Post Type Description
Terrorists’ Use of the Internet
September 18, 2023Terrorist use of the Internet has become a focus of media, policy, and scholarly attention in recent years. Terrorists use the Internet in a variety of ways, the most important being for propaganda purposes and operations-related content, but it is also potentially a means or target of attack. This book presents revised versions of a ...
Online Jihadi Instructional Content: The Role of Magazines
September 18, 2023This chapter focuses on the instructional content, both text and images, published in 26 issues of three jihadi magazines: Al-Qaeda in the Arabian Peninsula’s Inspire, Inspire’s forerunner Jihad Recollections, and Somali Al-Shabab’s Gaidi M’taani. Instruction was found to be a core component of Inspire as distinct from the varying types and levels of instruction appearing ...
Mounting a Facebook Brand Awareness and Safety Ad Campaign to Break the ISIS Brand in Iraq
September 18, 2023This article reports on the International Center for Study of Violent Extremism (ICSVE’s) most recent Facebook ad campaign aimed at raising awareness about the realities of living under ISIS and protecting vulnerable potential recruits from considering joining. During the course of 24 days in December of 2017, ICSVE researchers mounted the campaign on Facebook using ...
Jihadi Beheading Videos and their Non-Jihadi Echoes
September 18, 2023In recent years, the Islamic State terror organization has become notorious for its evil brutality. The brutal nature of its propaganda (distributed mostly online) inspires Jihadi sympathizers around the world, encouraging them to use violence against “the enemies of Islam”. This form of violent behavior has also been adopted and imitated by others – including ...
The Role of Police Online in PVE and CVE
September 18, 2023This paper is written for police wanting an overview of their online PCVE options, and is based on the RAN POL meeting on ‘The role of police online’ that took place on 1-2 March in Oslo. ...
NYPD vs. Revolution Muslim: Te Inside Story of the Defeat of a Local Radicalization Hub
September 18, 2023Between 2006 and 2012, two men working on opposite sides of the struggle between global jihadis and the United States faced of in New York City. One was the founder of Revolution Muslim, a group which proselytized—online and on New York streets—on behalf of al-Qa`ida. The other led eforts to track the terrorist threat facing ...
The British Hacker Who Became the Islamic State’s Chief Terror CyberCoach: A Profile of Junaid Hussain
September 18, 2023Until his death in a U.S. drone strike in August 2015, Junaid Hussain was the Islamic State’s most prolific Englishlanguage social media propagandist, working to incite and guide sympathizers in the United Kingdom, United States, and beyond to launch terrorist attacks. Before joining the jihad in Syria, Hussain was part of a hacking collective in ...
Spiders of the Caliphate: Mapping the Islamic State’s Global Support Network on Facebook
September 18, 2023This report analyzes the strength of the Islamic State’s (IS) network on Facebook using online network measurement tools and uncovers the myriad of ways in which IS operates on Facebook. To do so, we mapped the accounts and connections between 1,000 IS-supporting Facebook profiles with links to 96 countries on every continent except Antarctica using ...
Online Networks of Racial Hate: A Systematic Review of 10 Years of Research on Cyber-Racism
September 18, 2023The ways in which the Internet can facilitate the expression and spread of racist views and ideologies have been the subject of a growing body of research across disciplines. To date, however, there has been no systematic reviews of this research. To synthesise current knowledge on the topic and identify directions for future research, we ...
Internet Censorship in the United Kingdom: National Schemes and European Norms
September 18, 2023The United Kingdom (UK) has been at the vanguard of online censorship in democracies from the beginning of the modern internet. Since the mid-1990s the government has developed distinctive patterns of regulation – targeting intermediaries, using the bully pulpit to promote ‘voluntary’ self-regulation, and promoting automated censorship tools such as web blocking – which have ...