Open Access Publisher and Free Library
01-crime.jpg

CRIME

CRIME-VIOLENT & NON-VIOLENT-FINANCLIAL-CYBER

Posts tagged Africa
The “Webification” of Jihadism: Trends in the Use of Online Platforms, Before and After Attacks by Violent Extremists in Nigeria

By Folahanmi Aina and John Sunday Ojo

Violent extremist organisations (VEOs) use social media platforms to promote extremist content and coordinate agendas.  The use of digital platforms to disseminate information and coordinate activities by VEOs in Nigeria has grown considerably in recent years. This report analyses the adoption of social media before and after attacks by Boko Haram, Islamic State of West Africa Province (ISWAP) and Ansaru. In the post-attack environment, Boko Haram, ISWAP and Ansaru use platforms to claim responsibility and display their strengths against the state’s security forces. By demonstrating their capacity to attack state security forces, the three groups aim to erode the public’s confidence in the state military’s capacity to safeguard national security. The key findings of this report are as follows: Boko Haram, ISWAP and Ansaru previously leveraged popular social media platforms, including YouTube, Facebook, Telegram and Instagram. These platforms were used to promote propaganda and create awareness regarding upcoming attacks. However, all three groups have now had their use of these platforms restricted or banned. ISWAP has switched to using WhatsApp as a secure platform for communication before, during and after attacks. Rocket.Chat and Telegram have also been instrumental in ISWAP’s information dissemination. Boko Haram uses Telegram to share its activities in the pre-attack and post-attack environments. Ansaru has yet to appear on social media platforms due to its underground activities, which are hard to monitor. The recent acquisition of high-speed satellite internet has enhanced ISWAP’s communication with its audience and enabled coordinated attacks. Combating the exploitation of social media platform by VEOs requires a multidimensional approach. Effective collaboration with technology companies becomes imperative to identify extremist content. Building technological infrastructure for the state requires synergistic collaboration with the military and intelligence agencies to enable the removal of extremism from social media platforms. Devising multilingual and specialised algorithms to detect coded extremism messages and audio-visual content is essential for effective counter-extremism digital architecture. Investing in current technology through research and algorithm development must be prioritised to identify violent extremist content in Nigeria and beyond.

London: Global Network on Extremism & Technology, 2023. 30p.

Diplomats and Deceit: North Korea’s Criminal Activities in Africa

By Julian Rademeyer.

Much has been written about state-sponsored North Korean criminal activity in Asia and Europe. But relatively little attention has been devoted to North Korea’s illicit activities in Africa, which run the gamut from trafficking of rhino horn and ivory to gold and tobacco. This report – which draws on hundreds of pages of documents, academic research, press reports and interviews with government officials, diplomats and defectors in Southern Africa and South Korea – presents an overview of evidence implicating North Korea in criminal activity ranging from smuggling and drug trafficking to the manufacturing of counterfeit money and black market cigarettes. It examines North Korea’s current involvement in Africa, the complex history of African-North Korean relations and allegations that the country’s embassies in several African states are intimately connected to a complex web of illicit activity aimed at bolstering the Kim Jong-un regime and enriching cash-strapped diplomats. An analysis of press reports and other publicly available information conducted by the Global Initiative Against Transnational Organised Crime shows that North Korean diplomatic passport holders have been implicated in at least 18 cases of rhino horn and ivory smuggling in Africa since 1986. Despite North Korea’s waning influence on the continent, incriminating evidence linking its diplomats to ivory and rhino horn smuggling continues to emerge. The report includes interviews with a number of high-level North Korean defectors about their knowledge of, and stated involvement in, a range of criminal activities. They claim that smuggling by North Korean diplomats is widespread, with couriers traveling regularly to Pyongyang and Beijing in China with diplomatic bags stuffed with contraband. “[D]iplomats…would come from Africa carrying rhino horn, ivory and gold nuggets,” explained one defector who ran a North Korean front company in Beijing. “Every embassy [in Africa] was coming two or three times every year.” The persistent abuse of diplomatic immunity by North Korean diplomats and agents poses a particularly vexing problem for law enforcement. Increasing economic sanctions and isolationist policies designed to cripple North Korea’s nuclear weapons capabilities are likely to fuel the expansion of the regime’s illicit activities and statesponsored criminal networks.

Geneva: Global Initiative Against Transnational Organized Crime, 2017. 40p.