Journal Article |
Where do ‘mixed, unclear, and unstable’ ideologies come from? A data-driven answer centred on the incelosphere
View Abstract
In Europe and North America, an increasing proportion of individuals who are referred to de-radicalization programmes, arrested for terrorism offences, or involved in politically motivated violence, present a ‘mixed, unclear, and unstable’ (MUU) ideological profile instead of holding a single, clear and coherent extremist belief system. Where do these composite and often inconsistent ideological constructs come from? This paper offers a direct attempt to conceptualize and empirically expose the sources and drivers of the MUU phenomenon, using an in-depth case-study tracing the emergence of MUU ideological constructs from the incelosphere. Based on a theoretical model that acknowledges the interplay of structural-, societal-, and individual-level drivers, we argue that the MUU phenomenon results from (sometimes strategic) individual uses of a specific technological affordance – outlinking – and that these fluctuate in response to significant external events such as the Covid-19 lockdown. Our findings enhance our understanding of recent cases of extremist violence and unlock new targeted avenues for CVE intervention.
|
2024 |
Brace, L., Baele, S.J. and Ging, D. |
View
Publisher
|
Journal Article |
Where Are They Now?: The Costs and Benefits of Doxxing Far-Right Extremists
View Abstract
Research on far-right extremism has grown substantially over the last decade, owing to the rise of Trump, attacks such as the one in Christchurch and Buffalo, as well as the mainstreaming of hate speech and polarization. In addition to research, there have been antifascist activists who have been engaged in doxxing members of the far right who are part of our schools, our militaries, and governments. Releasing the private information of members of far-right movements to the public has created interesting policy and law enforcement dilemmas. With respect to law enforcement, can doxxing be used as a tool to force individuals to disengage from groups? For social media companies, doxxing violates their terms of service, but should an exception be made in these instances since it purportedly serves a public interest? For this paper, we interviewed 10 former members of the far right who have experienced doxxing over the last several years. The paper explores what happened, the immediate and long-term effects of doxxing on their lives, and ongoing challenges of being exposed against their will. We conclude with some policy recommendations related to the costs and benefits of doxxing on these individuals but also society at large.
|
2024 |
Amarasingam, A. and Galloway, B. |
View
Publisher
|
Journal Article |
Where are All the Cyber Terrorists? From Waiting for Cyber Attack to Understanding Audiences
View Abstract
This paper presents a review of recent academic scholarship and debates on cyber terrorism, and more broadly of what is known about terrorist’s direct use of the Internet as weapon and, less directly, as a communication device. It presents an overview of a field of discourse that has, since its inception, provided a number of foreboding and even doomsday warnings about the future of cyber terrorism, which in the main have failed to come to realization. First, it surveys why these gloomy warnings regarding future proliferation of cyber terrorism have not been born out in practice, and explains that rather than looking for instances of the Internet being used directly as a weapon by terrorists, current debates in academic and policy circles have shifted to trying to measure and ascertain the role that the Internet plays in spreading and supporting extremist discourse to ever wider audiences. It continues by posing a series of questions regarding online audiences that are in need of future research if we are to better understand the role of the Internet in spreading and supporting violent extremist discourse and cultivating terrorism, most importantly the role of audiences as autonomous agents in navigating, reacting and responding to online violent extremist materials.
|
2016 |
Droogan, J. and Waldek, L. |
View
Publisher
|
Policy |
When Opposition Is Extremism: The Dangers of Over-Securitisation and Online Vigilantism
View Abstract
The policy brief makes the case that policymakers and practitioners need to consider who the state defines as ‘extremists.’ In the West, terrorism and violent extremism are seen as the most radical expressions of anti-government resistance. Things, however, look different in the Global South where some governments effectively foster extremists of their own while targeting legitimate and often nonviolent opposition. Echoes of such an approach are also present in Europe where certain (semi-) authoritarian governments securitise their responses to political dissent while seemingly drawing inspiration from more autocratic regimes outside this continent. Thus, in their case, an attempt to counter real or imagined extremism could consequently and likewise lead them to foster extremists of their own.
|
2024 |
Mustaffa, M. |
View
Publisher
|
Journal Article |
When Digital and Physical World Combine: The Metaverse and Gamification of Violent Extremism
View Abstract
From early Bulletin Board Systems adopted by neo-Nazis to the Islamic State’s more recent prolific use of social media platforms, an aspect of terrorism studies that is generally agreed upon is that violent extremists are often early adopters of emerging technologies. These groups, organisations, and networks have demonstrated innovative uses of these digital spaces, harnessed for recruitment, coordination, community building, attack planning, propaganda dissemination, and other purposes. Alongside studying these phenomena, it is important to explore where future trends lie; particularly as findings and recommendations can ensure that relevant stakeholders are aware of and can begin to prepare for emerging threats. This paper considers the potential exploitation of Web 3.0, specifically the metaverse, by violent extremists and explores conceivable opportunities to undertake nefarious activities within these spaces. There is a particular focus on the gamification of violent extremism in the metaverse, an issue—i.e. the gamification of violent extremism—that is causing increasing concern to terrorism practitioners more generally. Although it is difficult to predict exactly how violent extremists will utilise, exploit, and misuse the metaverse and related technologies due to the early stage of its conceptualisation and development, it is possible to develop hypotheses based on past trends and current examples demonstrating manipulation of online spaces that resemble aspects of the metaverse. In fact, aspects of the gamification of violent extremism in the metaverse may well have distinct overlaps with current threats, but simply utilise emerging technologies and take place within developing and more immersive online spaces.
|
2023 |
Lakhani, S. |
View
Publisher
|
Journal Article |
When Digital and Physical World Combine: The Metaverse and Gamification of Violent Extremism
View Abstract
From early Bulletin Board Systems adopted by neo-Nazis to the Islamic State’s more recent prolific use of social media platforms, an aspect of terrorism studies that is generally agreed upon is that violent extremists are often early adopters of emerging technologies. These groups, organisations, and networks have demonstrated innovative uses of these digital spaces, harnessed for recruitment, coordination, community building, attack planning, propaganda dissemination, and other purposes. Alongside studying these phenomena, it is important to explore where future trends lie; particularly as findings and recommendations can ensure that relevant stakeholders are aware of and can begin to prepare for emerging threats. This paper considers the potential exploitation of Web 3.0, specifically the metaverse, by violent extremists and explores conceivable opportunities to undertake nefarious activities within these spaces. There is a particular focus on the gamification of violent extremism in the metaverse, an issue—i.e. the gamification of violent extremism—that is causing increasing concern to terrorism practitioners more generally. Although it is difficult to predict exactly how violent extremists will utilise, exploit, and misuse the metaverse and related technologies due to the early stage of its conceptualisation and development, it is possible to develop hypotheses based on past trends and current examples demonstrating manipulation of online spaces that resemble aspects of the metaverse. In fact, aspects of the gamification of violent extremism in the metaverse may well have distinct overlaps with current threats, but simply utilise emerging technologies and take place within developing and more immersive online spaces.
|
2023 |
Lakhani, S. |
View
Publisher
|