Journal Article |
An Empirical Study on Collective Online Behaviors of Extremist Supporters
View Abstract
Online social media platforms such as Twitter have been found to be misused by extremist groups, including Islamic State of Iraq and Syria (ISIS), who attract and recruit social media users. To prevent their influence from expanding in the online social media platforms, it is required to understand the online behaviors of these extremist group users and their followers, for predicting and identifying potential security threats. We present an empirical study about ISIS followers’ online behaviors on Twitter, proposing to classify their tweets in terms of political and subjectivity polarities. We first develop a supervised classification model for the polarity classification, based on natural language processing and clustering methods. We then develop a statistical analysis of term-polarity correlations, which leads us to successfully observe ISIS followers’ online behaviors, which are in line with the reports of experts.
|
2017 |
Kim, J-J., Liu, Y., Lim, W.Y., and Thing, V.L.L. |
View
Publisher
|
Chapter |
The Challenges and Limitations of Online Counter-Narratives in the Fight against ISIS Recruitment in Europe and North America
View Abstract
The rise of the Islamic State has contributed to both an increased terrorism threat in Western nations and an unprecedented number of citizens joining the group of so-called foreign fighters. IS has used the internet as a way to both disseminate propaganda and radicalize and recruit supporters. This article will begin by analyzing some of the most recent and well-known of such efforts, offering explanations for their successes and failures. The author then assesses limitations to combatting extremist ideas. Not only must the solution involve civil society, but a recalibration of the meaning and aims of counter-messaging is needed.
|
2017 |
Meleagrou-Hitchens, A. |
View
Publisher
|
Journal Article |
Fanning the Flames of Hate: Social Media and Hate Crime
View Abstract
This paper investigates the link between social media and hate crime using hand-collected data from Facebook and Twitter. We study the case of Germany, where the recently emerged right-wing party Alternative für Deutschland (AfD) has developed a major social media presence. Using a difference-in-differences design, we show that right-wing anti-refugee sentiment on Facebook predicts violent crimes against refugees in otherwise similar municipalities with higher social media usage. Consistent with social media being the driving force, the effect decreases with internet outages; increases with user network interactions; is not driven by the news cycle; and does not hold for posts unrelated to refugees. We find similar evidence for the United States, where President Trump’s twitter activity strongly predicts hate crimes against the minorities targeted in his tweets, but not other minorities. We find no effect for the period before Trump’s presidential campaign or measures of general anti-minority sentiment.
|
2017 |
Müller, K., and Schwarz, C. |
View
Publisher
|
Journal Article |
Extreme Right Images of Radical Authenticity: Multimodal Aesthetics of History, Nature, and Gender Roles in Social Media
View Abstract
Over recent years, the German extreme right has undergone significant changes, including the appropriation of symbols, styles, and action repertoires of contemporary (youth) cultures, sometimes even taken from the far left. In this article, we investigate extreme right visual communication through Facebook, focusing on claims to truth and authentic Nazism in relation to ‘history’, ‘nature’, and ‘gender roles’. These themes were central in National Socialism, but today need to be (re)negotiated vis-à-vis contemporary (youth) cultures. We show that while a traditional notion of ideological authority is enabled through visuals, there is also a strand of imagery depicting and celebrating ‘intimate’ communion. While this simultaneity leads to tensions within the ‘ideal extreme right subject’, we argue that such dilemmas can also be productive, allowing for the (re)negotiation of classic National Socialist doctrine in the context of contemporary (youth) cultures, and thus, potentially, for a revitalisation of the extreme right.
|
2017 |
Forchtner, B. and Kolvera, C. |
View
Publisher
|
Chapter |
Online Jihadi Instructional Content: The Role of Magazines
View Abstract
This chapter focuses on the instructional content, both text and images, published in 26 issues of three jihadi magazines: Al-Qaeda in the Arabian Peninsula’s Inspire, Inspire’s forerunner Jihad Recollections, and Somali Al-Shabab’s Gaidi M’taani. Instruction was found to be a core component of Inspire as distinct from the varying types and levels of instruction appearing in Jihad Recollections and Gaidi M’taani. Noticeable too was that the text and images composing bomb-making instructional guides were not only the commonest, but also the most detailed types of guides contained in Inspire, with both a high number of images and lengthy supporting text. A clear finding is thus that the purpose of AQAP’s Inspire was not just to inspire readers, in the sense of infusing them with some thought or feeling, but also to supply them with instructions on how these thoughts or feelings could be violently actuated.
|
2017 |
Conway, M., Parker, J. and Looney, S. |
View
Publisher
|
Book |
Terrorists’ Use of the Internet
View Abstract
Terrorist use of the Internet has become a focus of media, policy, and scholarly attention in recent years. Terrorists use the Internet in a variety of ways, the most important being for propaganda purposes and operations-related content, but it is also potentially a means or target of attack. This book presents revised versions of a selection of papers delivered at the NATO Advanced Research Workshop (ARW) on ‘Terrorists’ Use of the Internet’ held in Dublin, Ireland in June 2016. One aim of the workshop was to nurture dialogue between members of the academic, policy and practitioner communities, so the 60 delegates from 13 countries who attended the workshop included representatives from each of these. The participants encompassed a wide range of expertise (including engineering, computer science, law, criminology, political science, international relations, history, and linguistics) and the chapters contained herein reflect these diverse professional and disciplinary backgrounds. The workshop also aimed to address the convergence of threats. Following an introduction which provides an overview of the various ways in which terrorists use the Internet, the book’s remaining 25 chapters are grouped into 5 sections on cyber terrorism and critical infrastructure protection; cyber-enabled terrorist financing; jihadi online propaganda; online counterterrorism; and innovative approaches and responses. The book will be of interest to all those who need to maintain an awareness of the ways in which terrorists use the Internet and require an insight into how the threats posed by this use can be countered.
|
2017 |
Conway, M., Jarvis, L., Lehane, O., Macdonald, S. and Nouri, L. |
View
Publisher
|