Counterterrorism
Terrorism and IT: Cyberterrorism and Terrorist Organisations Online
September 18, 2023Chapter, “Terrorism and IT: cyberterrorism and terrorist organisations online” in book: Howard, Russell D. and Sawyer, Reid L., (eds.) Terrorism and counterterrorism: understanding the new security environment, readings and interpretations ...
From ‘Martyrdom’ Videos to Jihadi Journalism in Somalia
September 18, 2023An analysis of Harakat al-Shabab’s multimedia releases and the rapid evolution in their production quality and design over a period of two to three years. Sound quality, animation, syncing sound with visuals, and narrative structures have all improved from the group’s multimedia releases from 2007 and 2008 when its videos were relatively simple, often just ...
Detecting Linguistic Markers for Radical Violence in Social Media
September 18, 2023Lone-wolf terrorism is a threat to the security of modern society, as was tragically shown in Norway on July 22, 2011, when Anders Behring Breivik carried out two terrorist attacks that resulted in a total of 77 deaths. Since lone wolves are acting on their own, information about them cannot be collected using traditional police ...
Jihad.De
September 18, 2023Spätestens seit der Kosovo-Albaner Arid Uka Anfang März 2011 am Frankfurter Flughafen zwei US-Soldaten tötete, hat das Bewusstsein für die Gefahren jihadistischer Internetpropaganda stark zugenommen. Der 21-Jährige erklärte, zu der Tat habe ihn ein Internetvideo bewogen. Wie soll man in Deutschland mit der Propaganda im Internet umgehen und ihrem radikalisierenden Einfluss entgegensteuern? Sie völlig aus ...
The Spider-man Behavior Protocol: Exploring both Public and Dark Social Networks for Fake Identity Detection in Terrorism Informatics
September 18, 2023Hiding true personality behind a facade is one of the basic tricks adopted by humans who live double lives for illegal purposes. In particular terrorists have historically adopted the protocol of a facade behaviour coupled with a second life consisting mainly in illegal activities and their planning. Nowadays a few cases of behaviours that hide ...
Neuer Terrorismus Und Neue Medien
September 18, 2023Bereits seit den 1990er Jahren gebrauchen TerroristInnen das Internet für ihre Zwecke, das ihnen ganz neue Möglichkeiten für Propaganda, Rekrutierung, Radikalisierung, Finanzierung und Planung eröffnet hat. Statt auf eigene Webseiten setzen TerroristInnen heute zunehmend und gezielt auf die Neuen Medien. Diese bieten eine hervorragende kostenlose Infrastruktur und erlauben es, ein globales Publikum zu erreichen. Dieser ...
Terrorism, Communication and New Media: Explaining Radicalization in the Digital Age
September 18, 2023This article aims to demonstrate that a greater understanding of communication in the 21st century is essential to more effective counterterrorism. In fact, while “strategic communication” and “narratives” are advocated by many analysts as essential weapons in countering extremism, few seem to truly understand the reality of the digital-age information environment where such tools need ...
Virtual Disputes: The Use of the Internet for Terrorist Debates
September 18, 2023Terrorists are using the Internet for various purposes. Most of the attempts to monitor and study terrorist presence on the Net focused on the practical and communicative uses of this channel by modern terrorists. Yet, not much attention has been paid to the use of the Net as a medium for terrorist debates and disputes. ...
Comparison of Visual Motifs in Jihadi and Cholo Videos on YouTube
September 18, 2023Homegrown Sunni extremists (jihadis) and Latin American street gang members (cholos) represent potential threats to national security. Both groups are known to inhabit the video- sharing website YouTube. Videos representative of each group were selected at random, and the visual motifs in the videos were categorized. Findings suggest similarities and differences between the two groups ...
Gen E (Generation Extremist): The Significance of Youth Culture and New Media in Youth Extremism
September 18, 2023There are many computer programs that model the consequences to built infrastructure when subject to explosive blast loads; however, the majority of these do not account for the uncertainties associated with system response or blast loading. This paper describes new software – called “Blast-RF” (Blast Risks for Facades) – that incorporates existing blast-response software within ...