Post Type Description
Hearing: Countering the Virtual Caliphate: The State Department’s Performance
September 18, 2023The United States is losing the information war to terrorists like ISIS and Hezbollah. Earlier this year, the administration rebranded the office responsible for counter messaging, but little seems to have changed. A strong, effective information offensive to counter the violent ideology being pushed by ISIS and other terrorists is long overdue. This hearing will ...
Ten “Rs” of Social Reaction: Using Social Media to Analyse the “Post-Event” Impacts of the Murder of Lee Rigby
September 18, 2023This article provides a case study analysis of social reactions to the murder of Fusilier Lee Rigby in 2013. Informed by empirical data collected by systematic monitoring of social media platforms, the analysis identifies a number of online behaviours with offline effects—labeled the ten “Rs”—that collectively constitute the process of social reaction to the crime. ...
How the U.S. is Countering the Islamic Extremist Propaganda Machine
September 18, 2023President Obama reiterated his promise to destroy the virulent Islamic State Tuesday while talking about the Orlando mass shooting — and how gunman Omar Mateen, a U.S. citizen, may have been radicalized by online extremist propaganda. NewsHour producer P.J. Tobia reports on U.S. efforts to win the hearts and minds that the terrorists are trying ...
Isis and the Internet
September 18, 2023Documentary: Isis and The Internet premieres Friday April 1st at 10pm ET on MSNBC. ...
Utilization of Cyberspace by Terrorist Groups and the Applicability of the Malaysian Law on Terrorism
September 18, 2023It is an obvious and undeniable fact, that the cyberspace is become a powerful method which is increasingly and quickly utilized by terrorist organizations to achieve their gruesome and nefarious goals by hitting innocent individuals. This paper has conducted a critical and comprehensive study on the literature review aiming to answer several inquiries about utilization ...
Us and them: identifying cyber hate on Twitter across multiple protected characteristics
September 18, 2023Hateful and antagonistic content published and propagated via the World Wide Web has the potential to cause harm and suffering on an individual basis, and lead to social tension and disorder beyond cyber space. Despite new legislation aimed at prosecuting those who misuse new forms of communication to post threatening, harassing, or grossly offensive language ...
Cyberhate on Social Media in the aftermath of Woolwich: A Case Study in Computational Criminology and Big Data
September 18, 2023This paper presents the first criminological analysis of an online social reaction to a crime event of national significance, in particular the detection and propagation of cyberhate on social media following a terrorist attack. We take the Woolwich, London terrorist attack in 2013 as our event of interest and draw on Cohen’s process of warning, ...
Terrorist Migration to the Dark Web
September 18, 2023The terms Deep Web, Deep Net, Invisible Web, or Dark Web refer to the content on the World Wide Web that is not indexed by standard search engines. The deepest layers of the Deep Web, a segment known as the Dark Web, contain content that has been intentionally concealed including illegal and anti-social information. The ...
Cheering on the Jihad: An Exploration of Women’s Participation in Online Pro-jihadist Networks
September 18, 2023With the rise of the Islamic State (IS), a great deal of attention has recently been drawn to two issues that have come to be seen as intricately linked: the role of women within pro-jihadist networks (Lahoud 2014; Hoyle, Bradford and Frenett 2015; Saltman and Smith 2015) and the use of social media as an ...