• Canada:On the Grounds of the Former Marieval Indian Residential School in Saskatchewan, 751 Unmarked Graves Were Discovered
  • A 12-Story Beachside Condo Complex in the Town of Surfside, Florida Partially Collapsed Early Thursday Morning, Prompting a Large Search-and-Rescue Operation
  • The Saudi Operatives Who killed Jamal Khashoggi Were Given Paramilitary Training in the United States:Reports
  • Benigno Aquino, the Former Philippine President, Has Died at the Age of 61
  • President Joe Biden Outlines a Strategy for Combating Violent Crime in US
  • In the Wake of a Logging Investigation, Brazil's Environment Minister, Ricardo Salles, Resigns
  • Euthopia:Witnesses Say Many Were Killed in an Airstrike on a Tigray Market
  • Beware of Fake News and Fake Messages on Social Media
  • Check Whether Photos Are Original or Photoshopped or Out of Context Pictures
  • Check Google images for Authenticity-You Can Find Help from Google Reverse Images Search
  • Beware of Fake News Websites Which Run by People With No Journalism Background to Promote Their Own Ideology
  • Check the News Sources from Other Websites Whether They Picked Up the Story or Not
  • Forwarding Social Media Messages from Unknown Sources or Little Known Sources, It Would be Better to Ignore Them
  • You Can Easily Identify Fake Messages if the Message Requests You to Share
  • Beware of Fake News or Fake Photos/Videos Relating to Communal Hatred
  • Always Check Fact Checking Sites if You Have Some Doubts About the Authenticity of Any Information or Picture


Terrorism, Cryptocurrency and Social Media

By Saron Messembe Obia

One of the major dynamics of the Internet is its ability to connect physically distant people, with different profiles and those with common job description, and educational lane. This global connectivity on the cyberspace, allows people to easily connect and interact with the use of social applications, which help public and private sectors reconfigure their systems, as most develop and control technical and logical infrastructure via internet. However, the technological evolution era changed traditional policing paradigm, as territorial demarcation and effective control to maintain state sovereignty. State authorities are now encountering security breach in which the conventional ways of working are often not effective, due to new criminal techniques on the cyberspace. 

The anonymity offered by Internet acts as a defensive tool, to expose human rights violation on activists and journalist, who take risks in order to protect freedom of expression, and battle against government overreach. However, the internet, is continuously exploited by terrorists and violent extremists to avoid detection, help map out terrorism spots, and as well recruit for terrorist activities. For example, “echo-chambers” describe the phenomenon where online community on social media platform embrace new ideas and opinions which reinforce their own beliefs at the expense of alternative or dissenting messages. Similarly, “filter bubbles” occur where search engines or social networks use algorithms that personalize search results or newsfeed content based on an individual’s location, browsing history, returning search results with which the person is likely to agree with. This tools have changed the ‘game’, as terrorists are increasingly exploiting online platforms for anonymous communications, coordinate cyber-attack and even map out potential spots (using google earth).

Security issues relating to the internet.

The Surface Web is the most visible part of the Internet and its content is comprised of anything that can be accessed through a link without additional security credentials. Information usually contained in the surface web has been indexed by conventional search engines such as Google or Yahoo! Search, and is accessible via standard browsers such as Chrome or Firefox, and it accounts for about 2% of online content.

The Deep Web content is not accessible through a link, because the content has not been indexed by the search engine, and access requires additional security credentials. The Deep Web constitutes online information such as emails, and files stored on cloud services which does not require security credentials. Deep Web is usually access on standard browsers such as Chrome or Firefox, and it accounts for 98% of online content.

The Dark Net is part of the Deep Web which is used for criminal purposes, and which cannot be accessed using standard browsers. Instead, accessing data in the Dark Net requires special software such as TOR and VPN. Content on the Dark Net accounts for only about 0.03% of online content.

Cryptocurrency syndrome warrants states to develop mechanism in order to counter the exploitation of this financial service by cybercriminals and terrorist organizations against states and local communities. Social media platforms are increasingly involving in to cryptocurrency in order to grow their businesses and limit the costs of financial transactions. 

Anonymous online services 

The age of technological evolution, though a bliss for the world, is also a strategic menace for authorities to gather pertinent information relating to judicially-sanctioned criminal investigations. Social media platforms such as secure messaging apps, online video sharing, service enabling anonymity during online browsing and as well offer secure platforms from which violent extremist content can be easily disseminated and creation of enormous volumes of communication flow, thus allowing terrorists to hide among the heavy traffic. Some of these services which can be exploited for positively and as well negatively reasons are but not limited to. 

Virtual Private Network (VPN) is a well structured service which allows users to hide their location and activities, by connecting to a server’s IP address in another country, making it appear that they are operating from multiple locations. For example; a software like Hide My Ass, allow users anonymity on the Internet, help to circumvent geographical restrictions and websites blocked IP addresses and to protect personal identity.

The Onion Router (Tor) is a free and open-source software enabling anonymous online browsing. Tor restricts or prevent a user’s location and usage from traffic analysis and network scanning by directing Internet traffic through a worldwide. The software is also used to protect personal privacy of its users, as well as to prevent monitoring of online communications.

Though the internet is incorporate by legit software and services which protects the rights to privacy and freedom of expression of users, such services are increasingly a global menace when exploited by criminal networks and terrorist purposes (when used to incite violence, promote radicalization and extremism ideology). More so, terrorists exploit online platforms to influence mainstream media coverage. Many of these communication channels are produced in a highly professional multimedia format.

Social Media and Terrorist activities

Social media are interactive online forum which facilitate the creation and sharing of user-generated content, data, ideas, interests, and other forms of expression within virtual communities and networks. Social media platforms facilitate the development of online social networks by pulling attention to propaganda, allowing easy sharing of such information, and by enabling users to find other individuals or groups with common interests. About half of the world’s population are connected to social media platforms (Our World in Data, September 2019), as these online communities facilitate communication around the world. Social media platforms have similar features, but enable users to create a user profile, sometimes with personal information such as location, occupation, political and religious affiliations, and then to form networks with other users of the platform. Today these networks are exploited for criminal purposes by terrorists and violent extremist groups.

Use of Social Media for Terrorist purposes

Social media platforms are increasingly used by terrorist and violent extremists for disseminating propaganda, which lead to the endorsement of jihadist tendencies by youths radicalized by videos, books and some motivated by cyberattacks perpetrated by flag bearers, as elaborated below:

  • First contact: recruiters thrilling post online on social media platforms, appealing for sympathizers and vulnerable individuals.
  • Create micro-community: recruiters appeal on flag bearers (jihadists or terrorists) to interact with each other, share content online, expand the crusade (terrorism and global jihad) and restraint from individuals who do not subscribe to their ideology.
  • Use of private communications: recruiters lull flag bearers in to private chat rooms which cannot be monitored by security agency.
  • Violent extremism/terrorism hit: recruiter identify potential hit to be perpetrated by new member, after sending the individual instructions, and similar missions by other flag members. Terrorist groups also social media activism, either activist tweet or retweet messages.
  • Jihadist tendencies and Terrorist attack: after the above, the jihadist can lead terrorist attack either on soft or hard target.

Case studies of terrorist attacks prepared through messaging apps:

  • WhatsApp case    

In 2017, Khalid Masood reportedly used WhatsApp to announce his motives before the Westminster attack in the United Kingdom. ISIL/Dash claimed responsibility for the attack, revealing that guidance and support for the attack was provided via messages.

In April 2017, the brain behind the Stockholm attack reportedly used WhatsApp to exchange messages with an ISIL/Daesh flag bearer before and after the attack. Jihadists usually share messages on how to manufacturing of an explosive device and a confession of the perpetrated attacks.

  • Telegram

ISIL/Daesh most used application is Telegram. The group, through her crusade, encouraged supporters and members to adhere to the application, which in October 2015 the number of followers of their official channel hit 9,000. 

In August 2016, it was revealed by French anti-terrorism investigators that the two ISIL/Daesh-directed Jihadists who fatally cut the throat of a priest in Saint-Étienne-du-Rouvray in Normandy, and videoed the murder, communicated via Telegram and “used the app to coordinate their plans for the attack.”

Cryptocurrency and terrorism

Security dynamics have change within the past decades, violent extremist groups are gaming the system, as they are turning to cryptocurrencies, such as Bitcoin, to carry out covert and anonymous financial transactions challenging national and international policing (Global Terrorism Index 2018, pp 77-78). Cryptocurrencies exploit Internet-based blockchain technology to effectuate financial transactions directly between two parties independently of any central authority. Importantly the exchanges are made using private held keys which make detection and policing by government authorities challenging.  Cybercriminals have equally joined the ‘game’ as they lull their victims, to effectuate payment using this pattern. For example, Far-Right European Violent Extremist Group Order of the Dawn crusade to raise funds for its organization using the cryptocurrency Monero (Far Right European Group Crowdfunding Cryptocurrency).

Cryptocurrency and Social Media

Cryptocurrency syndrome warrants states to develop mechanism in order to counter the exploitation of this financial service by cybercriminals and terrorist organizations against states and local communities. Social media platforms are increasingly involving in to cryptocurrency in order to grow their businesses and limit the costs of financial transactions. 

In 2019, Facebook announced its intention to create its own cryptocurrency called Libra, in relation of the security menace pose individuals or groups using the system in terrorist financing. The concern in relation to Zuckerberg agenda was an economic menace, which a cryptocurrency created by Facebook giant, could effectuate on local currencies. 

The release of the Charter for Facebook Independent Oversight Board (Board) in September 2019, is yet to solve emerging security and economic challenges, which are increasingly exploited by cybercriminals and terrorist groups. However, Facebook’s CEO Mark Zuckerberg, 11-40 members are yet to prove to the world their expertise on policy decisions, such as for content takedowns, and will make recommendations for changes in Facebook’s policies. While considering the concerns of US senators on proposed bill to regulate “stablecoins,” which they explicitly defined to include Libra in 2019 (US Senate Draft Law: “Management Stablecoins are Securities Act of 2019”, 21 November 2019

The proliferation of security software and financial online platforms, help terrorist and cybercriminals effectuate covert operations. Policing crimes is not limit to national and international organizations, for social media founders have gone beyond the services of connectivity and chat forum, to provide protocols to counter criminal activities. In July 2017, the Global Internet Forum to Counter Terrorism (GIFCT) emerged from a group of four founding companies; Facebook, Microsoft, Twitter and YouTube, operating Internet platforms and services, with the aim to disrupt terrorist menace of members’ and digital platforms. 

However, the strategic objectives of GIFCT are: capacity building of technology companies, to prevent and restrict terrorists and violent extremist ideas and threats on their digital platforms; enable multi-stakeholder engagement in policing terrorist misuse of the Internet; encourage those dedicated to online civil dialogue and empower efforts to direct positive alternatives towards jihadists messages; expose terrorist modus operandi and the intersection of online and offline activities. 

More so, the GIFCT agenda is to establish an organization with a mission to counter terrorist and violent extremists use of  Internet and digital platforms. The organization will initially limit its membership to companies offering Internet platforms and services, as well cooperate with civil society organizations (CSOs) and other government partners. The four core objectives of GICTF organization will undertake these four foundational goals: suppressing accessibility to content related terms. Content take down refers to content that has been deleted from the server on which it is hosted online. Content filtering refers to software that limits the availability of particular types of content to devices, such as content that is considered to pose a security threat. Content blocking refers to software that restrict access to particular content, such as geo-blocking that prevents accessing content hosted on a server with an Internet Protocol (IP) address that indicates it is located in a particular country. Suppression of content rankings or ratings is another way that content providers can make finding specific content more difficult.

In June 2019, Canadian government provided grant to Tech Against Terrorism to build the Terrorist Content Analytics Platform, with a well-established database of online terrorist material. The mission of tech entity is to enable better quantitative analysis of terrorist use of the Internet in order to educate on more effective preventative and counter terrorism measures, as well as, support the development of automated solutions. Other countries have developed similar counter trends, like the Dutch National Coordinator for Security and Counterterrorism (NCTV) and the Netherlands National Coordinator for Security and Counterterrorism (NCTV), with mission to monitor violent extremist threats, identify trends and cooperate with local actors in order to update its counterterrorism, counterintelligence, crisis management and cybersecurity programs.

(The Author is the Editor of

Visit the Cleanest Village in Asia, Mawlynnong

The Mawlynnong village, a little scenic hamlet in Meghalaya, was little known until Discover India magazine dubbed it “Asia’s Cleanest Village” in 2003.As a result of this, the village has become one of Meghalaya’s most popular tourist destinations
Read More

For Africa, a Streaming Battle

Straight Talk Africa Observes The Competition For Online Streaming Business In Africa, As Well As The Rising Demand For Films Made By Africans, For Africans
Read More

Documentary The Lakota Daughters

“The Lakota Daughters” Is A Documentary About The Struggles And Successes Of Oglala Lakota Women And Girls On The Pine Ridge Reservation In South Dakota. In The Original Online Programming – News/Documentary Category
Read More

COVID Restrictions for Moscow Restaurants, Bars, and Cafes: A Surprising Order

Restaurants, Cafes, And Bars In Moscow Have Been Instructed To Only Serve Guests Who Have Been Vaccinated, Have Had COVID-19 During The Last Six Months, Or Have Had A Negative PCR Test Within The Preceding Three Days As Of June 28. Customers Must Be Served Without QR Codes Certifying Their Status, According To The New Standards. The New Rule Caught Moscow Business Owners Off Guard, As It Comes Amid A Spike In Infections And Deaths In Russia
Read More

Related Article

Posted on: Wednesday, June 23, 2021 | By: crimeandmoreworld - News Desk

In Greece, Pushbacks and Violence Against Refugees and Migrants Are Defacto Border Policy: Amnesty International

According to recent data from Amnesty International, Greek border guards are holding groups of refugees and migrants in a harsh and illegal manner before summarily returning them to Turkey, in violation of EU and international law

Posted on: | By: crimeandmoreworld - Copy Editing Desk

Nations, Lawmakers Urge UN Investigation Into Abuses in China’s Xinjiang

An alliance of 40 countries led by Canada called on China on Tuesday to allow the U.N.’s human rights chief access to the Xinjiang Uyghur Autonomous Region (XUAR) to look into reported abuses of ethnic Uyghurs, including arbitrary detentions, torture, and forced labor

Posted on: Tuesday, June 22, 2021 | By: crimeandmoreworld - Copy Editing Desk

Vaccination of Senior Citizens Gaining Momentum in KwaZulu-Natal

KwaZulu-Natal Premier, Sihle Zikalala, says the province continues to make significant progress with the vaccination of both senior citizens and healthcare workers who could not receive the jab during the first phase of the country’s COVID-19 vaccination rollout

Posted on: | By: crimeandmoreworld - Copy Editing Desk

Muslim Rights Group Demands Hilton Stop Building Hotel on Site of Demolished Mosque in China’s Xinjiang

The largest Muslim civil rights and advocacy group in the United States has called on the Hilton hospitality company to halt the construction of a hotel on the site of a destroyed Uyghur mosque in northwestern China’s Xinjiang Uyghur Autonomous Region (XUAR)

Posted on: Saturday, June 19, 2021 | By: crimeandmoreworld - Copy Editing Desk

Tibetan Scholar Arrested for His Writings Has Been Held Without Trial for Three Years

A Tibetan writer arrested on unspecified charges three years ago has still not been brought to trial, and family members are being kept in the dark about his fate, Tibetan sources say


India COVID-19 News

 June 25, 2021 

India COVID-19 Cases 30,082,778 and  Deaths 391,981 Doses 301,626,082

How You Identify Fake News or Messages on Social Media 

Beware of Fake News and Fake Messages on Social Media

Always follow websites or social media platforms of traditional media outlets whether newspapers, magazines,Television News Channels or Radio Stations and authentic online only media outlets.They still maintain journalism excellence and stress on reportorial talent.On the other hand, fake news websites run by people with non journalism background and promote their own ideology with fake news and disinformations and obviously conspiracy theories.

But unfortunately mainstream media also manipulates news to establish their story angle.There were various instances when News papers and TV Channels promoted fake news/conspiracy theories in the form of out of context or manipulated pictures/videos and distorted informations.

Always check the URL of any website.Some fake news websites look like the orginal and popular one the same layout,Logo but if you check the URL you may find extra words like if the orginal website's URL is the duplicate one might be or something like that so first check the URL for authentic informations.

Check whether photos are original or photoshopped.Check Google images for authenticity.You can find help from Google Reverse Images search.

Check the news sources from other websites whether they picked up the story or not.

Whether the website layout is little bit clumsy and obviously grammatical mistakes and spelling mistakes and excessive use of Sex related and sensational and hate stories.Because sex and hate sells.

Follow official websites relating to COVID-19

WHO Clarifies the disinformation about the virus:
COVID-19 virus can be transmitted in areas with hot and humid climates
Cold Weather and Snow can not kill the new coronavirus
Taking a Hot Bath Does Not Prevent COVID-19
COVID-19 Can not be transmitted through mosquito bites

Spraying alcohol or chlorine all over your body will not kill viruses that have already entered your body. Spraying such substances can be harmful to clothes or mucous membranes (i.e. eyes, mouth)

According to World Health Organization (WHO): Regularly and thoroughly clean your hands with an alcohol-based hand rub or wash them with soap and water

Maintain at least 1 metre (3 feet) distance between yourself and anyone who is coughing or sneezing.

Avoid touching eyes, nose and mouth . If you have fever, cough and difficulty breathing, seek medical care early.

Stay at home if you begin to feel unwell, even with mild symptoms such as headache and slight runny nose, until you recover.

Follow WHO guidelines

When you follow COVID-19 related news and messages from social media then check and recheck it before consuming it.Follow journalism mantra: if your mother says she loves you, check it out.

Most of the messages or informations quote different organizations like WHO, UNICEF, UNDP,Cambridge University  or other well known institutes,organizations or individual to authenticate the messeges.Check official websites of these organizations  if stories are repeated there

Forwarding messages from unknown sources or little known sources, it would be better to ignore it.

Check whether any logo like UNICEF or WHO or other organizations used in the messages which look similar to original logo.

These type of messages are full of Grammatical mistakes and spelling mistakes which are quite uncommon in original messages.

Some fake messages pretend to be real one like unofficial Twitter handle of international media organizations like BBC,CNN,Washinton Post, New York Times-check the official Twitter handles of media outlets.

You can identify fake messages if the message requests you to share it.

Beware of Fake News or Fake Photos/Videos Relating to Communal Hatred

Always check the fact checking sites if you have some doubts about the authenticity of any information or picture.

The Same Method Applies to You Tube Videos Check the Source the credibility of the Source.To Check Fake You Tube Videos Check and Recheck the sources. Does the person have the legal right to the video posted? Did that person capture the video? Whether it has been altered?

But due to advancement of technology we can not really wipe out fake news.According to experts advent of  Artificial Intelligence(AI) some companies small or big one developing  technologies that can  lay digitally created script to anybody's voice  even words,sentences never said by the person.Even they developing a technology which can create fake video footage,images,audios like originals.So be cautious! Rumour-mongers are active everywhere whether in physical world or cyber world.

Without evidence or with fake evidence, a conspiracy theory will always remain a conspiracy theory.

For any further information relating to fake news and how-to search authentic informations from the internet write to us or Whats App:+916289017966

Our COVID-19 related Stories


COVID-19 Related Conspiracy Theories
error: Content is protected !!

Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use. <br> To find out more, including how to control cookies, see here: <a href=""> Cookie Policy </a> more information

Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy