Gamers, terrorists and spies.

For the better part of the last decade analysts have warned about the use of online interactive action games as a recruiting ground for white supremacists and neo-nazis (and to a lesser extent jihadists). The use of Crusader and modern Western military imagery in battles with dark skinned enemies facilitated the recruitment pitch, which given the subject material is mostly targeted at teenaged and young adult men. The policy implication of these warnings is that intelligence agencies, specifically signals and technical intelligence agencies such as those grouped in the Anglophone 5 Eyes network, need to devote resources to monitoring online gaming communities for signs of extremists and their attempts at expanding their ranks via the internet as well as formulating actual online plots to commit acts of violence.

Unfortunately most of these warnings went unheeded and continue to largely be ignored. Government intelligence agencies such as those grouped in the 5 Eyes have myriad threats and many other priorities to address besides online extremists using gaming as a recruitment portal. This has left a gap in their coverage of what is now a full fledged digital community of hate. This community does not just have gaming as a vehicle. It also includes chat and noticeboards like 4Chan and 8Chan, Reddit, Discord and other on-line communities that under the mantle of “free speech” cater to extremist viewpoints. Sadly, that attracts advertising revenue from those seeking to profit from hate and violence, be it via the sale of “hunting” weapons, uniforms, military insignia, survival gear and other para-military outfitters or publications and entities that promote ideological agendas that dovetail with the views of these types of online communities (think Voice for Freedom or Counterspin Media as NZ examples). Equally sadly, in spite of the efforts of the Christchurch Call and various advocacy groups, a majority of technology companies are loathe to self-police when it comes to issues of “free speech,” much less provide client data to security agencies in all but the most dire and pressing of circumstances.

This brings us to the subject of the recent leaks of highly classified US intelligence reports by a Massachusetts Air National Guard service member serving as an enlisted cyber transport system journeyman. In that capacity, 21 year old Airman First Class (E-3) Jack Teixeira of the 102nd Intelligence Wing of the Massachusetts Air National Guard headquartered at Joint Base Cape Cod on the site of Otis Air Field was responsible for maintaining cyber security for the Wing. In order to discharge his duties Airman Teixeira very likely was granted a Top Secret/Sensitive Compartmentalized Information (TS/SCI) security clearance that allowed him untrammelled access to what is known as a “SCIF,” a tightly secured room or building in which both paper and digital records are stored. He also had authority to visit off-station secure sites such as the Special Operations Command and other military intelligence units as part of his official duties. The US government refuses to comment on the matter of his clearances and how he obtained them pending his trial.

Using his access, as early as February 2022 Airman Teixeira began to transcribe and leak information from highly classified documents to a group of about 50 online gaming enthusiasts that were grouped in a Discord channel called “Thug Shaker Central.” He also is reported to have leaked to a larger Discord group and to forums on 4Chan and Reddit. Among these groups were a number of foreign nationals, including Russians. Two common aspects of the channels he leaked to is that they had weapons, uniform and military paraphernalia fetishes and trafficked in white supremacist, anti-Semitic, anti-Muslim, racist and misogynist narratives, with Teixeira himself now being exposed as adhering to those beliefs. The only thing missing from the profile of the gamer guys Teixeira consorted with is the label “Incel,” as in iInvoluntarily celibate. I am not sure about the others but Teixeira certainly seems to fit that bill.

At first his transcribed leaks received a lukewarm response from his (mostly younger) audience because they were pages long and covered a broad range of subjects, from details on the Russian-Ukranian War, Chinese satellite warfare plans, Taiwanese defence preparedness, Egypt’s flirtation with selling arms to the Russians, US eavesdropping on South Korean communications and much, much more. After a while, when he realised that many of the group members he was trying to impress were simply not reading his “nuggets,” he began to photograph and download the documents themselves. The would prove to be his undoing.

Transcribing the documents gave him plausible deniability because the decontextualised words (i.e., no identifying markings) could have been sourced by many people from many SCIFS. But his associates were all young male gamers who are highly visual in their information-processing, so paragraphs of words without pictures soon turned boring for them. Hence, in order to keep their attention spans focused on his “nuggets” and therefore affirm his status as leader of the Thug Shaker Central group, Teixeira needed to go digital. Once he did and the documents appeared on-line with official markings like TS/SCI and NOFORN (“No Foreign” distribution), then the counter-espionage crowd in military intelligence, the FBI and the National Security Agency (NSA) could get to work tracking him down. However, there was a twist to his uncovering. As it turns out it was the New York Times digital investigations team that first saw the documents online. Then the Washington Post was alerted to their presence. After tracing their IP addresses and social media accounts linked to them, these outlets contacted members of the Thug Shaker Command, who confirmed the legitimacy of the documents and how they came to be online. At that point the journalists contacted the US government for comment and the hunt was on. Teixeira was captured within a couple of weeks and is now awaiting trial. He faces a lengthy prison sentence and possibly a death sentence under federal espionage and treason laws. Others might find themselves arrested as well. As it stands, two commanders of the 102nd Intelligence Wing have been stood down over the breach.

Several questions have been raised as to how and why he could have been granted a high level security clearance and given so much access to sensitive information. There are also questions raised about why the chat rooms he was involved with were not being monitored by the relevant authorities and why a seemingly obscure Joint Base at an otherwise relatively quiet tourist destination be a place where deep secrets of all sorts are stored. Allow me to answer at least some of them and draw some comparisons with my own experience.

Because of the nature of his job, Teixeira required high level clearances. He comes from a Portuguese-American military family and was two years out of high school when he joined the Guard. This mitigated in his favour because it appears that he was security vetted by a contractor working for but not by a US government agency. Edward Snowden underwent the same process and we have seen how that turned out. In this case the Discord leaks are far more serious both in terms of the breadth of the subjects covered–there are more than 500 documents in the tranche realised so far- and the depth of the exposure, which includes revelation of “sources and methods.” It is not surprising that the US government has gotten rigorously quiet on the matter. Moreover, Snowden gave his purloined data files to investigative journalists and perhaps the Russian government. Teixeira put them online, where they spread from closed groups to open forums.

His family background growing up in a well-established middle class Portuguese-American community (many of the people in that part of Massachusetts and Rhode Island are descendants of Cape Verdean whalers) and his young age would have suggested to his security vettors that he had no “baggage” that could compromise national security. If they were contractors as I believe they were, he likely wouldn’t have undergone the background checks that I underwent in the 1990s by the Defense Intelligence Agency, which included polygraphs, interviews with family, friends from Argentina all the way to that current moment, work colleagues, undergraduate and graduate student peers, even my ex-wife (not surprisingly, she had little good to say about me). I was asked about my sexual preferences, political beliefs (especially whether I had ever been a member of a Communist Party), vices (gambling, alcohol, drugs, prostitutes), financial situation (especially debt) and numerous other deeply personal matters. The main concern then was two-fold: whether I could be trusted with sensitive material, and whether I could be blackmailed. My ex-wife’s opinion notwithstanding, it turns out I was pretty milquetoast as far as applicants go.

It is unlikely that a contractor would go to such lengths to establish Teixeira’s background given his age and personal life, although the apparent ignorance of his gaming activity and the fraternity of gamers that he associated with was a major lapse on the part of both the vettors as well as US signals and military intelligence agencies. However, even if he had undergone the more rigorous DIA background checks (which still exist), it would have been unlikely that, other than the gaming angle, there would have been anything alarming on his record unless he had been arrested on felony charges. He had not been. From the contractor’s point of view it made sense to go lightly on his background check, using police and FBI records and perhaps some interviews with family and friends. Since neither US intelligence agencies or the military looked into his social media and gaming profiles, there were no red flags to which the vettors could have been alerted, and they clearly did not do that sort of due diligence themselves.

The use of security vetting contractors became common place after 9/11 as the US sought to expand its intelligence networks and analyses against non-State global irregular warfare actors as well as “traditional” adversaries (and friends!). The DIA and smaller intelligence and security vetting units simply could not handle the volume of security checks required by the thousands of new hires in the intelligence-security field. There are now over 1.5 million people in the US with “Top Secret” security clearance and another 3 million with “Secret’ clearances. The solution to the overwhelming demand for background checks was to farm out the vetting to private firms with experience in the field, such as private investigation agencies or firms specifically set up by former security officials to do security vetting as their bread and butter. However, the profit motive often leads to cost-cutting when it comes to the more laborious features of the vetting process, so many firms took the cheaper way and cut corners in that regards. Investigation into the Snowden leaks uncovered that the process by which he was granted high level clearances was flawed and incomplete. It looks like the same may have happened with Airman Teixeira.

Remember that the military is a young person’s business. They do most of the killing and they are the ones who mostly die. Gaining security clearances at a young age is quite common in the US military, especially for specialised units and more so for intelligence units. Teixeira’s age was therefore not a disqualifying factor per se and again, was likely seen as a good justification for quick granting of his clearances.

What about the unit to which he was assigned? Why would it have access to such a broad array of highly classified information? The answer is that the 102nd Intelligence Wing is a renown unit with many important responsibilities. Among them, Teixera’s assigned subordinate unit, the 102nd Intelligence, Surveillance and Reconnaissance Group, processes signals and technical intelligence from U-2 spy planes, RQ-4 Global Hawk and MQ-9 Reaper drones and supports the National Geospatial-Intelligence Agency (from which satellite data is collected). These platforms conduct operations all over the world but specifically over Ukraine in support of the Kiev regime. Some are reported to deploy from Otis Air Field. That means that the SCIF at Joint Base Cape Cod is an integral component of US global intelligence collection activities and the US effort to support Ukraine, which justifies the presence of highly sensitive intelligence in it.

Teixeira also travelled to other SCIF sites and had opportunity to copy classified intelligence from them as well as from his home base. If he did it obviously violates his secrecy oath and sets him up for a number of serious charges. The question is whether he did so just to impress his gamer friends, or for money, or for some ideological reason. The answer is as of yet unclear. The dominant train of thought is that he is an immature young man trying to impress other younger immature men with his “insider” status as one of those who know secrets. He clearly did not do so for money. But his darker comments about race, aspects of US government policy and Russia, much of it in line with the MAGA/QAnon narrative, could point to an ideological motive. Whether that be hatred of the Deep State and Democrats or support for Russia has yet to seen.

I should point out that in my case I was sworn to not only never divulge the TS/SCI material that I handled, but also to not talking or writing without prior authorisation about the classified aspects of my government jobs for twenty years after I left public service. Anything that I did want to write or talk about in my post-government career needed to be cleared by the Defense Department, DIA or intelligence agencies that I worked with, and I was informed that anything that involved ongoing operations or assets still alive or in service would be redacted from any material I wanted to use. There were serious penalties for removing classified material from the SCIFs that I worked in (Unauthorised removal of Classified Material), and much worse, for deliberately removing classified materials in order to hand them to a third party, whomever that may be (Espionage). It will be hard for Airman Teixeira to argue that his actions were unintentional rather than deliberate, and given who were among the groups that he leaked to, it might find him facing espionage charges. The situation does not look good for him.

Whereas what attention has been brought to the online gaming community by the security agencies has focused on rightwing extremism and terrorism, it is clear that the espionage and counter-espionage aspects of interactive digital forums needs to be factored in as well. To that expansion in the scope of cyber-intelligence operations must come a thorough re-appraisal of how security background checks are conducted on people applying for high-level security clearances. This is not just a US problem. There have been enough lapses in NZ security background checks to warrant a review of current SIS procedures and processes for vetting applicants, with or without the help of consultants. Currently non-citizens can get a high level clearance if they pass the SIS checks, but here too at least some of the vetting has been contracted out to private firms (including one that was led by Michelle Boag, of all people). The issue of citizenship aside, there is enough historical evidence to suggest that the SIS (as the lead agency when it comes to security clearance vetting and background checks) might be wise to commission an independent review of its vetting procedures and operations.

Some may remember the case of the Walter Mitty-type fraudster named Stephen Wilce, the guy who claimed to have been a member of the British Olympic bobsledding team and a former SAS trooper who served as Head of the NZ Defence Technology Agency and Chief Defence Scientist from 2005 until he was exposed in 2010. He held very high level security clearances, handled very sensitive defence information and yet was vetted by an outside firm hired by the SIS. One would have thought that they might have looked up the roster of the British bobsledding team in the 1980s when he claimed to be on it, but apparently that was too much to ask. Makes one wonder where Mr. Wilce is now.

I mention this anecdote because the cyber world has opened up a whole new frontier when it comes to security and intelligence. Preventing breaches and leaks has become both easier and more difficult. Easier because the technological means to detect early online threats is greater than in previous decades. Harder because security threats have multiplied along with advancing technologies. What is needed is a proactive strategy of cyber-vigilance in conjunction with tightened requirements for background checks on those handling classified information, including monitoring social media for evidence of online extremism. Although much has been said about how the NZ Police and intelligence community are dedicating significant resources to doing so, it is telling that the Police Commissioner admitted that his agency was caught off-guard by the online planning of the Parliamentary protests last year, and in fact were unaware of the convoys that were organised via various well-known messaging applications to descend on Wellington. By the time the Police realised the size of the protest, the protestors were already setting up camp on the lawns and streets surrounding the Beehive.

Meanwhile, with that note of caution out of the way, can we all say “AI?”

Counterterrorism, back to the future.

Recently I was approached by a major media platform to help them develop story lines and questions on some terrorism related topics. These focused on the SIS Report of the Internal Review conducted in the wake of the March 15 terrorist attacks and news that a younger generation of extremists are being radicalised on-line. I ended up spending an entire afternoon talking and corresponding with two reporters and a producer about possible leads, only to find out that my research and work (about four hours worth) would not be compensated and instead would be used to frame interviews with and guide questions to others.

In my opinion, this is not acceptable. Sure, there are plenty of people who will jump at the chance to have their faces on TV or voices on radio for free. There are those in salaried positions who can afford to offer free commentary as a sidebar to their “real” jobs. But that is not me. I am not an academic who can share expertise as a form of community outreach that looks good on my performance reviews. I am not a member of a interest group that may have a cause to promote. I am not a charity. I am a political risk and strategic analysis consultant, which means that I have to earn a living based on my supposed expertise in various fields, which I use to engage in targeted research and analysis based on client interests and needs. When I get called by someone asking for advice or comment, I take it as a professional call, not a courtesy. In this instance I should have known better but I decided to help out anyway and in the end was reminded that wasting four hours of my time on a subject that is not billable is just that–a waste of time and energy.

Think of it this way: if someone has a plumbing problem that s/he cannot fix on their own, they call a plumber. Do they expect the plumber to do the fix for free? If not, then why, lacking in-house expertise, would a media outlet call a subject expert and ask him to stop his own work, address their subject of interest, help them develop story lines or questions for interviews about that subject, offer the possibility of appearing in person to explain the topic, but then take his responses, cancel the interview and act surprised when payment is mentioned? Beyond the matter of compensation for services rendered, there are issues of journalistic ethics at play as well.

In any event, I decided to collect the analyses that I worked on and organise them into a blog post. The first part deals with the SIS Internal Review. The second part address the issue of younger people being radicalised on-line, in particular the impact of gaming on extremist recruitment and radicalisation.

I. The Immediate Past.

The SIS released a heavily redacted version of the internal review of its systems and processes in the lead up to the March 15 terrorist attacks in Christchurch. The Review, whose Executive Summary was released last year, parallels that of the Royal Commission of Inquiry (RCI) into the Christchurch attacks but is limited to the SIS itself. Unsurprisingly, there is much commonality and overlap between the two Reports, which also share the attribute of not holding any agency or individual to account for anything–be it acts of commission or omission–that happened in the lead-up to the attacks. Apparently everything worked as it was supposed to given the operational parameters then in place, but the operational parameters were disoriented. There were no institutional failures because all systems worked fine. It was just that the institutional gaze was fixed in such a way that the attacks could not have been prevented.

The findings are as we already know: the components of the SIS worked as they were supposed to under the pre-March 15 system but the system as a whole was set up and focused in a way that made impossible detection and prevention of an attack of the sort carried out in Christchurch (by a self-radicalised lone wolf from the ideological right-wing). It recommends various reforms and overhauls, including more emphasis on strategic analysis because the SIS was/is too focused on immediate operational (monitoring and collection) tasks given the then identified and established agency priorities. This prevents the SIS from seeing more long-term, broader and “weak signal” threats emerging before they materialise, including those emanating from domestic rather than distant shores. For an agency that has domestic human espionage as one of its three main areas of responsibility (along with counter-espionage and foreign human espionage) that is a telling admission. In fact it is worth some serious inter-textual analysis because sometimes what is left unsaid is worth more than what is said.

The Report specifically says that there was a lack of information and data sharing with other agencies, particularly the Police. The SIS and Police both have domestic counter-terrorism and intelligence gathering functions but they apparently do not coordinate operations or share information and data (in fact, the SIS is not able to access 2 of 9 government data bases, both of those under the control of the Police). In stating that, the SIS implies that the Police might have known about or had the Christchurch killer on its radarscope during the course of its investigations, but its emphasis on “criminality” rather than ideology and the siloed nature of its intelligence operations meant that anything it might have known about the killer and other violent white supremacists was kept to itself. The SIS goes on to say that even with better data and intelligence sharing they still might not have been able to connect the dots enough to detect and prevent the terrorist from acting, but the implication is two fold: other agencies with more contacts “on the ground” might/could have known about him if their priorities were different; when it came to counter-terrorism, even after eight years of white extremist mass murders dating back to the Norway killings in 2011 and repeated warnings about the rising use of the internet as a conduit for radicalisation of all types (be it jihadist or white supremacist), the NZ security apparatus discounted, ignored or simply did not care to invest more than rhetorical resources on the non-jihadist menace emerging from within.

The Report also recommends that the SIS increase its proactive role in identifying and preventing threats, especially so-called “weak signal” or low-level rumblings that could eventuate into real dangers. As a “leads-based” monitoring and collection (as opposed to enforcement) agency under the pre-March 15 “business model,” it acted reactively to known threats within the assessment parameters of the day. That means that it did not look, much less think outside of the box or look over the immediate and accepted (status quo) threat horizon when it came to the domestic threat landscape. In other words, it saw what it wanted to see and ignored what it did not want to see or hear (such as the repeated warning by Islamic organisations they they were being targeted for individual and collective harassment, including violent threats and assaults) based on the threat scenario assumptions in vogue after 9/11.

The recommendations also suggest that the SIS work with the Police to promote legislation that criminalises a range of terrorist preparatory activity (say, explosive precursor purchases, weapons and ammunition stockpiling, social media postings etc–all of these based on the Australian counter-terrorism approach) so that the Police and SIS authorities have legal grounds to engage in preventative or pre-emptive actions currently not allowed under the law. This may eventually include designating neo-fascist groups as terrorist entities if advocating or inciting violence is included along with committing violence in future anti-terrorist legislation.

There is a lot more in the report if you read as much between the lines as you do the lines themselves. IP addresses noted but eventually not followed up on that turned out to be those of the killer (making racist comments and buying ammunition in bulk, among other things). Hints at resistance to and obstruction of the former Inspector General’s attempts at tightening oversight, transparency and accountability. Reports of his use of a drone to surveil the mosques, again not followed up on in any significant measure. Prolonged travel to conflict zones amid tourist spots by a resident foreigner with no job. And yet no organisational failures–that is, of people, processes, procedures or perspective–were found. The system worked as it was supposed to. That is troubling.

Seen through cynical eyes, the SIS Report is a way to engage in some polite fence painting and rear-end covering while discretely shifting blame onto the Police (who have yet to issue their Report, if there is any). After all, if all of their systems worked as they were supposed to be and no one is at fault in the SIS for failing to detect and prevent the massacre under the organisational priorities of the day, then the ball must have been dropped by some other agency or the entire domestic security community. The latter would be an admission of institutional incompetence or myopia on grand scale. More pointedly, if we consider that the only other agency with domestic counter-terrorism functions is the Police, then the onus appears to be on them. However, as the RCI Report noted, the Police focus on criminality, not on ideological extremism. That means that, hypothetically speaking, even if they in fact stumbled upon some skinheads talking about attacking a mosque during the course of a drugs investigation, it is possible that they failed to pass on that information to the SIS because a) that was not their operational concern; and b) they were “siloed” in their approach to information and data sharing in any event. As for other agencies helping the SIS detect extremists in a partnership role (say, Immigration) they too were siloed and silent when it came to this particular type of terrorist threat.

The major take-aways from the Report are the failure of the SIS to be proactive and failure to two-way information share with other domestic security agencies under a individual and collective “business” model that simply was not cognisant of, much less focused on emerging threats from the extremist Right even eight years and dozens of right-wing mass murder events subsequent to the 2011 attacks in Norway (which were the inspiration for all of the white supremacist mass murders that followed, including March 15). Left unknown are all of the redacted parts of the report (other than the killer’s hidden name) and who, exactly, the “independent” reviewer was (I may have overlooked this so if anyone can point me to his or her identity that would be helpful).

II. The Immediate Future.

Recent assessments by the Australian Security Intelligence Organisation (ASIO) and various European intelligence shops point to the growing trend of young people, including teenagers, becoming radicalised on-line. What used to be problem with regard to would-be jihadists appears to now have morphed into a problem of white supremacy and/or neo-Nazi ideology. The bottom line is that the issue of younger (mostly male) people being inclined towards ideological extremism and/or recruited into extremist groups is very real. But there is a good and a bad side to the phenomenon.

On the bad side, younger people are being desensitised and drawn into using violence as a means of conflict resolution via an increasingly sophisticated and interactive gaming world. Virtual reality (VR) interactive games not only involve multiple players but increasingly contain highly sophisticated graphics of combat and other violent scenes, many very dark in nature (including grotesque violence against women). Players can choose their villians and heros, putting themselves in one camp or the other in highly realistic real-time action scenarios that are often as ideological as they are gory. All of this can be done as if in person. One can be a modern Crusader slaughtering jihadists or vice versa. One can be a US Gi wiping out Japanese troops in WW2. One can be a torturer, prison guard, mass murderer or violent criminal targeting women of color. One can be the Christchurch terrorist streaming his murders to a live audience. And so forth–the range of violence and characters is limited only by the player’s and game creator’s imaginations. To this can be added violent pornography, again often with explicit misogynistic imagery.

Advances in personal telecommunications technologies–mobile phones, apps, etc.–have made it easier for younger people to access all aspects of the internet. While they are a feature of modern life and a symbol of the conveniences afforded to modern societies, they also bring with them readily accessible pathways into the darkness of violence and hate. In the measure younger people are afforded access to these instruments and recognizing the tremendous benefits that they bring, avoidance of or exposure to the dark side of the web is now a feature of teenage life. Add in the natural attraction of realistic games in virtual settings, and the stage is set for youth radicalisation via gaming even in places where they are not subject to socio-economic deprivation and political oppression.

It can be argued that people attracted to highly realistic and hyper-violent on-line gaming and porn already exhibit psychopathic and sociopathic personality traits. We are not talking about FIFA2020-style sports games here. We are talking about mayhem and degradation. These types of forums now attract millions of players, some of whom may be working off stress but others who may be descending into dark violent fantasies. That includes so-called “Incels,” as in “involuntarily celibate:” men who cannot find or hold physical relationships with women and who in many instances believe themselves to be too pure or righteous to pay for sex. This leaves them very sexually frustrated and very angry, often violently so. More generally, abuse of female players is a well-known pathology in the gaming community. On VR interactive gaming platforms people with these tendencies and/or other anger issues intersect and engage with racists, bigots, violent psychopaths, animal abusers and assorted other degenerates, leading to what we might call a “nexus of hate.” It is there where white supremacist recruiters, as was the case with jihadists before them, are now regularly launching their appeals to increasingly younger audiences.

It is bad enough that younger generations of (again, mostly male) people are using violent interactive games as a form of entertainment, stress relief and fantasy fulfilment. It is worrisome that the age threshold of these people, as well as those who habitually use extreme porn, appears to be lowering. These forums can be highly addictive for certain personalities, and the obsession can be detrimental to the individual as well as those around him. Some obsessions become political and ideological–fixations on who is to blame for one’s personal ills as well as the world’s problems; and on how to fix them. Now we must factor into account that both jihadists and white supremacists (and others) use interactive gaming as a recruiting device, luring people to be more extreme in their character stereotyping and urging them to carry over their on-line personas into real life. This is, to say the least, not good when imparted on impressionable teenage minds (or anyone else, for that matter, but it is the young who most often get sucked into the vortex). From there it is a short leap onto extremist forums like 4 Chan or 8Chan (and others), and from there the pathways to the dark web and serious planning of violence are just steps away–yet discoverable when one has interactive skills and some coded advice on how to get there. One can only hope that intelligence agencies know how to get there as well.

Like many other social media platforms and content providers, the gaming industry is reluctant to move beyond basic guidelines for usage such as R18 warning labels. It zealously guards the privacy of its customers. Like the porn industry it is an early adopter of new audiovisual technologies, including VR and AI, in the construction of its consumer ranges. That puts it ahead of security-intelligence agencies, which like the old military adage notes, are playing technological catch-up while preparing to fight last century’s wars with mid-century (however updated, such as with 3rd generation warfare) tactics. As I have written in more professional settings, the problem of institutional lag is very real in the NZ intelligence community (see part I above), but also world-wide in specific areas of concern such as on-line right-wing extremism.

The problem of younger people getting radicalised into extremism online and acting violently as a result is indisputably real. Other forms of radicalisation remain (say, in churches or via criminal gangs, drug networks, etc.), but these are increasingly superseded by the on-line process because the latter does not expose the recruiter or recruitee to outside scrutiny. The interaction (or what might be called the dialectic of radicalisation) occurs in a bedroom or a basement rather than a church or a private clubhouse even though the latter remain as physical spaces for the larger community and therefore may include people of more extreme persuasions within them. But physical space is more and more a secondary site for extremist radicalisation and recruitment. Gaming is the most recent but not the only source of on-line radicalisation and recruitment, which also occurs in discussion groups, political fora, video channels, twitter threads and any number of other social media.

The good news is that the young are by and large easier to catch, particularly so with this TikTok/Instagram generation. That is because teens and twenty-somethings like to boast and be recognised as a form of affirmation and self-worth validation. This makes them careless on-line as well as in person, which in turn helps security authorities to distinguish between those who talk and those who act, those who are doers and those who are not, those who are leaders and those who are followers. There are plenty of psychological profiles in the intelligence community with which to develop individual and collective threat assessments from what is canvassed on-line. 

In effect, the younger they get, the more likely ideological extremists will trip up and be discovered because they are psychologically unable to maintain the level of security required to carry out successful irregular warfare operations such as terrorist attacks. This is not 100 percent the case but the odds in favor of their pre-emptive detection by security authorities increases dramatically when compared to say, a 35 year old ex-military veteran with 10 years of service and knowledge of weapons and explosives, a serious grudge against somebody (be it a group or government agency), on-line masking skills, knowledge of basic operational security, tight lips, few friends and a murderous eye on a mall or transportation hub. THAT is a real and palpable threat.

So there is a silver lining in the move towards younger extremists, but only if security authorities are literally on top of their games. Given what the SIS Internal Review discovered, that appears to be far from being the case.