Journal Article |
Mapping Global Cyberterror Networks: An Empirical Study of Al-Qaeda and ISIS Cyberterrorism Events
View Abstract
This study explores the internal dynamics and networks of terrorist groups in cyberspace—in particular, Al-Qaeda and the Islamic State of Iraq and al-Sham (ISIS). Using a “Global Cyberterrorism Dataset” that features data on cyberterror attacks between 2011 and 2016, this research analyzes these two terrorist groups through the lens of a cyber-conflict theory that integrates conflict theory with Jaishankar’s space transition theory. Through a network analysis methodology, we examine the invisible relationships and connections between the national origins and target countries of cyberterror attacks. The analysis focuses on the networks of national origins of terrorists and victims, network structures of Al-Qaeda and ISIS actors, and clustering networks of Al-Qaeda and ISIS cyberterrorists. Results indicate that terror in cyberspace is ubiquitous, more flexible than traditional terrorism, and that cyberattacks mostly occurred within the countries of origin. We conclude by discussing the complex features of cyberterror networks and identify some of the geostrategic implications of the divergent cyber strategies adopted by Al-Qaeda and ISIS.
|
2021 |
Lee, C.S., Choi, K.S., Shandler, R. and Kayser, C., |
View
Publisher
|
Report |
Mapping Networks and Narratives of Online Right-Wing Extremists in New South Wales
View Abstract
The project Mapping Networks and Narratives of Online Right-Wing Extremists in New South Wales (NSW) used the systematic mining and analysis of online data to generate evidence-based insights into online right-wing extremism (RWE) across the state. The project was conducted between July 2019 and February 2020 with data collection occurring from August to November 2019. The project addressed three key areas:
– What is the nature of the online RWE environment in NSW?
– How are themes and narratives framed in different online contexts in order to mobilise support?
– What level of risk does the online RWE environment pose?
The research areas were framed as broad questions to facilitate wide exploratory research into the online RWE movement in NSW, a milieu that has been little studied. This breadth of scope was considered pertinent in the wake of the March 2019 mass casualty terrorist attack in Christchurch, New Zealand, by an attacker originating from NSW.
|
2020 |
Ballsun-Stanton, B., Waldek, L., Droogan, J., Smith, D., Iqbal, M. and Puecker, M. |
View
Publisher
|
Report |
Mapping right-wing extremism in Victoria: Applying a gender lens to develop prevention and deradicalisation approaches
View Abstract
This project aims to map right-wing extremism in Victoria through the lens of gender. It begins from the premise that there is an underexplored connection between antifeminist sentiment and far-right extremist sentiment. It does this by focusing on select Victorian-based online groups that have an anti-feminist and far-right profile. The project also works with stakeholders who work in the areas of gender and family violence, to gain insight into their practices and experiences.
|
2020 |
Agius, C., Cook, K., Nicholas, L., Ahmed, A., bin Jehangir, H., Safa, N., Hardwick,
T. and Clark, S. |
View
Publisher
|
Report |
Mapping The Extremist Narrative Landscape In Afghanistan
View Abstract
This report, which maps how Violent Extremist Organisations (VEOs) are seeking to influence and shape the trajectory of Afghan politics today, aims to inform and support the development
of strategic communications programming that meaningfully counters extremist narratives and enable more targeted, effective responses to the long-term challenges posed by VEO appeals.
|
2020 |
Winter, C. and Alrhmoun, A. |
View
Publisher
|
Report |
Mapping The Jihadist Information Ecosystem
View Abstract
Online disruption efforts generally aim to reduce the availability of jihadist content. Yet, the speed and agility of jihadist movements online – a multiplatform approach which a co-author of this paper has previously described as a ‘swarmcast’ – has allowed groups to evolve in response to disruption efforts and find new ways to distribute content. This paper describes a model of the flow of users between social media platforms and surface web pages to access jihadist content, using data obtained through innovative collection methods. The model provides an approximate picture of the jihadist information ecosystem and how multiple platforms are used to disseminate content.
|
2019 |
Fisher, A., Prucha, N. and Winterbotham, E. |
View
Publisher
|
Journal Article |
Mapping the online presence and activities of the Islamic State’s unofficial propaganda cell: Ahlut-Tawhid Publications
View Abstract
This paper, which takes the form of a case study, aims to contribute to the debate on activities of the Islamic State’s unofficial media bureaus. Based on tools of open source intelligence, as well as a limited content analysis, it maps the online presence and activities of Ahlut-Tawhid Publications (AHP). Its means of distributing pro-Daesh content in the surface web as well as its general impact are discussed. It also deliberates on the interconnectedness of AHP with other online propaganda cells supporting the self-proclaimed “Caliphate.” This paper argues that this group was part of the ongoing online campaign of the Islamic State in the World Wide Web in 2018 and 2019. It maintained quite an impressive and long-lasting online presence, combining the potential of the most popular microblogs, hosting services and social media with the flexibility of standalone websites. In contrast to the most recognized propaganda cells of Daesh, such as al-Hayat Media Centre or Amaq News Agency whose productions have been quickly detected and removed from the mainstream webpages for years, AHP kept a low profile for the most part of 2018. In effect, it benefited from its relative anonymity and for months operated a network of pro-IS distribution channels throughout Web 1.0 and Web 2.0 environments. This ceased to be the case in 2019, when most of them were incapacitated (banned) by law enforcement or abandoned. It is clear that the attention given to proliferating propaganda through the surface web decreased at this time, probably in favor of the Telegram communication software, as the discovered statistics suggest. The only active (still updated) locations—partially related to Ahlut-Tawhid Publications—belonged to the Bengali Ansar network. It has to be stressed, however, that AHP failed to spark increased attention of Internet users.
|
2020 |
Lakomy, M. |
View
Publisher
|