Journal
Tweeting Situational Awareness During the Sydney Siege
September 18, 2023This article seeks to investigate the way in which social media can affect terrorist events. Using the 2014 Sydney siege as its primary focus, it will argue that the public’s social media activity, particularly the capacity to engage in ‘reporting’ of live events as they occur, can shift the tactical advantage from counterterrorism officials to ...
The Strategic Logic of Islamic State Information Operations
September 18, 2023Drawing on English and Arabic Islamic State (IS) communiqués produced by its central media units, wilayat information offices and broader supporter base, this study examines the strategic logic of IS information operations (IO). It argues that the overarching purpose of IS’s IO campaign is to shape the perceptions and polarise the support of audiences via ...
Rise of Radicalization in the Global Village: Online Radicalization Cs. In-person Radicalization – Is There a Difference?
September 18, 2023In the vicinity of open space, some authors have called the “dark web” the perfect “breeding grounds” for generating conditions for seeds of extremism to thrive and grow. The perceived anonymity and vast information databases found here present a perfect incubator for terrorist activity. Academics and policymakers alike are as well convinced that such an ...
A Systematic Examination of Terrorist Use of the Internet
September 18, 2023The design of the Internet has made it an especially useful tool to terrorist groups. Using the Internet, terrorist groups have been especially successful in recruiting new members and exciting them into action. Previous works have provided comprehensive accounts of ways that terrorists use the Internet. This article expands on the understanding of this phenomenon ...
Towards a Framework Understanding of Online Programs for Countering Violent Extremism
September 18, 2023There is an emerging consensus that ideologically-based narratives play a central role in encouraging and sustaining radicalization to violence, and that preventing, arresting, or reversing radicalization requires some means by which to address the effects of these narratives. Countering violent extremism (CVE) is a broad umbrella phrase that covers a wide array of approaches that ...
“Real Men Don’t Hate Women”: Twitter Rape Threats and Group Identity
September 18, 2023On 24th July 2013, feminist campaigner Caroline Criado-Perez’s petition to the Bank of England to have Elizabeth Fry’s image on the UK’s £5 note replaced with the image of another woman was successful. The petition challenged the Bank of England’s original plan to replace Fry with Winston Churchill, which would have meant that no woman ...
New Metrics for Dynamic Analysis of Online Radicalization
September 18, 2023The increasing use of online social networks (OSNs) by extremists for the spread of radicalization have been a great concern for law enforcement agencies across the world. Today, they are being increasingly used by radical groups for spreading ideologies, recruitment, influencing and planning their activities. However, many of such groups remain hidden within the social ...
Tweeting the Jihad: Social Media Networks of Western Foreign Fighters in Syria and Iraq
September 18, 2023Social media have played an essential role in the jihadists’ operational strategy in Syria and Iraq, and beyond. Twitter in particular has been used to drive communications over other social media platforms. Twitter streams from the insurgency may give the illusion of authenticity, as a spontaneous activity of a generation accustomed to using their cell ...
Analyzing Terror Campaigns on the Internet: Technical Sophistication, Content Richness, and Web Interactivity
September 18, 2023Terrorists and extremists are increasingly utilizing Internet technology to enhance their ability to influence the outside world. Due to the lack of multi-lingual and multimedia terrorist/extremist collections and advanced analytical methodologies, our empirical understanding of their Internet usage is still very limited. To address this research gap, we explore an integrated approach for identifying and ...
Terror in Cyberspace Terrorists Will Exploit and Widen the Gap Between Governing Structures and the Public
September 18, 2023There is an inverse relationship between public access to the Internet and the inability of governments and institutions to control information flow and hence state allegiance, ideology, public opinion, and policy formulation. Increase in public access to the Internet results in an equivalent decrease in government and institutional power. Indeed, after September 11, 2001, Internet ...