Wie Cyberterrorismus stattfindet – und warum wir ihn nicht sehen
September 18, 2023
Verschwörungstheorien von im Untergrund herrschenden „Echsenmenschen“ oder einer „flachen Erde“ mögen in den Augen eines aufgeklärten Menschen abwegig und bizarr erscheinen, doch tatsächlich erfahren diese Narrative dank dem Internet erhöhte Beachtung. Schon lange sind Ufos, die „false-flag-Anschläge“ von 9/11 und die gefälschte Mondlandung Teil eines virtuellen Erklärungsangebots an Menschen, die grundsätzliches Misstrauen gegenüber traditionellen Medien ...
The Charlie Hebdo Attacks on Twitter: A Comparative Analysis of a Political Controversy in English and French
September 18, 2023
In this article, we propose an original method combining large-scale network and lexicometric analysis to link identifiable communities of Twitter users with the main discursive themes they used in the aftermath of the Charlie Hebdo attacks in Paris, France in 2015. We used this method to compare tweets and user networks in French and in ...
Data-Driven System Identification of the Social Network Dynamics in Online Postings of an Extremist Group
September 18, 2023
Terrorism research has begun to focus on the issue of radicalization, or the acceptance of ideological belief systems that lead toward violence. There has been particular attention paid to the role of the Internet in the exposure to and promotion of radical ideas. There is, however, minimal work that attempts to model the ways that ...
The Virtual Caliphate: ISIS’s Information Warfare
September 18, 2023
ISIS will likely maintain the capacity to align its military and information operations (IO) in the coming years. Continuing conflicts and the plodding effort to address the underlying conditions where it has taken root will likely help ISIS retain physical sanctuary and command and control capability in Iraq, Syria, and North Africa, even if it ...
#jihad: Understanding Social Media as a Weapon
September 18, 2023
This article will argue that social media in the hands of terrorist groups constitutes a weapon, and has become increasingly capable of contributing to the facilitation of consequential harm against identified targets. In doing so it will first clarify the communicative nature of terrorist action and provide an overview of the various contributions made by ...
IS and the Jihadist Information Highway – Projecting Influence and Religious Identity via Telegram
September 18, 2023
Groups such as al-Qaida (AQ) have pursued spectacular attacks to garner media attention and popularize their cause. What is often not noted, however, is that for those who submit themselves to the religious thinking of al-Qaida – and nowadays the self-designated “Islamic State” (IS) – the militant struggle is intertwined with the duty to call ...
The Importance of Web 2.0 for Jihad 3.0: Female Jihadists Coming to Grips with Religious Violence on Facebook
September 18, 2023
The Jihadist phenomenon has a privileged space in Web 2.0 where contents can be created, networks can be global and all exchanges of information have significance. The emergent Jihadist organizations have been profiting from these digital communication features to enlarge, diversify and connect with their audience. On the one side, the virtual framing of Jihad ...
Religious Appeals in Daesh’s Recruitment Propaganda
September 18, 2023
The self-proclaimed Islamic State of Iraq and Syria (Daesh) employs a complex online media strategy to recruit targeted demographics. Its success has exacerbated conflicts in Syria, Iraq, Libya, and elsewhere, and has become a concern for the international community. The Carter Center (the Center) is working to counter Daesh’s recruitment propaganda efforts by undertaking in-depth ...
Private Sector Engagement in Responding to the Use of the Internet and ICT for Terrorist Purposes
September 18, 2023
On the one hand, the companies in question feel a business incentive to create a digital environment where their users feel safe, and are increasingly compelled by governments to cooperate in blocking, filtering, countering or removing content or accounts on the grounds of public safety or national security concerns. In addition, users expect the companies ...
Information Laundering and Counter-Publics: The News Sources of Islamophobic Groups on Twitter
September 18, 2023
Which news sources do supporters of populist islamophobic groups and their opponents rely on, and how are these sources related to each other? We explore these questions by studying the websites referenced in discussions surrounding Pegida, a right-wing populist movement based in Germany that is opposed to what its supporters regard as islamization, cultural marginalization ...