Some Republican congressional leaders, including U.S. Reps. Matt Gaetz, Mo Brooks and Paul Gosar, along with Texas Attorney General Ken Paxton, joined President Trump in trying to pin the violent siege of the U.S. Capitol building on antifa, a loose movement of left-wing, anti-racist and anti-fascist activists.
In contrast, members of extreme right-wing groups like the boogaloo movement and the Proud Boys did in fact infiltrate the George Floyd protests this summer, trying to spark violence between Black Lives Matter protesters and police.
And at the Capitol, it appears Proud Boys members hid their affiliation to better blend in with the crowd.
As an expert on terrorist tactics and propaganda, I am well acquainted with the idea that far-right militants sometimes try to hide their own identities.
The guise of mimicry
The most obvious form of deception – mimicry – is emulating the specific tactics and strategies of other groups.
The history of suicide terrorism, for example, is replete with examples of contagion and mimicry. Suicide terrorism spread from Iran to Lebanon to Sri Lanka to the Palestinian territories. It has been used by at least 58 different groups in 35 countries.
Just as plants and animals mimic other species to lure prey or hide from predators, mimicry enables violent groups to portray themselves in a variety of guises for both offensive and defensive purposes.
Mimicry might involve imitating actions or behavior. An al-Qaida member in Europe, for example, might disguise himself by drinking alcohol, going to strip clubs or gambling. This deceptive signaling can help him move easily among Western targets and not raise suspicion.
Mimicry can also be changing one’s physical appearance. In the case of terrorist operations, groups blend into their surroundings, or don the uniforms of rival groups to sow confusion. They might change their looks and attire to mimic something less threatening – for example, a pregnant woman – to evade detection or invasive searches.
In 2005, Raghab Ahmad ‘Izzat Jaradat of the Palestinian Islamic Jihad armed group detonated an explosive belt aboard a bus near Haifa, Israel. He wore an Israeli army uniform and carried a conscript bag to avoid drawing attention. This became a common tactic used by Hamas militants to infiltrate Israeli hard targets.
False claims of responsibility
Deception can also take the form of mimicry when a group makes a false claim of responsibility or attributes a failed operation to their enemies or rivals.
Willingness to claim responsibility or allocate blame depends on whether violent tactics are popular or unpopular with their constituency of supporters and whether they succeed or fail. The Islamic State, for example, rarely claimed responsibility for failed attacks.
Groups might falsely claim responsibility to garner publicity, while the actual perpetrators might want to avoid responsibility.
Al-Qaida didn’t immediately claim responsibility for the 9/11 attacks, although subsequent statements and comments left no doubt as to their culpability. The reasons for this reticence relate to their goals at the time: to demoralize the West, galvanize Muslim extremists and instigate armed conflict with the West in Afghanistan and elsewhere. From this perspective it didn’t matter which faction perpetrated the attacks.
Following an August 2001 suicide bombing at a Sbarro pizzeria in Jerusalem, multiple Palestinian terrorist organizations claimed responsibility for the attack. As a result, the group that was in fact responsible, Hamas, developed mimic-proof signatures such as recording videos in advance in which the bomber claims responsibility for the attack.
These videos branded Hamas’ ownership of attacks and undermined the reputations of rival groups who falsely claimed the attacks as their own. This innovation is now a norm and has changed the way terror groups convey ownership.
The Jan. 6 attack at the Capitol was not antifa. The arrests thus far have been dedicated Trump supporters, based on their social media posts.
But in the ultimate form of deception, a post allegedly from the Department of Justice’s acting pardon attorney appeared on Parler, the now-suspended social network app popular with the far right and people who’ve been kicked off of Twitter. It requested individuals who had stormed the Capitol to provide their name, address, license information and details of what they did that day in order to receive a pardon.
The real Justice Department hastily issued a statement advising Trump supporters that “the information circulating on social media was inauthentic and should not be taken seriously.”
A few days later, the FBI opened numerous investigations of assault and seditious conspiracy based in part on information gleaned from social media.
Mimicry is both offensive and defensive. Just like with predators and prey in nature, when it comes to acts of terrorism, what you see is not always what you get.
[Get our most insightful politics and election stories. Sign up for The Conversation’s Politics Weekly.]
The research is supported in part by the Office of Naval Research “Documenting the Virtual Caliphate” #N00014-16-1-3174. All opinions are exclusively those of the author and do not represent the Department of Defense or the Navy. Mia Bloom is a member of the Evidence Based Cyber Security Research program at GSU and a Fellow at New America.
Read the full article here.
This content was originally published by The Conversation. Original publishers retain all rights. It appears here for a limited time before automated archiving. By The Conversation