Open Access Publisher and Free Library
01-crime.jpg

CRIME

CRIME-VIOLENT & NON-VIOLENT-FINANCLIAL-CYBER

Posts tagged terrorism
The “Webification” of Jihadism: Trends in the Use of Online Platforms, Before and After Attacks by Violent Extremists in Nigeria

By Folahanmi Aina and John Sunday Ojo

Violent extremist organisations (VEOs) use social media platforms to promote extremist content and coordinate agendas.  The use of digital platforms to disseminate information and coordinate activities by VEOs in Nigeria has grown considerably in recent years. This report analyses the adoption of social media before and after attacks by Boko Haram, Islamic State of West Africa Province (ISWAP) and Ansaru. In the post-attack environment, Boko Haram, ISWAP and Ansaru use platforms to claim responsibility and display their strengths against the state’s security forces. By demonstrating their capacity to attack state security forces, the three groups aim to erode the public’s confidence in the state military’s capacity to safeguard national security. The key findings of this report are as follows: Boko Haram, ISWAP and Ansaru previously leveraged popular social media platforms, including YouTube, Facebook, Telegram and Instagram. These platforms were used to promote propaganda and create awareness regarding upcoming attacks. However, all three groups have now had their use of these platforms restricted or banned. ISWAP has switched to using WhatsApp as a secure platform for communication before, during and after attacks. Rocket.Chat and Telegram have also been instrumental in ISWAP’s information dissemination. Boko Haram uses Telegram to share its activities in the pre-attack and post-attack environments. Ansaru has yet to appear on social media platforms due to its underground activities, which are hard to monitor. The recent acquisition of high-speed satellite internet has enhanced ISWAP’s communication with its audience and enabled coordinated attacks. Combating the exploitation of social media platform by VEOs requires a multidimensional approach. Effective collaboration with technology companies becomes imperative to identify extremist content. Building technological infrastructure for the state requires synergistic collaboration with the military and intelligence agencies to enable the removal of extremism from social media platforms. Devising multilingual and specialised algorithms to detect coded extremism messages and audio-visual content is essential for effective counter-extremism digital architecture. Investing in current technology through research and algorithm development must be prioritised to identify violent extremist content in Nigeria and beyond.

London: Global Network on Extremism & Technology, 2023. 30p.

Cults and Online Violent Extremism

By Suzanne Newcombe, Sarah Harvey, Jane Cooper, Ruby Forrester, Jo Banks and Shanon Shah

The word ‘cultic’ is applied to a diverse range of online activity. This label is not always intended to convey a negative judgement; for example, individual influencers, music groups and brands aspire to a ‘cult following’. However, the use of the words ‘cult’ or ‘cultic’ is usually intended by the speaker as a judgement to draw attention to something that may have some elements typically associated with religion (for example, idealisation of a particular individual, a specific worldview and/or ritual practices) as well as the potential to cause harm and violence. This report proposes three ideal-typical groupings of online cultic activity that can glorify and inspire violent extremisms: ‘Cultic’ Religious Groups, ‘Online Cultic Milieus’ and ‘Cultic Fandoms’. This is not an exhaustive description of online activity that has been termed ‘cultic’ in popular culture, but it provides a good starting point for further analysis. This report argues that the understanding of ‘cults’ and online activity needs to be carefully nuanced; the complexities of online and offline activities that might result in violent extremism need to be analysed and risk assessed at the level of both group/social movement and individual. It is important to understand that there are a range of ways individuals interact with these cultic online environments that may or may not represent warning signs or pathways into violent extremism. A holistic understanding of both the nature of the cultic online milieu and an individual’s engagement with that environment is warranted before making assumptions about the nature of any individual’s engagement.

London: Global Network on Extremism and Technology (GNET), July 2023.

Going Dark: The Inverse Relationship between Online and On-the-Ground Pre-offence Behaviours in Targeted Attackers

By Julia Kupper and Reid Meloy

This pilot study examines the correlation of online and on-the-ground behaviours of three lone-actor terrorists prior to their intended and planned attacks on soft targets in North America and Europe: the Pittsburgh synagogue shooter, the Buffalo supermarket shooter and the Bratislava bar shooter. The activities were examined with the definition of the proximal warning indicator energy burst from the Terrorist Radicalization Assessment Protocol (TRAP-18), originally defined as an acceleration in frequency or variety of preparatory behaviours related to the target. An extensive quantitative and qualitative assessment of primary and secondary sources was conducted, including raw data from different tech platforms (Gab, Discord and Twitter–now X) and open-source materials, such as criminal complaints, superseding indictments and court trial transcripts. Preliminary findings of this small sample suggest an inverse relationship between the online and offline behaviours across all three perpetrators. The average point of time between the decision to attack and the actual attack was five months, with an elevation of digital activities in the three months leading up to the incident, along with some indications of offline planning. In the week prior to the event, social media activity decreased–specifically on the day before the acts of violence with two subjects going completely dark–while terrestrial preparations increased. On the actual day of the incident, all assailants accelerated their tactical on-the-ground actions and resurfaced in the online sphere to publish their final messages in the minutes or hours prior to the attack. It appears that the energy burst behaviours in the digital sphere and the offline actions can be measured in both frequency and variety. Operational implications of this negative correlation are suggested for intelligence analysts, counter-terrorism investigators and threat assessors.

London: The Global Network on Extremism and Technology (GNET), 2023. 36p.

Offline versus online radicalization: Which is the bigger threat?  Tracing Outcomes of 439 Jihadist Terrorists Between 2014–2021 in 8 Western Countries

By Nafees Hamid and Cristina Ariza

Question: Are those radicalised offline or online more of a threat? Which group is harder to detect, more successful in completing attacks, and more lethal when they do so? Is the pattern different for youth versus older perpetrators and for men versus women? This report investigates these questions. Database: We created a database containing 439 perpetrators involved in 245 attacks between 1 January 2014 and 1 January 2021. It includes every publicly known completed attack and an extensive sampling of thwarted attacks. Attacks were all jihadist‑linked in eight Western countries: Australia, Austria, Belgium, France, Germany, Spain, the United Kingdom and the United States. Type of radicalisation: In our database, radicalisation primarily happens offline; over half the individuals in our database had been radicalised via offline networks. Success and lethality: Individuals who were radicalised offline were three times more likely than individuals radicalised online to complete an attack successfully. Those radicalised offline are 18 times more lethal than individuals in the online category. Those radicalised online are almost eight times more likely to fail than to succeed. Group attacks: Individuals who were radicalised offline are almost three times more likely to attack or plot in groups than individuals radicalised online. Success of group attacks: While groups were more likely to be thwarted by the police than to succeed (regardless of how individuals had been radicalised), successful groups of people radicalised offline were more lethal than their lone actor counterparts (15%). Family and friends: Some 87% of those with radicalised friends and 74% with radicalised relatives plotted or attacked together. Foreign fighters: Foreign terrorist fighters (FTFs), who were mostly radicalised offline, have the same success rate as non‑FTFs. But success rate increases if they have spent more than a year in a terrorist training location. Age: Online radicalisation is on the rise for young people (born from the 2000s onwards), although most individuals, including young people, are still radicalised offline. Gender: Women appear to be more likely to have been radicalised online. Bottom line: Those radicalised offline are greater in number, more successful in completing attacks and more deadly than those radicalised online.  

London: International Centre for the Study of Radicalisation, King’s College London. 2022. 40p.