The threat of terrorists who act entirely on their own has increased. Now going on Swedish research on the elusive Mavericks could be traced – before they can strike.
the attacks in Norway, 2011, when 77 people were killed, was carried out by the sole conduct terrorist Anders Behring Breivik. Stock Photography.
– You can show statistically that the phenomenon of so-called mavericks increases. These include good research from the United States showing it, says Hans Brown, terror researchers linked to the National Defence College and King’s College in London.
In the recent past, France and Germany hit hard by terrorism. In several cases believed Mavericks have acted. The 18-year-old man in Munich shot dead nine people will according to German police have been inspired by the Norwegian terrorist Anders Behring Breivik.
New methods
– There are two types of offenders dominates pure ideology. It is classic right-wing extremists, but the jihadists will be more effective.
According to Hans Brown, analysts at Sapo stressed the importance of developing new analytical methods to try to capture, among others Mavericks.
– when people are working in a network, it can be very difficult to expose them if they are adept at hiding activity. It is even more difficult with the sole action assailants, said Sirpa Franzen, press officer at the Swedish Security Service, said.
She stresses that cooperation between the various authorities, including healthcare and education, is a key to try to identify the warning signs. In addition, ongoing research to develop new methods.
– We have been given a mission to FOI.
“A gray area”
At the Swedish Defence Research Agency, investigating Lisa Kaati, PhD in computer science, how social media could get up traces Mavericks. The key word is warning behaviors.
– One of the warning behaviors that we are trying to discover is fixation. Breivik talked for example about Muslims and Islam, and in some cases people express their opinions on various forums. Another warning behavior is identification, which may mean that a person has very strong interest in weapons and military paraphernalia, or that the person wants to imitate previous crimes, she said.
– The warning behavior we are trying to discover should only be seen as a small part of a larger threat assessment manual. It may be important to get information from a variety of sources to make a relevant threat assessment.
Kaati points out that there need not be illegal to express themselves radically online, but believe it may be important information in a larger puzzle. In addition, any analyze and evaluate the information that computers can gather from social media. It is unclear whether the research will generate a useful tool.
– The law is a bit of a gray area, and an important issue in terms of monitoring is what we as citizens think is okay or not, says Lisa Kaati.
TT
No comments:
Post a Comment