Islamic State of Iraq and Syria (ISIS)
Counter-Radicalization via the Internet
September 18, 2023ISIS and other international terrorist organizations rely on the Internet to disseminate their extremist rhetoric and to recruit people to their cause, particularly through popular online social media applications. Any meaningful counterterrorism strategy must, therefore, account for the ways in which terrorist organizations use the Internet to prey on young, manipulable minds who are drawn ...
The Spirit of Terrorism in Islamic State Media
September 18, 2023In June 2014 the organisation known as ‘Islamic State’ (IS) announced the establishment of a 680km Syrian and Iraqi Caliphate. Since this time, it has exercised large scale massacres of Middle Eastern civilians, executed foreign prisoners, and forced dissenters into sexual and economic slavery (Lister, 2014: 17). To sustain its operational strength and acquisition of ...
New Online Ecology of Adversarial Aggregates: ISIS and Beyond
September 18, 2023Support for an extremist entity such as Islamic State (ISIS) somehow manages to survive globally online despite considerable external pressure and may ultimately inspire acts by individuals having no history of extremism, membership in a terrorist faction, or direct links to leadership. Examining longitudinal records of online activity, we uncovered an ecology evolving on a ...
Social Media as a Tool of Hybrid Warfare
September 18, 2023The development of information technology has changed the nature of conflicts by creating an additional layer of complexity to traditional battle spaces. Nearly global access to the virtual environment has created numerous opportunities to conduct battles online affecting events in both the physical domain, such as computer systems, and in the cognitive domain of people’s ...
The Advocacy of Terrorism on the Internet: Freedom of Speech Issues and the Material Support Statutes
September 18, 2023The development of the Internet has revolutionized communications. It has never been easier to speak to wide audiences or to communicate with people that may be located more than half a world away from the speaker. However, like any neutral platform, the Internet can be used to many different ends, including illegal, offensive, or dangerous ...
Cyberspace, Terrorism and International Law
September 18, 2023Governments have long worried about terrorists using the Internet to launch cyberattacks, spread propaganda, recruit and radicalise individuals and raise funds. However, the Islamic State’s exploitation of social media has caused a crisis and generated questions about international law’s role in addressing terrorism in cyberspace. This article analyzes international law in connection with potential terrorist ...
Countering Daesh Propaganda: Action-Oriented Research for Practical Policy Outcomes
September 18, 2023This report contains articles presented at the Countering Daesh Experts Workshop convened by The Carter Center Feb. 22–24, 2016, in Atlanta, Ga. The workshop brought together 21 leading scholars and practitioners from 10 different countries to discuss Daesh recruitment strategies and its use of social media technologies to appeal to alienated youth. In addition to ...
Europe and the Virtual War Against Terror
September 18, 2023What is the EU doing to counter terrorist propaganda online? ...
Nazis vs ISIS on Twitter: A Comparative Study of White Nationalist and ISIS Online Social Media Networks
September 18, 2023The Islamic State, also known as ISIS, has distinguished itself as a pioneer in the use of social media for recruitment. But, while ISIS continues to be one of the most influential terrorist groups in the material world, other extremists are closing the gap in the virtual realm. On Twitter, ISIS’s preferred social platform, American ...
Women’s Connectivity in Extreme Networks
September 18, 2023A popular stereotype is that women will play more minor roles than men as environments become more dangerous and aggressive. Our analysis of new longitudinal data sets from offline and online operational networks [for example, ISIS (Islamic State)] shows that although men dominate numerically, women emerge with superior network connectivity that can benefit the underlying ...