56.5 F
Washington D.C.
Thursday, April 25, 2024

How Terrorists Use the Internet for Weapons and Component Procurement

When Salman Abedi was buying material to build the bomb he would use to attack the Ariana Grande concert in Manchester in 2017, his cousin bought him some of the chemicals from Amazon. In the lead-up to his attack at a New Zealand mosque, Brenton Tarrant bought firearms and ammunition online. And when ISIS needed drones for bombings, they purchased drones and shipped them to Syria from a number of different online retailers. Terrorist use of online retailers to procure material for their attacks is not new, but it is increasingly common, and presents both challenges and opportunities for detecting how terrorists use funds, and what for. Online purchases can be a missed opportunity for suspicion to be detected, and can form part of terrorist financial tradecraft that obscures the totality of their level of preparation for an attack. On the other hand, online procurement activities increase the players with important financial intelligence. Exploiting this financial intelligence will require a fine balance between information sharing, regulation and public-private partnerships.

Terrorists buying goods online may reduce opportunities for members of the public to detect and report suspicious activity, an important tool for foiling plots. For instance, a terrorist plot in the United Kingdom was thwarted in part because of a shop keeper who was suspicious of fertilizer purchases by an individual. Academic studies have also demonstrated that terrorists “leak” their intent to those around them. Security and intelligence agencies have also studied this phenomenon, and people with important information can include bystanders like shop-keepers. Without this in-person interaction, the opportunity for individuals to observe suspicious behavior is reduced, potentially also reducing the likelihood of reporting. But online purchases also open up other potential avenues for detection, such as automated reporting through the use of algorithms designed to detect the purchase of particular goods.

Read more at Global Network on Extremism & Technology

author avatar
Homeland Security Today
The Government Technology & Services Coalition's Homeland Security Today (HSToday) is the premier news and information resource for the homeland security community, dedicated to elevating the discussions and insights that can support a safe and secure nation. A non-profit magazine and media platform, HSToday provides readers with the whole story, placing facts and comments in context to inform debate and drive realistic solutions to some of the nation’s most vexing security challenges.
Homeland Security Today
Homeland Security Todayhttp://www.hstoday.us
The Government Technology & Services Coalition's Homeland Security Today (HSToday) is the premier news and information resource for the homeland security community, dedicated to elevating the discussions and insights that can support a safe and secure nation. A non-profit magazine and media platform, HSToday provides readers with the whole story, placing facts and comments in context to inform debate and drive realistic solutions to some of the nation’s most vexing security challenges.

Related Articles

- Advertisement -

Latest Articles