Chapter |
Spreading the Message Digitally: A Look into Extremist Organizations’ Use of the Internet
View Abstract
Why would a terrorist choose to utilize the Internet rather than the usual methods of assassination, hostage taking, and guerrilla warfare? Conway (2006) identified five major reasons why extremist groups used the Internet: virtual community building, information provision, recruitment, financing, and risk mitigation. Terrorist and extremist organizations can use the Internet to increase their visibility and provide information about the group along with its goals without posing an increased risk to the members. It also allows them to easily ask for, and accept, donations through anonymous financial services such as Dark Coins. These benefits allow these groups to promote awareness of their cause, to convey their message to, and perhaps foster sympathy from a much larger pool of potential supporters and converts (Weimann 2010). Finally, the Internet also provides asynchronous services with global access, with the sender and recipient located at any place, at any time, without the need to link up at a specific time (Wagner 2005). In short, unlike the real world, cyberspace is borderless without limitation, and this makes identification, verification, and attribution a challenge.
|
2015 |
Davies, G., Frank,R., Bouchard,M. and Mei, J. |
View
Publisher
|
VOX-Pol Blog |
Spreading Hate and Violence: The Link between Online Vitriol and Terrorism
View Abstract
|
2023 |
Champion, A. R., Hattie, D. M., Khera, D., Frank, R., and Pedersen, C. L. |
View
Publisher
|
VOX-Pol Blog |
Spoofing, Truthing, and Social Proofing: Digital Influencing after Terrorist Attacks
View Abstract
|
2019 |
Innes, M., Innes, H., and Dobreva, D. |
View
Publisher
|
Report |
Spiders of the Caliphate: Mapping the Islamic State’s Global Support Network on Facebook
View Abstract
This report analyzes the strength of the Islamic State’s (IS) network on Facebook using online network measurement tools and uncovers the myriad of ways in which IS operates on Facebook. To do so, we mapped the accounts and connections between 1,000 IS-supporting Facebook profiles with links to 96 countries on every continent except Antarctica using the open-source network analysis and visualization software, Gephi. It should be noted, however, that hundreds of additional pro-IS profiles were excluded from the dataset. This is because while we were able to identify the IS supporting Facebook accounts, there was no information on those users’ locations. Therefore, this data represents only a portion of IS’s support network on the platform. Our analysis of online IS communities globally, regionally, and nationally suggests that IS’s online networks, in particular on Facebook, are growing and can be utilized to plan and direct terror attacks as well as mobilize foreign fighters for multiple areas of insurgency. Secondly, IS’s presence on Facebook is pervasive and professionalized, contrary to the tech company’s rhetoric and efforts to convince the public, policymakers, and corporate advertisers from believing otherwise. Our findings illustrate that IS has developed a structured and deliberate strategy of
using Facebook to radicalize, recruit, support, and terrorize individuals around the world. According to our observations, it appears that IS utilizes a limited number of central players who work to magnify the group’s presence on the platform, and also works to strengthen its networks so that no one individual IS Facebook account (node) serves as an irreplaceable connection (edge) to other pro-IS accounts located elsewhere.
|
2018 |
Waters, G. and Postings, R. |
View
Publisher
|
Journal Article |
Spectacles Of Sovereignty In Digital Time: ISIS Executions, Visual Rhetoric And Sovereign Power
View Abstract
The ISIS videos staging the executions of James Foley and Steven Sotloff are usually understood as devices to deter, recruit, and “sow terror.” Left unanswered are questions about how these videos work; to whom they are addressed; and what about them can so continuously bring new audiences into existence. The evident durability of ISIS despite the imminent defeat of its state, coupled with the political impact of these particular videos, make these questions unusually urgent. Complete answers require analysis of the most understudied aspect of the videos that also happens to be vastly understudied in US political science: the visual mode of the violence. Approaching these videos as visual texts in need of close reading shows that they are, among other things, enactments of “retaliatory humiliation” (defined by Islamists) that perform and produce an inversion of power in two registers. It symbolically converts the public abjection of Foley and Sotloff by the Islamist executioner into an enactment of ISIS’ invincibility and a demonstration of American impotence. It also aims to transpose the roles between the US, symbolically refigured as mass terrorist, failed sovereign, and rogue state, and ISIS, now repositioned as legitimate, invincible sovereign. Such rhetorical practices seek to actually constitute their audiences through the very visual and visceral power of their address. The affective power of this address is then extended and intensified by the temporality that conditions it—what I call digital time. Digital time has rendered increasingly rare ordinary moments of pause between rapid and repetitive cycles of reception and reaction—moments necessary for even a small measure of distance. The result is a sensibility, long in gestation but especially of this time, habituated to thinking less and feeling more, to quick response over deliberative action.
|
2017 |
Euben, R. L. |
View
Publisher
|
Journal Article |
Spatial dynamics in collective identity: Proximity and homophily in antifascist hyperlink-networks
View Abstract
Internet Communication Technologies (ICTs) have become increasingly popular for social movements of all kinds. Social movement organizations (SMOs) use them to interact and mobilize also across borders. Previous research has highlighted the opportunities for transnational networking and the resulting reduction in the importance of local dependency for SMOs. One movement that combines local direct action with the goal of an international network of activists is Antifa. Single case studies have highlighted that local demonstrations and networks are still vital for antifascist groups. However, studies that examine the influence of spatial dynamics on building an international (digital) network beyond focusing on a single country are still lacking. This study, therefore, examines the impact of proximity on forming digital connections among 355 unique European antifascist groups. Using Exponential Random Graph Modeling (ERGM), we examine the hyperlink network across Europe via the groups’ online presence. The findings reveal that the languages of the groups and the geographical distance between them are significant predictors for the probability of displayed hyperlink connections. These results demonstrate the relevance of proximity theories in the field of digital activism. The study contributes to a deeper understanding of spatial dynamics in shaping online networks, reinforcing the importance of space in contemporary network analysis in social movements studies.
|
2025 |
Schröder, J. and Pfeffer, J. |
View
Publisher
|