Introductory Guide: Messaging Applications

A guide introducing the characteristics of messaging applications which may be useful for terrorist and criminal behaviour

Messaging applications have become an increasingly popular means of communication for individuals and groups. The vast majority use these applications for benign social and business use. However, terrorists and criminals can also use messaging applications, including for planning and coordination of their activities, to distribute ideological and practical material, and to groom potential recruits. Based on work by CREST researchers Adam Joinson and Joanne Hinds we have published a guide which covers some of the mobile messaging applications in use in 2016 which had features that may be useful for terrorists and criminals. It explains what they are, and highlights their main characteristics.

Main characteristics

Presence – Conveys if/when a user was last online, their location and whether they have read (or are typing) messages. This information affects a user’s certainty of whether recipients have received/read messages and their expectations of receiving a reply. If recipients have control over their online presence, they can easily delay or avoid responses.

Verification – The requirements a user must follow in order to validate their identity and how strictly these are enforced. Users may be prevented from using an application unless they can prove their identity using an email address or mobile number. The extent to which identities are verified can influence whether people trust those they communicate with.

Anonymity – The extent to which a person is identifiable. Users may be able to conceal their identities by using pseudonyms or create accounts under different names that are not linked to their real contact details. A username is associated with a phone number, the real identity of the user may be revealed if the messaging application cross-references the contacts on an individual’s phone.

The guide covers Firechat, Kik, Paltalk, Snapchat, Telegram, Twitter, WhatApp and YikYak. All of these provide useful examples of features which may be useful for terrorists and criminals as well as benign social and business use.

You can download the guide here: 16-003-01.pdf.
The guide will take five minutes to read.