Headlines
  • False or misleading informations are spread by organizations posing as legitimate media outlets in an attempt to twist public opinion in favor of a certain ideology.
  • On social media,watch out for fake messages,pictures,Videos and news.
  • Always Check Independent Fact Checking Sites if You Have Some Doubts About the Authenticity of Any Information or Picture or video.
  • Check Google Images for AuthThe Google Reverse Images search can helps you.
  • It Would Be Better to Ignore Social Media Messages that are forwarded from Unknown or Little-Known Sources.
  • If a fake message asks you to share something, you can quickly recognize it as fake messege.
  • It is a heinous crime and punishable offence to post obscene, morphed images of women on social media networks, sometimes even in pornographic websites, as retaliation.
  • Deepfakes use artificial intelligence (AI)-driven deep learning software to manipulate preexisting photographs, videos, or audio recordings of a person to create new, fake images, videos, and audio recordings.
  • AI technology has the ability to manipulate media and swap out a genuine person's voice and likeness for similar counter parts.
  • Deepfake creators use this fake substance to spread misinformation and other illegal activities.Deepfakes are frequently used on social networking sites to elicit heated responses or defame opponents.
  • One can identify AI created fake videos by identifying abnormal eye movement, Unnatural facial expressions, a lack of feeling, awkward-looking hand,body or posture,unnatural physical movement or form, unnatural coloring, Unreal-looking hair,teeth that don't appear natural, Blurring, inconsistent audio or noise, images that appear unnatural when slowed down, differences between hashtags blockchain-based digital fingerprints, reverse image searches.
  • Look for details,like stange background,orientation of teeth,handsclothing,asymmetrical facial features,use reverse image search tools.

More Details

Terrorism, Cryptocurrency and Social Media

By Saron Messembe Obia

One of the major dynamics of the Internet is its ability to connect physically distant people, with different profiles and those with common job description, and educational lane. This global connectivity on the cyberspace, allows people to easily connect and interact with the use of social applications, which help public and private sectors reconfigure their systems, as most develop and control technical and logical infrastructure via internet. However, the technological evolution era changed traditional policing paradigm, as territorial demarcation and effective control to maintain state sovereignty. State authorities are now encountering security breach in which the conventional ways of working are often not effective, due to new criminal techniques on the cyberspace. 

The anonymity offered by Internet acts as a defensive tool, to expose human rights violation on activists and journalist, who take risks in order to protect freedom of expression, and battle against government overreach. However, the internet, is continuously exploited by terrorists and violent extremists to avoid detection, help map out terrorism spots, and as well recruit for terrorist activities. For example, “echo-chambers” describe the phenomenon where online community on social media platform embrace new ideas and opinions which reinforce their own beliefs at the expense of alternative or dissenting messages. Similarly, “filter bubbles” occur where search engines or social networks use algorithms that personalize search results or newsfeed content based on an individual’s location, browsing history, returning search results with which the person is likely to agree with. This tools have changed the ‘game’, as terrorists are increasingly exploiting online platforms for anonymous communications, coordinate cyber-attack and even map out potential spots (using google earth).

Security issues relating to the internet.

The Surface Web is the most visible part of the Internet and its content is comprised of anything that can be accessed through a link without additional security credentials. Information usually contained in the surface web has been indexed by conventional search engines such as Google or Yahoo! Search, and is accessible via standard browsers such as Chrome or Firefox, and it accounts for about 2% of online content.

The Deep Web content is not accessible through a link, because the content has not been indexed by the search engine, and access requires additional security credentials. The Deep Web constitutes online information such as emails, and files stored on cloud services which does not require security credentials. Deep Web is usually access on standard browsers such as Chrome or Firefox, and it accounts for 98% of online content.

The Dark Net is part of the Deep Web which is used for criminal purposes, and which cannot be accessed using standard browsers. Instead, accessing data in the Dark Net requires special software such as TOR and VPN. Content on the Dark Net accounts for only about 0.03% of online content.

Cryptocurrency syndrome warrants states to develop mechanism in order to counter the exploitation of this financial service by cybercriminals and terrorist organizations against states and local communities. Social media platforms are increasingly involving in to cryptocurrency in order to grow their businesses and limit the costs of financial transactions. 

Anonymous online services 

The age of technological evolution, though a bliss for the world, is also a strategic menace for authorities to gather pertinent information relating to judicially-sanctioned criminal investigations. Social media platforms such as secure messaging apps, online video sharing, service enabling anonymity during online browsing and as well offer secure platforms from which violent extremist content can be easily disseminated and creation of enormous volumes of communication flow, thus allowing terrorists to hide among the heavy traffic. Some of these services which can be exploited for positively and as well negatively reasons are but not limited to. 

Virtual Private Network (VPN) is a well structured service which allows users to hide their location and activities, by connecting to a server’s IP address in another country, making it appear that they are operating from multiple locations. For example; a software like Hide My Ass, allow users anonymity on the Internet, help to circumvent geographical restrictions and websites blocked IP addresses and to protect personal identity.

The Onion Router (Tor) is a free and open-source software enabling anonymous online browsing. Tor restricts or prevent a user’s location and usage from traffic analysis and network scanning by directing Internet traffic through a worldwide. The software is also used to protect personal privacy of its users, as well as to prevent monitoring of online communications.

Though the internet is incorporate by legit software and services which protects the rights to privacy and freedom of expression of users, such services are increasingly a global menace when exploited by criminal networks and terrorist purposes (when used to incite violence, promote radicalization and extremism ideology). More so, terrorists exploit online platforms to influence mainstream media coverage. Many of these communication channels are produced in a highly professional multimedia format.

Social Media and Terrorist activities

Social media are interactive online forum which facilitate the creation and sharing of user-generated content, data, ideas, interests, and other forms of expression within virtual communities and networks. Social media platforms facilitate the development of online social networks by pulling attention to propaganda, allowing easy sharing of such information, and by enabling users to find other individuals or groups with common interests. About half of the world’s population are connected to social media platforms (Our World in Data, September 2019), as these online communities facilitate communication around the world. Social media platforms have similar features, but enable users to create a user profile, sometimes with personal information such as location, occupation, political and religious affiliations, and then to form networks with other users of the platform. Today these networks are exploited for criminal purposes by terrorists and violent extremist groups.

Use of Social Media for Terrorist purposes

Social media platforms are increasingly used by terrorist and violent extremists for disseminating propaganda, which lead to the endorsement of jihadist tendencies by youths radicalized by videos, books and some motivated by cyberattacks perpetrated by flag bearers, as elaborated below:

  • First contact: recruiters thrilling post online on social media platforms, appealing for sympathizers and vulnerable individuals.
  • Create micro-community: recruiters appeal on flag bearers (jihadists or terrorists) to interact with each other, share content online, expand the crusade (terrorism and global jihad) and restraint from individuals who do not subscribe to their ideology.
  • Use of private communications: recruiters lull flag bearers in to private chat rooms which cannot be monitored by security agency.
  • Violent extremism/terrorism hit: recruiter identify potential hit to be perpetrated by new member, after sending the individual instructions, and similar missions by other flag members. Terrorist groups also social media activism, either activist tweet or retweet messages.
  • Jihadist tendencies and Terrorist attack: after the above, the jihadist can lead terrorist attack either on soft or hard target.

Case studies of terrorist attacks prepared through messaging apps:

  • WhatsApp case    

In 2017, Khalid Masood reportedly used WhatsApp to announce his motives before the Westminster attack in the United Kingdom. ISIL/Dash claimed responsibility for the attack, revealing that guidance and support for the attack was provided via messages.

In April 2017, the brain behind the Stockholm attack reportedly used WhatsApp to exchange messages with an ISIL/Daesh flag bearer before and after the attack. Jihadists usually share messages on how to manufacturing of an explosive device and a confession of the perpetrated attacks.

  • Telegram

ISIL/Daesh most used application is Telegram. The group, through her crusade, encouraged supporters and members to adhere to the application, which in October 2015 the number of followers of their official channel hit 9,000. 

In August 2016, it was revealed by French anti-terrorism investigators that the two ISIL/Daesh-directed Jihadists who fatally cut the throat of a priest in Saint-Étienne-du-Rouvray in Normandy, and videoed the murder, communicated via Telegram and “used the app to coordinate their plans for the attack.”

Cryptocurrency and terrorism

Security dynamics have change within the past decades, violent extremist groups are gaming the system, as they are turning to cryptocurrencies, such as Bitcoin, to carry out covert and anonymous financial transactions challenging national and international policing (Global Terrorism Index 2018, pp 77-78). Cryptocurrencies exploit Internet-based blockchain technology to effectuate financial transactions directly between two parties independently of any central authority. Importantly the exchanges are made using private held keys which make detection and policing by government authorities challenging.  Cybercriminals have equally joined the ‘game’ as they lull their victims, to effectuate payment using this pattern. For example, Far-Right European Violent Extremist Group Order of the Dawn crusade to raise funds for its organization using the cryptocurrency Monero (Far Right European Group Crowdfunding Cryptocurrency).

Cryptocurrency and Social Media

Cryptocurrency syndrome warrants states to develop mechanism in order to counter the exploitation of this financial service by cybercriminals and terrorist organizations against states and local communities. Social media platforms are increasingly involving in to cryptocurrency in order to grow their businesses and limit the costs of financial transactions. 

In 2019, Facebook announced its intention to create its own cryptocurrency called Libra, in relation of the security menace pose individuals or groups using the system in terrorist financing. The concern in relation to Zuckerberg agenda was an economic menace, which a cryptocurrency created by Facebook giant, could effectuate on local currencies. 

The release of the Charter for Facebook Independent Oversight Board (Board) in September 2019, is yet to solve emerging security and economic challenges, which are increasingly exploited by cybercriminals and terrorist groups. However, Facebook’s CEO Mark Zuckerberg, 11-40 members are yet to prove to the world their expertise on policy decisions, such as for content takedowns, and will make recommendations for changes in Facebook’s policies. While considering the concerns of US senators on proposed bill to regulate “stablecoins,” which they explicitly defined to include Libra in 2019 (US Senate Draft Law: “Management Stablecoins are Securities Act of 2019”, 21 November 2019

The proliferation of security software and financial online platforms, help terrorist and cybercriminals effectuate covert operations. Policing crimes is not limit to national and international organizations, for social media founders have gone beyond the services of connectivity and chat forum, to provide protocols to counter criminal activities. In July 2017, the Global Internet Forum to Counter Terrorism (GIFCT) emerged from a group of four founding companies; Facebook, Microsoft, Twitter and YouTube, operating Internet platforms and services, with the aim to disrupt terrorist menace of members’ and digital platforms. 

However, the strategic objectives of GIFCT are: capacity building of technology companies, to prevent and restrict terrorists and violent extremist ideas and threats on their digital platforms; enable multi-stakeholder engagement in policing terrorist misuse of the Internet; encourage those dedicated to online civil dialogue and empower efforts to direct positive alternatives towards jihadists messages; expose terrorist modus operandi and the intersection of online and offline activities. 

More so, the GIFCT agenda is to establish an organization with a mission to counter terrorist and violent extremists use of  Internet and digital platforms. The organization will initially limit its membership to companies offering Internet platforms and services, as well cooperate with civil society organizations (CSOs) and other government partners. The four core objectives of GICTF organization will undertake these four foundational goals: suppressing accessibility to content related terms. Content take down refers to content that has been deleted from the server on which it is hosted online. Content filtering refers to software that limits the availability of particular types of content to devices, such as content that is considered to pose a security threat. Content blocking refers to software that restrict access to particular content, such as geo-blocking that prevents accessing content hosted on a server with an Internet Protocol (IP) address that indicates it is located in a particular country. Suppression of content rankings or ratings is another way that content providers can make finding specific content more difficult.

In June 2019, Canadian government provided grant to Tech Against Terrorism to build the Terrorist Content Analytics Platform, with a well-established database of online terrorist material. The mission of tech entity is to enable better quantitative analysis of terrorist use of the Internet in order to educate on more effective preventative and counter terrorism measures, as well as, support the development of automated solutions. Other countries have developed similar counter trends, like the Dutch National Coordinator for Security and Counterterrorism (NCTV) and the Netherlands National Coordinator for Security and Counterterrorism (NCTV), with mission to monitor violent extremist threats, identify trends and cooperate with local actors in order to update its counterterrorism, counterintelligence, crisis management and cybersecurity programs.

(The Author is the Editor of crimeandmoreworld.com)

Syrian Refugees in Lebanon Flee Bombs

Over half a million people, many of them were refugees who initially fled the Syrian conflict, have fled Lebanon into Syria in the last two months.According to those returning to Idlib, Syria’s last opposition stronghold, they are fleeing to a location that is marginally safer than Lebanon,without homes, jobs or humanitarian aid waiting for them.
Read More
RSS Error: WP HTTP Error: A valid URL was not provided.

Related Article

Mary Jane Veloso, a Filipina on…

Mary Jane Veloso, a Filipina who has spent 14 years on death row in Indonesia, will be coming home b ...
November 21, 2024

Myanmar Junta Airstrike Kills Vhildren Playing…

Myanmar’s air force bombed a church where displaced people were sheltering near the border with Ch ...
November 18, 2024

Bangkok Court Clears Thai Woman of…

A Bangkok court on Thursday acquitted a Thai woman accused of supporting two Chinese ethnic Uyghur m ...
November 8, 2024

Residents of Kamala Harris’s Ancestral Indian…

At the Hindu temple in Thulasendrapuram, the ancestral village of Kamala Harris, in Tamil Nadu, Indi ...
November 7, 2024

TikTok Deletes Videos Related to Uyghur…

Authorities in Xinjiang have banned Uyghurs from using social media apps, including Chinese-owned ...
November 6, 2024

In Post-Hasina Bangladesh,Awami League Faces Uncertain…

With its leaders in jail or fleeing from justice, the party that led Bangladesh to independence and ...
October 29, 2024

Other Article

News & Views

Mary Jane Veloso, a Filipina on…

Mary Jane Veloso, a Filipina who has spent 14 years on death row in Indonesia, will be coming home b ...
November 21, 2024
Video Report

Trapped in Lebanon, African Migrants Face…

Many of the estimated 176,000 migrants living in Lebanon are African women who are working menial jo ...
Pick of the Day

Permanent Representative of France Briefs Press…

Nicolas de Rivière,Permanent Representative of France to the United Nations, briefs reporters after ...
November 20, 2024
Video Report

The Impact on a Ukrainian Family…

This week marks 1,000 days of fighting in Ukraine.For millions of Ukrainians, including 32-year-old ...
Pick of the Day

UN Security Council Meets to Discuss…

James Kariuki,Deputy Permanent Representative of the United Kingdom to the United Nations and Presid ...
November 19, 2024
Video Report

Syrian Refugees in Lebanon Flee Bombs

Over half a million people, many of them were refugees who initially fled the Syrian conflict, have ...

[wp-rss-aggregator feeds="crime-more-world"]
Top