• عربي
  • Fr
  • Es
No Result
View All Result
European Eye on Radicalization
  • Home
  • About Us
    • Who We Are
      • Editorial board and staff
      • Contributors
    • Vision
  • Analysis
  • Opinion Pieces
    • EER Editorials
    • Contributors’ Opinions
  • Reports
  • Reading Radicalization
  • Events
    • EER Events
    • Events EER attends
  • Interviews
  • Videos
  • Contact
  • Home
  • About Us
    • Who We Are
      • Editorial board and staff
      • Contributors
    • Vision
  • Analysis
  • Opinion Pieces
    • EER Editorials
    • Contributors’ Opinions
  • Reports
  • Reading Radicalization
  • Events
    • EER Events
    • Events EER attends
  • Interviews
  • Videos
  • Contact
No Result
View All Result
European Eye on Radicalization
No Result
View All Result
Home Analysis

How Technology Has Empowered Terrorists and Helped Them Evolve

12 July 2021
in Analysis
How Technology Has Empowered Terrorists and Helped Them Evolve
885
VIEWS
Share on FacebookShare on Twitter
Article author: Isaac Kfir

Isaac Kfir, Advisory Board, International Institute for Justice and the Rule of Law and Adjunct Professor, Charles Sturt University

In his April 2021 testimony, Mike Burgess the Director-General of the Australian Security Intelligence Organization emphasized that the threat of a terrorist attack in the next 12 months remains probable. In his appearance before Senate Estimates, Burgess also pointed out that terrorist organizations are always changing their tactics and strategies so that they do not become vulnerable.

There are many obstacles that counterterrorism officials face in dealing with the threat. First, when it comes to data there is either a lack of data or too much raw data to properly analyze. Secondly, the emergence of lone actors has added an extra layer of complexity to the issue, complicating a previously predictive process. There are also issues of complacency, lack of access to terrorists’ inner thinking and a failure to think outside the box when it comes to counterterrorism policies.

In the 1970s and 80s, preeminent terrorism scholar Professor Martha Crenshaw explored the concept of revolutionary terrorism, the causes of terrorism, and how terrorism declines. This work led her to also examine why terrorists innovate, which she defined as ‘new patterns of behavior’. Crenshaw identified three types of terrorist innovation: strategic, organizational, and tactical. The first refers to changes in the strategic thinking and outlooks of groups, organizational innovations refer to internal changes within a group, whereas tactical innovations involve the adoption of new equipment or tools. In her study, Crenshaw did not develop matrixes to assess changes or identify specific events or reasons as to why terrorist groups innovate.

The Role of Technology

Adam Dolnik, Professor of Terrorism Studies at the University of Wollongong, sought to address this gap in his 2015 study. He discovered that terrorist groups are incrementalists and not revolutionary — they opt to adapt technology according to their strategic, organizational, and tactical goals. Crenshaw’s and Dolnik’s landmark research did not factor in the role of a lone actors carrying out terrorist attacks, nor the role that networks and franchises have come to play in the terrorist landscape. They did, however, recognize the role of technology — viewing it not only as a revolutionary tool but also as something used by extremists to supplement conventional tactics. This is why scholars such as Dolnik, and later Gary Ackerman, concluded that while terrorist groups may be innovative in how they apply technology, their thinking and actions are limited in scope, lacking what some would describe as ‘malevolent creativity’.

Fourth-wave terrorist groups are driven by religion, making them more receptive toward mass-casualty attacks as they seek revolutionary change. These groups — unlike anarchists, anti-colonialist, or the New Left — are cosmic warriors embracing catastrophic Messianism that calls for a decisive battle between ‘good and evil’. Cosmic warriors see the world through a rigid lens of the damned (unenlightened) and the saved (enlightened), rejecting any compromise as it would mean ‘accepting the devil and rejecting salvation’. These types seek mass destruction because they believe it will bring forth the believed salvation.

Technology has become a crucial factor when studying cosmic warriors and how they innovate. It carries the potential for the Armageddon that they want, and technology gives them the specific capability to explore new weapons, tools, ideas and spread the ‘word’ without ever leaving their bedroom. For example, right-wing Norwegian terrorist, Andres Breivik, was able to send his 1,500-page compendium to over 8,000 people through the internet before he embarked on his terrorist attacks. Doing something like this before the emergence of the internet was difficult. For example, in 1978, American terrorist Ted Kaczynski, who later became known as the ‘Unabomber’, had to send his ‘manifesto’ to traditional print publications, and it was entirely up to them whether or not to publish the document.

Access to Information and Training

Technology has certainly made the transfer of knowledge easier, and terrorists can more easily learn and copy other broadcasted attacks. While Brenton Tarrant — the Australian terrorist who shot dead 51 Muslim worshippers in Christchurch, New Zealand — was the first to livestream a terrorist attack, he was not the first to livestream an atrocity. In 2015, Vester Lee Flanagan, an American, shot and killed Alison Parker and Adam Ward during a live news broadcast. Before shooting himself, Flanagan, who was a disgruntled worker, uploaded a video of the incident and sent a 23-page document explaining his actions. Several months later, , a Frenchman who claimed allegiance to ISIS, brutally stabbed two French police officers. Abdalla filmed the attack and later posted it on Facebook. While there is no evidence that Abballa was aware of Flanagan’s broadcasted attack, but since 2015, there have been several cases of individuals (Mohamed Merah, Mehdi Nemmouche, Amedy Coulibaly, Elliot Rodger) filming their terrorist attacks. Abballa , a Frenchman who claimed allegiance to ISIS, brutally stabbed two French police officers. Abdalla filmed the attack and later posted it on Facebook. While there is no evidence that Abballa was aware of Flanagan’s broadcasted attack, there have been several cases, since 2015, of individuals (Mohamed Merah, Mehdi Nemmouche, Amedy Coulibaly, Elliot Rodger) filming their terrorist attacks.

Technology has also enabled individuals to train. During his trial, Breivik admitted to using Call of Duty: Modern Warfare as a “training” tool. He also noted that video games presented various tasks and challenges to players that help prepare them for a real-life attack. On his part, Tarrant admitted to playing Fortnite and Spyro the Dragon.

Avoiding Detection

Over the past few years, terrorist organizations have evolved. Effective counterterrorism measures have led to the emergence of franchises and lone actors who are less bound by a rigid organizational structure — which is arguably beneficial to their franchisors who may prefer that they operate as semi-autonomous or autonomous — allowing them to experiment with new tactics and tools. In his compendium, Breivik explained he had chosen to be a lone actor because he calculated that getting help from others to build an IED would increase the likelihood of discovery. This emphasizes his savviness and commitment to carry out his attacks, as he looked for ways to train, avoid detection and desensitize.

Breivik’s case epitomizes why extremists look to innovate as they recognize that if they are to carry out their acts of violence, they not only need to prepare themselves, but they also must find ways to avoid detection. The access that technology gave Breivik, coupled with the nature of his attack, is arguably why he has been hailed as a hero by Russian far-right extremists, Brenton Tarrant, Christopher Hassan, David Sonboly, and others.

Conclusion

When thinking about counterterrorism it is important to remember that while the 9/11 Commission recognized that many errors took place prior to the attack, it also emphasized that one of the major shortcomings was a ‘failure of imagination’. It pointed out that intelligence and security agencies were linear, convergent thinkers who struggled to think divergently and, therefore, missed important connections.

To properly tackle the threat, counterterrorism policies must evolve and explore malevolent creativity. If we are to continue to stay ahead of violent extremists, we must address our cognitive biases and understand that extremists are constantly searching for new ways to carry out their agendas. Although we are facing a hiatus in terms of mass casualty attacks, there is a new generation of terrorists waiting to make a name for themselves.

European Eye on Radicalization aims to publish a diversity of perspectives and as such does not endorse the opinions expressed by contributors. The views expressed in this article represent the author alone.

Related Posts

The Impact of the Taliban’s Takeover of Afghanistan on the Middle East and Europe
Analysis

The Impact of the Taliban’s Takeover of Afghanistan on the Middle East and Europe

2 February 2023
Abdullah al-Samawi: The Islamist Activist Who Transcended Extremist Groups
Analysis

Abdullah al-Samawi: The Islamist Activist Who Transcended Extremist Groups

20 January 2023
Amid Anti-Government Protests, Iran Steps Up Repression at Home and Propaganda Abroad
Analysis

Amid Anti-Government Protests, Iran Steps Up Repression at Home and Propaganda Abroad

16 January 2023
The Evolution of the Malaysian Islamic Party (PAS): How it Became so Powerful
Analysis

The Evolution of the Malaysian Islamic Party (PAS): How it Became so Powerful

12 January 2023
Boko Haram: An Inspiring Model for Criminal Gangs and Beyond
Analysis

Boko Haram: An Inspiring Model for Criminal Gangs and Beyond

10 January 2023
The Reichsbürger Raid: The Beginning of A New Relationship Between Germany and its Sovereignists?
Analysis

The Reichsbürger Raid: The Beginning of A New Relationship Between Germany and its Sovereignists?

19 December 2022

Latest from Twitter

Popular

The Challenges of Combatting Extremist Financing in Germany

The Challenges of Combatting Extremist Financing in Germany

6 January 2023
The Myth of the Remote-Controlled Car Bomb

The Myth of the Remote-Controlled Car Bomb

16 September 2019
How a Swedish Agency Stopped Funding the Muslim Brotherhood

How a Swedish Agency Stopped Funding the Muslim Brotherhood

5 September 2022

Taliban: Structure, Strategy, Agenda, and the International Terrorism Threat

7 October 2022
The Role of Online Communities in the Expansion of Far-Right Extremism

The Role of Online Communities in the Expansion of Far-Right Extremism

3 November 2022
Becoming Ansar Allah: How the Islamic Revolution Conquered Yemen

Becoming Ansar Allah: How the Islamic Revolution Conquered Yemen

24 March 2021

© 2018 EER - Copyright © European Eye on Radicalization.

No Result
View All Result
  • Home
  • About Us
    • Who We Are
      • Editorial board and staff
      • Contributors
    • Vision
  • Analysis
  • Opinion Pieces
    • EER Editorials
    • Contributors’ Opinions
  • Reports
  • Reading Radicalization
  • Events
    • EER Events
    • Events EER attends
  • Interviews
  • Videos
  • Contact
  • عربي
  • Fr
  • Es

© 2018 EER - Copyright © European Eye on Radicalization.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.