The Use of Counter Narratives to Combat Violent Extremism Online
September 18, 2023
Due to recent rises in extremism across the globe (Dean et al. in J Polic Intell Count Terror 11:121–142, 2016; Le Roux in Responding to the rise in violent extremism in the Sahel. Africa Center For Strategic Studies, 2019, p. 26) and (Jones in Int Secur 32:7–40, 2008), governments and law enforcement organisations, such as ...
Examining Online Indicators of Extremism among Violent and Non-Violent Right-Wing Extremists
September 18, 2023
Although there is an ongoing need for law enforcement and intelligence agencies to identify and assess the online activities of violent extremists prior to their engagement in violence offline, little is empirically known about their online posting patterns generally or differences in their online patterns compared to non-violent extremists who share similar ideological beliefs particularly. ...
Digital Caliphate: Islamic State, Modernity and Technology
September 18, 2023
This paper observes some of the most distinguished characteristics of the Islamic State related to the use of modern technology and tries to drawn some important conclusions between the terrorist’s quasi state, modernity and technology. After the examination of the functioning of IS at the peak of its powers between 2014 and 2017, the analysis ...
Salafi-Jihadism and Digital Media
September 18, 2023
While the interest in Salafi-jihadism and the digital arena is not a new phenomenon, a limited amount of research has focused on the specific strategies and narratives disseminated by local groups and online supporter communities at the national and international level. The editors provide a brief introduction to the issue of Salafi-jihadism and digital media ...
Transnational Terrorism and the Internet
September 18, 2023
Does the internet enable the recruitment of transnational terrorists? Using geo-referenced population census data and personnel records from the Islamic State in Iraq and the Levant—a highly tech-savvy terrorist organization— this paper shows that internet access has facilitated the organization’s recruitment of foreign fighters from Tunisia. The positive association between internet access and Daesh recruitment ...
GIFCT Technical Approaches Working Group: Gap Analysis and Recommendations for deploying technical solutions to tackle the terrorist use of the internet
September 18, 2023
The objective of this report is to provide strategic guidance to tech companies, government policy makers, and solution providers in order to increase and improve investment into effective technical approaches that support platforms in tackling the terrorist use of internet services while respecting human rights. While stopping short of providing a detailed roadmap for development, ...
Comparing the Online Posting Behaviors of Violent and Non-Violent Right-Wing Extremists
September 18, 2023
Despite the ongoing need for researchers, practitioners, and policymakers to identify and assess the online activities of violent extremists prior to their engagement in violence offline, little is empirically known about their online behaviors generally or differences in their posting behaviors compared to non-violent extremists who share similar ideological beliefs particularly. In this study, we ...
The Ontogeny of Online Hate Speech: Do Social Media Platforms Drive Increased Hate or Reflect Existing Prejudices?
September 18, 2023
Hate speech is a growing concern online, with minorities and vulnerable groups increasingly targeted with extreme denigration and hostility. Why users express hate speech on social media is unclear. This study explores how this hate speech develops on both mainstream and fringe social media platforms; Facebook and Gab. We investigate whether users seek out hostile ...
The ‘tarrant effect’: what impact did far-right attacks have on the 8chan forum?
September 18, 2023
This paper analyses the impact of a series of mass shootings committed in 2018–2019 by right-wing extremists on 8chan/pol, a prominent far-right online forum. Using computational methods, it offers a detailed examination of how attacks trigger shifts in both forum activity and content. We find that while each shooting is discussed by forum participants, their ...