Media Strategy in the Jihadi War of Ideas. Citeseer, 2006.

Daskin, Emin. “Justification of Violence by Terrorist Organisations: Comparing ISIS and PKK.” Journal of Intelligence and Terrorism Studies 1 (2016): PLV6PE.

Diplomacy, NM Rocca - International Relations and, and undefined 2017. “Mobilization and Radicalization through Persuasion: Ma- nipulative Techniques in ISIS’propaganda.” Davidpublisher.Org. Accessed July 14, 2019. http://www.davidpublisher.org/Public/up- loads/Contribute/5a43174f79c3e.pdf.

Fischer, Agneta, Eran Halperin, Daphna Canetti, and Alba Jasini. “Why We Hate.” Emotion Review 10, no. 4 (2018): 309–20.

Gurr, Ted Robert. Why Men Rebel. Routledge, 2015. Herfroy-Mischler, Alexandra, and Andrew Barr. “Jihadist Visual Communication Strategy: ISIL’s Hostage Executions Video Produc- tion.” Visual Communication, 2018, 1470357218803396.

Huey, Laura. “This Is Not Your Mother’s Terrorism: Social Media, Online Radicalization and the Practice of Political Jamming.” Jour- nal of Terrorism Research, 2015.

Jongman, AJ. Political Terrorism: A New Guide to Actors, Authors, Concepts, Data Bases, Theories, and Literature, 2017. https://www. taylorfrancis.com/books/9781315126760.

Kaplan, Abraham. The Counter-Terrorism Puzzle: A Guide for Deci- sion Makers. Routledge, 2017.

Magdy, Walid, Kareem Darwish, and Ingmar Weber. “# FailedRev- olutions: Using Twitter to Study the Antecedents of ISIS Support.” ArXiv Preprint ArXiv:1503.02401, 2015.

March, A Cuthbertson - International Business Times, and undefined 2015. “Inside the ’ISIS Social Media War Machine’Tracking 25,000 Terrorist Twitter Accounts.” Ejerciciospls.Es. Accessed July 14, 2019. http://www.ejerciciospls.es/docs/PRESENCIAL/READING INTERNET/INSIDE THE ISIS.docx.

McElreath, David H, Daniel Adrian Doss, Leisa McElreath, Ashley Lindsley, Glenna Lusk, Joseph Skinner, and Ashley Wellman. “The Communicating and Marketing of Radicalism: A Case Study of ISIS and Cyber Recruitment.” International Journal of Cyber Warfare and Terrorism (IJCWT) 8, no. 3 (2018): 26–45.

Mills, Colleen E, Joshua D Freilich, and Steven M Chermak. “Ex- treme Hatred: Revisiting the Hate Crime and Terrorism Relationship to Determine Whether They Are ‘Close Cousins’ or ‘Distant Rela- tives.’” Crime & Delinquency 63, no. 10 (2017): 1191–1223.

Moriarty, Batsheva. “Defeating ISIS on Twitter.” Technology Sci- ence, 2015.

Pellerin, Clara. “"Communicating Terror: An Analysis of ISIS Communication Strategy",” 2016. https://www.sciencespo.fr/ kuwait-program/wp-content/uploads/2018/05/KSP_Paper_Award_ Spring_2016_PELLERIN_Clara.pdf.

Piazza, James A, and Ahmet Guler. “The Online Caliphate: Internet Usage and ISIS Support in the Arab World.” Terrorism and Political Violence, 2019.

Schmid, Alex P. “Radicalisation, de-Radicalisation, Counter-Radi- calisation: A Conceptual Discussion and Literature Review.” ICCT Research Paper 97, no. 1 (2013): 22.

Shamieh, Luna, and Zoltán Szenes. “The Propaganda of ISIS/ DAESH through the Virtual Space.” Defence against Terrorism Re- view 7, no. 1 (2015).

Sternberg, Robert J. “A Duplex Theory of Hate: Development and Application to Terrorism, Massacres, and Genocide.” Review of General Psychology 7, no. 3 (2003): 299.

———. “Understanding and Combating Hate.,” 2005.

Wei, Y, L Singh, S Martin - Proceedings of the 2016 IEEE/ACM, and undefined 2016. “Identification of Extremism on Twitter.” Dl.Acm.Org. Accessed July 14, 2019. https://dl.acm.org/citation. cfm?id=3192654.

Wright, Shaun, David Denney, Alasdair Pinkerton, Vincent Jansen, and John Bryden. “Resurgent Insurgents: Quantitative Research into Jihadists Who Get Suspended but Return on Twitter.” Contempo- rary Voices: St Andrews Journal of International Relations 7, no. 2 (2016).

Publicado
2019-08-03
Cómo citar
Hamad Alqurainy, S., Hamedi M., A., & Usman Abubakar, A. (2019). The Road to the Slaughter: ISIS Process of Dehumanizing the Enemy. Opción, 35, 757-774. Recuperado a partir de https://produccioncientificaluz.org/index.php/opcion/article/view/27427