Chapter |
Spreading the Message Digitally: A Look into Extremist Organizations’ Use of the Internet
View Abstract
Why would a terrorist choose to utilize the Internet rather than the usual methods of assassination, hostage taking, and guerrilla warfare? Conway (2006) identified five major reasons why extremist groups used the Internet: virtual community building, information provision, recruitment, financing, and risk mitigation. Terrorist and extremist organizations can use the Internet to increase their visibility and provide information about the group along with its goals without posing an increased risk to the members. It also allows them to easily ask for, and accept, donations through anonymous financial services such as Dark Coins. These benefits allow these groups to promote awareness of their cause, to convey their message to, and perhaps foster sympathy from a much larger pool of potential supporters and converts (Weimann 2010). Finally, the Internet also provides asynchronous services with global access, with the sender and recipient located at any place, at any time, without the need to link up at a specific time (Wagner 2005). In short, unlike the real world, cyberspace is borderless without limitation, and this makes identification, verification, and attribution a challenge.
|
2015 |
Davies, G., Frank,R., Bouchard,M. and Mei, J. |
View
Publisher
|
Journal Article |
Sentiment-Based Identification of Radical Authors (SIRA).
View Abstract
|
2015 |
Scrivens, R., Davies, G., Frank, R. and Mei, J. |
View
Publisher
|
Report |
Assessment of the State of Knowledge: Connections Between Research on the Social Psychology of the Internet and Violent Extremism
View Abstract
Currently, a gap in the literature exists on the link between radicalization processes and
the social psychology of the Internet. While radicalization processes are increasingly
becoming subject to empirical studies, only a subset of these studies have taken into
account online dynamics, and even fewer have approached this issue from a social psychological
perspective. However, the literature on radicalization to violent extremism clearly establishes
the central role of social psychology. It also suggests that the Internet is increasingly salient for
understanding processes of radicalization. It follows then, that understanding radicalization processes
requires an explanation of how the Internet may influence beliefs and behaviours; that is,
of the social psychology of the Internet.
This report outlines the link between the social psychology of the Internet and violent extremism.
It is divided into two parts. The first part, provides a review of the literature on the
social psychology of the Internet, including its potential applications to the understanding of
violent extremism. This section examines both the individual and collective dimensions involved
when individuals reach out and interact online with like-minded virtual peers, and their effects
on individual and collective behaviours. Concepts defined in the literature review are then applied
to analyze fifteen case studies of individuals whose involvement in violent extremist acts
has been confirmed, and where the Internet played a role, small or large, in their radicalization
trajectory. These fifteen cases aim to achieve maximum variance in regard to the role the Internet
played in radicalization processes across individuals. All cases are from open sources, all are
relevant to Canada although some cases selected include individuals active in (or coming from)
other countries. The aim is to provide a clear assessment of the aspects of the literature from the
research field of the social psychology of the Internet that has been shown most relevant to violent
extremism.
The second part of the report builds off the literature review and case study analysis, looking
at programs that aim to counter violent extremism online. This section can be broken down
into two sub-sections. First a review of the literature on countering violent extremism online is
|
2016 |
Ducol, B., Bouchard, M., Davies, G., Ouellet, M. and Neudecker, C. |
View
Publisher
|
Journal |
Towards a Framework Understanding of Online Programs for Countering Violent Extremism
View Abstract
There is an emerging consensus that ideologically-based narratives play a central role in encouraging and sustaining radicalization to violence, and that preventing, arresting, or reversing radicalization requires some means by which to address the effects of these narratives. Countering violent extremism (CVE) is a broad umbrella phrase that covers a wide array of approaches that have been advanced to reduce the radicalizing effects of extremist narratives. There is considerably less agreement, however, regarding the most appropriate means by which the mitigation of extremist narratives might best be accomplished. An important emerging area of interest is the role of the Internet, both as a forum through which narratives are transmitted and as an avenue for delivering CVE programs. At present, very little is known about which principles and practices should inform online CVE initiatives. This study attempts to establish a foundation and framework for these programs: first, by identifying the concepts and constructs which may be most relevant to countering violent extremism online, and second, by examining the available material from six online CVE programs in relation to these concepts. This examination suggests that these programs are lacking strong theoretical foundations and do not address important elements of radicalization, such as contextual factors or identity issues. It is important that future iterations of CVE programs consider not just the specific content of the narratives, but also take into account why these narratives have resonance for particular individuals.
|
2016 |
Davies, G. and Newdecker, C. |
View
Publisher
|
Journal Article |
Toward a Framework Understanding of Online Programs for Countering Violent Extremism
View Abstract
There is an emerging consensus that ideologically-based narratives play a central role in encouraging and sustaining radicalization to violence, and that preventing, arresting, or reversing radicalization requires some means by which to address the effects of these narratives. Countering violent extremism (CVE) is a broad umbrella phrase that covers a wide array of approaches that have been advanced to reduce the radicalizing effects of extremist narratives. There is considerably less agreement, however, regarding the most appropriate means by which the mitigation of extremist narratives might best be accomplished. An important emerging area of interest is the role of the Internet, both as a forum through which narratives are transmitted and as an avenue for delivering CVE programs. At present, very little is known about which principles and practices should inform online CVE initiatives. This study attempts to establish a foundation and framework for these programs: first, by identifying the concepts and constructs which may be most relevant to countering violent extremism online, and second, by examining the available material from six online CVE programs in relation to these concepts. This examination suggests that these programs are lacking strong theoretical foundations and do not address important elements of radicalization, such as contextual factors or identity issues. It is important that future iterations of CVE programs consider not just the specific content of the narratives, but also take into account why these narratives have resonance for particular individuals
|
2016 |
Davies et al. |
View
Publisher
|
Journal |
Searching for Signs of Extremism on the Web: An Introduction to Sentiment-Based Identification of Radical Authors
View Abstract
As violent extremists continue to surface in online discussion forums, law enforcement agencies search for new ways of uncovering their digital indicators. Researchers have both described and hypothesized a number of ways to detect online traces of potential extremists, yet this area of inquiry remains in its infancy. This study proposes a new search method that, through the analysis of sentiment, identifies the most radical users within online forums. Although this method is applicable to web-forums of any type, the method was evaluated on four Islamic forums containing approximately 1 million posts of its 26,000 unique users. Several characteristics of each user’s postings were examined, including their posting behavior and the content of their posts. The content was analyzed using Parts-Of-Speech tagging, sentiment analysis, and a novel algorithm called ‘Sentiment-based Identification of Radical Authors’, which accounts for a user’s percentile score for average sentiment score, volume of negative posts, severity of negative posts, and duration of negative posts. The results suggest that there is no simple typology that best describes radical users online; however, the method is flexible enough to evaluate several properties of a user’s online activity that can identify radical users on the forums.
|
2017 |
Scrivens, R., Davies, G., and Frank, R. |
View
Publisher
|