ISIL’s Original Web Series

As a part of its propaganda machine, ISIL created the video series ‘The Best Outcome Is for the Righteous.’ Each video contains common themes: members ready for battle, photos of enemies in respective regions, and calling upon other Muslims to join the fray. Alongside this they renew, or pledge their allegiance to Abu-Bakr-al-Baghdadi, the leader of ISIL. Its thirteenth installment — The Best Outcome Is for the Pious — was no different, however it was released by its Bangladeshi faction.

Visual propaganda attempts to showcase that ISIL still has Wilayah, or regional territory. Therefore, it seeks to divert attention away from the group’s ongoing struggles, such as loss of their last physical stronghold. According to Raphael Gluck, they have transitioned into a kind of ‘insurgency mode’. ‘The Best Outcome Is for the Pious’ reached wider audiences by way of its release by Amaq News Agency and pro-ISIL Telegram channels.

Bangladesh is not the only Wilayah ISIL claims to have a presence. Other videos have been released in Khorassan (historical region of Iran and Afghanistan), the Caucasus, East Asia (Philippines), Sinai, West Africa, Azerbaijan and Libya. All of these videos have been posted since Abu-Bakr-al-Baghdadi released a video in April 2019, in which he stated the battle of Baghouz has been lost.

The correlation between ISIL territorial losses and release of video propaganda is not coincidental. They want to depict they still have a presence in diverse states. The fact remains that terrorist ideologies have no set borders, but ISIL is adamant that the word knows they have a presence in these thirteen regions.

The videos serve as a moral boost after ISIL lost its territory in Syria and elsewhere. It is a show of faith in the organization and leadership when cells of ISIL fighters pledge allegiance to al-Baghdadi. They are intent on continuing the fight. Further, these videos are depictive of a current desperation for recruitment. ISIL needs to show that it still has strength and it is apparent a heavy recruitment campaign is underway, with emphasis on regional sympathizers in various locales.

‘The Best Outcome Is for the Righteous’ series claims active regional involvement, but ISIL’s only authentic presence remains in cyberspace. Revealing this factor is the way to counter ISIL sympathizers from seeking membership in an actual insurgent formation. Authorities in the aforementioned regions must focus on limiting any exposure that showcases ISIL’s presence locally.

Terrorist organizations strive on fear, and fear often leads to publicity, which in turn translates into influence. The only power ISIL has is that provided through complicit exposure.

Image Credit: A clip from an ISIL propaganda video courtesy of the Long War Journal.

Image Credit: Fred Lum at the Globe and Mail. A vigil held for the lives lost in the Quebec City Mosque

Profiling ‘Lone Wolves’ in Canada and the United States

The concept of ‘lone wolf terrorism’, as we understand in the contemporary, was ‘developed’ by right-wing extremists. Tom Metzger, the leader of the White Aryan Resistance, used the term ‘lone wolf’ infamously during the 1980s-1990s. Furthermore, he advocated that white supremacists should adopt a ‘lone wolf’ or ‘leaderless resistance strategy’ where the supremacists can ‘engage in criminal actions only individually or in small cells to avoid detection by law enforcement.’

Law enforcement professionals and specialised academics alike have reported that lone wolf terrorists are difficult to identify and prevent attacks for the reason that the ‘traditional’ models of profiling do not conform to that of lone wolves. There are certain patterns of behaviour and similarities between lone wolf terrorists that aid in creating a profile of the individual, however, these patterns are often identified after the horrific act is committed. In brief, lone wolf attacks are reported to be undetectable and largely unpredictable.


Examples from Canada and the United States of Lone Wolves

The purpose of this section is to draw from two separate, recent incidents of lone wolf acts of terrorisms in Canada and the United States to identify the similarities in the backgrounds and operations of the perpetrators. It must be mentioned that these incidents were chosen due to their recency in terms of occurrence and criminal prosecution.

1. Patrick Wood Crusius – 3 August 2019, Mass Shooting in El-Paso, Texas, United States
21-year-old Crusius opened fired at a Walmart store on 3 August 2019, killing 22 people in this rampage. It was reported that 19 minutes prior to the emergency call that was made, Crusius had published a ‘manifesto’ online, expressing his anti-immigrant sentiments. After his arrest, Crusius admitted to the authorities that his goal was to ‘kill as many Mexicans’ as possible.

2. Alexandre Bissonnette – 29 January 2017, Shooting in Sainte-Foy, Quebec, Canada
On 29 January 2017, the then 27-year-old Alexandre Bissonnette, entered the Quebec Islamic Cultural Centre in Sainte Foy, Quebec, Canada, and opened fired on Muslim men. Bisonnette killed six men, and has been sentenced to at least 40 years in prison. Investigations from Bissonnette’s personal computer revealed evidence of his ‘fascination with anti-immigrant alt-right and conservative commentators, and mass murder.’ Bissonnette also stated his ‘worries’ about Muslim immigration in Quebec.

Though Crusius’ and Bissonnette’s cases are merely two incidents of violence and loss of innocent lives, the similarities in their behaviours and core sentiments are to be examined. In the United States alone, it has been reported that one wolf terrorism is more lethal than organised terrorism. Individuals who are later identified as lone wolves manage to avoid arrest and do not arouse much suspicion because of their similar lifestyle as being isolated and keeping to themselves, while planning their attack alone.

Specialists report that these individuals often suffer a history of personal anguish and personal grievances, further fuelling their justifications and anger leading up to an attack. Modern online spaces, such a popular forums and chat rooms, provide a cyberspace for these individuals to spread their messages of anti-immigration sentiments and other messages of hatred. As seen in the cases of Crusius and Bissonnette, the ‘fear’ of the United States or Canada being ‘overcome’ by Mexicans or Muslims (in their case) was voiced, and was stated by the perpetrators themselves as a motivator for their attack.

As previously mentioned, the identification or prevention of an attack is rendered extremely difficult as there exists no single profile of a lone wolf. In fact, would-be perpetrators exhibit behaviours that are not uncommon to most adolescents or young adults (such as social isolation, signs of depression). Moreover, as lone wolf acts have shown to be conducted by primarily men, it would be unreasonable to expect authorities to be able to identify beyond a reasonable doubt that an individual is a lone wolf terrorist by these slim criterion.


Countering violent extremism: How is a lone wolf stopped prior to action?

Considering the foregoing, at the current stage of profiling and identification of lone wolf terrorists, it is difficult, if not impossible, to detect and halt a lone wolf terrorist attack before it happens. The reason being that lone wolves do not usually discuss their motives or ideas with others, coupled with the fact that their motivation is often only discovered tragically after an attack has happened.

However, this does not mean that there is a lack of sincere effort and measures that can be taken in the prevention of such attacks. Modern day technology plays a significant role in the dissemination of ideas and speech, therefore, there are methods in which potentially dangerous ‘hate speech’ or threats can be identified in chat rooms and reported to authorities for further investigations. It is understood that of course, this sort of monitoring is subject to certain restrictions and limitations as set out in the fundamental human rights related to privacy.

Lone wolf attacks have been reported to be rare, however, when they are carried out, they take with them many innocent lives. They are devastating and scarring to communities. The situation concerning lone wolf attacks, as it currently stands, requires further research into intervention and prevention methods, and would greatly benefit from mutual cooperation between national, international authorities and members of professional societies hailing from a variety of backgrounds.

Image Credit: Fred Lum at the Globe and Mail. A vigil held for the lives lost in the Quebec City Mosque

Using Encrypted Messaging for Terror Propaganda

In March, ISIL lost its last physical stronghold in Baghouz, Syria when United States-backed Syrian Democratic Forces overtook the territory. Although ISIL had tangible territory, terrorism is not typically bound by such lines. An examination of how encrypted messaging services, such as Telegram, spread propaganda beyond borders and jurisdictions is required. It is important to comprehend how terror groups and related media sympathizers use such services to influence and recruit.

In a recent case, an ISIL sympathy group, Ash-Shaff, posted propaganda posters on Telegram encouraging attacks in San Francisco, New York City, and London. The posters show images of Big Ben and Parliament on fire, an ISIL fighter running through New York City with an ISIL flag, and a sucidide bomber with a bomb in his backpack. These posters directly target ISIL sympathizers and loan wolves to act. They exhibit messages in English that call for terrorist acts that typically result in a high number of casualties of those deemed kuffar, the expanse of the ISIL network, and targeted countries considered crusaders. Crusaders refers to ISIL adversaries France, Russia, United Kingdom and the United States. The term kuffar is similar to the term infidel.

Ash-Shaff is an ISIL sympathy group either based out of Indonesia or ran by Indonesian citizens. Ash-Shaff creates and shares media to instigate lone-wolf attacks and spread propaganda. They manufactured other pieces of propaganda in January 2019, May 2019, and in July 2019, which were also shared on platforms such as Telegram. All these posters have similar themes, calling out for violence against enemies and trying to incite sympathizers to carry them out. Ash-Shaff is particularly dangerous because sharing content on platforms such as Telegram provide individuals in these channels with the ability to share propaganda on major social media sites.

Ash-Shaff is one of many ISIL supporter media groups. Other major actors include Quraysh Media, Muntasir Media Foundation and Hamlat Fadh Al-Mukhabarat. The list of groups is extensive, but they all serve the same purpose, to share ISIL propaganda. They facilitate communication within ISIL chat rooms on Telegram channels and inspire actions. For instance, during the Sri Lanka bombings, all of the aforementioned groups shared similar propaganda posters and messages on their channels celebrating the attack. What stands out is that a supporter or sympathizer of terrorism does not need to be apart of all these groups to hear the message. Just one is suffice.

Telegram is the top choice to spread terrorist ideas. It is preferred because its messages are fully encrypted and can even self destruct. The company is aware of its appeal to terrorist groups. They have in fact banned ISIL channels from becoming public, but they can remain private. ISIL remains able to use Telegrams private message services to coordinate attacks, plan social media campaigns, and recruit.

One case is telling. In 2017, a woman was arrested in Bandung, Indonesia after she was radicalized in about four months after receiving instructions from over 60 chat rooms on Telegram. It is argued that a radicalized person is ready to perform a terrorist attack in less than a year. An individual who joins five chatrooms can receive up to 500 pieces of propaganda and instruction daily. Telegram chat rooms can host up to 5,000 users.

It is difficult to put a policy solution on encryption services. A solution that has been implemented by Russia and Iran was to ban Telegram altogether. This is not ideal for many countries, but it is effective.

Currently, there are few regulations when it comes to private messaging services. The encryption messaging industry needs to come together and discuss legal and safe parameters. Like the Christchurch Call to Action, main players in encryption services need to develop a platform to combat terrorism. The issue can not be solved by blocking a service, because there is always another one.

The only other solution is that chat rooms exceeding 1,000 users should be charged monetarily. At this level of communication messages are not used for intimate conversations or privacy. Information with such a reach is part of an agenda and meant to spread ideas and information to like minded individuals.

Telegram and other free encrypted messaging platforms are the basis of terrorist communications. They allow for groups to plan social media campaigns, provide instructions for attacks, receive donations and recruit. It is easy to suggest that groups spreading terrorist ideas should be banned from using these services, but it is what needs to be done.

13 Hours of Extremism: Domestic Terrorism Across the Political Spectrum Highlights Domestic Extremism Concerns

The two perpetrators of the Dayton, Ohio and El Paso mass shootings. (L) Connor Betts (R) Patrick Crusius. Image Source: Eurweb

Between August 3-4 2019, America was horrified by multiple mass killings across the nation. Dozens were left dead and even more injured. At least one of the events is being actively treated as an act of domestic terrorism, while the other appears to be linked to extremism. Below is a summary of the events, a summary of what is known about the perpetrators, and a summary of potential links between the attacks and societal repercussions of the horrific events.

The following summaries of the incidents and individuals are based on statements made by witnesses and relevant officials.

3 August 2019

Patrick Crusius, age 21, drove upwards of ten hours from his home to a Walmart in El Paso, Texas. Crusius exited his vehicle and entered the store where he sought to identify his potential targets based on the desire to kill and hurt as many people of Hispanic descent as possible. At the time of Crusius’ pre-attack surveillance, officials stated that there were between 1,000 and 3,000 people inside the Walmart. Crusius exited the store after satisfaction with the potential number of Hispanic victims inside. Just prior to the attack, a manifesto was circulated on digital extremist forums that highlighted anti-immigrant and racist conspiracy theories. The manifesto is posted under a pseudonym, however, it has largely been linked to Crusius. Crusius then prepared for the attack in or around his vehicle in the parking lot before commencing his plan. He was taken into custody near the scene. Twenty-two people have died thus far with dozens more injured.

4 August 2019

Connor Betts, age 24, appeared to have been active on social media on 3 August 2019. Earlier in the day, on the Twitter account associated with Betts, there was a retweet that called for Joe Biden to “Hurry up and Die”. In the wake of the news breaking about the attack in El Paso, the Twitter account “liked” several tweets that pertained to the attack. On the morning of 4 August 2019, Betts approached a popular bar in Dayton, Ohio, and began to open fire with a rifle. Law Enforcement was quick to respond, killing Betts on scene, but only after Betts managed to kill at least 9 people and injure dozens more. As of this writing, no manifesto or any communication of intent of the attack has been discovered. Prior to Betts’ Twitter account being taken down, it was discovered that Betts often commented support for various left-wing movements, stating his support for Senator Elizabeth Warren and Senator Bernie Sanders. There was at least one retweet in favor of an account linked to the far-left ANTIFA extremist group.

What Do We Know About the Perpetrators?

 Patrick Crusius

Few people from Crusius’ personal life have come forward since the attack, therefore less is known about him. However, Crusius appears willing to speak with law enforcement following his arrest, and the manifesto that has been linked to him is telling. Crusius admitted to law enforcement officials that he purposefully targeted Hispanics in his attack. In the manifesto, a sociological/political theory known as “The Great Replacement Theory” is discussed, which is essentially an anti-immigrant ideology that calls for the separation of races. It has been linked to white supremacist attacks internationally and has at least a marginal following amongst white supremacist groups worldwide. Accounts have been discovered on extremist forums that are believed to belong to Crusius. A LinkedIn account believed to have belonged to Crusius shows that he had been unemployed for at least the last five months. The account, which has been taken down, stated that Crusius was largely uninterested in a career but was interested in computer software, as he stated that he spent most of his days on a computer anyway. It was not immediately clear if Crusius had any education after high school, and his economic and social life was not apparent.

Connor Betts

Multiple people have come forward who reportedly knew Betts, most painting an image of a dangerous individual. It has been reported that Betts had been suspended from high school at least once in reference to possession (and believed production) of a “hit list” and “rape list”. Betts was a musician and had at least some college education. He was a self-described “leftist” and “atheist”, but was described by peers as a loner and outcast. Multiple sources have reported that Betts had an obsession with mass shootings for some years. A female has come out and stated that she was dating Betts, but had broken up with him in May of 2019 over his concerning behavior. It is not clear if Betts was working at this time and his economic situation is unclear.

Potential Link Between the Attacks in El Paso and Dayton

As was mentioned earlier, a Twitter account linked to Betts ‘liked’ several tweets in regard to the El Paso attack, just hours before launching his own attack in Dayton. The attack in El Paso was rumored to be inspired by white supremacist ideology relatively quickly after the news broke and was subsequently confirmed as more information came out throughout the night. It is possible that Betts was inspired to launch an attack in furtherance of far-left extremism in response to the far-right attack in El Paso. That being said, it is unclear whether the attack in Dayton was pre-planned. As had been reported, Betts was obsessed with mass shootings for some time, however, his online links to the far-left cannot be ignored. His apparent following of the events in El Paso potentially link the two attacks as a form of tit-for-tat extremism between individuals on opposite sides of the political spectrum.

Online Extremism: A Domestic Issue

 Both Crusius and Betts were active, at least in part, in online communications with extremist accounts or forums. Crusius has been linked to the publication of the Manifesto as discussed above and has been connected to profiles in extremist forums on websites such as “8chan”. Betts’ link to online extremism has been less clearly defined, but on at least one occasion he was connected to an ANTIFA account and shared a message in furtherance of the group.

While it is too early in the investigation to begin making definitive judgements about the level of influence such digital extremism had on either Crusius and Betts, it is clear that there is a connection between their actions and the extremist rhetoric that they consumed.

Preliminary Recommendations

 It is too early for exact political and/or policy recommendations to be relevant. Both investigations remain active. However, as the attacks appear to be linked to the far end of both sides of the linear political spectrum, adding more rhetoric in an attempt to further politicize the event may serve to further radicalize individuals with like-minded ideas. People of influence on either side of the political spectrum should consider this when crafting their messaging to avoid further influence for extremism.

Digital extremism communications represent a real challenge for policymakers. Preventing the free exchange of ideas is fundamentally against the ideals of the United States, however, as events such as the ones discussed above demonstrate the potential dangers associated with the ideal. It is recommended, that any ‘red flag’ laws that are implemented should expressly allow for the admittance of online forum discussions in consideration of individual cases. Domestic law enforcement agencies must also develop capabilities for monitoring such forums that are linked to extremist ideologies. Intelligence-led policing must be brought to the forefront of the discussion as the leading chance for preventing domestic terrorism events.

John Patrick Wilson is the Director of the Domestic Counter-Terrorism Program at Rise to Peace with experience in law enforcement, political research, and counter-violent extremism research. 

Content Moderation Presents New Obstacles in the Internet Age

Image Credit: Cogito Tech (Cogitotech)

The first instance of a terrorist recording violent crimes and posting it online occurred when Mohammed Merah — the perpetrator of the 2012 Toulouse and Montauban attacks in France — did just that with his GoPro. Seven years later, the culprit of the Christchurch mosque shootings used a similar method. These attacks both beg the same question: How are social media platforms like Facebook, YouTube and Twitter handling extremist content posted to their sites?

As a consequence, tech giants began the process of addressing this problem and seek to formulate a specific mechanism that targets extremist content. Facebook and Google focus significant attention towards development of their automated systems or AI (Artificial Intelligence) software to detect and eventually remove content that violates their policy.

The Global Internet Forum to Counter Terrorism (GIFCT) acts as a cooperative between tech companies to pool extremist content already in existence. A key purpose is to create unique digital fingerprints of contentious material called “hashes.” Hashes are then shared within the GIFCT community to ensure an expanded reach to tackle such material efficiently and the burden is lifted upon a single network to contain the bulk.

YouTube uses techniques like automated flagging also. Membership of their Trusted Flagger Program includes individuals, non-governmental organizations (NGO’s) and government agencies that are particularly effective at notifying YouTube of content that violates its Community Guidelines. YouTube has removed 8.2 million videos from its platform using these techniques as of March 2019.

In a Wired interview, Facebook’s Chief Technology Officer (CTO) Mike Schroepfer described AI the “best tool” to keep the Facebook community safe. AI is not infallible though, as it sometimes fails to understand the nuances of online extremism and hate. This is the point where the human moderators enter the picture.

The Verge provided a detailed piece detailing the lives of Facebook content moderators. Once the post has been flagged, the moderator can either delete it, ignore it or send it for further review. The moderators are trained to look at signs that are distressing for any number of people.

It took 17 minutes for the original live stream of the Christchurch attack posted on Facebook to be removed. That was more than enough time for it to be downloaded, copied, and posted to other platforms. Facebook claims it removed 1.5 million copies of the Christchurch footage within the first 24 hours, but copies remain.

Content moderation is such a mammoth task for social media companies because of the sheer scale of their operations. Millions of people are online and accessing these services at the same time. Errors are expected. The Christchurch attack exposed a glaring shortcoming in content reporting: livestreaming. Moderation has mechanisms for standard uploaded videos but there are not enough tools to moderate a livestream.

Another issue facing social media companies remains the tech savvy nature of modern extremists. Such content can be uploaded by manipulating audio and video quality to bypass the filters in place. Language poses another problem as most of the automatic content moderation is English-language based. Nearly half of Facebook users do not speak English therefore the company needs to expand its technology to incorporate other languages.

Facebook, YouTube, Twitter and Instagram continue to develop their AI tools and improve their human moderator strategies. Nevertheless, the sections taking advantage of current security loopholes are evolving as well. With 4.3 billion internet users in the world in March of 2019, content moderation itself is under scrutiny.