Posts Tagged ‘online terrorism’

Another edited interview with a senior security official for the excellent CTC Sentinel. I realize that it has been quite a while since I wrote an actual researched article for them. Been working on one for a long time which I really need to get finished. Huge thanks to Paul and his excellent team for their work.

A View from the CT Foxhole: Robert Hannigan, Former Director, GCHQ

Robert Hannigan was Director of GCHQ, the United Kingdom’s largest intelligence and security agency and NSA equivalent, between 2014 and 2017. He established the United Kingdom’s National Cyber Security Centre (NCSC) and was responsible with military colleagues for the United Kingdom’s national offensive cyber program.  

He was Prime Minister’s Security Adviser from 2007-2010, giving advice on counterterrorism and intelligence matters. Prior to that, he worked as principal adviser to Prime Minister Tony Blair on the Northern Ireland peace process. He was awarded the U.S. Intelligence Distinguished Public Service Medal in 2017 and honored by Queen Elizabeth for services to U.K. national security in 2013.

Robert is currently Warden of Wadham College, Oxford, and European Chairman of the cyber security company BlueVoyant. He is a Senior Fellow at the Belfer Center, Harvard; Fellow of the Institution of Engineering & Technology; and Distinguished Fellow of the Royal United Services Institute. 

CTC: Shortly after you were appointed the director of GCHQ (Government Communications Headquarters) in 2014, the Islamic State declared a caliphate after taking control of large swaths of Iraq and Syria. When you retired as director in 2017, the group was well on the path to territorial defeat in Syria and Iraq. How would you describe the contribution GCHQ made to the global campaign against the Islamic State and protecting the United Kingdom from the group’s terrorism? How did GCHQ evolve to focus on the Islamic State threat, and what were the lessons learned?

Hannigan: There were two things in particular about ISIS that made it different. One was obviously the geographical hold: the fact that it had territory in northern Syria and northern Iraq—whether you want to call it a caliphate or not—which made it almost inaccessible from the ground in practice.

The other thing that made it different was generational. This was a group that understood the power of media, and particularly new media, in a way that previous Islamist extremist groups had not. Those were two big challenges. From GCHQ’s point of view, counterterrorism was at that stage the biggest single mission. There were, of course, lots of other missions, too, but [CT] was a huge investment of resources, for obvious reasons. To some extent, GCHQ was using the lessons it had learnt in Afghanistan, which had been a very strong counterinsurgency/counterterrorism effort where GCHQ had been embedded with the military. It was building on those lessons, but of course the SIGINT environment in Syria and Iraq was very different.

In Afghanistan, essentially the Allies owned the communications space, just as they owned the air space. That wasn’t the case in northern Syria, so it was a different kind of challenge. But a lot of the techniques and international cooperation had been well exercised in Afghanistan. To some extent, the first part was a traditional mission of ‘how do you disrupt and destroy a terrorist organization from its leadership downwards,’ but the second bit was genuinely new in the sense that ISIS was obviously trying to project attacks back, as well as recruit heavily from the West to travel into the caliphate. Both of those ISIS objectives, which were interconnected, were things which we needed to disrupt, and so a lot of the task was about understanding how ISIS media worked and trying to disrupt that. I cannot say how this was done from a U.K. perspective, but there is a great deal of media reporting and academic work on this available in the U.S.

ISIS were doing two things through their media campaigns. One was inspiring people and then actively grooming those they had inspired to either come to join the group or launch attacks. And both of the stages really needed disrupting. Disrupting global ISIS media was a much broader challenge, of course, but trying to prevent individual grooming and attack planning was traditional MI5 territory, supported by GCHQ. It would not be right to go into the details of how it was done, but I do not think there was anything conceptually different about how we went about doing that from disrupting traditional recruitment and attack planning. The big difference was that it was all at one remove.

I think there were two advantages [for ISIS] to having territory: one was the propaganda value and the fact that you can present, as you saw endlessly in Dabiq and the other glossy publications, what life in the caliphate was like. That gave them a romantic propaganda advantage to be able to say, ‘Here we have built this wonderful land for you, where you can live a religiously pure life.’ But it also gave them a safe place from which to mount operations, and all they needed apart from connectivity was the understanding of how to do that: How do you inspire, radicalize, and then manipulate people? So in a sense, it was a psychological campaign as much as a physical one.

CTC: How would you describe the counterterrorism cooperation between GCHQ and U.S. agencies such as the NSA as well as other members of the Five Eyesa and European allies?

Hannigan: It is incredibly close and always has been, in particular with the NSA. But I think what happened over the ISIS campaign was that counterterrorism really drove the cooperation between SIGINT agencies in Europe. Cooperation amongst European partners has always been good on particular cases, but I think the pressures of terrorism really drove that in a very constructive way. So now the SIGINT agencies are [working] closer together, probably more than they have ever been as a result of terrorism, and there was very active cooperation right through the attacks in Europe and beyond, as well as cooperation with other services around the world.

Fortunately, with European partners, Brexit did not make much of a difference in terms of maintaining cooperation, partly because of the threat of terrorism; these joint efforts were too important to be damaged. Different Five Eyes partners will have slightly different relationships with different European countries. But for the U.K., the French and German relationships, for example, were very important. And the U.K.’s traditional military and intelligence relationships with the Scandinavian countries have remained very strong and strengthened in the context of Russia.

CTC: What for you have been the key lessons learned in balancing democratic liberties with intelligence gathering in counterterrorism in the 21 years since 9/11?

Hannigan: It’s always been a balance. Access to data is the key for SIGINT in particular, but probably for all the agencies, and what’s changed is that there’s been an exponential rise in the amount of data being produced by the private sector on citizens. This gives undemocratic states new possibilities to do surveillance, and it’s right that in a democratic society you need to have an active and constant debate about whether you’ve got the balance right. In the U.K., the [2016] Investigatory Powers Act was an attempt to do that after the revelations by Edward Snowden, though I think the legislation was coming anyway at the time, probably accelerated a bit by Snowden. In the U.K. context, that legislation seems to strike a balance that people are comfortable with.

It’s quite interesting that very quickly after the Snowden revelations, the debate moved on, because terrorism, then the resurgence of Russian aggression, and what the tech companies were doing with data really made what governments had access to seem quite secondary. Of course, it is very important that government should be held to a higher standard, and I think that it is a debate that needs to be had all the time, particularly as data processing and data holding in the private sector changes. But it does feel like the public debate has moved on, moved on to what companies like Facebook/Meta and the other tech companies are doing.

So I think the lesson for the intelligence community is not to be afraid of the public debate. Probably one of the mistakes made towards the end of the last century, and at the beginning of this one as the internet became available widely, was not to have that debate openly enough. Because consent is crucial to intelligence operations in democratic countries, and I think there was probably an assumption that everyone understood what was happening within this context and I am not sure people did. So one of the lessons is to get better at having that debate more often, especially as it is not a static thing and you are never going to come to a conclusion on the issue, rather it has to be a dynamic debate. Ultimately, we want the minimum necessary powers for agencies. But as the technology evolves, you have to evolve in response.

CTC: If we could pull on a few threads there, what was the impact of Edward Snowden’s revelations on counterterrorism capability, and how responsible do you think the social media platforms have been in keeping terrorists and extremist content off their platforms?

Hannigan: There was a clear reaction from terrorist groups and hostile states in particular, to the revelations, and yes, there were specific counterterrorism consequences, which at the time my predecessor Iain Lobban and his counterpart at the NSA Keith Alexander talked about.b There were things going dark that probably wouldn’t have gone dark otherwise.

With the tech companies, things have changed, but when I came into the job in 2014 I had a go at the companies1 (something that was unusual at the time). I thought they were at that point being irresponsible, and we were in a slightly ridiculous position where the agencies were having to ask a company’s permission effectively to help on particular operations. The companies would decide whether this met their threshold for what constituted terrorism, and there seemed to be something completely anti-democratic about that. For all their failings, governments at least get elected. Tech companies are not, and they do not have any expertise in this, so it is quite weird to be expecting a bunch of probably well-meaning people in Silicon Valley to make decisions about what is and what is not terrorism in a far-flung part of London.

And, to be fair to the companies, I think they felt deeply uncomfortable, too. They are money-making enterprises. Most of them are effectively advertising companies, if we are honest; Meta is a massive advertising company, and so was part of Google. That is their business, and they did not really want to be drawn into CT, which is where the narrative about them being neutral conduits and just platforms with no editorial control came from. I think they actually believed that narrative, and they really did not think they were enabling terrorist activity.

I think over the years—under public pressure but also as a result of terrorism and other serious crime—they have realized that they are not neutral and they have to take some kind of position on this, and they have to find a better way of doing it. Every major country is now looking at legislating on this; in the U.K., through the Online Safety Bill.c The manipulation of democratic institutions and elections has accelerated the feeling that we have to do something and put even more pressure on the tech companies.

So it does look very different now from when I said those things about ‘big tech.’ It was unfashionable to have a go at tech companies back in 2014; now everybody piles in and, if anything, it is a little one-sided. I think they are, on the whole, trying to address the problems, with varying degrees of success. But nobody quite has the answer. We know in the West that we do not want state control of these things, but neither do we want an unregulated private sector-driven landscape.

CTC: GCHQ has long been associated with signals intelligence. But in recent decades, there has been an information revolution with deep implications for intelligence gathering and analysis. Not only is there vastly more information (and dis- and mis-information) to sift through than ever before but open-source intelligence has become much more important and “the government’s ability to collect and analyze information is nowhere near dominant compared to what it used to be.”2 How have and should agencies like GCHQ be adapting? How important is AI and machine learning (ML) in this new era? Given “secret agencies will always favor secrets,” and given the calls for an open-source agency to be set up in the United States,3 does the United Kingdom now need a dedicated open-source agency, a new sort of BBC Monitoring?

Hannigan: Well, it’s interesting you mentioned BBC Monitoring as the Americans had the Open Source Center, which was a much larger version of that. It has now changed and become the Open Source Enterprise.d It was taken very seriously by the U.S. and did a great job. As does BBC Monitoring, though it has gradually been pared down over the years, and in any case was traditionally more focused on broadcast media than on new media or social media.

[Dis/mis-information] is a huge challenge but is highlighted not so much by terrorism but by the attempts to subvert democratic processes by Russia. The U.K. and lots of countries were really caught napping here because there wasn’t any structural part of government whose responsibility was to monitor this. There were two reasons for this, I think. One is that the secret agencies have a lot of other things to do—countering terrorism, for example—and have limited resources. But secondly, it’s very uncomfortable for intelligence agencies to be doing open-source monitoring, particularly where social media is concerned. There is something instinctively difficult about secret agencies looking at mass social media use. The idea [of having] GCHQ or MI5 all over everybody’s Facebook accounts smacks too much of a surveillance state and would be unacceptable in a democratic society.

As a result, for both those reasons, lots of governments, including the U.K., have shied away from looking at this and attempted to do it in a tactical, well-meaning but arguably ineffective way in the Cabinet Officee or somewhere like that, where they are trying to get a small group of people to have a look at this information flow.

To me, the answer has to be a better use of the private sector. Most of this open-source material is being generated by the private sector. Look at Ukraine and the low-orbit satellite imagery that is being generated; it’s absolutely phenomenal, better in many cases than the military equivalent and available in theory to everybody. [The same applies to] the monitoring of social media trends. So I think the answer has to be government agencies using [private sector-generated data and analytics] better.

There are still lots of datasets that are secret, of course, and there are statutory-based accesses to data, which other people don’t have outside government. Focusing on that and what is genuinely secret and hidden is a much better use of agency time.

The real advantage comes from washing the secret and the open-source data together. In other words, you are, as a secret agency, doing your secret thing but you’re also washing that against the results of open source, and that’s where you get something particularly valuable and that’s where you ought to be able to spot some of the things we failed to spot: for example, Russian intervention in elections. But if I am honest, I do not know how much progress Western governments have made on this. The U.S. probably comes the closest because they have invested in it, but I think most governments have just danced around it, partly for resource reasons, but also because it is politically and ethically a very difficult area.

The answer is probably to use the private sector mechanisms that are there already and that are quite open; there are NGOs like Bellingcat that are already doing some extraordinary work in the public domain. They are not the only ones; there are plenty of academic NGOs and journalistic organizations who are doing really interesting work here and it is every bit as good as what governments do. So I do not think we need some huge new bureaucracy in government to look at open-source material; rather, we should synthesize what is already out there and use it intelligently with the secret insights that agencies generate to deliver some more effective results.

CTC: Another key part of this, which brings in the private sector, is encryption, and you regularly hear from politicians and serving security officials that end-to-end encryption is a danger that protects, among others, terrorists. What is your sense of the counterterrorism concerns around this?

Hannigan: The GCHQ view on this has always been slightly unusual because GCHQ is an agency that delivers strong encryption and, indeed, in the 1970s was involved in inventing some of the strongest encryption that is currently in use. So we think encryption is a good thing. It protects everybody—protects governments and protects business. I have always resisted the temptation to say encryption is bad somehow, and law enforcement and government should be given the key to everything, partly because I do not think that would be healthy and partly because it’s not practical. You cannot uninvent end-to-end encryption. It is a mathematical invention; it’s not something you can suddenly say is not going to be there.

What you have to do is keep it in proportion. Yes, it is misused by criminals and terrorists, but it is predominantly used by honest citizens and businesses who are protecting themselves, so we shouldn’t let the security tail wag the dog. As always, criminals and terrorists will use good technology for bad purposes. There are some ways around this. One is to work with the companies, as they themselves have offered to different degrees to do things that are short of decryption because, of course, they cannot decrypt it themselves if it’s genuinely end-to-end, but there are things they can do to help with the data around it. It is probably not helpful to go into the details here, but they themselves have said it is not all about the content.

Better relations between the companies and governments help. And there are some macro proposals that have been put out there but so far they have not found favor with the privacy lobby in the United States. And whatever you do, you will always have criminals who will use something else, move away from the big platforms and use something different, so you might just end up pushing the problem elsewhere. You already see a bit of that now, with, for example, a lot now coalescing around Telegram and away from some of the traditional Western platforms.

The short answer is that there is not an easy answer. And efforts should be focused on particular targets rather than trying to do anything at scale. I know some law enforcement people still hanker after large-scale solutions, but there is, frankly, no way that companies are going to give any kind of blanket access to law enforcement or governments in the future. And I cannot see any legislation that would actually compel them to do it. Of course, there are some countries that ban end-to-end services, for this reason. But I cannot see democracies agreeing to that, and I think it would be disproportionate. The task for the agencies in cooperation with the companies is to go after specific targets and help each other do that, where there’s general agreement that these are legitimate targets.

CTC: In July, FBI Director Chris Wray and MI5 Director Ken McCallum did a series of events in London in which, among other things, they identified the lone-actor threat as the heart of the terrorist threat both faced.4 Would you agree with this assessment, and how do you characterize the journey of how we got here?

Hannigan: They are much more current than I am on this, but it has been a trend for a while. In fact, it was ISIS and [Abu Bakr] al-Baghdadi himself that promoted the lone-wolf idea and propagandized it through their various channels, so it’s not unexpected. It was a perfectly logical response to better intelligence and law enforcement disruption because it’s extremely difficult to spot, disrupt, and prevent genuine lone actors. The thinking of the al-Baghdadi model was ‘we don’t need to control this. We do not even need necessarily to know who you are; if you go out and do something for ISIS, then you are part of the struggle.’ That’s quite a new departure for terrorist groups. They have always tended to be control freaks: The study of terrorist bureaucracy and leadership is instructive. By contrast, ISIS was crowdsourcing in quite an innovative way. The demise of the ‘caliphate’ made the lone wolf approach even more compelling for ISIS.

I would not write off organized terrorism in the future; I think there’s plenty of evidence that it has not gone away, but lone-actor terrorism does seem to be the trend at the moment and the thing that is hardest for agencies to spot. All I would say is, if you look at the lone wolves who have been successful or mounted successful attacks in a number of countries, they are very rarely completely ‘lone’ or completely unknown to their government agencies. And so it comes back to the age-old problem of prioritization. Most of them appear amongst the ranks of the many thousands of people of interest to police and law enforcement and intelligence agencies, and probably the task is to use data better to prioritize better.

Some of the criticisms around, for example, the London Bridge attacksf were about failures to do that and failures to use data better to understand where the priorities are and where the tipping points are. But all of this is very easy to say and very difficult to do, and it is never going to be [got] completely right. It is a constant struggle for MI5 in particular, but for all agencies to prioritize out of the thousands of people who might be a worry, who are the ones that you need to focus on now, and deploy your very, very limited surveillance resources on, because we all know how much it costs and how difficult it is to do.

But the reality is that even lone wolves usually display behavior and patterns of life [notwithstanding encrypted communications and the end-to-end problem] that says something about them; they are in touch with other people, even if they’re not involved in joint attack planning. The challenge has to be to use data to try to work out when they have reached a tipping point. You will never be successful 100 percent of the time, but it’s about trying to raise the percentage of success.

CTC: Not only does the West currently face the challenge of Russian aggression in Ukraine, but Directors Wray and McCallum identified China as the biggest long-term national security threat.5 Given the shift in resources on both sides of the Atlantic to great power competition, is there a danger of counterterrorism being underfunded? Where do you see the intersections between great power competition and counterterrorism?

Hannigan: It is a perennial problem of governments that you veer from one crisis to another, and [then] something has to be deprioritized. We have seen what happened after we deprioritized Russia after the Cold War. The ambition should be to try to reduce investment in particular areas without giving up your core capability and eroding the skills and knowledge that you have had on that subject. This applies to counterterrorism, too, because the threat hasn’t gone away.

It is clearly right to focus on China and Russia. When I started at GCHQ, I said I thought the two big challenges for the next 50 years in the West were managing a declining Russia and a rising China. We are seeing the declining Russia problem in the lashing out, and the nationalism, and the economic failure to reform, and the kleptocracy that has emerged as a result. We are experiencing that in Ukraine, and it’s a big challenge to confront and contain it, but I think it is a much easier challenge than a rising China, which is a complex mixture of opportunity and challenge. But there is a lot of threat there as well, as Wray and McCallum rightly said. So we should be focusing on that, and it is the right top priority, but that doesn’t mean we can neglect CT. There will have to be a difficult discussion about to balance resources. Quite a lot of the great power strategy is outside the remit of agencies. A lot of it is about industrial policy, investment decisions, and regulation. Regulating Chinese tech and Chinese tech ambition is not core intelligence work, so it doesn’t all fall on the agencies.

On the question of crossover, that is a potential worry because states obviously have used all sorts of proxies in the past. In the cyber world, they use criminal groups. And they have also used terrorist groups as proxies. It is not hard to imagine that in the future, they will do the same again to put pressure on Western countries either by using terrorist groups in whichever part of the world the conflict might be taking place, or even to target us at home. I do not know that we’re seeing a sudden upsurge in that yet, but it is certainly a concern for the future, and the more desperate a country like Russia gets, the more likely it is to be happy to foment that.

CTC: You led the creation of the United Kingdom’s National Cyber Security Centre (NCSC), oversaw the country’s pioneering Active Cyber Defense Program, and helped create the United Kingdom’s first cyber security strategy.6 When it comes to cyber, much of the concern has focused on state actors such as China as well as criminal groups and the threat to critical infrastructure. How would you characterize the cyber threat posed by terror groups, including jihadi terror groups? Have we yet seen a cyber terror attack?

Hannigan: There have always been great scare stories about this, partly because the media loves the idea of cyber terrorism and terrorists being able to take down an entire infrastructure or electricity grid or something. Whether we have seen it or not depends on how you define it. You could say Hezbollah [cyber] attacks against Israel are cyber terrorist attacks.g You could say that Iranian attacks on water treatment plants in Israelh are a potential attack by a nation-state designed to instill terror.

So, it is certainly not unimaginable, but cyber is not necessarily the best weapon for terrorists to use. Firstly, it does require quite a degree of long-term commitment and knowledge. And terrorists in the past have been rather traditional in wanting spectaculars of one sort or another, so their mindset may not be geared towards it. This may change with the new generation. We certainly saw that with [their ability to exploit] social media, so there is a logic to saying, ‘Well, they might get good at this in the future.’ It has also got much cheaper and easier to do because [the technology] is something you can now buy as a service or commodity and use it. So, the trajectory suggests that it ought to be easier to do cyber terrorism in the future.

The other point, though, is that while you can disrupt things and you can make people’s lives difficult [through cyber-attacks], it is quite difficult to do destructive activity that is really long lasting. Having said that, I did notice that one of the American consultancies on tech that issues reports every so often, and is usually quite a cautious organization, projected that by 2025 operational technology would be weaponized to cause death.7 They were certainly thinking of nation-states rather than terrorists, but the fact that they were saying this is interesting.

These kinds of destructive cyber effects will be accidental for the most part. The first cyber homicide that I can think of is the case in Germany two years ago where a woman was being transferred to a hospital that had been paralyzed by ransomware and so she was diverted to another hospital and died on the way. German police decided to treat this as cyber homicide.8 Those sorts of things—ransomware out of control—might well cause people’s deaths, either through interfering with operational technology that is running power, water, or healthcare, or just by accident. But all of that is more likely than a planned cyber-terrorist event. But it is not unimaginable, and it is not unimaginable for the nation-state to find it convenient to false flag something [it has perpetrated against an adversary], to mask a cyber attack as a terrorist attack. We have, of course, seen the Russians doing that in their [2015] attack on [the French television station] TV5,i which they flagged as a terrorist attack.9 So cyber terrorism is not unimaginable but probably not top of the list of worries at the moment.

CTC: In the September 2021 issue of CTC Sentinel, former acting CIA Director Michael Morell assessed that following the Taliban takeover of Afghanistan, “the reconstruction of al-Qa`ida’s homeland attack capability will happen quickly, in less than a year, if the U.S. does not collect the intelligence and take the military action to prevent it.”10 It’s been a year since the Taliban assumed power. How do you assess the international terror threat from jihadi groups operating on its soil?

Hannigan: My biggest concerns are, do we know what the threat is and how would we know if it is growing? We have lost most of our insight into what’s going on in Afghanistan, for all the obvious reasons, and the biggest worry is we simply won’t see a problem—from ISIS in particular but also al-Qa`ida—until it’s well formed and mature. Now, I may be wrong; maybe we have great insight. But I have not seen it, and I doubt it is actually there. The successful U.S. attack on al-Zawahiri this summer seems to me to be about a determined long-term manhunt: It does not imply great understanding of Afghanistan in general. In addition, there are so many other things going on in the world that even if we had some insight, I doubt it’s top of the list for most governments. So I think it is a real concern from an intelligence point of view as to who actually knows what the CT threat emerging or growing in Afghanistan is, and how much of it might be projected outwards. Most of it is currently focused internally, but these things have a tendency to get externally directed over time.

CTC: According to the 2021 U.K. government integrated review, “It is likely that a terrorist group will launch a successful CBRN attack by 2030.”11 In the wake of the COVID-19 pandemic, what is your assessment of the CBRN terror threat?

Hannigan: It is a bigger worry to me than cyber terrorism by a long way. Partly because organizations have seen the chaos you can cause through CBRN, and whether it’s pandemics, chemical weapons in Syria, or the near disasters in Ukraine through radiological mismanagement during the war, there must be people thinking, ‘Well, if I want to cause an enormous amount of suffering and disable a country, this is a better route to go.’ A key problem is that the global instability tends to make the control of the substances more difficult. We have been pretty effective [in past decades] in having organizations like the OPCW [Organisation for the Prohibition of Chemical Weapons] that could control and monitor the materials you need to conduct such an attack. However, in a world of chaotic great power relationships, that gets much harder, and so the opportunity to get hold of this material, or to manufacture it, becomes easier. Afghanistan is one of those places where we have seen in the past, and could certainly see in the future, terrorist programs to this end. It is certainly a bigger worry to me than cyber terrorism.

CTC: Given the strong nexus to far-right extremism of Russian paramilitary groups involved in the fighting in Ukraine and given the history of such ties also on the Ukrainian side,12 do you see any terrorist or foreign fighter threat emanating from the war in Ukraine?

Hannigan: One of the lessons we should learn from ISIS is relevant to this discussion. One of the reasons the lone wolves or more often the small groups who were effective in launching attacks—for example, in [Paris in November] 2015—were so effective was that they were battle-hardened and they knew what to do. They knew how to withstand firefights. They were not just ideologically hardened; they actually had battlefield experience. You have to assume that the same could be true of other kinds of extremists returning from any conflict. We have seen similar things emerging from Chechnya in the past as well. It seems plausible that the many current theaters of conflict may produce battle-hardened and radicalized individuals.

CTC: What is your assessment of the current security outlook in Northern Ireland?

Hannigan: We obviously underestimated, in around 2007, the resilience of dissident Republicanism, and I think that was partly because nobody foresaw the economic downturn. People assumed that there would be a great tidal wave of economic benefits and a peace dividend for lots of communities that did not materialize. But you cannot just pin it all on economics. There is a cyclical side to Republican violence in Irish history that is unlikely to ever go completely away, but the problem now is that the politics can get destabilized relatively quickly. I do not foresee a sudden return to violence, but I think the more the politics frays, the more instability there is, and the more you tinker with what was a political settlement that everybody could just about buy into, the more you run the risk of the fringes becoming violent again. And all of this might start successfully radicalizing young people. It was never a particular concern that the older generation of dissidents were still there—diehards who never signed up to the peace process and were never going to change their minds—but what was concerning was young people being recruited in their teens and 20s into dissident activity. That’s much more worrying. It is the key thing you have to guard against for the future. And clearly, the best way to do that is through political stability and political progress.

CTC: What were you most proud of in your work in counterterrorism? From a CT perspective, what worries you most today?

Hannigan: I am very proud of what GCHQ did in preventing attacks in the U.K., with MI5 and others. Most of those are not seen because they are prevented, but that was great work that I do not take any personal credit for, but was done exceptionally well. Personally, the thing I found most rewarding in counterterrorism was in Northern Ireland because this was a domestic threat where pretty much all the levers were in the U.K.’s hands—security and intelligence, economic and political. It was probably the last time that the U.K.’s top national security threat, as it was then, was a domestic one. It taught me a lot about terrorism, not least through talking to members of the Provisional IRA and other organizations, which gave me a greater understanding of how terrorist organizations think and work, and how individuals are motivated. In the end, it was, over a 30- to 40-year period, a successful process. There were, of course, mistakes, but it was a good marriage of security policy and political process, that addressed the underlying causes of the Troubles and, partly through good CT work, created space for politics to work.

I do not think Islamist extremism has gone away and the rise of the extreme-right is clearly a concern, but terrorism will continue to bubble up in all sorts of areas that may not yet have been predicted: where people feel either disenfranchised or disadvantaged, or feel that their identity is threatened. In a chaotic international environment, where outrage can be generated and manipulated on a larger scale than ever before, not least through technology, there will be more of this, and it will be more unpredictable. Right-wing extremism is just the latest [threat to gain prominence], but in reality, it has been around a long time. I suspect there may be all sorts of new causes, and people may resort to violence more quickly than they did in the past.     CTC

Substantive Notes
[a] The Five Eyes (FVEY) is an intelligence alliance of Australia, Canada, New Zealand, the United Kingdom, and the United States.

[b] Editor’s Note: In a November 2013 hearing before the UK Parliament’s Intelligence and Security Committee (that provides oversight of the UK’s intelligence agencies), Sir Iain Lobban revealed “we have actually seen chat around specific terrorist groups, including close to home, discussing how to avoid what they now perceive to be vulnerable communications methods or how to select communications which they now perceive not to be exploitable.” “Uncorrected Transcript of Evidence Given By, Sir Iain Lobban, Mr Andrew Parker, Sir John Sawers,” November 7, 2013.

[c] Editor’s Note: The Online Safety Bill is a wide-ranging piece of legislation currently under consideration by the UK Parliament that will provide government with powers to regulate online content, as well as impose large fines on companies for failing to fulfill their responsibilities. The draft bill under consideration was submitted in May 2021 and can be found at https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/985033/Draft_Online_Safety_Bill_Bookmarked.pdf

[d] Editor’s Note: In October 2015, the Open Source Center (OSC) was “redesignated the Open Source Enterprise and incorporated in CIA’s new Directorate of Digital Innovation. The Open Source Center, established in 2005, was tasked to collect and analyze open source information of intelligence value across all media – – print, broadcast and online. The OSC was the successor to the Foreign Broadcast Information Service (FBIS), which gathered and translated world news coverage and other open source information for half a century.” Steven Aftergood, “Open Source Center (OSC) Becomes Open Source Enterprise (OSE),” Federation of American Scientists Blog, October 28, 2015.

[e] Editor’s Note: The Cabinet Office is a central U.K. government function that supports the Prime Minister and his Cabinet, drawing on input from across government to help deliver on policy goals.

[f] Editor’s Note: On June 3, 2017, three terrorists launched a knife and van ramming attack on London Bridge and in the nearby area of Borough Market, murdering eight before dying themselves. On November 29, 2019, Usman Khan, a formerly incarcerated terrorist attacked and murdered two people at an event at Fishmonger’s Hall, before being shot by police on the nearby London Bridge. In both attacks, subsequent investigations revealed that authorities were aware of the individuals and may have failed to prioritize the level of threat that they posed. For more on the 2017 attack, see the inquest page at https://londonbridgeinquests.independent.gov.uk/ and the 2019 attacks, its own inquest page at https://fishmongershallinquests.independent.gov.uk/

[g] Editor’s Note: For instance, “over the past decade, companies in the US, UK, Egypt, Jordan, Lebanon, Israel and the Palestinian Authority have been targeted by a hacker group called ‘Lebanese Cedar’, also known as ‘Volatile Cedar,’ which seems to be linked to Hezbollah, ClearSky Cyber Security announced” in January 2021. Tzvi Joffre, “Israel targeted by Hezbollah hacker group, remained unnoticed for 5 years,” Jerusalem Post, January 28, 2021.

[h] Editor’s Note: Iran reportedly attempted to trick computers to increase chlorine levels in the treated water for residential areas during an April 2020 cyberattack against Israel’s water systems. Mehul Srivastava, Najmeh Bozorgmehr, and Katrina Manson, “Israel-Iran attacks: ‘Cyber winter is coming,’” Financial Times, May 31, 2020.

[i] Editor’s Note: In April 2015, TV5 Monde was taken off air in an attack carried out by a group of Russian hackers. It was reported that they “used highly targeted malicious software to destroy the TV network’s systems.” An Islamic State-linked group going by the name the Cyber Caliphate had first claimed responsibility. Gordon Corera, “How France’s TV5 was almost destroyed by ‘Russian hackers,’” BBC, October 10, 2016.

Citations
[1] Editor’s Note: Robert Hannigan, “The web is a terrorist’s command-and-control network of choice,” Financial Times, November 4, 2014.

[2] Don Rassler and Brian Fishman, “A View from the CT Foxhole: Amy Zegart, Senior Fellow at the Hoover Institution and Freeman Spogli Institute for International Studies, Stanford University,” CTC Sentinel 15:1 (2022).

[3] Ibid.

[4] Gordon Corera, “Terrorism: Lone actors make stopping attacks harder, say FBI and MI5 chiefs,” BBC, July 8, 2022.

[5] Gordon Corera, “China: MI5 and FBI heads warn of ‘immense’ threat,” BBC, July 7, 2022.

[6] National Cyber Security Strategy 2016 to 2021, HM Government, November 1, 2016.

[7] Editor’s Note: “Gartner Predicts By 2025 Cyber Attackers Will Have Weaponized Operational Technology Environments to Successfully Harm or Kill Humans,” Gartner press release, July 21, 2021.

[8] Editor’s Note: See Joe Tidy, “Police launch homicide inquiry after German hospital hack,” BBC, September 18, 2020.

[9] Editor’s Note: “Hacking of French TV channel was ‘terror act,’” Local (France), April 9, 2015.

[10] Paul Cruickshank, Don Rassler, and Kristina Hummel, “Twenty Years After 9/11: Reflections from Michael Morell, Former Acting Director of the CIA,” CTC Sentinel 14:7 (2021).

[11] Global Britain in a competitive age: The Integrated Review of Security, Defence, Development and Foreign Policy, HM Government, March 2021.

[12] Don Rassler, “External Impacts and the Extremism Question in the War in Ukraine: Considerations for Practitioners,” CTC Sentinel 15:6 (2022).

Finally, in my latest catch-up, a piece for my new local paper the Straits Times, this time exploring the phenomenon of QAnon and its straying back and forth across the line between terrorism and politics.

Am also taking advantage of this opportunity to do a catch up media posting. On the terrorism side of the coin, spoke to the Mail on Sunday about the reported death in a new book of al Muhajiroun leader Siddartha Dhar fighting with ISIS in Syria, to the Telegraph about the situation of the women and children in the Kurdish camps in Syria which was picked up by Arab News, and my interview for CTC Sentinel with Gilles de Kerchove was picked up by the UK’s Independent and their sister paper in Ireland. On the other side of the coin, spoke to CNBC18 in India ahead of the EU-China Summit, to the South China Morning Post about Mongolia and the Shanghai Cooperation Organization (SCO) and separately the China-Pakistan Economic Corridor.

Reasons for the Rise and Rise of QAnon

Screen Shot 2020-09-21 at 05.52.26

How did an online conspiracy theory become so strong that it is influencing the politics of the party ruling the world’s most powerful country while inspiring terrorists at the same time’

The rise of QAnon – an online conspiracy theory that has the trappings of a religious cult – is reflective of broader trends in society, notably how technology is blunting our ability to know what is real while driving existing tendencies for politics to head into ever more extreme directions.

QAnon seems an improbable platform for political office.

It claims, among other things, that a powerful cabal of paedophiles and cannibals within the “deep state” is engaged in a global fight to take down US President Donald Trump.

No one knows who Q is (hence the Anon tag) but his (or her) cryptic messages have led to actions that are sufficiently worrying for the Federal Bureau of Investigation (FBI) to flag QAnon as a potential domestic terror threat.

The movement has not merely survived its infamous early fiasco (involving a gunman attacking a Washington pizza outlet in the belief that it was a front for a Hillary Clinton-run paedophile ring) but has thrived.

QAnon has increasingly grown in popularity in Republican political circles, with several supporters winning recent congressional primaries. One of them, Ms Marjorie Taylor Greene, is likely to land a seat in the House of Representatives.

Facebook, Instagram, Twitter and Reddit have shut down numerous QAnon accounts and communities, Republican politicians have voiced misgivings – Senator Lindsey Graham has called it “batsh*t crazy” – but notably Mr Trump has seemed to welcome its supporters, claiming that they “like me very much” and “love America”.

QAnon’s success comes from a strangely modern brew.

It lacks a leadership, beyond an imagined one online (in which Mr Trump is an unknowing leader and anonymous individuals working within the government are leaking information to the world), but this almost complete lack of structure helps explain why a series of online posts has become a movement that encompasses everything from domestic terrorists to people running for Congress.

To be sure, openness at an ideological level is not unique to QAnon. Most movements are inherently evangelical.

If you are advancing a world-transforming idea, you are usually seeking adherents or followers. This requires an ability to broadcast and a method by which people can join and participate.

But the point at which they move from becoming merely a listener to being a more active member is the point at which a barrier usually needs to exist.

Here, a comparison with violent Islamist groups can offer insights.

For groups like the Islamic State in Iraq and Syria (ISIS) or Jemaah Islamiah (JI), the ideas can initially be found online or at public gatherings where preachers speak or teach. This provides an initial point of contact which the individual can then follow up and, if he is assiduous enough, eventually leads to his recruitment after some “vetting”.

QAnon is different. Rather than being a structured organisation that has individuals who control entry, QAnon provides access online through discussion forums such as 4chan and 8chan where ideas and conspiracy theories can be followed and developed.

More active adherents produce documentary films or write long articles which expound and explain links to others.

But the fundamental ideas are out there for anyone to find.

And similar to those of other such movements, they offer an answer.

But unlike ideologies with a core text which requires interpretation by trained subject matter experts, here the core text is one that is self-assembled, drawing on the limitless volume of information that exists in our online world.

The core ideas of QAnon – that the world is ruled by a dark cabal which Mr Trump is fighting – are perennial, but how you get to them and where you see the links are up to the individual and his own interpretation.

The ideology becomes one that you partially assemble yourself. This gives the ideas greater salience and strength for the individual, helping to explain the appeal.

As Q followers say: “Do your own research, make up your own mind.”

The idea that humans need an explanation for how the world works is not new.

In dark and confusing times, people will regularly turn to more extreme explanations and strong messengers.

We are living through a moment of great political disruption alongside an explosion in information and disinformation. Certainties no longer exist.

Deepfakes mean that even moving images can be credibly altered. We struggle to know what we know and what we do not know.

The one certainty many people seem to have is that the world is getting worse and entropic forces are taking us down towards some catastrophic end.

Messianic or demagogic leadership becomes important at a moment like this as it appears to provide clarity amid confusion.

Problematically, QAnon’s leader is the ether.

Unlike ISIS, JI or Al-Qaeda in their heyday with clear hierarchies, plans and direction which their followers were steered towards, QAnon offers an idea and sense of belonging to an entirely leaderless organisation.

This makes the tipping point to violence much harder to identify, as it is located within each individual rather than the organisation itself.

QAnon offers itself as an idea that adherents can build themselves.

Some individuals get so worked up they end up like the Illinois woman who threatened to kill Democratic presidential candidate Joe Biden over claims of sex trafficking.

Others organise, either by running for public office or taking part in a pro-police protest in Portland, Oregon.

Many are content amplifying the elliptical messages online and, at Trump rallies, flashing symbols and slogans.

Being such a broad-spectrum, DIY movement, QAnon is able to embrace both the mainstream and the extreme.

It also helps explain why the FBI can identify it as a source of concern while numerous Republican party members can run on campaigns that openly reference it.

It is also why it will be impossible to eradicate. Scattered online, it is unlikely to go away until something else comes along and replaces it.

Humankind is always seeking leadership and explanation, and QAnon offers both in an almost limitless, crowdsourced and reinterpretable form.

It provides a haven for those angry at the world who can interpret it as a rationale for going towards violence, while it also creates a large enough community that is attractive to politicians seeking supporters.

QAnon is a cult for our troubled times, bringing religion, explanation, leadership and identity to its followers at the same time.

Raffaello Pantucci is a senior visiting fellow at the S. Rajaratnam School of International Studies.

Another post for the lovely folk at GNET, who also recently appointed me one of their many Associate Fellows. It is a pen portrait of L Jinny or Abdul-Majed Abdul Bary, the former rapper and hacktivist who has now ended up arrested in Spain after sneaking out of ISIS-land trying to get back home to Europe. With his UK passport stripped he is likely to find himself getting shunted on to Egypt, but you can never quite predict these stories. In any case, doubtless more on the fall-out from Syria to come, including more of these sorts of short pieces drawing on a wide range of material.

Jihadactivist

Screen Shot 2020-05-04 at 07.07.28

By 

in Insights

The line between protest and terrorism is clear, but can become complicated when one digs into the underlying ideas. Many would find themselves agreeing with some of the underlying sources of anger that drive terrorist groups, but they would not agree with their choice of action in responding to it. This proximity, however, has a habit of creating strange bedfellows and journeys – like the path taken by Lyricist Jinny, the Egyptian-British one-time rapper and former Islamic State (IS) member who was arrested in Spain last week. A counter-culture tale that flows from rapper and hacktivist to jihadist and (likely) jail.

Abdel-Majed Abdel-Bary (also known by his musical name Lyricist Jinny or L Jinny) was born into a large family whose father was missing for a good portion of his childhood. Fighting extradition from the UK to the US on charges of being involved in Al Qaeda’s 1998 bombings of US Embassies in Africa, Adel Abdel Bary was part of an earlier generation of jihadists. Showing he remembered with anger his father’s arrest, in one of his many raps still easily available online, L Jinny spits “Give me the pride and the honour like my father, I swear the day they came and took my dad, I could have killed a cop or two.” Like a lot of rap music, L Jinny’s is flavoured by a protest against the system and the hard knock life on the streets – something that was reflected in his own experience. While in Syria in March 2014 he tweeted about the incarceration back in the UK of one of his friends for his part in a brutal knife murder in Pimlico in January 2013. Giving a shout-out from the battlefield he wrote, “my lil brother ahmed got sentenced to life…26 years minimum….love lil bro see you in the afterlife inshallah #kasper.”

But there is a noticeably more political angle to some of his rap, with a couple of songs showing his support for the hacktivist collectives Anonymous and TeaMp0isoN. In 2011, L Jinny teamed up with the hacktivists to produce a rap song and video called #OpCensorDis which acted as an angry clarion call against censorship against a backdrop of protests and images from the riots that shook London in 2011. “Now i linked up with TeaMp0isoN they can’t censor me” he raps, protected supposedly by the hacktivist collective who trailed the song online with comments about how if it was censored they would launch merciless online attacks against the music industry. The money raised was supposedly given to the East Africa Crisis Appeal, though it was unclear how much was actually made or why the music industry would censor a fairly pedestrian rap song. Paradoxically, they also used the #OpCensorDis operation to launch a defacement attack on UN aid organizer UNDP’s sites.

This was not the only lyrical contribution to the operation that L Jinny offered. Alongside rappers Tabanacle and Proverbz, he produced another song imaginatively called Op Censor Dis 2. This time shot with a video of a group of lads rapping against the system in front of the Bank of England. Featured alongside the rappers in the music video was a rather smug looking young man called Junaid Hussain, one of the leaders of TeaMp0isoN who was active online using the handle TriCk. His Twitter handle had been the one to release #OpCensorDis in late 2011 and showing his growing arrogant confidence, he was willing to do anonymous interviews with the press over Skype boasting of his group’s skills. After a particularly prominent attack on the UK Metropolitan Police’s Counter-Terrorism reporting hotline he told the Telegraph, “We done it due to the recent events where the counter terrorist command and the UK court system have allowed the extradition of Babar Ahmad, Adel Abdel Bary and a few others – we also done it to due the new “snooping” laws where the GCHQ can “spy” on anyone and everyone.”

TeaMp0isoN as a collective were fairly scattered in their success and damage. They got into fights with fellow hacktivists Lulzsec whose real identities they threatened to out online. Angry at reports that Blackberry owner RIM were helping police track rioters during the 2011 UK riots, they attacked and defaced Blackberry’s blog. They brought down the English Defence League’s site. In an attack which finally got him jailed, Junaid Hussain got into the email account of one of Tony Blair’s aides and leaked Blair’s contact information and more online. Other attacks found them derided as ‘skiddies’, with some experts pointing out that their contribution to a big Anonymous driven hack against the Nigerian government was to hack into the Wisconsin Chiefs of Police Association and the Engineering Materials Development Institute. Neither very relevant to Nigeria. During another Anonymous led attack on Stratfor which TeaMp0isoN piggybacked they took stolen credit card details and used them to give money to a variety of charities. In a bit of a home goal, this money was reclaimed and the charities ended up having to cover payback fees.

Reflecting Hussain and Bary’s later life, there were various off-shoots of TeaMp0isoN which had a flavour of the struggle they were going to end up joining. This included their Operation Free Palestine series of hacks, and off-shoot groups ZCompany Hacking Crew (ZHC), which aimed to “end injustice, extremism, Zionism, illegal occupation” and focused on Kashmir and Pakistan. Both TeaMp0isoN and ZHC were also linked to the Mujahideen Hacking Unit (MHU) and Muslim Liberation Army (MLA). At this stage, however, the confluence was simply youthful protest being driven in lots of different directions.

When exactly Junaid Hussain’s shift to jihadism took place is unclear, but he seems to have been firmly on the path after his release from prison in 2013 for the hack on Tony Blair’s assistant. At around the same time, Bary started to reject his former life online posting on Facebook in July 2013 “the unknown mixtape with my bro tabanacle will be the last music I’m ever releasing. I have left everything for the sake of Allah.” In October that year he tweeted “for everyone that still asks me about where my videos have gone, like I said a while back I quit music & I took all the vids I can down….& if you own a channel that has any of my music up can you take it down also, appreciated. Bless.”

The two men were by then in Syria, fighting (or training) initially alongside the Army of Furqan before shifting over to IS using the same connection, Abu al Taj, to vouch for them. Reflecting their online pasts, in their IS entry forms they both identified themselves as having pasts in computers – with Bary saying that he used to work in a computer shop, while Hussain said he had a specialization in electronics.

In Junaid’s case at least we know that his online activity became a major driver of his contribution to IS, founding the Islamic State Hacking Division (ISHD) under which he drew notoriety and attention through his creative use of online activity to advance IS cause. In one of the more infamous attacks which attracted particular US government ire and drew on his TeaMp0isoN contacts, he worked with a young Kosovan studying in Malaysia to obtain and leak the contact information of 1,351 US government and military folk. Ardit Ferizi was another case of hacktivist turned jihadi supporter though he never actually made it to the Levant. Instead, using hacking skills he had perfected as the self-appointed leader of the Kosova Hacker’s Security (KHS) he attacked various sites and then passed along information he thought would be useful to IS. Ardit and Junaid knew each other from TeaMp0isoN days. Junaid enthusiastically circulated the hacked US government contacts under the ISHD accounts hoping followers would use the information to launch lone actor attacks in advance of IS cause.

FBI state that no damage was actually done through this leak. But two short weeks after he posted Ferizi’s information online, a drone strike killed Junaid at a petrol station in Raqqa. Ferizi was arrested in Malaysia in September and is now sitting in a US jail on a 20 year sentence.

Bary’s story went quiet at around the same time, with reports circulating he was unhappy with IS. He reportedly fled across the border into Turkey at which point he disappeared. Now that he has resurfaced in Spain, he will likely be looking at the inside of a prison cell for some time. In arresting him, Spanish police highlighted his “great ability to obtain funding and move like a fish in the water of the darknet” providing maybe a flavour of what he had been up to since he had disappeared. The UK has stripped him of his passport so he is most likely heading to Egypt. L Jinny’s counter-culture adventure has come to a close, but the arc shows what the journey can look like. From rapper and hacktivist to jihadist and jail.

The culmination of a more extended piece of work I have been doing around my usual obligations with the BBC (for the programme Inside Out) looking at the phenomenon of online instigation and direction by ISIS in seeking to launch attacks in the UK. Acting as frontman for the piece, the real work was done by Zack, Claire, Dippy and some undercover reporters. We shot it around London using material from online conversations by undercover reports with Junaid Hussain and other ISIS plotters. Zack wrote the piece up for the BBC, and the piece got picked up by Associated Press/Guardian, Daily Mail, Metro, Times, and Mirror. For those of you in the UK, you can see the show on the BBC iPlayer for the next month (and maybe more as it is going to be screened on the BBC News Channel as well), in addition for those of you internationally, it is going to be screened on the BBC World News at these times. Finally, Zack and myself published the below piece with the Telegraph.

Beyond this, since the last update, spoke to the Independent about the terror threat to the UK, to Sky about assessment of the difference between the threats at home and from foreign fighters returning, to Newsweek and The National about the Barcelona attack, to National Public Radio about the broader threats to Europe, and to the Daily Mail about the possibility of chemical attacks in the UK. Finally, spoke to the Financial Times about geopolitical security clashes with China in the seas.

How Isil’s shadowy ‘online manipulators’ lure Britons into committing terrorist attacks

The man on the other end of the line was called Junaid Hussain. He was speaking to an undercover reporter through an encrypted chat application; it was the middle of 2015. “Do something over there in the heart of the crusader army,” he told the reporter. He meant London.

Birmingham-born Junaid had been in Syria for two years at that point. Soon afterwards, he would die in an American drone strike. But he had enough time to make his mark in the world of jihadist terrorism as one of the most active and earliest “online manipulators” – steering people into terrorist attacks in the West solely on the basis of commands they receive through social media and encrypted applications.

Earlier this year, the UK was indeed struck by a series of terrorist attacks. The full detail of what went on in each case is still unclear. But, as Ben Wallace, Minister of State for Security told us during our investigation into this phenomenon, the use of encrypted communications “is common throughout every single one of these incidents.”

In much the same way that the rest of us have increasingly come to rely on communications applications to maintain our social relationships, terrorists have also moved into this space. In one sense, this is merely a reflection of the fact that terrorists come from the same societies as those they target. But what Isil has become particularly adept at doing is manipulating these relationships from great distances to push people to launch terrorist attacks.

The way in which this happens is surprisingly elementary. Our investigators would in the first instance make contact with the online Isil activists through their public social media profiles. People like Junaid were very active online using Twitter and Facebook and in essence used these profiles as honeypots to draw people to themselves. Once the contact had been established, the conversation would often move into an encrypted channel through WhatsApp, Telegram, Kik or Surespot.

Here, a more intense conversation would take place, with the radical asking the recruit to prove their bona fides, and direct them to parts of the dark web where they could find guides about how to make bombs, plan lone actor terrorist attacks or mask their activity. Throughout this conversation, the recruiter would be constantly exhorting the target to launch an attack, talking about potential targets, highlighting other successful incidents and pushing our investigators to undertake their own attack.

Junaid was just one of a number of online instigators our investigators spoke to. Others suggested the idea of attacking Westminster or London Bridge, and directed them to material on the dark web that showed how to use vehicles as weapons, where to stab people for maximum effect, and how to create a fake suicide vest. They suggested this was useful as it would stop police from attacking you, giving you more time to attack. Junaid was even more ambitious, suggesting that “we can train you [in] how to make bombs.”

This is the beating heart of the online terror threat. Clearly radical material disseminated online will fan the flames of ideas, and mean that groups like Isil will be able to maintain their notoriety and draw people to themselves. But it is the online manipulation that is turning these long-distance online relationships into terrorist attacks, and individuals like Junaid are able to manipulate people into launching attacks that are difficult to prevent in western capitals.

The answer to this is complicated. There is possibly more that companies could do in terms of the speed of their response. But the reality is that they are as unable to get into these applications as the rest of the world. End-to-end encryption is designed to keep everyone – even its creators – out. And while government can spend more money on staff and surveillance, when the style of attack is so individual, basic and diffuse, it becomes very difficult to maintain complete control.

Online manipulation is one of the most menacing current expressions of terrorism. Until the groups are gone, and we have cracked the code of stopping people from being drawn towards terrorist ideologies, this form of threat will be with us.

Raffaello Pantucci is director of international security studies at Rusi, and this article was co-authored by Zack Adesina, a senior producer at the BBC. Their film ‘Terror by Text’ airs on Inside Out on BBC1 at 19:30 on Monday September 4.

I have a chapter featured in this latest book Al Qaeda After Bin Laden published by the Al Mesbar Studies & Research Centre. My chapter focuses on the evolution of the Internet as a tool for al Qaeda and affiliated groups in the west, looking in turn at the cases of the Islamic Gateway and http://www.azzam.com (two portals run out of the UK established in the mid-1990s), then the networks around Younis Tsouli and the Blackburn Resistance, before focusing on al Qaeda in the Arabian Peninsula and al Shabaab’s use of the Internet. It ends looking at AQAP’s push towards Lone Wolf terrorism.

Thus far the book has only been published in Arabic, and I have pasted below the summary they published in English. I have not gotten a copy in Arabic, but believe it is available online if you contact them. If instead you would like a copy of the English text, drop me a note and I can see about getting a version to you. There is discussion of maybe publishing an English version, but it has not come together yet as far as I know.

63 Al-Qaeda after Bin Laden

The sixty-third Monthly book aims to highlight and focus on al-Qaeda after bin Laden, and whether it will endure and remain in the arena, or disappear from sight by the disappearance of its founder, due to his death.

This issue is gaining more importance in the light of major events and developments that do not only include disorders in the Arab region since a year and more, but also the withdrawal of American troops out of Iraq, and the expected withdrawal of coalition forces from Afghanistan.

In this rare Arabic version, we offer multiple views of prominent researchers and experts.

In the preface written by Manuel Almeida, lecturer at the London School of Economics and Political Science, it was shown that it is not easy to answer if whether Al-Qaeda will remain on the scene and endure after the death of bin Laden as it requires exploring hidden facts and details concerning Bin Laden and his inspiration to Al-Qaeda organization which he intended to form in Afghanistan.

Almeida illustrates that the role of bin Laden in recent years have been important in terms of strategy, funding, recruitment and polarization, as he was the great symbol of the jihadist movement, and therefore it is important to tackle the consequences of his death as well as implications of his disappearance from the scene.

Understanding the implications of the death of bin Laden and its reflections on Al-Qaeda as well as the continuous transformation process taking place in the organization, was discussed by a professor of Middle East Studies at the University (Science Po) in Paris, Jean-Pierre Filho.

He discussed the meaning of forced change in Al-Qaeda leadership, by tackling areas of agreement between bin Laden and al-Qaeda’s new Prince Ayman al-Zawahiri. Jean-Pierre addressed aspects that differentiated bin Laden as well as his uniqueness, and how his absence will affect the future of the Organization, leading to make Al-Zawahiri’s task very rugged, and complex.

Alia Brahimi, a researcher at the London School of Economics and Political Science and the University of Oxford, shows the process of change that began before the death of bin Laden, explaining that it will influence the strategy and overall objectives of the organization.

She addresses traditional goals of the organization in order to understand whether AlQaeda succeed or failed on it. Also, she tackles change in al-Qaeda, specifically democratic power within the organization, and whether it is an indicator of power or a crisis plaguing the organization.

The professor at the International Centre for the Study of radicalization (ICSR) at the Kings College University in London, Raffaello Pantucci, addressed Al Qaeda’s strategy with more depth in the evolving nature of jihadist movement.

Raffaello tackles the jihadist movement that found the internet an online tool that enabled it to play a role in the network of global jihad.

The Yemeni journalist, Nasser Al-Rubaiee, addressed the threat posed by al Qaeda in the Arabian Peninsula as it related to the global concerns about the situation of chronic instability in Yemen.

Furthermore he discusses the implications of Awlaki death and explains that al-Qaeda is not the only beneficiary of the chronic instability in Yemen, it is also tribesmen and sympathizers with al-Qaeda in the Arabian Peninsula, as well as the Yemeni government and the political opposition.

All these actors in the Yemeni political arena perceived the existence of Al-Qaeda to achieve their own agenda.

Although there are a number of armed groups in Punjab province, the Pakistani group, “Lashkar-e-Taiba”, is one of the groups most powerful and dangerous of all.

Rashmi Singh, lecture at the Center for the Study of Terrorism and Political Violence (CSTPV) at the University of St. Andrews in Scotland, explains the reasons why this group is different from other armed groups in Pakistan.

She analyzed links that combine this group and al-Qaeda, and provides an overview of its emergence and its involvement in the context of Pakistan’s war against India.

There is no doubt that the Somali Youth movement has close links with al Qaeda. The associate professor in international relations, and the President of International Relations Program at the Norwegian University of Life Sciences, Stig Jarle Hansen, shows that tackling this relationship is not easy, especially when looking at Somali movement’s ideology and al Qaeda, as well as the daily aspects of interaction between them.

The long war on terror, which United States has engaged in, along with its allies against al-Qaeda by its organized central and local branches, sparks a long list of ethical, legal and strategic aspects.

Jorge Lasmar, an international lawyer and professor of international relations at the University of (PUC), in Menas (Brazil), outlined a set of practices included human rights and democratic values that took place in the war against terrorism.

The director of Middle East Center at the London School of Economics and Political Science, Fawaz Gerges, explores the possibilities behind the outbreak of Arab revolutions, in terms of its ability to put an end to terrorism, specifically the mania which the United States possesses regarding the threat posed by al Qaeda.

Gerges also deals in depth with Arab spring events and their ties with Al-Qaeda, and how it led to marginalize Al-Qaeda and other Jihadist leaders.

Omar Al-Bashir Al-Turabi read the book entitled, “The rise and fall of Al-Qaeda”, by Fawaz Gerges, which was released after the death of bin Laden. Gerges finds out that when decision makers in the United States end the war against terrorism, thoughts will expand to more available alternatives.

Furthermore he calls for concerted efforts to reveal the forgery novel of terrorism and to put an end to the acquisition of Al-Qaeda in the imagination of Americans.

This book presented different visions and was praised by intellectuals who demanded it to be among the list read by world leaders and presidents.

This book came up as a result of the supervision, coordination and communication carried out by Manuel Almeida for a period of seven months, supported by the follow-up of our colleague, Omar Al-Bashir Al-Turabi. We thank and appreciate them for their efforts.

A new post for Foreign Policy’s AfPak Channel, exploring western jihobbyists use of the Internet and their connections with radical groups. I have a longer book chapter on a similar topic forthcoming – exploring the history of use of the Internet. A topic ripe for further contemplation I think – any tips for interesting articles warmly appreciated.

The jihad will be YouTubed

By Raffaello Pantucci | Thursday, December 15, 2011 | 11:23AM

Two weeks ago, 24-year-old Pakistani-American Jubair Ahmad admitted that he had been making videos for Lashkar-e-Taiba (LeT) from his Woodbridge, Virginia home under the direction of LeT leader Hafiz Saeed’s son Talha. Around the same time, governments on both sides of the Atlantic published findings into the link between online activity and terrorism. In the United Kingdom, the Home Office published a paper that concluded “the internet does not appear to play a significant role in AQIR [al Qaeda influenced radicalization],” while in the United States, at a hearing on the Hill, RAND terrorism guru Brian Michael Jenkins concluded that jihadist websites “may create virtual armies, but these armies remain virtual.” But while the link between turning individuals from passive consumers into active terrorists may be weak, cases like that of Jubair Ahmad show the important role this virtual army can play in magnifying the message of al-Qaeda and affiliated groups.

Jubair Ahmed is not the first Western individual who has helped establish websites or created video content in support of radical groups. One of the earliest was U.K.-based www.azzam.com, established in 1996, which provided a point from which groups in Afghanistan and Chechnya could broadcast their message while also telling potential recruits how to contact the groups. In addition,www.azzam.com  (using the moniker Azzam Publications) helped produce a series of videos and cassette tapes about the fighting in Bosnia and Chechnya that venerated fighters in the field.

By the mid-2000s, the Internet had become a more viable vehicle through which videos could not only be sold, but also streamed and downloaded. Recognizing the value of getting footage from the field out as quickly as possible, al-Qaeda in Iraq (AQI) was at the forefront of a new practice, turning videos into slick packages that could be uploaded onto radical forums. But what was most interesting was the revelation in late 2005 that British police in London had found a young Moroccan who turned out to be the infamous online jihadist known as Irhabi007 (terrorist007). Using this online handle, Younis Tsouli had set himself up as a key webmaster and designer for AQI, and was notorious for being able to find the webspace needed to publish the grim video American contractor Nicholas Berg’s beheading.

The novel aspect in Tsouli’s case was the fact that AQI leaders noticed his online abilities and started to use him as a key outlet for their material. There have been numerous other Western webmasters for important al-Qaeda linked websites – for example, in Belgium, Malika el-Aroud ran MinbarSoS, a website that provided a forum to recruit French-speaking Muslims to fight in Afghanistan. From the sunny Costa Blanca in Spain, Faical Errai helped run ansaraljihad.net, and provided assistance for radicals seeking to get to Afghanistan and Chechnya. But Tsouli appears to have been one of the first Western residents to have been actively solicited by groups in the field for his technical abilities.

And since Tsouli, we have seen al-Qaeda in the Arabian Peninsula (AQAP) use the skills of a young Pakistani-American radical blogger, Samir Khan, to help them produce Inspire magazine – a publication that has repeatedly shown up in the hands of recently arrested terrorist plotters. Khan and his American-Yemeni mentor Anwar al-Awlaki are now both dead, but in a reflection of the importance that AQAP placed upon al-Awlaki’s capacity to reach a Western audience through new media, communications found during the U.S. raid on Osama bin Laden’s Pakistani compound allegedly include an offer from AQAP leader Nasir al-Wuhayshi to put al-Awlaki in charge of the regional group. Bin Laden declined the request, possibly highlighting the different level of importance he placed upon new media capabilities in comparison to his regional affiliate leader.

A particularly surprising aspect of the Jubair Ahmad case is the volume of micromanagement that Talha Saeed put into creating the video. He tells Ahmad what images to include (not ones from the group’s infamous Mumbai attack), where to insert images of his father, the LeT leader, and what music to have over the video. Saeed is obliged to get someone in America to do the technical work for him – quite a long distance from which to direct the production of a short YouTube video using easily available technology – which likely reflects a greater facility with such technology had by people brought up in the West.

Just how easy it is to create these videos was seen recently in a case in the United Kingdom in which a law student, Mohammad Gul, was convicted of producing YouTube videos that glorified terrorist violence. While clearly the technology to make such videos is something that is universal, it does seem as though it is aspirant jihadists in the West who find it easiest to use. There was no evidence that Gul was being directed by foreign terrorist organizations to produce his material, and his case shows the continued existence of young Westerners producing radical material on their own. It may indeed be the case that the virtual armies have yet to fully emerge as active warriors on the battlefield, but in the meantime they are doing a great deal to keep the jihadist flame alive on the Web, either by themselves or at the direction of organized parties.

Raffaello Pantucci is an Associate Fellow at the International Center for the Study of Radicalisation (ICSR) and the author of the forthcoming “We Love Death As You Love Life: Britain’s Suburban Mujahedeen” (Hurst/Columbia University Press). His writing can be found at:http://www.raffaellopantucci.com.

A new post at Free Rad!cals, this time stepping on Tim’s turf a bit (though he has gone very quiet of late). It looks at a couple of cases on individuals in Spain and Canada being chased for support activities online. Since this was published, I had discovered that it looks as though the Spanish-Moroccan chap may have in fact been sent back to Morocco, which I suppose supports the case that the Spanish were unsure what to do with him and thought it best just to get rid of him.

Chasing Web Jihadists

View all Raff Pantucci Blogs

Filed under: Online Extremism, Terrorism

This post needs to be prefaced with a note that it is based on court documents rather than any convictions. Unless specified, those mentioned are innocent until proven guilty. But this caveat also serves the purpose of providing a useful intro into this post that explores the complexities of pursuing individuals’ active supporting terrorism online.

The phenomenon of online jihadists is probably the most curious innovation to exist in the world of terrorism studies. The idea that individuals with no physical connection to their chosen group can be an integral part of a terrorist organization is something that seems anathema to a politico-terrorist movement. Traditionally terrorist networks were made up of individuals who knew each other and fought alongside each other. In the current conflict we can see people convicted at the same time for being in the same network with no clear evidence that they ever actually met in person (Younis Tsouli, aka Irhabi007, and pals for example).

But what actually is it that these individuals do online which is in support of terrorism? For Tsouli and his cell the evidence they faced overwhelmed them, and they pled guilty to inciting terrorism. In activities it seemed largely as though they helped Al Qaeda in Iraq upload videos onto the Internet and committed fraud to obtain the funds to manage to continue this activity. Tsouli may also have played a role in a cell in Bosnia and another group spanning from Bradford to Toronto, though how this worked operationally is unclear. A series of recent cases, however, seem to be pushing a bit beyond this in attempting to interdict individuals who were remotely linked to networks sending fighters and funds to battlefields in Afghanistan, Chechnya and Iraq.

Back in August last year, Spanish Guardia Civil forces in sunny Alicante raided the home of Faical Errai, a 26 year-old Moroccan resident in Spain who was allegedly one of the administrator’s and the creator of the Ansar al Mujahedeen website (www.ansaraljihad.net). Documents released at the time of his arrest highlighted Spanish police’s belief that Errai was one of the key players in the website and had helped raise funds, provide ideological sustenance and direct fighters to camps in (at least) Chechnya and Waziristan. He was recorded as having boasted on the site to other forum organizers that he had personally helped at least six Libyans get to Waziristan.

Then earlier this week, Canadian forces arrested on an American warrant, Faruq Khalil Muhammad ‘Isa, a 38 year-old Iraqi-Canadian who was allegedly involved in a network sending fighters and equipment to Iraq. According to the complaintreleased by the US Department of Justice, ‘Isa was in contact electronically with a network which sent at least four fighters from Tunisia to Iraq and which was trying to send a second team of four when it was disrupted by security forces from April 2009 onwards. Having watched these networks get closed down from Canada, it seems as though ‘Isa decided that he too wanted to join in the fighting and by early 2010 was asking to talk to the “boss” and vouching for his “not just 100% but 1,000,000%” commitment to the cause. The final paragraph in the complaint against ‘Isa highlights him telling his sister in Iraq on May 28, 2010 “go learn about weapons and go attack the police and Americans. Let it be that you die.”

Both cases are examples of individuals using the Internet to supposedly direct and conduct operations or the flow of fighters on the other side of the globe. To what degree they were the key players is unclear, but certainly in the case of Errai it seemed as though an important online player was taken out of action. Monitors noticed a substantial up-tick in online threats directed at Spain and calling for the “reconqista” in the wake of his arrest – something that was further read as evidence of his importance. For ‘Isa on the other hand, he claimed surprise at the charges at his first hearing. His role in the network is unclear from the complaint beyond having played some sort of a role in supporting ideologically, and maybe practically, a team get from Tunisia to Iraq – a team which was responsible for two separate suicide bombings, one of which killed five US service people on April 10, 2009 in Mosul. There was no immediate evidence of massive retaliation in the wake of ‘Isa’s arrest.

The cases against both men seem to focus on their capacity through the Internet to play a critical role in networks that were helping fighters get to the battlefield along with funds to support the groups hosting them. There is no suggestion that either man actually went to fight and while some of ‘Isa’s intercepts seem to hint that he may be thinking in that direction, he had not yet acted on this impulse at time of arrest.

This fact is likely to result in difficulties for prosecutors. For Errai, I believe he is still in jail in Spain waiting trial, while the U.S. and Canadian governments are settling in for a long-term extradition tangle. ‘Isa’s case could end up something like Babar Ahmad’s, the British-Pakistani sitting in prison in UK unconvicted as he fights extradition to the US on charges for the most part linked with his role in the www.azzam.com family of websites and helping send support to fighters in Afghanistan and Chechnya. The key difference being that the US wants ‘Isa in specific connection to an attack in Iraq that killed five Americans, giving them a clear set of victims to show a court of law.

Herein lies the nub of the problem: how is it possible to link in a legally satisfying way individuals who are supporting extremists and networks online without actually doing anything which contravenes the law in the way that a terrorist attack does. Using a computer can seem a very detached way of supporting a terrorist act for a jury. Laws can be adapted, as has happened in the UK, to adopt charges of “incitement” to terrorism, but this remains very hard to pursue in a court of law. So the question remains how can one actively and successfully chase and convict people online who are playing a seemingly important role in fostering networks on the other side of the globe. It remains to be seen how this game will play out.