Report
Examining ISIS Support and Opposition Networks on Twitter
September 18, 2023The Islamic State in Iraq and Syria (ISIS), like no other terrorist organization before, has used Twitter and other social media channels to broadcast its message, inspire followers, and recruit new fighters. Though much less heralded, ISIS opponents have also taken to Twitter to castigate the ISIS message. This report draws on publicly available Twitter ...
Radicalization: The Role of the Internet
September 18, 2023This paper provides a broad summary of our current understanding of the role of the Internet in relation to extremist and terrorist networks. It covers the role of the Internet in radicalisation; the use of new technologies by extremists looking to organize and/or use violence, whether in a group or alone (including how this is ...
Documenting the Virtual ‘Caliphate’
September 18, 2023The menace presented by Islamic State’s (IS) self-proclaimed ‘caliphate’ is uniquely challenging on a number of levels. Tactically, its military operations demand lateral thinking, since the group exists as a nebulous, swarming network constantly seeking to expand its reach. Strategically, too, it is pioneering new insurgent methods, establishing numerous, complex administrative and institutional foundations in ...
An Analysis of Interactions Within and Between Extreme Right Communities in Social Media
September 18, 2023Many extreme right groups have had an online presence for some time through the use of dedicated websites. This has been accompanied by increased activity in social media websites in recent years, which may enable the dissemination of extreme right content to a wider audience. In this paper, we present exploratory analysis of the activity ...
“Linksextremismus im Internet”, Extremismus in Deutschland
September 18, 2023Die Autoren nehmen sich des Problems der Nutzung des Internets durch Linksextremisten an und analysieren die unterschiedlichen “Gesichter“ des linksextremismus im Internet. ...
The Spider-man Behavior Protocol: Exploring both Public and Dark Social Networks for Fake Identity Detection in Terrorism Informatics
September 18, 2023Hiding true personality behind a facade is one of the basic tricks adopted by humans who live double lives for illegal purposes. In particular terrorists have historically adopted the protocol of a facade behaviour coupled with a second life consisting mainly in illegal activities and their planning. Nowadays a few cases of behaviours that hide ...
Radicalisation and the Role of the Internet
September 18, 2023A summary of the current understanding of the role of the Internet in relation to extremist and terrorist networks. The paper was prepared by the ISD and the Policy Planners’ Network on Countering Radicalisation and Polarisation (PPN) – Belgium, Denmark, France, the Netherlands, Spain, Sweden and the UK. ...
Radicalisation In The Digital Era: The Use of the Internet in 15 Cases of Terrorism and Extremism
September 18, 2023This study explores how the internet is used by individuals in the process of their radicalisation. It is based on primary data drawn from a variety of sources: evidence presented at trial, computer registries of convicted terrorists, interviews with convicted terrorists and extremists, as well as police senior investigative officers responsible for terrorist investigations. ...
Becoming Mulan: Female Western Migrants to ISIS
September 18, 2023The current flow of foreigners to Syria and Iraq is remarkable not only for its scale, but also for its inclusion of many women. Much has been written about the male fighters who migrate to engage in the conflict there; these fighters are prolific on social media and share details of their day-to-day experiences with ...
The ISIS Twitter Census: Defining and Describing the Population of ISIS Supporters on Twitter
September 18, 2023The Islamic State, known as ISIS or ISIL, has exploited social media, most notoriously Twitter, to send its propaganda and messaging out to the world and to draw in people vulnerable to radicalisation. ...