Register for our upcoming webinar with the Maltego CEO and CTO! How Maltego Empowers Law Enforcement Across Everchanging OSINT Landscape with Strategic Acquisitions of PublicSonar and Social Network Harvester on Tuesday, April 30, 2024 at 15:00 CET. Register now! close
17 Jan 2024

Investigating the Threatscape of Incel Community

Carlos Fragoso

In the evolving landscape of modern societies grappling with climate change, terrorism, and cyberattacks, the most significant challenge we face is adapting to a rapidly growing information ecosystem, largely driven by the internet and social media networks.

Especially in the digital information sphere, the message can be easily amplified or modulated, leading to a dangerous influence that may manipulate simple opinions into facts. Disinformation and misinformation have become increasingly significant issues, causing greater polarization in our democracies and fueling the radicalization of individuals.

Who benefits from this chaotic landscape? Extremist groups seem to be seizing the chance, exploiting the widespread misinformation to radicalize individuals with ideologies. With its vast and intricate network, the internet is not only a medium for communication but a breeding ground for radical ideologies.

In this whitepaper, we will map out the digital footprint, comprehensive networks, strategies, and operational methods of one of these extremist groups called “Involuntary celibates (Incels)” who believe they are entitled to a relationship with a woman, but they are incapable of finding a partner. Multiple acts of extreme violence and even murder have been attributed to this group.

To gain a better understanding of incels, there are two highly recommended resources to explore:

Before we explore this group, let’s first understand the discipline of threat assessment.

What is Threat Assessment? 🔗︎

Threat assessment is the practice of determining the credibility and seriousness of a potential threat, such as the one posed by extremist groups, as well as the likelihood of these threats becoming reality. According to J. Reid Meloy, Ph.D., the discipline…

…aims to interrupt people on a pathway to commit predatory or instrumental violence, the type of behaviour associated with targeted attacks”

J.Reid Meloy, Ph.D., co-editor of International Handbook of Threat Assessment (2013)

Threat assessment comprises the following key components:

  • Identification: Identifying threats to commit a potentially unfavorable act
  • Assessment: Determining the seriousness of the threat
  • Management: Developing intervention plans to address the underlying issue
  • Follow-up: Continuous assessment and Safety Planning

Investigate Involuntary Celibates (Incels) 🔗︎

In this whitepaper, we provide a detailed exploration of the world of incels, offering insights into how to assess the threat landscape and identify their networks, infrastructure, and operational methods using Maltego.

For the demo, we used Maltego Data Pass: Person of Interest along with several Transforms to investigate the community’s dynamics:

Disclaimer: The information gathered in this investigation may vary from current online findings, given that online threats and related information are subject to change.

Understanding and dismantling these networks is a critical step in protecting vulnerable individuals from radicalization and preventing acts of violence and hate inspired by such radical groups. This information is invaluable, especially for law enforcement agencies, governmental bodies, and other organizations, such as anti-hate NGOs in developing targeted strategies to counteract and prevent the incidents.

Download this whitepaper about counteracting radicalization and the spread of extremist groups and learn how to conduct your own threat assessment now!

Download the resource

DE +49
Albania +355
Algeria +213
Andorra +376
Angola +244
Anguilla +1264
Antigua And Barbuda +1268
Argentina +54
Armenia +374
Aruba +297
Australia +61
Austria +43
Azerbaijan +994
Bahamas +1242
Bahrain +973
Bangladesh +880
Barbados +1246
Belarus +375
Belgium +32
Belize +501
Benin +229
Bermuda +1441
Bhutan +975
Bolivia +591
Bosnia and Herzegovina +387
Botswana +267
Brazil +55
Brunei Darussalam +673
Bulgaria +359
Burkina Faso +226
Burundi +257
Cambodia +855
Cameroon +237
Canada +1
Cape Verde +238
Cayman Islands +1345
Central African Republic +236
Chile +56
China +86
Cote d'Ivoire +225
Colombia +57
Comoros +269
Congo +242
Cook Islands +682
Costa Rica +506
Croatia +385
Cuba +53
Cyprus +90392
Czech Republic +42
Denmark +45
Djibouti +253
Dominica +1809
Dominican Republic +1809
Ecuador +593
Egypt +20
El Salvador +503
Equatorial Guinea +240
Eritrea +291
Estonia +372
Ethiopia +251
Falkland Islands (Malvinas) +500
Faroe Islands +298
Fiji +679
Finland +358
France +33
French Guiana +594
French Polynesia +689
Gabon +241
Gambia +220
Georgia +7880
Germany +49
Ghana +233
Gibraltar +350
Greece +30
Greenland +299
Grenada +1473
Guadeloupe +590
Guam +671
Guatemala +502
Guinea +224
Guinea-Bissau +245
Guyana +592
Haiti +509
Honduras +504
Hong Kong +852
Hungary +36
Iceland +354
India +91
Indonesia +62
Iran, Islamic Republic of +98
Iraq +964
Ireland +353
Israel +972
Italy +39
Jamaica +1876
Japan +81
Jordan +962
Kazakhstan +7
Kenya +254
Kiribati +686
Korea, Democratic People's Republic of +850
Korea, Republic of +82
Kuwait +965
Kyrgyzstan +996
Lao People's Democratic Republic +856
Latvia +371
Lebanon +961
Lesotho +266
Liberia +231
Libyan Arab Jamahiriya +218
Liechtenstein +417
Lithuania +370
Luxembourg +352
Macao +853
Macedonia, the former Yugoslav Republic of +389
Madagascar +261
Malawi +265
Malaysia +60
Maldives +960
Mali +223
Malta +356
Marshall Islands +692
Martinique +596
Mauritania +222
Mauritius +230
Mayotte +269
Mexico +52
Micronesia, Federated States of +691
Moldova, Republic of +373
Monaco +377
Mongolia +976
Montserrat +1664
Morocco +212
Mozambique +258
Myanmar +95
Namibia +264
Nauru +674
Nepal +977
Netherlands +31
New Caledonia +687
New Zealand +64
Nicaragua +505
Niger +227
Nigeria +234
Niue +683
Norfolk Island +672
Northern Mariana Islands +670
Norway +47
Oman +968
Pakistan +92
Palau +680
Panama +507
Papua New Guinea +675
Paraguay +595
Peru +51
Philippines +63
Poland +48
Portugal +351
Puerto Rico +1787
Qatar +974
Reunion +262
Romania +40
Russian Federation +7
Rwanda +250
San Marino +378
Sao Tome and Principe +239
Saudi Arabia +966
Senegal +221
Serbia +381
Seychelles +248
Sierra Leone +232
Singapore +65
Slovakia +421
Slovenia +386
Solomon Islands +677
Somalia +252
South Africa +27
Spain +34
Sri Lanka +94
Saint Helena +290
Saint Kitts and Nevis +1869
Saint Lucia +1758
Sudan +249
Suriname +597
Swaziland +268
Sweden +46
Switzerland +41
Syrian Arab Republic +963
Taiwan +886
Tajikistan +7
Thailand +66
Togo +228
Tonga +676
Trinidad and Tobago +1868
Tunisia +216
Turkey +90
Turkmenistan +993
Turks and Caicos Islands +1649
Tuvalu +688
Uganda +256
United Kingdom +44
Ukraine +380
United Arab Emirates +971
Uruguay +598
United States +1
Uzbekistan +7
Vanuatu +678
Holy See (Vatican City State) +379
Venezuela +58
Viet Nam +84
Virgin Islands, British +84
Virgin Islands, U.S. +84
Wallis and Futuna +681
Yemen +967
Zambia +260
Zimbabwe +263

By clicking on "Access", you agree to the processing of the data you entered and you allow us to contact you for the purpose selected in the form. For further information, see our Data Privacy Policy.

Don’t forget to follow us on Twitter, LinkedIn, and Mastodon or subscribe to our email newsletter for more whitepapers, case studies, and investigation tips like this!

Happy investigating!

About the Author 🔗︎

Carlos Fragoso

Carlos is the Principal Subject Matter Expert and Lead Instructor at Maltego with over 20 years of professional experience in information security: Incident response, digital forensics, threat intelligence, and threat hunting. A curious and passionate investigator working with big companies and LEAs to tackle cybercrime around the world (Europe, Middle East, LATAM) SANS Institute Instructor.

By clicking on "Subscribe", you agree to the processing of the data you entered and you allow us to contact you for the purpose selected in the form. For further information, see our Data Privacy Policy.