The Times Real Estate


.

  • Written by Mia Bloom, Evidence Based Cyber Security Program, Georgia State University
The far-right rioters at the Capitol were not antifa – but violent groups often blame rivals for unpopular attacks

Some Republican congressional leaders, including U.S. Reps. Matt Gaetz, Mo Brooks and Paul Gosar[1], along with Texas Attorney General Ken Paxton[2], joined President Trump[3] in trying to pin the violent siege of the U.S. Capitol building on antifa, a loose movement[4] of left-wing, anti-racist and anti-fascist activists.

The FBI negated the baseless claims[5], and people have recognized the conspiracy theory as a false flag[6] – an act designed to disguise the actual source or responsible party and implicate another.

In contrast, members of extreme right-wing groups like the boogaloo movement[7] and the Proud Boys[8] did in fact infiltrate the George Floyd protests[9] this summer, trying to spark violence between Black Lives Matter protesters and police.

And at the Capitol, it appears Proud Boys members hid their affiliation[10] to better blend in with the crowd.

As an expert on terrorist tactics and propaganda[11], I am well acquainted with the idea that far-right militants sometimes try to hide their own identities.

Terrorist deception is an age-old tactic. Deception helps terrorist groups innovate[12] by allowing them to learn, master and experiment with new tactics[13] while protecting their identities and reputation.

The guise of mimicry

The most obvious form of deception – mimicry – is emulating the specific tactics and strategies of other groups.

The history of suicide terrorism, for example, is replete with examples of contagion and mimicry. Suicide terrorism spread from Iran[14] to Lebanon[15] to Sri Lanka[16] to the Palestinian territories[17]. It has been used by at least 58 different groups[18] in 35 countries[19].

Just as plants and animals mimic other species to lure prey or hide from predators, mimicry enables violent groups to portray themselves in a variety of guises for both offensive and defensive purposes.

Mimicry might involve imitating actions or behavior. An al-Qaida member in Europe, for example, might disguise himself by drinking alcohol, going to strip clubs or gambling. This deceptive signaling can help him move easily among Western targets and not raise suspicion.

Mimicry can also be changing one’s physical appearance. In the case of terrorist operations, groups blend into their surroundings, or don the uniforms of rival groups to sow confusion. They might change their looks and attire to mimic something less threatening – for example, a pregnant woman[20] – to evade detection or invasive searches.

In 2005, Raghab Ahmad ‘Izzat Jaradat of the Palestinian Islamic Jihad[21] armed group detonated an explosive belt aboard a bus near Haifa, Israel. He wore an Israeli army uniform and carried a conscript bag to avoid drawing attention. This became a common tactic used by Hamas militants[22] to infiltrate Israeli hard targets.

False claims of responsibility

Deception can also take the form of mimicry when a group makes a false claim of responsibility or attributes a failed operation to their enemies or rivals.

Willingness to claim responsibility[23] or allocate blame depends on whether violent tactics are popular or unpopular with their constituency of supporters and whether they succeed or fail. The Islamic State, for example, rarely claimed responsibility for failed attacks.

Groups might falsely claim responsibility to garner publicity, while the actual perpetrators might want to avoid responsibility.

Al-Qaida didn’t immediately claim responsibility for the 9/11 attacks, although subsequent statements and comments[24] left no doubt as to their culpability. The reasons for this reticence relate to their goals at the time[25]: to demoralize the West, galvanize Muslim extremists and instigate armed conflict with the West in Afghanistan and elsewhere. From this perspective it didn’t matter which faction perpetrated the attacks.

Following an August 2001 suicide bombing at a Sbarro pizzeria[26] in Jerusalem, multiple Palestinian terrorist organizations claimed responsibility[27] for the attack. As a result, the group that was in fact responsible, Hamas, developed mimic-proof signatures such as recording videos in advance in which the bomber claims responsibility for the attack.

These videos branded Hamas’ ownership of attacks and undermined the reputations of rival groups who falsely claimed the attacks as their own. This innovation is now a norm[28] and has changed the way terror groups convey ownership.

Deceiving MAGA

The Jan. 6 attack at the Capitol was not antifa. The arrests thus far have been dedicated Trump supporters[29], based on their social media posts.

But in the ultimate form of deception, a post[30] allegedly from the Department of Justice’s acting pardon attorney[31] appeared on Parler[32], the now-suspended social network app[33] popular with the far right and people who’ve been kicked off of Twitter. It requested individuals who had stormed the Capitol to provide their name, address, license information and details of what they did that day in order to receive a pardon.

The real Justice Department hastily issued a statement[34] advising Trump supporters that “the information circulating on social media was inauthentic and should not be taken seriously.”

A few days later, the FBI opened numerous investigations[35] of assault and seditious conspiracy based in part on information gleaned from social media.

Mimicry is both offensive and defensive. Just like with predators and prey in nature, when it comes to acts of terrorism, what you see is not always what you get.

[Get our most insightful politics and election stories. Sign up for The Conversation’s Politics Weekly[36].]

References

  1. ^ Matt Gaetz, Mo Brooks and Paul Gosar (www.washingtonpost.com)
  2. ^ Texas Attorney General Ken Paxton (www.texastribune.org)
  3. ^ President Trump (www.forbes.com)
  4. ^ antifa, a loose movement (theconversation.com)
  5. ^ FBI negated the baseless claims (www.cnbc.com)
  6. ^ false flag (www.usatoday.com)
  7. ^ the boogaloo movement (theconversation.com)
  8. ^ Proud Boys (www.wsj.com)
  9. ^ infiltrate the George Floyd protests (www.justsecurity.org)
  10. ^ Proud Boys members hid their affiliation (www.vice.com)
  11. ^ expert on terrorist tactics and propaganda (news.gsu.edu)
  12. ^ terrorist groups innovate (www.thebritishacademy.ac.uk)
  13. ^ experiment with new tactics (www.foreignaffairs.com)
  14. ^ Iran (nationalinterest.org)
  15. ^ Lebanon (www.amnesty.org)
  16. ^ Sri Lanka (www.washingtonpost.com)
  17. ^ the Palestinian territories (www.terrorismanalysts.com)
  18. ^ at least 58 different groups (dss.princeton.edu)
  19. ^ 35 countries (cup.columbia.edu)
  20. ^ a pregnant woman (www.youtube.com)
  21. ^ Palestinian Islamic Jihad (www.cfr.org)
  22. ^ used by Hamas militants (globalnews.ca)
  23. ^ Willingness to claim responsibility (doi.org)
  24. ^ subsequent statements and comments (www.cbc.ca)
  25. ^ goals at the time (www.pastemagazine.com)
  26. ^ suicide bombing at a Sbarro pizzeria (www.nytimes.com)
  27. ^ claimed responsibility (doi.org)
  28. ^ innovation is now a norm (doi.org)
  29. ^ dedicated Trump supporters (www.reuters.com)
  30. ^ a post (www.washingtontimes.com)
  31. ^ Department of Justice’s acting pardon attorney (www.justice.gov)
  32. ^ Parler (theconversation.com)
  33. ^ now-suspended social network app (www.cnn.com)
  34. ^ issued a statement (www.justice.gov)
  35. ^ numerous investigations (www.usnews.com)
  36. ^ Sign up for The Conversation’s Politics Weekly (theconversation.com)

Authors: Mia Bloom, Evidence Based Cyber Security Program, Georgia State University

Read more https://theconversation.com/the-far-right-rioters-at-the-capitol-were-not-antifa-but-violent-groups-often-blame-rivals-for-unpopular-attacks-153193

Metropolitan republishes selected articles from The Conversation USA with permission

Visit The Conversation to see more