Journal
The Internet: A Virtual Training Camp?
September 18, 2023This study aims to investigate how Al Qaeda uses the Internet for military training and preparation. What kind of training material is available on jihadi webpages, who produces it, and for what purpose? The article argues that in spite of a vast amount of training-related literature online, there have been few organized efforts by Al ...
Picture Or It Didn’t Happen: A Snapshot of the Islamic State’s Official Media Output
September 18, 2023This article seeks to examine, quantitatively and qualitatively, one week of official media releases of the Islamic State (IS). Due to the breadth of IS official media releases, this provides a snapshot upon which to better understand the different styles and messaging streams IS releases on a weekly basis. The article shows that IS produces ...
Analysis of YouTube Videos Used by Activists in the Uyghur Nationalist Movement: combining quantitative and qualitative methods
September 18, 2023This paper explores the uses of YouTube by Uyghur nationalist movement activists and studies various ideological codes used by different communities to promote their messages. It argues that several ideological codes are produced in order to challenge the dominant ideologies promoted by the Chinese government, which create a ground for Uyghur ‘imagined solidarity’ across physical ...
Neo-Jihadist Prosumers and Al Qaeda Single Narrative: The Case Study of Giuliano Delnevo
September 18, 2023Scholars in the field of terrorism and violent extremism often refer to the so-called Al Qaeda single narrative. This article suggests that the Internet challenges the existence of a “single narrative,” by arguing that neo-jihadist prosumers may reinterpret Al Qaeda’s narrative and create hybrid symbols and identities. The article discusses the case study of an ...
Expanding the Nationalist Echo-Chamber into the Mainstream: Swedish Anti-Immigration Activity on Twitter, 2010-2013
September 18, 2023Blogs, social media, and search engines have democratized information seekers and providers. However, the same affordances of the Internet have also contributed to resurgence and transformation of far-right and racist communities. Despite a growing number of studies of far-right communities, little attention has so far been paid to the mechanisms through which far-right and racist ...
Differentiating Al Qaeda and the Islamic State Through Strategies Publicized in Jihadist Magazines
September 18, 2023As Al Qaeda and the Islamic State vie for ascendancy in the jihad movement, policymakers grapple with distinguishing the threat posed by these groups. Proceeding from the terrorists’ view of media as a critical arena of jihad, this study applies content analysis to Al Qaeda- and Islamic State-produced magazines in order to empirically differentiate the ...
Introduction to the Special Issue: Terrorist Online Propaganda and Radicalization
September 18, 2023The Internet is a transformative technology that terrorists are exploiting for the spread of propaganda and radicalizing new recruits. While al-Qaeda has a longer history, Islamic State is conducting a modern and sophisticated media campaign centered around online social networking. This article introduces and contextualizes the contributions to this Special Issue by examining some of ...
Confronting Online Extremism: The Effect of Self-Help, Collective Efficacy, and Guardianship on Being a Target for Hate Speech
September 18, 2023Who is likely to be a target of online hate and extremism? To answer this question, we use an online survey (N = 963) of youth and young adults recruited from a demographically balanced sample of Americans. Adapting routine activity theory, we distinguish between actor-initiated social control (i.e., self-help), other-initiated social control (i.e., collective efficacy), ...
ISIS-chan – the Meanings of the Manga Girl in Image Warfare Against the Islamic State
September 18, 2023This article explores gendered meanings of ISIS-chan, an Internet meme in the form of a manga girl, produced and used to disrupt the messages from the Islamic State. Moreover, it investigates the performative power of ISIS-chan, and how it is used/interpreted as it circulates on the Internet. The ISIS-chan campaign is seen as an example ...