Infiltrating extremism.

Preamble

When I got my Ph.D. I was given an extraordinary opportunity to create a Latin American Studies program for US intelligence officers. My then father-in-law (a retired FBI agent and Legal Attache) knew a retired CIA guy who had links to the Naval Postgraduate School, where the program was to be housed. My father-in-law mentioned to the ex-CIA officer that he had a son-in-law who grew up in the region and that I was about to graduate with a degree in Political Science specialising in the comparative politics and international relations of Latin America. Although I was a “commie” in his eyes, he believed that I would probably pass the security clearances. I was invited to interview for the job along with a few others and lo and behold, I got it.

My task was to create a six course MA-level curriculum in Latin American Studies for civilian and military intelligence officers who would be heading into the region after taking intensive language courses at the Defence Language Institute (DLI)–conveniently located just down the road from NPS–as a requirement for graduation. I drew up syllabi for the History of Latin America, Latin American Government, Politics and Societies, Latin American Civil-Military Relations, Latin American International Relations, Latin American Economics and Latin American Insurgencies and Revolutionary Movements and taught all courses except the economics course. The students wrote a thesis in their final two quarters after being language certified at DLI, so the entire course of study lasted eighteen months (12 of course work/thesis and six of language training).

Notice the practical aspect of this curriculum. No literature offerings, no post-modern reflections on Latin American intersubjectivity, no electives in poetry or music (although there was plenty of that on offer at off-campus parties). While all of that is important and should be the stuff of civilian university offerings, this was different. The idea was to immerse the students in the realpolitik of the region, teach them proficiency in the language(s) in which they would have to operate, and then send them into the field where they would join more experienced officers for their first assignments.

I got the security clearances needed to supervise classified theses (Top Secret), which was an interesting process because even then in the mid-1980s the investigators were obsessed with whether I had ties to a communist party. They did not care about Peronists and when I told them that I was more of a Euro-Marxist along neo-Gramscian lines, they just stared blankly and asked if he had any relationship with Che Guevara. Since I did not belong to a CP and Gramsci did not travel in the same temporal or political circles as El Che, I was deemed fit for purpose.

NPS is located in Monterey, California, which is a very beautiful place. The Monterey Institute for International Studies (MIIS) is located there and I managed to secure an Adjunct Professor job at it teaching Latin American Politics. My in-laws lived in Carmel down the road, and there was blue water, open roads and clean air to run, swim and bike galore. Plus NPS has a serious gym with some very serious fitness freaks in it, so I was always able to work out and find training partners rain or shine (this privilege continued when I was in the Pentagon years later. Let’s just say that the US understands the benefits of sports and exercise quite well). My students were all around my age–late 20s and early 30s–so we played ball together even though technically I outranked them on and off the field. That made for some amusing moments when arguing with opposing players.

Student discipline, as you would expect, was superb. Many were very conservative in their political views but they understood where I was coming from given my background and also understood that they needed to comprehend why the US was opposed in many places and who opposed them (remember, these were the days of the Sandinistas, FMLN, Sendero Luminoso and assorted other leftist insurgencies). It was more than just knowing the enemy of the day. As I used to say to them, “you guys are professional security agents of a superpower but the people fighting in the insurgencies opposing the US and its client regimes are all volunteers. Why is that?” Since I had a visible distaste for military-bureaucratic authoritarians of the right as well as Lenenists and Stalinists, it was illuminating for them to hear me explain the reasons why.

I did a very good job getting that curriculum up and running (called the Western Hemisphere Area Studies program in the Department of National Security Affairs). But it was not to last. During the second Reagan administration word got out that there was a Marxist teaching at NPS and an ideological inquisitor from the Defence Department, ironically the son of a political theorist that I had studied under at Chicago, came to see what I was doing. Although no one said anything bad about me and in fact my students and colleagues were full of praise, I was ordered to start teaching Latin American maritime strategy and naval warfare even though no other area studies program had such requirements (there were already established programs in Asian, Middle Eastern and European Studies in the NSA Department).

Needless to say, although I had been studying geopolitics since undergraduate school and had a fair handle on Latin American military thinking, it was clear that, as a civilian who does not sail, I would struggle to fulfil the task. So I quit and went off to a civilian university, where two things happened: I continued to get military officers as my students because their commands were pleased with what I taught so moved them to the school I went to; and I developed a consulting relationship with various military commands and the intelligence community that was to last until I emigrated to NZ.

One of the most interesting things about that job was the unexpected and informal quid pro quo I developed with the intelligence community. Within weeks of joining NPS I was invited to give lectures around the country to military and civilian intelligence audiences (including, I must admit, the infamous School of the Americas). On one side, I was very sporty in those days and so managed to convince various military commands to allow me to run the obstacle courses on a number of military bases when visiting them to guest lecture (needless to say the military guys were suckers for putting a civilian academic through the grinder of their physical training routines). With my knowledge of the subject already established, the ability to do hard exercise in turn led to me being invited to join in various US irregular warfare activities as an observer, then advisor and consultant, something that continued until I left the US for NZ.

On the other side, I was eventually asked to participate in some leadership analysis and strategic deconstruction exercises for intelligence shops in DC and elsewhere (of ideology and tactics, such as whether guerrilla groups adopted Marighella’s two-pronged approach to irregular warfare, Guillen’s “Robin Hood” urban warfare approach or Guevara’s “foco” theory and whether they were Leninist, Maoist, Trotskyite or hybrid in ideological orientation). I had the security clearances so that was never an issue, and because I spoke both Spanish and Portuguese and lived so long in Latin America, I was very well received wherever I went because of the insights that I could offer on things like cultural mores, social do’s and don’ts, etc. Eventually the relationship with the intelligence community developed to the point that I would get invited to see aspects of how they trained human intelligence officers and even got to offer my thoughts on how to improve said training. I was told that the courtesy was simply a way of repaying me for my efforts in creating and running the Western Hemisphere Area Studies program. It was very enlightening to see how and what intelligence officers are taught before they become case officers in the field and/or subject analysts.

The exposure to both the military and intelligence sides of the coin (no pun intended for those in the know) was a luxury that few non-career people get to enjoy. It became the basis for how I approach the subjects of strategic analysis, threat assessment, intelligence collection and warfare.

The issue.

Which brings me in a much convoluted way to the point of this post: the differences between detecting, monitoring and infiltrating rightwing as opposed to to leftwing extremist groups. That was something that came up in conversation from time to time during my days in and around the US intelligence and military communities, since both types of group have historically been present in Latin America. From rightwing paramilitary death squads like Mano Blanca in El Salvador and the Triple-A in Argentina to the leftist populism of the Tupamaros in Uruguay and Bolivarians in Venezuela to the Maoism of Sendero Luminoso in Peru and FARC in Colombia to the Trotskyite tendencies of the ERP in Argentina, both sides of the ideological spectrum have armed extremist factions with violent histories.

The basic difference, and the one that makes the extremist Right easier to infiltrate than the extremist Left, is that the Right defends the capitalist class structure of society whereas the Left seeks to overthrow it. What that means is that the Right, as a defensive or restorative movement, seeks and often receives the shelter of capitalist class fractions, including some directly represented in government. Unconsciously or consciously, the extremist Right operates on behalf of the capitalist State, whereas the extremist Left seeks to confront it. The extremist Right sees itself as the ideological vanguard of a system of property-based class relations that is too weak to defend itself from assorted usurpers. It therefore offers autonomous protection to the capitalist class fractions most threatened by those groups and often receives capitalist support and cover in return.

The extremist Left has no such luxury. Dedicated to the overthrown of the capitalist system and the State that emerges from and serves it, leftist extremists cannot afford to reveal themselves to potential patrons outside of ideological fellow travellers. Back in the day, this forced many Latin American revolutionaries to seek support from Cubans, Russians, Chinese and Vietnamese even if these were not fully cognisant of the ideological and physical terrain in which the Latin Americans were fighting in (Che Guevara’s failed campaign in Bolivia being a remarkable example). Although extra-regional and foreign, they at least could be trusted out of shared ideological conviction, whereas even members of the domestic petit bourgeoisie, organised labour and public service could not be trusted due to their penchant for cooptation and hence betrayal of the class line.

Because of this, Left extremists have developed comparatively secure operational security systems in which secrecy, insularity, compartmentalisation, siloing and atomisation of cellular networks is paramount. Right extremists, on the other hand, prefer more overt displays of power tied to the classes that they support and defend. This occurs via public demonstrations such as the march on Charlottesville or the assault on the US Capitol, but the usual displays are local in nature. This can be seen in the connections between US extremists like Oathkeepers and Proud Boys with members of the Trump entourage and retrograde billionaires like Erik Prince or the Pillow Guy. It is likely to be the case with Action Zealandia, whose overt public media efforts (including Facebook and Twitter accounts) serve as a disguise for more violent planning and hint at links to funding and patronage beyond the known membership. These groups operate openly but generally conceal their violent tendencies and more extreme views in the public space while cultivating relationships with class allies and sponsors under the guise of moderation.

Such is true even when the Right moves to decentralised small cell or lone wolf tactics because unlike Left extremists, there is always a class patron in the background and a broader network of enablers and accomplices to which the extremists look for shelter and camouflage. To that can be added the more specific commonalities that cross between certain Right subgroups, including the symbology of tattoos and heraldry, interest in body-building (a trait shared by some jihadists), tenuous if not hostile relationships with females, interest in weaponry and anger at the way “things” are going in society. The combination of personality traits and collective expression of identity are the most visible signs of a penchant for extremism and lie at the core of the type of profiling that is the bread and butter of counter-terrorism operations. But this needs to be supplemented by a broader perspective in order to discern the full context in which extremists materialise and operate.

Put another way, whereas for Mao the peasantry were the sea in which the guerrilla fish swam in pre-revolutionary China, for the Right in liberal democracies it is among the (I would argue descendent) capitalist class fractions where the extremists seek to organise and hide. That is the starting point from which counter-extremist measures should be undertaken.

Broader historical context supports this view. Leftist perspectives have been the exception to capitalist rule since the end of the Cold War. Leftist extremists were mostly defeated where they engaged in armed struggle and those that did not fight, say in Europe, North America and the Antipodes in the 1960s and 70s, were coopted and bought off. What was Left into the 2000s has very little support and even less shelter for its extremist elements. Moreover, once the political Left adopted market-friendly “Third Way” policies and the activist Left splintered into identity politics and other forms of post-modern self-characterisation, the movement as a whole lost the class line unifier that could have allowed it some critical mass for revolutionary action propelled by an extremist vanguard. Today the Left are extremist in name only, running from the terms “radical” and “socialist” rather than embracing them for the emancipatory promise they contain within.

Contrarily, as a pro-capitalist movement, the ideological Right has ridden a market-oriented and -led political wave that harks to the Chicago Boys in Chile, Reaganism, Thatcherism and the pro-market reforms in NZ of the mid 1980s to become an all encompassing and largely unchallenged world view that continues to this day. It is not just a dominant theory about preferred economic organisation, policy and behaviour. It has become a holistic world-view based on principles of individualism, property and self advancement even if these principles are more mythical than real. In this cultural environment extremist Right views flow as a sub-current in the dominant ideological stream while Left extremists swim against it. One side hides in the open while the other seeks the cover of marginality. This has consequences for their respective praxis.

Because the extremist Left cannot “hide” in the capitalist class structure it is much more furtive and surreptitious in its approach to the armed struggle. Because the extremist Right sees itself as a champion of a system of property and society under siege and therefore well supported by the “silent majority,” it is more prone to let its guard down in front of kindred spirits when it comes to enunciating its plans and preparations for confrontation with those who would seek to challenge tradition, custom and class relations. When its views are repeated and shared by politicians as shared “truths” (say, by calling for NZ borders to be closed to people from “dirty” places like India or by saying that US elections were “stolen” by an evil cabal of liberal swamp people), then there is reason to believe that they are justified in assuming that their more devilish schemes will go unnoticed or be wilfully ignored. What differences may exist between more moderate Rightists and their extremist counterparts (say, on Jews), the unifying binds of capitalist class defence is what ultimately ties them together. A Leftist extremist is a threat to the system and traditional values; a Rightist extremist is a misguided or overzealous defender of that which is given and good.

This is true as much on-line as it is in the real world. That matters because on-line has become a major channel for extremist recruitment and organization. In the world of political blogs and message boards, the language of Rightwing extremism overlaps and mixes with those of economic or social conservatives, whereas the extremist Left is seldom seen or heard at all, much less in “moderate” Left conversations. After a period of supposed self-reflection and increased moderation, mainstream Rightwing blogs in NZ have reversed course and allow thinly veiled extremists back onto their threads. From my perspective this is a good thing because if intelligence agencies are worth their budgets, they will spend time using their technical and analytic skills to triangulate between the frothing blog commentators, the quietly vile ones, and the denizens of hate fests like 4 Chan’s political boards in order to determine measures of violent intent. It really is not hard if the will is there and resources are made available. To repeat: more often than not extremists on the Right are more likely to be hiding in plain sight when compared with those on the Left.

Less readers point to lone wolf attacks as evidence that I am wrong, let me state that I reject the notion that people like the Christchurch, Pittsburgh, San Diego and El Paso killers (to name a few) flew under the radar and that no one could have predicted their murderous actions. Contrary to the official narrative, all of these had on-line and physical presences that pointed, if not screamed aloud what their intentions were. But in each case they were cloaked in concentric circles of sympathy, connivence and disinterest that allowed them to move unimpeded towards their final act. Intelligence agencies with other priorities downplayed the danger posed by the extremist Right even after the 2011 Norway attacks, considering it to be a local enforcement problem rather than a global security threat even though rightwing groups and individuals were well established on-line. Official postmortems of these crimes all sought to downplay this particular fact, attributing blame to maladjusted and socially isolated individuals acting out on completely unforeseen dark fantasies.

I beg to differ. In any event I very much doubt that any Leftist could have gotten that far in this day and age. Or a radical Muslim, for that matter, even though, in spite of their conservatism, penetrating jihadist circles is harder precisely because they do not enjoy capitalist class support in the societies in which many live.

In summary, this is just one way in which intelligence analysis can help focus and allocate resource better within a given threat landscape. As I have written elsewhere, it is good to downplay the specific ideological cause behind irregular acts of violence such as that involved in terrorism, since that focuses attention on the crime rather than the motive (because doing so elevates the latter over the former in the public eye, thereby reifying the crime). But within the confines of the agencies involved in countering extremist threats there needs to be a nuanced understanding of the difference between ideological motivations as they translate into support networks, operational security and tactical opportunities presented to violent-minded extremists. That in turn allows security agencies to design proactive infiltration and monitoring strategies that seek to detect and impede extremist plots earlier rather than later with an eye towards deterring or disrupting rather than defending against or responding to them.

In other words, one must understand the breadth and depth of the socio-economic and cultural terrain if one is to move undetected within the landscape of ideological extremism.


Counterterrorism, back to the future.

Recently I was approached by a major media platform to help them develop story lines and questions on some terrorism related topics. These focused on the SIS Report of the Internal Review conducted in the wake of the March 15 terrorist attacks and news that a younger generation of extremists are being radicalised on-line. I ended up spending an entire afternoon talking and corresponding with two reporters and a producer about possible leads, only to find out that my research and work (about four hours worth) would not be compensated and instead would be used to frame interviews with and guide questions to others.

In my opinion, this is not acceptable. Sure, there are plenty of people who will jump at the chance to have their faces on TV or voices on radio for free. There are those in salaried positions who can afford to offer free commentary as a sidebar to their “real” jobs. But that is not me. I am not an academic who can share expertise as a form of community outreach that looks good on my performance reviews. I am not a member of a interest group that may have a cause to promote. I am not a charity. I am a political risk and strategic analysis consultant, which means that I have to earn a living based on my supposed expertise in various fields, which I use to engage in targeted research and analysis based on client interests and needs. When I get called by someone asking for advice or comment, I take it as a professional call, not a courtesy. In this instance I should have known better but I decided to help out anyway and in the end was reminded that wasting four hours of my time on a subject that is not billable is just that–a waste of time and energy.

Think of it this way: if someone has a plumbing problem that s/he cannot fix on their own, they call a plumber. Do they expect the plumber to do the fix for free? If not, then why, lacking in-house expertise, would a media outlet call a subject expert and ask him to stop his own work, address their subject of interest, help them develop story lines or questions for interviews about that subject, offer the possibility of appearing in person to explain the topic, but then take his responses, cancel the interview and act surprised when payment is mentioned? Beyond the matter of compensation for services rendered, there are issues of journalistic ethics at play as well.

In any event, I decided to collect the analyses that I worked on and organise them into a blog post. The first part deals with the SIS Internal Review. The second part address the issue of younger people being radicalised on-line, in particular the impact of gaming on extremist recruitment and radicalisation.

I. The Immediate Past.

The SIS released a heavily redacted version of the internal review of its systems and processes in the lead up to the March 15 terrorist attacks in Christchurch. The Review, whose Executive Summary was released last year, parallels that of the Royal Commission of Inquiry (RCI) into the Christchurch attacks but is limited to the SIS itself. Unsurprisingly, there is much commonality and overlap between the two Reports, which also share the attribute of not holding any agency or individual to account for anything–be it acts of commission or omission–that happened in the lead-up to the attacks. Apparently everything worked as it was supposed to given the operational parameters then in place, but the operational parameters were disoriented. There were no institutional failures because all systems worked fine. It was just that the institutional gaze was fixed in such a way that the attacks could not have been prevented.

The findings are as we already know: the components of the SIS worked as they were supposed to under the pre-March 15 system but the system as a whole was set up and focused in a way that made impossible detection and prevention of an attack of the sort carried out in Christchurch (by a self-radicalised lone wolf from the ideological right-wing). It recommends various reforms and overhauls, including more emphasis on strategic analysis because the SIS was/is too focused on immediate operational (monitoring and collection) tasks given the then identified and established agency priorities. This prevents the SIS from seeing more long-term, broader and “weak signal” threats emerging before they materialise, including those emanating from domestic rather than distant shores. For an agency that has domestic human espionage as one of its three main areas of responsibility (along with counter-espionage and foreign human espionage) that is a telling admission. In fact it is worth some serious inter-textual analysis because sometimes what is left unsaid is worth more than what is said.

The Report specifically says that there was a lack of information and data sharing with other agencies, particularly the Police. The SIS and Police both have domestic counter-terrorism and intelligence gathering functions but they apparently do not coordinate operations or share information and data (in fact, the SIS is not able to access 2 of 9 government data bases, both of those under the control of the Police). In stating that, the SIS implies that the Police might have known about or had the Christchurch killer on its radarscope during the course of its investigations, but its emphasis on “criminality” rather than ideology and the siloed nature of its intelligence operations meant that anything it might have known about the killer and other violent white supremacists was kept to itself. The SIS goes on to say that even with better data and intelligence sharing they still might not have been able to connect the dots enough to detect and prevent the terrorist from acting, but the implication is two fold: other agencies with more contacts “on the ground” might/could have known about him if their priorities were different; when it came to counter-terrorism, even after eight years of white extremist mass murders dating back to the Norway killings in 2011 and repeated warnings about the rising use of the internet as a conduit for radicalisation of all types (be it jihadist or white supremacist), the NZ security apparatus discounted, ignored or simply did not care to invest more than rhetorical resources on the non-jihadist menace emerging from within.

The Report also recommends that the SIS increase its proactive role in identifying and preventing threats, especially so-called “weak signal” or low-level rumblings that could eventuate into real dangers. As a “leads-based” monitoring and collection (as opposed to enforcement) agency under the pre-March 15 “business model,” it acted reactively to known threats within the assessment parameters of the day. That means that it did not look, much less think outside of the box or look over the immediate and accepted (status quo) threat horizon when it came to the domestic threat landscape. In other words, it saw what it wanted to see and ignored what it did not want to see or hear (such as the repeated warning by Islamic organisations they they were being targeted for individual and collective harassment, including violent threats and assaults) based on the threat scenario assumptions in vogue after 9/11.

The recommendations also suggest that the SIS work with the Police to promote legislation that criminalises a range of terrorist preparatory activity (say, explosive precursor purchases, weapons and ammunition stockpiling, social media postings etc–all of these based on the Australian counter-terrorism approach) so that the Police and SIS authorities have legal grounds to engage in preventative or pre-emptive actions currently not allowed under the law. This may eventually include designating neo-fascist groups as terrorist entities if advocating or inciting violence is included along with committing violence in future anti-terrorist legislation.

There is a lot more in the report if you read as much between the lines as you do the lines themselves. IP addresses noted but eventually not followed up on that turned out to be those of the killer (making racist comments and buying ammunition in bulk, among other things). Hints at resistance to and obstruction of the former Inspector General’s attempts at tightening oversight, transparency and accountability. Reports of his use of a drone to surveil the mosques, again not followed up on in any significant measure. Prolonged travel to conflict zones amid tourist spots by a resident foreigner with no job. And yet no organisational failures–that is, of people, processes, procedures or perspective–were found. The system worked as it was supposed to. That is troubling.

Seen through cynical eyes, the SIS Report is a way to engage in some polite fence painting and rear-end covering while discretely shifting blame onto the Police (who have yet to issue their Report, if there is any). After all, if all of their systems worked as they were supposed to be and no one is at fault in the SIS for failing to detect and prevent the massacre under the organisational priorities of the day, then the ball must have been dropped by some other agency or the entire domestic security community. The latter would be an admission of institutional incompetence or myopia on grand scale. More pointedly, if we consider that the only other agency with domestic counter-terrorism functions is the Police, then the onus appears to be on them. However, as the RCI Report noted, the Police focus on criminality, not on ideological extremism. That means that, hypothetically speaking, even if they in fact stumbled upon some skinheads talking about attacking a mosque during the course of a drugs investigation, it is possible that they failed to pass on that information to the SIS because a) that was not their operational concern; and b) they were “siloed” in their approach to information and data sharing in any event. As for other agencies helping the SIS detect extremists in a partnership role (say, Immigration) they too were siloed and silent when it came to this particular type of terrorist threat.

The major take-aways from the Report are the failure of the SIS to be proactive and failure to two-way information share with other domestic security agencies under a individual and collective “business” model that simply was not cognisant of, much less focused on emerging threats from the extremist Right even eight years and dozens of right-wing mass murder events subsequent to the 2011 attacks in Norway (which were the inspiration for all of the white supremacist mass murders that followed, including March 15). Left unknown are all of the redacted parts of the report (other than the killer’s hidden name) and who, exactly, the “independent” reviewer was (I may have overlooked this so if anyone can point me to his or her identity that would be helpful).

II. The Immediate Future.

Recent assessments by the Australian Security Intelligence Organisation (ASIO) and various European intelligence shops point to the growing trend of young people, including teenagers, becoming radicalised on-line. What used to be problem with regard to would-be jihadists appears to now have morphed into a problem of white supremacy and/or neo-Nazi ideology. The bottom line is that the issue of younger (mostly male) people being inclined towards ideological extremism and/or recruited into extremist groups is very real. But there is a good and a bad side to the phenomenon.

On the bad side, younger people are being desensitised and drawn into using violence as a means of conflict resolution via an increasingly sophisticated and interactive gaming world. Virtual reality (VR) interactive games not only involve multiple players but increasingly contain highly sophisticated graphics of combat and other violent scenes, many very dark in nature (including grotesque violence against women). Players can choose their villians and heros, putting themselves in one camp or the other in highly realistic real-time action scenarios that are often as ideological as they are gory. All of this can be done as if in person. One can be a modern Crusader slaughtering jihadists or vice versa. One can be a US Gi wiping out Japanese troops in WW2. One can be a torturer, prison guard, mass murderer or violent criminal targeting women of color. One can be the Christchurch terrorist streaming his murders to a live audience. And so forth–the range of violence and characters is limited only by the player’s and game creator’s imaginations. To this can be added violent pornography, again often with explicit misogynistic imagery.

Advances in personal telecommunications technologies–mobile phones, apps, etc.–have made it easier for younger people to access all aspects of the internet. While they are a feature of modern life and a symbol of the conveniences afforded to modern societies, they also bring with them readily accessible pathways into the darkness of violence and hate. In the measure younger people are afforded access to these instruments and recognizing the tremendous benefits that they bring, avoidance of or exposure to the dark side of the web is now a feature of teenage life. Add in the natural attraction of realistic games in virtual settings, and the stage is set for youth radicalisation via gaming even in places where they are not subject to socio-economic deprivation and political oppression.

It can be argued that people attracted to highly realistic and hyper-violent on-line gaming and porn already exhibit psychopathic and sociopathic personality traits. We are not talking about FIFA2020-style sports games here. We are talking about mayhem and degradation. These types of forums now attract millions of players, some of whom may be working off stress but others who may be descending into dark violent fantasies. That includes so-called “Incels,” as in “involuntarily celibate:” men who cannot find or hold physical relationships with women and who in many instances believe themselves to be too pure or righteous to pay for sex. This leaves them very sexually frustrated and very angry, often violently so. More generally, abuse of female players is a well-known pathology in the gaming community. On VR interactive gaming platforms people with these tendencies and/or other anger issues intersect and engage with racists, bigots, violent psychopaths, animal abusers and assorted other degenerates, leading to what we might call a “nexus of hate.” It is there where white supremacist recruiters, as was the case with jihadists before them, are now regularly launching their appeals to increasingly younger audiences.

It is bad enough that younger generations of (again, mostly male) people are using violent interactive games as a form of entertainment, stress relief and fantasy fulfilment. It is worrisome that the age threshold of these people, as well as those who habitually use extreme porn, appears to be lowering. These forums can be highly addictive for certain personalities, and the obsession can be detrimental to the individual as well as those around him. Some obsessions become political and ideological–fixations on who is to blame for one’s personal ills as well as the world’s problems; and on how to fix them. Now we must factor into account that both jihadists and white supremacists (and others) use interactive gaming as a recruiting device, luring people to be more extreme in their character stereotyping and urging them to carry over their on-line personas into real life. This is, to say the least, not good when imparted on impressionable teenage minds (or anyone else, for that matter, but it is the young who most often get sucked into the vortex). From there it is a short leap onto extremist forums like 4 Chan or 8Chan (and others), and from there the pathways to the dark web and serious planning of violence are just steps away–yet discoverable when one has interactive skills and some coded advice on how to get there. One can only hope that intelligence agencies know how to get there as well.

Like many other social media platforms and content providers, the gaming industry is reluctant to move beyond basic guidelines for usage such as R18 warning labels. It zealously guards the privacy of its customers. Like the porn industry it is an early adopter of new audiovisual technologies, including VR and AI, in the construction of its consumer ranges. That puts it ahead of security-intelligence agencies, which like the old military adage notes, are playing technological catch-up while preparing to fight last century’s wars with mid-century (however updated, such as with 3rd generation warfare) tactics. As I have written in more professional settings, the problem of institutional lag is very real in the NZ intelligence community (see part I above), but also world-wide in specific areas of concern such as on-line right-wing extremism.

The problem of younger people getting radicalised into extremism online and acting violently as a result is indisputably real. Other forms of radicalisation remain (say, in churches or via criminal gangs, drug networks, etc.), but these are increasingly superseded by the on-line process because the latter does not expose the recruiter or recruitee to outside scrutiny. The interaction (or what might be called the dialectic of radicalisation) occurs in a bedroom or a basement rather than a church or a private clubhouse even though the latter remain as physical spaces for the larger community and therefore may include people of more extreme persuasions within them. But physical space is more and more a secondary site for extremist radicalisation and recruitment. Gaming is the most recent but not the only source of on-line radicalisation and recruitment, which also occurs in discussion groups, political fora, video channels, twitter threads and any number of other social media.

The good news is that the young are by and large easier to catch, particularly so with this TikTok/Instagram generation. That is because teens and twenty-somethings like to boast and be recognised as a form of affirmation and self-worth validation. This makes them careless on-line as well as in person, which in turn helps security authorities to distinguish between those who talk and those who act, those who are doers and those who are not, those who are leaders and those who are followers. There are plenty of psychological profiles in the intelligence community with which to develop individual and collective threat assessments from what is canvassed on-line. 

In effect, the younger they get, the more likely ideological extremists will trip up and be discovered because they are psychologically unable to maintain the level of security required to carry out successful irregular warfare operations such as terrorist attacks. This is not 100 percent the case but the odds in favor of their pre-emptive detection by security authorities increases dramatically when compared to say, a 35 year old ex-military veteran with 10 years of service and knowledge of weapons and explosives, a serious grudge against somebody (be it a group or government agency), on-line masking skills, knowledge of basic operational security, tight lips, few friends and a murderous eye on a mall or transportation hub. THAT is a real and palpable threat.

So there is a silver lining in the move towards younger extremists, but only if security authorities are literally on top of their games. Given what the SIS Internal Review discovered, that appears to be far from being the case.

Media Link: RNZ interview about the fight against on-line extremism two years after the March 15 Christchurch terrorist attacks.

I did an interview with Jesse Mulligan at RNZ about the mixed record with regard to fighting on-line extremism in NZ and elsewhere. You can find it here.

To kill a beast.

Let’s be clear: if Trump is not politically killed off once and for all, he will become a MAGA Dracula, rising from the dead to haunt US politics for years to come and giving inspiration to his wretched family of grifters and thousands of deplorables well into the next decade. So what is needed now is a stake in his black heart, or a silver bullet, so long as whatever the means employed, it kills the beast.

The process of doing so is more akin to cancer surgery than supernatural intervention, but before proceeding to the discussion let me explain why Trump’s political death sentence is recognised as necessary.

The Democrats know what he is so I shall not discuss the logics by which they came to the conclusion that he needs to be extirpated from the body politic. It is the Republicans who are decisive here. They–by that I mean the Republican National Committee, US congressional delegations, state governments and legislatures, and the corporate interests that influence and fund Republican causes and candidates–have to come to grips with simple facts.

Trump was never a “true” Republican. Not only is he not a blue-blood old monied elite with stakes in traditional Republican ventures like oil, automobiles and finance. He was not a member of the party until he switched allegiance in 2010. From the get-go, his politics have been more of the George Wallace meets Barry Goldwater type rather than of the Nixon-Reagan-Rockefeller variant. His victory in the 2016 presidential primaries was a slap in the face by an upstart vulgarian to the Republican establishment, which he then proceeded to eviscerate by using their own opportunism against them. He offered the GOP “family” tax breaks, deregulation, a return to Anglo-Saxon heterosexist patrirachical Christian values and shirt-sleeve patriotism. They responded with political support. That support was contingent on his staying in his lane and understanding the limits on his authority and the boundaries of his power.

He did not. Instead, he picked needless fights at home and abroad over matters both inconsequential and important. He alienated allies and he cultivated American enemies. Rather than work to heal old wounds he picked the scab of racism and bigotry until it festered and burst into the public square in places like Charlottesville, Portland and Kenosha (the last two where he joined rightwing conspiracists in claiming that Black Lives Matter protests over the murder of unarmed black men by police were an Antifa-Socialist plot).

Meanwhile, he drove a wedge within the GOP by forcing out non-MAGA types and replacing them with national-populists who would do his bidding. That fractured the Republicans, and yet the marriage of convenience between the GOP establishment and Trump continued until 2020. However, at that point his erratic behaviour and incompetent, some might say delusional approach to the Covid-19 crisis turned a bad situation into a world-leading case study in governmental dysfunction. He turned a public health crisis into an internecine ideological war about masks and lockdowns. He refused to listen to scientists and increasingly relieved on conspiracy theorists for advice on the pandemic and more. In doing so he became bad for business even as the financial markets remained optimistic that at some point he would come to his senses.

He did not. He ran a dog-whistling re-election campaign marked by Covid super-spreader rallies. He impugned the integrity of the electoral process months before the vote was held. He tried to manipulate votes by filling the US Postal Service with partisan hacks who attempted to suppress absentee (mail-in) ballots by reducing collection points and sorting facilities. He urged Republican state election officials to challenge minority voting rights and to limit access to voting facilities in areas that traditionally went Democratic on Election Day. He did everything in his power to tip the scales, skew the results and delegitimise any outcome other than his win.

He lost anyway. Not by hundreds of thousands or a few million votes. He lost by nearly 8 million votes. It is true that he garnered 74 million votes himself, but that was on the back on the highest voter turn out in over a century (60.66 percent). Joe Biden won close to 82 million votes, so in the end even with those 74 million votes cast for Trump, the race was not close.

Rather than concede gracefully, Trump well and truly jumped out of his lane. He denounced without evidence fraud in the electoral system and specifically those in contested swing states. He spoke of dark forces operating behind the scenes to cheat him out of his rightful victory. He decried foreign (but non- Russian) interference. He mounted over sixty specious legal challenges to the results in several states, losing all but one of them. And then he crossed the biggest line of all: he incited a seditious insurrectionary attack on the US Capitol in order to prevent the Electoral College results from being certified by Congress. People were killed and injured in the mass assault and occupation of the Legislative branch. Politicians were forced to flee for their lives and take cover as the mob swarmed the debating chamber and halls baying for blood. And rather than appeal for calm, Trump watched it unfold on TV.

Whether they recognise it or not, that was the point when he crossed a Republican bridge too far. The assault on the Capitol was aimed not just at Democrats but at Republicans as well (people chanted “Hang Mike Pence,” among other niceties). In the days leading up to, during and after the siege, Republican lawmakers were harassed and threatened in public spaces, social media and via personal communications (including Mitt-Romney (R-UT) and Lyndsey Graham (R-SC), as were Democrats (House Speaker Nancy Pelosi (D-CA) and congresswoman Alexandria Ocasio Cortez (D-NY) were singled out for particularly violent misogynistic abuse). The attack may have been originally driven by partisan rage stoked by Trump and his minions, but became a broad-brushed assault on an institutional pillar of the American Republic.

Because many of the insurrectionists were wrapped in body armour and armed with blunt and other street-level weapons like Mace and bear spray (there were also firearms and explosives cached near the Capitol), which they used to fight sworn law enforcement officers defending the complex, the assault was an attack on the sovereignty of the US government itself. That is because one of the foundations of sovereignty–the core of what it is to be a “sovereign”–is legal monopoly over organised violence within defined territorial limits (the definition is from Max Weber but the origins of the notion of sovereignty as having a coercive core dates back to Thomas Hobbes).

It has now been established that, cloaked by the larger crowd who attended the Trump “Stop the Steal” rally and then walked to the capitol after Trump urged them to, members of various militias were acting in a coordinated fashion to the extent that some used walkie-talkies and their phones to organise aspects of the attack such as blocking the underground tunnels below the Capitol that are used as escape routes for congresspeople in times of crisis. Once they violently engaged the Capitol and DC Police on the steps and interior of the legislature, they challenged the sovereignty of the Federal Government and the components parts of its repressive apparatus.

For any nation-state, much less a supposed superpower, that cannot stand. Regardless of partisan orientation, no individual is above the Institution. As the saying goes, the Nation is one of laws, not people. Sovereignty cannot be contested because if it does, the Republic is at risk. The State is sacrosanct so long as it performs its core functions.

That is why Trump must be excised. He has undermined the basic foundations of the constitutional Republic and thereby challenged fundamental notions of the US as a sovereign State. He has divided the Nation and manipulated his supporters into becoming a riotous seditious mob. He has put himself before God, Flag and Country even while wrapping himself in them.

If not in public, in their hearts Republicans know this.

Removal of Trump’s malignant political presence is a three step process. One is via his Senate trial and banishment, one involves the prosecution and punishment of his seditious supporters, and one is a form of legal chemotherapy that will hopefully prevent him from returning to the political scene. This is what needs to happen. It does not mean that it will happen. We can only be hopeful.

Senate Minority Mitch McConnell (R-KY) seems to understand the situation. With his bleating about “rigged” elections in Georgia, Trump contributed to the GOP losing both Senate seats in that state (to a Jew and an African-American!). That cost McConnell his majority leadership. He now has an incentive to see Trump finished off because among other things it will pull the rug out from under and bring to heel would-be pretenders to the MAGA throne like Marco Rubio, Ted Cruz and Josh Hawley.

The impeachment charge against Trump is incitement of the attack. In asking for two extra weeks for Trump’s lawyers to “prepare, ” McConnell may in fact be giving Democrats more time to uncover irrefutable evidence that the Trump White House colluded with insurrectionists on how to storm the Capitol. The New York Times and Wall Street Journal have uncovered evidence that some of the “rioters” were paid staff on Trump’s campaign and were in contact with members of Trump’s entourage, including family members and people like Rudy Giuliani. With the articles of impeachment now tabled, more evidence may be uncovered before the Senate court proceedings begin. People can be subpoenaed to testify under oath or offered immunity in exchange for their testimony. Unlike his first impeachment, Trump cannot offer presidential protection to those called as witnesses (as he did when he ordered various officials not to testify). Things are about to get real and that reality is ugly for Trump.

17 Republicans need to cross the aisle and vote in favour of conviction in order for Trump to be impeached. McConnell has said that he has whatever numbers he needs to go either way. If the evidence is compelling then it will be easier to convict on “institutions over individuals” grounds. Doing so will be the start of the de-Trumpification process. Although that is necessary, it is not sufficient. More needs to be done by way of follow ups.

If Trump is convicted he then can be banned from political life by a simple majority vote in the Senate. The decision to vote on a lifetime ban is called by the Democratic majority. Given his long-standing repudiation of Trump, Mitt Romney will gladly provide the cross-over vote but there are others who will be willing to do so as well.

In order to make the ban stick, the second step is a form of legal chemotherapy. He needs to be sued and charged in civil and criminal courts at the state and federal levels, along with family members and others, like Giuliani, who conspired with him during his time in business and government. The constant barrage of lawsuits and prosecutions will exhaust him financially and perhaps mentally and will open space for people to turn on him in order to escape or receive lesser punishment themselves. So long as he is occupied in this fashion he will have relatively little resources, time or energy to try and mount some sort of political re-birth under different guise.

The final part of this process involves the prosecution and serious punishment of those charged with offences related to the assault on the Capitol. These include murder; conspiracy to commit murder; grievous bodily harm; conspiracy to commit grievous bodily harm; inter-state transport of weapons with the intention of committing crime; looting; vandalism; theft of government property; theft and distribution of classified material; rioting; affray; sedition; treason and more. The charges must be as serious as possible and the sentences must be as severe as legally permissible.

The reason for this hard line approach is not just the punitive value it has on those who perpetrated the attack on the Capitol. Its main value is deterrent. It provides a palpable indicator of the boundaries of the “no go” zone when it comes to political dissent and legitimate protest. Adopting a judicial hard-line will help deter copycats or those who think that just because some politicians, even the president, say it is OK, seditious insurrection in fact is not OK as far as the constitutional State is concerned.

The three-tiered approach to extirpating the Trump malignancy from US politics is the only way that we can be reasonably assured that the treatment will work (and yes, I recognise that I am borrowing some of that “organic” language used by the Argentina junta when referring to its victims. But if the shoe fits, then why not wear it?). In the end, Trump is an existential threat to the very notion of the US as a nation-state, and must be treated as the domestic terrorist inspiration and enabler that he is. Not to put too fine a point on it, but he is no better and more likely a bit worse than one of Osama bin-Laden’s drivers in Pakistan. If so, and those guys wound up in Guantanamo or dead for their efforts, why should he be treated appreciably differently than they were?

One can only hope that Mitch McConnell and the GOP recognise that Trump is just another data point on that anti-democratic continuum, but one that is far more dangerous to the US than any Islamicist chauffeur.

Taxonomies of mass political violence.

The assault on the US Capitol and constitutional crisis that it has caused was telegraphed, predictable and yet unexpected and confusing. There are several subplots involved: whether the occupation of the Michigan State House in May was a trial run for the attacks on Congress; whether people involved in the Michigan attack and other rightwing extremists from groups such as the Proud Boys were involved (as video shows individuals rallying and directing the crowds to the Capitol, initiating the first and subsequent clashes with the Capitol Police over the concentric perimeter barricades and then leading the charge towards the debating chambers and congressional offices while yelling threats to specific politicians like Pence and Pelosi; whether there was collusion between the president and elements in the DoJ, DoD and Capitol Police leadership to “stand down” their forces even in the face of intelligence reports that mass violence was distinctly possible; whether this was done purposefully to allow the occupation in order delay the electoral college certification vote hoping that somehow Trump would be declared the default winner (he would not); and so on.

Rather then get into these subjects while the smoke has yet to clear, allow me to offer a critique and then clarify some key concepts needed to understand what happened.

To begin with, the liberal corporate media is doing us no favours by loosely throwing out words like “domestic terrorists” and “coup” (the rightwing media prefers to blame everything on Antifa or portray the rioters as “misguided patriots” so will be ignored). This a prime example of conceptual stretching that devalues the true meaning of the words and renders them meaningless as analytic tools at a delicate moment. Conceptual precision, not conceptual stretching, is needed now. So in the interest of conceptual precision let me briefly offer the following taxonomy:

Military coup: removal of a government by the armed forces often working on behalf of or with civilian elite factions via the threat or use of force. It is top-down and elite in nature and execution, not mass based, and often pre-emptive in the face of a potential grassroots mass uprising. Its scale of violence can range from low to very high depending on the perception of common threat by the coup-mongering elites. It can involve universal or particular (corporate, in terms of specifically military) grievances. Depending on what the coup-mongering coalition intends, it can involve regime rather than government change. Other names for this phenomenon are “golpe de Estado (golpe)” or “putsch” (although in recent history the term refers to violent inter-military leadership disputes rather than regime change per se).

Constitutional coup: removal of government by a disloyal opposition via manipulation of legal norms (e.g. impeachment under false pretences). It is top-down and elite in nature and execution, not mass based, and the scale of violence is low. May embrace universal claims but uses particular grievances as precipitant or justifying factors. Does not involve regime change.

Insurrection: attempted/actual overthrow of government by armed political faction(s). It involves collective violence that is mass but not necessarily majority based. It is bottom-up in nature even if encouraged by elites and the scale of violence ranges from low to very high depending on the level of State and/or civil resistance to it. Embraces universal claims but may use particular grievances as a justification for action. May or may not desire or cause regime change.

Armed revolt: violent protest against government. Non-elite and bottom up in nature and execution. Low to medium scale of violence depending on scope of adhesion and State and social resistance. Often particularistic rather than universal in its grievances or claims. It can be minority or mass based depending on the scope of social adhesion. It may or may not result in government or policy change and will not result in regime change.

Sedition: advocating or instigating the usurpation/overthrow of duly constituted government. Can be elite or grassroots in nature and execution but with a limited mass base in any event. Low to medium scale of violence depending on degree of State repression. May have particular or universal grievances or claims but is not focused on regime change.

Revolution: mass (violent/non-violent) collective action leading to socio-economic and political parametric change (which involves regime, social and structural changes that transcend simple government overthrow). Bottom-up and grassroots in nature and execution based on universal claims or grievances (even if led by organised revolutionary vanguards). Scale of violence low to extreme based on scope of social and State resistance (i.e. class, religious and ethnic divisions increase the probability of violence).

Revolts, insurrections and sedition can lead to coups or revolution but are not synonymous with them.

So what happened in the US? The attack on Congress is best seen as an insurrection/limited mass revolt instigated by a seditious president refusing to step down after losing an election. It is not a coup because those are basically quarrels amongst elites that require overt or tacit involvement by the armed forces in support of one faction or one elite faction overthrowing another via “constitutional” means. It did not intend regime (or even governmental) change but instead the reassertion or re-validation of a particular type of administrative authority in a presidential democracy.

Nor was terrorism involved. Terrorism is the use of seemingly indiscriminate extreme or disproportionate violence on defenceless targets for symbolic purposes. It has a target (victims), object (purpose) and subject (audience(s)). The object is to sow pervasive fear and dread with the purpose of bending the subject to the perpetrator’s will. It can be criminal, state- (including military), state-sponsored, or non-state ideological in nature.

The assault on Capitol Hill did not involve extreme or wanton indiscriminate violence against defenceless targets. It was not designed to sow generalised fear. It was a limited, low-level mass act of partisan violence on a symbol of power that involved thuggery (including corporal harm) for the purposes of intimidation. It resulted in arrests, injuries and deaths, but it failed.

Once we understand these basic differences, we can more specifically consider the proportionate remedies needed to address the problem. Throwing around emotive language during a delicate and charged time only cheapens the debate and compounds the real issues involved. So let’s be precise.

PS: Long term readers will note that I have discussed various aspects of civil-military relations and the causal factors at play in coups in previous posts. Things like push and pull factors, vertical and horizontal cleavages within the military, disloyal oppositions and partisan stalemates–there is much more to the coup phenomenon than simplistic (mostly Left) punditry would have us believe. The truth with regard to recent event in the US is more complex, scary in part and yet comforting in the end.

Thought for the day: On terrorist entities.

Now that he has been convicted and sentenced, including on a charge of committing a terrorist act (to which he admitted guilt), the Christchurch killer has been designated a “terrorist entity” by the government, using provisions of the Terrorism Suppression Act 2002. Designating the killer as a terrorist entity means that his assets can be seized, his (online/other) fans can be prosecuted as terrorist supporters and creating funding platforms for his legal appeals or other reasons are now punishable offenses. No GoFundMe pages for him, it seems, and racists will need to think twice and tread carefully when they sing his praises in any forum (which should make certain NZ rightwing blogs a bit more careful when moderating comments)..

This is a smart move on the government’s part. Although the intent of the 2002 legislation was clearly directed at Islamicists and the various fronts and support networks that aided their armed campaigns, the use of the legislation in its first instance–both in successfully charging the killer with a terrorist offence and in designating him as an “entity” so that others could not easily provide support or encouragement to him or other like-minded people–is a well executed step that in principle demonstrates that the law can be applied in a balanced fashion regardless of the ideological cause being espoused.

But the test of this balance remains to be seen. Imagine if Tame Iti and his ragtag assortment of activist friends had been charged and convicted of terrorist offences because of their Urewera shenanigans (which was the original intention of the Clark government). Would they have been designated as “entities” so that others of similar mind could not legally offer them or their various causes emotional and material support? What about environmental or animal rights militants, who are often labeled as “eco-terrorists” by rightwing politicians and media and the commercial outfits that the activists oppose? What about anti-1080 activists, who have shown a penchant for intimidation and violence? Or the Sea Shepard Society, which Japan has designated as a terrorist group (and pirates) because it has used direct action tactics against whalers in the Southern Ocean and elsewhere?

The old saying “one person’s terrorist is another person’s hero” comes to mind here. The label can be applied to anyone who, under the broad definition of “national security” in New Zealand legislation, causes “harm” to the national economy, social order or reputation regardless of whether they used violence in pursuit of their objectives. Accordingly, the use of the term “terrorist” has been stretched by politicians, media mouthpieces and corporate and/or interest groups to cover a variety of non-murderous people agitating for a wide range of causes.

That is why the use of the term “terrorist” and the designation of terrorist entities must be done under strict guidelines and in the most extreme of circumstances. While international designators are helpful–say, in labelling Daesh as a terrorist entity or NZ expats clearly identified as having participated in its genocidal activities as terrorists–it remains for the Crown to rigorously scrutinise the criteria by which people and groups are placed in such categories. That must be objective, factually-based and proportionate to the harm committed. Above all, it must not be left to the government of the day, less partisan opportunism rear its ugly head in the application of justice.

The Christchurch killer made it easy on the Crown–and on the security agencies that allowed him to slip under the radar when planning and preparing the attacks–when he pleaded guilty to all charges. The sentencing was heavy on drama and pathos but the outcome was foretold and inevitable. The post-sentencing designation of the killer as an entity was an adroit touch. But one wonders if that designation should have come from the court at the time of sentencing rather than from the government after the sentence was handed down.

In any event, the first successful application of terrorism charges and terrorist entity designations is a salutary milestone in NZ jurisprudence and security affairs, but it is not without its potentially negative implications in future circumstances. That should be the guiding (or better said, self-limiting) principle in any future consideration of their use.

No right to know.

When the Christchurch murderer pleaded guilty to 51 counts of murder and a number of other violent assault charges a few months ago, he effectively closed the door on what the public will know about the lead up to and commission of the event. His plea means that no evidence will be presented in court; that no witness testimony and cross-examinations under oath will happen; that no documentation will be entered into the official record; that no officials will be sworn in and questioned. We will not hear from the killer himself, not will we see senior security officials explain how his murderous plans were not detected and disrupted. Even so, the Crown did not reject the plea. That may have been convenient from the Crown’s point of view, but on the larger issue of finding out what actually happened, the NZ public apparently has no right to know.

This undoubtably suits the NZ Police and perhaps the NZSIS and GCSB (although it is likely that what failures may have occurred were in the real of human intelligence collection rather than with signals intelligence, since the latter would need to be tasked by the former to undertake domestic intercepts and the like). Now they will not have to explain whether there were systemic, institutional and something more than individual failures in the lead up to the attacks. We will never know if they had an institutional bias that blinded them to the dangers posed by violent white extremists, or whether they were aware that white extremisms posed an increasing danger to NZ society or some of its communities but decided not to act to preempt the threat because of other priorities (say, a focus on white gang drug dealing and the use of skinhead informants to that end). They may not have to explain whether they were aware (if true) that the killer had accomplices and enablers who helped him on his path. They will not have to answer as to why they ignored repeated complaints and pleas by the NZ Muslim community to do something about the ongoing and often intimidatory harassment to which many of them were subjected in the wake of 9/11. They will not have to justify why they devoted so many resources to monitoring jihadist sympathisers when in the end no Muslim has ever been charged with, much less convicted of, committing an ideologically-motivated act of collective violence in NZ both before and after 9/11.

Instead, two individuals have been convicted and sentenced to jail terms for possessing and trying to distributed offensive materials in the form of beheading videos, there are a few dozen who have ranted on social media to the point that they have caught the attention of the security services, and there are a small group who have left to join jihadists in the Middle East, some of whom will not be coming back because they are no longer of this Earth. But that is the extent of the Islamicist threat even though much money and resources were poured into the anti-jihadist effort and numerous law changes (Terrorism Suppression Act, Search and Surveillance Act, Intelligence and Security Act) were enacted to give security authorities more powers and leeway in combating them. Now we will never know why some of those resources were not directed into detecting and preventing white extremist attacks even though the NZ racist community was very visible, well-known to be violent and increasingly connected to foreign white supremacist groups via social media. Why were they not on the security services’ radar scope? Or were they?

The Police have admitted that the arms license vetting process to which the killer was subjected was deficient. Beyond confirming the obvious, this also is a classic example of scapegoating the lowest people in the chain of command. The Police also agree that the gun laws prior to March 15 were too lax, but that was a matter for parliament to resolve. When taken together with the guilty plea, what we have here is the makings of an absolution of higher level security service incompetence, negligence, maladministration and bias as contributing factors in the perpetration of the mosque attacks.

It has been announced that the Royal Commission of Inquiry has interviewed the killer. That may elicit some new information from him about his motives and planning, but it appears to be more of a courtesy to the defendant than a genuine fact-finding effort. After all, the Royal Commission should be able to have access to all of the Crown evidence by now. It has interviewed dozens of people (including myself) and supposedly has access to a trove of government documentation relevant to the case.

But therein lies the rub. The terms of reference of the Royal Commission are broad but its powers are limited. It has no powers of compulsion under oath, that is, it cannot demand that sworn witnesses appear before it (all of those who talk with the Commission due so voluntarily as “interviewees”). It cannot order the release of classified material to the commissioners; instead, it is dependent on the goodwill of the very agencies it is supposed to be investigating to provide such documents. It cannot identify any official that is mentioned in the course of the inquiry. It has no sanction powers. In truth, the Royal Commission is toothless.

I hope that I am wrong and that it will be able to answer many of the questions posed above because it has secured full voluntary cooperation from the security agencies that failed to detect and prevent the massacres. I hope that it is able to offer recommendations about review and reform of procedures, protocols and processes governing approaches to the NZ threat environment, including about the priority hierarchy given to potential, possible and imminent threats of any nature (for example, the relative priority given to gang criminality versus potentially violent political activism). It might even call for a major shake-up of the way in which Police and other intelligence agencies approach the issue of domestic terrorism. But that is just speculation, and may be no more than wishful thinking on my part.

One can only hope that in exchange for the guilty plea, the Crown and Police got something in return from the killer. Perhaps there was a quid pro quo involved whereby he offered information to the authorities that they otherwise could not obtain in exchange for better conditions in jail, sentence reduction, possibility of parole, etc. I am not familiar with the legal intricacies behind guilty pleas but I doubt that the murderer decided to do so out of the kindness of his heart, to spare the victim’s relatives further grief or to save the NZ taxpayer the costs of a trial. To my mind there had to be something in it for him.

In any event, the people who benefitted the most from the guilty plea are the NZ Police and intelligence agencies. They will not be held to account in a court of law, and instead can define the terms of the narrative constructed in the Royal Commission report so that it downplays or exonerates command and cultural failures while blaming lower level individuals, lack of resources, heavy workloads and other extraneous matters for the failure to prevent NZ’s worst act of terrorism.

Rather than a moment of honest reckoning, we could well get a whitewash.

That is not good enough.

PS: In the wake of commentators disputing some of has been said above, I have attached the Terms of Reference (with Schedule) and following minutes: Minute 1, Minute 2, Minute 3.

A question of focus.

More complaints have been aired about the Royal Commission of Inquiry (RCICh) into the Christchurch terrorist attacks. These have centred on the perception that the RBICh has not paid enough attention to the Muslim community who were the targets of the attacks and the sole victims of them. Even though the Terms of Reference for the RCICh specified that it would establish liaison ties with representatives of the NZ Muslim community, many are unhappy with the way in which those have been put into effect. This is in spite of an initial outreach to the community via the Christchurch Muslim Liasion Group and then formation of a Muslim Community Reference Group (MCRG, via the RCICh’s Head of Community Engagement) that is scheduled to begin work this month.

The main objection appears to be that the Muslim community, as victims of the attacks, are not the central focus of the inquiry and therefore feel marginalised by the process even if organisations like the Islamic Women’s Council of New Zealand (IWCNZ) and Federation of Islamic Associations of New Zealand (FIANZ), as well as several prominent Muslims, have been consulted. This is a delicate and thorny concern that is difficult to resolve. What follows is an explanation of why that is so.

The terms of reference for the RCICh specify that it must do two things: determine how the killer planned, prepared and executed the attacks; and what state agencies did and did not do in the lead-up to the attacks that enabled or could have prevented them from happening. The relevant sections of the terms of reference are here (sections 2-4 of the Terms of Reference):

Purpose of inquiry and matter of public importance

The matter of public importance that the inquiry is directed to examine is—

(a) what relevant State sector agencies knew about the activities of the individual who has been charged with offences in relation to the 15 March 2019 attack on the Al-Noor Mosque and the Linwood Islamic Centre in Christchurch, before that attack; and
(b) what actions (if any) relevant State sector agencies took in light of that knowledge; and
(c) whether there were any additional measures that relevant State sector agencies could have taken to prevent the attack; and
(d) what additional measures should be taken by relevant State sector agencies to prevent such attacks in the future.
Scope of inquiry

In order to achieve its purpose, the inquiry must inquire into—

(a) the individual’s activities before the attack, including—
(i) relevant information from his time in Australia; and
(ii) his arrival and residence in New Zealand; and
(iii) his travel within New Zealand, and internationally; and
(iv) how he obtained a gun licence, weapons, and ammunition; and
(v) his use of social media and other online media; and
(vi) his connections with others, whether in New Zealand or internationally; and
(b) what relevant State sector agencies knew about this individual and his activities before the attack, what actions (if any) they took in light of that knowledge, and whether there were any additional measures that the agencies could have taken to prevent the attack; and
(c) whether there were any impediments to relevant State sector agencies gathering or sharing information relevant to the attack, or acting on such information, including legislative impediments; and 
(d) whether there was any inappropriate concentration of, or priority setting for, counter-terrorism resources by relevant State sector agencies prior to the attack.
Matters upon which findings are sought

The inquiry must report its findings on the following matters:

(a) whether there was any information provided or otherwise available to relevant State sector agencies that could or should have alerted them to the attack and, if such information was provided or otherwise available, how the agencies responded to any such information, and whether that response was appropriate; and
(b) the interaction amongst relevant State sector agencies, including whether there was any failure in information sharing between the relevant agencies; and
(c) whether relevant State sector agencies failed to anticipate or plan for the attack due to an inappropriate concentration of counter-terrorism resources or priorities on other terrorism threats; and
(d) whether any relevant State sector agency failed to meet required standards or was otherwise at fault, whether in whole or in part; and
(e) any other matters relevant to the purpose of the inquiry, to the extent necessary to provide a complete report.

As readers will observe, there is no specific mention of a Muslim-as-a-community focus, much less a victim-centred one. Instead, attention is on the killer and the State, with recommendations deriving from the above investigation lines focused on how state agencies can work better towards preventing such a thing happening in the future. The role of the MCRG is seen by the RCICh in that light–as witnesses adding to the testimonial trail about events leading up to the attacks.

This clearly is not the reasoning of those who think that the Muslim community should be placed front and centre in the RCICh’s concerns. It was never the intention of the RCICh to make them the centrepiece, and the announcement of the terms of reference and first minute issued by the RCICh noted that the MCRG was an advisory body only, limited in numbers, with members selected by the RCICh and therefore not entirely representative of the community as a whole. At that point people had the option of agreeing to accept invitations or not.

The top-down selection process by which the MCRG was constituted was bound to raise concerns about co-optation, and the unspecified limited number of group members reinforced the notion that the MCRG is going to be used as window dressing on a potential whitewash. On the other hand, given the demographic heterogeneity of NZ’s Muslim population and the political and personal rivalries that go with exercising collective representation for this type of membership, a bottom-up MCRG selection process in which a larger number of Muslim communities are represented would have been too time-consuming to organise and hold given the six month window that the RCICh has in which to prepare and present its report (due December 10).

Because a nation-wide leadership selection process involving all organised Muslim communities cannot happen given the time constraints, as national peak associations it seems reasonable that leaders of FIANZ and IWCNZ would participate in the MCRG. Perhaps recognised leaders of the mosques that were attacked will participate, along with representatives of Muslim regional or city organisations. The importance is that numbers of representatives remain manageable and that internecine rivalries are avoided in the discharge of their responsibilities as members of the MCRG.

I am not privy as to who is in the MCRG but can only hope that they are a representative cross-section of the Islamic community in Aotearoa.

Returning to the issue of focus, it was never contemplated that the RCICh would address issues of victim compensation or other post-event consequences. The main role of the MCRG is to provide testimony about how Muslim community security concerns were managed (some would say ignored) by State agencies (particularly but not limited to the Police and SIS), in the lead-up to March 15. There clearly is much to be said here and the MCRG would be well served to bring forth compelling witness accounts of the impact that the post-9/11 social and political milieu has had on them, both in the security realm as well as elsewhere in NZ society.

I have no doubt that some interesting light can be shed by the MCRG on how NZ security agencies handled complaints about threats to members of the Islamic community and their organisations, and I am willing to bet that the complaints and requests for assistance have been more numerous than what has been publicly acknowledged by NZ authorities and the mass media. I also believe that the Muslim community can speak at considerable length about the disproportionate official scrutiny that they have endured after 9/11 even though no Muslim has been charged, much less convicted of committing an act of ideological-driven violence in NZ before or since (with official scrutiny extending to acts of intimidation, extensive infiltration of mosques and sowing of distrust within targeted groups by the extensive use of informants).

Both of these backstories will be invaluable for the RCICh’s investigation into if and how, whether by acts of omission or commission, State agencies contributed to the multi-dimensional lapses–systemic, institutional and individual–that together constituted the collective “intelligence failure” that enabled the commission of this mass atrocity.

All of this assumes that the Inquiry will be conducted honestly, thoroughly and without a hidden intention to cover-up or whitewash. Some are skeptical that the process will lead to a full and truthful account of what happened. I beg to differ, at least in part. Having spoken to the RCICh myself, I can only say that those involved in conducting the inquiry acknowledge the limitations of their charter but appear committed to finding the truth and understand that their reputations would be poorly served if they were to do otherwise. I hope that I am not proven wrong.

Assuming that the process is honest, the two lines of investigation–of the killer’s actions and of state agencies’ roles in the lead up to the attacks–will establish the chain of causality that led to the murderous victimisation of over 100 people and their families. Once responsibility for what happened is established and lines of accountability (if any) determined within the State sector, then the easier it will be for those representing the victims of the March 15 domestic terrorist attack to demand redress from Crown entities whose negligence, incompetence or prejudice enabled in one way or another the commission of the event. To try and do otherwise within the confines of the RCICh confuses the process because it misplaces its immediate emphasis (which is supposed to be on the perpetrator, accomplices and potential enablers, including agents of the State) and detracts from its primary focus (which is to establish the how’s and why’s that led to the success of the attacks).

In other words, focus on the Muslim community as victims rather than as primary witnesses within the RCICh puts the inquisitorial cart before the horse and clouds the inquiry with concerns best addressed after its conclusion.

Media Link: The March 15 aftermath.

I was interviewed as part of an Al Jazeera documentary on the aftermath of the March 15 terrorist attacks in Christchurch. The program is well worth watching because it addresses subjects that most of the NZ media do not want to wrestle with.

You can find it here.