Social Media
On the Role of Semantics for Detecting pro-ISIS Stances on Social Media
September 18, 2023From its start, the so-called Islamic State of Iraq and the Levant (ISIL/ISIS) has been successfully exploiting social media networks, most notoriously Twitter, to promote its propaganda and recruit new members, resulting in thousands of social media users adopting pro-ISIS stance every year. Automatic identification of pro-ISIS users on social media has, thus, become the ...
Hate Beneath the Counter Speech? A Qualitative Content Analysis of User Comments on YouTube Related to Counter Speech Videos
September 18, 2023The odds in stumbling over extremist material in the internet are high. Counter speech videos, such as those of the German campaign Begriffswelten Islam (Concepts of Islam; Bundeszentrale für politische Bildung, 2015a) published on YouTube, offer alternative perspectives and democratic ideas to counteract extremist content. YouTube users may discuss these videos in the comment sections ...
Beating ISIS in the Digitial Space: Focus Testing ISIS Defector Counter-Narrative Videos with American College Students
September 18, 2023ISIS recruits on a 24/7 basis in over 21 languages over the Internet using videos, memes, tweets and other social media postings and swarming in on anyone that retweets, likes or endorses their materials to try to seduce them into the group. Their unprecedented social media drive has resulted in over 30,000 foreign fighters from ...
Hate Crime: Abuse, Hate and Extremism Online
September 18, 2023We announced this inquiry into hate crime and its violent consequences in early July 2016. Our decision to undertake the inquiry followed the murder of Jo Cox MP in June in the lead-up to the EU referendum. There was also evidence of an increase in the number of attacks on people from ethnic minorities and ...
Shooting the Messenger: Do Not Blame the Internet for Terrorism
September 18, 2023The internet clearly matters to terrorists, but online content by itself rarely causes people to carry out terrorist attacks. Responses should therefore not be limited to the mass removal of terrorist content from online platforms. ...
A Semantic Graph-Based Approach for Radicalisation Detection on Social Media
September 18, 2023From its start, the so-called Islamic State of Iraq and the Levant (ISIL/ISIS) has been successfully exploiting social media networks, most notoriously Twitter, to promote its propaganda and recruit new members, resulting in thousands of social media users adopting a pro-ISIS stance every year. Automatic identification of pro-ISIS users on social media has, thus, become ...
The State of the Art: A Literature Review of Social Media Intelligence Capabilities for Counter-Terrorism
September 18, 2023This paper is a review of how information and insight can be drawn from open social media sources. It focuses on the specific research techniques that have emerged, the capabilities they provide, the possible insights they offer, and the ethical and legal questions they raise. The relevance and value of these techniques are considered for ...
The Rise of Jihadist Propaganda on Social Networks
September 18, 2023Using a dataset of over 1.9 million messages posted on Twitter by about 25,000 ISIS members, we explore how ISIS makes use of social media to spread its propaganda and to recruit militants from the Arab world and across the globe. By distinguishing between violence-driven, theological, and sectarian content, we trace the connection between online ...
Media Jihad: The Islamic State’s Doctrine for Information Warfare
September 18, 2023Weeks after its capture of Mosul in 2014, the Islamic State set about transforming its strategic trajectory. Through an avalanche of media products, it worked to aggressively insert itself into the global public discourse and, in turn, popularise its brand, polarise adversary populations and drive rivals into the ideological side-lines. This research paper presents new, empirical insight ...
Countering Violent Extremism Online and Offline
September 18, 2023In the wake of devastating attacks by violent extremists around the world, policy makers have invested considerable effort into understanding terrorists’ use of the Internet as they radicalize and mobilize to violence. To that end, the article “Terrorist Use of the Internet by the Numbers: Quantifying Behaviors, Patterns, and Processes” by Paul Gill, Emily Corner, ...