1. Emergency Response

New Media’s operational contribution is most obvious in crisis preparation and response, whether coordinating the needs for potable water and warm blankets in the midst of a flood or posting blood donation sites in the critical hours after attacks like Mumbai, Oklahoma City and 9/11. While federal and state governments are still inexcusably behind the curve in this arena, citizen groups have already begun to make remarkable progress in coordinating global support and recovery aid to disasters anywhere in the world. The same technologies that allowed the attackers of Mumbai to meticulously and accurately map out their operations – online satellite technology, online mapping tools and vast databases of information detailing down to the local Starbucks on the corner of K and 16th streets in Washington, DC – is available for relief efforts. In fact numerous sites coordinating aid to the victims and families in Mumbai popped up almost immediately, before the standoff was even complete.

Private industry is also making use of such tools. Fearing that another Hurricane Katrina could disrupt the supply of critical medicines to patients, the health care and pharmaceutical communities teamed up to create RxResponse, an online social networking tool for coordinating the flow of medicine – from supply and transportation to delivery and temporary Red Cross stations – during a crisis.

2. Open Source Intelligence

Whatever insights may be gleaned from New Media sources in the midst of a terrorist attack or other crisis, their real intelligence value lies in “open source” information. This means gathering intelligence from public sources available to anybody the information that is hidden in plain sight. The government has made some progress in this realm. For example, during Cyber Storm, a cybersecurity simulation hosted last year by the Department of Homeland Security, a faux terrorist group established a presence on an online social networking site akin to My Space or Facebook. It’s good to see the government recognizing and adapting to such tactics, but because online activity is conducted … well, online, it is still too often segregated to the realm of cybersecurity. Cybersecurity, however, involves the act of infiltrating, disrupting or otherwise manipulating computer networks and IT infrastructures. And while this is an important line of national security, it is something entirely different from radicals using social networking sites and the blogosphere to spread their message, coordinate plans and recruit converts.

There is a treasure trove of information in the blogosphere and on the social networking sites that not only provide insights into the specific activities of radical groups but can also enlighten American security decision makers as well as policymakers about the general mood of the international Muslim community at large. Whether we are willing to admit it or not, the hostility toward America is spreading beyond the radical base – and it is naïve to blame these setbacks in the American image abroad on the actions of the Bush Administration only. By understanding the mood abroad and the perceptions of America, and how such perceptions are being manipulated by radical propagandists, we will be better prepared to craft a strategy to respond.

For example, al Qaeda regularly issues its public messages crafted in the dark caves of Afghanistan and western Pakistan via the Internet. Within the last month, Ayman al-Zawahiri, the top lieutenant to Osama bin Laden, has issued several propaganda videos and statements online. One has a recruiting bent in which he praises a 2002 Islamist attack on a nightclub in Bali as the perfect example of committed jihadists who “did not compromise an inch in their ideology and in their determination to perform jihad on behalf of Allah and to drive the enemies of Islam away from the lands of Islam. They knew the price, and they paid it willingly and did not spare anything in paying it.” In another, bizarre effort at manipulating international public opinion, al-Zawahiri insults America’s new president-elect, Barack Obama, as a “house negro” not fit to fill the shoes of Malcolm X. You can rest assured that our intelligence community is aware of these posts. You can rest less easily that policymakers on Capitol Hill are familiar with them. And you may not want to rest at all when it comes to going beyond intelligence efforts to find specific actionable intelligence.

Additionally, terrorist organizations are brazenly setting up shop on social networking sites – not for secretive coordination efforts to plan a cyber attack but for the purposes of public relations – to establish legitimacy, spread propaganda, enhance fundraising and improve recruitment. For example, the Jamaat ud Daawa, an alleged charitable organization that has been in the news of much lately in association with the Mumbai attacks and which is listed as a terrorist front group by the U.S. Department of State, has established a public presence on Facebook.

3. The Struggle for Hearts and Minds

Perhaps more than in any other realm, the U.S. government’s failure to engage the tools of New Media is most damaging in the ideological battle against the propagandists of Islamist extremism. During the course of a similar battle of minds against Communism during the Cold War, the United States invested vast sums of money to communicate the value of democracy and liberty to those weighted down under the tyranny and totalitarianism of proletariat dictatorships dominating the East. The tools of the day were used. If the state-run television stations were inaccessible, then radio was employed in the form of Radio Free Europe, Radio Free China, etc.

Today, the Internet is the dominant medium of international public communications, accessible in homes and public cafés around the globe in a way that would have made the State Department’s public diplomacy specialists drool in the 1960s. Blogs uncontrolled by governments pop up in every language in every country in the world. For every one shut down by authoritarian governments, five new ones emerge. The governments in the regions with which we are most concerned – in the Middle East and East Asia – have no desire to shut down these voices, though, because the hostility is directed toward America rather than local governments. Meanwhile, the U.S. government’s approach to combat such radical Islamist propaganda directed against the “Far Enemy” – which is making more and more inroads into the general mindset of even moderate Muslims – is to mimic the inept tactics of authoritarian governments. Rather than battle ideas with ideas and voices with voices, the United States seeks to disrupt the networks of extremist organizations and censor radical messaging.

This is a hopeless strategy. Even Communist China cannot control the growing range of voices calling for change in Asia. Meanwhile America, the most technologically advanced nation in the world, struggles to make use of this “newfangled” medium that is the very manifestation of “letting a thousand voices bloom.” The Department of Defense, which created the Internet, ought to understand better than anybody that the Internet is a hydra-headed creature. Shutting down one site or network is like dumping Miracle Grow on shrubs. Such operations do nothing to counter the equally dangerous but perfectly legal messaging of the thousands of Islamist propagandists that heap blame for the Middle East’s troubles at the door of the United States. Even if the government had the legal and technical capabilities to silence these voices, it would do nothing to present a better argument to the young radicals being recruited to extremism every day. America must make better use of “soft power” in the post-9/11 environment, and many of these battles will take place on the Internet.

A New Kind of Thinking

Read the analysis of American counter-terrorism operatives during the late 1990s and you will see a rising acknowledgement of a “new kind of terrorism” – especially after the unprecedented nature of coordinated, simultaneous attacks on two separate U.S. embassies in Africa and the sophisticated explosive techniques used in the attack on the Cole in Yemen. After September 11, President Bush spoke in terms of a “new kind of war.” Old tactics and strategies would have to be replaced, the old playbook burned and rewritten.

Yet despite the realization that terrorists have been able to manipulate seemingly innocuous household items into deadly explosive devices, there seems little recognition that these same enemies are manipulating those “newfangled Internet toys” being into powerful tools to collaborate online. Mumbai shows the multifaceted and dangerous role that New Media can play in the post-9/11 world. More powerful than their use as collaborative tools, New Media will undoubtedly play a decisive factor in the long-term struggle to stamp out violent radical ideologies taking root around the world.

Despite its use to exploit vulnerabilities in American security, New Media has the potential to be an even more powerful tool of homeland security and international counterterrorism.  The sheer size of the federal government, reinforced by an inherently bureaucratic culture and turf battles, makes it a difficult environment for innovation. But the Internet is no longer an innovation, and we can no longer afford to debate whether the influence of the blogosphere is limited to the notorious “guys in their pajamas.”

The men who went on a killing spree in Mumbai weren’t wearing pajamas. The residents of Mumbai who posted pictures of the killers weren’t in their basements. The sympathizers around the world who helped coordinate relief for the victims and their families in Mumbai weren’t college kids.

As tragic as it was, Mumbai may finally serve as a catalyst to overcome the government’s inertia and skepticism regarding the role of New Media as a valuable tool to be used, rather than feared. In any case, continuing to ignore its use by our enemies will undoubtedly result in more tragedy.