All Article Properties:
{
"access_control": false,
"status": "publish",
"objectType": "Article",
"id": "1397220",
"signature": "Article:1397220",
"url": "https://staging.dailymaverick.co.za/article/2022-09-15-terrorist-content-of-social-media-and-tech-in-west-africa-must-be-contained/",
"shorturl": "https://staging.dailymaverick.co.za/article/1397220",
"slug": "terrorist-content-of-social-media-and-tech-in-west-africa-must-be-contained",
"contentType": {
"id": "1",
"name": "Article",
"slug": "article"
},
"views": 0,
"comments": 0,
"preview_limit": null,
"excludedFromGoogleSearchEngine": 0,
"title": "Terrorist content of social media and tech in West Africa must be contained",
"firstPublished": "2022-09-15 20:35:21",
"lastUpdate": "2022-09-15 20:35:21",
"categories": [
{
"id": "3",
"name": "Africa",
"signature": "Category:3",
"slug": "africa",
"typeId": {
"typeId": "1",
"name": "Daily Maverick",
"slug": "",
"includeInIssue": "0",
"shortened_domain": "",
"stylesheetClass": "",
"domain": "staging.dailymaverick.co.za",
"articleUrlPrefix": "",
"access_groups": "[]",
"locale": "",
"preview_limit": null
},
"parentId": null,
"parent": [],
"image": "",
"cover": "",
"logo": "",
"paid": "0",
"objectType": "Category",
"url": "https://staging.dailymaverick.co.za/category/africa/",
"cssCode": "",
"template": "default",
"tagline": "",
"link_param": null,
"description": "",
"metaDescription": "",
"order": "0",
"pageId": null,
"articlesCount": null,
"allowComments": "1",
"accessType": "freecount",
"status": "1",
"children": [],
"cached": true
}
],
"content_length": 6327,
"contents": "<span style=\"font-weight: 400;\">When </span><a href=\"https://www.dailymaverick.co.za/article/2013-10-04-kenya-still-reeling-in-the-aftermath-of-the-westgate-massacre/\"><span style=\"font-weight: 400;\">al-Shabaab attacked the Westgate shopping mall</span></a><span style=\"font-weight: 400;\"> in Nairobi, Kenya in 2013, the group </span><a href=\"https://www.researchgate.net/publication/334690352_Role_of_Social_Media_in_Terrorism_Crisis_Communication_A_Case_of_Westgate_Mall_Terror_Attack_in_Nairobi\"><span style=\"font-weight: 400;\">live-blogged</span></a><span style=\"font-weight: 400;\"> the terrifying event on Twitter, taunting the authorities who were struggling to end the siege. It represented a chilling milestone in the weaponisation of social media platforms and demonstrated the audacity and adaptive nature of Africa’s armed groups. </span>\r\n\r\n<span style=\"font-weight: 400;\">Nearly a decade later, terrorist groups in West Africa are fine-tuning their tactics to hijack social media platforms and messaging apps. Parts of the region have been home to the fastest growing and deadliest violent extremists, the Global Terrorism Index </span><a href=\"https://www.isdglobal.org/digital_dispatches/global-terrorism-index-2022-key-findings-in-6-charts/\"><span style=\"font-weight: 400;\">reveals</span></a><span style=\"font-weight: 400;\">. And there’s been a steady rise in incidents where social media platforms and messaging apps have become an integral part of extremists’ modus operandi. </span>\r\n\r\n<span style=\"font-weight: 400;\">As the physical and online worlds fuse, many groups, especially al-Qaeda in the Islamic Maghreb (AQIM), are embedding the internet deeper into their operations, according to researchers such as Bulama Bukarti of the Tony Blair Institute for Global Change. What’s more, given their decentralised character, these groups are proving harder to intercept and are achieving a reach online that wouldn’t be possible in the physical world. </span>\r\n\r\n<span style=\"font-weight: 400;\">A recent </span><a href=\"https://www.techagainstterrorism.org/\"><span style=\"font-weight: 400;\">workshop</span></a><span style=\"font-weight: 400;\"> in Ghana organised by Tech Against Terrorism (TAT) laid out the expansive nature of online terrorist content in West Africa and highlighted strategies to mitigate the risks. TAT is a non-governmental organisation established by the United Nations Counter-Terrorism Committee Executive Directorate to forge ties between tech platforms, academia and civil society.</span>\r\n\r\n<span style=\"font-weight: 400;\">Violent extremist groups in West Africa, especially in the Sahel and Lake Chad Basin, use the internet to deliver propaganda, recruit, radicalise and incite attacks, and finance and plan their operations. </span>\r\n\r\n<span style=\"font-weight: 400;\">Dr Erin Saltman, former head of Facebook’s Counterterrorism and Dangerous Organizations Policy section and now programming leader for the Global Internet Forum to Counter Terrorism (</span><a href=\"https://gifct.org/\"><span style=\"font-weight: 400;\">GIFCT</span></a><span style=\"font-weight: 400;\">), a TAT partner, is a prominent voice in this field. She says greater efforts are needed to encourage tech companies to ‘prevent and respond’ to terrorism online by increasing their transparency and reporting while respecting human rights. </span>\r\n\r\n<span style=\"font-weight: 400;\">Extremists are now using smaller platforms to circumvent controls aimed at removing terrorist content, says TAT’s Anne Craanen, who monitors developments in West Africa. For example, AQIM — arguably the region’s most aggressive user of online communication — uses ‘beacon’ websites to draw internet traffic to smaller sites. It also uses ‘aggregators’ designed to offer viewers a cluster of links to the same piece of terrorist content, to evade content moderation. </span>\r\n\r\n<hr />\r\n\r\n<strong>Visit <a href=\"https://www.dailymaverick.co.za?utm_source=direct&utm_medium=in_article_link&utm_campaign=homepage\"><em>Daily Maverick's</em> home page</a> for more news, analysis and investigations</strong>\r\n\r\n<hr />\r\n\r\n<span style=\"font-weight: 400;\">While larger platforms such as Facebook, Twitter and WhatsApp have the resources to offer a degree of content moderation, many smaller operators don’t. These are the ones terrorist groups prefer.</span>\r\n\r\n<span style=\"font-weight: 400;\">Other groups such as the Boko Haram break-away faction, Islamic State West Africa Province (Iswap), appear to rely on messaging services like WhatsApp and Telegram to communicate internally and externally because they prefer these apps’ encrypted nature. “Telegram is becoming the new front line for terrorist groups in Africa,” warns Bukarti. “On last count, Iswap had over 50 Facebook and Telegram accounts.” Furthermore, “there’s no scrutiny; nobody seems to care in Africa.”</span>\r\n\r\n<span style=\"font-weight: 400;\">Whether it’s about not caring, insufficient research or competing policy priorities, there is little doubt that violent extremist groups in West Africa deploy tech differently.</span>\r\n\r\n<span style=\"font-weight: 400;\">Before splitting into two factions, Boko Haram was less aggressive in its use of the </span><a href=\"https://issafrica.org/research/west-africa-report/more-than-propaganda-a-review-of-boko-harams-public-messages\"><span style=\"font-weight: 400;\">internet</span></a><span style=\"font-weight: 400;\">, says Bukarti. Nevertheless, it still enjoys significant user traffic, especially to YouTube sites hailing the group’s founder Mohammed Yusuf. Alongside accessible content is paid-for adverts, suggesting that tech companies are “making money out of terrorist content,” Bukarti claims, as more views boost the platform’s revenues. While this may be unintentional, maximising site traffic is part of the business case for internet platforms.</span>\r\n\r\n<span style=\"font-weight: 400;\">What incentive is there for tech companies to respond? Do commercial imperatives dominate, or can reputation management help encourage responsible use of cyberspace? Bigger players such as Meta (formerly Facebook) have responded to external pressure and developed ‘formal processes’ and ‘dedicated channels’ to deal with requests to remove terrorist content, say their policy team. But smaller platforms don’t necessarily have the resources to respond in the same way.</span>\r\n\r\n<span style=\"font-weight: 400;\">Furthermore, while the Global North has been more successful at calling out tech companies after incidents such as the 2019 Christchurch, New Zealand </span><a href=\"https://edition.cnn.com/2019/03/15/tech/christchurch-internet-radicalization-intl/index.html\"><span style=\"font-weight: 400;\">attack</span></a><span style=\"font-weight: 400;\">, there’s been much less consumer pressure across Africa. This is possibly because of the ‘digital divide’, competing policy priorities and a relative lack of awareness on the continent.</span>\r\n\r\n<span style=\"font-weight: 400;\">TAT has recently launched a knowledge-sharing platform to send out secure alerts when terrorist content is identified. It has also developed outreach and mentoring programmes for smaller internet platforms and governments to build resilience against a growing trend of terrorist content online.</span>\r\n\r\n<span style=\"font-weight: 400;\">Without a universal instrument to suppress online terrorist activities, groupings such as the Economic Community of West African States are essential to raising awareness and formulating regional counter-measures, says Ghana’s National Security Minister Albert Kan-Dapaah. The Global Coalition Against </span><a href=\"https://theglobalcoalition.org/en/\"><span style=\"font-weight: 400;\">Daesh</span></a><span style=\"font-weight: 400;\"> and other similar initiatives also have a role in Boko Haram-affected countries in Lake Chad Basin, says Institute for Security Studies’ Project Manager, Akinola Olojo.</span>\r\n\r\n<span style=\"font-weight: 400;\">African governments must engage with the tech sector to broaden their knowledge of the context in which terrorist organisations thrive. They should devise rapid responses that adhere to human rights principles — rather than total internet shutdowns, which deprive citizens of their right to freedom of expression.</span>\r\n\r\n<span style=\"font-weight: 400;\">More than that, they need to make internet use by terrorist groups in Africa matter to the wider world. </span><b>DM</b>\r\n\r\n<i><span style=\"font-weight: 400;\">Karen Allen, Consultant, Institute for Security Studies (ISS) Pretoria.</span></i>\r\n\r\n<i><span style=\"font-weight: 400;\">First published by </span></i><a href=\"https://issafrica.org/iss-today\"><i><span style=\"font-weight: 400;\">ISS Today</span></i></a><span style=\"font-weight: 400;\">.</span>",
"teaser": "Terrorist content of social media and tech in West Africa must be contained",
"externalUrl": "",
"sponsor": null,
"authors": [
{
"id": "23372",
"name": "Karen Allen",
"image": "",
"url": "https://staging.dailymaverick.co.za/author/karen-allen/",
"editorialName": "karen-allen",
"department": "",
"name_latin": ""
}
],
"description": "",
"keywords": [
{
"type": "Keyword",
"data": {
"keywordId": "348481",
"name": "ISWAP",
"url": "https://staging.dailymaverick.co.za/keyword/iswap/",
"slug": "iswap",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "ISWAP",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "385698",
"name": "Albert Kan-Dapaah",
"url": "https://staging.dailymaverick.co.za/keyword/albert-kandapaah/",
"slug": "albert-kandapaah",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Albert Kan-Dapaah",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "385697",
"name": "Dr Erin Saltman",
"url": "https://staging.dailymaverick.co.za/keyword/dr-erin-saltman/",
"slug": "dr-erin-saltman",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Dr Erin Saltman",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "385696",
"name": "terrorist content",
"url": "https://staging.dailymaverick.co.za/keyword/terrorist-content/",
"slug": "terrorist-content",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "terrorist content",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "385695",
"name": "Tech Against Terrorism",
"url": "https://staging.dailymaverick.co.za/keyword/tech-against-terrorism/",
"slug": "tech-against-terrorism",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Tech Against Terrorism",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "385694",
"name": "social media weaponisation",
"url": "https://staging.dailymaverick.co.za/keyword/social-media-weaponisation/",
"slug": "social-media-weaponisation",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "social media weaponisation",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "385693",
"name": "violent extremists",
"url": "https://staging.dailymaverick.co.za/keyword/violent-extremists/",
"slug": "violent-extremists",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "violent extremists",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "376187",
"name": "AQIM",
"url": "https://staging.dailymaverick.co.za/keyword/aqim/",
"slug": "aqim",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "AQIM",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "364863",
"name": "Meta",
"url": "https://staging.dailymaverick.co.za/keyword/meta/",
"slug": "meta",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Meta",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "3719",
"name": "YouTube",
"url": "https://staging.dailymaverick.co.za/keyword/youtube/",
"slug": "youtube",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "YouTube",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "55990",
"name": "Telegram",
"url": "https://staging.dailymaverick.co.za/keyword/telegram/",
"slug": "telegram",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Telegram",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "51393",
"name": "Mohammed Yusuf",
"url": "https://staging.dailymaverick.co.za/keyword/mohammed-yusuf/",
"slug": "mohammed-yusuf",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Mohammed Yusuf",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "11323",
"name": "West Africa",
"url": "https://staging.dailymaverick.co.za/keyword/west-africa/",
"slug": "west-africa",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "West Africa",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "7731",
"name": "Boko Haram",
"url": "https://staging.dailymaverick.co.za/keyword/boko-haram/",
"slug": "boko-haram",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Boko Haram",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "4247",
"name": "Terrorism",
"url": "https://staging.dailymaverick.co.za/keyword/terrorism/",
"slug": "terrorism",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Terrorism",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "4198",
"name": "Al-Shabaab",
"url": "https://staging.dailymaverick.co.za/keyword/alshabaab/",
"slug": "alshabaab",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Al-Shabaab",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "4084",
"name": "Social media",
"url": "https://staging.dailymaverick.co.za/keyword/social-media/",
"slug": "social-media",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Social media",
"translations": null
}
}
],
"short_summary": null,
"source": null,
"related": [],
"options": [],
"attachments": [
{
"id": "91012",
"name": "",
"description": "",
"focal": "50% 50%",
"width": 0,
"height": 0,
"url": "https://dmcdn.whitebeard.net/dailymaverick/wp-content/uploads/2022/09/ISS-Today-pic-5.png",
"transforms": [
{
"x": "200",
"y": "100",
"url": "https://dmcdn.whitebeard.net/i/oNZByBtStIgBXJO8fIGPQ1naE-Q=/200x100/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2022/09/ISS-Today-pic-5.png"
},
{
"x": "450",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/ZZnFVcwF4g5KZ0-PsyK5k8PySKI=/450x0/smart/file/dailymaverick/wp-content/uploads/2022/09/ISS-Today-pic-5.png"
},
{
"x": "800",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/vL90WZZJOz_b-PLMX-wAh16sWF8=/800x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2022/09/ISS-Today-pic-5.png"
},
{
"x": "1200",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/F-YD74jQ-8ISrl66et8525LZm50=/1200x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2022/09/ISS-Today-pic-5.png"
},
{
"x": "1600",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/iPa3dEP-hbbOHt3EbcFH_LbUarY=/1600x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2022/09/ISS-Today-pic-5.png"
}
],
"url_thumbnail": "https://dmcdn.whitebeard.net/i/oNZByBtStIgBXJO8fIGPQ1naE-Q=/200x100/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2022/09/ISS-Today-pic-5.png",
"url_medium": "https://dmcdn.whitebeard.net/i/ZZnFVcwF4g5KZ0-PsyK5k8PySKI=/450x0/smart/file/dailymaverick/wp-content/uploads/2022/09/ISS-Today-pic-5.png",
"url_large": "https://dmcdn.whitebeard.net/i/vL90WZZJOz_b-PLMX-wAh16sWF8=/800x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2022/09/ISS-Today-pic-5.png",
"url_xl": "https://dmcdn.whitebeard.net/i/F-YD74jQ-8ISrl66et8525LZm50=/1200x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2022/09/ISS-Today-pic-5.png",
"url_xxl": "https://dmcdn.whitebeard.net/i/iPa3dEP-hbbOHt3EbcFH_LbUarY=/1600x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2022/09/ISS-Today-pic-5.png",
"type": "image"
}
],
"summary": "With violent extremists skilfully exploiting digital platforms, Africa should pressure tech companies to deal with terrorism online. ",
"template_type": null,
"dm_custom_section_label": null,
"elements": [],
"seo": {
"search_title": "Terrorist content of social media and tech in West Africa must be contained",
"search_description": "<span style=\"font-weight: 400;\">When </span><a href=\"https://www.dailymaverick.co.za/article/2013-10-04-kenya-still-reeling-in-the-aftermath-of-the-westgate-massacre/\"><span style=\"font-weight: 400;\">",
"social_title": "Terrorist content of social media and tech in West Africa must be contained",
"social_description": "<span style=\"font-weight: 400;\">When </span><a href=\"https://www.dailymaverick.co.za/article/2013-10-04-kenya-still-reeling-in-the-aftermath-of-the-westgate-massacre/\"><span style=\"font-weight: 400;\">",
"social_image": ""
},
"cached": true,
"access_allowed": true
}