Islamic State’s English-language Magazines, 2014-2017: Trends & Implications for CT-CVE Strategic Communications
September 18, 2023
Islamic State (IS) has used English-language magazines as a crucial component of its propaganda strategy, particularly targeting Muslims living in the West. This paper provides a quick reference guide to IS’s English-language magazines released between June 2014 and September 2017 examining key themes and propaganda strategies deployed across three issues of Islamic State News, four ...
Iraq Information Controls Update: Analyzing Internet Filtering and Mobile Apps
September 18, 2023
We have examined two mobile applications that have received significant attention in coverage of the Iraq insurgency. The first, FireChat, is a U.S.-developed mobile messaging platform that facilitates off-the-grid messaging; features which make it ideal in situations where Internet access is restricted, and that has resulted in growing user numbers in Iraq. However, it is ...
A Tale Of Two Caliphates: Comparing the Islamic State’s Internal and External Messaging Priorities
September 18, 2023
In recent years, the media department of the self-proclaimed Islamic State has proven itself to be highly adept at strategic communication. While much research has gone into the group’s digital and online capabilities, there remains a significant gap in the knowledge regarding its in-country propaganda operations and objectives. In recognition of this, the following research ...
‘Sometimes You Just Have to Try Something’: A Critical Analysis of Danish State-Led Initiatives Countering Online Radicalisation
September 18, 2023
This research paper argues that Danish online radicalisation policies are driven by logics of urgency (the threat is imminent) within a limited realm of discursive possibilities (the threat is securitised) which blur the lines between state and civil society as well as state and private sector interactions. Potential political implications bring into play questions about ...
Terror in the Dark: How Terrorists Use Encryption, the Darknet, and Cryptocurrencies
September 18, 2023
This report demonstrates how terrorists and extremists have utilised the Darknet to mask their communication and propaganda efforts, to recruit and radicalise, and to gain material benefits such as illicit goods, including, but not limited to, weapons and fraudulent documents. In addition, this report notes the growing tendency of these individuals to utilise cryptocurrencies for ...
Jihad Cool/Jihad Chic: The Roles of the Internet and Imagined Relations in the Self-Radicalization of Colleen LaRose
September 18, 2023
The internet provides the means through which a “self-activating terrorist” may first self-radicalize through some imaginary or sympathetic connection with an organized terrorist network. Additionally, the internet allows such a self-activating terrorist to move into the stage of radical violent action. The internet serves both functions by providing the lone wolf with not only a ...
Studying Jihadists on Social Media: A Critique of Data Collection Methodologies
September 18, 2023
In this article, we propose a general model of data collection from social media, in the context of terrorism research, focusing on recent studies of jihadists. By analyzing Twitter data collection methods in the existing research, we show that the methods used are prone to sampling biases, and that the sampled datasets are not sufficiently ...
Representing the West and “Non-Believers” in the Online Jihadist Magazines Dabiq and Inspire
September 18, 2023
This article analyses how jihadist ideology groups discursively represent “the West” and “non-believers” in their online propagandamagazines. In doing so, it contributes to the field of Critical Terrorism Studies conceptually, by considering the voices of violent actors, and methodologically, by illustrating how linguistic tools of enquiry can advance current knowledge of jihadist ideology groups. Our ...
Inception Impact Assessment: Measures to Further Improve the Effectiveness of the Fight against Illegal Content Online
September 18, 2023
This Comment addresses issues unique to potentially terrorist content targeted by Internet platforms’ Countering Violent Extremism (CVE) efforts. It focuses in particular on Islamist extremism, though some of the analysis may be generalized to other contexts. ...
Fool me Once: How Terrorists Like and Rely Upon the “See no Evil, Hear no Evil” Business Model of Google Facebook and Instagram
September 18, 2023
The latest Digital Citizens Alliance investigation exposes the fallacy that much, if anything, has changed. Partnering with the Global Intellectual Property Enforcement Center (GIPEC), Digital Citizens has reviewed dozens of examples of how terrorist organizations continue to rely on digital platforms such as Google, Facebook, YouTube and Instagram to promote hate speech and recruit. What ...