
Browse content similar to 04/09/2017. Check below for episodes and series from the same categories and more!
| Line | From | To | |
|---|---|---|---|
Hello ? I'm Sean Fletcher. | 0:00:01 | 0:00:03 | |
Welcome to a new series of Inside Out London. | 0:00:03 | 0:00:05 | |
Over the coming weeks we'll be bringing you surprising | 0:00:05 | 0:00:07 | |
stories from the capital. | 0:00:07 | 0:00:17 | |
Westminster, London Bridge, Manchester and the recent attacks | 0:00:23 | 0:00:25 | |
in Barcelona have brought condemnation and sympathy | 0:00:25 | 0:00:30 | |
from around the world. | 0:00:30 | 0:00:33 | |
In a survey conducted exclusively for Inside Out by YouGov, | 0:00:33 | 0:00:35 | |
nine out of ten people said further attacks in Britain are likely. | 0:00:35 | 0:00:38 | |
While the current threat level for international terrorism | 0:00:38 | 0:00:41 | |
in the UK remains at severe. | 0:00:41 | 0:00:44 | |
Prime Minister Theresa May has vowed to shut down | 0:00:44 | 0:00:47 | |
the extremists operating online. | 0:00:47 | 0:00:50 | |
And it seems many of us are behind her. | 0:00:50 | 0:00:52 | |
Our survey revealed that 44% of people questioned in London think | 0:00:52 | 0:00:56 | |
more should be done to help the security services | 0:00:56 | 0:00:58 | |
tackle terrorism - even if individual privacy suffers. | 0:00:58 | 0:01:03 | |
So what are the terrorists doing online? | 0:01:04 | 0:01:07 | |
Over the past two years Inside Out London has been | 0:01:07 | 0:01:10 | |
undercover, tracking the online operations of the so-called | 0:01:10 | 0:01:13 | |
Islamic State. | 0:01:13 | 0:01:15 | |
What we've discovered from encrypted messages and the dark web | 0:01:15 | 0:01:18 | |
was shocking evidence of how the attacks on Westminster | 0:01:18 | 0:01:21 | |
and London Bridge were organised. | 0:01:21 | 0:01:24 | |
Terrorist expert Raffaello Pantucci has this special report. | 0:01:24 | 0:01:29 | |
Westminster at a stand-still. | 0:01:32 | 0:01:36 | |
London Bridge in a state of emergency. | 0:01:39 | 0:01:42 | |
Were these isolated terror attacks by individuals | 0:01:42 | 0:01:46 | |
working independently, so-called lone wolves or part | 0:01:46 | 0:01:50 | |
of a master plan, remotely engineered by jihadists in Syria? | 0:01:50 | 0:01:52 | |
It's inconceivable that there wasn't the use of social media apps | 0:01:52 | 0:01:56 | |
to connect these individuals who have carried out these attacks | 0:01:56 | 0:02:00 | |
with terrorists from Islamic State. | 0:02:00 | 0:02:04 | |
The result of a two-year undercover investigation, | 0:02:04 | 0:02:08 | |
we reveal new evidence linking Isis' online operations with | 0:02:08 | 0:02:12 | |
the recent atrocities. | 0:02:12 | 0:02:16 | |
He said it was a good target because it was crowded | 0:02:16 | 0:02:19 | |
with disbelievers and civilians. | 0:02:19 | 0:02:22 | |
And he said if I was successful with this operation it would be very | 0:02:22 | 0:02:25 | |
damaging for the UK. | 0:02:25 | 0:02:28 | |
And we expose how the terrorist group use the dark web to coerce | 0:02:28 | 0:02:31 | |
young British Muslims into carrying out attacks. | 0:02:31 | 0:02:35 | |
The internet is a sort dream tool for terrorist group like Isis. | 0:02:35 | 0:02:39 | |
It's opened up brand new ways of recruiting, | 0:02:39 | 0:02:44 | |
of preparing and planning acts of terror in a way that is very, | 0:02:44 | 0:02:47 | |
very difficult indeed for the authorities to stop. | 0:02:47 | 0:02:52 | |
I've spent much of my career studying Islamist terrorist cells | 0:03:06 | 0:03:10 | |
operating in the UK and how they have persuaded hundreds | 0:03:10 | 0:03:13 | |
of young men to travel far away from home and take up arms or launch | 0:03:13 | 0:03:17 | |
attacks against the very societies in which they were born. | 0:03:17 | 0:03:21 | |
As the battles rage in Iraq and Syria, much is being made | 0:03:21 | 0:03:24 | |
of Isis' recent retreat. | 0:03:24 | 0:03:27 | |
The caliphate might be crumbling and the jihadists losing | 0:03:27 | 0:03:30 | |
ground, but in cyberspace, they are advancing. | 0:03:30 | 0:03:33 | |
We're now in a new era of warfare where a string of tweets has | 0:03:33 | 0:03:37 | |
the power to trigger a deadly attack at the very heart of our democracy. | 0:03:37 | 0:03:42 | |
Barely six months ago, Parliament was forced into lockdown | 0:03:47 | 0:03:51 | |
by a man initially described as a lone wolf terrorist. | 0:03:51 | 0:03:55 | |
Armed with just a knife and a rented car, 52-year-old Muslim | 0:03:55 | 0:03:59 | |
convert Khalid Masood, killed five people and injured 50 | 0:03:59 | 0:04:03 | |
before he was finally shot dead by the police. | 0:04:03 | 0:04:09 | |
Precisely what compelled Masood to launch one of the UK's worst | 0:04:11 | 0:04:14 | |
terrorist atrocities is still unknown - | 0:04:14 | 0:04:17 | |
Investigations by the security services are ongoing. | 0:04:17 | 0:04:20 | |
But we have uncovered evidence that agents of the so-called | 0:04:20 | 0:04:22 | |
Islamic State were plotting a near-identical terrorist attack | 0:04:22 | 0:04:25 | |
using secret messaging services. | 0:04:25 | 0:04:30 | |
For over two years, our undercover journalists have been posing | 0:04:33 | 0:04:36 | |
as fictional characters committed to jihad. | 0:04:36 | 0:04:39 | |
Via social media and secretive messaging sites, they have been | 0:04:39 | 0:04:42 | |
in near constant communication with senior players in Isis. | 0:04:42 | 0:04:47 | |
In July 2016, we discovered that the terrorist organisation | 0:04:47 | 0:04:51 | |
was touting on Twitter and Facebook for British Muslims to stage attacks | 0:04:51 | 0:04:56 | |
at specific London locations. | 0:04:56 | 0:04:59 | |
We began conversing with one of their recruiters, | 0:04:59 | 0:05:02 | |
who then invited us to chat privately on a secret | 0:05:02 | 0:05:05 | |
messaging site. | 0:05:05 | 0:05:08 | |
The authorities were fully aware of our contact | 0:05:08 | 0:05:10 | |
with the terrorist organisation. | 0:05:10 | 0:05:12 | |
I managed to track down an IS recruiter online. | 0:05:12 | 0:05:18 | |
His name and was "Manager", and we always spoke on encrypted | 0:05:18 | 0:05:20 | |
messaging services. | 0:05:20 | 0:05:23 | |
I told him I was 17-years-old and living with my parents. | 0:05:23 | 0:05:28 | |
After a few weeks speaking to Manager, it became clear | 0:05:41 | 0:05:44 | |
that he was trying to groom me into doing an attack on UK soil. | 0:05:44 | 0:05:49 | |
And one day he just started talking about targets. | 0:05:49 | 0:05:54 | |
As the conversation developed the IS agent revealed an exact | 0:05:54 | 0:05:58 | |
location he wanted to attack - Westminster. | 0:05:58 | 0:06:02 | |
He said it was a good target because it was crowded | 0:06:13 | 0:06:16 | |
with disbelievers and civilians. | 0:06:16 | 0:06:19 | |
And he said if I was successful with this operation it would be | 0:06:19 | 0:06:22 | |
very damaging to the UK. | 0:06:22 | 0:06:25 | |
Later in July 2016, a second IS agent outlined how such an attack | 0:06:25 | 0:06:28 | |
could be carried out. | 0:06:28 | 0:06:32 | |
He told me to just kill ordinary people ? and that it wouldn't | 0:06:32 | 0:06:35 | |
require a very complicated plan. | 0:06:35 | 0:06:40 | |
The agent also directed our undercover journalist to a terrorist | 0:06:53 | 0:06:56 | |
manual on the dark web. | 0:06:56 | 0:06:59 | |
In gory detail it advises lone wolf jihadists on how to deploy a vehicle | 0:06:59 | 0:07:02 | |
as a lethal weapon and how to target specific vulnerable parts | 0:07:02 | 0:07:06 | |
of the body with a knife. | 0:07:06 | 0:07:12 | |
The instructions relayed to our undercover journalist | 0:07:12 | 0:07:16 | |
register like the blueprint to the Westminster attack. | 0:07:16 | 0:07:19 | |
Masood used a car to mow down pedestrians on the bridge | 0:07:19 | 0:07:25 | |
and a knife to fatally stab a policeman. | 0:07:25 | 0:07:28 | |
Could the same IS operatives who were trying to groom our | 0:07:28 | 0:07:31 | |
undercover reporter have also been inciting Masood to violent action? | 0:07:31 | 0:07:34 | |
Well, it's inconceivable that Khalid Masood was not, in some way, | 0:07:34 | 0:07:38 | |
either viewing or connected to other individuals who were viewing | 0:07:38 | 0:07:42 | |
extremist material. | 0:07:42 | 0:07:46 | |
You know, there is, arguably, no such thing as a lone actor | 0:07:46 | 0:07:49 | |
or lone wolf as is often described. | 0:07:49 | 0:07:52 | |
You know, these individuals are radicalised online, | 0:07:52 | 0:07:57 | |
they have connectivity online, they use social media apps often | 0:07:57 | 0:08:00 | |
in an encrypted fashion, and that is the methodology, | 0:08:00 | 0:08:03 | |
if you like, the medium through which radicalisation occurs | 0:08:03 | 0:08:05 | |
in the modern world. | 0:08:05 | 0:08:10 | |
I thought maybe coming back would feel, maybe | 0:08:14 | 0:08:17 | |
give a sense of closure. | 0:08:17 | 0:08:20 | |
Um, no. | 0:08:20 | 0:08:23 | |
I think I'm kind reliving sort of the, um, the emotions. | 0:08:23 | 0:08:30 | |
Orlando was last here on London Bridge on the evening | 0:08:32 | 0:08:35 | |
of Saturday June 3rd. | 0:08:35 | 0:08:39 | |
Just before 10 o'clock, as he and his friends | 0:08:39 | 0:08:42 | |
were enjoying drinks, a white van appeared | 0:08:42 | 0:08:45 | |
and shortly after, began running over pedestrians. | 0:08:45 | 0:08:49 | |
In the distance you can make out a van and after that we started | 0:08:49 | 0:08:52 | |
hearing a few screams. | 0:08:52 | 0:08:55 | |
Then down the road we see people running and there was a gentleman | 0:08:55 | 0:08:58 | |
just across the street running and he kept on looking back | 0:08:58 | 0:09:02 | |
and he kept screaming, "I have been stabbed, | 0:09:02 | 0:09:05 | |
"I've been stabbed." | 0:09:05 | 0:09:08 | |
So I came up to the gentleman, there was another gentleman | 0:09:08 | 0:09:12 | |
there and we got the man to lie on his front and we just started | 0:09:12 | 0:09:15 | |
applying pressure to his back and calling an ambulance. | 0:09:15 | 0:09:19 | |
The man was losing consciousness but as Orlando desperately | 0:09:19 | 0:09:22 | |
tried to keep him awake, he realised his own | 0:09:22 | 0:09:25 | |
life was in danger. Armed with a knife, the attacker | 0:09:25 | 0:09:28 | |
was in close proximity and claiming more victims. | 0:09:28 | 0:09:31 | |
He was very precise and I remember like he went into one man | 0:09:31 | 0:09:36 | |
in particular who was furthest to the street and then I just | 0:09:36 | 0:09:39 | |
remember the woman in the red dress. | 0:09:39 | 0:09:44 | |
She jumped on to him and she was doing her most | 0:09:44 | 0:09:47 | |
to protect this person and then the group - it was like people | 0:09:47 | 0:09:52 | |
started intervening. | 0:09:52 | 0:09:56 | |
There was now like a police presence, a police presence. | 0:09:56 | 0:10:00 | |
I remember like a bus was there and stuff and we got close | 0:10:00 | 0:10:03 | |
enough until we heard the gun shots and then I just thought to myself | 0:10:03 | 0:10:06 | |
we don't know what is happening, who is shooting and we just, we ran. | 0:10:06 | 0:10:13 | |
What I felt in the aftermath was a sense of guilt | 0:10:13 | 0:10:18 | |
and yeah, like fear. | 0:10:18 | 0:10:23 | |
Eight people were killed in the attack and 48 suffered | 0:10:31 | 0:10:34 | |
injuries ? others like Orlando have been inflicted with emotional scars | 0:10:34 | 0:10:38 | |
that may never fade. | 0:10:38 | 0:10:43 | |
On the night of the London Bridge terror attack, many of us | 0:10:43 | 0:10:46 | |
clung to our phones, checking for updates, | 0:10:46 | 0:10:49 | |
hoping loved ones were safe. | 0:10:49 | 0:10:51 | |
At the same time, members of IS in Syria were also | 0:10:51 | 0:10:55 | |
busy on social media, celebrating and posting messages | 0:10:55 | 0:10:58 | |
in honour of the attackers. | 0:10:58 | 0:11:01 | |
Our investigation reveals that IS agents were busy plotting | 0:11:01 | 0:11:04 | |
a similar attack in this exact location for over a year. | 0:11:04 | 0:11:08 | |
In the summer of 2016, one year before the London Bridge | 0:11:08 | 0:11:12 | |
attack took place, our undercover reporter spent several weeks | 0:11:12 | 0:11:16 | |
on an encrypted site in conversation with an Isis handler. | 0:11:16 | 0:11:19 | |
He repeatedly stated that London Bridge was an iconic landmark | 0:11:19 | 0:11:23 | |
they wanted to claim, a key target they wanted to hit. | 0:11:23 | 0:11:28 | |
He was trying to persuade me to carry out the attack and he also | 0:11:51 | 0:11:55 | |
gave me the option of doing it alone or along with a team. | 0:11:55 | 0:12:00 | |
In December last year the same Isis recruiter directed our undercover | 0:12:03 | 0:12:06 | |
journalist to view some explicit terrorist tutorials on the dark web. | 0:12:06 | 0:12:10 | |
One of them showed how to use a vehicle to kill people. | 0:12:10 | 0:12:14 | |
The other showed how to use knives and home-made bombs | 0:12:14 | 0:12:18 | |
for maximum impact on people. | 0:12:18 | 0:12:22 | |
And finally there was a description of how to create a fake suicide vest | 0:12:22 | 0:12:25 | |
? and how it can be used to stop the police from attacking you, if | 0:12:25 | 0:12:30 | |
you are standing next to civilians. | 0:12:30 | 0:12:37 | |
The recruiter's instructions bear all the hallmarks of the carnage | 0:12:37 | 0:12:42 | |
that was eventually wreaked on London Bridge. | 0:12:42 | 0:12:46 | |
Before they were killed by police, Khuram Butt, Rachid Redouane | 0:12:46 | 0:12:50 | |
and Youssef Zaghba rammed a hired van into a crowd of people. | 0:12:50 | 0:12:53 | |
They attacked others with knives. | 0:12:53 | 0:12:58 | |
They wore fake suicide belts and had a stash of home-made bombs. | 0:12:58 | 0:13:02 | |
Do you think encrypted applications were used in the terrorist | 0:13:02 | 0:13:07 | |
atrocities at the beginning of the year? | 0:13:07 | 0:13:10 | |
There was definitely usage of encrypted communications | 0:13:10 | 0:13:13 | |
between planners and terrorists and people that carried out some | 0:13:13 | 0:13:16 | |
of those dreadful attacks. | 0:13:16 | 0:13:20 | |
That I am afraid is common throughout every one of these | 0:13:20 | 0:13:22 | |
incidents and there is also a role of watching videos online | 0:13:22 | 0:13:25 | |
to either prepare themselves or train themselves. | 0:13:25 | 0:13:28 | |
I think that they are both, I am afraid, current occurrences | 0:13:28 | 0:13:32 | |
in these terrorist attacks. | 0:13:32 | 0:13:35 | |
In the London Bridge case you've got a combination of face-to-face | 0:13:35 | 0:13:38 | |
radicalisation through well-known extremist groups alongside digital | 0:13:38 | 0:13:42 | |
online radicalisation. And it's the combination of the two | 0:13:42 | 0:13:45 | |
that leads to individuals plotting terrorist attacks. | 0:13:45 | 0:13:51 | |
The police have yet to uncover any personal ties between the June | 0:13:51 | 0:13:56 | |
3rd attackers and Isis, but a pattern is emerging | 0:13:56 | 0:13:59 | |
from our investigation, where the group's online directives | 0:13:59 | 0:14:04 | |
are being mirrored in actual terror attacks. | 0:14:04 | 0:14:10 | |
It's a pattern that is being reflected both here and abroad. | 0:14:10 | 0:14:13 | |
There has been evidence I think since late 2014, | 0:14:13 | 0:14:16 | |
early 2015 that terrorists often based in conflict zones, | 0:14:16 | 0:14:19 | |
whether it's Libya, Syria or Iraq have been trying to instruct people | 0:14:19 | 0:14:22 | |
in real time. | 0:14:22 | 0:14:24 | |
First of all convincing them to carry out terrorist plots | 0:14:24 | 0:14:27 | |
but then giving them exact instructions on what to do. | 0:14:27 | 0:14:31 | |
One of the best examples was last year in the summer of 2016. | 0:14:31 | 0:14:35 | |
Both of the plots that happened in Germany, | 0:14:35 | 0:14:38 | |
both in Wolfsburg and Adler, both of these plots are now often | 0:14:38 | 0:14:42 | |
described as perhaps some of the most prominent early plots | 0:14:42 | 0:14:45 | |
in which you have evidence of direction, directly form Isis | 0:14:45 | 0:14:49 | |
in Syria to people who were sitting in Europe, basically | 0:14:49 | 0:14:55 | |
telling them what to do, who to attack and how to attack. | 0:14:55 | 0:15:01 | |
Isis' use of social media marks a seismic change in the way | 0:15:01 | 0:15:04 | |
terrorist organisations operate. | 0:15:04 | 0:15:09 | |
Their ideology that they're pushing through, the means of 21st century | 0:15:09 | 0:15:12 | |
technology is a very potent one and it's been - it's | 0:15:12 | 0:15:16 | |
become very effective. | 0:15:16 | 0:15:19 | |
And we need to look at how and why it's become so effective. | 0:15:19 | 0:15:23 | |
Hanif Qadir runs an anti-radicalisation charity | 0:15:23 | 0:15:26 | |
in East London but 15 years ago, he was fighting for the other side. | 0:15:26 | 0:15:32 | |
Many would have considered him a jihadist after he was persuaded | 0:15:32 | 0:15:36 | |
by British-based extremists to work alongside the terrorist | 0:15:36 | 0:15:39 | |
group Al-Qaeda. | 0:15:39 | 0:15:42 | |
You could say I was radicalised, yeah. | 0:15:42 | 0:15:45 | |
Early February 2002, I was on a plane to Afghanistan. | 0:15:45 | 0:15:50 | |
And my journey into Afghanistan led me to see lots of things. | 0:15:50 | 0:15:53 | |
I won't go into details of what the processes | 0:15:53 | 0:15:56 | |
were and why and what I did but, thankfully, I came back to the UK | 0:15:56 | 0:16:00 | |
with a different understanding of the reality of what Al-Qaeda | 0:16:00 | 0:16:02 | |
and people like them are about. | 0:16:02 | 0:16:06 | |
Do you think the web has been a game-changer in terms | 0:16:06 | 0:16:08 | |
of the radicalisation process? | 0:16:08 | 0:16:11 | |
In 2002 it still took me six to seven months, | 0:16:11 | 0:16:14 | |
if they'd have had this kind of technology I would - | 0:16:14 | 0:16:17 | |
I would put my hand on my heart and I would say guaranteed | 0:16:17 | 0:16:20 | |
within a few weeks, you could have somebody so enraged with revenge - | 0:16:20 | 0:16:24 | |
that's how they see it - that they would become a suicide | 0:16:24 | 0:16:26 | |
bomber or a terrorist. | 0:16:26 | 0:16:29 | |
Isis have got a complete different model to Al-Qaeda, because they're | 0:16:29 | 0:16:32 | |
using the advancement of technology to their benefit and you can look | 0:16:32 | 0:16:36 | |
at what some of the guys have done here, the Westminster attacker, | 0:16:36 | 0:16:40 | |
the London Bridge attacker, the Manchester attacker, | 0:16:40 | 0:16:44 | |
and now I can sort of realise how driven they have become and why | 0:16:44 | 0:16:47 | |
they've become so driven because of the potency | 0:16:47 | 0:16:50 | |
of the imagery and the accessibility through modern day social | 0:16:50 | 0:16:53 | |
media and technology. | 0:16:53 | 0:16:56 | |
From its start, Isis has realised the power of the web. | 0:16:56 | 0:16:59 | |
Its online recruiters worked hard to romanticise the idea that | 0:16:59 | 0:17:03 | |
going to Syria and taking up arms is a hijrah - a spiritual necessity. | 0:17:03 | 0:17:08 | |
But recently the numbers of young Muslim men and women making | 0:17:08 | 0:17:11 | |
the crusade have dwindled. | 0:17:11 | 0:17:16 | |
Three, four years ago - simple, hop on a flight to Turkey, | 0:17:16 | 0:17:20 | |
go over what was essentially an unmanned border, | 0:17:20 | 0:17:23 | |
walk straight in. | 0:17:23 | 0:17:26 | |
Now there's a system in place at the border, | 0:17:26 | 0:17:29 | |
there's different controls at ports, at airports, they kind of know | 0:17:29 | 0:17:32 | |
what they should be looking out for, some tell-tale signs | 0:17:32 | 0:17:35 | |
of an individual looking to travel. | 0:17:35 | 0:17:38 | |
So simply it's just far more difficult. | 0:17:38 | 0:17:40 | |
Lacking foot soldiers in Syria, the terror group now has | 0:17:40 | 0:17:43 | |
a new proclamation announced via Twitter - if you cannot | 0:17:43 | 0:17:46 | |
reach the caliphate, start waging war in your home | 0:17:46 | 0:17:48 | |
country and what's more, we will help you. | 0:17:48 | 0:17:51 | |
One of the first men to tweet this ominous sentiment | 0:17:51 | 0:17:54 | |
was Birmingham-born jihadist and supreme Isis recruiter, | 0:17:54 | 0:17:56 | |
Junaid Hussain. | 0:17:56 | 0:18:00 | |
He developed something of a cult following on social media by weaving | 0:18:00 | 0:18:03 | |
posts of his favourite music with sermons that glorified | 0:18:03 | 0:18:06 | |
violent terrorism. | 0:18:06 | 0:18:08 | |
In June 2015, our undercover reporter began | 0:18:08 | 0:18:11 | |
a conversation with him. | 0:18:11 | 0:18:13 | |
We exchanged some tweets then he suggested we talk privately | 0:18:13 | 0:18:17 | |
on an encrypted messaging site. | 0:18:17 | 0:18:20 | |
Almost immediately, he asked me if I wanted | 0:18:20 | 0:18:22 | |
to do something over here, in London. | 0:18:22 | 0:18:26 | |
As I was leading him on I said, "Yeah, but I needed guidance." | 0:18:26 | 0:18:29 | |
And his response to that was that he could help | 0:18:29 | 0:18:32 | |
and he could train me on how to make bombs from home. | 0:18:32 | 0:18:38 | |
In further exchanges Hussain described London as the heart | 0:18:49 | 0:18:52 | |
of the crusader army and vowed to organise an attack. | 0:18:52 | 0:18:57 | |
But his personal ambition to hit the capital was never realised. | 0:19:05 | 0:19:10 | |
He stopped messaging us and we later discovered Hussain had been | 0:19:10 | 0:19:16 | |
killed by a US army drone. | 0:19:16 | 0:19:21 | |
This wasn't an accident and he wasn't eliminated for any | 0:19:25 | 0:19:27 | |
physical acts of violence. | 0:19:27 | 0:19:30 | |
What made Hussain particularly dangerous to the American | 0:19:30 | 0:19:33 | |
authorities was his ability to use social media as a lethal weapon, | 0:19:33 | 0:19:36 | |
a recruiting and directing tool for wannabe jihadists. | 0:19:36 | 0:19:42 | |
Yet, his execution failed to extinguish the threat. | 0:19:43 | 0:19:46 | |
Hussain's legacy lives on. | 0:19:46 | 0:19:48 | |
There are now hundreds of clone-like Isis recruiters perpetuating | 0:19:48 | 0:19:51 | |
the methods of radicalisation he helped pioneer. | 0:19:51 | 0:19:56 | |
After Hussain's death, another recruiter contacted us | 0:19:56 | 0:19:59 | |
on Twitter and directed us to a secret messaging site | 0:19:59 | 0:20:02 | |
to continue the conversation. | 0:20:02 | 0:20:05 | |
Straight off, he told me that he had a test for me and this | 0:20:05 | 0:20:09 | |
was all on basic knowledge of Islam. And what made this difficult was, | 0:20:09 | 0:20:13 | |
I was only given three seconds to answer each question. | 0:20:13 | 0:20:18 | |
Our reporter was also asked to provide photo ID | 0:20:38 | 0:20:42 | |
and pictures of his home. | 0:20:42 | 0:20:45 | |
He spent weeks, cross-referencing the information I had provided | 0:20:45 | 0:20:48 | |
to see if it all matched and at the end of each stage | 0:20:48 | 0:20:51 | |
he would refer me to another secret messaging site. | 0:20:51 | 0:20:54 | |
And then eventually the operation he had planned for me was revealed. | 0:20:54 | 0:20:58 | |
First off he wanted me to assassinate a police officer. | 0:20:58 | 0:21:01 | |
He had devised a detailed plot including how to obtain | 0:21:01 | 0:21:04 | |
firearms and bullets. | 0:21:04 | 0:21:08 | |
In April this year, nine months after the recruiter mapped | 0:21:29 | 0:21:33 | |
out his plan of attack, a Parisian police officer was killed | 0:21:33 | 0:21:38 | |
in an incident of marked similarity. Isis claimed responsibility. | 0:21:38 | 0:21:41 | |
The police are still investigating. | 0:21:41 | 0:21:46 | |
The Met police are aware of the so-called Islamic State's | 0:21:51 | 0:21:54 | |
online offensive against London but it is a tough task for them | 0:21:54 | 0:21:57 | |
to sift out every genuine red alert. | 0:21:57 | 0:22:00 | |
Most extremists and most terrorists are well known to the intelligence | 0:22:00 | 0:22:04 | |
agencies and to the police who are monitoring them. | 0:22:04 | 0:22:07 | |
But of course, there's an issue of volume, of numbers of people, | 0:22:07 | 0:22:11 | |
numbers of individuals who have become radicalised or who are now | 0:22:11 | 0:22:14 | |
starting to show an interest in radicalised material. | 0:22:14 | 0:22:18 | |
All the power and information is all with the terrorists | 0:22:18 | 0:22:21 | |
and extremists who have at their disposal now encrypted apps | 0:22:21 | 0:22:24 | |
that allow them to talk amongst each other around the world with very | 0:22:24 | 0:22:30 | |
little coverage by the intelligence agencies whatsoever. | 0:22:30 | 0:22:35 | |
This proliferation of terrorist activity on social media has | 0:22:35 | 0:22:38 | |
forced the Government to step-up its anti-radicalisation | 0:22:38 | 0:22:41 | |
campaign, Prevent. | 0:22:41 | 0:22:44 | |
But how much can it achieve when jihadists and their followers | 0:22:44 | 0:22:47 | |
hide on the dark web and use encrypted messages | 0:22:47 | 0:22:50 | |
to plot their attacks? | 0:22:50 | 0:22:53 | |
We have been able to take down a quarter of a million pieces | 0:22:53 | 0:22:57 | |
of data or videos and information that are in the online space that | 0:22:57 | 0:23:00 | |
have been used to radicalise people. | 0:23:00 | 0:23:03 | |
We try and effectively suffocate out messages from people | 0:23:03 | 0:23:09 | |
like IS and Al-Qaeda to make sure that they are not penetrating | 0:23:09 | 0:23:12 | |
people's bedrooms and houses and turning normal people | 0:23:12 | 0:23:16 | |
into terrorists and we have to keep investing in our people | 0:23:16 | 0:23:20 | |
and intelligence services but also in working with industry to produce | 0:23:20 | 0:23:24 | |
solutions that keep us just that step ahead of the bad guys. | 0:23:24 | 0:23:28 | |
But the reality we might all have to accept is the danger posed | 0:23:28 | 0:23:33 | |
by terrorists online is the new normal. | 0:23:33 | 0:23:37 | |
I think the authorities have an unbelievably | 0:23:37 | 0:23:40 | |
difficult task now. | 0:23:40 | 0:23:43 | |
Encrypted apps or anonymous web browsers or the dark net, | 0:23:43 | 0:23:46 | |
these places online that are very, very difficult to properly monitor | 0:23:46 | 0:23:50 | |
are proliferating very quickly. | 0:23:50 | 0:23:53 | |
And one of the reasons they're proliferating quickly, | 0:23:53 | 0:23:56 | |
is because they are actually valuable to everyone. | 0:23:56 | 0:24:01 | |
They are very important channels for journalists and there is no way | 0:24:01 | 0:24:05 | |
for the authorities to crack down on these places without also | 0:24:05 | 0:24:09 | |
potentially endangering ordinary people's privacy and the privacy | 0:24:09 | 0:24:14 | |
of journalists and political activists with whom they agree. | 0:24:14 | 0:24:20 | |
From this bleak perspective, Isis are winning the war online. | 0:24:22 | 0:24:26 | |
Yet as authorities grapple with the problem, at a grassroots | 0:24:26 | 0:24:29 | |
level, Muslim communities in parts of London are using | 0:24:29 | 0:24:32 | |
the web to fight back. | 0:24:32 | 0:24:36 | |
Hanif's charity - the Active Change Foundation - | 0:24:36 | 0:24:39 | |
is designed to stop vulnerable people from being preyed | 0:24:39 | 0:24:42 | |
on by extremists. | 0:24:42 | 0:24:45 | |
We know that there are other people out - | 0:24:45 | 0:24:48 | |
out there that are reaching out to our communities, that are tapping | 0:24:48 | 0:24:51 | |
into the human resource, that creates groups like Al-Qaeda, | 0:24:51 | 0:24:54 | |
groups like Isis, so we do exactly the same thing, | 0:24:54 | 0:24:57 | |
we tap into the same human resource, we occupy the same space - | 0:24:57 | 0:25:00 | |
online and offline - to change lives for the better. | 0:25:00 | 0:25:03 | |
The Active Change Foundation claims to have stopped hundreds of children | 0:25:03 | 0:25:06 | |
from becoming radicalised and as a result has | 0:25:06 | 0:25:09 | |
received help from an unexpected quarter - | 0:25:09 | 0:25:12 | |
Twitter. | 0:25:12 | 0:25:15 | |
In the UK we've trained more than 500 charities on how to reach | 0:25:15 | 0:25:18 | |
people using our platform and get the message out that says we are not | 0:25:18 | 0:25:21 | |
going to be divided. | 0:25:21 | 0:25:24 | |
The one thing that is important to remember is that when government | 0:25:24 | 0:25:27 | |
technology companies and communities work together, and we each | 0:25:27 | 0:25:30 | |
play our part, actually you can do a huge amount to keep the public | 0:25:30 | 0:25:33 | |
safe, to challenge extremism and to make sure that those people | 0:25:33 | 0:25:36 | |
who seek to do us harm are brought to justice and challenged, | 0:25:36 | 0:25:39 | |
because although we can delete content on the internet we can't | 0:25:39 | 0:25:42 | |
delete the ideology. | 0:25:42 | 0:25:45 | |
Threatened with more stringent regulation by Government, | 0:25:45 | 0:25:49 | |
Tech companies like Twitter are keen to promote their work | 0:25:49 | 0:25:52 | |
in deprived communities. | 0:25:52 | 0:25:54 | |
But could they be doing more to prevent terrorist plotting online? | 0:25:54 | 0:25:58 | |
They do not want to take responsibility for the content | 0:25:58 | 0:26:01 | |
that is shared on their site, because if they were legally | 0:26:01 | 0:26:04 | |
responsible for everything shared on their site, | 0:26:04 | 0:26:06 | |
they would have to check it before it was published - | 0:26:06 | 0:26:10 | |
like a journalist or a newspaper does. | 0:26:10 | 0:26:13 | |
Given that there are billions of pieces of content being uploaded | 0:26:13 | 0:26:16 | |
onto these platforms every single day, that is not possible. | 0:26:16 | 0:26:18 | |
Which means that they are in some ways stuck because, inevitably, | 0:26:18 | 0:26:22 | |
their platform is going to be used by terrorists. | 0:26:22 | 0:26:25 | |
One other thing, a lot of the big companies are now building | 0:26:25 | 0:26:29 | |
in encryption into their services so they cannot decrypt | 0:26:29 | 0:26:34 | |
it themselves. | 0:26:34 | 0:26:38 | |
So when, for example, the Government goes to WhatsApp | 0:26:38 | 0:26:43 | |
and says can you give us the messages between person y | 0:26:43 | 0:26:53 | |
and person x, they can't even do it. | 0:26:54 | 0:26:57 | |
I think they have to ask themselves some quite big moral questions that | 0:26:57 | 0:27:00 | |
you know these guys are often the biggest proponents | 0:27:00 | 0:27:03 | |
of surveillance than any government. | 0:27:03 | 0:27:06 | |
They survey my details and your details every minute | 0:27:06 | 0:27:09 | |
of the day and many of them sell these details to third parties | 0:27:09 | 0:27:12 | |
to make profit and so they can't have it both ways and say you know, | 0:27:12 | 0:27:16 | |
we are anti-surveillance, we are companies that | 0:27:16 | 0:27:19 | |
don't believe in that, yet at the same time that is how | 0:27:19 | 0:27:22 | |
they make their money. | 0:27:22 | 0:27:25 | |
As our investigation was concluding we received one final | 0:27:25 | 0:27:28 | |
warning from the web. | 0:27:28 | 0:27:31 | |
It was through a secret messaging site, where an IS agent | 0:27:31 | 0:27:34 | |
was trying to recruit me. | 0:27:34 | 0:27:37 | |
He told me that I must be prepared to say goodbye to my loved ones | 0:27:37 | 0:27:41 | |
and ready to carry out an attack soon. | 0:27:41 | 0:27:46 | |
I think governments around the world have been slow | 0:28:00 | 0:28:02 | |
to act on this problem. | 0:28:02 | 0:28:06 | |
I would make exception to the British government which has | 0:28:06 | 0:28:09 | |
led the way in terms of, you know, raising | 0:28:09 | 0:28:12 | |
awareness of this issue. | 0:28:12 | 0:28:15 | |
And we may have seen a surge and a blip, if you like, | 0:28:15 | 0:28:19 | |
in attacks this year, I've got total confidence | 0:28:19 | 0:28:22 | |
in the British intelligence agencies and police in thwarting | 0:28:22 | 0:28:24 | |
and disrupting attacks in the future. | 0:28:24 | 0:28:28 | |
That's all from Inside Out. | 0:28:32 | 0:28:35 | |
Don't forget the programme will be available on the iPlayer ? just head | 0:28:35 | 0:28:38 | |
to bbc.co.uk/insideout and click on London. | 0:28:38 | 0:28:41 | |
Thanks very much for watching ? see you again soon. | 0:28:41 | 0:28:45 | |
Hello, I'm Riz Lateef with your 90 second update. | 0:29:02 | 0:29:04 |