Skip to main content

Report Reveals How Boko Haram, ISWAP Use Facebook, WhatsApp, Telegram To Recruit, Spread Propaganda In Nigeria

ISWAP
September 19, 2022

The institute in its report revealed that members of one of the most dreaded terrorist groups, the Islamic State of West Africa Province (ISWAP), are skillfully exploiting WhatsApp and Telegram to organise and carry out their criminal activities across the West African region.

Institute for Security Studies has called on governments across the African continent to mount pressure on tech companies to deal with terrorism on the internet, especially on social media platforms.

The institute in its report revealed that members of one of the most dreaded terrorist groups, the Islamic State of West Africa Province (ISWAP), are skillfully exploiting WhatsApp and Telegram to organise and carry out their criminal activities across the West African region.

 

According to the report, many groups, especially Al-Qaeda in the Islamic Maghreb, are embedding the internet deeper into their operations in the West African region, and they are using it to recruit and organize criminal activities.

 

The Punch quoted the report as stating: “Groups such as the Boko Haram breakaway faction, Islamic State West Africa Province, appear to rely on messaging services like WhatsApp and Telegram to communicate internally and externally because they prefer these apps’ encrypted nature. ‘Telegram is becoming the new frontline for terrorist groups in Africa,’ warns Mr Bukarti. ‘On last count, ISWAP had over 50 Facebook and Telegram accounts.’ Furthermore, ‘there’s no scrutiny; nobody seems to care in Africa.

 

“While larger platforms such as Facebook, Twitter and WhatsApp have the resources to offer a degree of content moderation, many smaller operators don’t. These are the ones terrorist groups prefer’.

 

“According to researchers such as Bulama Bukarti of the Tony Blair Institute for Global Change. What’s more, given their decentralized character, these groups are proving harder to intercept and are achieving a reach online that would not be possible in the physical world.”

 

The security institute further explained that a recent workshop in Ghana organised by Tech Against Terrorism (TAT) laid out the expansive nature of online terrorist content in West Africa and highlighted strategies to mitigate the risks.

 

The report also noted that violent extremist groups in West Africa, especially in the Sahel and Lake Chad Basin, use the internet to deliver propaganda, recruit, radicalize and incite attacks, finance and plan their operations.

 

According to the report published on Thursday, “When al-Shabaab attacked the Westgate shopping mall in Nairobi, Kenya in 2013, the group live-blogged the terrifying event on Twitter, taunting the authorities who were struggling to end the siege. It represented a chilling milestone in the weaponization of social media platforms and demonstrated the audacity and adaptive nature of Africa’s armed groups.

 

“Nearly a decade later, terrorist groups in West Africa are fine-tuning their tactics to hijack social media platforms and messaging apps. Parts of the region have been home to the fastest growing and deadliest violent extremists, the Global Terrorism Index reveals. And there has been a steady rise in incidents where social media platforms and messaging apps have become an integral part of extremists’ modus operandi.

 

“A former head of Facebook’s Counterterrorism and Dangerous Organizations Policy section and now programming leader for the Global Internet Forum to Counter Terrorism, a TAT partner, Dr Erin Saltman, is a prominent voice in this field. She says greater efforts are needed to encourage tech companies to ‘prevent and respond’ to terrorism online by increasing their transparency and reporting while respecting human rights.”

 

The institute further stated that Anne Craanen, who monitors developments in West Africa, noted that extremists are now using smaller platforms to circumvent controls aimed at removing terrorist content.

 

“For example, AQIM – arguably the region’s most aggressive user of online communication – uses ‘beacon’ websites to draw internet traffic to smaller sites. It also uses ‘aggregators’ designed to offer viewers a cluster of links to the same piece of terrorist content, to evade content moderation,” the report stated.

 

Topics
Insecurity