#jihad: Understanding Social Media as a Weapon
September 18, 2023
This article will argue that social media in the hands of terrorist groups constitutes a weapon, and has become increasingly capable of contributing to the facilitation of consequential harm against identified targets. In doing so it will first clarify the communicative nature of terrorist action and provide an overview of the various contributions made by ...
IS and the Jihadist Information Highway – Projecting Influence and Religious Identity via Telegram
September 18, 2023
Groups such as al-Qaida (AQ) have pursued spectacular attacks to garner media attention and popularize their cause. What is often not noted, however, is that for those who submit themselves to the religious thinking of al-Qaida – and nowadays the self-designated “Islamic State” (IS) – the militant struggle is intertwined with the duty to call ...
The Importance of Web 2.0 for Jihad 3.0: Female Jihadists Coming to Grips with Religious Violence on Facebook
September 18, 2023
The Jihadist phenomenon has a privileged space in Web 2.0 where contents can be created, networks can be global and all exchanges of information have significance. The emergent Jihadist organizations have been profiting from these digital communication features to enlarge, diversify and connect with their audience. On the one side, the virtual framing of Jihad ...
Religious Appeals in Daesh’s Recruitment Propaganda
September 18, 2023
The self-proclaimed Islamic State of Iraq and Syria (Daesh) employs a complex online media strategy to recruit targeted demographics. Its success has exacerbated conflicts in Syria, Iraq, Libya, and elsewhere, and has become a concern for the international community. The Carter Center (the Center) is working to counter Daesh’s recruitment propaganda efforts by undertaking in-depth ...
Private Sector Engagement in Responding to the Use of the Internet and ICT for Terrorist Purposes
September 18, 2023
On the one hand, the companies in question feel a business incentive to create a digital environment where their users feel safe, and are increasingly compelled by governments to cooperate in blocking, filtering, countering or removing content or accounts on the grounds of public safety or national security concerns. In addition, users expect the companies ...
Information Laundering and Counter-Publics: The News Sources of Islamophobic Groups on Twitter
September 18, 2023
Which news sources do supporters of populist islamophobic groups and their opponents rely on, and how are these sources related to each other? We explore these questions by studying the websites referenced in discussions surrounding Pegida, a right-wing populist movement based in Germany that is opposed to what its supporters regard as islamization, cultural marginalization ...
Continuity and Change: The Evolution and Resiliance of Al-Shabab’s Media Insurgency, 2006-2016
September 18, 2023
The Somali jihadi-insurgent movement Al-Shabab has established itself, since emerging in 2007 after the overthrow of the Islamic Courts Union (ICU) umbrella in the wake of the December 2006 Ethiopian invasion and occupation of parts of Somalia, as one of the relatively few jihadi organizations to succeed in the capture, control, and governance of territory ...
Digital Citizens: Countering Extremism Online
September 18, 2023
The last half century has witnessed a burgeoning information revolution that has transformed our societies beyond recognition. The development of sophisticated computing, the technological reorientation of vast segments of the global workforce, the invention of the internet and most recently the proliferation of social media technology has radically changed the ways we work, live, develop ...
Future Trends: Live-streaming Terrorist Attacks
September 18, 2023
Magnanville, 13 June, 2016, around 8pm: policeman, Jean-Baptiste Salvaing has been stabbed to death outside his home. Forcing his way into the house, the attacker murders Jessica Schneider, who also worked for the police, by cutting her throat. The couple’s three year-old son is taken hostage by the killer, Larossi Abballa. Prior to a three ...
Online Behaviours of Convicted Terrorists
September 18, 2023
Previous research on terrorist use of the Internet generally discusses the opportunities offered by the Internet to terrorist groups (Tsfati & Weimann, 2002; Weimann, 2006; Holt et al., 2015; Rudner, 2016). Such accounts implicitly view the interaction between the Internet and the user as uni-directional (i.e. exposure to Internet content may cause behaviour change). This ...