Post Type Description
Halting Boko Haram / Islamic State’s West Africa Province Propaganda In Cyberspace With Cybersecurity Technologies
September 18, 2023Terrorists use cyberspace and social media technology to create fear and spread violent ideologies, which pose a significant threat to public security. Researchers have documented the importance of the application of law and regulation in dealing with the criminal activities in cyberspace. Using routine activity theory, this article assessed the effectiveness of technological approaches to ...
CLC – Cyberterrorism Life Cycle Model
September 18, 2023The rise of technology has brought with it many benefits but also the potential for great dangers. In particular, Information Communication Technology (ICT) is involved in many facets of life-influencing systems, which range from power plants to airports. Terrorists are now realising the great possibilities of interfering with critical infrastructure. Remote access, reduced costs, automation, ...
Shifts in the Visual Media Campaigns of AQAP and ISIS After High Death and High Publicity Attacks
September 18, 2023Extreme militant groups use their media campaigns to share information, recruit and radicalize followers, share worldviews, and seek public diplomacy ends. While previous research documents that various on-the-ground events correspond to changes in the groups’ messaging strategies, studies of how competing militant groups influence one another’s media campaigns are nascent. This study helps fill that ...
Techniques for analyzing digital environments from a security perspective
September 18, 2023The development of the Internet and social media has exploded in the last couple of years. Digital environments such as social media and discussion forums provide an effective method of communication and are used by various groups in our societies. For example, violent extremist groups use social media platforms for recruiting, training, and communicating with ...
Feature extraction and selection for automatic hate speech detection on Twitter
September 18, 2023In recent decades, information technology went through an explosive evolution, revolutionizing the way communication takes place, on the one hand enabling the rapid, easy and almost costless digital interaction, but, on the other, easing the adoption of more aggressive communication styles. It is crucial to regulate and attenuate these behaviors, especially in the digital context, ...
On the Origins of Memes by Means of Fringe Web Communities
September 18, 2023Internet memes are increasingly used to sway and manipulate public opinion. This prompts the need to study their propagation, evolution, and influence across the Web. In this paper, we detect and measure the propagation of memes across multiple Web communities, using a processing pipeline based on perceptual hashing and clustering techniques, and a dataset of ...
Artificial or Human: A New Era of Counterterrorism Intelligence?
September 18, 2023A new revolution has begun in counterterrorism—the Artificial Intelligence (AI) revolution. The AI revolution has had a significant impact on many areas of security and intelligence. The use of AI and big data in general, and in the field of intelligence and counterterrorism in particular, has led to intense debates between supporters of the continuation ...
Towards the “olive trees of Rome”: exploitation of propaganda devices in the Islamic State’s flagship magazine “Rumiyah”
September 18, 2023This paper aims to contribute to understanding how the last flagship magazine of the Islamic State – “Rumiyah” – attempted to influence and manipulate Internet users. Its primary objective is to analyze the propaganda methods exploited in all thirteen issues of this magazine. In order to do so this paper utilises content analysis to investigate ...
Platform Surveillance
September 18, 2023This special responsive issue on “Platform Surveillance” critically assesses the surveillance dimensions and politics of large-scale digital platforms. The issue includes an editorial introduction to the topic and its implications, dozens of articles on specific platforms or platform trends, three book reviews of Shoshana Zuboff’s The Age of Surveillance Capitalism, and an interview with Zuboff ...
Communications Technology and Terrorism
September 18, 2023By facilitating the flow of information in society, communications technology (CT; e.g., newspapers, radio, television, the Internet) can help terrorists to (i) spread their message, (ii) recruit followers, and (iii) coordinate among group members. However, CT also facilitates monitoring and arresting terrorists. This article formulates the hypothesis that a society’s level of CT is systematically ...