Post Type Description
The Evolution of the ISIS’ Language: a Quantitative Analysis of the Language of the First Year of Dabiq Magazine
September 18, 2023In this article we investigate the evolution of ISIS by analysing the text contained in Dabiq, the official ISIS’ internet magazine in English. Specifically, we used a computerized text analysis pro-gram LIWC (Linguistic Inquiry and Word Count) to investigate the evolution of the language of the first 11 Issues of Dabiq. First, our analysis showed ...
Neo-Jihadist Prosumers and Al Qaeda Single Narrative: The Case Study of Giuliano Delnevo
September 18, 2023Scholars in the field of terrorism and violent extremism often refer to the so-called Al Qaeda single narrative. This article suggests that the Internet challenges the existence of a “single narrative,” by arguing that neo-jihadist prosumers may reinterpret Al Qaeda’s narrative and create hybrid symbols and identities. The article discusses the case study of an ...
Analysis of YouTube Videos Used by Activists in the Uyghur Nationalist Movement: combining quantitative and qualitative methods
September 18, 2023This paper explores the uses of YouTube by Uyghur nationalist movement activists and studies various ideological codes used by different communities to promote their messages. It argues that several ideological codes are produced in order to challenge the dominant ideologies promoted by the Chinese government, which create a ground for Uyghur ‘imagined solidarity’ across physical ...
Picture Or It Didn’t Happen: A Snapshot of the Islamic State’s Official Media Output
September 18, 2023This article seeks to examine, quantitatively and qualitatively, one week of official media releases of the Islamic State (IS). Due to the breadth of IS official media releases, this provides a snapshot upon which to better understand the different styles and messaging streams IS releases on a weekly basis. The article shows that IS produces ...
The Internet: A Virtual Training Camp?
September 18, 2023This study aims to investigate how Al Qaeda uses the Internet for military training and preparation. What kind of training material is available on jihadi webpages, who produces it, and for what purpose? The article argues that in spite of a vast amount of training-related literature online, there have been few organized efforts by Al ...
Terror in Cyberspace Terrorists Will Exploit and Widen the Gap Between Governing Structures and the Public
September 18, 2023There is an inverse relationship between public access to the Internet and the inability of governments and institutions to control information flow and hence state allegiance, ideology, public opinion, and policy formulation. Increase in public access to the Internet results in an equivalent decrease in government and institutional power. Indeed, after September 11, 2001, Internet ...
Analyzing Terror Campaigns on the Internet: Technical Sophistication, Content Richness, and Web Interactivity
September 18, 2023Terrorists and extremists are increasingly utilizing Internet technology to enhance their ability to influence the outside world. Due to the lack of multi-lingual and multimedia terrorist/extremist collections and advanced analytical methodologies, our empirical understanding of their Internet usage is still very limited. To address this research gap, we explore an integrated approach for identifying and ...