Tag: Extremism Investigations

In this blog, Jeff Fehmel, Fivecast Tradecraft Specialist delves into the online indicators of extremism and radicalization detectable with OSINT tools which are instrumental in counter-terrorism investigations.

Extremism has a Comfortable Home Online

While the societal scourge of violent extremism is not new, the speed at which individuals are radicalized is a relatively new phenomenon. This online radicalization is further aided by the volume of extremist content and the depth and breadth of online platforms. The internet offers an unparalleled and previously unavailable level of access and networking for violent extremists and terrorists. Today, radicalization can happen online, for free, in the home of anyone with internet access. Signing up for applications and chat rooms is free and nearly instantaneous. Manifestos and radical literature in digital forms are often also free, with the click of a link or download button.

We recently delivered a webinar on violent extremists and mass shooters leveraging diverse online platforms with our partner, Giant Oak. Request the webinar to learn about the role OSINT plays in monitoring violent extremism and detecting radicalization. 

‘Request the on-demand webinar: Violent Extremism and Internet Culture’

Uncovering Indicators of Terrorism with OSINT

Using the internet, violent extremists can interact with each other and share ideas, validating and refining their theories more easily than ever before. The result is not only instances of violence, but also a library of extremist literature freely available on the web. In analyzing the behavior of extremist groups and radicalized individuals, clues as to the valuable role that OSINT can play in identifying radicalization and extremism online become evident. Almost all extremists leave a trail of content and radical theory, whether through conversations, comments, online posts, or full manifestos. Like any group interested in expansion, extremists require places to market their ideas to like-minded individuals. Networking and citation both play a vital role in this cycle. 

Data Collection and Analytics for Counter-Terrorism

As we grow more aware of terrorist activity on the internet, OSINT comes to the fore with practical and tangible methods to uncover risks. OSINT helps law enforcement collect data on violent extremist movements and better understand their operational capabilities and motivations. Targeted and automated collection against a wide range of online platforms is fundamental to detecting extremism and radicalization.

AI-enabled risk analytics are invaluable for detecting threats that appear in images, videos, written text, or digital network connections. For example, Fivecast ONYX is proven to save analyst teams hours and days of manual data manipulation with ongoing, repeatable, and automated collection and assessment of diverse data mediums, presented in a way that makes assessment efficient. The customizable risk detection framework rapidly surfaces content of interest, including user-defined keywords, phrases, and quotes from manifestos in posts. Fivecast ONYX automatically assesses images and videos for objects, concepts, logos, and text (extracted through optical character recognition) of interest. In addition, intelligence teams can identify relationships across thousands of different data points with an intuitive network analysis.

To see more on the role of OSINT in uncovering radicalization and extremism, request a demo.

OSINT TOOLS FOR DETECTING RADICALIZATION