Report |
Mapping The Jihadist Information Ecosystem
View Abstract
Online disruption efforts generally aim to reduce the availability of jihadist content. Yet, the speed and agility of jihadist movements online – a multiplatform approach which a co-author of this paper has previously described as a ‘swarmcast’ – has allowed groups to evolve in response to disruption efforts and find new ways to distribute content. This paper describes a model of the flow of users between social media platforms and surface web pages to access jihadist content, using data obtained through innovative collection methods. The model provides an approximate picture of the jihadist information ecosystem and how multiple platforms are used to disseminate content.
|
2019 |
Fisher, A., Prucha, N. and Winterbotham, E. |
View
Publisher
|
Report |
Mapping The Extremist Narrative Landscape In Afghanistan
View Abstract
This report, which maps how Violent Extremist Organisations (VEOs) are seeking to influence and shape the trajectory of Afghan politics today, aims to inform and support the development
of strategic communications programming that meaningfully counters extremist narratives and enable more targeted, effective responses to the long-term challenges posed by VEO appeals.
|
2020 |
Winter, C. and Alrhmoun, A. |
View
Publisher
|
Report |
Mapping right-wing extremism in Victoria: Applying a gender lens to develop prevention and deradicalisation approaches
View Abstract
This project aims to map right-wing extremism in Victoria through the lens of gender. It begins from the premise that there is an underexplored connection between antifeminist sentiment and far-right extremist sentiment. It does this by focusing on select Victorian-based online groups that have an anti-feminist and far-right profile. The project also works with stakeholders who work in the areas of gender and family violence, to gain insight into their practices and experiences.
|
2020 |
Agius, C., Cook, K., Nicholas, L., Ahmed, A., bin Jehangir, H., Safa, N., Hardwick,
T. and Clark, S. |
View
Publisher
|
Report |
Mapping Networks and Narratives of Online Right-Wing Extremists in New South Wales
View Abstract
The project Mapping Networks and Narratives of Online Right-Wing Extremists in New South Wales (NSW) used the systematic mining and analysis of online data to generate evidence-based insights into online right-wing extremism (RWE) across the state. The project was conducted between July 2019 and February 2020 with data collection occurring from August to November 2019. The project addressed three key areas:
– What is the nature of the online RWE environment in NSW?
– How are themes and narratives framed in different online contexts in order to mobilise support?
– What level of risk does the online RWE environment pose?
The research areas were framed as broad questions to facilitate wide exploratory research into the online RWE movement in NSW, a milieu that has been little studied. This breadth of scope was considered pertinent in the wake of the March 2019 mass casualty terrorist attack in Christchurch, New Zealand, by an attacker originating from NSW.
|
2020 |
Ballsun-Stanton, B., Waldek, L., Droogan, J., Smith, D., Iqbal, M. and Puecker, M. |
View
Publisher
|
Journal Article |
Mapping Global Cyberterror Networks: An Empirical Study of Al-Qaeda and ISIS Cyberterrorism Events
View Abstract
This study explores the internal dynamics and networks of terrorist groups in cyberspace—in particular, Al-Qaeda and the Islamic State of Iraq and al-Sham (ISIS). Using a “Global Cyberterrorism Dataset” that features data on cyberterror attacks between 2011 and 2016, this research analyzes these two terrorist groups through the lens of a cyber-conflict theory that integrates conflict theory with Jaishankar’s space transition theory. Through a network analysis methodology, we examine the invisible relationships and connections between the national origins and target countries of cyberterror attacks. The analysis focuses on the networks of national origins of terrorists and victims, network structures of Al-Qaeda and ISIS actors, and clustering networks of Al-Qaeda and ISIS cyberterrorists. Results indicate that terror in cyberspace is ubiquitous, more flexible than traditional terrorism, and that cyberattacks mostly occurred within the countries of origin. We conclude by discussing the complex features of cyberterror networks and identify some of the geostrategic implications of the divergent cyber strategies adopted by Al-Qaeda and ISIS.
|
2021 |
Lee, C.S., Choi, K.S., Shandler, R. and Kayser, C., |
View
Publisher
|
Report |
Mapping Extremist Communities: A Social Network Analysis Approach
View Abstract
In the domain of computer science, the last years have witnessed the improvement of social network analysis at scale. One of the most challenging aspects of social network analysis is community detection; analysts use a variety of tools to visualise the spontaneous group structure emerging from interactions and friendship relations in multi-million-user networks. This visualisation, combined with influencer detection and automated text analysis tools such as topic detection, enables the analyst to grasp most of the complexity of a social network. This computer-science-oriented study explores three lines of research concerning online extremism. First, about the emerging narratives and the topics that can be found on open platforms. We show that many actors actively use terror-group related terms; most cannot be directly tied to any specific organisation. A second axis concerns the connections between platforms: the information space has no central point as content is shared across platforms. However, the links reveal clusters of locations: we observe a group of Pakistan-India conflict mentions, and a cluster of US alt-right websites, transforming terrorism into a migration problem. The third axis relates to the social media landscape structure. We rely on a combination of document-level topic modelling and graph analysis to detect and explore the social data, visualising the types of groups that are active on the topic. Among the results, we found a small botnet circulating a pro-Daesh pamphlet and a set of grassroot reactions that managed to moderate a controversial pro-Jihadi post on Reddit.
|
2020 |
NATO Strategic Communications Centre of Excellence |
View
Publisher
|