Towards the “olive trees of Rome”: exploitation of propaganda devices in the Islamic State’s flagship magazine “Rumiyah”
September 18, 2023
This paper aims to contribute to understanding how the last flagship magazine of the Islamic State – “Rumiyah” – attempted to influence and manipulate Internet users. Its primary objective is to analyze the propaganda methods exploited in all thirteen issues of this magazine. In order to do so this paper utilises content analysis to investigate ...
Artificial or Human: A New Era of Counterterrorism Intelligence?
September 18, 2023
A new revolution has begun in counterterrorism—the Artificial Intelligence (AI) revolution. The AI revolution has had a significant impact on many areas of security and intelligence. The use of AI and big data in general, and in the field of intelligence and counterterrorism in particular, has led to intense debates between supporters of the continuation ...
On the Origins of Memes by Means of Fringe Web Communities
September 18, 2023
Internet memes are increasingly used to sway and manipulate public opinion. This prompts the need to study their propagation, evolution, and influence across the Web. In this paper, we detect and measure the propagation of memes across multiple Web communities, using a processing pipeline based on perceptual hashing and clustering techniques, and a dataset of ...
Shifts in the Visual Media Campaigns of AQAP and ISIS After High Death and High Publicity Attacks
September 18, 2023
Extreme militant groups use their media campaigns to share information, recruit and radicalize followers, share worldviews, and seek public diplomacy ends. While previous research documents that various on-the-ground events correspond to changes in the groups’ messaging strategies, studies of how competing militant groups influence one another’s media campaigns are nascent. This study helps fill that ...
Halting Boko Haram / Islamic State’s West Africa Province Propaganda In Cyberspace With Cybersecurity Technologies
September 18, 2023
Terrorists use cyberspace and social media technology to create fear and spread violent ideologies, which pose a significant threat to public security. Researchers have documented the importance of the application of law and regulation in dealing with the criminal activities in cyberspace. Using routine activity theory, this article assessed the effectiveness of technological approaches to ...
A Comparative Analysis Of Right-wing Radical And Islamist Communities’ Strategies For Survival In Social Networks: Evidence From The Russian Social Network Vkontakte
September 18, 2023
This article presents a comparative analysis of online communities of right-wing radicals and Islamists, who are considered to be numerous and dangerous extremist groups in Russian society. The online communities were selected based on the content posted on the largest Russian social networking site VKontakte. The goal of this article is to determine the strategy and ...
From Directorate of Intelligence to Directorate of Everything: The Islamic State’s Emergent Amni-Media Nexus
September 18, 2023
This article, which is based on original interview data gathered from eastern Syria between January and October 2018, examines the emergent dominance of the Islamic State’s Directorate of General Security (DGS). We track how this institution, which is currently operating through a network of diwan-specific security offices grouped under the Unified Security Center (USC), has ...
Making Sense of Jihadi Stratcom: The Case of the Islamic State
September 18, 2023
This article explores why jihadis make propaganda. Through the analytical lens of Bockstette’s 2008 framework for jihadi communication strategies, it assesses two of the Islamic State’s most important doctrinal texts on media jihad—the first, a little-known speech by Abu Hamzah al-Muhajir that was published posthumously in 2010, and the second, a field-guide prepared by the ...
All You Need Is “Love”: Evading Hate Speech Detection
September 18, 2023
With the spread of social networks and their unfortunate use for hate speech, automatic detection of the latter has become a pressing problem. In this paper, we reproduce seven state-of-the-art hate speech detection models from prior work, and show that they perform well only when tested on the same type of data they were trained ...
Dealing With The Dark Side: The Effects Of Right-wing Extremist And Islamist Extremist Propaganda From A Social Identity Perspective
September 18, 2023
Right-wing extremists and Islamist extremists try to recruit new followers by addressing their national (for instance, German) or religious (Muslim) social identity via online propaganda videos. Two studies examined whether capitalizing on a shared group-membership affects the emotional and cognitive response towards extremist propaganda. In both studies, Germans/non-migrants, Muslim migrants and control participants (N = ...