Blog
Blog
Technology, Terrorism and Online Behaviour
December 9, 2015by Carl Miller In June, the SAS and heavily armed police poured onto the streets of London. Fire brigade and paramedics appeared wearing flak jackets and explosions, sirens and automatic gunfire drowned out the sounds of the early morning commute. Men with balaclavas were seen running from building to building, and into Aldwych tube station. ...
Blog
Anonymous Can’t Defeat Islamic State, but Here’s What it Could Achieve
December 2, 2015by Andres Guadamuz The announcement that hacktivist collective Anonymous has declared war on the Islamic State has been received positively by the public. After the Paris attack some may think governments are not doing enough to protect civilians, so at least it seems someone is doing something about the terrorist threat. So far the group ...
Blog
Anonymous Hackers could be Islamic State’s Online Nemesis
November 25, 2015by Athina Karatzogianni One of the key issues the West has had to face in countering Islamic State (IS) is the jihadi group’s mastery of online propaganda, seen in hundreds of thousands of messages celebrating the atrocities against civilians and spreading the message of radicalisation. It seems clear that efforts to counter IS online are missing ...
Blog
How Social Media was Key to Islamic State’s Attack on Paris
November 18, 2015by Robyn Torok While the average person was getting on with life in Paris before last Friday’s terror bombings and shootings, Twitter threads in Arabic from the Middle East were urging for attacks to be launched upon coalition forces in their home countries. “Advance, advance – forward, forward” they said, regarding Paris. Iraqi forces had ...
Blog
Wilayat Twitter and the Battle against Islamic State’s Twitter Jihad
November 11, 2015by Elizabeth Pearson In the past two years, the so-called Islamic State (IS) has made Twitter its own, many of its supporters even describing the social media forum as an IS ‘wilayat’ or ‘province’. As academics and policy-makers alike become increasingly aware of the role of the online environment in radicalisation, the use of Twitter ...
Blog
Step-by-Step Online CVE
November 4, 2015by J.M Berger The world continues to deal with the offline consequences of how ISIS works online, hunting among the fringes of society for those rare individuals who can be convinced to act on its behalf. Its success comes in part from volume – social media makes it possible to sift efficiently through more potential ...
Blog
Media and Social Responsibility at a Time of Radicalisation
October 28, 2015by Helen Vatsikopoulos At the ongoing coronial inquest into the deaths arising from last year’s Lindt café siege in Sydney, experts cannot agree whether Man Haron Monis was a radicalised terrorist or a mentally unstable lone wolf who used radical Islam as a “crutch”. Throughout the inquest, prosecutors, solicitors and detectives are being grilled about ...
Blog
What Nazi Propaganda Can Teach Us about ISIS
October 21, 2015by Steven Luckert In 1924, Adolf Hitler described propaganda as “a terrible weapon in the hands of an expert.” For two decades, the Nazis showed the world what a devastating weapon it could be. They won over millions of Germans to their extremist goals in a democracy by branding their movement with powerful symbols and ...
Blog
Is Snapchat a Threat to National Security?
October 14, 2015by Andrew Murray Last week reports emerged in the media that the proposed Investigatory Powers Bill may lead to the banning of popular communications apps Snapchat, WhatsApp and Facebook Messenger. This was in many ways not news as the same reports had appeared in January but with the Home Secretary announcing that the Bill would be published in the ...
Blog
Is the Internet an Incubator for Radicalisation?
October 7, 2015By Irene McGinn and Adam Joinson This blog post explores the reasons why some online ideological groups take action while others do not and focuses on to what extent the online communications of ideological groups contribute to direct collective action. In order to address this question, we examined a number of online groups using a variety of ...