贴心姐妹网
 · 设为主页 | · 添加收藏 | · 会员注册 | · 会员登录    +
 
首页 | 社会政治 | 职场创业 | 情感关系 | 子女成长 | 多元生活 | 文化艺术 | 社区公益

The far-right rioters at the Capitol were not antifa – but violent groups often blame rivals for unpopular attacks

来源:The Conversation   更新:2021-01-16 08:34:36   作者:Mia Bloom
Some Republican congressional leaders, including U.S. Reps. Matt Gaetz, Mo Brooks and Paul Gosar, along with Texas Attorney General Ken Paxton, joined President Trump in trying to pin the violent siege of the U.S. Capitol building on antifa, a loose movement of left-wing, anti-racist and anti-fascist activists.

The FBI negated the baseless claims, and people have recognized the conspiracy theory as a false flag – an act designed to disguise the actual source or responsible party and implicate another.

In contrast, members of extreme right-wing groups like the boogaloo movement and the Proud Boys did in fact infiltrate the George Floyd protests this summer, trying to spark violence between Black Lives Matter protesters and police.

And at the Capitol, it appears Proud Boys members hid their affiliation to better blend in with the crowd.

As an expert on terrorist tactics and propaganda, I am well acquainted with the idea that far-right militants sometimes try to hide their own identities.

Terrorist deception is an age-old tactic. Deception helps terrorist groups innovate by allowing them to learn, master and experiment with new tactics while protecting their identities and reputation.

The guise of mimicry

The most obvious form of deception – mimicry – is emulating the specific tactics and strategies of other groups.

The history of suicide terrorism, for example, is replete with examples of contagion and mimicry. Suicide terrorism spread from Iran to Lebanon to Sri Lanka to the Palestinian territories. It has been used by at least 58 different groups in 35 countries.

Just as plants and animals mimic other species to lure prey or hide from predators, mimicry enables violent groups to portray themselves in a variety of guises for both offensive and defensive purposes.

Mimicry might involve imitating actions or behavior. An al-Qaida member in Europe, for example, might disguise himself by drinking alcohol, going to strip clubs or gambling. This deceptive signaling can help him move easily among Western targets and not raise suspicion.

Mimicry can also be changing one’s physical appearance. In the case of terrorist operations, groups blend into their surroundings, or don the uniforms of rival groups to sow confusion. They might change their looks and attire to mimic something less threatening – for example, a pregnant woman – to evade detection or invasive searches.

In 2005, Raghab Ahmad ‘Izzat Jaradat of the Palestinian Islamic Jihad armed group detonated an explosive belt aboard a bus near Haifa, Israel. He wore an Israeli army uniform and carried a conscript bag to avoid drawing attention. This became a common tactic used by Hamas militants to infiltrate Israeli hard targets.

False claims of responsibility

Deception can also take the form of mimicry when a group makes a false claim of responsibility or attributes a failed operation to their enemies or rivals.

Willingness to claim responsibility or allocate blame depends on whether violent tactics are popular or unpopular with their constituency of supporters and whether they succeed or fail. The Islamic State, for example, rarely claimed responsibility for failed attacks.

Groups might falsely claim responsibility to garner publicity, while the actual perpetrators might want to avoid responsibility.

Al-Qaida didn’t immediately claim responsibility for the 9/11 attacks, although subsequent statements and comments left no doubt as to their culpability. The reasons for this reticence relate to their goals at the time: to demoralize the West, galvanize Muslim extremists and instigate armed conflict with the West in Afghanistan and elsewhere. From this perspective it didn’t matter which faction perpetrated the attacks.

Following an August 2001 suicide bombing at a Sbarro pizzeria in Jerusalem, multiple Palestinian terrorist organizations claimed responsibility for the attack. As a result, the group that was in fact responsible, Hamas, developed mimic-proof signatures such as recording videos in advance in which the bomber claims responsibility for the attack.

These videos branded Hamas’ ownership of attacks and undermined the reputations of rival groups who falsely claimed the attacks as their own. This innovation is now a norm and has changed the way terror groups convey ownership.

Deceiving MAGA

The Jan. 6 attack at the Capitol was not antifa. The arrests thus far have been dedicated Trump supporters, based on their social media posts.

But in the ultimate form of deception, a post allegedly from the Department of Justice’s acting pardon attorney appeared on Parler, the now-suspended social network app popular with the far right and people who’ve been kicked off of Twitter. It requested individuals who had stormed the Capitol to provide their name, address, license information and details of what they did that day in order to receive a pardon.

The real Justice Department hastily issued a statement advising Trump supporters that “the information circulating on social media was inauthentic and should not be taken seriously.”

A few days later, the FBI opened numerous investigations of assault and seditious conspiracy based in part on information gleaned from social media.

Mimicry is both offensive and defensive. Just like with predators and prey in nature, when it comes to acts of terrorism, what you see is not always what you get.

[Get our most insightful politics and election stories. Sign up for The Conversation’s Politics Weekly.]The Conversation

Mia Bloom, Evidence Based Cyber Security Program, Georgia State University

This article is republished from The Conversation under a Creative Commons license. Read the original article.

分享到: 更多
相关文章
[社会政治] Canada’s status quo election: Trudeau returned with another minori
[社会政治] Cancel orientation weeks or radically restructure how they are man
[社会政治] Is sexual abuse and exploitation rife in the music industry?
[社会政治] Climate action is at risk because of the snap federal election cal
[社会政治] With far right groups on the rise, we should keep an eye on populi
[社会政治] What does it mean to be ‘true north strong and free?’ Canada’s elu
[社会政治] Why dental care needs to be part of health care — and on the feder
[社会政治] Federal election: Which party has the best climate plan? Here’s wh
[社会政治] Afghanistan: progress on women’s rights has been hard fought – now
[社会政治] Who is Erin O’Toole? The answer is key to Conservative election ch
发表评论
您必须登录后才能发表评论![立即登录] 还没有注册会员?[立即注册]  
 
会员登录
用户名:
密 码:
 
· 关于我们 About Us · 用户条约 Terms and Conditions · 隐私政策 Privacy Policy · 联系方式 Contact Us
版权声明:本网发布的内容版权归Lovingsister Media Inc. 所有,未经书面许可,严禁转载,违者将承担法律责任。
© 2013 Lovingsister Media Inc. All rights reserved. Unauthorized distribution, transmission or republication strictly prohibited.