Radicalization 2.0 : Examining Methods for Identifying Persons at Risk of Recruitment to Violent Extremism on Social Media

With the Society for Terrorism Research (STR) 8th Annual International Conference fast approaching, STR, partnered with the Center for Terrorism and Security Studies (CTSS), is launching a series of guest blog posts, written by those who will be presenting their research at STR14. In the seventh installment of this series Jeff Weyers and Professor Jon Cole discuss their work applying the structured professional judgment tool known as the Identifying Vulnerable Persons (IVP) to extremist activity on social media. Jeff Weyers and Prof. Jon Cole are working on this project as members of the University of Liverpool Tactical Decision Making Research Group.

Author: Jeff R. Weyers and Dr. Jon Cole

Infamously in Al-Qaeda’s first online issue of Inspire magazine, one of the articles that was included was a piece called, “Build a Bomb in the Kitchen of Your Mom”.   The release by Al-Qaeda was significant for several reasons,  it was the first time a terrorist group had created a professionally produced e-magazine. It also demonstrated a realization by Al-Qaeda that social media would be key to its ability to recruit, fund raise and spread propaganda in the future. In fact around that same time (in 2009 and 2010) many terrorist groups including Al-Shabab, Hezbollah, Hamas, Babbar Khalsa, and the International Sikh Youth Federation were all transitioning to social media platforms . Part of the reason for this transition was in part due to increasing stresses on  traditional forms of hosting information on websites. Terrorist websites are frequently torn down by government agencies and targeted for Denial of Service (DNS) attacks by governments and hackers. This often would require terrorist organizations to change service providers and re-create their websites on foreign servers requiring money, time and technical resources. Alternatively social media platforms by their design are more resilient to such attacks. Their servers are better protected, their services are free and anyone can setup a site in minutes. These services also are also incredibly efficient at the “social” aspect of social media. If we look at recent examples like the Islamic State of Iraq and Sham (ISIS) on Facebook and Twitter, we see that they have been able to develop thousand of followers for their sites within hours of going operational.

Islamic State Page on Facebook and Twitter

Islamic State Page on Facebook and Twitter

In this context, the key question for law enforcement and intelligence agencies is reducing the signal to noise ratio in the online world. As part of the solution, in 2009 we were asked to come up with a structured professional judgment tool to assist in the early identification of persons at risk of engaging in violent extremism as part of the PREVENT strategy. After examining a sample of UK and European violent extremists, 16 criteria were identified that could be used to assist in identifying persons at various stages on the path to violent extremism. This structured professional judgment tool is known as the Identifying Vulnerable Persons (IVP) guidance. Since then we have applied the IVP tool against a sample of over 600 post hoc cases representing virtually every known terrorist group. As the IVP is ideologically neutral it works as well with the IRA as it does with ISIS or even ELF.

Why willyou want to see what we’ve done?

Going back to our discussion about social media, with all of the terrorist groups creating sites on social media it was the perfect opportunity to test the IVP tool against de novo cases online. Here you had virtually every terror group with a platform on social media and thousands of individuals at varying stages of extremism. So taking theses samples we attempted to determine to what extent we could identify persons at risk and were surprised to find that there were in fact hundreds of individuals displaying activities that would be of concern to law enforcement and intelligence agencies. Sometimes this simply meant they were engaged with known recruiters of terrorists groups, sometimes actual threats were made, in other instances individuals were seen with weapons while on these sites.

extremist profile

The secondary by-product of this research has included numerous criminal investigations, seizures of weapons, identification of terror cells, deportations of terrorist leaders, identification of terrorist charities and the removal of countless terrorist social media pages. So whilst identification of those ‘at risk’ of engaging in violent extremism is fraught with problems there is clear evidence that there are ways of overcoming those problems.

Ideally conferences like this allow for practitioners and academics to “show what they got” in terms of new methods for capturing, analyzing and working with data. The goal however is that we both can learn from each other and find unique ways for resolving uncommon problems.  Our thanks to the selection committee for inviting us to talk.

Jeff Weyers and Jon Cole ( Tactical Decision Making Research Unit, University of Liverpool). Applying the Identifying Vulnerable People (IVP) guidance: Social media and web 2.0





Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s