Journal Article |
Literature Review: The Impact of Digital Communications Technology on Radicalisation and Recruitment
View Abstract
This literature review seeks to reorient the discourse on radicalization to consider the connection between communication technology and violent extremism. By interrogating three central questions vexing policy-makers, law enforcement officials and academics, this review moves away from a monolithic understanding of the internet and showcases the opportunities afforded by different communications technologies within the context of radicalization and recruitment. As this discussion shows, there is a consensus that despite significant exceptions to the rule, the internet alone does not act as a radicalizing agent, but rather serves as a facilitator and catalyst for terrorist organizations and their respective networks. Despite varying analyses produced within the literature, there is agreement that the virtual sphere does not replace the real world in most instances. Above all, a review of the current literature demonstrates that to answer the crucial questions posed in this article, more empirically-based research is required. This article is a revised and updated version of the 2017 VOX-Pol report Research Perspectives on Online Radicalisation: A Literature Review 2006 to 2016.
|
2017 |
Meleagrou-Hitchens, A., Alexander, A., and Kaderbhai, N. |
View
Publisher
|
Journal Article |
Countering Insurgency in Kashmir: The Cyber Dimension
View Abstract
Countering the militancy in Kashmir has become a highly challenging task due to the exploitation of new information and communication technology by insurgent groups. The battlefield is now a multidimensional one, encompassing both physical territory and cyberspace. The overall capabilities of insurgents have been enhanced by tools in cyberspace that are inexpensive, ever more sophisticated, rapidly proliferating, and easy to use. Militants are systematically exploiting the Internet to generate moral support, recruit personnel, and transmit propaganda, leading to the further militarisation of the Kashmiri youth. This paper examines the potentially disastrous consequences of the use of cyberspace by an already strong insurgency in Kashmir. The objective is to understand the most effective means to counter the cyber dimension of the Kashmir insurgency.
|
2017 |
Karua, V. |
View
Publisher
|
Journal Article |
The Charlie Hebdo Attacks on Twitter: A Comparative Analysis of a Political Controversy in English and French
View Abstract
In this article, we propose an original method combining large-scale network and lexicometric analysis to link identifiable communities of Twitter users with the main discursive themes they used in the aftermath of the Charlie Hebdo attacks in Paris, France in 2015. We used this method to compare tweets and user networks in French and in English. We observed that the majority of the users who tweeted about Charlie Hebdo were people without any particular affiliation, who were shocked by the attacks and immediately expressed themselves through emotionally charged messages. But rather quickly their proportion decreased and they participated less in politically polarizing discussions. On the other hand, we found that smaller, highly politicized, and polarized groups had similar attitudes toward the events: they were less engaged immediately after the attacks in emotional expression of sympathy and shock, but they participated vividly in the following days in polemical discussions or engaged themes. Other findings include the central position of mainstream media and the existence of groups of users that aggregated on the basis of nationality. More generally, our results show clearly that even the most dramatic events such as a terrorist attack with innocent victims do not produce homogeneous reactions online. Rather, political engagement and cultural dispositions are keys to understand different attitudes on Twitter.
|
2017 |
Smyrnaios, N., Ratinaud, P. |
View
Publisher
|
Report |
The Key Lessons Learned from the Use of the Internet by Jihadist Groups
View Abstract
This work analyzes some of the key lessons learned from the use of the Internet by jihadist groups over the last twenty years: 1) Online activism can be a substitute for commitment to armed jihad. 3) Terrorists are “early adopters” of new technologies, to enjoy spaces of impunity. 4) The investigation of terrorist activities on the Internet becomes increasingly difficult as a result of the adoption of measures of self-protection 5). The terrorist message on the Internet has the capacity to transcend the intentions of its creators.
|
2017 |
Soriano, M. |
View
Publisher
|
Journal Article |
The Threat to the United States from the Islamic State’s Virtual Entrepreneurs
View Abstract
Among the most recent evolutions of jihadi terrorist tactics in the West has been the rise of the virtual entrepreneur. The increased use of social media, often paired with applications that ofer the option of encrypted messaging, has enabled members of groups like the Islamic State to make direct and lasting contact with radicalized Americans. In some cases, these individuals direct terror plots, and in others, they provide encouragement and motivation for attacks. In the United States, there are 14 known cases of terrorist-related activity involving 19 U.S.-based individuals where the involvement of an Islamic State virtual entrepreneur has been documented. This outsourcing of terrorism has been a game changer in Islamic State eforts to attack the West.
|
2017 |
Hughes, S., and Meleagrou-Hitchens, A. |
View
Publisher
|
Journal Article |
A Semantic Graph-Based Approach for Radicalisation Detection on Social Media
View Abstract
From its start, the so-called Islamic State of Iraq and the Levant (ISIL/ISIS) has been successfully exploiting social media networks, most notoriously Twitter, to promote its propaganda and recruit new members, resulting in thousands of social media users adopting a pro-ISIS stance every year. Automatic identification of pro-ISIS users on social media has, thus, become the centre of interest for various governmental and research organisations. In this paper we propose a semantic graph-based approach for radicalisation detection on Twitter. Unlike previous works, which mainly rely on the lexical representation of the content published by Twitter users, our approach extracts and makes use of the underlying semantics of words exhibited by these users to identify their pro/anti-ISIS stances. Our results show that classifiers trained from semantic features outperform those trained from lexical, sentiment, topic and network features by 7.8% on average F1-measure.
|
2017 |
Saif, H., Dickinson, T., Kastler, L., Fernandez, M., and Alani, H. |
View
Publisher
|