Down, but Not Out: An Updated Examination of the Islamic State’s Visual Propaganda
September 18, 2023
As the physical territory held by the group known as the Islamic State diminished in 2016-2017, concern about of the status of the group’s “virtual” caliphate increased. This report focuses on one aspect of that virtual caliphate: the production of visual propaganda by the group’s ofcial media bureaus. Using a dataset of more than 13,000 ...
Online-Radicalisation: Myth or Reality?
September 18, 2023
The proliferation of extremist, jihadist and violence-inciting websites, blogs and channels in social media has long since become a major theme in security policy. Extremists and terrorists use the new technological tools to communicate with each other, to organise themselves and to publicise their ideas. Whereas terrorists in the previous millennium were still dependent on ...
Pulling Back the Curtain: An Inside Look at the Islamic State’s Media Organization
September 18, 2023
The CTC is committed to continuing to search out unique sources of data to provide insight into the workings of terrorist organizations and, when possible, making them available to the broader research community, which will undoubtedly add its own insights and continue to enhance our collective understanding. To further this end, all of the documents ...
Who Dissemnates Rumiyah? Examining the Relative Influence of Sympathiser and Non-Sympathiser Twitter Users
September 18, 2023
This paper was presented at the 2nd European Counter Terrorism Centre (ECTC) Advisory Group conference, 17-18 April 2018, at Europol Headquarters, The Hague. The views expressed are the authors’ own and do not necessarily represent those of Europol. In a speech delivered at the United Nations General Assembly in September 2017, the U.K. Prime Minister ...
The Role of Police Online in PVE and CVE
September 18, 2023
This paper is written for police wanting an overview of their online PCVE options, and is based on the RAN POL meeting on ‘The role of police online’ that took place on 1-2 March in Oslo. ...
Tweet… If You Dare: How Counter-Terrorism Laws Restrict Freedom of Expression in Spain
September 18, 2023
Social media users, journalists, lawyers and musicians have been prosecuted under Article 578 of the Spanish Criminal Code, which prohibits “glorifying terrorism” and “humiliating the victims of terrorism”. Although this provision was first introduced in 2000, it is only in recent years, following its amendment in 2015, that prosecutions and convictions under Article 578 have ...
Islamic State’s English-language Magazines, 2014-2017: Trends & Implications for CT-CVE Strategic Communications
September 18, 2023
Islamic State (IS) has used English-language magazines as a crucial component of its propaganda strategy, particularly targeting Muslims living in the West. This paper provides a quick reference guide to IS’s English-language magazines released between June 2014 and September 2017 examining key themes and propaganda strategies deployed across three issues of Islamic State News, four ...
Encouraging Counter-Speech by Mapping the Contours of Hate Speech on Facebook in India
September 18, 2023
Efforts at Countering Violent Extremism (or CVE in internationally accepted terminology) online have become an important focus for all social networks. CVE targets violent, extremist ideologies at their core, tackling them via alternate narratives that focus on peace-building through community interaction. It has thus become an invaluable tool to supplement counterterrorism strategies worldwide. ...
Iraq Information Controls Update: Analyzing Internet Filtering and Mobile Apps
September 18, 2023
We have examined two mobile applications that have received significant attention in coverage of the Iraq insurgency. The first, FireChat, is a U.S.-developed mobile messaging platform that facilitates off-the-grid messaging; features which make it ideal in situations where Internet access is restricted, and that has resulted in growing user numbers in Iraq. However, it is ...
Terror in the Dark: How Terrorists Use Encryption, the Darknet, and Cryptocurrencies
September 18, 2023
This report demonstrates how terrorists and extremists have utilised the Darknet to mask their communication and propaganda efforts, to recruit and radicalise, and to gain material benefits such as illicit goods, including, but not limited to, weapons and fraudulent documents. In addition, this report notes the growing tendency of these individuals to utilise cryptocurrencies for ...