Journal Article |
Crowdsourcing geographic information for terrorism-related disaster awareness and mitigation: perspectives and challenges
View Abstract
This systematic review explores the utilization of crowdsourcing for geoinformation in enhancing awareness and mitigating terrorism-related disasters. Out of 519 studies identified in the database search, 108 were deemed eligible for analysis. We focused on articles employing various forms of crowdsourcing platforms, such as Twitter (now known as X), Facebook, and Telegram, across three distinct phases of terrorism-related disasters: monitoring and detection, onset, and post-incident analysis. Notably, we placed particular emphasis on the integration of Machine Learning (ML) algorithms in studying crowdsourced terrorism geoinformation to assess the current state of research and propose future directions. The findings revealed that Twitter emerged as the predominant crowdsourcing platform for terrorism-related information. Despite the prevalence of natural language processing for data mining, the majority of studies did not incorporate ML algorithms in their analyses. This preference for qualitative research methods can be attributed to the multifaceted nature of terrorism, spanning security, governance, politics, religion, and law. Our advocacy is for increased studies from the domains of geography, earth observation, and big data. Simultaneously, we encourage advancements in existing ML algorithms to enhance the accurate real-time detection of planned and onset terrorism disasters.
|
2025 |
Chukwu, M., Huang, X., Wang, S., Yang, D. and Ye, X. |
View
Publisher
|
Journal Article |
Women and the Spread of Global Extremism Narratives of ISIS
View Abstract
The Islamic State of Iraq and Syria (ISIS) is a radicalized group that has the goal of building an Islamic caliphate globally. ISIS recruits its members globally and spreads the extremism narrative widely. ISIS recruits more men to fulfill their roles as fighters and martyrs, but the role of women is also needed in ISIS activities as a supporting capacity in every activity carried out by jihadists. The involvement of women is seen as quite effective in polarizing radicalism, because women will continue the descendants of the next generation of ISIS and have a higher humanist and cognitive spirit than men. For this reason, it is interesting to study the radicalization process carried out by ISIS on women, propaganda, and the pattern of approach. This research uses a qualitative approach to gain an understanding of how transnational networks of the ISIS movement influence women and encourage women to join acts of terrorism through propaganda and extremism narratives. It was found that ISIS spreads its ideological narrative through offline and online channels where the basis of its approach is more towards an emotional intelligence approach related to social identity. ISIS uses many social media instruments in the process of spreading its ideology, so a strategy that focuses on a multidimensional and gender-valued approach that involves the entire spectrum of society needed, including governments, civil society, and families, as well as interstate cooperation to prevent polarization of ISIS ideology to women, such as internalization of education and gender equality.
|
2025 |
Dewi, M.A., Angretnowati, Y. and Anggraini, M. |
View
Publisher
|
Journal Article |
How Civil Aiding and Abetting Liability for Terrorist Activities Applies to Social Media Companies—And How it Does Not
View Abstract
The 2023 Supreme Court case Twitter v. Taamneh found that defendant social media companies were not liable for aiding and abetting a terrorist attack overseas. The Court alluded to the existence of an alternative set of facts that might alter their analysis or produce a different outcome. This Comment explores those “other contexts” and seeks to identify what factors could produce a successful Justice Against Sponsors of Terrorism Act (JASTA) aiding and abetting claim against a social media company for an act of terrorism overseas. This is difficult, in part, because the framework for aiding and abetting liability provided in JASTA is seemingly incompatible with the operations of social media companies. To better evaluate how JASTA’s framework should apply to social media companies, both JASTA cases that do not involve social media companies and aiding and abetting cases derived from other sources are analyzed for their relevance to the social media context.
Ultimately, this Comment concludes that it would take an extraordinary set of facts to find social media companies secondarily liable for an act of terrorism. This is, in part, due to the nature of how social media operates and continues to progress at a rapid pace. The increasing role that social media plays in society highlights why deterring further Foreign Terrorist Organization (FTO) use of social media is critical; as avenues to recruitment and international planning increase, the risk to the United States’ national security also increases. Given that JASTA is not a solution, this Comment suggests other avenues to encourage social media companies to heighten their detection of FTO activity and prevent future attacks.
|
2025 |
Parr, N. |
View
Publisher
|
Chapter |
Policing ‘online radicalization’: the framing of Europol’s Internet Referral Unit
View Abstract
This chapter examines Europol’s Internet Referral Unit (EU IRU) and its role in the privatized governance of online media within the broader context of transnational law enforcement and European counter-terrorism policy. Established in 2015, the EU IRU monitors online content and recommends takedowns to hosting platforms based on breaches of terms of service, not legal violations. By analyzing the discursive practices of the EU IRU, this chapter seeks to understand the (in)security dynamics of online radicalization and assess associated human rights concerns. The core question addressed is how Europol frames radicalization and Internet content. The chapter situates the EU IRU within the wider discourse on counter-radicalization, arguing for a deeper understanding of radicalization as perceived by professionals in the field. A detailed policy analysis highlights the unit’s referral and takedown activities, scrutinizing Europol’s framing of technology as a security issue and radicalization as a problem exacerbated by online communication. The study reveals significant issues such as over-blocking, lack of due process, and absence of recourse for affected users, emphasizing the ethical and human rights implications of private companies acting as arbiters of speech. The conclusion critiques Europol’s approach, noting its inconsistency and inefficacy, and underscores the necessity of transparent and judicially overseen content regulation. This chapter calls for a re-evaluation of current counter-radicalization strategies, advocating for more holistic approaches that balance security needs with fundamental rights and democratic accountability.
|
2025 |
Vieth-Ditlmann, K. |
View
Publisher
|
Journal Article |
A multiplex network approach to understanding extremist organizations: A case study of the Proud Boys
View Abstract
Purpose
This paper explores the network dynamics of extremist organizations through a detailed case study of the Proud Boys. Using a multiplex network approach, informed by recent advances in research on gangs, we examine how various types of ties influence extremist behavior.
Method
We first describe three focal networks through which the Proud Boys operate – chapter affiliations, online connectivity through social media, and co-membership in other extremist groups – and the resultant multiplex network linking members across the organization. We then describe a fourth network of offline co-activism and use multiple regression with the quadratic assignment procedure (MRQAP) to assess how ties within different multiplex network layers are associated with co-activism.
Results
Findings indicate high variability in member connectivity across different types of ties, but certain metrics do reveal key figures within the organization. Each focal network is significantly associated with co-activism. Regional proximity and shared leadership roles also emerge as relevant factors, underscoring the potential influence of structural and organizational dynamics.
Conclusion
This study provides a nuanced understanding of the structure and linkages within an extremist organization, demonstrates the value of a gang-informed approach, and offers insight into the drivers of extremist mobilization.
|
2025 |
Wippell, J.G. and Haynie, D.L. |
View
Publisher
|
Journal Article |
Psychiatry of Radicalization and Terrorism in the Lone Wolf, Children, and Women: An E-ethnographic Approach for Analysis
View Abstract
Radicalization is a global event affecting different countries and present in different historical contexts. Psychiatrists can help in the analysis of radicalization in individuals who operate autonomously from more radicalized groups. These lone actors or lone wolves are more difficult to spot as there is no unique identification because they operate as self-determined women or men. A focus of the current study is on the radicalization of children and women. The use of ethnographic research also using Internet sources has provided satisfactory results in the analysis of radicalization while reducing the risk and difficulties of approaching a sample population (terrorists, lone wolves, and radical groups) that, most of the time, is remote, dangerous and concealed to public scrutiny. Emphasis is also provided to the stages of development of radicalized thought and how radicalization can be understood in terms of cognitive and social development of the lone-wolf terrorist. The authors also explore how a radicalized leader can lever on the vulnerability of some individuals to radicalize them. Besides, the authors approach radicalized thought also as a logical fallacy and as a sign of dualistic thinking. Hence, a mix of cognitive, logical, and psychiatric triggers is analyzed in their potential to radicalize.
|
2025 |
Lazzari, C., Nusair, A. and Rabottini, M. |
View
Publisher
|