Metaverse

Terrorism in the Metaverse: How Extremist Organizations Penetrate Burgeoning Spaces

For as long as new technology has emerged, governments have struggled to keep up with their use by extremist organizations. Such organizations utilize these spaces because it allows them to access platforms where global youth congregate, and it is an opportunity to disseminate their ideals. With current technological trends, the way in which we communicate will undergo several iterations with each new development in computation power and integration of platforms. One of the most salient technologies which has a large potential to be popular in the latter decades of this century is the metaverse. While still in its infancy and undefined, policymakers must understand what it is and how terrorists have used technology in the past.

Terrorism and Technology

In the decades prior to the advent of the internet, terrorist organizations had fewer options for making their presence known to an international audience. They also had a far more limited means of recruitment since their organizations were not well known outside of the region or state in which they conducted operations. In order to truly bring attention to their aims, these groups had to do something drastic which would break into popular newspapers and widely circulate. During this era, the most popular ways to accomplish this include hijackings, bombings, or assassinations. One of the best case studies for this period is the 1977 Dutch Train Hijacking.

The Moluccans had a long history with the Dutch as they were under colonial rule and aided their interests in the Dutch East Indies. This relationship continued after the Second World War when the Dutch promised them their own state in exchange for armed cooperation against the Indonesian rebellion. After the conflict, the Moluccans did not receive any of the state’s promises, and those who served in the Royal Netherlands Indies Army (KNIL) immigrated to the Netherlands in 1951. Those who grew up in Holland felt betrayed by the Dutch, but they had the misfortune of being a small minority advocating for a hypothetical state in a geographically isolated island chain. This desperation resulted in hijacking a train and taking over a primary school to advance their political aims. The incident was endemic to that era of terrorism.

However, the true paradigm shift in how terrorists interacted with media occurred years prior during the 1972 Munich Games. The games were meant to bring about a new chapter in German history and signal to the world that they had moved past their dark history. Members of the terrorist group Black September planned to take Israeli hostages in exchange for the release of over 200 Palestinians held by Israel. This marked a clear demarcation from tactics of this era as they chose an event where the world’s media gathered to cover the games. Moreover, the event also solidified an internationalization of terrorism which had commenced when hijackings became transnational rather than solely domestic.

As the Munich attacks lasted for ten days, terrorists began to see the power technology could have on furthering their aims. The next development in how terrorists utilized emerging technologies was during the 1990s, when extremist groups took advantage of the emerging 24-hour news cycle and the proliferation of primitive websites dedicated to their content. The estimated number of terrorist-centric websites was limited during this period, but it highlights their determination to use any new medium to gather attention and facilitate recruitment efforts. During the past two decades, extremist organizations have made use of social networks to radicalize individuals to commit attacks. Furthermore, ISIS was found to upload thousands of videos onto YouTube over a three-month period.

What is the Metaverse?

While terrorists have been quick to adapt to technological advances and evolutions, it is crucial for policymakers to understand what the Metaverse is. Defining the metaverse is difficult in the present moment as the concept is in its infancy. As Facebook changed its name to Meta, it showed a glimpse of what the metaverse could be. While initially describing the applications it intends to create, the metaverse will likely include a wide variety of technological trends to converge our digital lives with our real lives.

Many platforms will likely integrate various aspects of their services to change the way we communicate and engage with content. As this occurs, the generations who will grow up with this technology will be increasingly isolated with the amount of time they will spend in the metaverse and will be preyed upon in these spaces by extremist organizations. It is also possible that spaces in the metaverse could become a hub for cyber-terrorism and disinformation through the advancement of deepfakes.

What Stakeholders Can Do

The metaverse will likely not reach maturity within 2022 but rather in 5-10 years from now when the first immersive iterations will have the full capabilities which tech experts have envisioned. While the functionality of the metaverse is not yet at full capacity, there can be steps taken to address this emerging challenge concerning state security.

A way to stay ahead of the challenges of the metaverse is investing in researching the technologies comprising the metaverse. Governments will also need to strengthen bonds with the private sector to mitigate the influence of extremist groups on the platform. Taking such steps will ensure that the next evolution in communication and entertainment will be a space bereft of extremist content.

 

Christopher Ynclan Jr., Counter-Terrorism Research Fellow

Do Cryptocurrencies Provide Opportunities for Terrorist Organizations?

Bitcoin and other cryptocurrencies were once considered as fantasy rather than a viable method of exchanging goods and services, but today many companies — even countries like Saudi Arabia — have adopted forms of cryptocurrency. Even average citizens have embraced the use of Bitcoin in everyday transactions.

In Lebanon, where COVID-19 has exacerbated the economic crisis and caused drastic inflation, there has been a demand for cryptocurrency as a stable alternative to the Lebanese pound and a possible means to avoid government defaults. The Lebanese government has no regulatory laws regarding cryptocurrency, but has issued warnings against its use — the Lebanese Central Bank advocates for its use to be illegal. However, independent crypto-traders estimate the Lebanese population trades between one to five million USD a month using cryptocurrency.

As the utility of cryptocurrencies rise in countries like Lebanon, Hizballah and other terrorist organizations may adopt its use. Additionally, cryptocurrencies are coming under scrutiny lately for their perceived anonymity and how terrorist organizations could exploit the features of digital currency to bypass sanctions and current counter-terrorism finance initiatives. But what are the threats of cryptocurrency to counter-terrorism efforts, is there evidence of their use, and do they provide real utility over traditional finance methods to terrorist organizations?

Cryptocurrency offers terrorist organizations a possible route for anonymous, secure, and reliable streams of funding. They offer anonymity that hackers have used for years as a part of ransomware cyberattacks, as sending, receiving and converting money to Bitcoin does not require the use of a legal name or address. This feature, in combination with a virtual private network (VPN) to hide the user’s true Internet Protocol (IP) address, gives hackers and others anonymity in accessing funds that are not routed through banks.

Cryptocurrency, especially bitcoin, provides security of transfer through encryption and blockchain technologies that drastically limit the potential for hackers to steal funds or the recipients information. While reliability would depend on the donors to terrorist organizations, the characteristics of cryptocurrency provide some incentives to those donors.

The benefits are also incentivizing states to invest in cryptocurrency. Iran, facing economic pressure from US sanctions, has seen a surge in bitcoin popularity — much like Lebanon. While bitcoin is technically illegal in Iran the state is reassessing the ruling and is likely to change. Additionally, Iran is currently planning for the creation of a national Iranian cryptocurrency to bypass US sanctions and embargos.

Yet with all the positive aspects of cryptocurrencies, the evidence suggests that terrorist organizations are not using them on a large scale. Hamas uses some bitcoin but it uses far less cryptocurrency than the average for the civilian population of Gaza. And while Randa Slim (the Lebanese-American director of diplomacy programs for the Middle East institute) thinks that Hizballah has the most to gain from adopting bitcoin usage, there is no evidence to suggest they have begun using it.

The RAND Corporation has examined why non-state actors have not emphatically embraced cryptocurrencies, but subsequently issued a warning for future developments. RAND agrees that while there is an increasing need to understand the full potential of cryptocurrency exploitation by terrorist organizations, that concerns over the abilities of cryptocurrencies to enable terrorist organizations, have yet to materialize. This is because cryptocurrency does not yet provide additional benefit to the areas where terrorist organizations place the most importance in procuring funds than their traditional methods.

The table below (sourced from the RAND report) shows the levels of importance for the most common aspects of terrorist finance, of which security is of the most importance. While cryptocurrencies like Bitcoin are relatively secure, RAND posits that current cryptocurrency options do not currently provide the security that these highly scrutinized organizations need. However, future improvements to bitcoin could make it appealing to terror organizations for the select use of fundraising.

Source: Rand Corporation

As the economy evolves, and includes continually improving cryptocurrencies, so does the potential for terrorists to adopt the technology. Technological advancement cannot be prevented, but policy that creates regulation and oversight of cryptocurrencies with international cooperation of the intelligence community and law enforcement agencies are crucial steps towards preventing cryptocurrencies from enabling terrorist organizations.

– Cameron Hoffman

  • Clarification: According to Bitcoin vocabulary, it is acceptable to use an uppercase B when discussing the concept or network and a lowercase b to describe a unit of account. This is relevant to the textual differences in the above analysis.

Drone Technology and Its Malicious Use by Terrorists

Emerging technologies may offer recognised benefits, but they pose threats to national security also. A case in point are unmanned aerial vehicles (UAVs) — one of the most common examples of dual-use technology.

Drone technology refers to a pilotless aircraft whose operation is based on a combination of technologies, such as artificial intelligence and computer vision. Although initially developed for military purposes, drones now receive wider attention and use.

Over the past few years, UAVs have been used by various businesses, including refining companies, online marketplaces, broadcasting services, airlines, construction and logistic companies in addition to governmental and defense organisations. Therefore, from timely delivery at peak time and geographical mapping of inaccessible regions to border control surveillance and supervision of unreachable military bases, drones are proving to be highly beneficial for a broad range of sectors.

However, alongside the aforementioned businesses and governmental organizations, drone technology has had a beneficial effect on terrorism as well. More specifically, newly affordable prices and growth in popularity have attracted the attention of a number of terrorist organisations, including Hezbollah and the Islamic State of Iraq and the Levant (ISIL).

Hezbollah has paved the way for the extensive use of drones by non-state groups. Indeed, the Lebanese militant group is reported to have the longest-standing and most advanced drone program of any non-state actor. It is believed that most of its drone fleet was supplied by Iran which has been developing its drone program since its war with Iraq.

Over the past decade, Hezbollah has made a great deal of progress in the acquisition of highly sophisticated UAVs. They have exploited them to gain useful intelligence and to intercept poorly encrypted Israeli drone feeds. Consequently, the Hezbollah drone program poses a constantly growing threat not only to Israeli security, but also to other non-state combatants.

Similarly, the Islamic State’s use of drones is developed to the extent that it can be described as a ‘drone program’. However, ISIL differs from other terrorist groups in that it has exploited drone technology in a more creative manner. Focusing more on acquiring simple, cost-effective and replaceable devices, they managed to build their own drone fleet.

Another point that sets apart the Islamic State’s drone program is the emphasis put on drone imagery. Rather than just weaponizing drones to conduct an attack, ISIL has strategically used the ability to capture aerial photos that later become central components of its propaganda machine.

In the light of the significant and rising threat posed by the possession and malicious use of drones by non-state actors, several companies were prompted to come up with technologies able to bring them down. These include electronic fences which block drone signals and drones equipped with nets which can capture enemy drones. However, additional measures should be implemented in order to prevent terrorist groups from having access to such technologies.

It is clear that alongside the tremendous benefits, drone technology also involves a direct threat to national security. Although they were first developed for military purposes, the ever-increasing commercial use of drones has also enabled terrorist groups, such as ISIL and Hezbollah, to acquire or even to manufacture their own drone fleets.

The Continued Impact of Technology on Terrorism

Technology has greatly evolved in the past decades to the point that it is fair to speak of a technological revolution. Mobile phones, personal computers, and the Internet are commonplace in everyday life. More specifically, the evolution of information and communication technology has radically changed not only the way people communicate, but also ways of thinking and understanding complex matters.

Notwithstanding the recognized benefits of new technologies, there are concerns regarding their dual use. Recent events demonstrate that technological developments have been misused by non-state actors, such as terrorist groups. In fact, many terrorist organizations have been quick to exploit rapid technological advances to aid in the manufacture of weapons, ammunition and explosives. The use of military technology by such groups is one of the most severe threats currently faced worldwide.

However, developments in the information and communications technology (ICT) sector are even more alarming. Indeed, the use of digital and Internet platforms and their possible misuse by terrorists requires significant attention in any discussion focused on the topic. Social media platforms, Internet forums and online messaging applications have undoubtedly become terrorist propaganda mechanisms.

The use of information and communication technologies as tools for radicalization and recruitment is now common. Many terrorist organizations have managed to build a vast, sophisticated network of supporters from all over the world. Moreover, such technologies provide a major source of inspiration for lone actor terrorists who either have attempted or successfully carried out attacks after watching live-streamed attacks or speeches by leading members of terrorist groups inciting people to commit violence.

Planning an attack is now much easier as there are websites that provide all the necessary information about means and methods. These sites are easily accessed by the public thus permitting would-be terrorists to download instructions, such as those related to bomb-making, from the Internet.

In addition, digital technology has influenced the media. Changes in media technology have enabled terrorists to easily disseminate their message to wider audiences. Violence may instill fear, but live images attract the attention needed to cause widespread reaction, influence public opinion and mobilize moderates around the world. For years now, terrorists avail themselves of the ability to broadcast live on television.

Real-time TV coverage of an attack helps terrorist organizations to achieve their objectives: promotion of their cause to the widest possible audience, incite fear in the intended target audience and recruitment of new members. In some cases, the over-coverage of such events may unwittingly exacerbate the problem, instead of simply providing information to the public. It is therefore important that journalists avoid the further incitement of already present public fear and the over-emphasis of the motives behind an attack while reporting on terrorism.

In their attempt to prevent terrorists from exploiting digital platforms, leading tech companies cooperate with law enforcement for counter-terrorism purposes. In this sense, working closely with counter terrorism officers and security experts, social media companies improved their ‘takedown’ policies, weeding out an enormous number of accounts with the aim to reduce or even eliminate terrorists’ presence on technology platforms.

Furthermore, law enforcement authorities have also intensified monitoring of the contents disseminated online in order to detect and remove terrorist propaganda. In fact, a new technology able to automatically detect terrorist content on any online platforms and stop it before it ever reaches the internet has recently been developed.

To sum up, while technology continues to evolve rapidly, technology and media companies should work together with the competent authorities to combat terrorism and to prevent terrorist groups from recruiting new members. Although the public has the right to be informed on matters of public concern, media professionals should be particularly vigilant when it comes to the coverage of terrorism issues. They should aim at keeping the public informed without offering terrorists the publicity they seek.

In addition, as long as terrorists exploit new technological developments and online technologies, counter-terrorism authorities must detect and delete any online material that promotes terrorism or encourages violence. It is therefore essential that everyone collaborate in order to address this global challenge.

Drones: Weapons of Terror?

Yemen’s Houthi rebels have taken responsibility of the drone attack on Saudi Arabia’s state-owned oil sites in Abqaiq and Khurais. These strikes have escalated tensions in the Middle East. Sources report that 5 million barrels a day of crude oil production were impacted; this impacted the half of Saudi’s output or 5% of the world’s output.

The Houthis claimed that the attacks were in retaliation of the years of airstrikes on its citizens and they will continue to expand their targets. They carried out the attacks via 10 drones. The claims of the Houthis have been challenged by the US, which continues to state that Iran orchestrated the attacks. Iran has vehemently denied involvement and warned the United States it would retaliate “immediately” if targeted over the attacks.

This is not the first instance of the use of unmanned aerial vehicles (UAV)/drone technology by extremist groups. ISIL has made the most of advances in the field of drone technology. While organizations like Hamas, Hezbollah and Jabhat Fatah al-Sham have their own drone programs, it took these groups a considerable time to apply the drone technology in conflict situations. Compared to the slow adoption by other groups, the Islamic State adopted drone technology exponentially. This can be partly attributed to the development, availability, and commercialization of the technology. The application by ISIL involves a modification of the existing drone’s design or even constructing them from scratch once the basic blueprint from the commercialized drones is available.

ISIL’s first use of drones was for reconnaissance purposes. By September and October 2016, they had managed to weaponize the drones by attaching explosives and releasing them on the intended target. The first recorded incident was in October 2016 when two Kurdish Peshmerga soldiers were killed, and two French special forces soldiers were injured after a drone they were inspecting exploded.

A 2017 report provides detailed insight into the ISIL drone program, identified separate centers for training, weaponization, modification, and maintenance, as well as the existence of a center for storage and distribution. Owing to ISIL’s sophistication, each of these centers, based in Raqqa, also had their own separate command structure.

The Taliban has also used the drones in recent years. Much like other groups in the region, the use of drones has been mostly for surveillance, there not many reports of the Taliban using weaponized drones against its opposers. In October 2016, they released drone footage showing a suicide bomber driving a Humvee into a police base in Helmand province, the largest province in Afghanistan.

In the latest reports, Taliban insurgents in Afghanistan have been using unmanned aerial vehicles to monitor US troops, and their coalition partners in Afghanistan, Air Force Research Laboratory official Tom Lockhart revealed.

Outside the Middle East and Central Asia, drones have also been used in Central America. In August 2018 Venezuelan President Nicolas Maduro said he escaped an “assassination” attempt that used an explosive-laden drone after a live broadcast showed him being escorted away by his security personnel when a bang went off during a Caracas military parade. His government said seven soldiers were wounded in the incident.

The easy access, affordability of drones, and the modifications they can undergo, make them a tricky technology to tackle. While it is the militarized drones grab headlines, the real value of UAVs lays in surveillance, according to Paul Scharre, a senior fellow and director of the technology and national security program at Center for a New American Security (CNAS). Small, cheap drones can stay in the air for a considerable amount of time. The military drones are used to get a better view of the battlefield and gain a tactical edge on opponents. That is true for extremist groups as we saw in the example of the Taliban.

Militarized drones, the kind probably available to groups such as the Houthis, are heavier and can carry several pounds of explosives at speeds up to 160km/h with a range of 650km. They have an immense tactical advantage as most can fly lower than current technology is capable of detecting, which was the case for the drone strike at the oil sites.

Countering drone attacks may lie in jamming the communication links that allow them to operate.  Drones generally rely on a GPS or radio link to a human controller, which can be blocked or hijacked. This seems like a good strategy for a conflict zone, but jamming communications in a typical civilian setting, like at an airport, can have more devastating consequences.

Whether the responsibility for the attacks lies with the Houthis or Iran, the attack on Saudi oil sites has demonstrated the difference in the adaptability of the drone technology and the lack of a fitting defensive technology.

Image Credit: Forbes