Blog
Responsible Communication by Internet Intermediaries
September 14, 2016
By Marcelo Thompson In debates concerning Internet intermediary liability, an often-expressed view is that intermediaries (such as Facebook and Google) shouldn’t be turned into adjudicators, who reason and decide about the legal or illegal nature of content they host, and thus about whether or not to take such content down. But is that a plausible view? ...
Blog
Computational Social Science: Understanding Terrorist Attacks on Twitter
September 7, 2016
By Erin C. McGrath and Cody Buntain Reported terrorist attacks increased dramatically over the last decade or so, from just under 3,000 per year in 2001 to nearly 17,000 in 2014, amplifying the number of people subjected to the effects of terrorist attacks nearly six-fold over the last decade. At the same time, the introduction, popularity, ...
Blog
EXTREMISMO VIRAL – When did Islamic State’s (IS) Online Media Strategy Begin to Take Shape?
July 27, 2016
At the end of April, VOX-Pol’s Coordinator, Prof. Maura Conway, exchanged a series of emails with Brazilian magazine Imprensa’s Gabriela Ferigato for a feature piece she was writing on the so-called ‘Islamic State’s’ online activity. The feature appeared recently and is available to read HERE for Portuguese speakers. A lightly edited version of the original ...
Blog
Dataset Spotlight: How ISIS Uses Twitter- Interview with Khuram Zaman
July 20, 2016
by Megan Risdal Many of us know that data collection, cleaning, and processing is a time-consuming and sometimes arduous ordeal that requires patience along with elbow grease. It’s usually the end product—insights from an analysis to feed action—that motivates us to munge. In this interview, Khuram Zaman of Fifth Tribe, explains how a desire to ...
Blog
How Technology Could Help Predict Terrorist Attacks
July 13, 2016
by Sheryl Prentice The internet has become a weapon for terrorists, who use social media and other technologies to organise, recruit and spread propaganda. So is it possible to turn technology around and use it to not only catch terrorists but predict and potentially stop terror attacks before they happen? One thing we can do ...
Blog
EU Commission Under Investigation for EU Internet Forum Documents
July 6, 2016
By Kirsten Fiedler In the past year, EDRi made numerous formal requests to get more information about the EU Internet Forum. This Forum was set up by the EU Commission to persuade companies to do “more” to fight terrorism. After months of obstruction from the European Commission, EDRi made a maladministration complaint to the European Ombudsman. ...
Blog
Interview with ISIS-chan – The Cute Anime Character Fighting ISIS Propaganda
June 22, 2016
By Moign Khawaja and Sara Dissanayake The Islamic State, previously calling itself the Islamic State of Iraq and the Levant (ISIL) or the Islamic State of Iraq and Syria (ISIS) is a Sunni jihadist group active in Iraq and Syria. The group has been labeled a terrorist organisation by the UN for committing gross human ...
Blog
Here’s How Radical Groups Like Islamic State Use Social Media to Attract Recruits
June 15, 2016
By Sandy Schumann Following the deaths of several African American men at the hands of police last year, the Twitter hashtag #blacklivesmatter enabled people from around the world to discuss race relations in the US. What is less well-known is that this hashtag – among others – was also used by supporters of Islamic State, who aimed to appeal ...
Blog
European Commission Online Platform Proposals Puts Onus on Companies
June 8, 2016
By Jens-Henrik Jeppesen On 25 May, the European Commission published a set of proposals and documents under the umbrella of its Digital Single Market strategy. Among them is a Communication on ‘Online Platforms and the Digital Single Market Opportunities and Challenges for Europe’. This sets out the Commission’s conclusions and proposed actions based on its Platforms Consultation, which ...
Blog
Information Warfare: Weaponizing Facebook And Twitter
June 1, 2016
U.S. SOCOM (Special Operations Command) has increasingly depended on commercial technology to gain an edge in battle. This has paid off as Islamic terrorists have moved some of the combat to the Internet, which they use for recruiting, fund raising, training and carrying out attacks or for defense. SOCOM is now turning to commercial Internet ...