The Key Lessons Learned from the Use of the Internet by Jihadist Groups
September 18, 2023
This work analyzes some of the key lessons learned from the use of the Internet by jihadist groups over the last twenty years: 1) Online activism can be a substitute for commitment to armed jihad. 3) Terrorists are “early adopters” of new technologies, to enjoy spaces of impunity. 4) The investigation of terrorist activities on ...
Mapping Extremist Communities: A Social Network Analysis Approach
September 18, 2023
In the domain of computer science, the last years have witnessed the improvement of social network analysis at scale. One of the most challenging aspects of social network analysis is community detection; analysts use a variety of tools to visualise the spontaneous group structure emerging from interactions and friendship relations in multi-million-user networks. This visualisation, ...
Shooting the Messenger: Do Not Blame the Internet for Terrorism
September 18, 2023
The internet clearly matters to terrorists, but online content by itself rarely causes people to carry out terrorist attacks. Responses should therefore not be limited to the mass removal of terrorist content from online platforms. ...
Avoid the Pitfalls of Counter-Narratives
September 18, 2023
Counter-narratives and campaigns promoting normality, are often highlighted as universal means against online propaganda from militant movements. However, such campaigns are driven by a number of unfortunate assumptions and are difficult to apply in practice. ...
Extremism on the Internet; The Fight Against Online Radicalisation Starts Offline
September 18, 2023
Counter-narratives are often claimed to be the ingenuous solution for the prevention of extremism and radicalisation. They are intended to dismantle extremism’s propaganda or create positive alternatives to its communities. But the effect is dubious and may, at worst, lead to the opposite result. Therefore, education and critical thinking are the best form of prevention. ...
Wie Cyberterrorismus stattfindet – und warum wir ihn nicht sehen
September 18, 2023
Verschwörungstheorien von im Untergrund herrschenden „Echsenmenschen“ oder einer „flachen Erde“ mögen in den Augen eines aufgeklärten Menschen abwegig und bizarr erscheinen, doch tatsächlich erfahren diese Narrative dank dem Internet erhöhte Beachtung. Schon lange sind Ufos, die „false-flag-Anschläge“ von 9/11 und die gefälschte Mondlandung Teil eines virtuellen Erklärungsangebots an Menschen, die grundsätzliches Misstrauen gegenüber traditionellen Medien ...
The Charlie Hebdo Attacks on Twitter: A Comparative Analysis of a Political Controversy in English and French
September 18, 2023
In this article, we propose an original method combining large-scale network and lexicometric analysis to link identifiable communities of Twitter users with the main discursive themes they used in the aftermath of the Charlie Hebdo attacks in Paris, France in 2015. We used this method to compare tweets and user networks in French and in ...
Data-Driven System Identification of the Social Network Dynamics in Online Postings of an Extremist Group
September 18, 2023
Terrorism research has begun to focus on the issue of radicalization, or the acceptance of ideological belief systems that lead toward violence. There has been particular attention paid to the role of the Internet in the exposure to and promotion of radical ideas. There is, however, minimal work that attempts to model the ways that ...
The Virtual Caliphate: ISIS’s Information Warfare
September 18, 2023
ISIS will likely maintain the capacity to align its military and information operations (IO) in the coming years. Continuing conflicts and the plodding effort to address the underlying conditions where it has taken root will likely help ISIS retain physical sanctuary and command and control capability in Iraq, Syria, and North Africa, even if it ...