top of page

Going Dark: The Secret Social Lives of Extremists by Julia Ebner

  • Writer: Daniel Foster
    Daniel Foster
  • Nov 29, 2024
  • 9 min read

Julia Ebner is a counter-extremism researcher who has dedicated her career to understanding how radical ideologies take hold in the digital age. In Going Dark, she takes this commitment to a whole new level, going undercover to infiltrate some of the most dangerous extremist groups operating online. Her goal? To uncover how these groups recruit, radicalise, and operate in a world where boundaries between the virtual and real are increasingly blurred. The result is an eye-opening journey into the mechanics of modern extremism, showing just how pervasive and insidious these networks have become.


Ebner’s motive is clear: she wants to highlight how our online spaces have become battlegrounds, where hate groups use technology and culture to grow their influence. She embeds herself in their communities, gaining firsthand insights into their strategies, from meme-driven propaganda to coordinated campaigns designed to game algorithms. It’s a risky, uncomfortable process that delivers critical insights into the forces shaping today’s political and cultural landscape.

In her words, “I wanted to know what they were doing behind closed doors, to step into their worlds and see how they justified their actions.” 


Julia Ebner went undercover into the worlds of extremist groups, embedding herself in their digital and physical spaces to uncover how they recruit, manipulate, and radicalise members. White nationalist movements like the Northwest Front and Identity Evropa operate under the banner of free speech, but their forums are anything but open. Discussions about topics like the “Great Replacement” or the Holocaust are framed as rational debates, but dissent is met with swift backlash. Conspiracy theories like the creeping “Muslim takeover of Europe” are sold as “fact-based discussions,” while Holocaust denial is framed as testing the boundaries of free speech. However, disagreeing often results in expulsion or being labelled “part of the problem our countries have with censorship.” As Ebner recounts, “I have tried, and seen others try to question the assertions and arguments made in extremist online groups, each time being called out as an infiltrator, labelled a traitor or kicked out of the chat room.” These movements rely on a toxic mix of fear and loyalty, creating environments where dissent is silenced and members are forced deeper into ideological echo chambers.


Generation Identity (GI), a youth-driven ethno-nationalist movement, uses social media and gamified tools like their app, Patriot Peer, to attract and organise recruits. Patriot Peer is marketed as a way to “connect the silent majority,” gamifying activism with ratings and credits for interacting with other members. GI also relies on provocative public stunts, such as chartering a ship to prevent NGOs from rescuing refugees in the Mediterranean during their #DefendEurope campaign. The campaign received over €200,000 in donations, much of which came from American sources, despite its focus on European borders. GI’s cultural strategies include rebranding extremist ideals to make them more palatable; for example, the “Tradwife” movement romanticises traditional gender roles while subtly reinforcing their ethno-nationalist agenda. Ebner observes that GI’s media savvy extends beyond their supporters: “Their media stunts are provocative enough to be turned into viral posts and tweets… forcing conventional media outlets to cover their activities.”


On alt-tech platforms like Gab and forums like Reconquista Germanica, extremists gamify their ideologies. Memes, humour, and leaderboards are used to reward trolling and propaganda efforts. Reconquista Germanica stands out for its military-like organisation, with “generals” and “officers” coordinating hashtags and campaigns to flood social media feeds. Psychological studies cited by Ebner reveal how gamification fuels engagement, maximising participation by turning activism into a competitive sport. These platforms are also adept at hijacking opponents’ hashtags—a tactic known as “hashtag stuffing”—to redirect conversations and confuse audiences. As Ebner notes, “Their media stunts are provocative enough to be turned into viral posts and tweets… forcing conventional media outlets to cover their activities.”


Jihadist groups such as ISIS and Al-Qaeda have adapted to the digital age with alarming efficiency. They leverage platforms like Telegram and the Dark Web to recruit, raise funds, and spread their propaganda. In one particularly chilling example, Hamas developed a fake dating app to install malware on Israeli Defence Forces’ devices. These groups also embrace cryptocurrency, with some pro-ISIS groups earning enough through anonymous coins like Monero to reward their “cyber-jihadists.” Ebner highlights how jihadist strategies often mirror those of far-right groups: “Modern-day jihadists are as much a product of our digital society as they are of their own ideological battles.” Their ability to exploit societal vulnerabilities has made them some of the most sophisticated players in the extremist digital ecosystem.

The Terror Sisters, a radical feminist extremist group, show how personal struggles with anxiety and identity can become gateways into extremist networks. Members are drawn in through forums offering advice, only to find themselves bound to the group through emotional manipulation. These forums also act as a soft entry point, with users gradually exposed to more extreme ideas. However, the group’s loyalty is conditional. When a member fails to uphold ideological or practical expectations, they are swiftly excluded. Ebner reflects, “If the risk and potential damage exceed the value a member adds to the network, the verdict is usually expulsion.”


Neo-Nazi and far-right accelerationist groups believe societal collapse is necessary to achieve their ideological goals. Christchurch shooter Brenton Tarrant exemplified this strategy, hoping to spark civil war by escalating existing divisions. This idea, often referred to as “Siege-posting,” is rooted in the belief that chaos is essential to dismantle liberal democracy. Ebner describes this approach as “To spark a civil war, they believe, you need to escalate existing divisions within society and encourage others to do the same.” These groups use online spaces to glorify violence and radicalise others, spreading ideas like the “inevitable race war” and the need to accelerate societal collapse.


Conspiracy theory networks, from QAnon to anti-Semitic cabals, operate on a foundation of distrust and misinformation. Members often engage in amateur “open-source intelligence investigations,” connecting dots that don’t exist. These theories thrive because they don’t need to make sense—what matters is the emotional pull. For example, anti-abortion laws and immigration policies are conflated with notions of “white genocide,” encouraging fear and division. Ebner observes, “Conspiracy theories don’t have to follow any logic… they thrive on our subconscious preference for radical content,” warning of their power to shape perceptions and actions.


Julia Ebner’s undercover work reveals not just who these extremist groups are but also how they operate. Across all their differences, certain strategies and patterns emerge—methods designed to recruit, manipulate, and sustain loyalty in the digital age.


The technical sophistication of some extremist groups reveals how easily technology can be weaponised. Figures like Weev, a notorious hacker, champion extensive skill-building to advance their causes. In a guide for aspiring hackers, he advises mastering modern tools and older exploit archives, presenting hacking as both an art and a weapon. As Weev puts it, “Becoming a legitimate hacker is not something you will find easy to do on a whim.” Yet, the accessibility of hacking tools shows how these skills are no longer confined to seasoned professionals. In August 2018, Emmet Brewer, an eleven-year-old, hacked into a replica Florida voting site in under ten minutes during a hacking competition. Brewer was one of fifty children, aged eight to sixteen, who successfully breached imitation election systems, exposing alarming vulnerabilities in digital infrastructure. While the event was designed to highlight flaws, it also revealed how easily such techniques could be exploited for malicious purposes. Ebner warns that as extremists continue to upgrade their cyber capabilities, large-scale attacks on critical systems, from power grids to elections, become increasingly plausible.


Beyond technical prowess, extremist groups excel at manipulating cultural and digital environments. One of their most effective strategies is the use of humour and satire to disguise hateful ideologies. Far-right groups, for example, flood online spaces with memes and jokes that appear harmless but are carefully crafted to desensitise audiences. This tactic fosters a sense of belonging for insiders while alienating critics, who are dismissed as overly sensitive. As one extremist remarked, “If you don’t get it, then you’re either retarded or too woke, or both.” Such deliberate provocation draws newcomers deeper into their ideology while making their messages harder to challenge.


Another recurring tactic is the gamification of extremism. Platforms like Reconquista Germanica use leaderboards, badges, and ranking systems to motivate members. These systems turn online hate campaigns into a competitive sport, with participants earning points for spreading propaganda or trolling opponents. As Ebner points out, these techniques borrow from corporate marketing strategies designed to keep users engaged, but here they serve to radicalise and strengthen loyalty to extremist causes.

Digital echo chambers also play a key role, offering spaces where members feel validated regardless of how extreme their views become. Platforms like Telegram, 4chan, and alt-tech sites like Gab act as recruitment gateways, initially providing advice on personal struggles such as loneliness or identity crises before exposing individuals to radical content. Ebner explains, “The goal is to emotionally chain fresh recruits to the group and make it as difficult as possible for them to reach the exit door.” Once inside, these platforms isolate users from external perspectives, creating environments that reinforce dependency and ideological conformity.


Perhaps most troubling is how extremists weaponise mainstream media itself. Groups like Generation Identity stage provocative campaigns designed to force journalists to cover their actions, spreading their message far beyond their usual audiences. Ebner refers to this as “controlled provocation,” where sensational acts are orchestrated to manipulate public discourse. Campaigns such as #DefendEurope and #DailyStormerNeverDies exemplify this approach, using virality to ensure their narratives dominate headlines. Another common tactic is hijacking hashtags, where extremists flood trending topics with their propaganda to redirect conversations and amplify their reach.


Extremist movements are often riddled with contradictions that they exploit to their advantage. They reframe traditional power structures as empowering, co-opt female empowerment narratives to enforce rigid gender roles, and use global networks to push nationalist agendas. As Ebner notes, this reflects Orwellian “Double Think”: “They prepare for race wars to preserve peace, collect disinformation to find truth, and use modern tech to achieve anti-modern goals.” These paradoxes aren’t accidental—they are deliberate tools used to confuse critics, deflect scrutiny, and advance their agendas while preying on societal vulnerabilities.


The combination of technical expertise, cultural manipulation, and media-savvy tactics paints a deeply unsettling picture of how extremists thrive in today’s interconnected world. Their adaptability, combined with the exploitation of societal fractures, positions them as a pervasive and complex threat. As Ebner warns, ignoring these dynamics risks allowing extremism to embed itself further into both our digital and real-world environments.


In the final chapters of Going Dark, Julia Ebner shifts her focus from documenting the problem to exploring its implications and potential solutions. Her predictions are as chilling as her experiences, and her suggested responses call for innovation and urgency.


One of the most striking predictions comes from Canadian academic Mia Bloom, who warns of the emergence of state-led terrorism. Bloom argues that governments could adopt extremist tactics under the guise of counter-terrorism, using the same digital tools that radical groups exploit to monitor, manipulate, and control populations. This alarming possibility underscores the need for strong checks and balances to prevent state overreach in the name of security.


Ebner outlines ten predictions for the future of extremism, each more unsettling than the last. The rise of deepfake technology is particularly concerning, as AI-generated videos and images could make it nearly impossible to distinguish reality from fabrication. Extremists could use these tools to create hoax articles, manipulate footage, and spread disinformation with unprecedented sophistication. Combined with the gamification of online hate and the expansion of encrypted platforms, these technologies threaten to deepen divisions and destabilise democracies even further.


While the predictions are grim, Ebner also offers solutions. Among the most creative is the concept of Elves vs Trolls, a grassroots digital activism movement where volunteers counter extremist propaganda online. By flooding forums with positive messages, reporting harmful content, and disrupting extremist recruitment efforts, these “elves” aim to reclaim online spaces. While promising, Ebner acknowledges that these initiatives face an uphill battle against well-organised and resourceful extremist networks.


The most critical solution Ebner proposes—and the one that resonates most profoundly—is Education Against Extremism. Ebner argues that proactive, widespread media literacy programmes are essential for equipping individuals, particularly young people, with the tools to critically analyse the content they consume. Teaching critical thinking, fostering empathy, and building resilience against manipulation are crucial to dismantling the foundations of extremist recruitment. In her words, “Questions around identity, trust, and friendship in the online world must be raised if we want to break through the ‘us versus them’ thinking that all extremist movements have in common.”


Education, she insists, must go beyond the digital sphere. Tackling extremism requires a broader cultural shift that places empathy and understanding at the forefront. As Ebner concludes, no amount of regulation or technological intervention can replace the human-centred approach needed to address the root causes of hate.



Predictions for the Future of Extremism


  1. Deepfake Technology: AI-generated videos and images will make it nearly impossible to distinguish between reality and fabrication.

  2. State-Led Terrorism: Governments may adopt extremist tactics under the guise of counter-terrorism.

  3. Gamification of Hate: Extremists will further gamify their recruitment and propaganda strategies.

  4. Encrypted Platforms: Increased use of encrypted apps will allow extremists to organise without detection.

  5. Weaponised AI: AI tools will be exploited to spread disinformation and conduct sophisticated cyberattacks.

  6. Global Radicalisation Networks: Transnational extremist networks will grow stronger, bypassing national barriers.

  7. Tech-Driven Censorship Loopholes: Extremists will find innovative ways to bypass platform moderation and censorship.

  8. Polarisation via Microtargeting: Social media algorithms will amplify division through hyper-personalised content.

  9. Digital Currency Exploitation: Extremists will increasingly rely on anonymous cryptocurrencies for funding.

  10. Psychological Warfare: Extremists will refine their psychological tactics to manipulate individuals and communities.

Solutions to Combat Extremism


  1. Education Against Extremism: Teach media literacy and critical thinking to help people resist manipulation.

  2. Elves vs Trolls: Empower digital activists to disrupt extremist spaces with positive counter-messaging.

  3. Transparency from Tech Companies: Push platforms to share more about their algorithms and moderation policies.

  4. Regulation of Deepfake Technology: Introduce laws to control the misuse of AI-generated content.

  5. Support for Disenfranchised Communities: Address the social and economic roots of radicalisation.

  6. Global Collaboration: Foster international partnerships to counter transnational extremist networks.

  7. Strengthen Cybersecurity: Invest in technology to identify and counter cyber threats from extremists.

  8. Community-Led Interventions: Involve local organisations to provide support and alternatives to at-risk individuals.

  9. Cultural Empathy Campaigns: Promote messages that bridge divides and counteract “us vs them” narratives.

  10. Media Responsibility: Encourage journalists to avoid amplifying extremist propaganda through critical reporting.

 
 
 

Kommentare


bottom of page