Terror’s New Form

Source: The East African (2014)

Author: Caleb Septoff

Perhaps one of the greatest scientific achievements in human history is the invention of the internet, which landmarked the beginning of the digital age in the modern era. Its uses span multiple fields and in large part is responsible for the high levels of rapid globalization we have become accustomed to today. Although it has improved humanity in many facets, it has also led to the increase in the susceptibility of nations’ and individuals to cyber-attacks. The internet has evolved over the last decade with the inception of social media and cyber currency, but with this evolution comes a new wave of terrorism in the form of cyber-attacks, propaganda, hacking, and online recruitment. The threat has grown substantially – enough for even university institutions, namely New York University (NYU), to offer cyber security majors and courses solely to deter these types of attacks.

Before venturing into the subject of digital terrorism, it is important to explore something less widely known to the average internet user; this being the deep web and dark net. The internet is composed of two main points of access; the surface web and the dark web. The surface web is most common to everyday users and comprises mainly of search engines, like Google and Bing, and the information found is unrestricted. Comparatively, the deep web differs mainly in size, estimated at four to five hundred times bigger than the surface web, accounting for 90% of the internet. In comparison to the surface web, the wealth of information stored on the deep web is gigantic. Most of the deep web is restricted by applications, which grant access to databases or password protected sites. Anything from social media, such as Facebook or Instagram, to online banking are considered part of the deep web. In addition to its size, the dark web differs  in its accessibility. Despite popular beliefs, the deep web and dark net are not synonymous. Rather, the dark net exists hidden below the surface web. The dark net is almost entirely unregulated and is even harder to access than the deep web. To date, the dark net hosts an unknown number of websites, but the content ranges from people sending messages who wish to maintain anonymity to underground drug dealing, sex trafficking, weapons dealing, and the focus of this article, terrorists and extremists’ sites.

The Islamic State of Iraq and the Levant (ISIL) or Daesh, was the first terrorist organization to truly maximize their outreach using the internet. When Abu Bakar al-Baghdadi declared the caliphate, a wave of propaganda and recruitment media took social media by storm. While destructive, authorities and the companies themselves were able to mitigate much of the content since it took place on the more accessible surface web. However, the organization consistently found new ways to respond to authorities’ crackdowns. First, they began attracting people through social media and other corners of the surface web and then slowly moved them towards more difficult protected places like domains and chat rooms on the dark net. In addition, the use of messaging applications that offered heavy encryption, like Telegram, were core ways for them to communicate. The use of these cyber tools aided in attracting over 20,000 foreign fighters from more than 10 different countries to flock to Syria to fight on ISIL’s behalf, and even more followers aided the organization from remote positions around the globe. In early 2018, New York Times’ reporter, Rukimini Callimachi, released a podcast by the name of “Caliphate.” The podcast goes into detail about one Canadian man’s experience of being recruited through multiple steps, starting on social media and eventually moving into private chat rooms. Callimachi’s reporting highlights how effective ISIL’s extensive reach was, not only technologically, but by simply creating effective connections with people, especially the youth.

Thus far, terrorists’ groups have not been able to do much more than the defacement of webpages and execution of minor cases of hacking. For example, a series of attacks in 2015, all claiming ties to Daesh, were executed in various countries. Most notably, a self-titled group called Cyber Caliphate managed to hack Malaysia Airlines’ main website, deface the French TV5 broadcast station, and hack the US military Central Command’s YouTube and Twitter accounts. Technology is continuously growing and it gets more sophisticated every year. As greater attention turns to digital recruitment and terrorism, these “small” attacks will grow larger in scope and harm. The possibility of cutting electric to hospitals or inciting mass riots through the spread of false media is very real and dangerous. The need to find adequate responses to the rising dangers of cyber terrorism is crucial to the future of counter terrorism. Perhaps most conspicuously, the important question becomes how to best be proactive in thwarting attacks and rather than simply being reactive.

The international community has a plethora of different third-party watch dogs when it comes to war and terrorism, whether they come in the form of global entities like the United Nations (UN) or International Non-Profit Organizations (INGO). In addition, a multitude of international treaties and agreements exist to set standards for war and outline what is not acceptable. The Geneva Convention, one of the most important and widely known, is comprised of four treaties and three protocols that establish standards for humanitarian rights and treatment during times of war. Yet, something these organizations don’t cover adequately is how to respond to cyber warfare and digital terrorism. One of the greatest challenges in dealing with these online threats is attribution, or ascribing blame to those who have committed the crime and proving it. According to a RAND Corporation video on the subject, they identify three main types of attribution: political (dealing with diplomatic knowledge and political actors’ objectives), technical (IP addresses, log file analysis, etc.), and clandestine (classified information and political insights).

Categorizing makes it easier to decide how to interpret the crime and, thus, how to assign punishment. However, it is not simple to prove digital crimes without access to data that, for the most part, is private, anonymous and not easily tracked. Citizens’ right to privacy and the level of privacy that is entitled has become a topic of high contention in the debate for higher cyber security. Although these are difficult issues to deal with, the international community needs to step up and begin to take action before cyber warfare reaches a level with much higher stakes. Like the UN, there needs to be a large international organization that can specialize in cyber security and cyber terrorism. It would require the nonexistence of any political affiliation to be effective and act on behalf of any country that requires its services to increase its credibility. Perhaps, most important, would be its role in providing international laws on cyber warfare and attacks to clearly and concisely build a foundation or framework for security agencies to work from. It would also be responsible for developing the mechanisms for freedom of expression and privacy; although this would most likely fall to the specific countries rather than the independent watch dog organization.

Social media platforms have done relatively well at combing through their users and content to locate possible terrorist activities, but this is not enough. Further action needs to be taken regarding regulation. Systems need to be devised to adequately monitor both the surface web content and the deep and dark web to locate, deter and respond to these threats before they can implement harm to critical infrastructures, governments, businesses, and even the psyches of viewers. Creating measures to regulate data and prevent data mining for terrorist activities is crucial to preventing the attacks in the future. There is no easy answer to the rising threat of cyber terrorism and warfare, but it’s imperative that solutions and international cooperation begins sooner than later.

The Mosul of Southeast Asia? Countering Extremism in the Philippines

Filipino and American forces shaking hands in September 2017. Image Credit: Cpl. Robert Sweet, U.S. Indo-Pacific Command.

The recent tension between the Philippines’ security forces and Islamic separatists has exposed the cultural, economic, and military inefficiencies of the central government in countering terrorism. Strengthening cooperation with the United States will help the government tackle these issues more effectively, helping them solve some of the coordination and collective action problems which currently plague their operations. By briefly covering the history of the conflict, stating who the major extremist groups are, and examining how they act, this article shall propose recommendations that can promote further cooperation to counter extremism, encourage more cultural and religious cohesion in civil society, and help break up the revenue-generating activities of terrorist groups in the Philippines.

The church bombing in Jolo on January 27th 2019, which killed twenty people, highlights the recent flare-up in tensions between Catholics and jihadist groups in the Mindanao region. This attack came just days after a referendum of autonomy was held in the area where the majority of citizens voted to approve the Bangsamoro Autonomous Region. The referendum was part of a deal between the government and the Moro Islamic Liberation Front (MILF) – an organisation that has been fighting for independence for decades.

The country has been a victim of these attacks before, all claimed by ISIL and its affiliates. On August 28th, 2018, an improvised explosive device (IED) tore through a festival in Isulan in the same region as the church bombings. On July 31, 2018, a bomb exploded in a van at a security checkpoint on the southern island of Basilan, killing ten and wounding eight. In 2017 a group of pro-Islamic State (IS) jihadists captured and held part of the city of Marawi in the province of Lanao del Sur.

Historically, the security and police forces of the Philippines have failed to deal with extremist groups active in the South Philippines such as Abu Sayyaf/ISIL, the Bangsamoro Islamic Freedom Fighters, and the Moro Islamic Liberation Front. The source of tension dates back to Islamist militancy in the 1970s, while groups such as ISIL relative newcomers to the region. IS, however, has yet to acknowledge the Philippines as an official wilayat, or franchise.

Despite this, dozens of groups in the Philippines claim allegiance to IS. They have even aided the Maute group – an ISIL affiliate – in seizing strategic parts of the city of Marawi on the 23rd May 2017 in a standoff with government security forces- causing 1,100 fighter and civilian deaths and the displacement of 400,000 people. The conflict subsided with the government’s evacuation of residents in the city and the subsequent bombing campaign. The execution of the two main jihadist leaders in the Philippines, Isnilon Hapilon and Omar Maute, ended the conflict but also created a hotbed for extremist activities that further destabilized the region. The Filipino military alone is ill-equipped to deal with these types of insurgent groups, facing a lack of capacity, poor coordination, and geographic obstacles in its struggle to fight extremism. Although one hundred US military advisers were on the field, in addition to US and Australian intelligence support, their combined strength was not enough to stop a credible, potent jihadist threat.

Marawi map.png

Map displaying the location of Marawi. Image Credit: BBC.

In 2015, the US ended the campaign of Operation Enduring Freedom – Philippines, which was formerly the largest counter-terrorism operation in Southeast Asia. Research shows that the presence of US Special Operations Forces (SOF) to train and equip, advise and assist, and contribute to civil/military information operations helped reduce the level of support for terror groups. The presence of US SOFs also improved the tactical and operational efficiency of the Philippines Security Forces. With an average presence of 600 SOF present in the Philippines between 2001-2014, this number has now plummeted by more than half. The latest news reported the US would increase the number of SOFs to 261 in joint military operations with Filipino security forces. In 2019, uncertainty surrounding the American presence in the Middle East also holds implications for the American presence in the Philippines, potentially threatening their battle against internal extremist forces. With planned withdrawals from Syria and Afghanistan and an overall laissez-faire approach to US military presence around the world, it is unclear whether the US will maintain or increase cooperation with the Philippines in areas such as counter-terrorism, maritime security, and humanitarian aid.

US presence in the region makes a significant difference. Recommendations to improve counter-terrorism strategies include targeted US involvement in maritime security to prevent IS-affiliated groups such as Abu Sayyaf from carrying out kidnap-for-ransom operations on ships going through the South China Sea. As of 2016, the group has raised around $7 million from kidnapping operations, using this money to finance further extremist activities. Maritime security can prevent these groups from conducting successful kidnappings and have a positive impact by helping the Philippines combat other internal challenges. For this cooperative relationship to operate well, the government must also form stronger partnerships with Malaysia and Indonesia to encourage intelligence sharing and patrolling of sea lanes, which they have already carried out through trilateral patrols. Moreover, strategic partnerships with Japan, South Korea, and Australia can help only with the US acting as a facilitator and leader on this front. Without this guidance, counter-terrorism strategies are much less effective. Careful communication and constructive cooperation might even help in convincing the US to re-establish its Joint Operations Task Force – Philippines to contain a potential rising terror threat.

For the IS, the Siege of Marawi was a propaganda victory which enabled them to extrapolate a local conflict into a larger Muslim-Christian sectarian war. Being able to hold the largest city in the southern region of the Philippines gave the group legitimacy in jihadist circles and enabled the recruitment of more foreign fighters from Indonesia and Malaysia. As a result, this development has lead to fears that the Philippines will become a hub for terrorists fleeing places where ISIL have lost ground, such as Iraq and Syria.

To counter this threat, the Filipino government must not only use military means, but religious and cultural ones as well. Research by DAI published in August 2018 showed how marginalization and discrimination were stronger predictors of violent extremism than poverty, social conflict, or corruption. The government of the Philippines should therefore strengthen its cooperation with civil society groups on the ground and encourage the development of more cohesive communities. The government has already put in place a policy that would include Muslims in the military. This can lead to more support from the local community, especially in the Mindanao region, and help create room for dialogue. Further policies, such as encouraging millenials with influential social media presence to spread the message of peace or strengthening the government’s deradicalisation programme, can go a long way to help bridge the differences within civil society and marginalized religious communities.

Dialogue can also be a constructive tool at the international level. A balanced tone must be struck, and Duterte must abandon the use of nationalist and inflammatory rhetoric against the presence of US troops. Effective diplomacy can encourage the American government to strengthen their relationship with the Philippines through continued humanitarian aid, technical military assistance, and engagement with local government, civil society, and ASEAN through Congressional delegations and non-governmental organisations. Efforts such as the adoption of the Langkawi Declaration on the Global Movements of Moderates in 2015, pushing for a more moderate political environment within the Association of Southeast Asian Nations (ASEAN), are steps in the right direction.

The Philippines must also follow up on lessons learned from training with the United Nations Office on Drugs and Crime and the Anti-Money Laundering Council to closely monitor the economic maneuvers of domestic extremist groups. It is already a member of the Asia Pacific Group (APG) on Money Laundering and is no longer subject to its monitoring process. However, the IS have been funding smaller extremist groups, including the Maute Group, which now engages in looting, kidnapping, and the illegal drug trade to finance their activities. As Duterte’s disastrous war on drugs has shown, it is wise to use means other than military force to combat illegal activities. To combat this problem, the US should not only strengthen trade cooperation with the Philippines, but also play an active role in setting up stable financial architecture in the region to counteract more illicit money-laundering operations, such as those by North Korea.

In order to tackle these extremist elements, the United States must increase its role in maintaining security in the region. Not only will this require action from the government of the US, but also NGOs, charities, private citizens, and Congressional influence are necessary to promote humanitarian aid and cooperation with civil society in the Philippines. Larger military and technical assistance will help promote maritime security and counter-terrorism on the ground. And finally, positioning as an economic power in southeast Asia will help both the US and the Philippines cut terrorist funding whilst at the same time developing a stable architecture and sphere of influence that could repel terrorist activities.

Returning Foreign Fighters: A Global Threat

As ISIS concedes its last remnants of territory, governments around the world must confront the return of foreign fighters from Iraq and Syria. These fighters present many issues as they now have combat experience, support networks, and knowledge that can be used to create devastation. To explore the threat that returning fighters pose to nations around the globe, this article will first discuss the fighters’ backgrounds, explaining why some countries will have a higher influx of fighters than others. Next, it will discuss what expertise these fighters bring. Finally, it will discuss the global implications of the fighters’ return.

Image source: The Soufan Center/Statista/Mike Nudelman/Business Insider

Many people around the world believe that the makeup of the Islamic State is predominantly males of Middle-Eastern nationality. This is not an unreasonable assumption, given that the primary theatre of group operations is in Syria and Iraq. However, its’ members nationalities are diverse. Since the group’s inception in 2013, ISIS has attracted those from every corner of the globe, from the United States to Russia. According to a study by the Soufan Center and the Global Strategy Network, thousands of fighters have already returned to Europe and other countries in the Middle East from the conflict in Syria and Iraq. Of the estimated number of foreign fighters that have joined ISIS, around 30 percent have returned to their home countries (EPRS, 2018). Collectively, over 1,000 trained ISIS fighters have returned to the United Kingdom, France, Germany, and Belgium (Meko, 2018). 900 have returned to their native countries of Turkey, 400 to Russia, and 760 to Saudi Arabia (Meko, 2018). However, these numbers only include fighters that have been confirmed to have arrived- so the actual number of returned fighters is likely much higher.

Foreign women and children are also playing a noticeably larger role. According to a report from the International Centre for the Study of Radicalisation at King’s College, approximately 41,490 foreign citizens became affiliated with ISIS from April of 2013 to June of 2018. Of this number, 13% were women, while 12% were minors. Women and minors accounted for approximately 23% of all British ISIS affiliates (Khomami, 2018). Like the men returning from conflict, each of these women and children may pose a major threat as well.

Fighters who have experience engaging in terrorist activities and operations in Syria, Iraq, and other countries in the Middle Eastern theater pose a serious threat for a number of reasons. First, through training and experience, they have mastered the use of weapons such as improvised explosive devices (IEDs), guns, vehicles, etc. They have learned an array of methods to inflict the maximum number of casualties possible. Second, these fighters will likely try to pass on their knowledge to others interested in committing acts of terrorism. Many areas throughout Europe have already become hotbeds of radicalization; for example, the Brussels suburb of Molenbeek has produced many Islamic extremists linked to terrorist incidents around the world, such as the 2015 Paris attacks. As hundreds (or possibly thousands) of foreign fighters return to Europe, they may target and train other radicalized individuals in places such as Molenbeek. There are many implications for European governments, who must take heed, prepare to apprehend these fighters, and prevent the spread of radicalization and training to at-risk populations.

Ultimately, the fall of ISIS in Syria will create an outpouring of foreign fighters. A proactive approach to apprehending these individuals is one of the best methods to prevent fighters from passing on their knowledge to others. Given the proximity of many countries in Europe to one another, it is easy for extremists to create international networks to facilitate attacks. By apprehending foreign fighters immediately upon their return, authorities can prevent them from galvanizing already-established networks in Europe- decreasing the likelihood of an effective, coordinated attack, and potentially saving hundreds or thousands of lives.

The Mysterious Case of Mohamad Jamal Khweis

Mohamad Jamal Khweis while in Kurdish custody. Image Credit: Associated Press.

Few in Alexandria, Virginia, would have suspected that the man driving a bus for the elderly would travel halfway across the globe to join the Islamic State (IS) and wage violent jihad. But this is the case of Mohamad Jamal Khweis, who went by the kunya Abu Omar al-Amriki while living in the self-declared caliphate. While the story of Khweis can be compared in some ways to others, not much is known about the actual path of radicalization he took in the lead-up to joining the IS. Khweis consistently lied and changed his story throughout his capture, interrogation, and trial, forcing officials to play a guessing game. What is known about Khweis’ case is analyzed here.

Khweis grew up in the suburbs of Washington, D.C., graduating from Edison High School in Fairfax County in 2007. As the child of two Muslim immigrants from the Middle East, Khweis grew up attending mosque. However, according to his parents, he was not particularly religious growing up. After high school, Khweis got a job as a bus driver for the elderly and disabled. He drank and smoked cigarettes, not activities associated with a devout extremist.

However, something happened between 2007 and 2015. Khweis lied to family and friends in late 2015, a month after the IS attacks in Paris, when he began scheduling travel to Europe. In mid-December Khweis travelled to London before making several stops across Europe en route to Turkey. In Turkey, scheduled contact was made with an IS facilitator who directed him, along with several French would-be jihadists, across the Turkish border and into Syria.

Upon arrival in Raqqa, which was under IS control at the time, Khweis underwent religious training and began work doing miscellaneous household tasks for caliphate fighters. According to documents discovered by forces combating the IS, during this time, Khweis indicated that he was willing to become a martyr by utilizing himself as a suicide bomber for the caliphate.

After months of cooking, cleaning, and taking out the garbage, Khweis grew increasingly frustrated by his lack of military training. Throughout his time in the caliphate, Khweis was also routinely ill from consuming poor-quality drinking water. These factors, and possibly more, combined to make his frustrations unbearable. When Khweis was relocated to IS controlled territory in Tal Afar, Iraq, he made an “escape.”

Kurdish Peshmerga forces discovered Khweis walking alone, and after it was confirmed that he was not a suicide bomber, he was taken into custody. When Khweis was captured he carried several hundred dollars in Iraqi and Turkish currencies, three cell phones, and his Virginia driver’s license. At first, Khweis stated to his captors that he had been deceived by a female he met in Turkey into coming into Syria and essentially becoming a slave; however, this story quickly fell apart. Peshmerga forces were able to contact American authorities to inform them of Khweis’ presence, and he was quickly transferred to American custody. In American custody, Khweis changed his story over 15 times between intelligence interviews and criminal investigation interviews.

Even so, authorities obtained enough information to levy criminal charges. Lawyers representing Khweis argue that this was unfair, and that Khweis gave false information to investigators out of desperation to return to the United States. However, many indicators disprove this- including signs of remaining loyalties, such as Khweis’ refusal to identify or provide any information on Americans he knew who had also joined the IS. Throughout his criminal trial, Khweis again changed his story multiple times, at times even indicating that his time in the caliphate was a mistake made after a night partying in Turkey.

Extremist propaganda was discovered on Khweis’ cell phones after capture, but once again eluding to his own radicalization, Khweis stated that the propaganda was only on his devices because he was conducting research into life in Syria. It is unclear if he was radicalized by online propaganda like so many others. There has not been any mention of other radicalized individuals whom Khweis may have been in contact with in the United States. Ultimately, there is no strong evidence to suggest how Khweis fell towards extremist ideology.

Although a clear path towards radicalization cannot be observed due to Khweis’ lack of cooperation, some comparisons can be made to other cases of radicalization. First, Khweis was the child of Muslim immigrants, growing up in the United States in the wake of 9/11. This time challenged many young Muslims, leading many to seek answers about their identities. It was also a time which caused notable marginalization, or at the very least perceived marginalization, of Muslim communities in the United States.

Circumstantial evidence would suggest that Khweis was vulnerable to radicalization due to his perceived marginalized position in American society. As a child of Muslim immigrants in post-9/11 America, Khweis certainly grew up with various forces pressuring him and challenging his identity. While not much more can be properly guessed about what exactly occurred along Khweis’ journey, his uncooperative nature and refusal to provide information about other American jihadists belies the fact that he likely remains radicalized. Fortunately, his 20-year sentence for providing material support to the IS will provide critical time that may lead to more cooperation and insight into his beliefs and radicalization process.

 

John Patrick Wilson is a Law Enforcement Professional and Research Fellow for Rise to Peace.

Countering Extremism in the Digital Age

Source: Rand Corporation (2016) 

The Global War on Terror has challenged Western conceptions of warfare. The days of clearly defined winners and losers amongst nation states, as seen in the world wars, are largely in the past.

Tomorrow’s winners and losers will be defined in much more blurred terms as ongoing battles of information and communication seek to win over the hearts and minds of people around the world.

The State Department has acknowledged that for any legitimate success to occur in the fight against terrorism, countering the propaganda of extremist groups like the Islamic State (IS) is critical. While entering the fight in the war of information is a massive step in furthering counterterrorism efforts, the State Department has not yet taken the steps necessary to match the surging campaigns of extremist networks, particularly IS.

The State Department first officially began this type of counterterror operation with the creation of the Center for Strategic Counterterrorism Communications (CSCC). The CSCC was active on social media, directly challenging IS profiles with counter-messaging while conducting various media campaigns such as ‘Think Again, Turn Away’.

Conceptually these were reasonable strategic maneuvers that attempted to challenge the cyber prominence of the IS’s media strategy as well as online recruitment efforts. However, what came to be considered tit-for-tat online trolling between low-level jihadists and the United States government likely emboldened and legitimized the IS.

The State Department would go on to restructure the CSCC, creating the Global Engagement Center (GEC), which is also tasked with addressing social media activities of nation states such as Russia. The GEC however is experiencing similar issues in conjunction with reported limited staffing and funding.

The IS media strategy has often been simplified by Westerners in an effort to de-legitimize the IS as a whole. However, this has led to a fundamental separation between our understanding of the IS propaganda campaign and the means by which we counter it. In order to truly combat a propaganda campaign, its purpose, narrative and mission must be understood.

Once these elements are comprehensively understood, a counter-narrative strategy must be implemented rather than a counter-messaging strategy. A successful counter-narrative strategy must address issues to include factors that IS relies on to recruit vulnerable individuals to their ranks: desires for purpose and belonging. A counter-narrative campaign must also be inclusive of the Muslim faith, understand local cultural concerns, and be conducted in a way that does not appear to be dictated by the West.

The CSCC did re-post relevant material from news outlets in the Arabic world in an effort to appear more representative of local cultures, as opposed to speaking purely as an American source. Beyond the limited scope of the CSCC and GEC efforts, several governments now deny terror networks a platform to circulate their propaganda.

This strategy places pressure on social media platforms to promptly delete extremist content and profiles. This strategy does slow the spread of propaganda, but does not provide a counter-narrative to what these groups are using to recruit and draw sympathy.

The State Department’s GEC has implemented one significant upgrade from its predecessor: one of the GEC’s core competency areas, ‘partnerships’, has the GEC develop partnerships with organizations, religious leaders, and community leaders to help engage with those at risk of becoming radicalized or to help those who are already.

One recommendation for a counter-narrative strategy proposes that the narrative must portray the IS as manipulative and as a failure, as opposed to promoting the often-observed idea that the group is tremendously dangerous. Any successful counter-narrative campaigns must be directed towards specific sub-audiences of those vulnerable to radicalization or those radicalized who are vulnerable to being deradicalized.

The IS has been the latest international terror network to capitalize on the ease of using the internet to communicate propaganda. Terror networks have become adept at using the internet to accelerate the radicalization process, share ideals, and develop support networks across the globe, all while remaining largely uncontested by the governments of the world.

The State Department must conduct systematic changes in the near future if there is to be hope for success in this war of ideas.

First, the State Department must see an increase in staffing to properly manage the overwhelming load of work that comes with fighting international terror propaganda on the internet.

Second, incorporating community and religious leaders will be essential to foster an image that this is not a counter-narrative strategy dictated solely by the United States government.

Third, the GEC, in conjunction with these community and religious figures, must jointly develop the counter-narrative strategy.


John Patrick Wilson is a Law Enforcement Professional as well as a Research Fellow at Rise to Peace.