Halting Boko Haram / Islamic State’s West Africa Province Propaganda In Cyberspace With Cybersecurity Technologies
September 18, 2023
Terrorists use cyberspace and social media technology to create fear and spread violent ideologies, which pose a significant threat to public security. Researchers have documented the importance of the application of law and regulation in dealing with the criminal activities in cyberspace. Using routine activity theory, this article assessed the effectiveness of technological approaches to ...
A Comparative Analysis Of Right-wing Radical And Islamist Communities’ Strategies For Survival In Social Networks: Evidence From The Russian Social Network Vkontakte
September 18, 2023
This article presents a comparative analysis of online communities of right-wing radicals and Islamists, who are considered to be numerous and dangerous extremist groups in Russian society. The online communities were selected based on the content posted on the largest Russian social networking site VKontakte. The goal of this article is to determine the strategy and ...
From Directorate of Intelligence to Directorate of Everything: The Islamic State’s Emergent Amni-Media Nexus
September 18, 2023
This article, which is based on original interview data gathered from eastern Syria between January and October 2018, examines the emergent dominance of the Islamic State’s Directorate of General Security (DGS). We track how this institution, which is currently operating through a network of diwan-specific security offices grouped under the Unified Security Center (USC), has ...
Making Sense of Jihadi Stratcom: The Case of the Islamic State
September 18, 2023
This article explores why jihadis make propaganda. Through the analytical lens of Bockstette’s 2008 framework for jihadi communication strategies, it assesses two of the Islamic State’s most important doctrinal texts on media jihad—the first, a little-known speech by Abu Hamzah al-Muhajir that was published posthumously in 2010, and the second, a field-guide prepared by the ...
All You Need Is “Love”: Evading Hate Speech Detection
September 18, 2023
With the spread of social networks and their unfortunate use for hate speech, automatic detection of the latter has become a pressing problem. In this paper, we reproduce seven state-of-the-art hate speech detection models from prior work, and show that they perform well only when tested on the same type of data they were trained ...
Dealing With The Dark Side: The Effects Of Right-wing Extremist And Islamist Extremist Propaganda From A Social Identity Perspective
September 18, 2023
Right-wing extremists and Islamist extremists try to recruit new followers by addressing their national (for instance, German) or religious (Muslim) social identity via online propaganda videos. Two studies examined whether capitalizing on a shared group-membership affects the emotional and cognitive response towards extremist propaganda. In both studies, Germans/non-migrants, Muslim migrants and control participants (N = ...
The algorithmic rise of the “alt-right”
September 18, 2023
As with so many technologies, the Internet’s racism was programmed right in—and it’s quickly fueled the spread of White supremacist, xenophobic rhetoric throughout the western world. ...
A Quantitative Approach To Understanding Online Antisemitism
September 18, 2023
A new wave of growing antisemitism, driven by fringe Web communities, is an increasingly worrying presence in the socio-political realm. The ubiquitous and global nature of the Web has provided tools used by these groups to spread their ideology to the rest of the Internet. Although the study of antisemitism and hate is not new, ...
Paris And Nice Terrorist Attacks: Exploring Twitter And Web Archives
September 18, 2023
The attacks suffered by France in January and November 2015, and then in the course of 2016, especially the Nice attack, provoked intense online activity both during the events and in the months that followed. The digital traces left by this reactivity and reactions to events gave rise, from the very first days and even ...
Detection Of Jihadism In Social Networks Using Big Data
September 18, 2023
Social networks are being used by terrorist organizations to distribute messages with the intention of influencing people and recruiting new members. The research presented in this paper focuses on the analysis of Twitter messages to detect the leaders orchestrating terrorist networks and their followers. A big data architecture is proposed to analyze messages in real ...