Post Type Description
Why the Internet is Not Increasing Terrorism
September 18, 2023Policymakers and scholars fear that the Internet has increased the ability of transnational terrorists, like al Qaeda, to attack targets in the West, even in the face of increased policing and military efforts. Although access to the Internet has increased across the globe, there has been no corresponding increase in completed transnational terrorist attacks. This ...
Hate Speech or ‘Reasonable Racism’? The Other in Stormfront
September 18, 2023We use the construct of the “other” to explore how hate operates rhetorically within the virtual conclave of Stormfront, credited as the first hate Web site. Through the Internet, white supremacists create a rhetorical vision that resonates with those who feel marginalized by contemporary political, social, and economic forces. However, as compared to previous studies ...
As American as Apple Pie: How Anwar al-Awlaki Became the Face of Western Jihad
September 18, 2023CSR is pleased to announce the release of its newest report, As American As Apple Pie: How Anwar al-Awlaki Became the Face of Western Jihad, by Research Fellow Alexander Meleagrou-Hitchens. This study provides the first forensic analysis of Anwar al-Awlaki’s work, which tracks his ideological path from a supposedly moderate preacher to an al-Qaeda recruiter. ...
Lights, Camera, Jihad: Al-Shabaab’s Western Media Strategy
September 18, 2023While the threat that al-Shabaab poses to the West can easily be overstated, its outreach to Muslims living in Europe and the United States has been successful relative to other al-Qaeda-linked groups and warrants exploration. The organisation has recruited dozens of foreign fighters from the West (see Appendix). It also holds the dubious distinction of ...
The E-Marketing Strategy of Hamas
September 18, 2023Given the growth of Internet research in recent years, it is rather surprising that research of online terrorism and countermeasures has been lacking theoretical and conceptual frameworks. The present study suggests applying the concepts and models taken from e-marketing to the study of terrorist websites. This work proves that when Hamas builds an array of ...
Tweeting to Win: Al-Shabaab’s Strategic Use of Microblogging
September 18, 2023Today, we live in a world of networked global communities, drawn together by the recent technological boom. This unprecedented degree of interconnectivity has affected every size and kind of social organization, from the American government to a camera-armed protester on the streets. Technology has particularly changed the fabric of the Islamic world, a community torn ...
Fatal Attraction: Western Muslims and ISIS
September 18, 2023More than 550 Muslim women from Western countries have joined ISIS and moved to its proclaimed ‘Caliphate’ in Syria and Iraq. No extremist group has been able to attract so many female Western recruits so far, and their number continues to grow. This article is intended to explain the reasons behind such unprecedented success, the ...
Relocating the Virtual War
September 18, 2023Countering Al Qaeda and other terrorist groups’ use of the Internet for both organizational purposes and the dissemination of radical propaganda has frequently been conceptualized in terms of a war in a virtual space. This assumption has led to a distorted understanding of how the Internet is relevant to terrorism, and what methods are appropriate ...
The Next Generation of Terror
September 18, 2023The world’s most dangerous jihadists no longer answer to al Qaeda. The terrorists we should fear most are self-recruited wannabes who find purpose in terror and comrades on the Web. This new generation is even more frightening and unpredictable than its predecessors, but its evolution just may reveal the key to its demise. ...
Understanding Terrorism in the Age of Global Media: A Communication ApproachUnderstanding Terrorism in the Age of Global Media: A Communication Approach
September 18, 2023We cannot truly understand terrorism in the 21st century—let alone counter it effectively—unless we also understand the processes of communication that underpin it. The book challenges existing terrorism research showing that current approaches are inadequate and outdated. It exposes the fact that, although we live in an age of interconnectedness shaped by media technologies, both ...