Terrorists鈥 best weapons: guns, bombs, Twitter
Terrorist group al-Shabaab live-tweeted their attack on a mall in Nairobi, Kenya, spurring debate on how terrorists use social media and what this could mean for future attacks.
Terrorist group al-Shabaab live-tweeted their attack on a mall in Nairobi, Kenya, spurring debate on how terrorists use social media and what this could mean for future attacks.
Twitter users following the deadly Westgate mall attack in Nairobi, Kenya, late Monday would have breathed a sigh of relief when the Kenyan Interior Ministry (@InteriorKE) tweeted their forces were in control of the situation after four days of fighting and 62 people killed.
But on elsewhere on Twitter, a different message appeared. The terrorist group behind the attack 鈥 Somalia-based, al-Qaeda-affiliated al-Shabaab 鈥 tweeted an ominous message the next morning from @HSM_PR:
"#Westgate attack is now into its fourth day but the operation is far, far greater than how the Kenyans perceive it in their minds."
Though al-Shabaab is the most recent group to broadcast their message online, terrorist groups have been using social media for publicity and recruitment for many years. It's been a tool that has advanced their message into the Western world and brought further attention to their acts of terror.聽
Al-Shabaab (which means 鈥淭he Youth鈥 in Arabic) first joined Twitter in 2011 as @HSMPress, linking聽to audio files of the sounds of captured soldiers and sharing suicide-bomb body counts. They were active on the site, responding to tweets and amassing thousands of followers. Fast forward to last weekend: their tweets focused on updates about the 鈥渟uccess" of the attack in Nairobi. Twitter suspended five of their accounts throughout the weekend, but al-Shabaab continued to open new accounts. And each new account garnered thousands of followers in a matter of hours, an impressive feat, had the circumstances been better.
鈥淭errorists never invented anything about the Internet; they didn鈥檛 design anything online, but they learned very fast how to learn the latest innovations in cyber space,鈥 says Gabriel Weimann, a fellow at the Woodrow Wilson International Center for Scholars in Washington and author of the upcoming book 鈥淭errorism in Cyberspace: The Next Generation.鈥
Mr. Weimann has been tracking terrorists鈥 use of online media for more than 15 years. When he started in 1998, his team was only looking at 12 sites, which he says were very primitive. Now they monitor more than 9,600 sites that range from chat rooms and Web forums to social media sites such as Twitter, Facebook, and even Google Earth. 鈥淚f you were a terrorist, how would you enjoy having free satellite [image] services at your disposal?鈥 he says.
He says the enormous increase in the online presence of terrorism groups is due to 鈥渘arrowcasting鈥 instead of broadcasting. Terrorism groups split up their online activities to focus on different target audiences, such as overseas populations, women, and even children. The aim is not unlike any other marketing strategy: by fine-tuning their message, they can recruit specific groups.聽
And al-Shabaab is hardly the only group to use social media. The Taliban has a Twitter account (@alemarahweb), same with Hezbollah (@almanarnews) and Hamas (@AlqassamBrigade), along with many other smaller organizations. Facebook has also been used to create both official and unofficial pages for terrorist groups, though a study from the Middle East Media Research Institute聽(MEMRI)聽in Washington found that Facebook is active in suspending accounts linked to terrorism.
The flow of terrorists online also poses problems for social media sites that are based on principles of free speech and offer a platform for connecting people. Twitter, for example, didn鈥檛 take down al-Shabaab鈥檚 initial account until January 2012, when the group posted a gruesome photo of a dead French soldier killed in a hostage rescue attempt. This blatantly violated Twitter鈥檚 Terms and Conditions, which says 鈥淵ou may not publish or post direct, specific threats of violence against others鈥 as well as 鈥淵ou may not use our service for any unlawful purposes or in furtherance of illegal activities.鈥 A month later, al-Shabaab rejoined the site with a different handle.聽
On the other hand, Twitter has not taken down the Taliban鈥檚 account, arguing that the group is not registered聽as a Foreign Terrorist Organization.
Twitter did not respond to a request for comment regarding terrorists using its site.
Though their radical tweets may be unsettling, terrorists鈥 ongoing social media presence has allowed extensive monitoring by academic groups, the government, and local activists. Weinmann鈥檚 group archives every terrorist-issued tweet, message, or YouTube clip they find. MEMRI聽recently released a three-part study called "Jihadi Media Foundations on Facebook and Twitter." The International Security Assistance Force聽flags聽suspicious Taliban tweets. Minneapolis-based anti-terrorism activist Abdirizak Bihi,聽profiled in this Washington Post article, makes it a regular part of his day to search Facebook and chat rooms to monitor al-Shabaab recruitment.
Initial reports say one or two of the terrorists involved in the Nairobi attack are allegedly from the United States. If this proves to be true, online media may have helped bring al-Shabaab鈥檚 message across the world from Somalia to the US.聽
But it also may help people understand how a person can evolve from civilian to terrorist. Weimann says some of the most difficult attacks to understand and predict are the "lone wolf" attacks, like the Boston Marathon bombings, or even young men recruited to join overseas groups. Tracking the online and social media interactions of terrorist groups, however, often shows that the terrorist did not radicalize and train themselves. That comes from a much larger group, contacted through the cyber world.
"You saw only the attacking wolf, but there is a virtual pack behind them," he says.