Information Laundering and Counter-Publics: The News Sources of Islamophobic Groups on Twitter
September 18, 2023
Which news sources do supporters of populist islamophobic groups and their opponents rely on, and how are these sources related to each other? We explore these questions by studying the websites referenced in discussions surrounding Pegida, a right-wing populist movement based in Germany that is opposed to what its supporters regard as islamization, cultural marginalization ...
Continuity and Change: The Evolution and Resiliance of Al-Shabab’s Media Insurgency, 2006-2016
September 18, 2023
The Somali jihadi-insurgent movement Al-Shabab has established itself, since emerging in 2007 after the overthrow of the Islamic Courts Union (ICU) umbrella in the wake of the December 2006 Ethiopian invasion and occupation of parts of Somalia, as one of the relatively few jihadi organizations to succeed in the capture, control, and governance of territory ...
Digital Citizens: Countering Extremism Online
September 18, 2023
The last half century has witnessed a burgeoning information revolution that has transformed our societies beyond recognition. The development of sophisticated computing, the technological reorientation of vast segments of the global workforce, the invention of the internet and most recently the proliferation of social media technology has radically changed the ways we work, live, develop ...
Future Trends: Live-streaming Terrorist Attacks
September 18, 2023
Magnanville, 13 June, 2016, around 8pm: policeman, Jean-Baptiste Salvaing has been stabbed to death outside his home. Forcing his way into the house, the attacker murders Jessica Schneider, who also worked for the police, by cutting her throat. The couple’s three year-old son is taken hostage by the killer, Larossi Abballa. Prior to a three ...
Online Behaviours of Convicted Terrorists
September 18, 2023
Previous research on terrorist use of the Internet generally discusses the opportunities offered by the Internet to terrorist groups (Tsfati & Weimann, 2002; Weimann, 2006; Holt et al., 2015; Rudner, 2016). Such accounts implicitly view the interaction between the Internet and the user as uni-directional (i.e. exposure to Internet content may cause behaviour change). This ...
Autocommunicative Meaning-Making in Online Communication of the Estonian Extreme Right
September 18, 2023
This article analyses the online communication of the Estonian extreme right that appears to be characterized by an echo-chamber effect as well as enclosed and hermetic meaning-making. The discussion mainly relies on the theoretical frameworks offered by semiotics of culture. One of the aims of the article is to widen the scope of understanding of ...
“On the Internet, Nobody Knows You’re a Dog”: The Online Risk Assessment of Violent Extremists
September 18, 2023
Online behaviour can provide a unique window from which we can glean intent. From an intelligence standpoint it provides an important source of open-source information. However, making inference of intent from online activity is inherently difficult. Yet elsewhere progress is being made in incorporating information online into decisions regarding risk and offender prioritisation. This chapter ...
Connecting the (Far-)Right Dots: A Topic Modeling and Hyperlink Analysis of (Far-)Right Media Coverage during the US Elections 2016
September 18, 2023
The 2016 US election and the victory of Donald Trump are closely connected to a perceived rise of the far-right in the United States. We build upon public sphere and alternative media theory to discuss the relevance of alternative media for the US (far-)right and whether the election period and the candidate Trump allowed far-right alternative ...
Far-Right Terrorism: The Christchurch Attack and Potential Implications on the Asia Pacific Landscape
September 18, 2023
The terrorist attack in Christchurch, New Zealand is a landmark in far-right terrorist behaviour within the Asia Pacific (APAC) region. The Australian far-right terrorist held both domestic and transitional connections to other far-right extremist groups and travelled extensively before committing the attack in New Zealand. The assailant’s proficiency with weaponry and technology is considerable, as ...