VOX-Pol Publication |
What are the Roles of the Internet In Terrorism? Measuring Online Behaviors of Convicted UK Terrorists
View Abstract
Using a unique dataset of 227 convicted UK-based terrorists, this report fills a large gap in the existing literature. Using descriptive statistics, we first outline the degree to which various online activities related to radicalisation were present within the sample. The results illustrate the variance in behaviours often attributed to ‘online radicalisation’. Second, we conducted a smallest-space analysis to illustrate two clusters of commonly co-occurring behaviours that delineate behaviours from those directly associated with attack planning. Third, we conduct a series of bivariate and multivariate analyses to question whether those who interact virtually with like-minded individuals or learn online, exhibit markedly different experiences (e.g. radicalisation, event preparation, attack outcomes) than those who do not.
|
2015 |
Gill, P., Corner, E., Thornton, A. and Conway, M. |
View
Publisher
|
Journal Article |
Women’s Connectivity in Extreme Networks
View Abstract
A popular stereotype is that women will play more minor roles than men as environments become more dangerous and aggressive. Our analysis of new longitudinal data sets from offline and online operational networks [for example, ISIS (Islamic State)] shows that although men dominate numerically, women emerge with superior network connectivity that can benefit the underlying system’s robustness and survival. Our observations suggest new female-centric approaches that could be used to affect such networks. They also raise questions about how individual contributions in high-pressure systems are evaluated.
|
2016 |
Manritque, P., Cao, Z., Gabriel, A., Horgan, J., Gill, P., Qi, H., Restrepo, E.M., Johnson, D., Wuchty, S., Song, C. and Johnson, N. |
View
Publisher
|
VOX-Pol Publication |
Online Behaviours of Convicted Terrorists
View Abstract
Previous research on terrorist use of the Internet generally discusses the opportunities offered by the Internet to terrorist groups (Tsfati & Weimann, 2002; Weimann, 2006; Holt et al., 2015; Rudner, 2016). Such accounts implicitly view the interaction between the Internet and the user as uni-directional (i.e. exposure to Internet content may cause behaviour change). This lacks an acknowledgement that not every potential user will make use available opportunities, nor use these in the same way. The degree to which an individual makes use of an opportunity is modulated based upon their goals, plans, values, beliefs, and experiences (Norman, 1988). At present, there are only three data-driven studies examining how convicted terrorists have used the Internet: Von Behr et al., 2013, Gill et al., 2014, and Gill and Corner 2015. These studies shift the focus from the Internet as a potentially causal factor to how individuals use the Internet based upon their motivations, needs, expectations, and histories. They acknowledge, in other words, the way in which the interaction between Internet and user is a two-way person-situation interactive process in which the individual leads the way. Reported herein are two complementary pieces of research, one large scale and based on open source data and another smaller scale and based on closed sources, that build significantly upon the above described research.
|
2016 |
Gill, P. |
View
Publisher
|
Journal |
Terrorist Use of the Internet by the Numbers
View Abstract
Public interest and policy debates surrounding the role of the Internet in terrorist activities is increasing. Criminology has said very little on the matter. By using a unique data set of 223 convicted United Kingdom–based terrorists, this article focuses on how they used the Internet in the commission of their crimes. As most samples of terrorist offenders vary in terms of capabilities (lone-actor vs. group offenders) and criminal sophistication (improvised explosive devices vs. stabbings), we tested whether the affordances they sought from the Internet significantly differed. The results suggest that extreme-right-wing individuals, those who planned an attack (as opposed to merely providing material support), conducted a lethal attack, committed an improvised explosive device (IED) attack, committed an armed assault, acted within a cell, attempted to recruit others, and engaged in nonvirtual network activities and nonvirtual place interactions were significantly more likely to learn online compared with those who did not engage in these behaviors. Those undertaking unarmed assaults were significantly less likely to display online learning. The results also suggested that extreme-right-wing individuals who perpetrated an IED attack, associated with a wider network, attempted to recruit others, and engaged in nonvirtual network activities and nonvirtual place interactions were significantly more likely to communicate online with co-ideologues.
|
2017 |
Gill et. al |
View
Publisher
|
Journal Article |
Terrorist Use of the Internet by the Numbers: Quantifying Behaviors, Patterns, and Processes
View Abstract
Public interest and policy debates surrounding the role of the Internet in terrorist activities is increasing. Criminology has said very little on the matter. By using a unique data set of 223 convicted United Kingdom–based terrorists, this article focuses on how they used the Internet in the commission of their crimes. As most samples of terrorist offenders vary in terms of capabilities (lone-actor vs. group offenders) and criminal sophistication (improvised explosive devices vs. stabbings), we tested whether the affordances they sought from the Internet significantly differed. The results suggest that extreme-right-wing individuals, those who planned an attack (as opposed to merely providing material support), conducted a lethal attack, committed an improvised explosive device (IED) attack, committed an armed assault, acted within a cell, attempted to recruit others, and engaged in non-virtual network activities and non-virtual place interactions were significantly more likely to learn online compared with those who did not engage in these behaviours. Those undertaking unarmed assaults were significantly less likely to display online learning. The results also suggested that extreme-right-wing individuals who perpetrated an IED attack, associated with a wider network, attempted to recruit others, and engaged in non-virtual network activities and non-virtual place interactions were significantly more likely to communicate online with co-ideologues.
This article is a revised and updated version of the 2015 VOX-Pol report ‘What are the Roles of the Internet In Terrorism? Measuring Online Behaviors of Convicted UK Terrorists.’
|
2017 |
Gill, P., Corner, E., Conway, M., Thornton, A., Bloom, M. and Horgan, J. |
View
Publisher
|
Report |
Shedding Light On Terrorist And Extremist Content Removal
View Abstract
Social media and tech companies face the challenge of identifying and removing terrorist and extremist content from their platforms. This paper presents the findings of a series of interviews with Global Internet Forum to Counter Terrorism (GIFCT) partner companies and law enforcement Internet Referral Units (IRUs). It offers a unique view on current practices and challenges regarding content removal, focusing particularly on human-based and automated approaches and the integration of the two.
|
2019 |
Vegt, I.V.D. Gill, P., Macdonald,S. and Kleinberg, B. |
View
Publisher
|