Blog
How ISIS’s Language Changed Over Time: More Concern with Females and More “Net-speak”
April 13, 2016
By Matteo Vergani We (myself and Ana-Maria Bliuc) just published a brief research-paper in the Italian magazine “Security, Terrorism and Society“. We used the computerized text analysis program LIWC (Linguistic Inquiry and Word Count) to investigate the evolution of the language across the first 11 Issues of Dabiq. Our paper shows ISIS’ increasing concern with ...
Blog
Could Encryption ‘Backdoors’ Safeguard Privacy and Fight Terror Online?
April 6, 2016
By Prof. Keith Martin Since so much of life has moved online, a clash has emerged between the opposing values of internet freedom, and internet control. Should the internet be a public arena free of all interference and influence from the authorities? Or does too much freedom result in anarchy, turning the internet into a ...
Blog
On Social Media, ISIS Uses Modern Cultural Images to Spread Anti-Modern Values
March 30, 2016
By Javier Lesaca The so-called Islamic State (ISIS) has emerged in less than two years as one of the major security challenges for the global community. At the same time, this terrorist group has become one of the most important phenomena in digital public communication since the beginning of the century. In fact, the analysis of ...
Blog
Terrorists’ Use of Messaging Applications
March 23, 2016
By Matthew Francis and Emma Barrett Terrorists and criminals, like the rest of us, need to communicate and, like the rest of us, they look out for ways of communicating that meet their particular needs. Some features of messaging applications may make them more attractive than others to terrorists when co-ordinating and planning their activities or ...
Blog
Does the Media Say Too Much When Reporting on Terrorism?
March 16, 2016
By Javier Delgado Rivera News coverage of investigations into terrorist attacks raise concerns about whether the media goes too far in reporting police findings that may be of some help to bloodthirsty fundamentalists. Before committing their heinous acts, terrorist-minded individuals will be sure to wipe out all the information on their cell phones after learning ...
Blog
Assessing the Ethics and Politics of Policing the Internet for Extremist Material
March 9, 2016
The Oxford Internet Institute’s Ian Brown and MIT’s Josh Cowls co-authored the VOX-Pol report entitled Check the Web: Assessing the Ethics and Politics of Policing the Internet for Extremist Material, which explores the complexities of policing the web for extremist material, and looks into its implications for security, privacy, and human rights. Below, Josh Cowls discusses the report with Bertie ...
Blog
How ISIS Supporters Filter Extremism Through Instagram
March 2, 2016
By Aabid Shafi ISIS’ social media capabilities are well known. The effectiveness with which the group makes use of social media to recruit new fighters and spread its propaganda has set off an alarm among security agencies around the globe. It has even led to former US Secretary of State Hillary Clinton terming ISIS the “most ...
Blog
Pressuring Platforms to Censor Content is Wrong Approach to Combatting Terrorism
February 24, 2016
By Scott Craig and Emma Llansó The UK government has published a new counter-extremism strategy outlining the steps it intends to take to counter extremist ideologies in British society. In an expansion of earlier efforts designed to prevent people being “drawn into terrorism,” the government now intends to actively challenge non-violent extremism both online and ...
Blog
What Analysis of the Islamic State’s Messaging Keeps Missing
February 17, 2016
by Haroro Ingram Countering Islamic State “strategic communications” is one of the most pressing national security concerns facing Western governments. Developing more nuanced understanding of the organization’s communications strategy will be crucial to devising effective counter-narrative strategies. Yet popular commentary tends to explain the appeal of Islamic State messaging by pointing to its graphic violence, use ...
Blog
Challenges of Using Twitter as a Data Source: An Overview of Current Resources
February 10, 2016
by Wasim Ahmed In one of my previous blog posts I outlined a number of software applications that could be used to capture and analyse data from Twitter. In this blog post I outline some of the methodological, ethical, privacy, and copyright issues associated with using Twitter as a data source. Twitter can be used as a ...