VOX-Pol Publication |
Gore and Violent Extremism: An explorative analysis of the use of gore websites for hosting and sharing extremist and terrorist content
View Abstract
Gore-related websites enable the hosting and sharing of illegal videos, including those produced by proscribed terrorist entities. The websites are numerous, free to access, provide no user or child safety features, and have seen a growth in visitor numbers in recent years due to ongoing conflicts. Most gore-related websites offer download and social media share functionality allowing for graphic content, including 1000s showing terrorist violence, to be shared across social media.
Gore-related websites and the content they host have been largely avoided within academic study and practitioner responses, particularly in relation to counterterrorism and online harms such as violence fixation. This report provides a starting point for understanding the utility the websites provide to terrorist and violent extremist actors and the harms the content hosted on the websites present to children. The report is particularly pertinent in the UK context due to the recently passed Online Safety Act and growing public concern about the availability of graphic violent content in light of the Southport attacker’s reported online behaviours.
|
2025 |
Human Digital, Fisher, A. and Bradley, A. |
View
Publisher
|
Journal Article |
Crowdsourcing geographic information for terrorism-related disaster awareness and mitigation: perspectives and challenges
View Abstract
This systematic review explores the utilization of crowdsourcing for geoinformation in enhancing awareness and mitigating terrorism-related disasters. Out of 519 studies identified in the database search, 108 were deemed eligible for analysis. We focused on articles employing various forms of crowdsourcing platforms, such as Twitter (now known as X), Facebook, and Telegram, across three distinct phases of terrorism-related disasters: monitoring and detection, onset, and post-incident analysis. Notably, we placed particular emphasis on the integration of Machine Learning (ML) algorithms in studying crowdsourced terrorism geoinformation to assess the current state of research and propose future directions. The findings revealed that Twitter emerged as the predominant crowdsourcing platform for terrorism-related information. Despite the prevalence of natural language processing for data mining, the majority of studies did not incorporate ML algorithms in their analyses. This preference for qualitative research methods can be attributed to the multifaceted nature of terrorism, spanning security, governance, politics, religion, and law. Our advocacy is for increased studies from the domains of geography, earth observation, and big data. Simultaneously, we encourage advancements in existing ML algorithms to enhance the accurate real-time detection of planned and onset terrorism disasters.
|
2025 |
Chukwu, M., Huang, X., Wang, S., Yang, D. and Ye, X. |
View
Publisher
|
Journal Article |
Women and the Spread of Global Extremism Narratives of ISIS
View Abstract
The Islamic State of Iraq and Syria (ISIS) is a radicalized group that has the goal of building an Islamic caliphate globally. ISIS recruits its members globally and spreads the extremism narrative widely. ISIS recruits more men to fulfill their roles as fighters and martyrs, but the role of women is also needed in ISIS activities as a supporting capacity in every activity carried out by jihadists. The involvement of women is seen as quite effective in polarizing radicalism, because women will continue the descendants of the next generation of ISIS and have a higher humanist and cognitive spirit than men. For this reason, it is interesting to study the radicalization process carried out by ISIS on women, propaganda, and the pattern of approach. This research uses a qualitative approach to gain an understanding of how transnational networks of the ISIS movement influence women and encourage women to join acts of terrorism through propaganda and extremism narratives. It was found that ISIS spreads its ideological narrative through offline and online channels where the basis of its approach is more towards an emotional intelligence approach related to social identity. ISIS uses many social media instruments in the process of spreading its ideology, so a strategy that focuses on a multidimensional and gender-valued approach that involves the entire spectrum of society needed, including governments, civil society, and families, as well as interstate cooperation to prevent polarization of ISIS ideology to women, such as internalization of education and gender equality.
|
2025 |
Dewi, M.A., Angretnowati, Y. and Anggraini, M. |
View
Publisher
|
Journal Article |
How Civil Aiding and Abetting Liability for Terrorist Activities Applies to Social Media Companies—And How it Does Not
View Abstract
The 2023 Supreme Court case Twitter v. Taamneh found that defendant social media companies were not liable for aiding and abetting a terrorist attack overseas. The Court alluded to the existence of an alternative set of facts that might alter their analysis or produce a different outcome. This Comment explores those “other contexts” and seeks to identify what factors could produce a successful Justice Against Sponsors of Terrorism Act (JASTA) aiding and abetting claim against a social media company for an act of terrorism overseas. This is difficult, in part, because the framework for aiding and abetting liability provided in JASTA is seemingly incompatible with the operations of social media companies. To better evaluate how JASTA’s framework should apply to social media companies, both JASTA cases that do not involve social media companies and aiding and abetting cases derived from other sources are analyzed for their relevance to the social media context.
Ultimately, this Comment concludes that it would take an extraordinary set of facts to find social media companies secondarily liable for an act of terrorism. This is, in part, due to the nature of how social media operates and continues to progress at a rapid pace. The increasing role that social media plays in society highlights why deterring further Foreign Terrorist Organization (FTO) use of social media is critical; as avenues to recruitment and international planning increase, the risk to the United States’ national security also increases. Given that JASTA is not a solution, this Comment suggests other avenues to encourage social media companies to heighten their detection of FTO activity and prevent future attacks.
|
2025 |
Parr, N. |
View
Publisher
|
Chapter |
Policing ‘online radicalization’: the framing of Europol’s Internet Referral Unit
View Abstract
This chapter examines Europol’s Internet Referral Unit (EU IRU) and its role in the privatized governance of online media within the broader context of transnational law enforcement and European counter-terrorism policy. Established in 2015, the EU IRU monitors online content and recommends takedowns to hosting platforms based on breaches of terms of service, not legal violations. By analyzing the discursive practices of the EU IRU, this chapter seeks to understand the (in)security dynamics of online radicalization and assess associated human rights concerns. The core question addressed is how Europol frames radicalization and Internet content. The chapter situates the EU IRU within the wider discourse on counter-radicalization, arguing for a deeper understanding of radicalization as perceived by professionals in the field. A detailed policy analysis highlights the unit’s referral and takedown activities, scrutinizing Europol’s framing of technology as a security issue and radicalization as a problem exacerbated by online communication. The study reveals significant issues such as over-blocking, lack of due process, and absence of recourse for affected users, emphasizing the ethical and human rights implications of private companies acting as arbiters of speech. The conclusion critiques Europol’s approach, noting its inconsistency and inefficacy, and underscores the necessity of transparent and judicially overseen content regulation. This chapter calls for a re-evaluation of current counter-radicalization strategies, advocating for more holistic approaches that balance security needs with fundamental rights and democratic accountability.
|
2025 |
Vieth-Ditlmann, K. |
View
Publisher
|
Journal Article |
A multiplex network approach to understanding extremist organizations: A case study of the Proud Boys
View Abstract
Purpose
This paper explores the network dynamics of extremist organizations through a detailed case study of the Proud Boys. Using a multiplex network approach, informed by recent advances in research on gangs, we examine how various types of ties influence extremist behavior.
Method
We first describe three focal networks through which the Proud Boys operate – chapter affiliations, online connectivity through social media, and co-membership in other extremist groups – and the resultant multiplex network linking members across the organization. We then describe a fourth network of offline co-activism and use multiple regression with the quadratic assignment procedure (MRQAP) to assess how ties within different multiplex network layers are associated with co-activism.
Results
Findings indicate high variability in member connectivity across different types of ties, but certain metrics do reveal key figures within the organization. Each focal network is significantly associated with co-activism. Regional proximity and shared leadership roles also emerge as relevant factors, underscoring the potential influence of structural and organizational dynamics.
Conclusion
This study provides a nuanced understanding of the structure and linkages within an extremist organization, demonstrates the value of a gang-informed approach, and offers insight into the drivers of extremist mobilization.
|
2025 |
Wippell, J.G. and Haynie, D.L. |
View
Publisher
|