Security

Online information flow dismantles terror cells

Social media pages of extremist group members serve as a tool for counterterrorism agencies to target them directly.

Members of the FBI Joint Terrorism Task Force search a home in Dearborn, Michigan, on October 31. The agency had thwarted a potential terrorist attack planned in Michigan over Halloween weekend. [Jeff Kowalsky/AFP]
Members of the FBI Joint Terrorism Task Force search a home in Dearborn, Michigan, on October 31. The agency had thwarted a potential terrorist attack planned in Michigan over Halloween weekend. [Jeff Kowalsky/AFP]

By Anas al-Bar |

The flow of sensitive information on social media platforms has increasingly contributed to the identification and capture of some of the most dangerous extremist groups.

By analyzing digital content such as images, videos, and documents, counter-terrorism efforts gain valuable open-source intelligence that aids in arrests and the dismantling of terrorist networks.

Members of the "Islamic State of Iraq and Syria" (ISIS) and other terrorist organizations use online accounts to spread extremist ideology, select targets, and coordinate attack plans.

These groups use social media to provide bomb-making guidance, weapons training, attract lone actors, and enable mobilization, while spreading fear-driven propaganda on a large scale globally.

Precise targeting of cells

However, their attacks are increasingly unsuccessful because of intensive infiltration efforts targeting their operations and digital systems.

Terrorists are unwittingly helping intelligence and counter-terrorism efforts by providing information that allows security agencies to conduct precise targeting of their cells and hideouts.

"Extremist groups often walk into traps," said Raad al-Dulaimi, an Iraqi researcher specializing in media and terrorist groups.

"The sharing and posting of content that incites violence or terrorism leads to the placement of its content providers under surveillance by intelligence agencies," he told Al-Fassel.

"Despite precautions, encryption programs, and anonymity techniques, they remain vulnerable to tracking and capture and ultimately cannot escape justice," he added.

"The abundance of information provided by in-depth and technical analyses of propaganda materials and terrorist postings, helps investigators and experts uncover complex ties and connections," al-Dulaimi said.

"It also allows for linking events and incidents together or cross-referencing data with forensic evidence and information taken from crime scenes or confessions from detainees in investigations."

Extremist network busted

Al-Dulaimi pointed to the November 5 dismantling by US federal authorities of a "complex extremism network" that operated online for ISIS.

Two youth were arrested in New Jersey who were in communication with other members in Dearborn, Michigan, running a recruitment cell for the group across several US states via encrypted platforms.

Before its dismantling, the cell was preparing to carry out an attack on Halloween.

ISIS propaganda and incriminating text messages indicating their intent to conduct attacks inspired by the group, were discovered on the phones of its members.

International intelligence efforts have succeeded in disrupting several secret ISIS online networks.

On October 4, Turkish authorities have uncovered a secret online network used by ISIS.

The cell was training children aged 14 and 15 in bomb-making in closed chat rooms.

Do you like this article?


Comment Policy