All Article Properties:
{
"access_control": false,
"status": "publish",
"objectType": "Article",
"id": "1647087",
"signature": "Article:1647087",
"url": "https://staging.dailymaverick.co.za/article/2023-04-13-iswap-use-of-tech-and-cybercrime-systems-could-intensify-lake-chad-basin-violence/",
"shorturl": "https://staging.dailymaverick.co.za/article/1647087",
"slug": "iswap-use-of-tech-and-cybercrime-systems-could-intensify-lake-chad-basin-violence",
"contentType": {
"id": "1",
"name": "Article",
"slug": "article"
},
"views": 0,
"comments": 0,
"preview_limit": null,
"excludedFromGoogleSearchEngine": 0,
"title": "Iswap use of tech and cybercrime systems could intensify Lake Chad Basin violence",
"firstPublished": "2023-04-13 20:18:50",
"lastUpdate": "2023-04-13 20:18:50",
"categories": [
{
"id": "3",
"name": "Africa",
"signature": "Category:3",
"slug": "africa",
"typeId": {
"typeId": "1",
"name": "Daily Maverick",
"slug": "",
"includeInIssue": "0",
"shortened_domain": "",
"stylesheetClass": "",
"domain": "staging.dailymaverick.co.za",
"articleUrlPrefix": "",
"access_groups": "[]",
"locale": "",
"preview_limit": null
},
"parentId": null,
"parent": [],
"image": "",
"cover": "",
"logo": "",
"paid": "0",
"objectType": "Category",
"url": "https://staging.dailymaverick.co.za/category/africa/",
"cssCode": "",
"template": "default",
"tagline": "",
"link_param": null,
"description": "",
"metaDescription": "",
"order": "0",
"pageId": null,
"articlesCount": null,
"allowComments": "1",
"accessType": "freecount",
"status": "1",
"children": [],
"cached": true
},
{
"id": "387188",
"name": "Maverick News",
"signature": "Category:387188",
"slug": "maverick-news",
"typeId": {
"typeId": "1",
"name": "Daily Maverick",
"slug": "",
"includeInIssue": "0",
"shortened_domain": "",
"stylesheetClass": "",
"domain": "staging.dailymaverick.co.za",
"articleUrlPrefix": "",
"access_groups": "[]",
"locale": "",
"preview_limit": null
},
"parentId": null,
"parent": [],
"image": "",
"cover": "",
"logo": "",
"paid": "0",
"objectType": "Category",
"url": "https://staging.dailymaverick.co.za/category/maverick-news/",
"cssCode": "",
"template": "default",
"tagline": "",
"link_param": null,
"description": "",
"metaDescription": "",
"order": "0",
"pageId": null,
"articlesCount": null,
"allowComments": "1",
"accessType": "freecount",
"status": "1",
"children": [],
"cached": true
}
],
"content_length": 6488,
"contents": "<span style=\"font-weight: 400;\">Islamic State West Africa Province (Iswap) could be close to using delivery drones for attacks in the Lake Chad Basin. Weaponising and adapting unmanned aerial vehicles (UAVs) is a new trend in the group’s operational strategy, and could worsen the conflict. </span>\r\n\r\n<span style=\"font-weight: 400;\">Institute for Security Studies (ISS) research shows that Iswap is already trialling delivery drones to carry improvised explosive devices. This includes assessing the weight that can be carried, how far they can go and how long they stay in the air. The threat goes beyond military targets and may impact humanitarian service delivery. </span>\r\n\r\n<span style=\"font-weight: 400;\">Ongoing </span><a href=\"https://prnigeria.com/2023/02/23/aggressive-raid-nigerian/\"><span style=\"font-weight: 400;\">operations</span></a><span style=\"font-weight: 400;\"> by Nigeria’s military and clashes with Boko Haram faction, Jama’atu Ahlis-Sunna Lidda’Awati Wal-Jihad (JAS), have inflicted heavy </span><a href=\"https://punchng.com/boko-haram-kills-35-iswap-combatants-in-lake-chad/\"><span style=\"font-weight: 400;\">losses</span></a><span style=\"font-weight: 400;\"> on Iswap and significantly reduced its space to operate. And successful intelligence-driven strikes resulting in arrests of Iswap members outside the north-east are preventing the group from expanding. These setbacks may be forcing Iswap to adapt its strategy, as it has done before. </span>\r\n\r\n<span style=\"font-weight: 400;\">So far, Iswap’s use of drones has been limited to propaganda, surveillance and communication. ISS research, including analysis of publicly available propaganda materials and interviews with former combatants and associates, reveals an elaborate use of communication technology (see Chart 1). This includes satellite and android phones, drones, social media (Telegram and WhatsApp), high-speed printers, laptops, high-definition digital cameras, Wi-Fi, clip-on microphones, walkie-talkies, and data compression and archiving software. </span>\r\n\r\n<p><img loading=\"lazy\" class=\"wp-image-1647096 size-full\" src=\"https://www.dailymaverick.co.za/wp-content/uploads/2023/04/Chart-1-Use-of-technology-by-Iswap.jpg\" alt=\"Iswap technology\" width=\"720\" height=\"456\" /> <em>Chart 1: Use of technology by Iswap. (Graphic: Supplied by ISS Today)</em></p>\r\n\r\n<span style=\"font-weight: 400;\">All these tools are used by the media team headed by Abba Yusuf (Abu Rumaisa), son of late Boko Haram founder Mohammed Yusuf. The team’s primary function is to showcase Iswap as a successful jihadist group. That propaganda will encourage recruitment and present a positive image that cements its position as the top Islamic State affiliate </span><a href=\"https://www.visionofhumanity.org/\"><span style=\"font-weight: 400;\">globally</span></a><span style=\"font-weight: 400;\">. The media department also handles relations with other violent extremist groups, including Islamic State. </span>\r\n\r\n<span style=\"font-weight: 400;\">Former Iswap members, including from the media unit, told ISS how the department functions. Staff are recruited from within the group and taught the basics of operating the equipment, mostly cameras. They accompany fighters and wait at a distance to be invited to take photos and videos, usually when things go Iswap’s way. </span>\r\n\r\n<span style=\"font-weight: 400;\">The raw footage and pictures are sent to Islamic State, which produces the propaganda material. The group shares the content with Iswap’s media team, which distributes it through a private and members-only Telegram account, Nashir News Agency (see Chart 2).</span>\r\n\r\n<p><img loading=\"lazy\" class=\"wp-image-1647099 size-full\" src=\"https://www.dailymaverick.co.za/wp-content/uploads/2023/04/Chart-2-Propaganda-image-released-in-2022-on-Telegram-showing-IS-pledge-of-allegiance-in-Northwest-Nigeria.jpg\" alt=\"Iswap\" width=\"720\" height=\"772\" /> <em>Chart 2: Propaganda image released in 2022 on Telegram, showing IS pledge of allegiance in Northwest Nigeria (Supplied by ISS Today)</em></p>\r\n\r\n<span style=\"font-weight: 400;\">Iswap relies heavily on high-speed satellite internet to communicate with Islamic State and other groups. Sources told ISS that Iswap used Thuraya Wi-Fi and spent about $6,000 monthly on data. They said Lagos was the main supply source but that Iswap encountered a problem with the supply, forcing it to switch to Chad. Although Thuraya satellite phones and internet services are </span><a href=\"https://www.outfittersatellite.com/Countries-with-Satellite-Phone-Restrictions_b_11.html#:~:text=Due%20to%20the%20ongoing%20threat,not%20available%20for%20any%20reason.&text=It%20is%20illegal%20to%20possess,viewed%20with%20suspicion%20as%20well\"><span style=\"font-weight: 400;\">illegal</span></a><span style=\"font-weight: 400;\"> in Chad, they are used in secret. </span>\r\n\r\n<span style=\"font-weight: 400;\">A particular Thuraya model stands out as a possible device used by Iswap. It is available in Nigeria but mainly in Lagos. The Thuraya XT-Hotspot is </span><a href=\"https://www.thuraya.com/products-list/land-voice/thuraya-xt-hotspot\"><span style=\"font-weight: 400;\">marketed</span></a><span style=\"font-weight: 400;\"> as the “world’s fastest Wi-Fi via satellite for communication needs beyond GSM coverage … for quick and secure Internet connectivity in the remotest of locations.”</span>\r\n\r\n<span style=\"font-weight: 400;\">The sources claim Iswap has dedicated vehicles fitted with internet services to facilitate communication and data sharing on the go. The media team uses one of these vehicles when it accompanies fighters, enabling them to immediately share material from the battlefield. This explains how Iswap can release information quickly, including images and videos, sometimes within hours of attacks. </span>\r\n\r\n<span style=\"font-weight: 400;\">Iswap’s public communication also suggests it can easily share data with Islamic State using data compression and archiving software. In addition to speed and encryption, the software reduces bandwidth costs. </span>\r\n\r\n<span style=\"font-weight: 400;\">There is no single way to deal with the problem of Iswap’s use of technology. The solution lies in various measures working together. </span>\r\n\r\n<span style=\"font-weight: 400;\">ISS </span><a href=\"https://issafrica.org/research/west-africa-report/boko-harams-deadly-business-an-economy-of-violence-in-the-lake-chad-basin\"><span style=\"font-weight: 400;\">research</span></a><span style=\"font-weight: 400;\"> has detailed how Iswap exploited Lake Chad Basin trade routes to get vital supplies. The group’s remote location should be an advantage for security forces who could disrupt its supply lines. Checkpoint searches have proved successful and can be used again. Those bringing in equipment and accessories should explain their destinations, which security agents should verify. Collaboration among security forces in the four affected Lake Chad Basin countries can help. </span>\r\n\r\n<span style=\"font-weight: 400;\">The ISS report also showed how civilian and military collaborators helped Iswap get supplies. Security force leaders in the region must hold their personnel to the highest standards and use an independent ombudsman to deter corruption. To prevent civilians from collaborating with terror groups, authorities should work with communities and trade unions to identify and disrupt networks helping Iswap. The criminal justice system can also play a deterrent role. </span>\r\n\r\n<span style=\"font-weight: 400;\">A future concern is that violent extremist groups like Iswap become involved in cybercrime. Given Nigeria’s enormous financial powers and growing </span><a href=\"https://mindmatters.ai/2022/08/overcrowded-and-chaotic-lagos-is-becoming-africas-silicon-valley/\"><span style=\"font-weight: 400;\">tech</span></a><span style=\"font-weight: 400;\"> industry, authorities should prepare for this. Investing in technology and collaborating with tech companies to prevent their products, platforms or services from falling into Iswap’s hands is a start.</span>\r\n\r\n<span style=\"font-weight: 400;\">Going after Iswap’s money is vital. The group should be forced out of its current location using targeted and joint military operations. This would cut Iswap’s access to its major revenue base. In using these tactics, care should be taken to avoid adversely affecting civilians, either by destroying their livelihoods or inflicting human rights violations.</span>\r\n\r\n<span style=\"font-weight: 400;\">Curtailing Iswap’s access to technology will prevent it from using tech to plan and execute attacks, spread propaganda and recruit. That will reduce the damage the group inflicts on civilians and aid workers in the Lake Chad Basin. </span><b>DM</b>\r\n\r\n<i><span style=\"font-weight: 400;\">Malik Samuel, Researcher, Institute for Security Studies (ISS) Regional Office for West Africa, the Sahel and the Lake Chad Basin.</span></i>\r\n\r\n<i><span style=\"font-weight: 400;\">Research for this article was funded by the Government of The Netherlands.</span></i>\r\n\r\n<i><span style=\"font-weight: 400;\">First published by </span></i><a href=\"https://issafrica.org/iss-today\"><i><span style=\"font-weight: 400;\">ISS Today</span></i></a><span style=\"font-weight: 400;\">.</span>",
"teaser": "Iswap use of tech and cybercrime systems could intensify Lake Chad Basin violence",
"externalUrl": "",
"sponsor": null,
"authors": [
{
"id": "29210",
"name": "Malik Samuel for ISS TODAY",
"image": "",
"url": "https://staging.dailymaverick.co.za/author/malik-samuel-for-iss-today/",
"editorialName": "malik-samuel-for-iss-today",
"department": "",
"name_latin": ""
}
],
"description": "",
"keywords": [
{
"type": "Keyword",
"data": {
"keywordId": "7731",
"name": "Boko Haram",
"url": "https://staging.dailymaverick.co.za/keyword/boko-haram/",
"slug": "boko-haram",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Boko Haram",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "10244",
"name": "Cybercrime",
"url": "https://staging.dailymaverick.co.za/keyword/cybercrime/",
"slug": "cybercrime",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Cybercrime",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "41738",
"name": "ISS Today",
"url": "https://staging.dailymaverick.co.za/keyword/iss-today/",
"slug": "iss-today",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "ISS Today",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "87162",
"name": "Lake Chad basin",
"url": "https://staging.dailymaverick.co.za/keyword/lake-chad-basin/",
"slug": "lake-chad-basin",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Lake Chad basin",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "346778",
"name": "Islamic State West Africa Province",
"url": "https://staging.dailymaverick.co.za/keyword/islamic-state-west-africa-province/",
"slug": "islamic-state-west-africa-province",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Islamic State West Africa Province",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "348480",
"name": "Malik Samuel",
"url": "https://staging.dailymaverick.co.za/keyword/malik-samuel/",
"slug": "malik-samuel",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Malik Samuel",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "348481",
"name": "ISWAP",
"url": "https://staging.dailymaverick.co.za/keyword/iswap/",
"slug": "iswap",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "ISWAP",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "389919",
"name": "violent extremist groups",
"url": "https://staging.dailymaverick.co.za/keyword/violent-extremist-groups/",
"slug": "violent-extremist-groups",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "violent extremist groups",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "399926",
"name": "delivery drones",
"url": "https://staging.dailymaverick.co.za/keyword/delivery-drones/",
"slug": "delivery-drones",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "delivery drones",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "399927",
"name": "IEDs",
"url": "https://staging.dailymaverick.co.za/keyword/ieds/",
"slug": "ieds",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "IEDs",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "399928",
"name": "Abba Yusuf",
"url": "https://staging.dailymaverick.co.za/keyword/abba-yusuf/",
"slug": "abba-yusuf",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Abba Yusuf",
"translations": null
}
}
],
"short_summary": null,
"source": null,
"related": [],
"options": [],
"attachments": [
{
"id": "37707",
"name": "",
"description": "<span style=\"font-weight: 400;\">Islamic State West Africa Province (Iswap) could be close to using delivery drones for attacks in the Lake Chad Basin. Weaponising and adapting unmanned aerial vehicles (UAVs) is a new trend in the group’s operational strategy, and could worsen the conflict. </span>\r\n\r\n<span style=\"font-weight: 400;\">Institute for Security Studies (ISS) research shows that Iswap is already trialling delivery drones to carry improvised explosive devices. This includes assessing the weight that can be carried, how far they can go and how long they stay in the air. The threat goes beyond military targets and may impact humanitarian service delivery. </span>\r\n\r\n<span style=\"font-weight: 400;\">Ongoing </span><a href=\"https://prnigeria.com/2023/02/23/aggressive-raid-nigerian/\"><span style=\"font-weight: 400;\">operations</span></a><span style=\"font-weight: 400;\"> by Nigeria’s military and clashes with Boko Haram faction, Jama’atu Ahlis-Sunna Lidda’Awati Wal-Jihad (JAS), have inflicted heavy </span><a href=\"https://punchng.com/boko-haram-kills-35-iswap-combatants-in-lake-chad/\"><span style=\"font-weight: 400;\">losses</span></a><span style=\"font-weight: 400;\"> on Iswap and significantly reduced its space to operate. And successful intelligence-driven strikes resulting in arrests of Iswap members outside the north-east are preventing the group from expanding. These setbacks may be forcing Iswap to adapt its strategy, as it has done before. </span>\r\n\r\n<span style=\"font-weight: 400;\">So far, Iswap’s use of drones has been limited to propaganda, surveillance and communication. ISS research, including analysis of publicly available propaganda materials and interviews with former combatants and associates, reveals an elaborate use of communication technology (see Chart 1). This includes satellite and android phones, drones, social media (Telegram and WhatsApp), high-speed printers, laptops, high-definition digital cameras, Wi-Fi, clip-on microphones, walkie-talkies, and data compression and archiving software. </span>\r\n\r\n[caption id=\"attachment_1647096\" align=\"aligncenter\" width=\"720\"]<img class=\"wp-image-1647096 size-full\" src=\"https://www.dailymaverick.co.za/wp-content/uploads/2023/04/Chart-1-Use-of-technology-by-Iswap.jpg\" alt=\"Iswap technology\" width=\"720\" height=\"456\" /> <em>Chart 1: Use of technology by Iswap. (Graphic: Supplied by ISS Today)</em>[/caption]\r\n\r\n<span style=\"font-weight: 400;\">All these tools are used by the media team headed by Abba Yusuf (Abu Rumaisa), son of late Boko Haram founder Mohammed Yusuf. The team’s primary function is to showcase Iswap as a successful jihadist group. That propaganda will encourage recruitment and present a positive image that cements its position as the top Islamic State affiliate </span><a href=\"https://www.visionofhumanity.org/\"><span style=\"font-weight: 400;\">globally</span></a><span style=\"font-weight: 400;\">. The media department also handles relations with other violent extremist groups, including Islamic State. </span>\r\n\r\n<span style=\"font-weight: 400;\">Former Iswap members, including from the media unit, told ISS how the department functions. Staff are recruited from within the group and taught the basics of operating the equipment, mostly cameras. They accompany fighters and wait at a distance to be invited to take photos and videos, usually when things go Iswap’s way. </span>\r\n\r\n<span style=\"font-weight: 400;\">The raw footage and pictures are sent to Islamic State, which produces the propaganda material. The group shares the content with Iswap’s media team, which distributes it through a private and members-only Telegram account, Nashir News Agency (see Chart 2).</span>\r\n\r\n[caption id=\"attachment_1647099\" align=\"aligncenter\" width=\"720\"]<img class=\"wp-image-1647099 size-full\" src=\"https://www.dailymaverick.co.za/wp-content/uploads/2023/04/Chart-2-Propaganda-image-released-in-2022-on-Telegram-showing-IS-pledge-of-allegiance-in-Northwest-Nigeria.jpg\" alt=\"Iswap\" width=\"720\" height=\"772\" /> <em>Chart 2: Propaganda image released in 2022 on Telegram, showing IS pledge of allegiance in Northwest Nigeria (Supplied by ISS Today)</em>[/caption]\r\n\r\n<span style=\"font-weight: 400;\">Iswap relies heavily on high-speed satellite internet to communicate with Islamic State and other groups. Sources told ISS that Iswap used Thuraya Wi-Fi and spent about $6,000 monthly on data. They said Lagos was the main supply source but that Iswap encountered a problem with the supply, forcing it to switch to Chad. Although Thuraya satellite phones and internet services are </span><a href=\"https://www.outfittersatellite.com/Countries-with-Satellite-Phone-Restrictions_b_11.html#:~:text=Due%20to%20the%20ongoing%20threat,not%20available%20for%20any%20reason.&text=It%20is%20illegal%20to%20possess,viewed%20with%20suspicion%20as%20well\"><span style=\"font-weight: 400;\">illegal</span></a><span style=\"font-weight: 400;\"> in Chad, they are used in secret. </span>\r\n\r\n<span style=\"font-weight: 400;\">A particular Thuraya model stands out as a possible device used by Iswap. It is available in Nigeria but mainly in Lagos. The Thuraya XT-Hotspot is </span><a href=\"https://www.thuraya.com/products-list/land-voice/thuraya-xt-hotspot\"><span style=\"font-weight: 400;\">marketed</span></a><span style=\"font-weight: 400;\"> as the “world’s fastest Wi-Fi via satellite for communication needs beyond GSM coverage … for quick and secure Internet connectivity in the remotest of locations.”</span>\r\n\r\n<span style=\"font-weight: 400;\">The sources claim Iswap has dedicated vehicles fitted with internet services to facilitate communication and data sharing on the go. The media team uses one of these vehicles when it accompanies fighters, enabling them to immediately share material from the battlefield. This explains how Iswap can release information quickly, including images and videos, sometimes within hours of attacks. </span>\r\n\r\n<span style=\"font-weight: 400;\">Iswap’s public communication also suggests it can easily share data with Islamic State using data compression and archiving software. In addition to speed and encryption, the software reduces bandwidth costs. </span>\r\n\r\n<span style=\"font-weight: 400;\">There is no single way to deal with the problem of Iswap’s use of technology. The solution lies in various measures working together. </span>\r\n\r\n<span style=\"font-weight: 400;\">ISS </span><a href=\"https://issafrica.org/research/west-africa-report/boko-harams-deadly-business-an-economy-of-violence-in-the-lake-chad-basin\"><span style=\"font-weight: 400;\">research</span></a><span style=\"font-weight: 400;\"> has detailed how Iswap exploited Lake Chad Basin trade routes to get vital supplies. The group’s remote location should be an advantage for security forces who could disrupt its supply lines. Checkpoint searches have proved successful and can be used again. Those bringing in equipment and accessories should explain their destinations, which security agents should verify. Collaboration among security forces in the four affected Lake Chad Basin countries can help. </span>\r\n\r\n<span style=\"font-weight: 400;\">The ISS report also showed how civilian and military collaborators helped Iswap get supplies. Security force leaders in the region must hold their personnel to the highest standards and use an independent ombudsman to deter corruption. To prevent civilians from collaborating with terror groups, authorities should work with communities and trade unions to identify and disrupt networks helping Iswap. The criminal justice system can also play a deterrent role. </span>\r\n\r\n<span style=\"font-weight: 400;\">A future concern is that violent extremist groups like Iswap become involved in cybercrime. Given Nigeria’s enormous financial powers and growing </span><a href=\"https://mindmatters.ai/2022/08/overcrowded-and-chaotic-lagos-is-becoming-africas-silicon-valley/\"><span style=\"font-weight: 400;\">tech</span></a><span style=\"font-weight: 400;\"> industry, authorities should prepare for this. Investing in technology and collaborating with tech companies to prevent their products, platforms or services from falling into Iswap’s hands is a start.</span>\r\n\r\n<span style=\"font-weight: 400;\">Going after Iswap’s money is vital. The group should be forced out of its current location using targeted and joint military operations. This would cut Iswap’s access to its major revenue base. In using these tactics, care should be taken to avoid adversely affecting civilians, either by destroying their livelihoods or inflicting human rights violations.</span>\r\n\r\n<span style=\"font-weight: 400;\">Curtailing Iswap’s access to technology will prevent it from using tech to plan and execute attacks, spread propaganda and recruit. That will reduce the damage the group inflicts on civilians and aid workers in the Lake Chad Basin. </span><b>DM</b>\r\n\r\n<i><span style=\"font-weight: 400;\">Malik Samuel, Researcher, Institute for Security Studies (ISS) Regional Office for West Africa, the Sahel and the Lake Chad Basin.</span></i>\r\n\r\n<i><span style=\"font-weight: 400;\">Research for this article was funded by the Government of The Netherlands.</span></i>\r\n\r\n<i><span style=\"font-weight: 400;\">First published by </span></i><a href=\"https://issafrica.org/iss-today\"><i><span style=\"font-weight: 400;\">ISS Today</span></i></a><span style=\"font-weight: 400;\">.</span>",
"focal": "50% 50%",
"width": 0,
"height": 0,
"url": "https://dmcdn.whitebeard.net/dailymaverick/wp-content/uploads/2023/04/ISS-Today-pic-2.png",
"transforms": [
{
"x": "200",
"y": "100",
"url": "https://dmcdn.whitebeard.net/i/6sa9Qg3DOjNITu0n3STtGkzXU0Q=/200x100/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2023/04/ISS-Today-pic-2.png"
},
{
"x": "450",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/k1bFbHg9tR_xTtX4ULko9SOpfCw=/450x0/smart/file/dailymaverick/wp-content/uploads/2023/04/ISS-Today-pic-2.png"
},
{
"x": "800",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/v-VKsmx8DatjDqkvyYg_EUsevDI=/800x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2023/04/ISS-Today-pic-2.png"
},
{
"x": "1200",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/US4UxF-5sdfAzzW9vTX5QK5NOUk=/1200x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2023/04/ISS-Today-pic-2.png"
},
{
"x": "1600",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/h5gRZrWZOJZqvImorA1tUVsP_XQ=/1600x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2023/04/ISS-Today-pic-2.png"
}
],
"url_thumbnail": "https://dmcdn.whitebeard.net/i/6sa9Qg3DOjNITu0n3STtGkzXU0Q=/200x100/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2023/04/ISS-Today-pic-2.png",
"url_medium": "https://dmcdn.whitebeard.net/i/k1bFbHg9tR_xTtX4ULko9SOpfCw=/450x0/smart/file/dailymaverick/wp-content/uploads/2023/04/ISS-Today-pic-2.png",
"url_large": "https://dmcdn.whitebeard.net/i/v-VKsmx8DatjDqkvyYg_EUsevDI=/800x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2023/04/ISS-Today-pic-2.png",
"url_xl": "https://dmcdn.whitebeard.net/i/US4UxF-5sdfAzzW9vTX5QK5NOUk=/1200x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2023/04/ISS-Today-pic-2.png",
"url_xxl": "https://dmcdn.whitebeard.net/i/h5gRZrWZOJZqvImorA1tUVsP_XQ=/1600x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2023/04/ISS-Today-pic-2.png",
"type": "image"
}
],
"summary": "Iswap deployment of drones and other technology might change the conflict dynamics, giving violent extremists the upper hand. ",
"template_type": null,
"dm_custom_section_label": null,
"elements": [],
"seo": {
"search_title": "Iswap use of tech and cybercrime systems could intensify Lake Chad Basin violence",
"search_description": "<span style=\"font-weight: 400;\">Islamic State West Africa Province (Iswap) could be close to using delivery drones for attacks in the Lake Chad Basin. Weaponising and adapting unmanned aerial vehicles",
"social_title": "Iswap use of tech and cybercrime systems could intensify Lake Chad Basin violence",
"social_description": "<span style=\"font-weight: 400;\">Islamic State West Africa Province (Iswap) could be close to using delivery drones for attacks in the Lake Chad Basin. Weaponising and adapting unmanned aerial vehicles",
"social_image": ""
},
"cached": true,
"access_allowed": true
}