Book |
Terrorists’ Use of the Internet
View Abstract
Terrorist use of the Internet has become a focus of media, policy, and scholarly attention in recent years. Terrorists use the Internet in a variety of ways, the most important being for propaganda purposes and operations-related content, but it is also potentially a means or target of attack. This book presents revised versions of a selection of papers delivered at the NATO Advanced Research Workshop (ARW) on ‘Terrorists’ Use of the Internet’ held in Dublin, Ireland in June 2016. One aim of the workshop was to nurture dialogue between members of the academic, policy and practitioner communities, so the 60 delegates from 13 countries who attended the workshop included representatives from each of these. The participants encompassed a wide range of expertise (including engineering, computer science, law, criminology, political science, international relations, history, and linguistics) and the chapters contained herein reflect these diverse professional and disciplinary backgrounds. The workshop also aimed to address the convergence of threats. Following an introduction which provides an overview of the various ways in which terrorists use the Internet, the book’s remaining 25 chapters are grouped into 5 sections on cyber terrorism and critical infrastructure protection; cyber-enabled terrorist financing; jihadi online propaganda; online counterterrorism; and innovative approaches and responses. The book will be of interest to all those who need to maintain an awareness of the ways in which terrorists use the Internet and require an insight into how the threats posed by this use can be countered.
|
2017 |
Conway, M., Jarvis, L., Lehane, O., Macdonald, S. and Nouri, L. |
View
Publisher
|
Book |
Social Networks as the New Frontier of Terrorism
View Abstract
Terrorism. Why does this word grab our attention so? Propaganda machines have adopted modern technology as a means to always have their content available. Regardless of the hour or time zone, information is being shared by somebody, somewhere. Social media is a game changer influencing the way in which terror groups are changing their tactics and also how their acts of terror are perceived by the members of the public they intend to influence.
This book explores how social media adoption by terrorists interacts with privacy law, freedom of expression, data protection and surveillance legislation through an exploration of the fascinating primary resources themselves, covering everything from the Snowden Leaks, the rise of ISIS to Charlie Hebdo. The book also covers lesser worn paths such as the travel guide that proudly boasts that you can get Bounty and Twix bars mid-conflict, and the best local hair salons for jihadi brides. These vignettes, amongst the many others explored in this volume bring to life the legal, policy and ethical debates considered in this volume, representing an important part in the development of understanding terrorist narratives on social media, by framing the legislative debate.
|
2017 |
Scaife, L. |
View
Publisher
|
Journal Article |
Online Radicalization and Social Media: A Case Study of Daesh
View Abstract
The importance of the Internet and social media in politics has been demonstrated in previous years, when terms such as ‘Twitter revolution’ and ‘Facebook revolution’ were used repeatedly for several movements, and now new terms such as ‘digital threat’ and ‘digital Jihad’ are being used by many in similar fashion. In the age of the Internet, the advantages often associated with the democratizing effect of the Internet are creating an atmosphere for different users, such as Daesh. Global propaganda is an important part of Daesh’s activities, and radicalization is one of the realities of our era. Although the impact of the Internet and social media on processes of people’s radicalization remains a highly contested subject and has been one of the most controversial topics during the last decade, the main question is whether the Internet is the main factor in the radicalization of civilians, considering that some politicians and pundits have been discussing this issue over the past few years, or it is more of a communication tool, facilitator and catalyst, pushing people towards radicalization. In this article, I discuss two different approaches to the relationship between technology (online activities in different platforms) and radicalization. This article is part of an ongoing research project.
|
2017 |
Kadivar, J. |
View
Publisher
|
Journal Article |
Computer support to analyze IS propaganda
View Abstract
This paper discusses the use of computer support to analyze IS propaganda. We focus on thematic analysis of the textual content of various types of online propaganda, and investigate two different ways to identify themes in the data. One approach is theory-driven and builds on previous analysis of IS propaganda, and the other approach is data-driven and automatically identifies prevalent themes in the data. We exemplify the various approaches using different types of IS propaganda and we also provide examples of how the computer-assisted analysis can be used to analyze variation in the data over time. Both approaches indicate an increase in more violent themes in more recent IS propaganda.
|
2017 |
Kaati, L., Sahlgren, M., Isbister, T., Toghiani-Rizi, B. and Cohen, K. |
View
Publisher
|
Journal Article |
Spectacles Of Sovereignty In Digital Time: ISIS Executions, Visual Rhetoric And Sovereign Power
View Abstract
The ISIS videos staging the executions of James Foley and Steven Sotloff are usually understood as devices to deter, recruit, and “sow terror.” Left unanswered are questions about how these videos work; to whom they are addressed; and what about them can so continuously bring new audiences into existence. The evident durability of ISIS despite the imminent defeat of its state, coupled with the political impact of these particular videos, make these questions unusually urgent. Complete answers require analysis of the most understudied aspect of the videos that also happens to be vastly understudied in US political science: the visual mode of the violence. Approaching these videos as visual texts in need of close reading shows that they are, among other things, enactments of “retaliatory humiliation” (defined by Islamists) that perform and produce an inversion of power in two registers. It symbolically converts the public abjection of Foley and Sotloff by the Islamist executioner into an enactment of ISIS’ invincibility and a demonstration of American impotence. It also aims to transpose the roles between the US, symbolically refigured as mass terrorist, failed sovereign, and rogue state, and ISIS, now repositioned as legitimate, invincible sovereign. Such rhetorical practices seek to actually constitute their audiences through the very visual and visceral power of their address. The affective power of this address is then extended and intensified by the temporality that conditions it—what I call digital time. Digital time has rendered increasingly rare ordinary moments of pause between rapid and repetitive cycles of reception and reaction—moments necessary for even a small measure of distance. The result is a sensibility, long in gestation but especially of this time, habituated to thinking less and feeling more, to quick response over deliberative action.
|
2017 |
Euben, R. L. |
View
Publisher
|
PhD Thesis |
Combat Branding And The Islamic State: A Missing Link To Generating A Terrorist Recruit Profile
View Abstract
Profiling has its traditions in criminal investigations where it is used to assist in apprehending an offender by examining and attempting to understand his or her psychological motivations and personality. Terrorist specialists and theorists have applied traditional profiling techniques in hopes of distinguishing nonterrorists from terrorists and in an endeavor to understand the motivators for radicalization. However, these attempts have created a divide between the theorists resulting in contradictory data and debate. With the rise of social media, the methods of terrorism have changed. The Islamic State (IS) in particular has tapped into using media, not only to recruit, but as a form of technological combat, which in turn has added to their success and strength. This dissertation introduces the theory of Combat Branding. The findings of this dissertation suggest that it is possible to create a deductive profile of Western IS recruits by beginning with the examination of IS’s Combat Brand. This is a qualitative visual narrative study of official IS media consisting of video and still images. It is my hypothesis that starting with an analysis of the Combat Brand is a missing link to approaching a deductive profile of the intended target audience.
|
2017 |
Micuda, K. M. |
View
Publisher
|