Options and Strategies for Countering Online Radicalization in the United States
September 18, 2023
The purpose of this article is to inform the debate about strategies and options for countering online radicalization within the U.S. domestic context. Its aim is to provide a better understanding of how the Internet facilitates radicalization; an appreciation of the dilemmas and tradeoffs that are involved in countering online radicalization within the United States; ...
Political Radicalization on the Internet: Extremist Content, Government Control, and the Power of Victim and Jihad Videos
September 18, 2023
The role of the internet in radicalizing individuals to extremist action is much discussed but remains conceptually and empirically unclear. Here we consider right-wing and jihadist use of the Internet – who posts what and where. We focus on extremist content related to radicalization to violent action, and argue that victim videos and jihad videos ...
Regulating the ‘Dark Web’: How a Two-Fold Approach can Tackle Peer-to-Peer Radicalisation
September 18, 2023
The internet plays a contributory role in radicalisation, but is only one of a number of mechanisms currently deployed to win recruits to global jihad. Technical regulation of online content is difficult and may be counter-productive, driving forums deeper underground or alienating users. Tim Stevens argues that adopting a social approach that educates and empowers ...
Applying the Notion of Noise to Countering Online Terrorism
September 18, 2023
The growing presence of modern terrorism on the Internet is at the nexus of two key trends: the democratization of communications driven by user-generated content on the Internet; and the growing awareness of modern terrorists of the potential of the Internet for their purposes. How best can the terrorists’ use and abuse of the Internet ...
Pathways to Violent Extremism in the Digital Era
September 18, 2023
The Internet is often singled out as the key means through which extremists and terrorists are radicalised. Yet, argue Charlie Edwards and Luke Gribbon, research thus far has fallen short of unearthing the actual mechanisms through which this radicalisation takes place. Using examples from a wider study, they explore different ways in which individuals have ...
Countering Online Youth Radicalisation
September 18, 2023
Dr Leah Farrall from the National Security College, ANU in conversation with Dr John Coyne, Head – Border Security Program – ASPI. ...
Who Views Online Extremism? Individual Attributes Leading to Exposure
September 18, 2023
Who is likely to view materials online maligning groups based on race, nationality, ethnicity, sexual orientation, gender, political views, immigration status, or religion? We use an online survey (N = 1034) of youth and young adults recruited from a demographically balanced sample of Americans to address this question. By studying demographic characteristics and online habits ...
Combating ISIS Online
September 18, 2023
Combating ISIS Online Panelists talked about *ISIS’ use of the Internet and social media to recruit supporters. They also addressed the U.S. government’s efforts to combat the terror group online. Other topics included whether internet and social media companies should be forced to identify and/or ban those suspected of promoting terror. The Islamic State of Iraq and ...
Tweeting Situational Awareness During the Sydney Siege
September 18, 2023
This article seeks to investigate the way in which social media can affect terrorist events. Using the 2014 Sydney siege as its primary focus, it will argue that the public’s social media activity, particularly the capacity to engage in ‘reporting’ of live events as they occur, can shift the tactical advantage from counterterrorism officials to ...
The Islamic State’s Global Propaganda Strategy
September 18, 2023
This Research Paper aims to analyse in depth the global propaganda strategy of the so-called “Islamic State” (IS) by looking at the methods through which this grand strategy is carried out as well as the objectives that IS wants to achieve through it. The authors first discuss IS’ growth model, explaining why global expansion and ...