Post Type Description
Analysis of YouTube Videos Used by Activists in the Uyghur Nationalist Movement: combining quantitative and qualitative methods
September 18, 2023This paper explores the uses of YouTube by Uyghur nationalist movement activists and studies various ideological codes used by different communities to promote their messages. It argues that several ideological codes are produced in order to challenge the dominant ideologies promoted by the Chinese government, which create a ground for Uyghur ‘imagined solidarity’ across physical ...
Picture Or It Didn’t Happen: A Snapshot of the Islamic State’s Official Media Output
September 18, 2023This article seeks to examine, quantitatively and qualitatively, one week of official media releases of the Islamic State (IS). Due to the breadth of IS official media releases, this provides a snapshot upon which to better understand the different styles and messaging streams IS releases on a weekly basis. The article shows that IS produces ...
The Internet: A Virtual Training Camp?
September 18, 2023This study aims to investigate how Al Qaeda uses the Internet for military training and preparation. What kind of training material is available on jihadi webpages, who produces it, and for what purpose? The article argues that in spite of a vast amount of training-related literature online, there have been few organized efforts by Al ...
Terror in Cyberspace Terrorists Will Exploit and Widen the Gap Between Governing Structures and the Public
September 18, 2023There is an inverse relationship between public access to the Internet and the inability of governments and institutions to control information flow and hence state allegiance, ideology, public opinion, and policy formulation. Increase in public access to the Internet results in an equivalent decrease in government and institutional power. Indeed, after September 11, 2001, Internet ...
Analyzing Terror Campaigns on the Internet: Technical Sophistication, Content Richness, and Web Interactivity
September 18, 2023Terrorists and extremists are increasingly utilizing Internet technology to enhance their ability to influence the outside world. Due to the lack of multi-lingual and multimedia terrorist/extremist collections and advanced analytical methodologies, our empirical understanding of their Internet usage is still very limited. To address this research gap, we explore an integrated approach for identifying and ...
Tweeting the Jihad: Social Media Networks of Western Foreign Fighters in Syria and Iraq
September 18, 2023Social media have played an essential role in the jihadists’ operational strategy in Syria and Iraq, and beyond. Twitter in particular has been used to drive communications over other social media platforms. Twitter streams from the insurgency may give the illusion of authenticity, as a spontaneous activity of a generation accustomed to using their cell ...
Terrorist Financing and the Internet
September 18, 2023While al Qaeda has used the Internet primarily to spread its propaganda and to rally new recruits, the terrorist group has also relied on the Internet for financing-related purposes. Other Islamist terrorist groups, including Hamas, Lashkar e-Taiba, and Hizballah have also made extensive use of the Internet to raise and transfer needed funds to support ...
Social Media, Recruitment, Allegiance and the Islamic State
September 18, 2023Islamic State relies heavily on the recruitment of foreign fighters. We examine this recruitment from an organizational perspective. We analyze how the process of recruitment of foreigners shapes the adverse selection problem affecting the dissident groups that they join. We also examine the different mechanisms used to maintain the allegiance and compliance of foreigners as ...
Preliminary Analytical Considerations In Designing A Terrorism And Extremism Online Network Extractor
September 18, 2023It is now widely understood that extremists use the Internet in attempts to accomplish many of their objectives. In this chapter we present a web-crawler called the Terrorism and Extremism Network Extractor (TENE), designed to gather information about extremist activities on the Internet. In particular, this chapter will focus on how TENE may help differentiate ...